Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:726254
MD5:74cffc19a09979e23bfd9f5a5378508b
SHA1:54e1969a3f4000a610aec127bf2d9028e0dc7588
SHA256:203f591e084a2ece60b2be5c13fbafa673ecac10ef91055ad7bd73fddc656b5d
Tags:exe
Infos:

Detection

000Stealer
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected 000Stealer
Antivirus detection for dropped file
Snort IDS alert for network traffic
Tries to steal Crypto Currency Wallets
Tries to harvest and steal ftp login credentials
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Found many strings related to Crypto-Wallets (likely being stolen)
Tries to harvest and steal browser information (history, passwords, etc)
Queries the volume information (name, serial number etc) of a device
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Sample execution stops while process was sleeping (likely an evasion)
Yara detected Credential Stealer
Searches for user specific document files
Enables debug privileges
PE file contains an invalid checksum
Drops PE files
Tries to load missing DLLs
Detected TCP or UDP traffic on non-standard ports
PE file contains more sections than normal
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 6124 cmdline: C:\Users\user\Desktop\file.exe MD5: 74CFFC19A09979E23BFD9F5A5378508B)
    • conhost.exe (PID: 6120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • relaunch_app.exe (PID: 5140 cmdline: "C:\Users\Public\Documents\relaunch_app.exe" MD5: 161D5CCDF1F7563E92D36AD1D5492CCC)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000002.00000002.276605637.0000000014612000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_000StealerYara detected 000StealerJoe Security
    00000002.00000002.271212000.0000000013CC4000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.276599114.000000001460E000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_000StealerYara detected 000StealerJoe Security
        00000002.00000002.276623040.0000000014618000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_000StealerYara detected 000StealerJoe Security
          Process Memory Space: relaunch_app.exe PID: 5140JoeSecurity_000StealerYara detected 000StealerJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            Timestamp:192.168.2.6194.190.152.19349712515682037085 10/19/22-18:11:13.648788
            SID:2037085
            Source Port:49712
            Destination Port:51568
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.6194.190.152.19349705515682037086 10/19/22-18:11:11.925460
            SID:2037086
            Source Port:49705
            Destination Port:51568
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.6194.190.152.19349706515682037084 10/19/22-18:11:12.053781
            SID:2037084
            Source Port:49706
            Destination Port:51568
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:194.190.152.193192.168.2.651568497062037089 10/19/22-18:11:12.115808
            SID:2037089
            Source Port:51568
            Destination Port:49706
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.6194.190.152.19349708515682037087 10/19/22-18:11:12.367036
            SID:2037087
            Source Port:49708
            Destination Port:51568
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Yara matchFile source: 00000002.00000002.276605637.0000000014612000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276599114.000000001460E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276623040.0000000014618000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: relaunch_app.exe PID: 5140, type: MEMORYSTR
            Source: C:\Users\Public\Documents\relaunch_app.exeAvira: detection malicious, Label: HEUR/AGEN.1216915
            Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: C:\Users\Public\Documents\relaunch_app.exeCode function: 2_2_015C3220 FindFirstFileA,GetLastError,_errno,_errno,_errno,_errno,_errno,_errno,2_2_015C3220

            Networking

            barindex
            Source: TrafficSnort IDS: 2037086 ET TROJAN Win32/Unknown Stealer Command (domaindetect) (Outbound) 192.168.2.6:49705 -> 194.190.152.193:51568
            Source: TrafficSnort IDS: 2037084 ET TROJAN Win32/Unknown Stealer Command (filegrab) (Outbound) 192.168.2.6:49706 -> 194.190.152.193:51568
            Source: TrafficSnort IDS: 2037089 ET TROJAN Win32/Unknown Stealer Command Response (filegrab) (Inbound) 194.190.152.193:51568 -> 192.168.2.6:49706
            Source: TrafficSnort IDS: 2037087 ET TROJAN Win32/Unknown Stealer Command (geoblock) (Outbound) 192.168.2.6:49708 -> 194.190.152.193:51568
            Source: TrafficSnort IDS: 2037085 ET TROJAN Win32/Unknown Stealer Command (loader) (Outbound) 192.168.2.6:49712 -> 194.190.152.193:51568
            Source: Joe Sandbox ViewASN Name: RSHB-ASRU RSHB-ASRU
            Source: global trafficTCP traffic: 192.168.2.6:49705 -> 194.190.152.193:51568
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193
            Source: unknownTCP traffic detected without corresponding DNS query: 194.190.152.193

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 00000002.00000002.276605637.0000000014612000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276599114.000000001460E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276623040.0000000014618000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: relaunch_app.exe PID: 5140, type: MEMORYSTR
            Source: C:\Users\Public\Documents\relaunch_app.exeCode function: 2_2_015C10602_2_015C1060
            Source: C:\Users\Public\Documents\relaunch_app.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeSection loaded: mswsock.dllJump to behavior
            Source: relaunch_app.exe.0.drStatic PE information: Number of sections : 11 > 10
            Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Documents\relaunch_app.exe "C:\Users\Public\Documents\relaunch_app.exe"
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Documents\relaunch_app.exe "C:\Users\Public\Documents\relaunch_app.exe" Jump to behavior
            Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
            Source: C:\Users\Public\Documents\relaunch_app.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
            Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Documents\relaunch_app.exeJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeFile created: C:\Users\user\AppData\Local\Temp\relaunch_app.exe.lockJump to behavior
            Source: classification engineClassification label: mal92.troj.spyw.evad.winEXE@4/2@0/1
            Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: file.exe, 00000000.00000002.242857261.00007FF6EB3A7000.00000004.00000001.01000000.00000003.sdmp, relaunch_app.exe, 00000002.00000000.240537171.00000000015E4000.00000002.00000001.01000000.00000004.sdmp, relaunch_app.exe.0.drBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
            Source: file.exe, 00000000.00000002.242857261.00007FF6EB3A7000.00000004.00000001.01000000.00000003.sdmp, relaunch_app.exe, relaunch_app.exe, 00000002.00000000.240537171.00000000015E4000.00000002.00000001.01000000.00000004.sdmp, relaunch_app.exe.0.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
            Source: file.exe, 00000000.00000002.242857261.00007FF6EB3A7000.00000004.00000001.01000000.00000003.sdmp, relaunch_app.exe, relaunch_app.exe, 00000002.00000000.240537171.00000000015E4000.00000002.00000001.01000000.00000004.sdmp, relaunch_app.exe.0.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
            Source: file.exe, 00000000.00000002.242857261.00007FF6EB3A7000.00000004.00000001.01000000.00000003.sdmp, relaunch_app.exe, relaunch_app.exe, 00000002.00000000.240537171.00000000015E4000.00000002.00000001.01000000.00000004.sdmp, relaunch_app.exe.0.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
            Source: file.exe, 00000000.00000002.242857261.00007FF6EB3A7000.00000004.00000001.01000000.00000003.sdmp, relaunch_app.exe, relaunch_app.exe, 00000002.00000000.240537171.00000000015E4000.00000002.00000001.01000000.00000004.sdmp, relaunch_app.exe.0.drBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
            Source: file.exe, 00000000.00000002.242857261.00007FF6EB3A7000.00000004.00000001.01000000.00000003.sdmp, relaunch_app.exe, relaunch_app.exe, 00000002.00000000.240537171.00000000015E4000.00000002.00000001.01000000.00000004.sdmp, relaunch_app.exe.0.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
            Source: relaunch_app.exe, 00000002.00000003.255839504.0000000034E04000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: file.exe, 00000000.00000002.242857261.00007FF6EB3A7000.00000004.00000001.01000000.00000003.sdmp, relaunch_app.exe, relaunch_app.exe, 00000002.00000000.240537171.00000000015E4000.00000002.00000001.01000000.00000004.sdmp, relaunch_app.exe.0.drBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6120:120:WilError_01
            Source: file.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: file.exeStatic file information: File size 5916672 > 1048576
            Source: file.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x56c200
            Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: file.exeStatic PE information: section name: _RDATA
            Source: relaunch_app.exe.0.drStatic PE information: section name: .eh_fram
            Source: relaunch_app.exe.0.drStatic PE information: real checksum: 0x56e579 should be: 0x56f907
            Source: file.exeStatic PE information: real checksum: 0x0 should be: 0x5aacaa
            Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\Public\Documents\relaunch_app.exeJump to dropped file
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\Public\Documents\relaunch_app.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_PhysicalMemory
            Source: C:\Users\Public\Documents\relaunch_app.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_PhysicalMemory
            Source: C:\Users\Public\Documents\relaunch_app.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_VideoController
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\Public\Documents\relaunch_app.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_Processor
            Source: C:\Users\Public\Documents\relaunch_app.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeCode function: 2_2_015C3220 FindFirstFileA,GetLastError,_errno,_errno,_errno,_errno,_errno,_errno,2_2_015C3220
            Source: relaunch_app.exe, 00000002.00000003.258460776.0000000001C75000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware
            Source: relaunch_app.exe, 00000002.00000003.258843594.0000000001C53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_PhysicalMemoryPhysical Memory 0Win32_PhysicalMemoryPhysical MemoryPhysical MemoryPhysical MemoryRAM slot #0RAM slot #0VMware Virtual RAM00000001VMW-4096MBLMEM
            Source: relaunch_app.exe, 00000002.00000003.258843594.0000000001C53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_PhysicalMemoryPhysical Memory 0Win32_PhysicalMemoryPhysical MemoryPhysical MemoryPhysical MemoryRAM slot #0RAM slot #0VMware Virtual RAM00000001VMW-4096MB@@
            Source: relaunch_app.exe, 00000002.00000003.258460776.0000000001C75000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareNE4ZDT1TWin32_VideoController5V1LB1WTVideoController120060621000000.000000-00026999340display.infMSBDAE4HO1R2HPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsDYRE8W8Rme
            Source: relaunch_app.exe, 00000002.00000003.258408230.0000000001C77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareNE4ZDT1TWin32_VideoController5V1LB1WTVideoController120060621000000.000000-00026999340display.infMSBDAE4HO1R2HPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsDYRE8W8R
            Source: relaunch_app.exe, 00000002.00000003.258843594.0000000001C53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
            Source: relaunch_app.exe, 00000002.00000003.258843594.0000000001C53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_PhysicalMemoryPhysical Memory 0Win32_PhysicalMemoryPhysical MemoryPhysical MemoryPhysical MemoryRAM slot #0RAM slot #0VMware Virtual RAM00000001VMW-4096MB
            Source: relaunch_app.exe, 00000002.00000002.267416125.0000000001BF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\Public\Documents\relaunch_app.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeCode function: 2_2_012A11A0 SetUnhandledExceptionFilter,__p__fmode,__p__environ,_cexit,ExitProcess,_iob,_setmode,_setmode,_setmode,2_2_012A11A0
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\Public\Documents\relaunch_app.exe "C:\Users\Public\Documents\relaunch_app.exe" Jump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeQueries volume information: C:\Users\user\Music VolumeInformationJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeQueries volume information: C:\Users\user\Pictures VolumeInformationJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeQueries volume information: C:\Users\user\Videos VolumeInformationJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeCode function: 2_2_015C14C0 cpuid 2_2_015C14C0
            Source: C:\Users\Public\Documents\relaunch_app.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00007FF6EB3776B4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6EB3776B4

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000002.00000002.276605637.0000000014612000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276599114.000000001460E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276623040.0000000014618000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: relaunch_app.exe PID: 5140, type: MEMORYSTR
            Source: C:\Users\Public\Documents\relaunch_app.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml\Jump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
            Source: relaunch_app.exe, 00000002.00000002.271653321.0000000013D6A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Electrum\wallets\
            Source: relaunch_app.exe, 00000002.00000002.271653321.0000000013D6A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Electrum\wallets\
            Source: relaunch_app.exe, 00000002.00000002.271653321.0000000013D6A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\com.liberty.jaxx\
            Source: relaunch_app.exe, 00000002.00000002.271653321.0000000013D6A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
            Source: relaunch_app.exe, 00000002.00000002.271653321.0000000013D6A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Ethereum\keystore\
            Source: relaunch_app.exe, 00000002.00000002.271653321.0000000013D6A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
            Source: relaunch_app.exe, 00000002.00000002.271653321.0000000013D6A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Ethereum\keystore\
            Source: relaunch_app.exe, 00000002.00000002.271653321.0000000013D6A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
            Source: relaunch_app.exe, 00000002.00000002.271653321.0000000013D6A000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Ethereum\keystore\
            Source: C:\Users\Public\Documents\relaunch_app.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\NetworkJump to behavior
            Source: C:\Users\Public\Documents\relaunch_app.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: Yara matchFile source: 00000002.00000002.271212000.0000000013CC4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: relaunch_app.exe PID: 5140, type: MEMORYSTR
            Source: C:\Users\user\Desktop\file.exeDirectory queried: C:\Users\Public\DocumentsJump to behavior

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000002.00000002.276605637.0000000014612000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276599114.000000001460E000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.276623040.0000000014618000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: relaunch_app.exe PID: 5140, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts311
            Windows Management Instrumentation
            1
            DLL Side-Loading
            11
            Process Injection
            1
            Masquerading
            2
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            21
            Virtualization/Sandbox Evasion
            LSASS Memory311
            Security Software Discovery
            Remote Desktop Protocol41
            Data from Local System
            Exfiltration Over Bluetooth1
            Non-Standard Port
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)11
            Process Injection
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
            DLL Side-Loading
            NTDS1
            Process Discovery
            Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets12
            File and Directory Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials24
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            No Antivirus matches
            SourceDetectionScannerLabelLink
            C:\Users\Public\Documents\relaunch_app.exe100%AviraHEUR/AGEN.1216915
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            194.190.152.193
            unknownRussian Federation
            41615RSHB-ASRUtrue
            Joe Sandbox Version:36.0.0 Rainbow Opal
            Analysis ID:726254
            Start date and time:2022-10-19 18:10:11 +02:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 5m 32s
            Hypervisor based Inspection enabled:false
            Report type:full
            Sample file name:file.exe
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:14
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal92.troj.spyw.evad.winEXE@4/2@0/1
            EGA Information:
            • Successful, ratio: 50%
            HDC Information:
            • Successful, ratio: 96.4% (good quality ratio 40.9%)
            • Quality average: 33.2%
            • Quality standard deviation: 42.7%
            HCA Information:Failed
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): fs.microsoft.com
            • Execution Graph export aborted for target file.exe, PID 6124 because there are no executed function
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            18:11:05API Interceptor5x Sleep call for process: relaunch_app.exe modified
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            RSHB-ASRUEgNIXduB6T.exeGet hashmaliciousBrowse
            • 194.190.152.194
            2MNB4UhUqR.exeGet hashmaliciousBrowse
            • 194.190.152.20
            w9d568i4Ia.exeGet hashmaliciousBrowse
            • 194.190.152.128
            3pqdFTqin9.exeGet hashmaliciousBrowse
            • 194.190.152.128
            nJX6vEzSO5.exeGet hashmaliciousBrowse
            • 194.190.153.31
            X3JoqrBG6b.dllGet hashmaliciousBrowse
            • 194.190.152.209
            Hlf35fELn8.exeGet hashmaliciousBrowse
            • 194.190.152.209
            U6EbIncPHD.exeGet hashmaliciousBrowse
            • 194.190.153.41
            No context
            No context
            Process:C:\Users\user\Desktop\file.exe
            File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
            Category:modified
            Size (bytes):5681152
            Entropy (8bit):6.357945782642932
            Encrypted:false
            SSDEEP:49152:6tSHkCyvh0uhRLTxd+K7EIrbgGCpLXadU/8IrOZHZVRcfM62d7Ep4W/61jn+E0tE:65veub/x6ebgGCpLXSRZ0xsx97Du
            MD5:161D5CCDF1F7563E92D36AD1D5492CCC
            SHA1:F7A40D9EAF5FB2278C4F7D317AF52ADCB3EBBDC9
            SHA-256:1A4C9E4B1DC160BCAA56F915F07CCCC84F61111B04219A075A7091CF3808BFC1
            SHA-512:A81F40173CF1DEC0C8CE28E91F878493E6494E8A88DE13637026A7EAE4948232708033C80F26240DC52B6988575717A93A0805740FCD7E5A4A7CCD3B8084FAA1
            Malicious:true
            Antivirus:
            • Antivirus: Avira, Detection: 100%
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...,..b............... .82...V..............P2...@...........................Z.....y.V...@... .......................W.Y.....W.......X.......................X...............................W.......................W..............................text....72......82.................`.``.data........P2......<2.............@.`..rdata..xk ..@4..l ..&4.............@.`@.eh_fram......T.......T.............@.0@.bss..........T.......................`..edata..Y.....W.......T.............@.0@.idata........W.......T.............@.0..CRT..........W.......T.............@.0..tls.... .....W.......T.............@.0..rsrc.........X.......T.............@.0..reloc........X.......T.............@.0B........................................................................................................................................................................................
            Process:C:\Users\user\Desktop\file.exe
            File Type:very short file (no magic)
            Category:dropped
            Size (bytes):1
            Entropy (8bit):0.0
            Encrypted:false
            SSDEEP:3:B:B
            MD5:8277E0910D750195B448797616E091AD
            SHA1:3C363836CF4E16666669A25DA280A1865C2D2874
            SHA-256:18AC3E7343F016890C510E93F935261169D9E3F565436429830FAF0934F4F8E4
            SHA-512:48FB10B15F3D44A09DC82D02B06581E0C0C69478C9FD2CF8F9093659019A1687BAECDBB38C9E72B12169DC4148690F87467F9154F5931C5DF665C6496CBFD5F5
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:d
            File type:PE32+ executable (console) x86-64, for MS Windows
            Entropy (8bit):7.755747600848576
            TrID:
            • Win64 Executable Console (202006/5) 92.65%
            • Win64 Executable (generic) (12005/4) 5.51%
            • Generic Win/DOS Executable (2004/3) 0.92%
            • DOS Executable Generic (2002/1) 0.92%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:file.exe
            File size:5916672
            MD5:74cffc19a09979e23bfd9f5a5378508b
            SHA1:54e1969a3f4000a610aec127bf2d9028e0dc7588
            SHA256:203f591e084a2ece60b2be5c13fbafa673ecac10ef91055ad7bd73fddc656b5d
            SHA512:be1aa3e40639201f9f5eb6a476ac8a4ca8381eb92c116f4b472d661e435b2b4115337879b59caec4ee397df0adaba5011054cfb425eb9978e82bdb1dea9aaae5
            SSDEEP:98304:cdqxlydvAURQUc6QSiSbgOOzVbRRtYoa5JSY8ANYCfBeGO:cdkqAURQUc6QSgOOnA7lhBo
            TLSH:1556BE8DCB26656ADED00A340D797D95F8F0246FFC5662C923CEB1AF9C62022F55C6E0
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........t9...W...W...W..~T...W..~S...W..~R.{.W..oS...W..oT...W..oR...W..~V...W...V...W..o^...W..o....W..oU...W.Rich..W.........PE..d..
            Icon Hash:00828e8e8686b000
            Entrypoint:0x140007010
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x140000000
            Subsystem:windows cui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x634FCE01 [Wed Oct 19 10:14:25 2022 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:0721ccf5c6e6216d478ef8b62a185a8b
            Instruction
            dec eax
            sub esp, 28h
            call 00007F0D4D2D3DE0h
            dec eax
            add esp, 28h
            jmp 00007F0D4D2D35B7h
            int3
            int3
            dec eax
            sub esp, 28h
            call 00007F0D4D2D4310h
            test eax, eax
            je 00007F0D4D2D3763h
            dec eax
            mov eax, dword ptr [00000030h]
            dec eax
            mov ecx, dword ptr [eax+08h]
            jmp 00007F0D4D2D3747h
            dec eax
            cmp ecx, eax
            je 00007F0D4D2D3756h
            xor eax, eax
            dec eax
            cmpxchg dword ptr [0059C658h], ecx
            jne 00007F0D4D2D3730h
            xor al, al
            dec eax
            add esp, 28h
            ret
            mov al, 01h
            jmp 00007F0D4D2D3739h
            int3
            int3
            int3
            inc eax
            push ebx
            dec eax
            sub esp, 20h
            movzx eax, byte ptr [0059C643h]
            test ecx, ecx
            mov ebx, 00000001h
            cmove eax, ebx
            mov byte ptr [0059C633h], al
            call 00007F0D4D2D410Fh
            call 00007F0D4D2D604Eh
            test al, al
            jne 00007F0D4D2D3746h
            xor al, al
            jmp 00007F0D4D2D3756h
            call 00007F0D4D2E15C5h
            test al, al
            jne 00007F0D4D2D374Bh
            xor ecx, ecx
            call 00007F0D4D2D605Eh
            jmp 00007F0D4D2D372Ch
            mov al, bl
            dec eax
            add esp, 20h
            pop ebx
            ret
            int3
            int3
            int3
            inc eax
            push ebx
            dec eax
            sub esp, 20h
            cmp byte ptr [0059C5F8h], 00000000h
            mov ebx, ecx
            jne 00007F0D4D2D37A9h
            cmp ecx, 01h
            jnbe 00007F0D4D2D37ACh
            call 00007F0D4D2D4276h
            test eax, eax
            je 00007F0D4D2D376Ah
            test ebx, ebx
            jne 00007F0D4D2D3766h
            dec eax
            lea ecx, dword ptr [0059C5E2h]
            call 00007F0D4D2D37E2h
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x35b540x50.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a90000x0.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5a50000x22c8.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x5aa0000x924.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x325f00x38.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x324b00x140.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x250000x2b8.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x23a000x23a00False0.5471148574561403data6.451749786578579IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x250000x114a20x11600False0.4529142311151079data5.0725987080444IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x370000x56d9700x56c200unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .pdata0x5a50000x22c80x2400False0.4708116319444444data5.23134130430715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            _RDATA0x5a80000x15c0x200False0.388671875data2.789737013974924IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0x5a90000x1e00x200False0.533203125data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x5aa0000x9240xa00False0.507421875data5.265914724175377IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountry
            RT_MANIFEST0x5a90600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
            DLLImport
            KERNEL32.dllGetCurrentThreadId, GetCurrentProcessId, WriteConsoleW, SetEndOfFile, HeapSize, CreateFileW, GetProcessHeap, SetStdHandle, EncodePointer, DecodePointer, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, MultiByteToWideChar, WideCharToMultiByte, LCMapStringEx, GetStringTypeW, GetCPInfo, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwindEx, RtlPcToFileHeader, RaiseException, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapFree, CloseHandle, GetConsoleOutputCP, GetConsoleMode, GetFileSizeEx, SetFilePointerEx, HeapAlloc, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, FlushFileBuffers, ReadFile, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, RtlUnwind
            USER32.dllGetForegroundWindow, PostMessageA
            SHELL32.dllShellExecuteA
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            192.168.2.6194.190.152.19349712515682037085 10/19/22-18:11:13.648788TCP2037085ET TROJAN Win32/Unknown Stealer Command (loader) (Outbound)4971251568192.168.2.6194.190.152.193
            192.168.2.6194.190.152.19349705515682037086 10/19/22-18:11:11.925460TCP2037086ET TROJAN Win32/Unknown Stealer Command (domaindetect) (Outbound)4970551568192.168.2.6194.190.152.193
            192.168.2.6194.190.152.19349706515682037084 10/19/22-18:11:12.053781TCP2037084ET TROJAN Win32/Unknown Stealer Command (filegrab) (Outbound)4970651568192.168.2.6194.190.152.193
            194.190.152.193192.168.2.651568497062037089 10/19/22-18:11:12.115808TCP2037089ET TROJAN Win32/Unknown Stealer Command Response (filegrab) (Inbound)5156849706194.190.152.193192.168.2.6
            192.168.2.6194.190.152.19349708515682037087 10/19/22-18:11:12.367036TCP2037087ET TROJAN Win32/Unknown Stealer Command (geoblock) (Outbound)4970851568192.168.2.6194.190.152.193
            TimestampSource PortDest PortSource IPDest IP
            Oct 19, 2022 18:11:11.864528894 CEST4970551568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:11.924096107 CEST5156849705194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:11.924210072 CEST4970551568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:11.925460100 CEST4970551568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:11.925522089 CEST4970551568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:11.984785080 CEST5156849705194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:11.985114098 CEST5156849705194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:11.985136032 CEST5156849705194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:11.985203028 CEST4970551568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:11.988929987 CEST4970651568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.050807953 CEST5156849706194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:12.050991058 CEST4970651568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.053781033 CEST4970651568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.053817987 CEST4970651568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.115638018 CEST5156849706194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:12.115808010 CEST5156849706194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:12.115824938 CEST5156849706194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:12.115907907 CEST4970651568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.172266960 CEST4970751568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.229562998 CEST5156849707194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:12.229676008 CEST4970751568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.232882977 CEST4970751568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.232933044 CEST4970751568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.289764881 CEST5156849707194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:12.293674946 CEST5156849707194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:12.293690920 CEST5156849707194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:12.293821096 CEST4970751568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.303889990 CEST4970851568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.366411924 CEST5156849708194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:12.366560936 CEST4970851568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.367036104 CEST4970851568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.367106915 CEST4970851568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:12.429174900 CEST5156849708194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:12.429796934 CEST5156849708194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:12.429862022 CEST5156849708194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:12.429956913 CEST4970851568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.508861065 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.568319082 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.568495989 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.569443941 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.570205927 CEST4971251568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.646967888 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.646994114 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.647006989 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.647013903 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.647026062 CEST5156849712194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.647320986 CEST4971251568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.647357941 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.648787975 CEST4971251568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.649127960 CEST4971251568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.710519075 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.710685968 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.710817099 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.710882902 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.710962057 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.711069107 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.711132050 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.711273909 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.711389065 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.711504936 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.711520910 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.711622953 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.711879015 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.711966038 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.713484049 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.713669062 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.715138912 CEST5156849712194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.715616941 CEST5156849712194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.715759993 CEST4971251568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.772422075 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.772484064 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.772512913 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.772542953 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.772572041 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.772602081 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.772634029 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.772661924 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.772758007 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.772842884 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.772849083 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.772881985 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.772954941 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.773081064 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.773176908 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.773392916 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.773521900 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.773708105 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.773818970 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.773997068 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.774027109 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.774096966 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.774135113 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.774311066 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.774405003 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.774621010 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.774719000 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.774904013 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.775018930 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.775181055 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.775264978 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.836395025 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.836450100 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.836483955 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.836646080 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.836646080 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.836875916 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.836950064 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.837194920 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.837225914 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.837260008 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.837295055 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.837512016 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.837583065 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.837913990 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.837944984 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.838044882 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.838044882 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.838342905 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.838372946 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.838514090 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.838514090 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.838641882 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.838671923 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.838761091 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.838761091 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.839052916 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.839133978 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.839445114 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.839519978 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.839701891 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.839730978 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.839761972 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.839797020 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.839797020 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.839843035 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.840158939 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.840190887 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.840225935 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.840305090 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.840507984 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.840591908 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.840766907 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.840797901 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.840874910 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.840874910 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.841203928 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.841283083 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.841581106 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.841610909 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.841677904 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.841677904 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.841876030 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.841903925 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.841973066 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.841973066 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.842298985 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.842370033 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.842694998 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.842722893 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.842796087 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.842796087 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.843003035 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.843034029 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.843067884 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:13.843431950 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.843461037 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.843810081 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.843839884 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.843869925 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.844084978 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.844151020 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.844537973 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.899631023 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.899708986 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.899804115 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.899836063 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.899863005 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.899892092 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.899920940 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.899949074 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.899976969 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.900007010 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.900034904 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.900063038 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.900090933 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.900120020 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.900149107 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.900177002 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.900206089 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.900237083 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.900418043 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.900446892 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.900634050 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.900847912 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.901071072 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.904083014 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.904115915 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.904711008 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.904741049 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.904939890 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.905172110 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.905201912 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.905229092 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.905260086 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.905288935 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.905318975 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.905339003 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.905359030 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.905386925 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.905654907 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.905884027 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.906140089 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.906440020 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.906662941 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.906939030 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.907176018 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.907207012 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.907444954 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.907890081 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.907923937 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.907994986 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.908541918 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.908576012 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.908754110 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.908783913 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.909048080 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.909312010 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.909548998 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.909866095 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.910140038 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:13.910172939 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:28.921581030 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:28.921710968 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:28.931274891 CEST4971151568192.168.2.6194.190.152.193
            Oct 19, 2022 18:11:28.990482092 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:29.789763927 CEST5156849711194.190.152.193192.168.2.6
            Oct 19, 2022 18:11:29.791908979 CEST4971151568192.168.2.6194.190.152.193

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:18:11:01
            Start date:19/10/2022
            Path:C:\Users\user\Desktop\file.exe
            Wow64 process (32bit):false
            Commandline:C:\Users\user\Desktop\file.exe
            Imagebase:0x7ff6eb370000
            File size:5916672 bytes
            MD5 hash:74CFFC19A09979E23BFD9F5A5378508B
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low

            Target ID:1
            Start time:18:11:01
            Start date:19/10/2022
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff6da640000
            File size:625664 bytes
            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high

            Target ID:2
            Start time:18:11:03
            Start date:19/10/2022
            Path:C:\Users\Public\Documents\relaunch_app.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\Public\Documents\relaunch_app.exe"
            Imagebase:0x12a0000
            File size:5681152 bytes
            MD5 hash:161D5CCDF1F7563E92D36AD1D5492CCC
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: JoeSecurity_000Stealer, Description: Yara detected 000Stealer, Source: 00000002.00000002.276605637.0000000014612000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.271212000.0000000013CC4000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_000Stealer, Description: Yara detected 000Stealer, Source: 00000002.00000002.276599114.000000001460E000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
            • Rule: JoeSecurity_000Stealer, Description: Yara detected 000Stealer, Source: 00000002.00000002.276623040.0000000014618000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
            Antivirus matches:
            • Detection: 100%, Avira
            Reputation:low

            Reset < >

              Execution Graph

              Execution Coverage:9.7%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:10.9%
              Total number of Nodes:294
              Total number of Limit Nodes:16
              execution_graph 2062 14ebd40 2067 15c0af0 2062->2067 2064 14ebd49 2074 15c0920 2064->2074 2077 15c09d0 InterlockedExchangeAdd 2067->2077 2069 15c0af9 2070 15c0b18 EnterCriticalSection LeaveCriticalSection 2069->2070 2071 15c0b00 WaitForSingleObject 2070->2071 2072 15c0b40 EnterCriticalSection LeaveCriticalSection 2070->2072 2071->2070 2073 15c0b6a 2072->2073 2073->2064 2099 15c0c40 EnterCriticalSection LeaveCriticalSection 2074->2099 2076 14ebd96 2078 15c09ee 2077->2078 2079 15c09f8 InterlockedIncrement 2077->2079 2078->2069 2080 15c0a0c InterlockedDecrement 2079->2080 2081 15c0a50 2079->2081 2082 15c0a2f InterlockedExchangeAdd 2080->2082 2087 15c0950 CreateEventA 2081->2087 2084 15c0a4a 2082->2084 2085 15c0a20 Sleep 2082->2085 2084->2069 2085->2082 2086 15c0a55 InterlockedIncrement 2086->2069 2088 15c0996 fwrite abort 2087->2088 2089 15c0983 InitializeCriticalSection 2087->2089 2090 15c09d0 InterlockedExchangeAdd 2088->2090 2089->2086 2091 15c09ee 2090->2091 2092 15c09f8 InterlockedIncrement 2090->2092 2091->2086 2093 15c0a0c InterlockedDecrement 2092->2093 2094 15c0a50 2092->2094 2095 15c0a2f InterlockedExchangeAdd 2093->2095 2098 15c0a55 InterlockedIncrement 2094->2098 2096 15c0a4a 2095->2096 2097 15c0a20 Sleep 2095->2097 2096->2086 2097->2095 2098->2086 2099->2076 2110 14ebc60 2111 15c0af0 21 API calls 2110->2111 2112 14ebc69 2111->2112 1768 12a12f0 __set_app_type 1771 12a11a0 1768->1771 1772 12a11c9 SetUnhandledExceptionFilter 1771->1772 1773 12a11ad 1771->1773 1774 12a11dd 1772->1774 1773->1772 1787 15c0d90 1774->1787 1778 12a11ef 1779 12a11f8 __p__fmode 1778->1779 1780 12a1242 _setmode _setmode _setmode 1778->1780 1808 15c1b10 1779->1808 1780->1779 1782 12a120a 1821 15c1670 1782->1821 1784 12a1212 __p__environ 1825 12f5cd0 1784->1825 1788 12a11ea 1787->1788 1790 15c0da4 1787->1790 1791 15c1060 1788->1791 1789 15c0de2 _fpreset 1789->1788 1790->1788 1790->1789 1792 15c1088 GetCommandLineA strlen 1791->1792 1793 15c1075 1791->1793 1795 15c10ac 1792->1795 1840 12a1290 __getmainargs 1793->1840 1797 15c11cf __p__pgmptr 1795->1797 1800 15c14aa 1795->1800 1801 15c1240 _isctype 1795->1801 1805 15c118d 1795->1805 1826 15c2ca0 1795->1826 1796 15c107a 1796->1778 1797->1796 1798 15c11fa GetModuleFileNameA 1797->1798 1798->1796 1799 15c1229 __p__pgmptr _strdup 1798->1799 1799->1796 1802 15c1706 1800->1802 1841 15c1910 1800->1841 1801->1795 1802->1778 1804 15c1774 1804->1778 1805->1797 1807 15c2ca0 67 API calls 1805->1807 1807->1797 1809 15c1b19 1808->1809 1810 15c1b20 1808->1810 1809->1782 1810->1809 1811 15c1ce0 1810->1811 1812 15c1b66 1810->1812 1813 15c1c90 1810->1813 1815 15c19d0 9 API calls 1811->1815 1812->1811 1818 15c1b72 1812->1818 1817 15c1bcf 1813->1817 2042 15c1a20 VirtualQuery 1813->2042 1816 15c1cfa 1815->1816 1817->1782 1818->1817 1820 15c1a20 9 API calls 1818->1820 2021 15c19d0 fwrite vfprintf abort 1818->2021 1820->1818 1822 15c1679 1821->1822 1824 15c1610 atexit 1821->1824 1822->1784 1824->1784 1827 15c2cb6 1826->1827 1828 15c2cc6 1827->1828 1829 15c2cd3 1827->1829 1907 15c23b0 malloc 1828->1907 1854 15c2400 1829->1854 1833 15c2ce2 1834 15c2ce9 1833->1834 1835 15c2d0d strlen 1833->1835 1834->1795 1836 15c2d29 1835->1836 1837 15c2d67 _strdup 1836->1837 1837->1834 1838 15c2d83 1837->1838 1909 15c2300 1838->1909 1840->1796 1842 15c191c 1841->1842 1843 15c1930 1841->1843 1844 15c1980 1842->1844 1849 15c1921 1842->1849 1845 15c19b8 InitializeCriticalSection 1843->1845 1846 15c1939 1843->1846 1847 15c1925 1844->1847 2017 15c17a0 EnterCriticalSection 1844->2017 1845->1846 1846->1804 1847->1804 1849->1847 1852 15c17a0 4 API calls 1849->1852 1853 15c1959 1849->1853 1850 15c1963 DeleteCriticalSection 1850->1847 1851 15c198e 1851->1804 1852->1853 1853->1847 1853->1850 1855 15c2558 strlen 1854->1855 1856 15c241b strlen 1854->1856 1877 15c2573 1855->1877 1912 15c3b08 1856->1912 1861 15c23b0 malloc 1862 15c246c 1861->1862 1863 15c27f8 1862->1863 1864 15c248d strlen 1862->1864 1865 15c247b 1862->1865 1863->1833 1867 15c24a8 1864->1867 1865->1864 1866 15c2a86 1865->1866 1868 15c2400 47 API calls 1866->1868 1870 15c24df _strdup 1867->1870 1875 15c2500 1868->1875 1869 15c2400 47 API calls 1869->1877 1870->1863 1872 15c24f8 1870->1872 1871 15c2503 1871->1863 1871->1875 1876 15c2850 strlen 1871->1876 1874 15c2300 5 API calls 1872->1874 1873 15c26be 1873->1833 1874->1875 1875->1871 1875->1876 1878 15c253b 1875->1878 1905 15c2545 1876->1905 1877->1869 1877->1873 1881 15c2bf4 1878->1881 1878->1905 1879 15c2ae8 1880 15c0e90 free 1879->1880 1883 15c2af5 1880->1883 1882 15c2c10 strlen 1881->1882 1886 15c2c28 1882->1886 1883->1873 1889 15c2acb _strdup 1886->1889 1887 15c2939 strlen 1892 15c28a3 1887->1892 1888 15c28dd _errno 1888->1905 1889->1879 1891 15c2ad9 1889->1891 1891->1879 1894 15c2300 5 API calls 1891->1894 1892->1879 1892->1887 1892->1905 1941 15c33d0 1892->1941 1956 15c35d0 1892->1956 1961 15c3620 1892->1961 1894->1879 1897 15c2b04 memcpy 1897->1905 1898 15c29c5 memcpy strlen 1898->1905 1899 15c2c57 malloc 1899->1905 1900 15c2a37 _strdup 1901 15c2c86 1900->1901 1900->1905 1902 15c2b94 _stricoll 1902->1905 1903 15c2b70 strcoll 1903->1905 1904 15c2300 5 API calls 1904->1905 1905->1879 1905->1888 1905->1892 1905->1897 1905->1898 1905->1899 1905->1900 1905->1902 1905->1903 1905->1904 1906 15c2b9b malloc 1905->1906 1967 15c0e90 1905->1967 1970 15c2030 1905->1970 1977 15c2360 1905->1977 1906->1905 1908 15c23d3 1907->1908 1908->1829 1910 15c0e10 5 API calls 1909->1910 1911 15c2326 1910->1911 1911->1834 1913 15c243a memcpy 1912->1913 1914 15c2e00 setlocale 1913->1914 1915 15c2e2d setlocale 1914->1915 1916 15c2e23 _strdup 1914->1916 1917 15c2e48 1915->1917 1918 15c2e50 wcstombs 1915->1918 1916->1915 1917->1918 1919 15c2ec8 mbstowcs 1917->1919 1987 15c0e10 1918->1987 1921 15c3b08 1919->1921 1923 15c2ef7 mbstowcs 1921->1923 1922 15c2e80 wcstombs setlocale 1924 15c0e90 free 1922->1924 1925 15c2f42 1923->1925 1926 15c2f21 1923->1926 1930 15c2458 1924->1930 1927 15c2f6e 1925->1927 1931 15c2f80 1925->1931 1926->1925 1928 15c3155 setlocale 1926->1928 1927->1918 1929 15c0e90 free 1928->1929 1929->1930 1930->1861 1932 15c2fe1 wcstombs 1931->1932 1940 15c3070 wcstombs 1931->1940 1934 15c0e10 5 API calls 1932->1934 1935 15c3034 wcstombs 1934->1935 1936 15c304e setlocale 1935->1936 1937 15c0e90 free 1936->1937 1937->1930 1939 15c31c2 1939->1936 1940->1936 1940->1939 1942 15c3598 _errno 1941->1942 1943 15c33e9 1941->1943 1954 15c350d 1942->1954 1944 15c3578 _errno 1943->1944 1945 15c33f2 _fullpath 1943->1945 1944->1892 1946 15c3413 1945->1946 1948 15c3434 malloc 1945->1948 1947 15c3568 1946->1947 1946->1948 1947->1944 1950 15c35bf _errno 1948->1950 1952 15c34d8 1948->1952 1950->1954 2003 15c3220 FindFirstFileA 1952->2003 1954->1892 1955 15c0e90 free 1955->1954 1957 15c35dc 1956->1957 1958 15c3610 _errno 1956->1958 1959 15c35fe 1957->1959 2011 15c3310 FindNextFileA 1957->2011 1958->1959 1959->1892 1962 15c362c FindClose 1961->1962 1963 15c3650 _errno 1961->1963 1962->1963 1964 15c3641 1962->1964 1965 15c3649 1963->1965 1966 15c0e90 free 1964->1966 1965->1905 1966->1965 2015 15c0ec0 1967->2015 1972 15c204e 1970->1972 1971 15c20ca 1971->1905 1972->1971 1973 15c1d00 6 API calls 1972->1973 1974 15c20d0 1972->1974 1975 15c209a tolower tolower 1972->1975 1973->1972 1974->1971 1976 15c2030 6 API calls 1974->1976 1975->1972 1976->1974 1978 15c236f 1977->1978 1979 15c2374 1977->1979 1980 15c2360 6 API calls 1978->1980 1981 15c237f 1979->1981 1985 15c2300 5 API calls 1979->1985 1980->1979 1982 15c238d 1981->1982 1983 15c2360 6 API calls 1981->1983 1984 15c0e90 free 1982->1984 1983->1982 1986 15c2395 1984->1986 1985->1981 1986->1905 1988 15c0e5c realloc 1987->1988 1989 15c0e22 1987->1989 1988->1922 1989->1988 1990 15c0e58 1989->1990 1991 15c0e3a 1989->1991 1990->1988 1992 15c0e70 1991->1992 1993 15c0e40 _errno 1991->1993 1996 15c0f80 _msize 1992->1996 1993->1922 1995 15c0e80 1995->1922 1997 15c0fa8 1996->1997 1998 15c0fab realloc 1996->1998 1997->1998 1999 15c1050 1998->1999 2001 15c0fca 1998->2001 1999->1995 2000 15c101f 2000->1995 2001->2000 2002 15c100f memmove 2001->2002 2002->2000 2004 15c32b8 GetLastError _errno 2003->2004 2007 15c3244 2003->2007 2005 15c32ef _errno 2004->2005 2006 15c32cb _errno 2004->2006 2005->2007 2008 15c32fc _errno 2006->2008 2009 15c32d8 _errno 2006->2009 2007->1954 2007->1955 2008->2007 2009->2007 2010 15c32e2 _errno 2009->2010 2010->2007 2012 15c33a8 GetLastError 2011->2012 2013 15c3333 2011->2013 2012->2013 2014 15c33b2 _errno 2012->2014 2013->1959 2014->1959 2016 15c0ea7 free 2015->2016 2016->1905 2018 15c17eb LeaveCriticalSection 2017->2018 2020 15c17be 2017->2020 2018->1851 2019 15c17c0 TlsGetValue GetLastError 2019->2020 2020->2018 2020->2019 2022 15c1a20 VirtualQuery 2021->2022 2023 15c1af4 2022->2023 2024 15c1a50 2022->2024 2025 15c19d0 3 API calls 2023->2025 2026 15c1a80 VirtualProtect 2024->2026 2027 15c1a5e 2024->2027 2031 15c1b0c 2025->2031 2028 15c1aaf 2026->2028 2027->1818 2027->2027 2028->2027 2030 15c1ac9 VirtualProtect 2028->2030 2029 15c1b19 2029->1818 2030->1818 2031->2029 2032 15c1ce0 2031->2032 2033 15c1b66 2031->2033 2034 15c1c90 2031->2034 2036 15c19d0 3 API calls 2032->2036 2033->2032 2039 15c1b72 2033->2039 2035 15c1a20 3 API calls 2034->2035 2038 15c1bcf 2034->2038 2035->2034 2037 15c1cfa 2036->2037 2038->1818 2039->2038 2040 15c1a20 VirtualQuery VirtualProtect VirtualProtect 2039->2040 2041 15c19d0 3 API calls 2039->2041 2040->2039 2041->2039 2043 15c1af4 2042->2043 2044 15c1a50 2042->2044 2046 15c19d0 6 API calls 2043->2046 2045 15c1a5e 2044->2045 2047 15c1a80 VirtualProtect 2044->2047 2045->1813 2052 15c1b0c 2046->2052 2048 15c1aaf 2047->2048 2048->2045 2050 15c1ac9 VirtualProtect 2048->2050 2049 15c1b19 2049->1813 2050->1813 2051 15c1c90 2055 15c1a20 6 API calls 2051->2055 2058 15c1bcf 2051->2058 2052->2049 2052->2051 2053 15c1ce0 2052->2053 2054 15c1b66 2052->2054 2056 15c19d0 6 API calls 2053->2056 2054->2053 2060 15c1b72 2054->2060 2055->2051 2057 15c1cfa 2056->2057 2058->1813 2059 15c19d0 6 API calls 2059->2060 2060->2058 2060->2059 2061 15c1a20 6 API calls 2060->2061 2061->2060 2133 14ebcb0 2134 15c0af0 21 API calls 2133->2134 2135 14ebcb9 2134->2135 2136 15c0920 2 API calls 2135->2136 2137 14ebced 2136->2137

              Callgraph

              • Executed
              • Not Executed
              • Opacity -> Relevance
              • Disassembly available
              callgraph 0 Function_01447940 7 Function_012F5130 0->7 13 Function_012F3D00 0->13 69 Function_012F51B0 0->69 88 Function_012A91E0 0->88 1 Function_01445B40 1->13 20 Function_012F2710 1->20 41 Function_012A8F40 1->41 98 Function_01445FA0 1->98 2 Function_01458740 2->13 54 Function_014456C0 2->54 3 Function_015C0950 3->3 4 Function_014EBD40 51 Function_015C0920 4->51 73 Function_015C0AF0 4->73 5 Function_01458850 5->13 85 Function_01445A80 5->85 6 Function_015C0C40 8 Function_012F5230 9 Function_01445960 9->13 46 Function_01444B30 9->46 9->88 10 Function_012A3F00 10->13 11 Function_015C1670 12 Function_014EBC60 12->73 45 Function_012F4F40 13->45 53 Function_012D3350 13->53 74 Function_012D3380 13->74 14 Function_01445770 14->13 14->46 14->88 15 Function_01448E70 15->0 15->13 22 Function_01394170 15->22 15->69 72 Function_012A9580 15->72 83 Function_01448A80 15->83 16 Function_015C1060 26 Function_015C1910 16->26 30 Function_015C3B08 16->30 80 Function_012A1290 16->80 102 Function_015C2CA0 16->102 17 Function_015C2260 18 Function_015C2360 18->18 36 Function_015C2300 18->36 89 Function_015C0E90 18->89 19 Function_012E5210 23 Function_012A2F60 19->23 20->13 20->19 20->69 82 Function_012F5A90 20->82 93 Function_012E4BE0 20->93 21 Function_012F586A 22->7 22->13 96 Function_012AB5F0 22->96 24 Function_012CD460 104 Function_012CE2D0 24->104 25 Function_015C1B10 52 Function_015C1A20 25->52 61 Function_015C19D0 25->61 103 Function_015C17A0 26->103 27 Function_015C0E10 67 Function_015C0EC0 27->67 97 Function_015C0F80 27->97 28 Function_015C3310 29 Function_014EBD00 29->51 29->73 31 Function_01445D10 31->13 31->20 38 Function_012F584C 31->38 31->41 79 Function_012F5396 31->79 31->98 32 Function_01445C10 32->13 32->20 32->41 32->98 33 Function_012F5874 34 Function_015C2400 34->17 34->18 34->30 34->34 35 Function_015C2E00 34->35 34->36 42 Function_015C2030 34->42 50 Function_015C3620 34->50 62 Function_015C35D0 34->62 63 Function_015C33D0 34->63 34->89 99 Function_015C23B0 34->99 35->27 35->30 35->89 36->27 37 Function_015C1D00 39 Function_01448B20 39->13 39->88 40 Function_01458920 40->13 40->32 41->7 41->13 41->96 42->37 42->42 43 Function_014EBE20 43->51 43->73 44 Function_012E5040 44->13 44->69 44->82 44->93 46->10 46->13 46->88 47 Function_01449430 47->0 47->13 47->22 65 Function_013993A0 47->65 47->72 47->83 48 Function_01449630 48->13 48->22 48->65 48->69 48->72 48->83 49 Function_015C3220 50->89 51->6 52->52 52->61 101 Function_012EA0C0 53->101 54->8 54->13 54->14 54->15 54->41 54->98 55 Function_014493C0 55->13 55->88 56 Function_014459C0 56->13 56->41 56->44 56->98 57 Function_014587C0 57->13 70 Function_014458E0 57->70 58 Function_014588C0 58->1 58->13 59 Function_012A11A0 59->11 59->16 59->25 68 Function_015C14C0 59->68 90 Function_015C0D90 59->90 106 Function_012F5CD0 59->106 60 Function_015C09D0 60->3 61->52 61->61 62->28 63->49 63->89 64 Function_014457D0 64->8 64->13 64->41 64->47 84 Function_01445880 64->84 64->98 65->13 65->38 65->79 65->96 66 Function_012A23B0 70->9 70->13 70->41 70->48 70->98 71 Function_01445AE0 71->13 71->41 71->98 72->7 72->13 72->96 73->60 74->101 75 Function_014EBDE0 75->51 75->73 76 Function_014EBEE0 76->51 76->73 77 Function_014587F0 77->13 77->56 78 Function_012F5399 81 Function_012FD790 81->13 83->13 83->39 84->13 84->46 84->88 85->13 85->41 85->98 86 Function_01458780 86->13 86->64 87 Function_01458980 87->13 87->31 88->13 89->67 91 Function_0181A34C 92 Function_014EBE80 92->51 92->73 93->13 94 Function_01458890 94->13 94->71 95 Function_012A12F0 95->59 96->13 98->13 98->81 100 Function_014EBDA0 100->51 100->73 102->30 102->34 102->36 102->99 105 Function_014EBCB0 105->51 105->73 107 Function_012F51D0

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 204 15c1060-15c1073 205 15c1088-15c10e5 GetCommandLineA strlen call 15c3b08 204->205 206 15c1075 call 12a1290 204->206 211 15c11cf-15c11f4 __p__pgmptr 205->211 212 15c10eb-15c1107 205->212 209 15c107a-15c1081 206->209 211->209 214 15c11fa-15c1223 GetModuleFileNameA 211->214 213 15c1108-15c110b 212->213 215 15c13f8-15c13fb 213->215 216 15c1111-15c1114 213->216 214->209 217 15c1229-15c123a __p__pgmptr _strdup 214->217 218 15c111a-15c111f 215->218 220 15c1401-15c1407 215->220 216->218 219 15c1300-15c1306 216->219 217->209 222 15c1495 218->222 223 15c1125 218->223 219->218 221 15c130c-15c130f 219->221 220->218 224 15c140d-15c1410 220->224 221->218 225 15c1428-15c1432 221->225 226 15c1316 221->226 227 15c1417-15c141e 221->227 228 15c16e0-15c16f0 221->228 229 15c13b4-15c13b8 221->229 230 15c1360-15c1367 221->230 241 15c149c 222->241 231 15c1128-15c1131 223->231 224->218 224->225 224->226 224->227 224->228 237 15c1438-15c143f 225->237 238 15c1319-15c1330 225->238 226->238 234 15c1470-15c1476 227->234 235 15c1420-15c1423 227->235 232 15c16fc-15c16ff 228->232 233 15c16f2 228->233 239 15c13be 229->239 240 15c14a3-15c14a5 229->240 230->218 236 15c136d-15c1371 230->236 231->231 242 15c1133-15c113b 231->242 243 15c1718-15c1729 232->243 244 15c1701-15c1704 232->244 233->232 245 15c126f-15c1284 234->245 235->245 246 15c14aa 236->246 247 15c1377-15c1379 236->247 248 15c1445-15c1447 237->248 249 15c1336-15c133a 237->249 238->241 238->249 250 15c13c0-15c13c9 239->250 251 15c13cb-15c13d2 240->251 241->240 252 15c1268-15c126d 242->252 253 15c1141-15c1149 242->253 258 15c1706-15c1710 243->258 260 15c172b-15c172d 243->260 257 15c1758-15c177e call 15c1910 244->257 244->258 245->213 256 15c128a-15c128c 245->256 246->228 259 15c1380-15c1389 247->259 261 15c1355-15c135b 248->261 264 15c1340-15c1349 249->264 250->250 250->251 262 15c13d4-15c13d7 251->262 263 15c1450-15c1462 251->263 252->245 254 15c114f-15c115a 253->254 255 15c1240-15c1252 _isctype 253->255 265 15c1258-15c125b 254->265 266 15c1160-15c1166 254->266 255->265 255->266 267 15c118d-15c118f 256->267 268 15c1292-15c1294 256->268 259->259 269 15c138b-15c1392 259->269 270 15c1730-15c1739 260->270 261->252 262->263 272 15c13d9-15c13ee 262->272 263->245 264->264 273 15c134b-15c134f 264->273 265->266 283 15c1261 265->283 274 15c116c-15c1174 266->274 275 15c12b0-15c12db call 15c2ca0 266->275 277 15c1190-15c1196 267->277 276 15c1298-15c12a1 268->276 278 15c139d-15c13af 269->278 279 15c1394-15c1397 269->279 280 15c173d-15c1742 270->280 281 15c173b 270->281 272->245 273->252 273->261 274->275 284 15c117a-15c1188 274->284 291 15c12e0-15c12f4 275->291 276->276 285 15c12a3 276->285 287 15c1198-15c11a0 277->287 288 15c11a2-15c11ca call 15c2ca0 277->288 278->245 279->278 289 15c147b-15c1490 279->289 280->270 290 15c1744-15c174e 280->290 281->280 283->252 284->245 285->277 287->211 287->288 288->211 289->245 291->245
              APIs
              • GetCommandLineA.KERNEL32 ref: 015C1088
              • strlen.MSVCRT ref: 015C1098
              • __p__pgmptr.MSVCRT ref: 015C11EB
                • Part of subcall function 012A1290: __getmainargs.MSVCRT ref: 012A12C6
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: CommandLine__getmainargs__p__pgmptrstrlen
              • String ID: !$'$?$@$Z
              • API String ID: 3494280972-2658495842
              • Opcode ID: 67e5f645aeadc346e2a51c22f9cb4f6444ff0e2d06ec26dee0f54a551f41fb45
              • Instruction ID: e40c65b68f571c264071f6859322d9504a32dc90799ccacaab35554a97246c2a
              • Opcode Fuzzy Hash: 67e5f645aeadc346e2a51c22f9cb4f6444ff0e2d06ec26dee0f54a551f41fb45
              • Instruction Fuzzy Hash: 7FC1F471909B15CFEB25CFA8C8C43ADBBF2BB95B04F08849DC9499F242D7759A84CB41
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 375 15c3220-15c3242 FindFirstFileA 376 15c32b8-15c32c9 GetLastError _errno 375->376 377 15c3244-15c3257 375->377 380 15c32ef-15c32fa _errno 376->380 381 15c32cb-15c32d6 _errno 376->381 378 15c3259-15c325b 377->378 379 15c3280-15c3289 377->379 383 15c3264-15c327e 378->383 384 15c328b 379->384 385 15c32a0-15c32b1 379->385 382 15c328e-15c3298 380->382 386 15c32fc-15c3307 _errno 381->386 387 15c32d8-15c32e0 _errno 381->387 383->379 388 15c3260 383->388 384->382 386->382 387->382 389 15c32e2-15c32ed _errno 387->389 388->383 389->382
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: _errno$ErrorFileFindFirstLast
              • String ID:
              • API String ID: 2068755524-0
              • Opcode ID: 2b4d6b96931fe336321f1537b9da566222c3a9c81ec1364903381bc2186636e1
              • Instruction ID: 90a93951cc75e147e2098198f80a26dc914d8827aeea35664dadb3ee7217e7b2
              • Opcode Fuzzy Hash: 2b4d6b96931fe336321f1537b9da566222c3a9c81ec1364903381bc2186636e1
              • Instruction Fuzzy Hash: F121A4714182568EDF91AFF8A8802AABAF1BF52B04F08C9ADD8548F251D3748448C772
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              C-Code - Quality: 36%
              			E012A11A0() {
              				int _v20;
              				intOrPtr _v24;
              				char _v28;
              				intOrPtr* _t11;
              				intOrPtr _t14;
              				int _t17;
              				int _t19;
              				int _t21;
              				intOrPtr* _t23;
              				int _t25;
              				int _t26;
              				intOrPtr _t28;
              				void* _t30;
              				int _t31;
              				void* _t32;
              				signed int _t34;
              
              				_t33 =  &_v24;
              				_t11 =  *0x17ea438; // 0x15c16e0
              				if(_t11 != 0) {
              					_v20 = 0;
              					_v24 = 2;
              					_v28 = 0;
              					 *_t11();
              					_t33 =  &_v24 - 0xc;
              				}
              				_v28 = 0x12a1000; // executed
              				SetUnhandledExceptionFilter(??); // executed
              				_t34 = _t33 - 4;
              				E015C14C0(_t30);
              				_t14 =  *0x15e39a8; // 0xfffffffd
              				 *_t34 = _t14;
              				E015C0D90(); // executed
              				E015C1060(_t32);
              				_t17 =  *0x181a354; // 0x0
              				if(_t17 != 0) {
              					L4:
              					_t28 = __imp___iob;
              					 *(_t34 + 4) = _t17;
              					 *0x15e39ac = _t17;
              					_v20 =  *((intOrPtr*)(_t28 + 0x10));
              					L015C4550();
              					_t19 =  *0x181a354; // 0x0
              					 *(_t34 + 4) = _t19;
              					_v20 =  *((intOrPtr*)(_t28 + 0x30));
              					L015C4550();
              					_t21 =  *0x181a354; // 0x0
              					 *(_t34 + 4) = _t21;
              					_t17 =  *(_t28 + 0x50);
              					_v20 = _t17;
              					L015C4550();
              					goto L3;
              				} else {
              					L3:
              					L015C45A0();
              					_t31 =  *0x15e39ac; // 0x4000
              					 *_t17 = _t31;
              					E015C1B10();
              					_t34 = _t34 & 0xfffffff0;
              					_t23 = E015C1670();
              					L015C45A8();
              					 *((intOrPtr*)(_t34 + 8)) =  *_t23;
              					_t25 =  *0x17ec000; // 0x1a02788
              					 *(_t34 + 4) = _t25;
              					_t26 =  *0x17ec004; // 0x1
              					_v20 = _t26;
              					_t17 = E012F5CD0(_t30, _t31);
              					L015C4580();
              					ExitProcess(_t17);
              					goto L4;
              				}
              			}



















              0x012a11a1
              0x012a11a4
              0x012a11ab
              0x012a11ad
              0x012a11b5
              0x012a11bd
              0x012a11c4
              0x012a11c6
              0x012a11c6
              0x012a11c9
              0x012a11d0
              0x012a11d5
              0x012a11d8
              0x012a11dd
              0x012a11e2
              0x012a11e5
              0x012a11ea
              0x012a11ef
              0x012a11f6
              0x012a1242
              0x012a1242
              0x012a1248
              0x012a124c
              0x012a1254
              0x012a1257
              0x012a125c
              0x012a1261
              0x012a1268
              0x012a126b
              0x012a1270
              0x012a1275
              0x012a1279
              0x012a127c
              0x012a127f
              0x00000000
              0x012a11f8
              0x012a11f8
              0x012a11f8
              0x012a11fd
              0x012a1203
              0x012a1205
              0x012a120a
              0x012a120d
              0x012a1212
              0x012a1219
              0x012a121d
              0x012a1222
              0x012a1226
              0x012a122b
              0x012a122e
              0x012a1235
              0x012a123d
              0x00000000
              0x012a123d

              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: _setmode$ExceptionExitFilterProcessUnhandled__p__environ__p__fmode_cexit
              • String ID:
              • API String ID: 3476844589-0
              • Opcode ID: 3e5dac09f5b50b0ac3f9866629e2fb1f3129703288269af091153168edcb1242
              • Instruction ID: 02e4d2517e458d02b301291259597a9baa8a8a5dbbc762526158324a6bf47e39
              • Opcode Fuzzy Hash: 3e5dac09f5b50b0ac3f9866629e2fb1f3129703288269af091153168edcb1242
              • Instruction Fuzzy Hash: 6921C3B4A157028FC754FFB8D584A2A7BF4BBA8A50F01892DD895CF309E738D8449F52
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 30%
              			E015C2400(signed int __eax, signed int __ecx, signed int __edx, signed int _a4) {
              				void* _v16;
              				void _v32;
              				signed int _v36;
              				char _v44;
              				signed int _v48;
              				signed int _v52;
              				signed int _v56;
              				signed int _v60;
              				signed int _v64;
              				signed int _v68;
              				signed int* _v72;
              				signed char* _v76;
              				int _v80;
              				signed int _v84;
              				signed int* _v88;
              				signed int _v92;
              				intOrPtr _v96;
              				intOrPtr _v100;
              				signed char _v101;
              				signed int _v108;
              				char _v112;
              				intOrPtr _v116;
              				int _v120;
              				void* _t211;
              				signed int _t212;
              				signed int* _t213;
              				signed int _t221;
              				signed int _t223;
              				signed int _t230;
              				signed int _t232;
              				int _t234;
              				signed int _t235;
              				signed int _t236;
              				signed int _t239;
              				intOrPtr* _t242;
              				signed int _t245;
              				void* _t250;
              				intOrPtr _t263;
              				signed int _t266;
              				void* _t273;
              				char* _t274;
              				signed int _t275;
              				intOrPtr _t276;
              				void* _t280;
              				void* _t281;
              				int _t284;
              				void* _t285;
              				signed int _t288;
              				char* _t292;
              				signed int _t294;
              				signed int _t300;
              				signed int* _t309;
              				signed int _t310;
              				signed int _t311;
              				signed int _t314;
              				signed int _t315;
              				signed int _t316;
              				signed int* _t317;
              				signed char* _t319;
              				signed int* _t320;
              				signed int _t321;
              				signed int* _t322;
              				signed int _t323;
              				signed int _t324;
              				signed char* _t326;
              				intOrPtr _t327;
              				signed int _t332;
              				signed char* _t334;
              				signed int _t335;
              				signed char* _t336;
              				signed int _t338;
              				signed char* _t339;
              				signed int* _t340;
              				signed char* _t344;
              				signed char* _t346;
              				signed int _t348;
              				signed int _t349;
              				signed int _t352;
              				char* _t354;
              				signed int _t355;
              				signed int _t356;
              				intOrPtr _t360;
              				signed int _t366;
              				signed int _t367;
              				signed int _t368;
              				signed int _t369;
              				signed int _t370;
              				signed int* _t371;
              				signed int _t372;
              				signed int _t373;
              				signed int _t374;
              				char* _t375;
              				signed int _t376;
              				signed int _t377;
              				int _t379;
              				signed int _t380;
              				intOrPtr* _t381;
              				signed int _t384;
              				signed char* _t385;
              				signed char* _t386;
              				signed char* _t387;
              				signed char* _t388;
              				signed char* _t389;
              				void* _t390;
              				int _t392;
              				signed char* _t393;
              				intOrPtr _t394;
              				void _t395;
              				char* _t396;
              				signed char* _t397;
              				signed int _t399;
              				signed int* _t400;
              				signed int _t401;
              				signed int* _t402;
              				intOrPtr* _t404;
              				intOrPtr* _t406;
              				intOrPtr* _t407;
              				intOrPtr* _t408;
              				intOrPtr* _t409;
              
              				_v64 = __eax;
              				_v52 = __edx;
              				_v60 = __ecx;
              				if((__edx & 0x00000004) != 0) {
              					_v76 = _t400;
              					_t387 = __eax;
              					 *_t400 = __eax;
              					_t211 = E015C3B08(strlen(??) + 0x10 >> 4 << 4);
              					_t315 =  *_t387 & 0x000000ff;
              					_t401 = _t400 - _t211;
              					__eflags = _t401;
              					_t371 =  &_v112;
              					_v72 = _t371;
              					while(1) {
              						_t37 =  &(_t387[1]); // -1
              						_t326 = _t37;
              						__eflags = _t315 - 0x7f;
              						if(_t315 == 0x7f) {
              							goto L22;
              						}
              						L19:
              						__eflags = _t316 - 0x7b;
              						if(_t316 == 0x7b) {
              							_t315 = _t387[1] & 0x000000ff;
              							_t344 = _t387;
              							_v68 = _t387;
              							_v48 = _t326;
              							_t47 =  &(_t344[1]); // -1
              							_t397 = _t47;
              							_t338 = 1;
              							_t212 = _t315;
              							_v56 = 0x2c;
              							__eflags = _t212 - 0x7b;
              							if(__eflags == 0) {
              								L34:
              								_t212 = _t344[2] & 0x000000ff;
              								_t338 = _t338 + 1;
              								_t344 = _t397;
              								L33:
              								_t50 =  &(_t344[1]); // 0x1
              								_t397 = _t50;
              								__eflags = _t212 - 0x7b;
              								if(__eflags == 0) {
              									goto L34;
              								}
              							} else {
              							}
              							if(__eflags > 0) {
              								__eflags = _t212 - 0x7d;
              								if(_t212 != 0x7d) {
              									__eflags = _t212 - 0x7f;
              									if(_t212 != 0x7f) {
              										goto L31;
              									} else {
              										_t212 = _t344[2] & 0x000000ff;
              										__eflags = _t212;
              										if(_t212 == 0) {
              											goto L32;
              										} else {
              											_t75 =  &(_t344[2]); // 0x1
              											_t212 = _t344[3] & 0x000000ff;
              											_t344 = _t75;
              										}
              									}
              									goto L33;
              								} else {
              									_t338 = _t338 - 1;
              									__eflags = _t338;
              									if(_t338 != 0) {
              										goto L31;
              									} else {
              										__eflags = _v56 - 0x7b;
              										_t399 = _v68;
              										_t339 = _v48;
              										if(_v56 != 0x7b) {
              											goto L59;
              										} else {
              											_v48 = _t371;
              											_t372 = _v52;
              											while(1) {
              												L39:
              												_t309 = _v48;
              												_t366 = 1;
              												__eflags = _t315 - 0x7f;
              												if(_t315 == 0x7f) {
              													goto L56;
              												}
              												L41:
              												_t399 = _t399 + 1;
              												__eflags = _t399;
              												_t340 = _t309;
              												L42:
              												__eflags = _t315 - 0x7d;
              												if(_t315 == 0x7d) {
              													_t366 = _t366 - 1;
              													__eflags = _t366;
              													if(_t366 == 0) {
              														_t310 = _t399;
              														goto L74;
              													} else {
              														 *_t340 = 0x7d;
              														_t309 =  &(_t340[0]);
              														goto L55;
              													}
              													goto L159;
              												} else {
              													__eflags = _t315 - 0x2c;
              													if(_t315 != 0x2c) {
              														L60:
              														_t309 =  &(_t340[0]);
              														__eflags = _t315 - 0x7b;
              														if(_t315 != 0x7b) {
              															 *_t340 = _t315;
              															__eflags = _t315;
              															if(_t315 != 0) {
              																goto L55;
              															} else {
              																goto L68;
              															}
              														} else {
              															 *_t340 = 0x7b;
              															_t366 = _t366 + 1;
              															L55:
              															_t315 =  *(_t399 + 1) & 0x000000ff;
              															__eflags = _t315 - 0x7f;
              															if(_t315 != 0x7f) {
              																goto L41;
              															} else {
              																goto L56;
              															}
              														}
              														goto L159;
              													} else {
              														__eflags = _t366 - 1;
              														if(_t366 != 1) {
              															goto L60;
              														} else {
              															_t369 = _t399;
              															_t324 = 1;
              															while(1) {
              																_t310 = _t369 + 1;
              																_t370 =  *(_t369 + 1) & 0x000000ff;
              																__eflags = _t370 - 0x7f;
              																if(_t370 == 0x7f) {
              																	goto L49;
              																}
              																L47:
              																L69:
              																__eflags = _t370 - 0x7b;
              																if(_t370 == 0x7b) {
              																	_t324 = _t324 + 1;
              																	_t369 = _t310;
              																	_t310 = _t369 + 1;
              																	_t370 =  *(_t369 + 1) & 0x000000ff;
              																	__eflags = _t370 - 0x7f;
              																	if(_t370 == 0x7f) {
              																		goto L49;
              																	}
              																	goto L51;
              																} else {
              																	__eflags = _t370 - 0x7d;
              																	if(_t370 == 0x7d) {
              																		_t324 = _t324 - 1;
              																		__eflags = _t324;
              																		if(_t324 == 0) {
              																			L74:
              																			_t311 = _t310 + 1;
              																			__eflags = _t311;
              																			do {
              																				_t367 =  *_t311 & 0x000000ff;
              																				_t340 =  &(_t340[0]);
              																				_t311 = _t311 + 1;
              																				 *(_t340 - 1) = _t367;
              																				__eflags = _t367;
              																			} while (_t367 != 0);
              																			_t368 = _t372;
              																			_t372 = _t372 | 0x00000001;
              																			 *_t401 = _a4;
              																			_t314 = E015C2400(_v72, _v60, _t368);
              																			__eflags = _t314 - 1;
              																			if(_t314 == 1) {
              																				L68:
              																				_v48 = 1;
              																				goto L51;
              																			} else {
              																				__eflags =  *_t399 - 0x2c;
              																				if( *_t399 != 0x2c) {
              																					_v48 = _t314;
              																					goto L51;
              																				} else {
              																					_t315 =  *(_t399 + 1) & 0x000000ff;
              																					goto L39;
              																				}
              																			}
              																		} else {
              																			_t369 = _t310;
              																			while(1) {
              																				_t310 = _t369 + 1;
              																				_t370 =  *(_t369 + 1) & 0x000000ff;
              																				__eflags = _t370 - 0x7f;
              																				if(_t370 == 0x7f) {
              																					goto L49;
              																				}
              																				goto L47;
              																			}
              																		}
              																	} else {
              																		__eflags = _t370;
              																		if(_t370 == 0) {
              																			L50:
              																			 *_t340 = 0;
              																			_v48 = 1;
              																			goto L51;
              																		} else {
              																			_t369 = _t310;
              																			while(1) {
              																				_t310 = _t369 + 1;
              																				_t370 =  *(_t369 + 1) & 0x000000ff;
              																				__eflags = _t370 - 0x7f;
              																				if(_t370 == 0x7f) {
              																					goto L49;
              																				}
              																				goto L47;
              																				while(1) {
              																					L49:
              																					__eflags =  *(_t310 + 1);
              																					if( *(_t310 + 1) == 0) {
              																						goto L50;
              																					}
              																					_t370 =  *(_t310 + 2) & 0x000000ff;
              																					_t310 = _t310 + 2;
              																					__eflags = _t370 - 0x7f;
              																					if(_t370 != 0x7f) {
              																						goto L69;
              																					} else {
              																						continue;
              																					}
              																					goto L51;
              																				}
              																				goto L50;
              																			}
              																		}
              																	}
              																}
              																goto L159;
              															}
              														}
              													}
              												}
              												L51:
              												goto L52;
              												L56:
              												_t323 =  *(_t399 + 2) & 0x000000ff;
              												 *_t309 = 0x7f;
              												_t340 =  &(_t309[0]);
              												_t309[0] = _t323;
              												__eflags = _t323;
              												if(_t323 == 0) {
              													_t309[0] = 0;
              													goto L68;
              												} else {
              													_t315 =  *(_t399 + 3) & 0x000000ff;
              													_t399 = _t399 + 3;
              													goto L42;
              												}
              												goto L159;
              											}
              										}
              									}
              								}
              							} else {
              								__eflags = _t212;
              								if(_t212 == 0) {
              									_t339 = _v48;
              									L59:
              									 *_t371 = 0x7b;
              									_t387 = _t339;
              									_t371 =  &(_t371[0]);
              									while(1) {
              										_t37 =  &(_t387[1]); // -1
              										_t326 = _t37;
              										__eflags = _t315 - 0x7f;
              										if(_t315 == 0x7f) {
              											goto L22;
              										}
              										goto L19;
              									}
              								} else {
              									__eflags = _t212 - 0x2c;
              									if(_t212 != 0x2c) {
              										L31:
              										_t212 = _t344[2] & 0x000000ff;
              										L32:
              										_t344 = _t397;
              									} else {
              										__eflags = _t338 - 1;
              										if(_t338 == 1) {
              											_t212 = _t344[2] & 0x000000ff;
              											_v56 = 0x7b;
              											_t344 = _t397;
              										} else {
              											goto L31;
              										}
              									}
              									goto L33;
              								}
              							}
              						} else {
              							L20:
              							 *_t371 = _t316;
              							_t213 =  &(_t371[0]);
              							__eflags = _t316;
              							if(_t316 == 0) {
              								_t400 = _v76;
              								goto L1;
              							} else {
              								_t316 = _t387[1] & 0x000000ff;
              								_t387 = _t326;
              								_t371 = _t213;
              								_t40 =  &(_t387[1]); // 0x2
              								_t326 = _t40;
              								__eflags = _t316 - 0x7f;
              								if(_t316 != 0x7f) {
              									goto L19;
              								} else {
              									goto L22;
              								}
              							}
              						}
              						goto L159;
              						L22:
              						_t316 = _t387[1] & 0x000000ff;
              						 *_t371 = 0x7f;
              						__eflags = _t316;
              						if(_t316 != 0) {
              							_t371[0] = _t316;
              							_t387 =  &(_t387[2]);
              							_t315 =  *_t387 & 0x000000ff;
              							_t371 =  &(_t371[0]);
              							continue;
              						} else {
              							_t42 =  &(_t387[2]); // 0x2
              							_t371 =  &(_t371[0]);
              							_t387 = _t326;
              							_t326 = _t42;
              							goto L20;
              						}
              						goto L159;
              					}
              				} else {
              					L1:
              					_t373 = _v64;
              					_v72 = _t400;
              					 *_t400 = _t373;
              					_t6 = strlen(??) + 1; // 0x1
              					_t402 = _t400 - E015C3B08(_t214 + 0x10 >> 4 << 4);
              					_v116 = _t6;
              					_v120 = _t373;
              					 *_t402 =  &_v112;
              					 *_t402 = memcpy(??, ??, ??); // executed
              					_t221 = E015C2E00(_t220); // executed
              					_v32 = 0;
              					_v68 = _t221;
              					_t374 = _t221;
              					_t223 = E015C23B0( &_v44);
              					_v48 = _t223;
              					if(_t223 != 0) {
              						L79:
              						return _v48;
              					} else {
              						if(_t374 == 0 || E015C2260(_t374, _v52) == 0) {
              							_t388 = _v68;
              							_t317 = _t402;
              							 *_t402 = _t388;
              							_t404 = _t402 - E015C3B08(strlen(??) + 0x10 >> 4 << 4);
              							_t346 = _t388;
              							_t375 =  &_v112;
              							_t327 = _t375;
              							while(1) {
              								L6:
              								_t230 =  *_t346 & 0x000000ff;
              								_t389 =  &(_t346[1]);
              								if(_t230 == 0x7f) {
              									break;
              								}
              								_t327 = _t327 + 1;
              								_t346 = _t389;
              								 *(_t327 - 1) = _t230;
              								__eflags = _t230;
              								if(_t230 != 0) {
              									continue;
              								}
              								L8:
              								 *_t404 = _t375;
              								L015C4488();
              								_v48 = 1;
              								_t402 = _t317;
              								if(_t230 == 0) {
              									goto L79;
              								} else {
              									_v48 = E015C2300(_t230,  &_v44);
              									goto L10;
              								}
              								goto L159;
              							}
              							_t230 = _t346[1] & 0x000000ff;
              							_t327 = _t327 + 1;
              							_t346 =  &(_t346[2]);
              							 *(_t327 - 1) = _t230;
              							if(_t230 != 0) {
              								goto L6;
              							}
              							goto L8;
              						} else {
              							 *_t402 =  &_v44;
              							_v48 = E015C2400(_v68, _v60, _v52 | 0x00000080);
              							L10:
              							if(_v48 != 0) {
              								goto L79;
              							} else {
              								_t232 =  *(_v64 + 1) & 0x000000ff;
              								if(_t232 == 0x2f || _t232 == 0x5c) {
              									L85:
              									 *_t402 = _v68;
              									_t234 = strlen(??);
              									_t376 = _v64;
              									_t348 = _v64;
              									_t319 = _t376 + _t234;
              									_t235 =  *_t319 & 0x000000ff;
              									__eflags = _t376 - _t319;
              									if(_t376 >= _t319) {
              										L90:
              										__eflags = _t235 - 0x2f;
              										if(_t235 == 0x2f) {
              											goto L93;
              										} else {
              											__eflags = _t235 - 0x5c;
              											if(_t235 == 0x5c) {
              												goto L93;
              											} else {
              												_v101 = 0x5c;
              											}
              										}
              									} else {
              										while(1) {
              											__eflags = _t235 - 0x2f;
              											if(_t235 == 0x2f) {
              												goto L93;
              											}
              											__eflags = _t235 - 0x5c;
              											if(_t235 == 0x5c) {
              												goto L90;
              											} else {
              												_t319 = _t319 - 1;
              												_t235 =  *_t319 & 0x000000ff;
              												__eflags = _t348 - _t319;
              												if(_t348 != _t319) {
              													continue;
              												} else {
              													goto L90;
              												}
              											}
              											goto L96;
              										}
              										do {
              											do {
              												L93:
              												_t319 =  &(_t319[1]);
              												_t349 = _t235;
              												_t235 =  *_t319 & 0x000000ff;
              												__eflags = _t235 - 0x2f;
              											} while (_t235 == 0x2f);
              											__eflags = _t235 - 0x5c;
              										} while (_t235 == 0x5c);
              										_v101 = _t349;
              									}
              									goto L96;
              								} else {
              									_t292 = _v68;
              									if( *_t292 != 0x2e ||  *((char*)(_t292 + 1)) != 0) {
              										goto L85;
              									} else {
              										if((_v52 & 0x00000010) != 0) {
              											_t385 = _v64;
              											_t294 = E015C2260(_t385, _v52);
              											_v48 = _t294;
              											__eflags = _t294;
              											if(_t294 == 0) {
              												 *_t402 = _t385;
              												_t322 = _t402;
              												_t409 = _t402 - E015C3B08(strlen(??) + 0x10 >> 4 << 4);
              												_t336 = _t385;
              												_t396 =  &_v112;
              												_t360 = _t396;
              												do {
              													_t300 =  *_t336 & 0x000000ff;
              													_t199 =  &(_t336[1]); // 0x1
              													_t386 = _t199;
              													__eflags = _t300 - 0x7f;
              													if(_t300 != 0x7f) {
              														_t336 = _t386;
              													} else {
              														_t300 = _t336[1] & 0x000000ff;
              														_t336 =  &(_t336[2]);
              													}
              													_t360 = _t360 + 1;
              													 *(_t360 - 1) = _t300;
              													__eflags = _t300;
              												} while (_t300 != 0);
              												 *_t409 = _t396;
              												L015C4488();
              												_t402 = _t322;
              												__eflags = _t300;
              												if(_t300 == 0) {
              													goto L130;
              												} else {
              													__eflags = _a4;
              													if(_a4 == 0) {
              														goto L130;
              													} else {
              														E015C2300(_t300, _a4);
              														_t377 = _v36;
              													}
              												}
              											} else {
              												_t319 = _v64;
              												goto L16;
              											}
              										} else {
              											L16:
              											_v101 = 0x5c;
              											_v68 = 0;
              											L96:
              											_t377 = _v36;
              											_v48 = 2;
              											_t236 =  *_t377;
              											if(_t236 != 0) {
              												_v76 = _t319;
              												_t320 = _t377;
              												_v64 = _v52 & 0x00008000;
              												do {
              													if(_v48 == 1) {
              														L102:
              														_v48 = 1;
              													} else {
              														 *_t402 = _t236;
              														_t242 = E015C33D0();
              														_v56 = _t242;
              														if(_t242 == 0) {
              															__eflags = _v52 & 0x00000004;
              															if((_v52 & 0x00000004) != 0) {
              																goto L102;
              															} else {
              																_t380 = _v60;
              																__eflags = _t380;
              																if(_t380 != 0) {
              																	L015C4570();
              																	_v120 =  *_t242;
              																	 *_t402 =  *_t320;
              																	_t245 =  *_t380();
              																	__eflags = _t245;
              																	if(_t245 != 0) {
              																		goto L102;
              																	}
              																}
              															}
              														} else {
              															_v80 = 0;
              															if(_v68 != 0) {
              																 *_t402 =  *_t320;
              																_v80 = strlen(??);
              															}
              															_v84 = 0;
              															_v100 = _v80 + 2;
              															while(1) {
              																L109:
              																 *_t402 = _v56;
              																_t250 = E015C35D0();
              																_t390 = _t250;
              																if(_t250 == 0) {
              																	break;
              																}
              																if(_v64 == 0 ||  *((intOrPtr*)(_t390 + 8)) == 0x10) {
              																	_t118 = _t390 + 0xc; // 0xc
              																	_t379 = _t118;
              																	if(E015C2030(_v76, _v52, _t379) != 0) {
              																		continue;
              																	} else {
              																		_t332 =  *(_t390 + 6) & 0x0000ffff;
              																		_v88 = _t402;
              																		_t406 = _t402 - E015C3B08(_t332 + _v100 + 0xf >> 4 << 4);
              																		_t352 =  &_v112;
              																		_v92 = _t352;
              																		_t263 = _t352;
              																		if(_v80 != 0) {
              																			_t392 = _v80;
              																			_v108 = _t332;
              																			 *_t406 = _t352;
              																			_v116 = _t392;
              																			_v120 =  *_t320;
              																			_v96 = _t352;
              																			memcpy(??, ??, ??);
              																			_t266 =  *(_t406 + _t392 + 0xb) & 0x000000ff;
              																			_t352 = _v96;
              																			_t332 = _v108;
              																			__eflags = _t266 - 0x2f;
              																			if(_t266 == 0x2f) {
              																				L147:
              																				_t263 = _v80 + _t352;
              																				goto L114;
              																			} else {
              																				__eflags = _t266 - 0x5c;
              																				if(_t266 == 0x5c) {
              																					goto L147;
              																				} else {
              																					_t395 = _v80;
              																					 *((char*)(_t352 + _t395)) = _v101 & 0x000000ff;
              																					_t263 = _t352 + _t395 + 1;
              																					goto L114;
              																				}
              																			}
              																			goto L129;
              																		}
              																		L114:
              																		_v96 = _t352;
              																		_v116 = _t332 + 1;
              																		_v120 = _t379;
              																		_t381 = _t406;
              																		 *_t406 = _t263;
              																		memcpy(??, ??, ??);
              																		 *_t406 = _v96;
              																		_t273 = E015C3B08(strlen(??) + 0x10 >> 4 << 4);
              																		_t393 = _v92;
              																		_t407 = _t406 - _t273;
              																		_t274 =  &_v112;
              																		_v96 = _t274;
              																		_t354 = _t274;
              																		while(1) {
              																			L116:
              																			_t275 =  *_t393 & 0x000000ff;
              																			_t334 =  &(_t393[1]);
              																			if(_t275 == 0x7f) {
              																				break;
              																			}
              																			_t354 = _t354 + 1;
              																			_t393 = _t334;
              																			 *(_t354 - 1) = _t275;
              																			__eflags = _t275;
              																			if(_t275 != 0) {
              																				continue;
              																			}
              																			L118:
              																			_t276 = _v96;
              																			 *_t407 = _t276;
              																			L015C4488();
              																			_t408 = _t381;
              																			_t394 = _t276;
              																			if(_t276 == 0) {
              																				_v48 = 3;
              																			} else {
              																				_v48 = _v48 & (0 | _v48 == 0x00000002) - 0x00000001;
              																				if((_v52 & 0x00000040) == 0) {
              																					_t384 = _v84;
              																					__eflags = _t384;
              																					if(_t384 == 0) {
              																						 *_t408 = 0xc;
              																						_t280 = malloc(??);
              																						_v84 = _t280;
              																						__eflags = _t280;
              																						if(_t280 != 0) {
              																							_t281 = _v84;
              																							 *((intOrPtr*)(_t281 + 8)) = _t394;
              																							 *(_t281 + 4) = 0;
              																							 *_t281 = 0;
              																						}
              																					} else {
              																						_v92 = _t320;
              																						_t321 = _v52 & 0x00004000;
              																						while(1) {
              																							_t284 =  *(_t384 + 8);
              																							 *_t408 = _t394;
              																							_v120 = _t284;
              																							__eflags = _t321;
              																							if(_t321 != 0) {
              																								_t284 = strcoll();
              																							} else {
              																								L015C4480();
              																							}
              																							_t335 =  *_t384;
              																							_t355 =  *(_t384 + 4);
              																							__eflags = _t284;
              																							if(_t284 <= 0) {
              																								_t355 = _t335;
              																							}
              																							__eflags = _t355;
              																							if(_t355 == 0) {
              																								break;
              																							}
              																							_t384 = _t355;
              																						}
              																						_t320 = _v92;
              																						_v92 = _t284;
              																						 *_t408 = 0xc;
              																						_t285 = malloc(??);
              																						_t356 = _v92;
              																						__eflags = _t285;
              																						if(_t285 != 0) {
              																							 *((intOrPtr*)(_t285 + 8)) = _t394;
              																							 *(_t285 + 4) = 0;
              																							 *_t285 = 0;
              																							__eflags = _t356;
              																							if(_t356 <= 0) {
              																								 *_t384 = _t285;
              																							} else {
              																								 *(_t384 + 4) = _t285;
              																							}
              																						}
              																					}
              																				} else {
              																					if(_a4 != 0) {
              																						E015C2300(_t394, _a4);
              																					}
              																				}
              																			}
              																			_t402 = _v88;
              																			goto L109;
              																		}
              																		_t288 = _t393[1] & 0x000000ff;
              																		_t354 = _t354 + 1;
              																		_t393 =  &(_t393[2]);
              																		 *(_t354 - 1) = _t288;
              																		if(_t288 != 0) {
              																			goto L116;
              																		}
              																		goto L118;
              																	}
              																} else {
              																	continue;
              																}
              																goto L129;
              															}
              															 *_t402 = _v56;
              															E015C3620();
              															__eflags = _v84;
              															if(_v84 != 0) {
              																E015C2360(_v84, _a4);
              															}
              														}
              													}
              													goto L103;
              													L103:
              													_t239 =  *_t320;
              													_t320 =  &(_t320[1]);
              													 *_t402 = _t239;
              													E015C0E90();
              													_t236 =  *_t320;
              													__eflags = _t236;
              												} while (_t236 != 0);
              												L130:
              												_t377 = _v36;
              											}
              										}
              									}
              								}
              								L129:
              								 *_t402 = _t377;
              								E015C0E90();
              								L52:
              								return _v48;
              							}
              						}
              					}
              				}
              				L159:
              			}


























































































































              0x015c2409
              0x015c240c
              0x015c240f
              0x015c2415
              0x015c2558
              0x015c255b
              0x015c255d
              0x015c256e
              0x015c2573
              0x015c2576
              0x015c2576
              0x015c2578
              0x015c257c
              0x015c257f
              0x015c257f
              0x015c257f
              0x015c2582
              0x015c2585
              0x00000000
              0x00000000
              0x015c2587
              0x015c2587
              0x015c258a
              0x015c25d0
              0x015c25d4
              0x015c25d6
              0x015c25d9
              0x015c25dc
              0x015c25dc
              0x015c25df
              0x015c25e4
              0x015c25e6
              0x015c25ed
              0x015c25ef
              0x015c261c
              0x015c261c
              0x015c2620
              0x015c2623
              0x015c2615
              0x015c2615
              0x015c2615
              0x015c2618
              0x015c261a
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c25f8
              0x015c2630
              0x015c2632
              0x015c2750
              0x015c2752
              0x00000000
              0x015c2758
              0x015c2758
              0x015c275c
              0x015c275e
              0x00000000
              0x015c2764
              0x015c2764
              0x015c2767
              0x015c276b
              0x015c276b
              0x015c275e
              0x00000000
              0x015c2638
              0x015c2638
              0x015c2638
              0x015c263b
              0x00000000
              0x015c263d
              0x015c263d
              0x015c2641
              0x015c2644
              0x015c2647
              0x00000000
              0x015c264d
              0x015c264d
              0x015c2650
              0x015c2653
              0x015c2653
              0x015c2653
              0x015c2656
              0x015c265b
              0x015c265e
              0x00000000
              0x00000000
              0x015c2668
              0x015c2668
              0x015c2668
              0x015c266b
              0x015c266d
              0x015c266d
              0x015c2670
              0x015c26e0
              0x015c26e0
              0x015c26e3
              0x015c27b0
              0x00000000
              0x015c26e9
              0x015c26e9
              0x015c26ec
              0x00000000
              0x015c26ec
              0x00000000
              0x015c2672
              0x015c2672
              0x015c2675
              0x015c2730
              0x015c2730
              0x015c2733
              0x015c2736
              0x015c2740
              0x015c2742
              0x015c2744
              0x00000000
              0x015c2746
              0x00000000
              0x015c2746
              0x015c2738
              0x015c2738
              0x015c273b
              0x015c26ef
              0x015c26ef
              0x015c26f3
              0x015c26f6
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c26f6
              0x00000000
              0x015c267b
              0x015c267b
              0x015c267e
              0x00000000
              0x015c2684
              0x015c2684
              0x015c2686
              0x015c2690
              0x015c2690
              0x015c2693
              0x015c2697
              0x015c269a
              0x00000000
              0x00000000
              0x015c269c
              0x015c2790
              0x015c2790
              0x015c2793
              0x015c2810
              0x015c2813
              0x015c2690
              0x015c2693
              0x015c2697
              0x015c269a
              0x00000000
              0x00000000
              0x00000000
              0x015c2795
              0x015c2795
              0x015c2798
              0x015c2840
              0x015c2840
              0x015c2843
              0x015c27b2
              0x015c27b2
              0x015c27b2
              0x015c27b8
              0x015c27b8
              0x015c27bb
              0x015c27be
              0x015c27c1
              0x015c27c4
              0x015c27c4
              0x015c27cb
              0x015c27cd
              0x015c27d0
              0x015c27d9
              0x015c27de
              0x015c27e1
              0x015c277c
              0x015c277c
              0x00000000
              0x015c27e3
              0x015c27e3
              0x015c27e6
              0x015c2a7e
              0x00000000
              0x015c27ec
              0x015c27ec
              0x00000000
              0x015c27ec
              0x015c27e6
              0x015c2849
              0x015c2849
              0x015c2690
              0x015c2690
              0x015c2693
              0x015c2697
              0x015c269a
              0x00000000
              0x00000000
              0x00000000
              0x015c269a
              0x015c2690
              0x015c279e
              0x015c279e
              0x015c27a0
              0x015c26be
              0x015c26be
              0x015c26c1
              0x00000000
              0x015c27a6
              0x015c27a6
              0x015c2690
              0x015c2690
              0x015c2693
              0x015c2697
              0x015c269a
              0x00000000
              0x00000000
              0x00000000
              0x015c26b8
              0x015c26b8
              0x015c26b8
              0x015c26bc
              0x00000000
              0x00000000
              0x015c26a8
              0x015c26ac
              0x015c26af
              0x015c26b2
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c26b2
              0x00000000
              0x015c26b8
              0x015c2690
              0x015c27a0
              0x015c2798
              0x00000000
              0x015c2793
              0x015c2690
              0x015c267e
              0x015c2675
              0x015c26c8
              0x00000000
              0x015c26fc
              0x015c26fc
              0x015c2700
              0x015c2703
              0x015c2706
              0x015c2709
              0x015c270b
              0x015c2778
              0x00000000
              0x015c270d
              0x015c270d
              0x015c2711
              0x00000000
              0x015c2711
              0x00000000
              0x015c270b
              0x015c2653
              0x015c2647
              0x015c263b
              0x015c25fa
              0x015c25fa
              0x015c25fc
              0x015c2720
              0x015c2723
              0x015c2723
              0x015c2726
              0x015c2728
              0x015c257f
              0x015c257f
              0x015c257f
              0x015c2582
              0x015c2585
              0x00000000
              0x00000000
              0x00000000
              0x015c2585
              0x015c2602
              0x015c2602
              0x015c2604
              0x015c260f
              0x015c260f
              0x015c2613
              0x015c2613
              0x015c2606
              0x015c2606
              0x015c2609
              0x015c2820
              0x015c2824
              0x015c282b
              0x00000000
              0x00000000
              0x00000000
              0x015c2609
              0x00000000
              0x015c2604
              0x015c25fc
              0x015c258c
              0x015c258c
              0x015c258c
              0x015c258e
              0x015c2591
              0x015c2593
              0x015c2832
              0x00000000
              0x015c2599
              0x015c2599
              0x015c259d
              0x015c259f
              0x015c25a1
              0x015c25a1
              0x015c25a4
              0x015c25a7
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c25a7
              0x015c2593
              0x00000000
              0x015c25a9
              0x015c25a9
              0x015c25ad
              0x015c25b0
              0x015c25b2
              0x015c25c0
              0x015c25c3
              0x015c25c6
              0x015c25c9
              0x00000000
              0x015c25b4
              0x015c25b4
              0x015c25b7
              0x015c25ba
              0x015c25bc
              0x00000000
              0x015c25bc
              0x00000000
              0x015c25b2
              0x015c241b
              0x015c241b
              0x015c241b
              0x015c241e
              0x015c2421
              0x015c2429
              0x015c243a
              0x015c2440
              0x015c2444
              0x015c2448
              0x015c2450
              0x015c2453
              0x015c2458
              0x015c245f
              0x015c2462
              0x015c2467
              0x015c246c
              0x015c2471
              0x015c27f8
              0x015c2805
              0x015c2477
              0x015c2479
              0x015c248d
              0x015c2490
              0x015c2492
              0x015c24a8
              0x015c24aa
              0x015c24ac
              0x015c24b0
              0x015c24c4
              0x015c24c4
              0x015c24c4
              0x015c24c7
              0x015c24cc
              0x00000000
              0x00000000
              0x015c24b8
              0x015c24bb
              0x015c24bd
              0x015c24c0
              0x015c24c2
              0x00000000
              0x00000000
              0x015c24df
              0x015c24df
              0x015c24e2
              0x015c24e7
              0x015c24ee
              0x015c24f2
              0x00000000
              0x015c24f8
              0x015c2500
              0x00000000
              0x015c2500
              0x00000000
              0x015c24f2
              0x015c24ce
              0x015c24d2
              0x015c24d5
              0x015c24d8
              0x015c24dd
              0x00000000
              0x00000000
              0x00000000
              0x015c2a86
              0x015c2a8c
              0x015c2a9d
              0x015c2503
              0x015c2508
              0x00000000
              0x015c250e
              0x015c2511
              0x015c2517
              0x015c2850
              0x015c2853
              0x015c2856
              0x015c285b
              0x015c285e
              0x015c2861
              0x015c2864
              0x015c2867
              0x015c2869
              0x015c2882
              0x015c2882
              0x015c2884
              0x00000000
              0x015c2886
              0x015c2886
              0x015c2888
              0x00000000
              0x015c288a
              0x015c288a
              0x015c288a
              0x015c2888
              0x015c2870
              0x015c2870
              0x015c2870
              0x015c2872
              0x00000000
              0x00000000
              0x015c2874
              0x015c2876
              0x00000000
              0x015c2878
              0x015c2878
              0x015c287b
              0x015c287e
              0x015c2880
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c2880
              0x00000000
              0x015c2876
              0x015c2890
              0x015c2890
              0x015c2890
              0x015c2890
              0x015c2893
              0x015c2895
              0x015c2898
              0x015c2898
              0x015c289c
              0x015c289c
              0x015c28a0
              0x015c28a0
              0x00000000
              0x015c2525
              0x015c2525
              0x015c252b
              0x00000000
              0x015c253b
              0x015c253f
              0x015c2bf4
              0x015c2bfc
              0x015c2c01
              0x015c2c04
              0x015c2c06
              0x015c2c10
              0x015c2c13
              0x015c2c28
              0x015c2c2a
              0x015c2c2c
              0x015c2c30
              0x015c2c44
              0x015c2c44
              0x015c2c47
              0x015c2c47
              0x015c2c4a
              0x015c2c4c
              0x015c2c34
              0x015c2c4e
              0x015c2c4e
              0x015c2c52
              0x015c2c52
              0x015c2c36
              0x015c2c39
              0x015c2c3c
              0x015c2c3c
              0x015c2acb
              0x015c2ace
              0x015c2ad3
              0x015c2ad5
              0x015c2ad7
              0x00000000
              0x015c2ad9
              0x015c2adc
              0x015c2ade
              0x00000000
              0x015c2ae0
              0x015c2ae3
              0x015c2aeb
              0x015c2aeb
              0x015c2ade
              0x015c2c08
              0x015c2c08
              0x00000000
              0x015c2c08
              0x015c2545
              0x015c2545
              0x015c2545
              0x015c2549
              0x015c28a3
              0x015c28a3
              0x015c28a6
              0x015c28ad
              0x015c28b1
              0x015c28ba
              0x015c28bd
              0x015c28c5
              0x015c2916
              0x015c291a
              0x015c28f8
              0x015c28f8
              0x015c291c
              0x015c291c
              0x015c291f
              0x015c2924
              0x015c2929
              0x015c28d0
              0x015c28d4
              0x00000000
              0x015c28d6
              0x015c28d6
              0x015c28d9
              0x015c28db
              0x015c28dd
              0x015c28e4
              0x015c28ea
              0x015c28ed
              0x015c28ef
              0x015c28f1
              0x00000000
              0x00000000
              0x015c28f1
              0x015c28db
              0x015c292b
              0x015c292e
              0x015c2937
              0x015c293b
              0x015c2943
              0x015c2943
              0x015c2949
              0x015c2953
              0x015c2960
              0x015c2960
              0x015c2963
              0x015c2966
              0x015c296b
              0x015c296f
              0x00000000
              0x00000000
              0x015c297a
              0x015c2982
              0x015c2982
              0x015c2994
              0x00000000
              0x015c2996
              0x015c2996
              0x015c299d
              0x015c29b2
              0x015c29b4
              0x015c29b8
              0x015c29bb
              0x015c29bf
              0x015c2b04
              0x015c2b09
              0x015c2b0c
              0x015c2b0f
              0x015c2b13
              0x015c2b17
              0x015c2b1a
              0x015c2b1f
              0x015c2b24
              0x015c2b27
              0x015c2b2a
              0x015c2b2c
              0x015c2be3
              0x015c2be6
              0x00000000
              0x015c2b32
              0x015c2b32
              0x015c2b34
              0x00000000
              0x015c2b3a
              0x015c2b3a
              0x015c2b41
              0x015c2b44
              0x00000000
              0x015c2b44
              0x015c2b34
              0x00000000
              0x015c2b2c
              0x015c29c5
              0x015c29c8
              0x015c29cb
              0x015c29cf
              0x015c29d3
              0x015c29d5
              0x015c29d8
              0x015c29e0
              0x015c29f1
              0x015c29f6
              0x015c29f9
              0x015c29fb
              0x015c29ff
              0x015c2a02
              0x015c2a1c
              0x015c2a1c
              0x015c2a1c
              0x015c2a1f
              0x015c2a24
              0x00000000
              0x00000000
              0x015c2a10
              0x015c2a13
              0x015c2a15
              0x015c2a18
              0x015c2a1a
              0x00000000
              0x00000000
              0x015c2a37
              0x015c2a37
              0x015c2a3a
              0x015c2a3d
              0x015c2a42
              0x015c2a44
              0x015c2a48
              0x015c2c86
              0x015c2a4e
              0x015c2a5e
              0x015c2a65
              0x015c2b4d
              0x015c2b50
              0x015c2b52
              0x015c2c57
              0x015c2c5e
              0x015c2c63
              0x015c2c66
              0x015c2c68
              0x015c2c6e
              0x015c2c71
              0x015c2c74
              0x015c2c7b
              0x015c2c7b
              0x015c2b58
              0x015c2b5b
              0x015c2b63
              0x015c2b86
              0x015c2b86
              0x015c2b89
              0x015c2b8c
              0x015c2b90
              0x015c2b92
              0x015c2b70
              0x015c2b94
              0x015c2b94
              0x015c2b94
              0x015c2b75
              0x015c2b77
              0x015c2b7a
              0x015c2b7c
              0x015c2b7e
              0x015c2b7e
              0x015c2b80
              0x015c2b82
              0x00000000
              0x00000000
              0x015c2b84
              0x015c2b84
              0x015c2b9b
              0x015c2b9e
              0x015c2ba1
              0x015c2ba8
              0x015c2bad
              0x015c2bb0
              0x015c2bb2
              0x015c2bb8
              0x015c2bbb
              0x015c2bc2
              0x015c2bc8
              0x015c2bca
              0x015c2bed
              0x015c2bcc
              0x015c2bcc
              0x015c2bcc
              0x015c2bca
              0x015c2bb2
              0x015c2a6b
              0x015c2a70
              0x015c2bd9
              0x015c2bd9
              0x015c2a70
              0x015c2a65
              0x015c2a76
              0x00000000
              0x015c2a76
              0x015c2a26
              0x015c2a2a
              0x015c2a2d
              0x015c2a30
              0x015c2a35
              0x00000000
              0x00000000
              0x00000000
              0x015c2a35
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c297a
              0x015c2aa8
              0x015c2aab
              0x015c2ab3
              0x015c2ab5
              0x015c2ac1
              0x015c2ac1
              0x015c2ab5
              0x015c2929
              0x00000000
              0x015c28ff
              0x015c28ff
              0x015c2901
              0x015c2904
              0x015c2907
              0x015c290c
              0x015c290e
              0x015c290e
              0x015c2afd
              0x015c2b00
              0x015c2b00
              0x015c28b1
              0x015c253f
              0x015c252b
              0x015c2aed
              0x015c2aed
              0x015c2af0
              0x015c26cb
              0x015c26d5
              0x015c26d5
              0x015c2508
              0x015c2479
              0x015c2471
              0x00000000

              APIs
              • strlen.MSVCRT ref: 015C2424
              • memcpy.MSVCRT ref: 015C244B
                • Part of subcall function 015C2E00: setlocale.MSVCRT ref: 015C2E18
                • Part of subcall function 015C2E00: _strdup.MSVCRT ref: 015C2E26
                • Part of subcall function 015C2E00: setlocale.MSVCRT ref: 015C2E3C
                • Part of subcall function 015C2E00: wcstombs.MSVCRT ref: 015C2E67
                • Part of subcall function 015C2E00: wcstombs.MSVCRT ref: 015C2E94
                • Part of subcall function 015C2E00: setlocale.MSVCRT ref: 015C2EA4
                • Part of subcall function 015C23B0: malloc.MSVCRT ref: 015C23C7
              • strlen.MSVCRT ref: 015C2495
              • _strdup.MSVCRT ref: 015C24E2
              • strlen.MSVCRT ref: 015C2560
              • strlen.MSVCRT ref: 015C293E
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: strlen$setlocale$_strdupwcstombs$mallocmemcpy
              • String ID: @$\${
              • API String ID: 3109254050-3793226235
              • Opcode ID: d51c2c5b3cd0578262d98dfa8f37cd55a0399e2909b2872257c9b3cc00fe9548
              • Instruction ID: e2e48d9cb08b67cad76a1e7b3602beba3961b88886df9967b1886411f1878a14
              • Opcode Fuzzy Hash: d51c2c5b3cd0578262d98dfa8f37cd55a0399e2909b2872257c9b3cc00fe9548
              • Instruction Fuzzy Hash: 5C329B70D0835A8FDB219FECC4802AEBBF2BF55A04F08855DD895AF305DB75A846CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 293 15c2e00-15c2e21 setlocale 294 15c2e2d-15c2e46 setlocale 293->294 295 15c2e23-15c2e2b _strdup 293->295 296 15c2e48-15c2e4e 294->296 297 15c2e50-15c2eb1 wcstombs call 15c0e10 wcstombs setlocale call 15c0e90 294->297 295->294 296->297 298 15c2ec8-15c2f1f mbstowcs call 15c3b08 mbstowcs 296->298 310 15c2eb7-15c2ec0 297->310 304 15c2f60-15c2f64 298->304 305 15c2f21-15c2f32 298->305 309 15c2f67-15c2f6c 304->309 307 15c2f38-15c2f3c 305->307 308 15c3140-15c3144 305->308 307->308 311 15c2f42-15c2f46 307->311 308->309 312 15c314a-15c314f 308->312 313 15c2f6e-15c2f71 309->313 314 15c2f80-15c2f89 309->314 311->309 315 15c2f48-15c2f56 311->315 312->309 316 15c3155-15c3170 setlocale call 15c0e90 312->316 313->297 317 15c2fa4-15c2fa8 314->317 315->309 328 15c3066-15c3069 316->328 319 15c2faa-15c2fb1 317->319 320 15c2f90-15c2f96 317->320 324 15c2fc4-15c2fc8 319->324 325 15c2fb3-15c2fb7 319->325 322 15c2f98-15c2fa2 320->322 323 15c2fbb-15c2fc2 320->323 322->317 329 15c2fd8-15c2fdb 322->329 323->324 326 15c2fb8 323->326 324->326 327 15c2fca-15c2fcf 324->327 325->326 326->323 327->329 330 15c2fd1-15c2fd3 327->330 328->310 331 15c3070-15c3078 329->331 332 15c2fe1-15c2fe9 329->332 330->322 333 15c307e-15c3085 331->333 334 15c31cb 331->334 335 15c2ffc-15c3049 wcstombs call 15c0e10 wcstombs 332->335 336 15c2feb-15c2fef 332->336 333->331 337 15c3087-15c308b 333->337 338 15c308d-15c309c 334->338 339 15c31d1-15c31d9 334->339 351 15c304e-15c3061 setlocale call 15c0e90 335->351 336->335 340 15c2ff1-15c2ff9 336->340 337->331 337->338 342 15c309e-15c30a2 338->342 343 15c30b0-15c30bb 338->343 344 15c31db-15c31df 339->344 345 15c31e5-15c31ed 339->345 340->335 347 15c30a8-15c30af 342->347 348 15c3175-15c3179 342->348 343->343 350 15c30bd-15c30c1 343->350 344->338 344->345 345->338 349 15c31f3-15c31fb 345->349 347->343 354 15c317f-15c3182 348->354 355 15c30d0 348->355 349->338 352 15c3201-15c3205 349->352 350->343 353 15c30c3-15c30ca 350->353 351->328 352->338 357 15c320b-15c320d 352->357 353->348 353->355 358 15c30d2-15c30d5 354->358 355->358 357->338 359 15c319b-15c31bc wcstombs 358->359 360 15c30db-15c30e0 358->360 359->351 361 15c31c2-15c31c6 359->361 362 15c3106-15c3111 360->362 361->351 363 15c30e8-15c30f3 362->363 364 15c3113 362->364 366 15c30f9-15c30fb 363->366 367 15c3190-15c3192 363->367 365 15c3116-15c311a 364->365 368 15c311c-15c3122 365->368 369 15c3128-15c3133 365->369 370 15c30fd-15c3100 366->370 367->365 368->370 371 15c3124 368->371 369->369 372 15c3135-15c3139 369->372 370->362 373 15c3198 370->373 371->369 372->369 374 15c313b 372->374 373->359 374->370
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: setlocale$wcstombs$_strdup
              • String ID:
              • API String ID: 3699089627-0
              • Opcode ID: 9f9a9d0b1fbc410e12a63aeacee5c929512c64c8e26cfb24a535873c617a5707
              • Instruction ID: 8cc1b408c3cf7dcd32c1040a95b39714c681db09cf489d80739bff9aa44049c2
              • Opcode Fuzzy Hash: 9f9a9d0b1fbc410e12a63aeacee5c929512c64c8e26cfb24a535873c617a5707
              • Instruction Fuzzy Hash: 37A1937590421B8EDB24AFA9C0456BEFBF1FF84B44F44C42DE5989F254E7358981CB82
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 408 15c2ca0-15c2cb4 409 15c2cbe-15c2cc4 408->409 410 15c2cb6-15c2cbc 408->410 412 15c2cc6-15c2ccd call 15c23b0 409->412 413 15c2cd3-15c2cdd call 15c2400 409->413 410->409 411 15c2cf8-15c2cff 410->411 411->409 412->413 417 15c2ce2-15c2ce7 413->417 418 15c2d08-15c2d0b 417->418 419 15c2ce9-15c2cf2 417->419 418->419 420 15c2d0d-15c2d37 strlen call 15c3b08 418->420 423 15c2d4c-15c2d54 420->423 424 15c2d56-15c2d65 423->424 425 15c2d40-15c2d4a 423->425 424->423 426 15c2d67-15c2d7d _strdup 424->426 425->423 425->426 426->419 427 15c2d83-15c2d90 call 15c2300 426->427 427->419
              C-Code - Quality: 62%
              			E015C2CA0(signed char* _a4, signed int _a8, signed int _a12, char** _a16) {
              				void* _v16;
              				signed char** _v32;
              				intOrPtr _v36;
              				signed char** _v40;
              				char _v56;
              				signed char** _t25;
              				void* _t31;
              				char* _t32;
              				signed int _t33;
              				intOrPtr _t34;
              				signed int _t36;
              				signed char* _t39;
              				signed char** _t41;
              				signed char** _t42;
              				char* _t44;
              				signed int _t46;
              				signed char* _t48;
              				char** _t49;
              				signed char** _t50;
              				intOrPtr* _t51;
              
              				_t49 = _a16;
              				_t39 = _a4;
              				_t46 = _a8;
              				if(_t49 != 0 && (_t46 & 0x00000002) == 0) {
              					_t49[3] = 0;
              				}
              				if( *_t49 != "glob-1.0-mingw32") {
              					E015C23B0(_t49);
              					 *_t49 = "glob-1.0-mingw32";
              				}
              				 *_t50 = _t49;
              				_t25 = E015C2400(_t39, _a12, _t46); // executed
              				_t41 = _t25;
              				if(_t25 == 2) {
              					if((_t46 & 0x00000010) == 0) {
              						goto L5;
              					}
              					_v40 = _t25;
              					_v32 = _t50;
              					 *_t50 = _t39;
              					_t31 = E015C3B08(strlen(??) + 0x10 >> 4 << 4);
              					_t42 = _v40;
              					_t51 = _t50 - _t31;
              					_t32 =  &_v56;
              					_v36 = _t32;
              					_t44 = _t32;
              					while(1) {
              						L10:
              						_t33 =  *_t39 & 0x000000ff;
              						_t15 =  &(_t39[1]); // 0x2
              						_t48 = _t15;
              						if(_t33 == 0x7f) {
              							break;
              						}
              						_t44 = _t44 + 1;
              						_t39 = _t48;
              						 *(_t44 - 1) = _t33;
              						if(_t33 == 0) {
              							L12:
              							_t34 = _v36;
              							_v40 = _t42;
              							 *_t51 = _t34;
              							L015C4488();
              							_t41 = _v40;
              							if(_t34 != 0) {
              								_v32 = _t41;
              								E015C2300(_t34, _t49);
              								_t41 = _v32;
              							}
              							goto L5;
              						}
              					}
              					_t36 = _t39[1] & 0x000000ff;
              					_t44 = _t44 + 1;
              					_t39 =  &(_t39[2]);
              					 *(_t44 - 1) = _t36;
              					if(_t36 != 0) {
              						goto L10;
              					}
              					goto L12;
              				} else {
              					L5:
              					return _t41;
              				}
              			}























              0x015c2ca9
              0x015c2cac
              0x015c2caf
              0x015c2cb4
              0x015c2cf8
              0x015c2cf8
              0x015c2cc4
              0x015c2cc8
              0x015c2ccd
              0x015c2ccd
              0x015c2cd3
              0x015c2cdd
              0x015c2ce2
              0x015c2ce7
              0x015c2d0b
              0x00000000
              0x00000000
              0x015c2d0d
              0x015c2d10
              0x015c2d13
              0x015c2d24
              0x015c2d29
              0x015c2d2c
              0x015c2d2e
              0x015c2d32
              0x015c2d35
              0x015c2d4c
              0x015c2d4c
              0x015c2d4c
              0x015c2d4f
              0x015c2d4f
              0x015c2d54
              0x00000000
              0x00000000
              0x015c2d40
              0x015c2d43
              0x015c2d45
              0x015c2d4a
              0x015c2d67
              0x015c2d67
              0x015c2d6a
              0x015c2d6d
              0x015c2d70
              0x015c2d78
              0x015c2d7d
              0x015c2d85
              0x015c2d88
              0x015c2d8d
              0x015c2d8d
              0x00000000
              0x015c2d7d
              0x015c2d4a
              0x015c2d56
              0x015c2d5a
              0x015c2d5d
              0x015c2d60
              0x015c2d65
              0x00000000
              0x00000000
              0x00000000
              0x015c2ce9
              0x015c2ce9
              0x015c2cf2
              0x015c2cf2

              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID:
              • String ID: glob-1.0-mingw32
              • API String ID: 0-3253302226
              • Opcode ID: a682a2783aeaf364a005ad04594ef2ca60e46db2ee51a3791ac45c2f0373bc59
              • Instruction ID: 8696f2386f4b27c610158d34b6c209b3dd7a7a2ea04591d29578d4c0820146f6
              • Opcode Fuzzy Hash: a682a2783aeaf364a005ad04594ef2ca60e46db2ee51a3791ac45c2f0373bc59
              • Instruction Fuzzy Hash: 26219C71A0430A9FDB14DFE9D4846AEFBF1FF99A00F04446ED841AF301DA35A902CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 430 15c3310-15c3331 FindNextFileA 431 15c33a8-15c33b0 GetLastError 430->431 432 15c3333-15c3346 430->432 433 15c337e-15c3388 431->433 434 15c33b2-15c33c7 _errno 431->434 435 15c3348-15c334a 432->435 436 15c3370-15c3379 432->436 437 15c3354-15c336e 435->437 438 15c337b 436->438 439 15c3390-15c33a1 436->439 437->436 440 15c3350 437->440 438->433 440->437
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: ErrorFileFindLastNext_errno
              • String ID:
              • API String ID: 2804278807-0
              • Opcode ID: 4cd31363d1541cb8eed625711bfb5ab2a100034e0dea179537f40a6dc5d4f255
              • Instruction ID: feb6cf778e5ef836112c3db507802702504ef784924b263d9ef9af131ea1b3c9
              • Opcode Fuzzy Hash: 4cd31363d1541cb8eed625711bfb5ab2a100034e0dea179537f40a6dc5d4f255
              • Instruction Fuzzy Hash: C111CA711043918FDF919FA8ACC02A9FBA0BF41A15F08C85ADC94CF346E639C449C3A1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 441 15c3620-15c362a 442 15c362c-15c363f FindClose 441->442 443 15c3650-15c3660 _errno 441->443 442->443 444 15c3641-15c3649 call 15c0e90 442->444 445 15c364b-15c364f 443->445 444->445
              APIs
              • FindClose.KERNEL32(?,?,?,?,?,015C2AB0), ref: 015C3635
                • Part of subcall function 015C0E90: free.MSVCRT ref: 015C0EAA
              • _errno.MSVCRT ref: 015C3650
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: CloseFind_errnofree
              • String ID:
              • API String ID: 1660445202-0
              • Opcode ID: 4cf8735a8588300b2aad698e18ec094a1506b4c976f351047600e6d2358682cc
              • Instruction ID: 9dfe9ec80c285a995d8073838b6a4b5290364fa86209e5132d2aa05a6887fd14
              • Opcode Fuzzy Hash: 4cf8735a8588300b2aad698e18ec094a1506b4c976f351047600e6d2358682cc
              • Instruction Fuzzy Hash: 38E04F709003068FDB407EF889C165A36E47B50A10F404A7DD9954F281E778C4908792
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 448 15c0e90-15c0eb3 call 15c0ec0 free
              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: free
              • String ID:
              • API String ID: 1294909896-0
              • Opcode ID: b49d4ff45742032c70f306c275094e6a7f308b33d63afa001026e366fbb24da2
              • Instruction ID: f77c0508bc1b06860866e5436e6f3e7b5543404e130a2dd80888befa9507724e
              • Opcode Fuzzy Hash: b49d4ff45742032c70f306c275094e6a7f308b33d63afa001026e366fbb24da2
              • Instruction Fuzzy Hash: 32D0EAB8849741DFC744EF79D18955ABBE5BE88600F814C2DF88487204E77596988F83
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: aedda247470bab3915184e88ff1992c4db144fa5595070cd830cc78b976b595f
              • Instruction ID: e8d63de2530f5cc4ed8e60028001bc2a686802b13e515ef114f5866193b2ac43
              • Opcode Fuzzy Hash: aedda247470bab3915184e88ff1992c4db144fa5595070cd830cc78b976b595f
              • Instruction Fuzzy Hash: 7C210A38918B428EF376899D44D47DB6D96B754714F2C8E2CCE4AC62D7E6B5C484CA10
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 451 15c19d0-15c1a4a fwrite vfprintf abort VirtualQuery 453 15c1af4-15c1b17 call 15c19d0 451->453 454 15c1a50-15c1a57 451->454 468 15c1b19 453->468 469 15c1b20-15c1b37 453->469 455 15c1a5e-15c1a60 454->455 456 15c1a59-15c1a5c 454->456 459 15c1a72-15c1a79 455->459 460 15c1a62 455->460 456->455 458 15c1a80-15c1aad VirtualProtect 456->458 462 15c1abf-15c1ac2 458->462 463 15c1aaf 458->463 464 15c1a64-15c1a70 460->464 462->459 467 15c1ac4-15c1ac7 462->467 466 15c1ab1-15c1abd 463->466 464->459 464->464 466->462 466->466 467->459 470 15c1ac9-15c1af3 VirtualProtect 467->470 469->468 471 15c1b39-15c1b48 469->471 472 15c1b4e 471->472 473 15c1be0-15c1be2 471->473 474 15c1b53-15c1b55 472->474 475 15c1be8-15c1bf5 473->475 476 15c1c90 473->476 477 15c1b5b-15c1b60 474->477 478 15c1c95-15c1c9b 474->478 479 15c1bfb-15c1c06 475->479 480 15c1ce0 475->480 476->478 477->478 481 15c1b66-15c1b6c 477->481 482 15c1bcf-15c1bd5 478->482 483 15c1ca1 478->483 479->474 484 15c1cea-15c1cfa call 15c19d0 480->484 481->484 485 15c1b72 481->485 486 15c1ca8-15c1cd6 call 15c1a20 483->486 488 15c1b78-15c1b81 485->488 493 15c1cd8-15c1cde 486->493 488->482 491 15c1b83-15c1ba1 488->491 494 15c1ba7-15c1baa 491->494 495 15c1c30-15c1c3a 491->495 498 15c1bac-15c1bcd call 15c1a20 494->498 499 15c1c10-15c1c13 494->499 496 15c1c3c 495->496 497 15c1c42-15c1c5a call 15c1a20 495->497 496->497 497->488 498->482 498->491 502 15c1c15-15c1c2d call 15c19d0 499->502 503 15c1c60-15c1c65 499->503 502->495 506 15c1c6d-15c1c85 call 15c1a20 503->506 507 15c1c67 503->507 506->488 507->506
              C-Code - Quality: 26%
              			E015C19D0(signed int __ecx, signed int __edx) {
              				intOrPtr _t112;
              				int _t115;
              				long _t117;
              				signed int _t119;
              				signed int _t121;
              				void* _t123;
              				signed int _t124;
              				signed int _t125;
              				signed int _t128;
              				signed int _t129;
              				intOrPtr _t130;
              				signed int _t135;
              				void* _t136;
              				void* _t143;
              				void* _t144;
              				char* _t145;
              				signed int* _t146;
              				signed int _t149;
              				signed int _t151;
              				signed int _t153;
              				signed int _t155;
              				void* _t157;
              				signed int _t159;
              				void* _t162;
              				signed int _t164;
              				signed int _t168;
              				signed int _t170;
              				signed int _t171;
              				signed int _t173;
              				signed int _t175;
              				signed int _t176;
              				signed int _t178;
              				signed int _t183;
              				signed int _t184;
              				signed int _t185;
              				signed int _t186;
              				signed int _t188;
              				signed int _t189;
              				signed int _t190;
              				signed int _t193;
              				signed int _t195;
              				signed int _t196;
              				signed int _t197;
              				void* _t202;
              				long _t203;
              				signed int _t204;
              				signed int _t209;
              				signed int _t211;
              				signed int _t213;
              				signed int _t214;
              				signed int _t215;
              				void* _t216;
              				int _t219;
              				struct _MEMORY_BASIC_INFORMATION* _t220;
              				signed int _t221;
              				signed int _t226;
              				signed int _t227;
              				signed int _t230;
              				signed int _t231;
              				signed int _t233;
              				signed int _t234;
              				signed int _t236;
              				signed int _t237;
              				signed int _t241;
              				signed int _t243;
              				signed int _t244;
              				signed int _t246;
              				char* _t248;
              				void* _t250;
              				void** _t251;
              				char** _t252;
              				char** _t253;
              				char** _t254;
              				signed int* _t257;
              
              				_t184 = __edx;
              				_t168 = __ecx;
              				_t251 = _t250 - 0x14;
              				_t112 = __imp___iob;
              				_t251[2] = 0x17;
              				_t220 =  &(_t251[9]);
              				_t3 = _t112 + 0x40; // 0x777d4640
              				_t144 = _t3;
              				_t251[1] = 1;
              				_t251[3] = _t144;
              				 *_t251 = "Mingw runtime failure:\n";
              				fwrite(_t143, _t219, ??, ??);
              				_t251[2] = _t220;
              				 *_t251 = _t144;
              				_t251[1] = _t251[8];
              				_t115 = vfprintf(??, ??, ??);
              				abort();
              				_t204 = _t184;
              				_t221 = _t168;
              				_t145 = _t115;
              				_t252 = _t251 - 0x3c;
              				_t252[2] = 0x1c;
              				_t252[1] =  &(_t252[5]);
              				 *_t252 = _t145;
              				_t117 = VirtualQuery(_t144, _t220, _t203);
              				_t253 = _t252 - 0xc;
              				if(_t117 == 0) {
              					_t253[2] = _t145;
              					_t253[1] = 0x1c;
              					 *_t253 = "  VirtualQuery failed for %d bytes at address %p";
              					E015C19D0(_t168, _t184);
              					_t119 =  *0x181a390; // 0x1
              					if(_t119 == 0) {
              						 *0x181a390 = 1;
              						_t119 = 0;
              						if(0x17eab78 <= 7) {
              							goto L16;
              						} else {
              							_push(_t204);
              							_push(_t221);
              							_push(_t145);
              							_t254 = _t253 - 0x20;
              							_t185 =  *0x17eab78; // 0x0
              							if(0x17eab78 > 0xb) {
              								if(_t185 != 0) {
              									_t146 = 0x17eab78;
              									goto L42;
              								} else {
              									_t119 =  *0x17eab7c; // 0x0
              									_t204 = _t119 |  *0x17eab80;
              									if(_t204 != 0) {
              										_t146 = 0x17eab78;
              										goto L22;
              									} else {
              										_t185 =  *0x17eab84; // 0x0
              										_t146 = 0x17eab84;
              										goto L20;
              									}
              								}
              							} else {
              								_t146 = 0x17eab78;
              								L20:
              								if(_t185 != 0) {
              									L42:
              									if(_t146 >= 0x17eab78) {
              										goto L29;
              									} else {
              										do {
              											_t48 =  &(_t146[1]); // 0x0
              											_t186 =  *_t48;
              											_t121 =  *_t146;
              											_t146 =  &(_t146[2]);
              											_t49 = _t186 + 0x12a0000; // 0x905a4d
              											_t50 = _t186 + 0x12a0000; // 0x12a0000
              											_t254[7] = _t121 +  *_t49;
              											_t123 = _t50;
              											L1();
              										} while (_t146 < 0x17eab78);
              										return _t123;
              									}
              								} else {
              									_t32 =  &(_t146[1]); // 0x0
              									_t119 =  *_t32;
              									L22:
              									if(_t119 != 0) {
              										goto L42;
              									} else {
              										_t33 =  &(_t146[2]); // 0x0
              										_t119 =  *_t33;
              										if(_t119 != 1) {
              											_t254[1] = _t119;
              											 *_t254 = "  Unknown pseudo relocation protocol version %d.\n";
              											_t124 = E015C19D0(_t168, _t185);
              											_push(_t240);
              											_push(_t204);
              											_push(_t221);
              											_push(_t146);
              											_t257 = _t254 - 0x3c;
              											_t241 =  *_t124;
              											_t257[7] = _t185;
              											_t257[0xa] = _t168;
              											_t149 = _t241;
              											if(_t241 == 0x2d) {
              												L68:
              												_t170 =  *(_t124 + 1) & 0x000000ff;
              												_t188 = _t124 + 1;
              												if(_t241 == _t257[7]) {
              													_t151 = _t257[0xa] & 0x00000020;
              													while(1) {
              														_t125 = _t188 + 1;
              														if(_t170 == 0x5d) {
              															goto L73;
              														}
              														if(_t170 == 0x7f) {
              															L108:
              															_t170 =  *(_t188 + 1) & 0x000000ff;
              															if(_t151 != 0) {
              																_t188 = _t125;
              																continue;
              															} else {
              																_t226 = _t188 + 2;
              																_t188 = _t125;
              																_t125 = _t226;
              																goto L105;
              															}
              														} else {
              															L105:
              															while(_t170 != 0) {
              																_t170 =  *(_t188 + 1) & 0x000000ff;
              																_t188 = _t125;
              																_t125 = _t188 + 1;
              																if(_t170 != 0x5d) {
              																	if(_t170 != 0x7f) {
              																		continue;
              																	} else {
              																		goto L108;
              																	}
              																}
              																goto L73;
              															}
              															goto L72;
              														}
              														goto L73;
              													}
              												} else {
              													_t241 = _t170;
              													goto L50;
              												}
              											} else {
              												_t188 = _t124;
              												if(_t241 == 0x5d) {
              													goto L68;
              												} else {
              													L50:
              													_t257[8] = _t257[0xa] & 0x00004000;
              													_t128 = _t241;
              													_t243 = _t188;
              													_t189 = _t149;
              													_t153 = _t128;
              													while(1) {
              														_t209 = _t243 + 1;
              														_t227 = _t153;
              														if(_t153 == 0x5d) {
              															break;
              														}
              														if(_t153 == 0x2d) {
              															_t153 =  *(_t243 + 1);
              															if(_t153 == 0x5d) {
              																_t243 = _t209;
              																_t189 = 0x2d;
              																goto L58;
              															} else {
              																_t233 = _t153;
              																if(_t233 != 0) {
              																	_t257[9] = _t243;
              																	_t244 = _t189;
              																	_t257[0xb] = _t243 + 2;
              																	_t211 = _t233;
              																	_t234 = _t257[8];
              																	while(_t244 < _t211) {
              																		if(_t234 != 0) {
              																			_t162 = _t244 - _t257[7];
              																			_t244 = _t244 + 1;
              																			if(_t162 == 0) {
              																				goto L80;
              																			} else {
              																				continue;
              																			}
              																		} else {
              																			 *_t257 = _t244;
              																			_t244 = _t244 + 1;
              																			L015C44A0();
              																			_t164 = _t128;
              																			_t128 = _t257[7];
              																			 *_t257 = _t128;
              																			L015C44A0();
              																			if(_t164 != _t128) {
              																				continue;
              																			} else {
              																				L80:
              																				_t215 = _t257[0xb];
              																				_t195 =  *(_t257[9] + 2) & 0x000000ff;
              																				_t175 = _t257[0xa] & 0x00000020;
              																				while(1) {
              																					_t84 = _t215 + 1; // 0x22
              																					_t125 = _t84;
              																					if(_t195 == 0x5d) {
              																						goto L73;
              																					}
              																					if(_t195 == 0x7f) {
              																						L86:
              																						_t195 =  *(_t215 + 1) & 0x000000ff;
              																						if(_t175 != 0) {
              																							_t215 = _t125;
              																							continue;
              																						} else {
              																							_t88 = _t215 + 2; // 0x24
              																							_t215 = _t125;
              																							_t125 = _t88;
              																							goto L83;
              																						}
              																					} else {
              																						L83:
              																						while(_t195 != 0) {
              																							_t195 =  *(_t215 + 1) & 0x000000ff;
              																							_t215 = _t125;
              																							_t86 = _t215 + 1; // 0x25
              																							_t125 = _t86;
              																							if(_t195 != 0x5d) {
              																								if(_t195 != 0x7f) {
              																									continue;
              																								} else {
              																									goto L86;
              																								}
              																							}
              																							goto L73;
              																						}
              																						goto L72;
              																					}
              																					goto L73;
              																				}
              																			}
              																		}
              																		goto L73;
              																	}
              																	_t257[9] = _t257[0xb];
              																	_t213 = _t211;
              																	_t236 = _t244;
              																	_t257[0xb] = _t257[9];
              																	_t246 = _t257[8];
              																	while(_t236 > _t213) {
              																		if(_t246 != 0) {
              																			_t157 = _t236 - _t257[7];
              																			_t236 = _t236 - 1;
              																			if(_t157 == 0) {
              																				goto L93;
              																			} else {
              																				continue;
              																			}
              																		} else {
              																			 *_t257 = _t236;
              																			_t236 = _t236 - 1;
              																			L015C44A0();
              																			_t159 = _t128;
              																			_t128 = _t257[7];
              																			 *_t257 = _t128;
              																			L015C44A0();
              																			if(_t159 != _t128) {
              																				continue;
              																			} else {
              																				L93:
              																				_t214 = _t257[9];
              																				_t193 =  *(_t257[0xb] + 2) & 0x000000ff;
              																				_t173 = _t257[0xa] & 0x00000020;
              																				while(1) {
              																					_t100 = _t214 + 1; // 0x22
              																					_t125 = _t100;
              																					if(_t193 == 0x5d) {
              																						goto L73;
              																					}
              																					if(_t193 == 0x7f) {
              																						L99:
              																						_t193 =  *(_t214 + 1) & 0x000000ff;
              																						if(_t173 != 0) {
              																							_t214 = _t125;
              																							continue;
              																						} else {
              																							_t104 = _t214 + 2; // 0x24
              																							_t214 = _t125;
              																							_t125 = _t104;
              																							goto L96;
              																						}
              																					} else {
              																						L96:
              																						while(_t193 != 0) {
              																							_t193 =  *(_t214 + 1) & 0x000000ff;
              																							_t214 = _t125;
              																							_t102 = _t214 + 1; // 0x25
              																							_t125 = _t102;
              																							if(_t193 != 0x5d) {
              																								if(_t193 != 0x7f) {
              																									continue;
              																								} else {
              																									goto L99;
              																								}
              																							}
              																							goto L73;
              																						}
              																						goto L72;
              																					}
              																					goto L73;
              																				}
              																			}
              																		}
              																		goto L73;
              																	}
              																	_t227 = _t213;
              																	_t209 = _t257[9];
              																	goto L55;
              																} else {
              																	break;
              																}
              															}
              														} else {
              															if(_t153 == 0) {
              																break;
              															} else {
              																L55:
              																if(_t227 == 0x2f || _t227 == 0x5c) {
              																	break;
              																} else {
              																	_t153 =  *_t209;
              																	_t243 = _t209;
              																	_t189 = _t227;
              																	L58:
              																	_t128 = _t257[8];
              																	if(_t128 != 0) {
              																		if(_t189 == _t257[7]) {
              																			goto L60;
              																		} else {
              																			continue;
              																		}
              																	} else {
              																		 *_t257 = _t189;
              																		_t257[9] = _t189;
              																		L015C44A0();
              																		_t231 = _t128;
              																		_t128 = _t257[7];
              																		 *_t257 = _t128;
              																		L015C44A0();
              																		_t189 = _t257[9];
              																		if(_t231 != _t128) {
              																			continue;
              																		} else {
              																			L60:
              																			_t171 = _t153;
              																			_t190 = _t243;
              																			_t155 = _t257[0xa] & 0x00000020;
              																			while(1) {
              																				_t125 = _t190 + 1;
              																				if(_t171 == 0x5d) {
              																					goto L73;
              																				}
              																				if(_t171 == 0x7f) {
              																					L66:
              																					_t171 =  *(_t190 + 1) & 0x000000ff;
              																					if(_t155 != 0) {
              																						_t190 = _t125;
              																						continue;
              																					} else {
              																						_t230 = _t190 + 2;
              																						_t190 = _t125;
              																						_t125 = _t230;
              																						goto L63;
              																					}
              																				} else {
              																					L63:
              																					while(_t171 != 0) {
              																						_t171 =  *(_t190 + 1) & 0x000000ff;
              																						_t190 = _t125;
              																						_t125 = _t190 + 1;
              																						if(_t171 != 0x5d) {
              																							if(_t171 != 0x7f) {
              																								continue;
              																							} else {
              																								goto L66;
              																							}
              																						}
              																						goto L73;
              																					}
              																					goto L72;
              																				}
              																				goto L73;
              																			}
              																		}
              																	}
              																}
              															}
              														}
              														goto L73;
              													}
              													L72:
              													_t125 = 0;
              												}
              											}
              											L73:
              											return _t125;
              										} else {
              											while(1) {
              												L25:
              												_t146 =  &(_t146[3]);
              												if(_t146 >= 0x17eab78) {
              													break;
              												} else {
              													goto L26;
              												}
              												while(1) {
              													L26:
              													_t129 =  *_t146;
              													_t34 =  &(_t146[1]); // 0x2e303120
              													_t176 =  *_t34;
              													_t35 =  &(_t146[2]); // 0x302e33
              													_t196 =  *_t35 & 0x000000ff;
              													_t36 = _t129 + 0x12a0000; // 0x12a0000
              													_t216 = _t36;
              													_t37 = _t176 + 0x12a0000; // 0x2f5a3120
              													_t237 = _t37;
              													_t38 = _t129 + 0x12a0000; // 0x905a4d
              													_t130 =  *_t38;
              													if(_t196 == 0x10) {
              														break;
              													}
              													if(_t196 != 0x20) {
              														if(_t196 == 8) {
              															_t178 =  *_t237 & 0x000000ff;
              															if(_t178 < 0) {
              																_t178 = _t178 | 0xffffff00;
              															}
              															_t254[7] = _t130 + _t178 - _t216;
              															_t119 = _t237;
              															L1();
              															goto L25;
              														} else {
              															_t254[1] = _t196;
              															 *_t254 = "  Unknown pseudo relocation bit size %d.\n";
              															_t254[7] = 0;
              															_t130 = E015C19D0(_t176, _t196);
              															break;
              														}
              														goto L114;
              													} else {
              														_t146 =  &(_t146[3]);
              														_t254[7] = _t130 - _t216 +  *_t237;
              														_t119 = _t237;
              														L1();
              														if(_t146 < 0x17eab78) {
              															continue;
              														}
              													}
              													goto L29;
              												}
              												_t43 = _t176 + 0x12a0000; // 0x905a4d
              												_t197 =  *_t43 & 0x0000ffff;
              												if(_t197 < 0) {
              													_t197 = _t197 | 0xffff0000;
              												}
              												_t254[7] = _t130 + _t197 - _t216;
              												_t119 = _t237;
              												L1();
              											}
              											L29:
              											return _t119;
              										}
              									}
              								}
              							}
              						}
              					} else {
              						L16:
              						return _t119;
              					}
              				} else {
              					_t135 = _t253[0xa];
              					if(_t135 == 0x40 || _t135 == 4) {
              						if(_t221 != 0) {
              							_t136 = 0;
              							do {
              								_t145[_t136] =  *(_t204 + _t136) & 0x000000ff;
              								_t136 = _t136 + 1;
              							} while (_t136 < _t221);
              						}
              						goto L7;
              					} else {
              						_t248 =  &(_t253[4]);
              						_t253[2] = 0x40;
              						_t253[3] = _t248;
              						_t253[1] = _t253[8];
              						 *_t253 = _t253[5];
              						_t135 = VirtualProtect(??, ??, ??, ??);
              						_t253 = _t253 - 0x10;
              						_t183 = _t253[0xa];
              						if(_t221 != 0) {
              							_t202 = 0;
              							do {
              								_t135 =  *(_t204 + _t202) & 0x000000ff;
              								_t145[_t202] = _t135;
              								_t202 = _t202 + 1;
              							} while (_t202 < _t221);
              						}
              						if(_t183 == 0x40 || _t183 == 4) {
              							L7:
              							return _t135;
              						} else {
              							_t253[3] = _t248;
              							_t253[2] = _t253[4];
              							_t253[1] = _t253[8];
              							 *_t253 = _t253[5];
              							return VirtualProtect(??, ??, ??, ??);
              						}
              					}
              				}
              				L114:
              			}













































































              0x015c19d0
              0x015c19d0
              0x015c19d2
              0x015c19d5
              0x015c19da
              0x015c19e2
              0x015c19e6
              0x015c19e6
              0x015c19e9
              0x015c19f1
              0x015c19f5
              0x015c19fc
              0x015c1a05
              0x015c1a09
              0x015c1a0c
              0x015c1a10
              0x015c1a15
              0x015c1a22
              0x015c1a25
              0x015c1a28
              0x015c1a2a
              0x015c1a31
              0x015c1a39
              0x015c1a3d
              0x015c1a40
              0x015c1a45
              0x015c1a4a
              0x015c1af4
              0x015c1af8
              0x015c1b00
              0x015c1b07
              0x015c1b10
              0x015c1b17
              0x015c1b20
              0x015c1b2f
              0x015c1b37
              0x00000000
              0x015c1b39
              0x015c1b39
              0x015c1b3a
              0x015c1b3b
              0x015c1b3c
              0x015c1b3f
              0x015c1b48
              0x015c1be2
              0x015c1c90
              0x00000000
              0x015c1be8
              0x015c1be8
              0x015c1bef
              0x015c1bf5
              0x015c1ce0
              0x00000000
              0x015c1bfb
              0x015c1bfb
              0x015c1c01
              0x00000000
              0x015c1c01
              0x015c1bf5
              0x015c1b4e
              0x015c1b4e
              0x015c1b53
              0x015c1b55
              0x015c1c95
              0x015c1c9b
              0x00000000
              0x015c1ca8
              0x015c1ca8
              0x015c1ca8
              0x015c1ca8
              0x015c1cab
              0x015c1cb2
              0x015c1cb5
              0x015c1cbb
              0x015c1cc5
              0x015c1cc9
              0x015c1ccb
              0x015c1cd0
              0x015c1cde
              0x015c1cde
              0x015c1b5b
              0x015c1b5b
              0x015c1b5b
              0x015c1b5e
              0x015c1b60
              0x00000000
              0x015c1b66
              0x015c1b66
              0x015c1b66
              0x015c1b6c
              0x015c1cea
              0x015c1cee
              0x015c1cf5
              0x015c1d00
              0x015c1d01
              0x015c1d02
              0x015c1d03
              0x015c1d04
              0x015c1d07
              0x015c1d0a
              0x015c1d0e
              0x015c1d12
              0x015c1d17
              0x015c1df8
              0x015c1df8
              0x015c1dfc
              0x015c1e03
              0x015c1fb4
              0x015c1fb7
              0x015c1fb7
              0x015c1fbd
              0x00000000
              0x00000000
              0x015c1fc6
              0x015c1fe7
              0x015c1fe7
              0x015c1fed
              0x015c2000
              0x00000000
              0x015c1fef
              0x015c1fef
              0x015c1ff2
              0x015c1ff4
              0x00000000
              0x015c1ff4
              0x015c1fc8
              0x00000000
              0x015c1fc8
              0x015c1fd0
              0x015c1fd4
              0x015c1fd6
              0x015c1fdc
              0x015c1fe5
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1fe5
              0x00000000
              0x015c1fdc
              0x00000000
              0x015c1fc8
              0x00000000
              0x015c1fc6
              0x015c1e09
              0x015c1e09
              0x00000000
              0x015c1e09
              0x015c1d1d
              0x015c1d1d
              0x015c1d22
              0x00000000
              0x015c1d28
              0x015c1d28
              0x015c1d31
              0x015c1d35
              0x015c1d37
              0x015c1d39
              0x015c1d3b
              0x015c1d4a
              0x015c1d4a
              0x015c1d4d
              0x015c1d52
              0x00000000
              0x00000000
              0x015c1d5b
              0x015c1e18
              0x015c1e1f
              0x015c1e38
              0x015c1e3a
              0x00000000
              0x015c1e21
              0x015c1e21
              0x015c1e26
              0x015c1e4b
              0x015c1e4f
              0x015c1e51
              0x015c1e55
              0x015c1e57
              0x015c1e6d
              0x015c1e73
              0x015c1e62
              0x015c1e66
              0x015c1e6b
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1e75
              0x015c1e75
              0x015c1e78
              0x015c1e7b
              0x015c1e80
              0x015c1e82
              0x015c1e86
              0x015c1e89
              0x015c1e92
              0x00000000
              0x015c1e94
              0x015c1e94
              0x015c1e9c
              0x015c1ea0
              0x015c1ea4
              0x015c1ea7
              0x015c1ea7
              0x015c1ea7
              0x015c1ead
              0x00000000
              0x00000000
              0x015c1eb6
              0x015c1ed7
              0x015c1ed7
              0x015c1edd
              0x015c1fa0
              0x00000000
              0x015c1ee3
              0x015c1ee3
              0x015c1ee6
              0x015c1ee8
              0x00000000
              0x015c1ee8
              0x015c1eb8
              0x00000000
              0x015c1eb8
              0x015c1ec0
              0x015c1ec4
              0x015c1ec6
              0x015c1ec6
              0x015c1ecc
              0x015c1ed5
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1ed5
              0x00000000
              0x015c1ecc
              0x00000000
              0x015c1eb8
              0x00000000
              0x015c1eb6
              0x015c1ea7
              0x015c1e92
              0x00000000
              0x015c1e73
              0x015c1efc
              0x015c1f00
              0x015c1f02
              0x015c1f04
              0x015c1f08
              0x015c1f1d
              0x015c1f27
              0x015c1f12
              0x015c1f16
              0x015c1f1b
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1f29
              0x015c1f29
              0x015c1f2c
              0x015c1f2f
              0x015c1f34
              0x015c1f36
              0x015c1f3a
              0x015c1f3d
              0x015c1f46
              0x00000000
              0x015c1f48
              0x015c1f48
              0x015c1f50
              0x015c1f54
              0x015c1f58
              0x015c1f5b
              0x015c1f5b
              0x015c1f5b
              0x015c1f61
              0x00000000
              0x00000000
              0x015c1f6a
              0x015c1f8b
              0x015c1f8b
              0x015c1f91
              0x015c2020
              0x00000000
              0x015c1f97
              0x015c1f97
              0x015c1f9a
              0x015c1f9c
              0x00000000
              0x015c1f9c
              0x015c1f6c
              0x00000000
              0x015c1f6c
              0x015c1f74
              0x015c1f78
              0x015c1f7a
              0x015c1f7a
              0x015c1f80
              0x015c1f89
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1f89
              0x00000000
              0x015c1f80
              0x00000000
              0x015c1f6c
              0x00000000
              0x015c1f6a
              0x015c1f5b
              0x015c1f46
              0x00000000
              0x015c1f27
              0x015c2010
              0x015c2012
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1e26
              0x015c1d61
              0x015c1d63
              0x00000000
              0x015c1d69
              0x015c1d69
              0x015c1d6c
              0x00000000
              0x015c1d7b
              0x015c1d7b
              0x015c1d7e
              0x015c1d80
              0x015c1d82
              0x015c1d82
              0x015c1d88
              0x015c1d48
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1d8a
              0x015c1d8a
              0x015c1d8d
              0x015c1d91
              0x015c1d96
              0x015c1d98
              0x015c1d9c
              0x015c1d9f
              0x015c1da4
              0x015c1dac
              0x00000000
              0x015c1dae
              0x015c1dae
              0x015c1dae
              0x015c1db4
              0x015c1db6
              0x015c1db9
              0x015c1db9
              0x015c1dbf
              0x00000000
              0x00000000
              0x015c1dc4
              0x015c1ddd
              0x015c1ddd
              0x015c1de3
              0x015c2008
              0x00000000
              0x015c1de9
              0x015c1de9
              0x015c1dec
              0x015c1dee
              0x00000000
              0x015c1dee
              0x015c1dc6
              0x00000000
              0x015c1dc6
              0x015c1dca
              0x015c1dce
              0x015c1dd0
              0x015c1dd6
              0x015c1ddb
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1ddb
              0x00000000
              0x015c1dd6
              0x00000000
              0x015c1dc6
              0x00000000
              0x015c1dc4
              0x015c1db9
              0x015c1dac
              0x015c1d88
              0x015c1d6c
              0x015c1d63
              0x00000000
              0x015c1d5b
              0x015c1e28
              0x015c1e28
              0x015c1e28
              0x015c1d22
              0x015c1e2a
              0x015c1e31
              0x015c1b78
              0x015c1b78
              0x015c1b78
              0x015c1b78
              0x015c1b81
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1b83
              0x015c1b83
              0x015c1b83
              0x015c1b85
              0x015c1b85
              0x015c1b88
              0x015c1b88
              0x015c1b8c
              0x015c1b8c
              0x015c1b92
              0x015c1b92
              0x015c1b98
              0x015c1b98
              0x015c1ba1
              0x00000000
              0x00000000
              0x015c1baa
              0x015c1c13
              0x015c1c60
              0x015c1c65
              0x015c1c67
              0x015c1c67
              0x015c1c7a
              0x015c1c7e
              0x015c1c80
              0x00000000
              0x015c1c15
              0x015c1c15
              0x015c1c19
              0x015c1c20
              0x015c1c28
              0x00000000
              0x015c1c28
              0x00000000
              0x015c1bac
              0x015c1bb5
              0x015c1bb8
              0x015c1bc0
              0x015c1bc2
              0x015c1bcd
              0x00000000
              0x00000000
              0x015c1bcd
              0x00000000
              0x015c1baa
              0x015c1c30
              0x015c1c30
              0x015c1c3a
              0x015c1c3c
              0x015c1c3c
              0x015c1c4f
              0x015c1c53
              0x015c1c55
              0x015c1c55
              0x015c1bcf
              0x015c1bd5
              0x015c1bd5
              0x015c1b6c
              0x015c1b60
              0x015c1b55
              0x015c1b48
              0x015c1b19
              0x015c1b19
              0x015c1b19
              0x015c1b19
              0x015c1a50
              0x015c1a50
              0x015c1a57
              0x015c1a60
              0x015c1a62
              0x015c1a64
              0x015c1a68
              0x015c1a6b
              0x015c1a6e
              0x015c1a64
              0x00000000
              0x015c1a80
              0x015c1a84
              0x015c1a88
              0x015c1a90
              0x015c1a94
              0x015c1a9c
              0x015c1a9f
              0x015c1aa4
              0x015c1aa7
              0x015c1aad
              0x015c1aaf
              0x015c1ab1
              0x015c1ab1
              0x015c1ab5
              0x015c1ab8
              0x015c1abb
              0x015c1ab1
              0x015c1ac2
              0x015c1a72
              0x015c1a79
              0x015c1ac9
              0x015c1acd
              0x015c1ad1
              0x015c1ad9
              0x015c1ae1
              0x015c1af3
              0x015c1af3
              0x015c1ac2
              0x015c1a57
              0x00000000

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: Virtual$Protect$Queryabortfwritevfprintf
              • String ID: @$Mingw runtime failure:
              • API String ID: 3498335539-2549925133
              • Opcode ID: 1172c707aaa32d41e47f57d29110a09f5e2520963778a0084ce1e04aaa73cda2
              • Instruction ID: 6307c59cf5cd507034d11f92e2a7f17e8c899da698d55187e96b633786bdc37a
              • Opcode Fuzzy Hash: 1172c707aaa32d41e47f57d29110a09f5e2520963778a0084ce1e04aaa73cda2
              • Instruction Fuzzy Hash: 70317AB19087429FD710EF6CC4C052EBFE0BB89A44F04891EE9888B311D374D948CB92
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • CreateEventA.KERNEL32 ref: 015C0972
              • InitializeCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,015C0A55), ref: 015C098A
              • fwrite.MSVCRT ref: 015C09B9
              • abort.MSVCRT ref: 015C09BE
              • InterlockedExchangeAdd.KERNEL32 ref: 015C09E2
              Strings
              • runtime: failed to create runtime initialization wait event., xrefs: 015C09AE
              • =, xrefs: 015C099B
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: CreateCriticalEventExchangeInitializeInterlockedSectionabortfwrite
              • String ID: =$runtime: failed to create runtime initialization wait event.
              • API String ID: 1036100134-3519180978
              • Opcode ID: 98e06a431e89bef6ceeb842dfc8c21462632183413f61dfb8edde3f68b7e03d1
              • Instruction ID: cf712393898a23337f6cdd3d1468f7e1717386113afc6c5841fbafe56956fd2e
              • Opcode Fuzzy Hash: 98e06a431e89bef6ceeb842dfc8c21462632183413f61dfb8edde3f68b7e03d1
              • Instruction Fuzzy Hash: CB014BF28083029EE704BFB8C50535BBBE4BB90704F85881DD8884B245E37992588B93
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 525 15c1d00-15c1d17 526 15c1d1d-15c1d22 525->526 527 15c1df8-15c1e03 525->527 526->527 530 15c1d28-15c1d3d 526->530 528 15c1e09-15c1e0c 527->528 529 15c1fb0-15c1fb4 527->529 528->530 532 15c1fb7-15c1fbd 529->532 531 15c1d4a-15c1d52 530->531 533 15c1e28 531->533 534 15c1d58-15c1d5b 531->534 535 15c1e2a-15c1e31 532->535 536 15c1fc3-15c1fc6 532->536 533->535 537 15c1e18-15c1e1f 534->537 538 15c1d61-15c1d63 534->538 539 15c1fc8-15c1fca 536->539 540 15c1fe7-15c1fed 536->540 541 15c1e38-15c1e3f 537->541 542 15c1e21-15c1e26 537->542 538->533 543 15c1d69-15c1d6c 538->543 539->533 544 15c1fd0-15c1fdc 539->544 545 15c1fef-15c1ff6 540->545 546 15c2000-15c2002 540->546 549 15c1d82-15c1d88 541->549 542->533 547 15c1e48-15c1e5b 542->547 543->533 548 15c1d72-15c1d75 543->548 544->535 550 15c1fe2-15c1fe5 544->550 545->539 546->532 554 15c1e6d-15c1e6f 547->554 548->533 551 15c1d7b-15c1d80 548->551 552 15c1d8a-15c1dac tolower * 2 549->552 553 15c1d40-15c1d48 549->553 550->539 550->540 551->549 552->531 555 15c1dae-15c1db6 552->555 553->531 553->555 556 15c1ef0-15c1f0c 554->556 557 15c1e71-15c1e73 554->557 559 15c1db9-15c1dbf 555->559 558 15c1f1d-15c1f1f 556->558 560 15c1e75-15c1e92 tolower * 2 557->560 561 15c1e60-15c1e6b 557->561 562 15c1f25-15c1f27 558->562 563 15c2010-15c2016 558->563 559->535 565 15c1dc1-15c1dc4 559->565 560->554 564 15c1e94-15c1ea4 560->564 561->554 561->564 566 15c1f29-15c1f46 tolower * 2 562->566 567 15c1f10-15c1f1b 562->567 563->543 570 15c1ea7-15c1ead 564->570 568 15c1ddd-15c1de3 565->568 569 15c1dc6-15c1dc8 565->569 566->558 573 15c1f48-15c1f58 566->573 567->558 567->573 571 15c2008-15c200a 568->571 572 15c1de9-15c1df0 568->572 569->533 574 15c1dca-15c1dd6 569->574 570->535 575 15c1eb3-15c1eb6 570->575 571->559 572->569 578 15c1f5b-15c1f61 573->578 574->535 579 15c1dd8-15c1ddb 574->579 576 15c1eb8-15c1eba 575->576 577 15c1ed7-15c1edd 575->577 576->533 580 15c1ec0-15c1ecc 576->580 581 15c1fa0-15c1fa2 577->581 582 15c1ee3-15c1eea 577->582 578->535 583 15c1f67-15c1f6a 578->583 579->568 579->569 580->535 584 15c1ed2-15c1ed5 580->584 581->570 582->576 585 15c1f6c-15c1f6e 583->585 586 15c1f8b-15c1f91 583->586 584->576 584->577 585->533 589 15c1f74-15c1f80 585->589 587 15c1f97-15c1f9e 586->587 588 15c2020-15c2022 586->588 587->585 588->578 589->535 590 15c1f86-15c1f89 589->590 590->585 590->586
              C-Code - Quality: 100%
              			E015C1D00(signed int __eax, signed int __ecx, signed int __edx) {
              				signed int _t59;
              				signed int _t60;
              				signed int _t64;
              				signed int _t65;
              				signed int _t67;
              				signed int _t68;
              				signed int _t70;
              				void* _t72;
              				signed int _t74;
              				void* _t77;
              				signed int _t79;
              				signed int _t82;
              				signed int _t83;
              				signed int _t85;
              				signed int _t87;
              				signed int _t89;
              				signed int _t90;
              				signed int _t91;
              				signed int _t94;
              				signed int _t96;
              				signed int _t97;
              				signed int _t99;
              				signed int _t101;
              				signed int _t102;
              				signed int _t103;
              				signed int _t104;
              				signed int _t105;
              				signed int _t108;
              				signed int _t109;
              				signed int _t111;
              				signed int _t112;
              				signed int _t114;
              				signed int _t115;
              				signed int _t116;
              				signed int _t117;
              				signed int _t119;
              				signed int* _t120;
              
              				_t59 = __eax;
              				_t115 =  *((char*)(__eax));
              				_t120[7] = __edx;
              				_t120[0xa] = __ecx;
              				_t65 = _t115;
              				if(_t115 == 0x2d) {
              					L20:
              					_t82 =  *(_t59 + 1) & 0x000000ff;
              					_t89 = _t59 + 1;
              					if(_t115 == _t120[7]) {
              						_t67 = _t120[0xa] & 0x00000020;
              						while(1) {
              							_t60 = _t89 + 1;
              							if(_t82 == 0x5d) {
              								goto L25;
              							}
              							if(_t82 == 0x7f) {
              								L60:
              								_t82 =  *(_t89 + 1) & 0x000000ff;
              								if(_t67 != 0) {
              									_t89 = _t60;
              									continue;
              								} else {
              									_t104 = _t89 + 2;
              									_t89 = _t60;
              									_t60 = _t104;
              									goto L57;
              								}
              							} else {
              								L57:
              								while(_t82 != 0) {
              									_t82 =  *(_t89 + 1) & 0x000000ff;
              									_t89 = _t60;
              									_t60 = _t89 + 1;
              									if(_t82 != 0x5d) {
              										if(_t82 != 0x7f) {
              											continue;
              										} else {
              											goto L60;
              										}
              									}
              									goto L25;
              								}
              								goto L24;
              							}
              							goto L25;
              						}
              					} else {
              						_t115 = _t82;
              						goto L2;
              					}
              				} else {
              					_t89 = __eax;
              					if(_t115 == 0x5d) {
              						goto L20;
              					} else {
              						L2:
              						_t120[8] = _t120[0xa] & 0x00004000;
              						_t64 = _t115;
              						_t116 = _t89;
              						_t90 = _t65;
              						_t68 = _t64;
              						while(1) {
              							_t97 = _t116 + 1;
              							_t105 = _t68;
              							if(_t68 == 0x5d) {
              								break;
              							}
              							if(_t68 == 0x2d) {
              								_t68 =  *(_t116 + 1);
              								if(_t68 == 0x5d) {
              									_t116 = _t97;
              									_t90 = 0x2d;
              									goto L10;
              								} else {
              									_t111 = _t68;
              									if(_t111 == 0) {
              										break;
              									}
              									_t120[9] = _t116;
              									_t117 = _t90;
              									_t120[0xb] = _t116 + 2;
              									_t99 = _t111;
              									_t112 = _t120[8];
              									while(_t117 < _t99) {
              										if(_t112 != 0) {
              											_t77 = _t117 - _t120[7];
              											_t117 = _t117 + 1;
              											if(_t77 == 0) {
              												goto L32;
              											} else {
              												continue;
              											}
              										} else {
              											 *_t120 = _t117;
              											_t117 = _t117 + 1;
              											L015C44A0();
              											_t79 = _t64;
              											_t64 = _t120[7];
              											 *_t120 = _t64;
              											L015C44A0();
              											if(_t79 != _t64) {
              												continue;
              											} else {
              												L32:
              												_t103 = _t120[0xb];
              												_t96 =  *(_t120[9] + 2) & 0x000000ff;
              												_t87 = _t120[0xa] & 0x00000020;
              												while(1) {
              													_t31 = _t103 + 1; // 0x22
              													_t60 = _t31;
              													if(_t96 == 0x5d) {
              														goto L25;
              													}
              													if(_t96 == 0x7f) {
              														L38:
              														_t96 =  *(_t103 + 1) & 0x000000ff;
              														if(_t87 != 0) {
              															_t103 = _t60;
              															continue;
              														} else {
              															_t35 = _t103 + 2; // 0x24
              															_t103 = _t60;
              															_t60 = _t35;
              															goto L35;
              														}
              													} else {
              														L35:
              														while(_t96 != 0) {
              															_t96 =  *(_t103 + 1) & 0x000000ff;
              															_t103 = _t60;
              															_t33 = _t103 + 1; // 0x25
              															_t60 = _t33;
              															if(_t96 != 0x5d) {
              																if(_t96 != 0x7f) {
              																	continue;
              																} else {
              																	goto L38;
              																}
              															}
              															goto L25;
              														}
              														goto L24;
              													}
              													goto L25;
              												}
              											}
              										}
              										goto L25;
              									}
              									_t120[9] = _t120[0xb];
              									_t101 = _t99;
              									_t114 = _t117;
              									_t120[0xb] = _t120[9];
              									_t119 = _t120[8];
              									while(_t114 > _t101) {
              										if(_t119 != 0) {
              											_t72 = _t114 - _t120[7];
              											_t114 = _t114 - 1;
              											if(_t72 == 0) {
              												goto L45;
              											} else {
              												continue;
              											}
              										} else {
              											 *_t120 = _t114;
              											_t114 = _t114 - 1;
              											L015C44A0();
              											_t74 = _t64;
              											_t64 = _t120[7];
              											 *_t120 = _t64;
              											L015C44A0();
              											if(_t74 != _t64) {
              												continue;
              											} else {
              												L45:
              												_t102 = _t120[9];
              												_t94 =  *(_t120[0xb] + 2) & 0x000000ff;
              												_t85 = _t120[0xa] & 0x00000020;
              												while(1) {
              													_t47 = _t102 + 1; // 0x22
              													_t60 = _t47;
              													if(_t94 == 0x5d) {
              														goto L25;
              													}
              													if(_t94 == 0x7f) {
              														L51:
              														_t94 =  *(_t102 + 1) & 0x000000ff;
              														if(_t85 != 0) {
              															_t102 = _t60;
              															continue;
              														} else {
              															_t51 = _t102 + 2; // 0x24
              															_t102 = _t60;
              															_t60 = _t51;
              															goto L48;
              														}
              													} else {
              														L48:
              														while(_t94 != 0) {
              															_t94 =  *(_t102 + 1) & 0x000000ff;
              															_t102 = _t60;
              															_t49 = _t102 + 1; // 0x25
              															_t60 = _t49;
              															if(_t94 != 0x5d) {
              																if(_t94 != 0x7f) {
              																	continue;
              																} else {
              																	goto L51;
              																}
              															}
              															goto L25;
              														}
              														goto L24;
              													}
              													goto L25;
              												}
              											}
              										}
              										goto L25;
              									}
              									_t105 = _t101;
              									_t97 = _t120[9];
              									goto L7;
              								}
              							} else {
              								if(_t68 == 0) {
              									break;
              								}
              								L7:
              								if(_t105 == 0x2f || _t105 == 0x5c) {
              									break;
              								}
              								_t68 =  *_t97;
              								_t116 = _t97;
              								_t90 = _t105;
              								L10:
              								_t64 = _t120[8];
              								if(_t64 != 0) {
              									if(_t90 == _t120[7]) {
              										goto L12;
              									} else {
              										continue;
              									}
              								} else {
              									 *_t120 = _t90;
              									_t120[9] = _t90;
              									L015C44A0();
              									_t109 = _t64;
              									_t64 = _t120[7];
              									 *_t120 = _t64;
              									L015C44A0();
              									_t90 = _t120[9];
              									if(_t109 != _t64) {
              										continue;
              									} else {
              										L12:
              										_t83 = _t68;
              										_t91 = _t116;
              										_t70 = _t120[0xa] & 0x00000020;
              										while(1) {
              											_t60 = _t91 + 1;
              											if(_t83 == 0x5d) {
              												goto L25;
              											}
              											if(_t83 == 0x7f) {
              												L18:
              												_t83 =  *(_t91 + 1) & 0x000000ff;
              												if(_t70 != 0) {
              													_t91 = _t60;
              													continue;
              												} else {
              													_t108 = _t91 + 2;
              													_t91 = _t60;
              													_t60 = _t108;
              													goto L15;
              												}
              											} else {
              												L15:
              												while(_t83 != 0) {
              													_t83 =  *(_t91 + 1) & 0x000000ff;
              													_t91 = _t60;
              													_t60 = _t91 + 1;
              													if(_t83 != 0x5d) {
              														if(_t83 != 0x7f) {
              															continue;
              														} else {
              															goto L18;
              														}
              													}
              													goto L25;
              												}
              												goto L24;
              											}
              											goto L25;
              										}
              									}
              								}
              							}
              							goto L25;
              						}
              						L24:
              						return 0;
              					}
              				}
              				L25:
              				return _t60;
              			}








































              0x015c1d00
              0x015c1d07
              0x015c1d0a
              0x015c1d0e
              0x015c1d12
              0x015c1d17
              0x015c1df8
              0x015c1df8
              0x015c1dfc
              0x015c1e03
              0x015c1fb4
              0x015c1fb7
              0x015c1fb7
              0x015c1fbd
              0x00000000
              0x00000000
              0x015c1fc6
              0x015c1fe7
              0x015c1fe7
              0x015c1fed
              0x015c2000
              0x00000000
              0x015c1fef
              0x015c1fef
              0x015c1ff2
              0x015c1ff4
              0x00000000
              0x015c1ff4
              0x015c1fc8
              0x00000000
              0x015c1fc8
              0x015c1fd0
              0x015c1fd4
              0x015c1fd6
              0x015c1fdc
              0x015c1fe5
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1fe5
              0x00000000
              0x015c1fdc
              0x00000000
              0x015c1fc8
              0x00000000
              0x015c1fc6
              0x015c1e09
              0x015c1e09
              0x00000000
              0x015c1e09
              0x015c1d1d
              0x015c1d1d
              0x015c1d22
              0x00000000
              0x015c1d28
              0x015c1d28
              0x015c1d31
              0x015c1d35
              0x015c1d37
              0x015c1d39
              0x015c1d3b
              0x015c1d4a
              0x015c1d4a
              0x015c1d4d
              0x015c1d52
              0x00000000
              0x00000000
              0x015c1d5b
              0x015c1e18
              0x015c1e1f
              0x015c1e38
              0x015c1e3a
              0x00000000
              0x015c1e21
              0x015c1e21
              0x015c1e26
              0x00000000
              0x00000000
              0x015c1e4b
              0x015c1e4f
              0x015c1e51
              0x015c1e55
              0x015c1e57
              0x015c1e6d
              0x015c1e73
              0x015c1e62
              0x015c1e66
              0x015c1e6b
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1e75
              0x015c1e75
              0x015c1e78
              0x015c1e7b
              0x015c1e80
              0x015c1e82
              0x015c1e86
              0x015c1e89
              0x015c1e92
              0x00000000
              0x015c1e94
              0x015c1e94
              0x015c1e9c
              0x015c1ea0
              0x015c1ea4
              0x015c1ea7
              0x015c1ea7
              0x015c1ea7
              0x015c1ead
              0x00000000
              0x00000000
              0x015c1eb6
              0x015c1ed7
              0x015c1ed7
              0x015c1edd
              0x015c1fa0
              0x00000000
              0x015c1ee3
              0x015c1ee3
              0x015c1ee6
              0x015c1ee8
              0x00000000
              0x015c1ee8
              0x015c1eb8
              0x00000000
              0x015c1eb8
              0x015c1ec0
              0x015c1ec4
              0x015c1ec6
              0x015c1ec6
              0x015c1ecc
              0x015c1ed5
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1ed5
              0x00000000
              0x015c1ecc
              0x00000000
              0x015c1eb8
              0x00000000
              0x015c1eb6
              0x015c1ea7
              0x015c1e92
              0x00000000
              0x015c1e73
              0x015c1efc
              0x015c1f00
              0x015c1f02
              0x015c1f04
              0x015c1f08
              0x015c1f1d
              0x015c1f27
              0x015c1f12
              0x015c1f16
              0x015c1f1b
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1f29
              0x015c1f29
              0x015c1f2c
              0x015c1f2f
              0x015c1f34
              0x015c1f36
              0x015c1f3a
              0x015c1f3d
              0x015c1f46
              0x00000000
              0x015c1f48
              0x015c1f48
              0x015c1f50
              0x015c1f54
              0x015c1f58
              0x015c1f5b
              0x015c1f5b
              0x015c1f5b
              0x015c1f61
              0x00000000
              0x00000000
              0x015c1f6a
              0x015c1f8b
              0x015c1f8b
              0x015c1f91
              0x015c2020
              0x00000000
              0x015c1f97
              0x015c1f97
              0x015c1f9a
              0x015c1f9c
              0x00000000
              0x015c1f9c
              0x015c1f6c
              0x00000000
              0x015c1f6c
              0x015c1f74
              0x015c1f78
              0x015c1f7a
              0x015c1f7a
              0x015c1f80
              0x015c1f89
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1f89
              0x00000000
              0x015c1f80
              0x00000000
              0x015c1f6c
              0x00000000
              0x015c1f6a
              0x015c1f5b
              0x015c1f46
              0x00000000
              0x015c1f27
              0x015c2010
              0x015c2012
              0x00000000
              0x015c2012
              0x015c1d61
              0x015c1d63
              0x00000000
              0x00000000
              0x015c1d69
              0x015c1d6c
              0x00000000
              0x00000000
              0x015c1d7b
              0x015c1d7e
              0x015c1d80
              0x015c1d82
              0x015c1d82
              0x015c1d88
              0x015c1d48
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1d8a
              0x015c1d8a
              0x015c1d8d
              0x015c1d91
              0x015c1d96
              0x015c1d98
              0x015c1d9c
              0x015c1d9f
              0x015c1da4
              0x015c1dac
              0x00000000
              0x015c1dae
              0x015c1dae
              0x015c1dae
              0x015c1db4
              0x015c1db6
              0x015c1db9
              0x015c1db9
              0x015c1dbf
              0x00000000
              0x00000000
              0x015c1dc4
              0x015c1ddd
              0x015c1ddd
              0x015c1de3
              0x015c2008
              0x00000000
              0x015c1de9
              0x015c1de9
              0x015c1dec
              0x015c1dee
              0x00000000
              0x015c1dee
              0x015c1dc6
              0x00000000
              0x015c1dc6
              0x015c1dca
              0x015c1dce
              0x015c1dd0
              0x015c1dd6
              0x015c1ddb
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x015c1ddb
              0x00000000
              0x015c1dd6
              0x00000000
              0x015c1dc6
              0x00000000
              0x015c1dc4
              0x015c1db9
              0x015c1dac
              0x015c1d88
              0x00000000
              0x015c1d5b
              0x015c1e28
              0x00000000
              0x015c1e28
              0x015c1d22
              0x015c1e31
              0x015c1e31

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: tolower
              • String ID: -$]
              • API String ID: 3025214199-736542798
              • Opcode ID: 11257d580f5d66371c6b0b59c540b39e7e763573dc263d1f96af6cab6cde9458
              • Instruction ID: 8fb9c9ef4c5fb4c2c14b36fa2053f4151f8d94174586320bb92d5cb7e3e392d7
              • Opcode Fuzzy Hash: 11257d580f5d66371c6b0b59c540b39e7e763573dc263d1f96af6cab6cde9458
              • Instruction Fuzzy Hash: 7A81D631608B27CFD7209E9980D026EFBD67B89900F494B2ED998DF303E734E9558B91
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • InterlockedExchangeAdd.KERNEL32 ref: 015C09E2
              • InterlockedIncrement.KERNEL32 ref: 015C09FF
              • InterlockedDecrement.KERNEL32 ref: 015C0A13
              • InterlockedExchangeAdd.KERNEL32 ref: 015C0A3E
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: Interlocked$Exchange$DecrementIncrement
              • String ID:
              • API String ID: 3802921688-0
              • Opcode ID: 7c59f408802eb27cdfa87d96bd25de6b90da8b425b8e6f04a934fa104aba280c
              • Instruction ID: 50be7d2317fc3d13d3a105c85a73aab56dc58f54460eb3212f5618e1dfaacff3
              • Opcode Fuzzy Hash: 7c59f408802eb27cdfa87d96bd25de6b90da8b425b8e6f04a934fa104aba280c
              • Instruction Fuzzy Hash: 9FF04FF6806203CEE6483FBC950632F7DE47B90A00F84492CD9C54E145E67D825C87A3
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 601 15c33d0-15c33e3 602 15c3598-15c35a5 _errno 601->602 603 15c33e9-15c33ec 601->603 604 15c3527-15c3533 602->604 605 15c3578-15c3591 _errno 603->605 606 15c33f2-15c3411 _fullpath 603->606 607 15c3460-15c3474 606->607 608 15c3413-15c3427 606->608 607->607 610 15c3476-15c347b 607->610 608->608 609 15c3429-15c342e 608->609 611 15c3568-15c356b 609->611 612 15c3434-15c3448 609->612 613 15c3558-15c355e 610->613 614 15c3481-15c3487 610->614 611->605 615 15c348a-15c3491 612->615 616 15c344a-15c344d 612->616 613->614 614->615 618 15c3494-15c34a8 615->618 616->615 617 15c344f-15c345b 616->617 617->615 618->618 619 15c34aa-15c34af 618->619 620 15c34b7-15c34d2 malloc 619->620 621 15c34b1-15c34b4 619->621 622 15c35bf-15c35ca _errno 620->622 623 15c34d8-15c34e4 620->623 621->620 622->604 624 15c3538-15c353a 623->624 625 15c34e6-15c34f5 623->625 626 15c34f7-15c34f9 call 15c3220 624->626 627 15c353c-15c3544 624->627 625->626 630 15c34fe-15c3507 626->630 627->626 629 15c3546-15c3550 627->629 629->626 631 15c350d-15c3523 630->631 632 15c35b0-15c35ba call 15c0e90 630->632 631->604 632->604
              C-Code - Quality: 60%
              			E015C33D0() {
              				void* _t37;
              				unsigned int _t42;
              				void* _t43;
              				unsigned int _t46;
              				void* _t48;
              				void* _t49;
              				intOrPtr _t50;
              				unsigned int _t55;
              				void* _t58;
              				unsigned int _t59;
              				signed int _t63;
              				signed char _t67;
              				signed int _t70;
              				signed int _t72;
              				void* _t74;
              				signed int _t76;
              				void* _t82;
              				void* _t86;
              				void* _t87;
              				void* _t89;
              				void** _t90;
              
              				_t90 = _t89 - 0x12c;
              				_t37 = _t90[0x50];
              				if(_t37 == 0) {
              					L015C4570();
              					_t87 = 0;
              					 *_t37 = 0x16;
              					goto L20;
              				} else {
              					if( *_t37 == 0) {
              						L015C4570();
              						 *_t37 = 2;
              						return 0;
              					} else {
              						_t86 =  &(_t90[7]);
              						_t90[2] = 0x104;
              						_t90[1] = _t37;
              						 *_t90 = _t86;
              						L015C4568();
              						_t74 = _t86;
              						if(_t90[7] == 0) {
              							goto L8;
              							L8:
              							_t63 =  *_t74;
              							_t74 = _t74 + 4;
              							_t42 = _t63 - 0x01010101 &  !_t63 & 0x80808080;
              							if(_t42 == 0) {
              								goto L8;
              							} else {
              								if((_t42 & 0x00008080) == 0) {
              									_t42 = _t42 >> 0x10;
              									_t74 = _t74 + 2;
              								}
              								_t43 = _t74;
              								asm("sbb eax, 0x3");
              							}
              						} else {
              							do {
              								_t70 =  *_t74;
              								_t74 = _t74 + 4;
              								_t55 = _t70 - 0x01010101 &  !_t70 & 0x80808080;
              							} while (_t55 == 0);
              							if((_t55 & 0x00008080) == 0) {
              								_t55 = _t55 >> 0x10;
              								_t74 = _t74 + 2;
              							}
              							asm("sbb edx, 0x3");
              							_t82 = _t74 - _t86;
              							_t72 =  *(_t90 + _t82 + 0x1b) & 0x000000ff;
              							_t43 = _t86 + _t82;
              							if(_t72 != 0x2f && _t72 != 0x5c) {
              								 *_t43 = 0x5c;
              								_t43 = _t86 + _t82 + 1;
              							}
              						}
              						_t58 = _t86;
              						 *_t43 = 0x2a;
              						goto L12;
              						L15:
              						asm("sbb ebx, 0x3");
              						_t59 = _t58 - _t86;
              						 *_t90 = _t59 + 0x11c;
              						_t48 = malloc(??);
              						_t87 = _t48;
              						if(_t48 == 0) {
              							L015C4570();
              							 *_t48 = 0xc;
              						} else {
              							_t67 = _t59 + 1;
              							_t49 = _t48 + 0x118;
              							if(_t67 < 4) {
              								if(_t67 != 0) {
              									 *_t49 =  *_t86 & 0x000000ff;
              									if((_t67 & 0x00000002) != 0) {
              										 *((short*)(_t49 + _t67 - 2)) =  *(_t86 + _t67 - 2) & 0x0000ffff;
              									}
              								}
              							} else {
              								 *((intOrPtr*)(_t49 + _t67 - 4)) =  *((intOrPtr*)(_t90 + _t67 + 0x18));
              								_t49 = memcpy(_t49, _t86, _t59 >> 2 << 2);
              								_t90 =  &(_t90[3]);
              							}
              							_t50 = E015C3220(_t49, _t87);
              							 *((intOrPtr*)(_t87 + 0x110)) = _t50;
              							if(_t50 == 0xffffffff) {
              								 *_t90 = _t87;
              								_t87 = 0;
              								E015C0E90();
              							} else {
              								 *_t87 = 0;
              								 *(_t87 + 0x114) = 0;
              								 *((short*)(_t87 + 4)) = 0x110;
              							}
              						}
              						L20:
              						return _t87;
              						goto L30;
              						L12:
              						_t76 =  *_t58;
              						_t58 = _t58 + 4;
              						_t17 = _t76 - 0x1010101; // -16842967
              						_t46 = _t17 &  !_t76 & 0x80808080;
              						if(_t46 == 0) {
              							goto L12;
              						} else {
              							if((_t46 & 0x00008080) == 0) {
              								_t46 = _t46 >> 0x10;
              								_t58 = _t58 + 2;
              							}
              						}
              						goto L15;
              					}
              				}
              				L30:
              			}
























              0x015c33d4
              0x015c33da
              0x015c33e3
              0x015c3598
              0x015c359d
              0x015c359f
              0x00000000
              0x015c33e9
              0x015c33ec
              0x015c3578
              0x015c357f
              0x015c3591
              0x015c33f2
              0x015c33f2
              0x015c33f6
              0x015c33fe
              0x015c3402
              0x015c3405
              0x015c340f
              0x015c3411
              0x00000000
              0x015c3460
              0x015c3460
              0x015c3462
              0x015c346f
              0x015c3474
              0x00000000
              0x015c3476
              0x015c347b
              0x015c3558
              0x015c355b
              0x015c355b
              0x015c3485
              0x015c3487
              0x015c3487
              0x015c3413
              0x015c3413
              0x015c3413
              0x015c3415
              0x015c3422
              0x015c3422
              0x015c342e
              0x015c3568
              0x015c356b
              0x015c356b
              0x015c3438
              0x015c343b
              0x015c343d
              0x015c3442
              0x015c3448
              0x015c3454
              0x015c3457
              0x015c3457
              0x015c3448
              0x015c348f
              0x015c3491
              0x015c3491
              0x015c34b7
              0x015c34bb
              0x015c34be
              0x015c34c6
              0x015c34c9
              0x015c34ce
              0x015c34d2
              0x015c35bf
              0x015c35c4
              0x015c34d8
              0x015c34d8
              0x015c34db
              0x015c34e4
              0x015c353a
              0x015c353f
              0x015c3544
              0x015c354b
              0x015c354b
              0x015c3544
              0x015c34e6
              0x015c34ef
              0x015c34f5
              0x015c34f5
              0x015c34f5
              0x015c34f9
              0x015c34fe
              0x015c3507
              0x015c35b0
              0x015c35b3
              0x015c35b5
              0x015c350d
              0x015c3512
              0x015c3519
              0x015c3523
              0x015c3523
              0x015c3507
              0x015c3527
              0x015c3533
              0x00000000
              0x015c3494
              0x015c3494
              0x015c3496
              0x015c3499
              0x015c34a3
              0x015c34a8
              0x00000000
              0x015c34aa
              0x015c34af
              0x015c34b1
              0x015c34b4
              0x015c34b4
              0x015c34af
              0x00000000
              0x015c34a8
              0x015c33ec
              0x00000000

              APIs
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: _errno$_fullpathmalloc
              • String ID:
              • API String ID: 1031002091-0
              • Opcode ID: 41715c4c4b8619a14151683b9e184baed33c2cd0d107cd384551d8b7fb0dcab2
              • Instruction ID: 8fc27facdae41d51006afb066b2049c30e046c828e042c859cd4cf4707ee44fa
              • Opcode Fuzzy Hash: 41715c4c4b8619a14151683b9e184baed33c2cd0d107cd384551d8b7fb0dcab2
              • Instruction Fuzzy Hash: A341157520460D8FE7559F98C8857AABBE1FF92B04F08846DC6848F291EB7DD449C781
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
                • Part of subcall function 015C09D0: InterlockedExchangeAdd.KERNEL32 ref: 015C09E2
              • WaitForSingleObject.KERNEL32 ref: 015C0B10
              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,014EBC69), ref: 015C0B1F
              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,014EBC69), ref: 015C0B34
              • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,014EBC69), ref: 015C0B47
              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,014EBC69), ref: 015C0B5C
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeave$ExchangeInterlockedObjectSingleWait
              • String ID:
              • API String ID: 3135182226-0
              • Opcode ID: c09d5e467cd451aa9a4c79bf5e1bcde2299975cb2e7f3f3d6cfbd6fba4ddf419
              • Instruction ID: 94ca7c6b7ccefa93fc3dc3daf25e6fb17850c8a330b737285b0d4f9f5c3f77d4
              • Opcode Fuzzy Hash: c09d5e467cd451aa9a4c79bf5e1bcde2299975cb2e7f3f3d6cfbd6fba4ddf419
              • Instruction Fuzzy Hash: 45F04BB29053468ED608BFFCD58522E7AF8BB54644F80492DE9848B284D674925C8B53
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 644 15c17a0-15c17bc EnterCriticalSection 645 15c17be 644->645 646 15c17eb-15c17ff LeaveCriticalSection 644->646 647 15c17c0-15c17d6 TlsGetValue GetLastError 645->647 648 15c17d8-15c17da 647->648 649 15c17e4-15c17e9 647->649 648->649 650 15c17dc-15c17df 648->650 649->646 649->647 650->649
              APIs
              • EnterCriticalSection.KERNEL32(?,?,?,?,015C198E), ref: 015C17AC
              • TlsGetValue.KERNEL32(?,?,?,?,?,015C198E), ref: 015C17C5
              • GetLastError.KERNEL32(?,?,?,?,?,?,015C198E), ref: 015C17CF
              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,015C198E), ref: 015C17F2
              Memory Dump Source
              • Source File: 00000002.00000002.262515871.00000000012A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 012A0000, based on PE: true
              • Associated: 00000002.00000002.262506325.00000000012A0000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263355919.00000000015C5000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263369083.00000000015CA000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263375613.00000000015CB000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263381191.00000000015CC000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263393627.00000000015DE000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263401329.00000000015DF000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263413539.00000000015E1000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.263425509.00000000015E4000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265367287.00000000017EC000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265400165.00000000017F4000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265425137.0000000001814000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265434699.0000000001817000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265563022.000000000181A000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265590792.000000000181B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265607760.000000000181C000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265626334.000000000181D000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265641281.0000000001820000.00000008.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000002.00000002.265796853.0000000001821000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_2_2_12a0000_relaunch_app.jbxd
              Similarity
              • API ID: CriticalSection$EnterErrorLastLeaveValue
              • String ID:
              • API String ID: 682475483-0
              • Opcode ID: 9dd0c0523e275a6e602a6e79000de0b4f7efbf71fb35fe5afec374ae28b89e53
              • Instruction ID: bd7fd4390941808538e365871a368a71288abe17473cc0a5a4782777d0a3bd75
              • Opcode Fuzzy Hash: 9dd0c0523e275a6e602a6e79000de0b4f7efbf71fb35fe5afec374ae28b89e53
              • Instruction Fuzzy Hash: 31F0BEB29016428EDB14BFFCD1C461E7AE8BE50A44F05402CCD808F20AE620D558C793
              Uniqueness

              Uniqueness Score: -1.00%