Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
cmd.exe

Overview

General Information

Sample name:cmd.exe
Analysis ID:1401070
MD5:133d568eccb557e37bea1459521cbac2
SHA1:2cdacaf6d55cc4f9e26075bd65f65b4d52fb6b47
SHA256:05a30592d2c3421c41121145c6eefa7c81fea6b42d6233a522240a8468326b9c

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Binary contains a suspicious time stamp
PE file contains sections with non-standard names
Program does not show much activity (idle)
Tries to load missing DLLs

Classification

  • System is w10x64_ra
  • cmd.exe (PID: 3532 cmdline: C:\Users\user\Desktop\cmd.exe MD5: 133D568ECCB557E37BEA1459521CBAC2)
    • conhost.exe (PID: 3968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • rundll32.exe (PID: 4892 cmdline: C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding MD5: EF3179D498793BF4234F708D3BE28633)
  • cleanup
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: cmd.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\cmd.exeSection loaded: winbrand.dll
Source: C:\Users\user\Desktop\cmd.exeSection loaded: wldp.dll
Source: classification engineClassification label: clean2.winEXE@3/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3968:120:WilError_03
Source: cmd.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\cmd.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: unknownProcess created: C:\Users\user\Desktop\cmd.exe C:\Users\user\Desktop\cmd.exe
Source: C:\Users\user\Desktop\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\rundll32.exe C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: cmd.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: cmd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: cmd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: cmd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: cmd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: cmd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: cmd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: cmd.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: cmd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: cmd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: cmd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: cmd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: cmd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: cmd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: cmd.exeStatic PE information: 0xC4DE9332 [Fri Aug 31 06:03:30 2074 UTC]
Source: cmd.exeStatic PE information: section name: .didat
Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Rundll32
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Timestomp
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
cmd.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1401070
Start date and time:2024-02-29 19:27:00 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:17
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
Analysis Mode:stream
Analysis stop reason:Timeout
Sample name:cmd.exe
Detection:CLEAN
Classification:clean2.winEXE@3/0@0/0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: cmd.exe
No created / dropped files found
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):5.8872287334927575
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:cmd.exe
File size:323'584 bytes
MD5:133d568eccb557e37bea1459521cbac2
SHA1:2cdacaf6d55cc4f9e26075bd65f65b4d52fb6b47
SHA256:05a30592d2c3421c41121145c6eefa7c81fea6b42d6233a522240a8468326b9c
SHA512:1e4f145be5efa85a7c9a4f0163add8080f5792f68d7432e038b9e8009bed7eeb8631c177fbc0a24a1098437d03034f9cbeb6beb6089ad8a446be8df51e76c813
SSDEEP:6144:eIQqRhWvO9e0eZVZVw7Dja6GxAzUBKw0HZn4Gtk4OIuveNm:eIQErQ0+VZVwHja6GyzUBPtveN
TLSH:E564391D23A81CE5D9679239C943C265D672BC346721A2EF13E0CE7B3E13AE57638B05
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........Q...?...?...?...>...?.......?...>...?...;...?...<...?...:...?...2...?.......?.......?...=...?.Rich..?.................PE..d..
Icon Hash:a43a7ac70101a5a0
Entrypoint:0x14001f8f0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Time Stamp:0xC4DE9332 [Fri Aug 31 06:03:30 2074 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:d73e39dab3c8b57aa408073d01254964
Instruction
dec eax
sub esp, 28h
call 00007F8E087DEA88h
dec eax
add esp, 28h
jmp 00007F8E087DE313h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
nop word ptr [eax+eax+00000000h]
dec eax
cmp ecx, dword ptr [00020789h]
jne 00007F8E087DE4C2h
dec eax
rol ecx, 10h
test cx, FFFFh
jne 00007F8E087DE4B3h
ret
dec eax
ror ecx, 10h
jmp 00007F8E087DE4F7h
int3
int3
int3
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
xor ecx, ecx
call dword ptr [00017273h]
dec eax
mov ecx, ebx
call dword ptr [00017272h]
call dword ptr [0001759Ch]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [000175A8h]
jno 00007F8E087DE47Ch
ficomp dword ptr [edx]
mov dh, 17h
mov eax, 4C894899h
and al, 08h
dec eax
sub esp, 38h
mov ecx, 00000017h
call dword ptr [000175ACh]
test eax, eax
je 00007F8E087DE4B9h
mov ecx, 00000002h
int 29h
dec eax
lea ecx, dword ptr [0002092Ah]
call 00007F8E087DE696h
dec eax
mov eax, dword ptr [esp+38h]
dec eax
mov dword ptr [00020A11h], eax
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x3cdb00x348.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x600000x84f8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5c0000x2568.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x690000x1d0.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x38cd40x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x361e00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x36ac00x9f0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3ca300xa0.rdata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x3463d0x35000d22a9e7f26231b89f8e3df6f2b0956d4False0.5539412588443396data6.314152720180916IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x360000x96020xa0002e7a4cf079f9019c8eabf5076c322dcaFalse0.3649658203125data4.7667577734815865IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x400000x1bde80x10009d1da2fdcd36968cd1919fefffd989e2False0.051513671875data0.5221724622089867IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x5c0000x25680x3000f8d23003a37a8ff8634b01882a104615False0.4017740885416667PEX Binary Archive4.649387667404506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.didat0x5f0000xa80x1000067a9122c94b36adffdd2fb1491c3b90False0.022216796875data0.2144834811232793IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x600000x84f80x900096faea60cc849ab485836a4673b7655aFalse0.2635362413194444data4.121480306224635IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x690000x1d00x100081cc13725029939df2b158c5d05c0bbaFalse0.088134765625data0.9934656351791974IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
MUI0x684200xd8dataEnglishUnited States0.5185185185185185
RT_ICON0x607780x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.21097560975609755
RT_ICON0x60de00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.2647849462365591
RT_ICON0x610c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.3783783783783784
RT_ICON0x611f00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.11567164179104478
RT_ICON0x620980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.18592057761732853
RT_ICON0x629400x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.08236994219653179
RT_ICON0x62ea80x169ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.968048359240069
RT_ICON0x645480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.06130705394190871
RT_ICON0x66af00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.1177298311444653
RT_ICON0x67b980x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.09308510638297872
RT_GROUP_ICON0x680000x92dataEnglishUnited States0.636986301369863
RT_VERSION0x680980x388dataEnglishUnited States0.46792035398230086
RT_MANIFEST0x603500x428XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.43609022556390975
DLLImport
api-ms-win-crt-string-l1-1-0.dllwcscmp, wcsncmp, memset, wcsspn
api-ms-win-crt-time-l1-1-0.dll_time32
api-ms-win-crt-runtime-l1-1-0.dll_initterm, _initterm_e, _register_thread_local_exe_atexit_callback, _c_exit
api-ms-win-crt-private-l1-1-0.dll_o__get_initial_narrow_environment, _o__get_osfhandle, _o__getch, _o__initialize_narrow_environment, _o__initialize_onexit_table, _o__invalid_parameter_noinfo, _o__open_osfhandle, _o__pclose, _o__pipe, _o__purecall, _o__register_onexit_function, _o__seh_filter_exe, _o__set_app_type, _o__set_fmode, _o__set_new_mode, _o__setmode, _o__tell, _o__ultoa, _o__ultoa_s, __intrinsic_setjmp, _o__wcsicmp, _o__wcslwr, _o__wcsnicmp, _o__wcsupr, _o__wpopen, _o__wtol, _o_calloc, _o_exit, _o_feof, _o_ferror, _o_fflush, _o_fgets, _o_free, _o_iswalpha, _o_iswdigit, _o_iswspace, _o_iswxdigit, _o_malloc, _o_qsort, _o_rand, _o_realloc, _o_setlocale, _o_srand, _o_terminate, _o_towlower, _o_towupper, _o_wcstol, _o_wcstoul, __CxxFrameHandler3, __current_exception, __current_exception_context, _CxxThrowException, _o__exit, _o__errno, _o__dup2, _o__dup, _o__crt_atexit, _o__configure_narrow_argv, _o__configthreadlocale, _o__close, _o__cexit, _o__callnewh, _o___stdio_common_vswscanf, _o___stdio_common_vswprintf, _o___stdio_common_vfprintf, _o___std_exception_destroy, _o___std_exception_copy, _o___p__commode, _o___p___argv, _o___p___argc, _o___acrt_iob_func, wcsstr, wcsrchr, wcschr, longjmp, __C_specific_handler, _local_unwind, memcmp, memcpy, memmove
ntdll.dllRtlCreateUnicodeStringFromAsciiz, RtlDosPathNameToNtPathName_U, NtOpenProcessToken, NtQueryInformationToken, NtCancelSynchronousIoFile, NtOpenThreadToken, RtlNtStatusToDosError, NtQueryInformationProcess, NtFsControlFile, NtSetInformationProcess, RtlFreeHeap, NtQueryVolumeInformationFile, NtSetInformationFile, RtlDosPathNameToRelativeNtPathName_U_WithStatus, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, NtOpenFile, RtlReleaseRelativeName, RtlFreeUnicodeString, NtClose, RtlFindLeastSignificantBit
api-ms-win-core-libraryloader-l1-2-0.dllLoadLibraryExW, GetModuleFileNameA, GetModuleHandleW, GetModuleHandleExW, GetModuleFileNameW, GetProcAddress
api-ms-win-core-synch-l1-1-0.dllReleaseSRWLockShared, CreateSemaphoreExW, EnterCriticalSection, ReleaseSemaphore, LeaveCriticalSection, InitializeCriticalSectionEx, InitializeCriticalSection, TryAcquireSRWLockExclusive, WaitForSingleObject, ReleaseMutex, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, DeleteCriticalSection, AcquireSRWLockShared, CreateMutexExW, WaitForSingleObjectEx, OpenSemaphoreW
api-ms-win-core-heap-l1-1-0.dllHeapSize, HeapReAlloc, HeapSetInformation, HeapAlloc, HeapFree, GetProcessHeap
api-ms-win-core-errorhandling-l1-1-0.dllSetUnhandledExceptionFilter, UnhandledExceptionFilter, SetErrorMode, SetLastError, GetLastError
api-ms-win-core-threadpool-l1-2-0.dllCreateThreadpoolTimer, CloseThreadpoolTimer, WaitForThreadpoolTimerCallbacks, SetThreadpoolTimer
api-ms-win-core-processthreads-l1-1-0.dllDeleteProcThreadAttributeList, GetCurrentProcessId, GetStartupInfoW, CreateProcessAsUserW, CreateProcessW, UpdateProcThreadAttribute, GetCurrentProcess, ResumeThread, GetCurrentThreadId, GetExitCodeProcess, TerminateProcess, InitializeProcThreadAttributeList, OpenThread
api-ms-win-core-localization-l1-2-0.dllSetThreadLocale, FormatMessageW, GetCPInfo, GetThreadLocale, GetLocaleInfoW, GetACP, GetUserDefaultLCID
api-ms-win-core-debug-l1-1-0.dllDebugBreak, OutputDebugStringW, IsDebuggerPresent
api-ms-win-core-handle-l1-1-0.dllCloseHandle, DuplicateHandle
api-ms-win-core-memory-l1-1-0.dllVirtualAlloc, ReadProcessMemory, VirtualQuery, VirtualFree
api-ms-win-core-console-l1-1-0.dllGetConsoleOutputCP, GetConsoleMode, SetConsoleCtrlHandler, ReadConsoleW, WriteConsoleW, SetConsoleMode
api-ms-win-core-file-l1-1-0.dllFindNextFileW, SetFileTime, DeleteFileW, CreateFileW, SetFileAttributesW, GetFileSize, CreateDirectoryW, FindClose, FindFirstFileW, GetFullPathNameW, ReadFile, FlushFileBuffers, SetFilePointer, RemoveDirectoryW, CompareFileTime, FindFirstFileExW, GetVolumePathNameW, SetEndOfFile, GetFileAttributesW, GetFileAttributesExW, GetDriveTypeW, GetFileType, GetDiskFreeSpaceExW, FileTimeToLocalFileTime, GetVolumeInformationW, WriteFile, SetFilePointerEx
api-ms-win-core-string-l1-1-0.dllWideCharToMultiByte, MultiByteToWideChar
api-ms-win-core-processenvironment-l1-1-0.dllSearchPathW, GetEnvironmentVariableW, SetCurrentDirectoryW, GetEnvironmentStringsW, ExpandEnvironmentStringsW, FreeEnvironmentStringsW, GetStdHandle, SetEnvironmentVariableW, GetCommandLineW, SetEnvironmentStringsW, GetCurrentDirectoryW
api-ms-win-core-console-l2-1-0.dllFlushConsoleInputBuffer, SetConsoleCursorPosition, ScrollConsoleScreenBufferW, FillConsoleOutputAttribute, SetConsoleTextAttribute, GetConsoleScreenBufferInfo, FillConsoleOutputCharacterW
api-ms-win-security-base-l1-1-0.dllRevertToSelf, GetFileSecurityW, GetSecurityDescriptorOwner
api-ms-win-core-sysinfo-l1-1-0.dllGetSystemTimeAsFileTime, GetVersion, SetLocalTime, GetLocalTime, GetSystemTime, GetWindowsDirectoryW
api-ms-win-core-timezone-l1-1-0.dllFileTimeToSystemTime, SystemTimeToFileTime
api-ms-win-core-datetime-l1-1-0.dllGetTimeFormatW, GetDateFormatW
api-ms-win-core-systemtopology-l1-1-0.dllGetNumaNodeProcessorMaskEx, GetNumaHighestNodeNumber
api-ms-win-core-console-l2-2-0.dllSetConsoleTitleW, GetConsoleTitleW
api-ms-win-core-processenvironment-l1-2-0.dllNeedCurrentDirectoryForExePathW
api-ms-win-core-registry-l1-1-0.dllRegCloseKey, RegQueryValueExW, RegDeleteValueW, RegCreateKeyExW, RegDeleteKeyExW, RegOpenKeyExW, RegSetValueExW, RegEnumKeyExW
api-ms-win-core-file-l2-1-0.dllCreateHardLinkW, GetFileInformationByHandleEx, CreateSymbolicLinkW, MoveFileExW, MoveFileWithProgressW
api-ms-win-core-heap-l2-1-0.dllGlobalFree, GlobalAlloc, LocalFree
api-ms-win-core-file-l2-1-2.dllCopyFileW
api-ms-win-core-io-l1-1-0.dllDeviceIoControl
api-ms-win-core-console-l3-2-0.dllGetConsoleWindow
api-ms-win-core-processtopology-l1-1-0.dllGetThreadGroupAffinity
api-ms-win-core-processthreads-l1-1-1.dllIsProcessorFeaturePresent
api-ms-win-core-profile-l1-1-0.dllQueryPerformanceCounter
api-ms-win-core-interlocked-l1-1-0.dllInitializeSListHead
api-ms-win-core-misc-l1-1-0.dlllstrcmpW, lstrcmpiW
api-ms-win-core-apiquery-l1-1-0.dllApiSetQueryApiSetPresence
api-ms-win-core-delayload-l1-1-1.dllResolveDelayLoadedAPI
api-ms-win-core-delayload-l1-1-0.dllDelayLoadFailureHook
Language of compilation systemCountry where language is spokenMap
EnglishUnited States