segment%270
segment%54
segment%54
segment%58
segment%54
segment%31
segment%58
segment%58
segment%31
public%12188
public%4989
public%5136
public%5748
public%5131
public%3530
KiUserCallbackDispatcher
DefWindowProcA
public%5983
public%5985
public%3530
KiUserCallbackDispatcher
PeekMessageA
public%12350
public%12255
public%5712
public%5708
public%214
public%5707
public%3530
public%214
public%6004
public%13188
BaseThreadInitThunk
segment%276
segment%270
segment%58
segment%58
segment%0
segment%58
segment%31
segment%0
segment%58
segment%420
NtWaitForSingleObject
WaitForSingleObjectEx
WaitForSingleObjectEx
WaitForSingleObject
public%11305
public%2339
public%3423
public%250
public%2337
public%2338
BaseThreadInitThunk
public%11302
0
0
0
0
0
1
0
0
0
1
0
0
0
0
0
0
0
0
0
1
0
1
1
1
1
0
0
0
0
0
0
174
0
0
0
6
0
0
0
0
0
0
0
0
0
10
0
106
24
14
350
0
0
0
0
0
0
78
0
0
0
0
0
0
0
0
0
0
0
0
0
3
0
75
21
2
233
0
normal
normal
high
normal
normal
normal
normal
high
normal
normal
normal
normal
normal
C:\Windows\system32
C:\Windows\system32
C:\Windows\system32
C:\Windows\system32
C:\Windows\system32
C:\Windows\system32
C:\Windows\system32
C:\Windows\system32
C:\Windows\system32
C:\Windows\system32
C:\Windows\System32
C:\Windows\System32
C:\Windows\system32
normal
normal
normal
normal
normal
below normal
normal
high
normal
normal
C:\Windows\system32
C:\Windows\system32
C:\Windows\System32
C:\Windows\system32
C:\Windows\system32
E:\antivr
C:\Windows\system32
C:\Windows\system32
C:\Windows
C:\Program Files\McAfee\
0 0
normal
C:\Program Files\McAfee\
1 9
normal
C:\Program Files\Microso
0 0
normal
C:\Program Files\McAfee\
0 0
0 0
0
0
normal
normal
C:\Windows\system32
C:\Program Files\McAfee\
0 0
0 0
0
0
normal
normal
C:\Windows\system32
C:\Program Files\TuneUp
0 0
high
C:\Program Files\McAfee\
0 0
normal
C:\Program Files\McAfee\
848 conhost.exe
b70 SearchIndexer.exe
c34 LogonUI.exe
cpu
eax
ebx
ecx
edx
esi
edi
eip
esp
ebp
0 0 0 normal
0 0 0 normal
1 115 20 high
C:\Windows\system32
C:\Windows\system32
C:\Windows\system32
registers:
= 00000000
= 018b27f0
= 00000000
= 00000000
= 0012f7d4
= 0012f860
= 00603334
= 0012f604
= 0012f734
stack dump:
0012f604 f0
0012f614 11
0012f624 08
0012f634 00
0012f644 78
0012f654 d0
0012f664 01
0012f674 78
0012f684 b6
0012f694 00
0012f6a4 17
0012f6b4 00
0012f6c4 11
0012f6d4 fc
0012f6e4 88
0012f6f4 00
0012f704 d8
0012f714 4f
0012f724 00
0012f734 74
27
00
73
00
05
fb
00
f8
72
00
04
00
00
f6
02
00
98
e1
00
f7
8b
00
2c
00
97
75
00
12
2c
00
0a
00
00
12
02
00
31
2b
00
12
01
00
77
00
00
7b
00
00
77
00
74
00
00
00
00
00
77
77
00
00
d4
d4
88
48
84
00
01
e3
fd
00
ef
00
f8
00
11
00
78
1c
01
47
f7
f7
02
f6
f6
00
00
62
f7
00
86
00
93
00
00
00
05
fa
00
ab
12
12
02
12
12
00
00
31
09
00
2c
00
ad
00
00
00
97
75
00
4a
00
00
00
00
00
00
00
77
74
00
77
00
00
00
00
00
00
7b
00
00
4e
c0
11
72
1c
00
54
94
88
88
6e
07
03
07
d4
0c
48
60
01
d4
6b
f6
00
8e
73
00
f6
7f
02
02
02
00
00
00
f7
f7
f7
f8
00
f7
4a
12
00
2c
2c
00
12
4b
02
02
04
00
00
00
12
12
12
12
00
12
00
00
00
77
77
00
00
0c
00
00
00
00
00
00
00
00
00
00
00
00
60
3c
00
d8
b6
dc
4f
fe
11
d8
03
1c
e0
00
80
72
84
d4
18
5c
f8
f6
00
98
72
9e
e1
ff
00
9e
00
00
f6
00
60
8e
e1
f7
f7
f7
12
12
00
31
2c
28
2b
ff
00
28
00
03
12
00
28
2c
2b
12
12
12
00
00
00
77
77
00
77
ff
00
00
00
00
00
00
03
77
77
00
00
00
.'......NkJ.`...
............<...
.s,w............
....H...r.,w..1w
x........s,w.r,w
..u{..........(.
........T...O.+w
x....b1w..K.....
.r,w...t........
..............(.
...t..,wn.......
................
................
................
.............`(.
............r.,w
..1wx...H.....+w
O.+w..u{`.......
................
t...G.J.....\...
disassembling:
006032fc public segment%270.public%12188 (PCMAV.exe): ; function entry point
006032fc push
ebx
006032fd push
esi
006032fe mov
esi, edx
00603300 mov
ebx, eax
00603302 mov
byte ptr [$6f6a35], 1
00603309 xor
edx, edx
0060330b mov
eax, ebx
0060330d call
+$9ae ($603cc0)
; segment%270.public%12194 (PCMAV.exe)
0060330d
00603312 push
$64
00603314 call
-$1a4271 ($45f0a8)
; segment%26.public%2663 (PCMAV.exe)
00603314
00603319 mov
dword ptr [esi+$c], 1
00603320 xor
edx, edx
00603322 mov
eax, [ebx+$4b8]
00603328 mov
ecx, [eax]
0060332a call
dword ptr [ecx+$30]
0060332a
0060332d mov
eax, [$69d790]
00603332 mov
eax, [eax]
00603334 > mov
eax, [eax+$364]
0060333a cmp
byte ptr [eax+$37], 0
0060333e jz
loc_60334b
0060333e
00603340 mov
edx, [$69d790]
00603346 call
-$11caa3 ($4e68a8)
; segment%68.public%6988 (PCMAV.exe)
00603346
0060334b loc_60334b:
0060334b mov
eax, [ebx+$528]
00603351 test
eax, eax
00603353 jz
loc_603361
00603353
00603355 call
+$14b2e ($617e88)
; segment%279.public%12392 (PCMAV.exe)
00603355
0060335a push
1
0060335c call
-$1a42b9 ($45f0a8)
; segment%26.public%2663 (PCMAV.exe)
0060335c
00603361 loc_603361:
00603361 mov
eax, [ebx+$360]
00603367 cmp
byte ptr [eax+$37], 0
0060336b jz
loc_603372
0060336b
0060336d call
-$11caca ($4e68a8)
; segment%68.public%6988 (PCMAV.exe)
0060336d
00603372 loc_603372:
00603372 mov
edx, esi
00603374 mov
eax, ebx
00603376 call
-$1438a3 ($4bfad8)
; segment%58.public%5834 (PCMAV.exe)
00603376
0060337b pop
esi
0060337c pop
ebx
0060337d ret