Create Interactive Tour

Windows Analysis Report
lsass.exe

Overview

General Information

Sample name:lsass.exe
Analysis ID:1451836
MD5:60e18f7b8d1f43731d0e9169c2d16547
SHA1:83ebb66f070956225959ee773b468f89ed55479c
SHA256:efa9e8325232bbd3f9a118d396de04370e56c3c7b6d552fab46b5b39f3ad522d
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic
Sigma detected: System File Execution Location Anomaly
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Program does not show much activity (idle)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • lsass.exe (PID: 3040 cmdline: "C:\Users\user\Desktop\lsass.exe" MD5: 60E18F7B8D1F43731D0E9169C2D16547)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\Desktop\lsass.exe", CommandLine: "C:\Users\user\Desktop\lsass.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\lsass.exe, NewProcessName: C:\Users\user\Desktop\lsass.exe, OriginalFileName: C:\Users\user\Desktop\lsass.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Users\user\Desktop\lsass.exe", ProcessId: 3040, ProcessName: lsass.exe
Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\lsass.exe", CommandLine: "C:\Users\user\Desktop\lsass.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\lsass.exe, NewProcessName: C:\Users\user\Desktop\lsass.exe, OriginalFileName: C:\Users\user\Desktop\lsass.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Users\user\Desktop\lsass.exe", ProcessId: 3040, ProcessName: lsass.exe
Timestamp:06/04/24-16:54:47.252299
SID:2052879
Source Port:58260
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected
Timestamp:06/04/24-16:54:47.252564
SID:2052879
Source Port:63427
Destination Port:53
Protocol:UDP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results
Source: lsass.exeStatic PE information: certificate valid
Source: lsass.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: lsass.pdb source: lsass.exe
Source: Binary string: lsass.pdbUGP source: lsass.exe

Networking

barindex
Source: TrafficSnort IDS: 2052879 ET TROJAN SocGholish Domain in DNS Lookup (africa .thesmalladventureguide .com) 192.168.2.16:58260 -> 1.1.1.1:53
Source: TrafficSnort IDS: 2052879 ET TROJAN SocGholish Domain in DNS Lookup (africa .thesmalladventureguide .com) 192.168.2.16:63427 -> 1.1.1.1:53
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF21C0 SetErrorMode,SetUnhandledExceptionFilter,RtlSetProcessIsCritical,WerSetFlags,NtSetInformationProcess,NtSetInformationProcess,ExitThread,NtSetInformationProcess,SetLastError,0_2_00007FF670FF21C0
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF3550 RtlInitUnicodeString,NtOpenEvent,RtlNtStatusToDosError,SetLastError,0_2_00007FF670FF3550
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF2650 TlsAlloc,NtOpenFile,CreateThreadpool,SetThreadpoolThreadMaximum,CreateThreadpoolIo,NtAllocateVirtualMemory,GetLastError,GetLastError,GetLastError,0_2_00007FF670FF2650
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF1170 TlsGetValue,GetCurrentProcess,GetCurrentProcess,DuplicateHandle,NtSetInformationThread,0_2_00007FF670FF1170
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF1390 NtDeviceIoControlFile,0_2_00007FF670FF1390
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF14B0 TlsSetValue,TlsSetValue,NtClose,RtlFreeHeap,RtlEnterCriticalSection,RtlLeaveCriticalSection,0_2_00007FF670FF14B0
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF5DC0 NtDeviceIoControlFile,0_2_00007FF670FF5DC0
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF20D0 memset,NtReplyWaitReceivePort,0_2_00007FF670FF20D0
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF32E0 RtlLengthSid,RtlLengthSid,RtlLengthSid,RtlLengthSid,RtlLengthSid,RtlAllocateHeap,RtlCreateAcl,RtlAddAccessAllowedAce,RtlAddAccessAllowedAce,RtlAddAccessAllowedAce,RtlAddAccessAllowedAce,RtlAddAccessAllowedAce,RtlCreateSecurityDescriptor,RtlSetDaclSecurityDescriptor,NtSetSecurityObject,CloseHandle,RtlFreeHeap,GetLastError,0_2_00007FF670FF32E0
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF4500 RtlInitUnicodeString,NtCreatePort,RtlInitUnicodeString,NtConnectPort,NtListenPort,NtAcceptConnectPort,NtCompleteConnectPort,CreateThread,CloseHandle,NtClose,0_2_00007FF670FF4500
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF2510 RtlInitUnicodeString,NtOpenFile,NtDeviceIoControlFile,NtSetInformationFile,0_2_00007FF670FF2510
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF1010 memcpy,NtRequestWaitReplyPort,memcpy,0_2_00007FF670FF1010
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF1E10 RtlAllocateHeap,memcpy,TrySubmitThreadpoolCallback,GetLastError,NtFreeVirtualMemory,StartThreadpoolIo,DeviceIoControl,GetLastError,CancelThreadpoolIo,Sleep,0_2_00007FF670FF1E10
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF1390: NtDeviceIoControlFile,0_2_00007FF670FF1390
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF15C00_2_00007FF670FF15C0
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF3B000_2_00007FF670FF3B00
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF3F200_2_00007FF670FF3F20
Source: C:\Users\user\Desktop\lsass.exeCode function: String function: 00007FF670FF5C34 appears 57 times
Source: lsass.exeBinary string: LSALSA_RPC_SERVER_ACTIVEExtensionsExtensionQueryLsaInterfaceInitializeLsaExtensionSystem\CurrentControlSet\Control\LsaExtensionConfig\LsaSrv\SECURITY\LSA_AUTHENTICATION_INITIALIZEDncalrpclsapolicylookupncacn_np\pipe\lsasslpacIdentityServicesSystem\CurrentControlSet\Control\LsaExtensionConfig\InterfacesMaxAsyncWorkerThreadsPerCpuSystem\CurrentControlSet\Control\Lsa\Device\KsecDDPathSystemRoot\SeRmCommandPort\SeLsaCommandPortLSA_SUBSYSTEM_INITIALIZEDSspiSrv.dllIOCTL_KSEC_IPC_GET_QUEUED_FUNCTION_CALLS failed. Error %d
Source: classification engineClassification label: mal52.winEXE@1/0@0/0
Source: lsass.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\lsass.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: lsass.exeStatic PE information: certificate valid
Source: initial sampleStatic PE information: Valid certificate with Microsoft Issuer
Source: lsass.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: lsass.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: lsass.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: lsass.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: lsass.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: lsass.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: lsass.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: lsass.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: lsass.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: lsass.pdb source: lsass.exe
Source: Binary string: lsass.pdbUGP source: lsass.exe
Source: lsass.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: lsass.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: lsass.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: lsass.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: lsass.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: lsass.exeStatic PE information: section name: .didat
Source: C:\Users\user\Desktop\lsass.exeAPI coverage: 2.8 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF43F0 GetSystemInfo,RegOpenKeyExW,RegQueryValueExW,0_2_00007FF670FF43F0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF21C0 SetErrorMode,SetUnhandledExceptionFilter,RtlSetProcessIsCritical,WerSetFlags,NtSetInformationProcess,NtSetInformationProcess,ExitThread,NtSetInformationProcess,SetLastError,0_2_00007FF670FF21C0
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF4A28 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF670FF4A28
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF3B00 RtlAllocateHeap,RtlCreateSecurityDescriptor,GetCurrentProcess,OpenProcessToken,GetTokenInformation,RtlLengthSid,RtlLengthSid,RtlAllocateHeap,RtlSetOwnerSecurityDescriptor,RtlCreateAcl,RtlAddAccessAllowedAce,RtlAddAccessAllowedAce,RtlAddAccessAllowedAce,RtlSetDaclSecurityDescriptor,RtlAllocateAndInitializeSid,RtlCreateAcl,RtlAddMandatoryAce,RtlSetSaclSecurityDescriptor,RtlMakeSelfRelativeSD,RtlAllocateHeap,RtlMakeSelfRelativeSD,CloseHandle,RtlFreeHeap,RtlFreeHeap,0_2_00007FF670FF3B00
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF494C GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,GetTickCount,QueryPerformanceCounter,0_2_00007FF670FF494C
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF24A0 RpcServerListen,I_RpcMapWin32Status,CreateEventW,SetEvent,GetLastError,OpenEventW,0_2_00007FF670FF24A0
Source: C:\Users\user\Desktop\lsass.exeCode function: 0_2_00007FF670FF4500 RtlInitUnicodeString,NtCreatePort,RtlInitUnicodeString,NtConnectPort,NtListenPort,NtAcceptConnectPort,NtCompleteConnectPort,CreateThread,CloseHandle,NtClose,0_2_00007FF670FF4500
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Deobfuscate/Decode Files or Information
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory3
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1451836 Sample: lsass.exe Startdate: 04/06/2024 Architecture: WINDOWS Score: 52 7 Snort IDS alert for network traffic 2->7 9 Sigma detected: System File Execution Location Anomaly 2->9 5 lsass.exe 2->5         started        process3

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
lsass.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
fp2e7a.wpc.phicdn.net
192.229.221.95
truefalse
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1451836
    Start date and time:2024-06-04 16:54:38 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 2m 11s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:3
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:lsass.exe
    Detection:MAL
    Classification:mal52.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 83%
    • Number of executed functions: 2
    • Number of non-executed functions: 32
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Stop behavior analysis, all processes terminated
    • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ocsp.edge.digicert.com
    • VT rate limit hit for: lsass.exe
    No simulations
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    fp2e7a.wpc.phicdn.nethttps://www.google.com.br/url?q=//www.google.it/amp/s/sites.google.com/view/park-concepts/homeGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
    • 192.229.221.95
    http://U6d.vhi4uv.comGet hashmaliciousUnknownBrowse
    • 192.229.221.95
    https://buchanancloud.net/cgi/loginGet hashmaliciousUnknownBrowse
    • 192.229.221.95
    http://qsdqsd.bestphon.inGet hashmaliciousHTMLPhisherBrowse
    • 192.229.221.95
    https://app.smartdraw.com/share.aspx/?pubDocShare=8B0C16134B8382110652EE19C989D308FF5Get hashmaliciousUnknownBrowse
    • 192.229.221.95
    file.exeGet hashmaliciousRedLineBrowse
    • 192.229.221.95
    https://turk.istan.to/hbus/jeep.php?file=syncGet hashmaliciousUnknownBrowse
    • 192.229.221.95
    https://links.cruiseshipcenters.mkt5224.com/els/v2/9e_0Mw~qLNCK/Y1J3Umo3RU9LbGcxWlZCelk3WStueE5QV1g1dEZBTGZJdEx1ZU5oaHJQenh0OUlNMDlmaUUvOHBHU2tqUUZqenNjdTVWQUthd3A4OGtjT1pLUTd6TFRFUUMwOWJ0Y3RCbFR5QXpCTW9teTA9S0/cjFpdmJMRGNtSG1TYXVLVXBSbW0vdlQ0RUUxaDR1eG5FYVVQRjA0bTdWZUNETDNWaHBzeUpndHFQSG8yR0oyMmdQQTVVODNUSys5UzI3TUNrUFkwZFJJb0lRZTJnblY5Z0pYRWlVKzNmeHlWeFZEQXcrTkdHK1VBY2QvZVRIbDBWajEyRmVEZjR6MD0S1Get hashmaliciousUnknownBrowse
    • 192.229.221.95
    https://cosjena.pl/ygt/idbdcdthghGet hashmaliciousUnknownBrowse
    • 192.229.221.95
    https://www.brownfieldagnews.comGet hashmaliciousUnknownBrowse
    • 192.229.221.95
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):5.9183212098884335
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:lsass.exe
    File size:60'640 bytes
    MD5:60e18f7b8d1f43731d0e9169c2d16547
    SHA1:83ebb66f070956225959ee773b468f89ed55479c
    SHA256:efa9e8325232bbd3f9a118d396de04370e56c3c7b6d552fab46b5b39f3ad522d
    SHA512:45509ec64f1ee5faad4e759d482b7d8dd6c2dacf9bd71257403ab7d7a060ac9e2e9c99dd670592312fde3807b4bb08c6b65b0ac2dbe8c8c457920d2eeab87d89
    SSDEEP:1536:W+IDW1k2ACCJk3TbA3eeLRE7zouliEUPa3z:hIC1k2An3tLi09y3
    TLSH:8E434A4EA79670C6D4A24670C5A74262BF36F36627024BFF12D4C0385E663CAAF35F94
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........iW:..9i..9i..9i.c8h..9i.c:h..9i.p.i..9i..8i..9i.c4h..9i.c9h..9i.c=h..9i.c.i..9i.c;h..9iRich..9i................PE..d...?..J...
    Icon Hash:00928e8e8686b000
    Entrypoint:0x1400048e0
    Entrypoint Section:.text
    Digitally signed:true
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
    Time Stamp:0x4AAAFE3F [Sat Sep 12 01:49:51 2009 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:10
    OS Version Minor:0
    File Version Major:10
    File Version Minor:0
    Subsystem Version Major:10
    Subsystem Version Minor:0
    Import Hash:3924d1606f44d90586a3ec75785c2730
    Signature Valid:true
    Signature Issuer:CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
    Signature Validation Error:The operation completed successfully
    Error Number:0
    Not Before, Not After
    • 08/02/2024 20:22:46 07/02/2025 20:22:46
    Subject Chain
    • CN=Microsoft Windows Publisher, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
    Version:3
    Thumbprint MD5:366DA07E17C53A2BCBBF949B9318E8A9
    Thumbprint SHA-1:09A1AA05288E952C901821DEAECE78D148D2E4D2
    Thumbprint SHA-256:5FC581A4B101E94BFA06E6548DAA244B91B0A62B90D559820FD49BACB625B90B
    Serial:330000047069F2AC064904EC1C000000000470
    Instruction
    dec eax
    sub esp, 28h
    call 00007F2CA4B6D9C8h
    dec eax
    add esp, 28h
    jmp 00007F2CA4B6D8C3h
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    int3
    nop word ptr [eax+eax+00000000h]
    dec eax
    cmp ecx, dword ptr [00008769h]
    jne 00007F2CA4B6D972h
    dec eax
    rol ecx, 10h
    test cx, FFFFh
    jne 00007F2CA4B6D963h
    ret
    dec eax
    ror ecx, 10h
    jmp 00007F2CA4B6DAA7h
    int3
    int3
    int3
    int3
    int3
    int3
    jmp dword ptr [00003BF6h]
    int3
    int3
    int3
    int3
    int3
    int3
    jmp dword ptr [00003BFAh]
    int3
    int3
    int3
    int3
    int3
    int3
    dec eax
    mov dword ptr [esp+20h], ebx
    push ebp
    dec eax
    mov ebp, esp
    dec eax
    sub esp, 20h
    dec eax
    and dword ptr [ebp+18h], 00000000h
    dec eax
    mov ebx, 2DDFA232h
    cdq
    sub eax, dword ptr [eax]
    add byte ptr [eax-75h], cl
    add eax, 00008711h
    dec eax
    cmp eax, ebx
    jne 00007F2CA4B6D9F9h
    dec eax
    lea ecx, dword ptr [ebp+18h]
    call dword ptr [00003D56h]
    dec eax
    mov eax, dword ptr [ebp+18h]
    dec eax
    mov dword ptr [ebp+10h], eax
    call dword ptr [00003CA8h]
    mov eax, eax
    dec eax
    xor dword ptr [ebp+10h], eax
    call dword ptr [00003CA4h]
    mov eax, eax
    dec eax
    xor dword ptr [ebp+10h], eax
    call dword ptr [00003D38h]
    Programming Language:
    • [IMP] VS2008 SP1 build 30729
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0xb5500xb0.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0xb6000x1b8.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x708.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0xe0000x654.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0xc4000x28e0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x110000x200.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x90700x70.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x70700x118.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x84b80x420.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xb41c0x40.rdata
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x50f70x5200faab5d44d9331e1acbeff4249f6a71fcFalse0.5247713414634146data5.871715930250279IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x70000x57760x580095f8c6799f532f29d934cfd379b301d1False0.33642578125data4.515878226815834IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0xd0000x8500x200169857542ef95792982897cd9219e12dFalse0.140625data0.8232739801820367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0xe0000x6540x800a4c446c606c9bceb6bce40a4b29f294dFalse0.40478515625PEX Binary Archive3.6896573898382914IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .didat0xf0000x300x200afdaaa9b04d9f0a3b5c5b43e082745c6False0.060546875data0.338777230370671IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x100000x7080x800a659fbccf6956a97642629289f4f322aFalse0.40771484375data4.076294532307643IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x110000x2000x200e179b26055bf037dcfade000ff97bd6dFalse0.775390625data5.2829730313258585IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_VERSION0x103600x3a8dataEnglishUnited States0.46153846153846156
    RT_MANIFEST0x100a00x2c0XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5142045454545454
    DLLImport
    api-ms-win-core-crt-l1-1-0.dllwcschr, _wcsicmp, wcstol, _vsnprintf_s, strcpy_s, memcpy, memset
    api-ms-win-core-crt-l2-1-0.dll_initterm_e, exit, _initterm
    ntdll.dllNtSetInformationThread, RtlReleaseResource, NtFreeVirtualMemory, NtConnectPort, NtRequestWaitReplyPort, RtlLeaveCriticalSection, NtAllocateVirtualMemory, NtClose, NtAcceptConnectPort, NtReplyWaitReceivePort, RtlCaptureContext, RtlLookupFunctionEntry, NtCompleteConnectPort, RtlVirtualUnwind, RtlSetDaclSecurityDescriptor, NtCreatePort, RtlSetOwnerSecurityDescriptor, NtDeviceIoControlFile, RtlFreeHeap, RtlSetProcessIsCritical, RtlFreeSid, RtlDeriveCapabilitySidsFromName, RtlAddMandatoryAce, RtlUnhandledExceptionFilter, RtlLengthRequiredSid, RtlCreateAndSetSD, NtSetSecurityObject, NtOpenEvent, RtlSubAuthoritySid, RtlAllocateHeap, NtSetInformationProcess, RtlCreateAcl, RtlInitializeSid, RtlEnterCriticalSection, RtlNtStatusToDosError, RtlAcquireResourceExclusive, RtlCreateSecurityDescriptor, NtOpenFile, RtlAcquireResourceShared, DbgPrintEx, RtlInitializeResource, NtListenPort, RtlSetSaclSecurityDescriptor, RtlAddAccessAllowedAce, RtlLengthSid, RtlAllocateAndInitializeSid, NtSetInformationFile, RtlInitUnicodeString, RtlMakeSelfRelativeSD
    RPCRT4.dllRpcServerUseProtseqEpW, RpcServerRegisterIf3, RpcServerListen, NdrServerCallAll, NdrServerCall2, I_RpcMapWin32Status
    api-ms-win-core-errorhandling-l1-1-0.dllSetUnhandledExceptionFilter, GetLastError, SetErrorMode, SetLastError, UnhandledExceptionFilter
    api-ms-win-core-handle-l1-1-0.dllDuplicateHandle, CloseHandle
    api-ms-win-core-io-l1-1-0.dllDeviceIoControl
    api-ms-win-core-libraryloader-l1-2-0.dllGetProcAddress, LoadLibraryExW
    api-ms-win-core-registry-l1-1-0.dllRegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegEnumKeyExW
    api-ms-win-core-heap-obsolete-l1-1-0.dllLocalFree, LocalAlloc
    api-ms-win-security-base-l1-1-0.dllGetTokenInformation
    api-ms-win-core-processthreads-l1-1-0.dllExitThread, OpenProcessToken, TlsSetValue, TlsAlloc, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, TerminateProcess, CreateThread, TlsGetValue
    api-ms-win-core-processenvironment-l1-1-0.dllSetEnvironmentVariableW, GetEnvironmentVariableW
    api-ms-win-core-synch-l1-1-0.dllSetEvent, CreateEventW, OpenEventW
    api-ms-win-core-threadpool-l1-2-0.dllCreateThreadpoolIo, CreateThreadpool, StartThreadpoolIo, CancelThreadpoolIo, TrySubmitThreadpoolCallback, SetThreadpoolThreadMaximum
    api-ms-win-core-synch-l1-2-0.dllSleep
    api-ms-win-core-sysinfo-l1-1-0.dllGetSystemInfo, GetSystemTimeAsFileTime, GetTickCount
    api-ms-win-core-profile-l1-1-0.dllQueryPerformanceCounter
    api-ms-win-core-windowserrorreporting-l1-1-0.dllWerSetFlags
    api-ms-win-core-delayload-l1-1-0.dllDelayLoadFailureHook
    api-ms-win-core-delayload-l1-1-1.dllResolveDelayLoadedAPI
    NameOrdinalAddress
    LsaGetInterface10x140002c00
    LsaImpersonateKsecCaller20x140001170
    LsaRegisterExtension30x1400047c0
    LsaRegisterInterface40x140002860
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jun 4, 2024 16:55:51.310605049 CEST1.1.1.1192.168.2.50xba38No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
    Jun 4, 2024 16:55:51.310605049 CEST1.1.1.1192.168.2.50xba38No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
    0246810s020406080100

    Click to jump to process

    0246810sMB

    Click to jump to process

    Target ID:0
    Start time:10:55:39
    Start date:04/06/2024
    Path:C:\Users\user\Desktop\lsass.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\lsass.exe"
    Imagebase:0x7ff670ff0000
    File size:60'640 bytes
    MD5 hash:60E18F7B8D1F43731D0E9169C2D16547
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Execution Graph

    Execution Coverage

    Dynamic/Packed Code Coverage

    Signature Coverage

    Execution Coverage:1.3%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:51.8%
    Total number of Nodes:490
    Total number of Limit Nodes:4
    Show Legend
    Hide Nodes/Edges
    execution_graph 1065 7ff670ff48e0 1117 7ff670ff494c 1065->1117 1067 7ff670ff4885 1068 7ff670ff4850 1068->1067 1071 7ff670ff21c0 SetErrorMode SetUnhandledExceptionFilter RtlSetProcessIsCritical WerSetFlags 1068->1071 1072 7ff670ff2245 NtSetInformationProcess 1071->1072 1073 7ff670ff50c2 NtSetInformationProcess 1071->1073 1075 7ff670ff2279 NtSetInformationProcess 1072->1075 1076 7ff670ff2366 ExitThread 1072->1076 1073->1072 1074 7ff670ff5105 1073->1074 1074->1072 1074->1076 1075->1076 1077 7ff670ff22ad 1075->1077 1120 7ff670ff4710 GetEnvironmentVariableW 1077->1120 1082 7ff670ff22c1 1153 7ff670ff32e0 1082->1153 1083 7ff670ff5116 1085 7ff670ff22df 1083->1085 1314 7ff670ff5c34 1083->1314 1087 7ff670ff5169 1085->1087 1088 7ff670ff22e7 1085->1088 1087->1076 1090 7ff670ff5176 1087->1090 1088->1085 1178 7ff670ff4500 RtlInitUnicodeString NtCreatePort 1088->1178 1090->1076 1094 7ff670ff5c34 12 API calls 1090->1094 1097 7ff670ff51fe 1094->1097 1096 7ff670ff22d5 1096->1083 1096->1085 1097->1076 1099 7ff670ff51ca SetLastError 1099->1076 1099->1090 1102 7ff670ff2310 1253 7ff670ff35e0 1102->1253 1106 7ff670ff2339 1106->1090 1285 7ff670ff2510 RtlInitUnicodeString NtOpenFile 1106->1285 1111 7ff670ff2357 1300 7ff670ff2440 1111->1300 1118 7ff670ff49f7 1117->1118 1119 7ff670ff4978 6 API calls 1117->1119 1118->1068 1119->1118 1121 7ff670ff47a0 1120->1121 1122 7ff670ff475f 1120->1122 1325 7ff670ff4910 1121->1325 1122->1121 1124 7ff670ff5c12 1122->1124 1125 7ff670ff4788 SetEnvironmentVariableW 1122->1125 1127 7ff670ff5c34 12 API calls 1124->1127 1125->1121 1128 7ff670ff5c28 1127->1128 1129 7ff670ff3f20 RtlLengthRequiredSid RtlAllocateHeap 1130 7ff670ff3fcd RtlInitializeSid RtlSubAuthoritySid RtlLengthRequiredSid RtlAllocateHeap 1129->1130 1131 7ff670ff596a 1129->1131 1130->1131 1132 7ff670ff4038 RtlInitializeSid RtlSubAuthoritySid RtlLengthRequiredSid RtlAllocateHeap 1130->1132 1133 7ff670ff5979 RtlFreeHeap 1131->1133 1132->1131 1134 7ff670ff409b RtlInitializeSid RtlSubAuthoritySid RtlLengthRequiredSid RtlAllocateHeap 1132->1134 1135 7ff670ff59a0 RtlFreeHeap 1133->1135 1136 7ff670ff59bb 1133->1136 1134->1131 1137 7ff670ff4102 RtlInitializeSid RtlSubAuthoritySid RtlSubAuthoritySid RtlLengthRequiredSid RtlAllocateHeap 1134->1137 1135->1136 1138 7ff670ff59c0 RtlFreeHeap 1136->1138 1139 7ff670ff59de 1136->1139 1137->1131 1140 7ff670ff4181 RtlInitializeSid RtlSubAuthoritySid RtlSubAuthoritySid RtlLengthRequiredSid RtlAllocateHeap 1137->1140 1138->1139 1141 7ff670ff59e3 RtlFreeHeap 1139->1141 1142 7ff670ff5a01 1139->1142 1140->1131 1143 7ff670ff4200 RtlLengthRequiredSid RtlAllocateHeap 1140->1143 1141->1142 1145 7ff670ff5a24 1142->1145 1146 7ff670ff5a06 RtlFreeHeap 1142->1146 1143->1131 1144 7ff670ff423a RtlDeriveCapabilitySidsFromName 1143->1144 1144->1133 1147 7ff670ff425a 1144->1147 1145->1147 1148 7ff670ff5a2d RtlFreeHeap 1145->1148 1146->1145 1149 7ff670ff428d RtlFreeHeap 1147->1149 1150 7ff670ff42ab 1147->1150 1148->1147 1149->1150 1151 7ff670ff4910 7 API calls 1150->1151 1152 7ff670ff22b7 1151->1152 1152->1082 1152->1083 1334 7ff670ff3550 RtlInitUnicodeString NtOpenEvent 1153->1334 1156 7ff670ff57ac 1158 7ff670ff57b5 GetLastError 1156->1158 1166 7ff670ff57dc 1156->1166 1157 7ff670ff32f7 6 API calls 1159 7ff670ff339a RtlCreateAcl 1157->1159 1157->1166 1160 7ff670ff5c34 12 API calls 1158->1160 1161 7ff670ff33c2 RtlAddAccessAllowedAce 1159->1161 1162 7ff670ff34f3 CloseHandle 1159->1162 1160->1166 1161->1162 1165 7ff670ff33ee RtlAddAccessAllowedAce 1161->1165 1163 7ff670ff350c RtlFreeHeap 1162->1163 1164 7ff670ff22c6 1162->1164 1163->1164 1164->1096 1175 7ff670ff27d0 RtlInitializeResource 1164->1175 1165->1162 1167 7ff670ff341a RtlAddAccessAllowedAce 1165->1167 1166->1162 1169 7ff670ff5c34 12 API calls 1166->1169 1167->1162 1168 7ff670ff3446 RtlAddAccessAllowedAce 1167->1168 1168->1162 1170 7ff670ff3472 RtlAddAccessAllowedAce 1168->1170 1171 7ff670ff5811 1169->1171 1170->1162 1172 7ff670ff349a RtlCreateSecurityDescriptor 1170->1172 1171->1162 1172->1162 1173 7ff670ff34b4 RtlSetDaclSecurityDescriptor 1172->1173 1173->1162 1174 7ff670ff34d2 NtSetSecurityObject 1173->1174 1174->1162 1174->1166 1337 7ff670ff2af0 1175->1337 1177 7ff670ff282a 1177->1096 1179 7ff670ff5af4 1178->1179 1180 7ff670ff459f RtlInitUnicodeString NtConnectPort 1178->1180 1183 7ff670ff5c34 12 API calls 1179->1183 1203 7ff670ff46da 1179->1203 1181 7ff670ff4604 1180->1181 1182 7ff670ff5b1a 1180->1182 1184 7ff670ff5b40 NtClose 1181->1184 1185 7ff670ff460e NtListenPort 1181->1185 1187 7ff670ff5c34 12 API calls 1182->1187 1182->1203 1183->1203 1190 7ff670ff5b62 1184->1190 1184->1203 1188 7ff670ff4642 NtAcceptConnectPort 1185->1188 1189 7ff670ff5b79 1185->1189 1186 7ff670ff4910 7 API calls 1191 7ff670ff22ec 1186->1191 1187->1203 1192 7ff670ff5b9f 1188->1192 1193 7ff670ff467d NtCompleteConnectPort 1188->1193 1197 7ff670ff5c34 12 API calls 1189->1197 1189->1203 1194 7ff670ff5c34 12 API calls 1190->1194 1191->1090 1204 7ff670ff2cd0 RegOpenKeyExW 1191->1204 1198 7ff670ff5c34 12 API calls 1192->1198 1192->1203 1195 7ff670ff5bc5 1193->1195 1196 7ff670ff469a CreateThread 1193->1196 1194->1203 1200 7ff670ff5c34 12 API calls 1195->1200 1195->1203 1199 7ff670ff46cb CloseHandle 1196->1199 1201 7ff670ff5beb 1196->1201 1197->1203 1198->1203 1199->1203 1200->1203 1202 7ff670ff5c34 12 API calls 1201->1202 1201->1203 1202->1203 1203->1186 1205 7ff670ff54ca 1204->1205 1206 7ff670ff2d29 RegQueryValueExW 1204->1206 1211 7ff670ff5c34 12 API calls 1205->1211 1223 7ff670ff2e32 1205->1223 1207 7ff670ff2d62 1206->1207 1208 7ff670ff54f0 1206->1208 1209 7ff670ff5521 1207->1209 1210 7ff670ff2d71 1207->1210 1208->1207 1212 7ff670ff54fb 1208->1212 1216 7ff670ff552a 1209->1216 1221 7ff670ff554d 1209->1221 1215 7ff670ff2d7b 1210->1215 1224 7ff670ff55a7 1210->1224 1211->1223 1222 7ff670ff5c34 12 API calls 1212->1222 1212->1223 1213 7ff670ff2e52 1217 7ff670ff55ca RtlFreeHeap 1213->1217 1218 7ff670ff2e5b 1213->1218 1214 7ff670ff2e46 RegCloseKey 1214->1213 1220 7ff670ff2d88 RtlAllocateHeap 1215->1220 1215->1221 1216->1223 1227 7ff670ff5c34 12 API calls 1216->1227 1217->1218 1219 7ff670ff22fb 1218->1219 1228 7ff670ff5c34 12 API calls 1218->1228 1219->1099 1234 7ff670ff2880 RegOpenKeyExW 1219->1234 1220->1223 1225 7ff670ff2db3 RegQueryValueExW 1220->1225 1221->1223 1229 7ff670ff5c34 12 API calls 1221->1229 1222->1223 1223->1213 1223->1214 1224->1223 1226 7ff670ff5c34 12 API calls 1224->1226 1230 7ff670ff557c 1225->1230 1233 7ff670ff2dec 1225->1233 1226->1223 1227->1223 1228->1219 1229->1223 1230->1223 1231 7ff670ff5c34 12 API calls 1230->1231 1231->1223 1233->1223 1350 7ff670ff2fd0 wcschr 1233->1350 1235 7ff670ff28ed RegEnumKeyExW 1234->1235 1236 7ff670ff2a26 1234->1236 1235->1236 1251 7ff670ff2942 1235->1251 1237 7ff670ff2a52 1236->1237 1238 7ff670ff2a42 RegCloseKey 1236->1238 1239 7ff670ff2a62 1237->1239 1246 7ff670ff5c34 12 API calls 1237->1246 1238->1237 1243 7ff670ff4910 7 API calls 1239->1243 1240 7ff670ff294a wcstol 1242 7ff670ff2970 RegOpenKeyExW 1240->1242 1240->1251 1241 7ff670ff545b 1241->1236 1244 7ff670ff5c34 12 API calls 1241->1244 1242->1251 1245 7ff670ff2308 1243->1245 1244->1236 1245->1099 1245->1102 1246->1239 1247 7ff670ff29e2 RegEnumKeyExW 1247->1236 1247->1251 1248 7ff670ff29d2 RegCloseKey 1248->1251 1251->1240 1251->1241 1251->1247 1251->1248 1252 7ff670ff5c34 12 API calls 1251->1252 1381 7ff670ff2e80 RegQueryValueExW 1251->1381 1390 7ff670ff2a90 1251->1390 1252->1251 1394 7ff670ff3b00 1253->1394 1256 7ff670ff583c 1260 7ff670ff5c34 12 API calls 1256->1260 1272 7ff670ff5858 1256->1272 1257 7ff670ff360a RpcServerUseProtseqEpW 1258 7ff670ff3635 1257->1258 1259 7ff670ff3637 RtlFreeHeap 1257->1259 1258->1259 1261 7ff670ff365f 1259->1261 1259->1272 1260->1272 1419 7ff670ff3720 RtlAllocateAndInitializeSid 1261->1419 1263 7ff670ff5884 I_RpcMapWin32Status 1263->1272 1265 7ff670ff3673 RpcServerUseProtseqEpW 1267 7ff670ff36a4 RpcServerRegisterIf3 RtlFreeHeap 1265->1267 1265->1272 1266 7ff670ff5c34 12 API calls 1266->1263 1269 7ff670ff2315 1267->1269 1267->1272 1268 7ff670ff5c34 12 API calls 1268->1272 1269->1076 1273 7ff670ff3290 1269->1273 1270 7ff670ff58d8 RtlFreeHeap I_RpcMapWin32Status 1270->1272 1271 7ff670ff5c34 12 API calls 1271->1270 1272->1263 1272->1266 1272->1268 1272->1270 1272->1271 1274 7ff670ff3550 4 API calls 1273->1274 1275 7ff670ff329b 1274->1275 1276 7ff670ff5730 1275->1276 1277 7ff670ff32a7 SetEvent 1275->1277 1279 7ff670ff5760 1276->1279 1280 7ff670ff5739 GetLastError 1276->1280 1278 7ff670ff32be CloseHandle 1277->1278 1277->1279 1278->1106 1282 7ff670ff5793 CloseHandle 1279->1282 1283 7ff670ff5773 GetLastError 1279->1283 1281 7ff670ff5c34 12 API calls 1280->1281 1281->1279 1284 7ff670ff5c34 12 API calls 1283->1284 1284->1282 1286 7ff670ff52d8 1285->1286 1287 7ff670ff2596 NtDeviceIoControlFile 1285->1287 1289 7ff670ff5c34 12 API calls 1286->1289 1292 7ff670ff2348 1286->1292 1288 7ff670ff25e8 NtSetInformationFile 1287->1288 1291 7ff670ff5303 1287->1291 1290 7ff670ff2627 1288->1290 1288->1291 1289->1292 1442 7ff670ff2650 TlsAlloc 1290->1442 1291->1290 1294 7ff670ff5c34 12 API calls 1291->1294 1295 7ff670ff24a0 RpcServerListen I_RpcMapWin32Status CreateEventW 1292->1295 1294->1290 1296 7ff670ff24f1 SetEvent 1295->1296 1297 7ff670ff5298 GetLastError 1295->1297 1298 7ff670ff234d 1296->1298 1297->1298 1299 7ff670ff52af OpenEventW 1297->1299 1298->1090 1298->1111 1299->1298 1301 7ff670ff245d 1300->1301 1302 7ff670ff235c 1300->1302 1301->1302 1303 7ff670ff527e RtlNtStatusToDosError 1301->1303 1304 7ff670ff23d0 1302->1304 1303->1301 1305 7ff670ff2361 1304->1305 1306 7ff670ff23ed 1304->1306 1309 7ff670ff2380 CreateEventW 1305->1309 1306->1305 1307 7ff670ff5265 RtlNtStatusToDosError 1306->1307 1308 7ff670ff5c34 12 API calls 1306->1308 1307->1306 1308->1307 1310 7ff670ff5204 GetLastError 1309->1310 1311 7ff670ff23a9 SetEvent 1309->1311 1312 7ff670ff23bc 1310->1312 1313 7ff670ff521b OpenEventW 1310->1313 1311->1312 1312->1076 1313->1312 1315 7ff670ff5c68 strcpy_s 1314->1315 1320 7ff670ff5d71 1314->1320 1319 7ff670ff5cbc DbgPrintEx 1315->1319 1321 7ff670ff5cdc 1315->1321 1316 7ff670ff4910 7 API calls 1318 7ff670ff5d91 1316->1318 1318->1088 1319->1320 1320->1316 1321->1321 1322 7ff670ff5cf3 _vsnprintf_s 1321->1322 1323 7ff670ff5d5e DbgPrintEx 1322->1323 1324 7ff670ff5d47 DbgPrintEx 1322->1324 1323->1320 1324->1320 1326 7ff670ff4919 1325->1326 1327 7ff670ff22b2 1326->1327 1328 7ff670ff4a70 RtlCaptureContext RtlLookupFunctionEntry 1326->1328 1327->1129 1329 7ff670ff4ab5 RtlVirtualUnwind 1328->1329 1330 7ff670ff4af7 1328->1330 1329->1330 1333 7ff670ff4a28 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1330->1333 1335 7ff670ff32eb 1334->1335 1336 7ff670ff5818 RtlNtStatusToDosError SetLastError 1334->1336 1335->1156 1335->1157 1338 7ff670ff54ac 1337->1338 1339 7ff670ff2b1c RtlAcquireResourceExclusive 1337->1339 1340 7ff670ff2b38 1339->1340 1340->1338 1341 7ff670ff2b41 RtlAllocateHeap 1340->1341 1341->1338 1342 7ff670ff2b6a 1341->1342 1343 7ff670ff2bea 1342->1343 1344 7ff670ff2b9e RtlReleaseResource 1342->1344 1346 7ff670ff2bda 1342->1346 1345 7ff670ff2c6a 1343->1345 1347 7ff670ff2c28 RtlAcquireResourceShared 1343->1347 1344->1177 1345->1177 1346->1344 1348 7ff670ff2c44 1347->1348 1349 7ff670ff2c55 RtlReleaseResource 1348->1349 1349->1345 1351 7ff670ff3002 1350->1351 1365 7ff670ff30d8 1350->1365 1370 7ff670ff3120 1351->1370 1353 7ff670ff300a 1353->1365 1375 7ff670ff31a0 RtlAllocateHeap 1353->1375 1355 7ff670ff3028 1356 7ff670ff563e 1355->1356 1357 7ff670ff3049 LoadLibraryExW 1355->1357 1355->1365 1358 7ff670ff5645 GetLastError 1356->1358 1357->1358 1359 7ff670ff307f GetProcAddress 1357->1359 1360 7ff670ff565c 1358->1360 1358->1365 1361 7ff670ff5675 GetLastError 1359->1361 1362 7ff670ff30a5 GetProcAddress 1359->1362 1364 7ff670ff5c34 12 API calls 1360->1364 1363 7ff670ff568c 1361->1363 1361->1365 1366 7ff670ff30ce 1362->1366 1367 7ff670ff5c34 12 API calls 1363->1367 1364->1365 1365->1233 1366->1365 1368 7ff670ff56c5 RtlNtStatusToDosError 1366->1368 1369 7ff670ff5c34 12 API calls 1366->1369 1367->1365 1368->1365 1369->1368 1371 7ff670ff3164 1370->1371 1372 7ff670ff3145 _wcsicmp 1370->1372 1371->1353 1373 7ff670ff315c 1372->1373 1374 7ff670ff3177 1372->1374 1373->1371 1373->1372 1374->1353 1376 7ff670ff56fa 1375->1376 1377 7ff670ff31e8 RtlAllocateHeap 1375->1377 1379 7ff670ff5704 RtlFreeHeap 1376->1379 1377->1379 1380 7ff670ff3248 1377->1380 1380->1355 1382 7ff670ff2fa2 1381->1382 1383 7ff670ff2ece 1381->1383 1382->1251 1383->1382 1384 7ff670ff2eeb RtlAllocateHeap 1383->1384 1384->1382 1385 7ff670ff2f1d RegQueryValueExW 1384->1385 1386 7ff670ff2f7d RtlFreeHeap 1385->1386 1388 7ff670ff2f50 1385->1388 1386->1382 1387 7ff670ff2f7b 1387->1386 1388->1387 1389 7ff670ff2fd0 23 API calls 1388->1389 1389->1387 1391 7ff670ff2ad6 1390->1391 1392 7ff670ff2ab1 1390->1392 1391->1251 1392->1391 1393 7ff670ff2af0 5 API calls 1392->1393 1393->1391 1395 7ff670ff4da0 1394->1395 1396 7ff670ff3b6a RtlAllocateHeap 1395->1396 1397 7ff670ff3b99 RtlCreateSecurityDescriptor 1396->1397 1400 7ff670ff3e84 1396->1400 1398 7ff670ff3bb7 GetCurrentProcess OpenProcessToken 1397->1398 1397->1400 1399 7ff670ff3be4 GetTokenInformation 1398->1399 1398->1400 1399->1400 1403 7ff670ff3c15 RtlLengthSid RtlLengthSid RtlAllocateHeap 1399->1403 1401 7ff670ff3ea5 RtlFreeHeap RtlFreeHeap 1400->1401 1402 7ff670ff3e99 CloseHandle 1400->1402 1404 7ff670ff4910 7 API calls 1401->1404 1402->1401 1403->1400 1405 7ff670ff3c77 RtlSetOwnerSecurityDescriptor 1403->1405 1406 7ff670ff3600 1404->1406 1405->1400 1407 7ff670ff3c97 RtlCreateAcl 1405->1407 1406->1256 1406->1257 1407->1400 1408 7ff670ff3cb7 RtlAddAccessAllowedAce 1407->1408 1408->1400 1409 7ff670ff3ce2 RtlAddAccessAllowedAce 1408->1409 1409->1400 1410 7ff670ff3d0d RtlAddAccessAllowedAce 1409->1410 1410->1400 1411 7ff670ff3d35 RtlSetDaclSecurityDescriptor 1410->1411 1411->1400 1412 7ff670ff3d54 RtlAllocateAndInitializeSid 1411->1412 1412->1400 1413 7ff670ff3d9f RtlCreateAcl 1412->1413 1413->1400 1414 7ff670ff3dc3 RtlAddMandatoryAce 1413->1414 1414->1400 1415 7ff670ff3df7 RtlSetSaclSecurityDescriptor 1414->1415 1415->1400 1416 7ff670ff3e15 RtlMakeSelfRelativeSD 1415->1416 1416->1400 1417 7ff670ff3e38 RtlAllocateHeap 1416->1417 1417->1400 1418 7ff670ff3e67 RtlMakeSelfRelativeSD 1417->1418 1418->1400 1420 7ff670ff3a43 1419->1420 1421 7ff670ff389a RtlAllocateAndInitializeSid 1419->1421 1423 7ff670ff3a54 RtlFreeSid 1420->1423 1424 7ff670ff3a60 1420->1424 1421->1420 1422 7ff670ff38df RtlAllocateAndInitializeSid 1421->1422 1422->1420 1425 7ff670ff3924 RtlAllocateAndInitializeSid 1422->1425 1423->1424 1426 7ff670ff3a6a RtlFreeSid 1424->1426 1427 7ff670ff3a76 1424->1427 1425->1420 1428 7ff670ff396c RtlAllocateAndInitializeSid 1425->1428 1426->1427 1429 7ff670ff3a80 RtlFreeSid 1427->1429 1430 7ff670ff3a8c 1427->1430 1428->1420 1431 7ff670ff39b0 RtlAllocateAndInitializeSid 1428->1431 1429->1430 1432 7ff670ff3aa2 1430->1432 1433 7ff670ff3a96 RtlFreeSid 1430->1433 1431->1420 1436 7ff670ff39f5 RtlDeriveCapabilitySidsFromName 1431->1436 1434 7ff670ff3aab RtlFreeSid 1432->1434 1435 7ff670ff3ab7 1432->1435 1433->1432 1434->1435 1437 7ff670ff3ac0 RtlFreeSid 1435->1437 1438 7ff670ff3acc 1435->1438 1436->1420 1439 7ff670ff3a13 RtlCreateAndSetSD 1436->1439 1437->1438 1440 7ff670ff4910 7 API calls 1438->1440 1439->1420 1441 7ff670ff3669 1440->1441 1441->1265 1441->1272 1443 7ff670ff533e GetLastError 1442->1443 1444 7ff670ff2678 NtOpenFile 1442->1444 1446 7ff670ff53cb 1443->1446 1449 7ff670ff5353 1443->1449 1445 7ff670ff26b6 CreateThreadpool 1444->1445 1450 7ff670ff535c 1444->1450 1447 7ff670ff26d4 1445->1447 1448 7ff670ff5386 GetLastError 1445->1448 1461 7ff670ff43f0 GetSystemInfo RegOpenKeyExW 1447->1461 1448->1446 1448->1449 1454 7ff670ff5c34 12 API calls 1449->1454 1451 7ff670ff537f 1450->1451 1452 7ff670ff5c34 12 API calls 1450->1452 1451->1448 1452->1451 1454->1446 1455 7ff670ff26d9 SetThreadpoolThreadMaximum CreateThreadpoolIo 1456 7ff670ff53a3 GetLastError 1455->1456 1457 7ff670ff2770 NtAllocateVirtualMemory 1455->1457 1456->1446 1456->1449 1458 7ff670ff27ac 1457->1458 1470 7ff670ff42e0 1458->1470 1462 7ff670ff5aa4 1461->1462 1463 7ff670ff445d 1461->1463 1466 7ff670ff5c34 12 API calls 1462->1466 1469 7ff670ff44cf 1462->1469 1463->1462 1464 7ff670ff446e RegQueryValueExW 1463->1464 1464->1469 1465 7ff670ff44eb 1465->1455 1466->1469 1467 7ff670ff5c34 12 API calls 1468 7ff670ff5aed 1467->1468 1468->1455 1469->1465 1469->1467 1471 7ff670ff4310 StartThreadpoolIo 1470->1471 1472 7ff670ff432c DeviceIoControl 1471->1472 1474 7ff670ff4370 GetLastError 1472->1474 1475 7ff670ff27b1 1472->1475 1474->1475 1476 7ff670ff4383 1474->1476 1475->1292 1477 7ff670ff439f CancelThreadpoolIo Sleep 1476->1477 1478 7ff670ff5c34 12 API calls 1476->1478 1477->1471 1478->1477 1479 7ff670ff5dc0 1480 7ff670ff5de1 NtDeviceIoControlFile 1479->1480 1481 7ff670ff5e52 1479->1481 1480->1481 1541 7ff670ff12a0 1542 7ff670ff4f44 LocalAlloc 1541->1542 1543 7ff670ff12b4 1541->1543 1543->1542 1482 7ff670ff4cbb 1483 7ff670ff4c18 1482->1483 1483->1482 1485 7ff670ff4800 ResolveDelayLoadedAPI 1483->1485 1485->1483 1486 7ff670ff20d0 1488 7ff670ff2107 memset NtReplyWaitReceivePort 1486->1488 1489 7ff670ff1010 1490 7ff670ff4ea4 1489->1490 1491 7ff670ff103b 1489->1491 1491->1490 1492 7ff670ff1084 NtRequestWaitReplyPort 1491->1492 1493 7ff670ff1077 memcpy 1491->1493 1494 7ff670ff4e7d 1492->1494 1495 7ff670ff10ab 1492->1495 1493->1492 1498 7ff670ff5c34 12 API calls 1494->1498 1500 7ff670ff10b4 1494->1500 1496 7ff670ff4e62 memcpy 1495->1496 1495->1500 1496->1494 1497 7ff670ff4910 7 API calls 1499 7ff670ff10d2 1497->1499 1498->1500 1500->1497 1501 7ff670ff1e10 1502 7ff670ff1e52 1501->1502 1503 7ff670ff1e28 1501->1503 1505 7ff670ff1e66 1502->1505 1514 7ff670ff1e94 1502->1514 1504 7ff670ff20a9 1503->1504 1506 7ff670ff5c34 12 API calls 1503->1506 1505->1504 1509 7ff670ff5c34 12 API calls 1505->1509 1508 7ff670ff1e48 1506->1508 1507 7ff670ff1f94 1512 7ff670ff1fb5 NtFreeVirtualMemory 1507->1512 1516 7ff670ff1fac 1507->1516 1511 7ff670ff1e82 1509->1511 1510 7ff670ff1ed0 RtlAllocateHeap 1513 7ff670ff1f14 memcpy TrySubmitThreadpoolCallback 1510->1513 1510->1514 1512->1516 1513->1514 1514->1507 1514->1510 1517 7ff670ff5c34 12 API calls 1514->1517 1518 7ff670ff1f4d GetLastError 1514->1518 1526 7ff670ff6098 1514->1526 1515 7ff670ff1ff0 StartThreadpoolIo 1515->1516 1516->1515 1520 7ff670ff201d DeviceIoControl 1516->1520 1517->1514 1521 7ff670ff5c34 12 API calls 1518->1521 1520->1504 1522 7ff670ff2050 GetLastError 1520->1522 1521->1514 1522->1504 1523 7ff670ff2063 1522->1523 1524 7ff670ff2080 CancelThreadpoolIo Sleep 1523->1524 1525 7ff670ff5c34 12 API calls 1523->1525 1524->1515 1525->1524 1527 7ff670ff60f1 1526->1527 1528 7ff670ff60a1 1526->1528 1527->1514 1528->1527 1532 7ff670ff1390 NtDeviceIoControlFile 1528->1532 1530 7ff670ff60d0 1530->1527 1531 7ff670ff5c34 12 API calls 1530->1531 1531->1527 1532->1530 1548 7ff670ff1170 TlsGetValue 1549 7ff670ff11a2 1548->1549 1550 7ff670ff4ec0 GetCurrentProcess GetCurrentProcess DuplicateHandle 1548->1550 1550->1549 1551 7ff670ff4f1d NtSetInformationThread 1550->1551 1551->1549 1552 7ff670ff10f0 1553 7ff670ff1104 1552->1553 1554 7ff670ff4eae LocalFree 1552->1554 1553->1554 1555 7ff670ff14b0 TlsSetValue 1556 7ff670ff4f5e RtlEnterCriticalSection 1555->1556 1569 7ff670ff14e8 1555->1569 1557 7ff670ff4fe5 RtlLeaveCriticalSection 1556->1557 1566 7ff670ff4f8d 1556->1566 1560 7ff670ff5008 1557->1560 1557->1569 1559 7ff670ff5098 1598 7ff670ff5eb4 1559->1598 1563 7ff670ff6098 13 API calls 1560->1563 1562 7ff670ff14fa TlsSetValue NtClose RtlFreeHeap 1562->1569 1563->1569 1565 7ff670ff5c34 12 API calls 1565->1557 1566->1557 1566->1565 1567 7ff670ff5c34 12 API calls 1567->1569 1568 7ff670ff6098 13 API calls 1568->1569 1569->1559 1569->1562 1569->1567 1569->1568 1570 7ff670ff15c0 1569->1570 1571 7ff670ff15f6 1570->1571 1572 7ff670ff1dd7 1570->1572 1571->1572 1579 7ff670ff1601 1571->1579 1573 7ff670ff1df1 1572->1573 1574 7ff670ff5c34 12 API calls 1572->1574 1576 7ff670ff6098 13 API calls 1573->1576 1574->1573 1575 7ff670ff1dc8 1577 7ff670ff6098 13 API calls 1575->1577 1594 7ff670ff1ceb 1576->1594 1577->1594 1578 7ff670ff4910 7 API calls 1580 7ff670ff1dba 1578->1580 1579->1575 1581 7ff670ff16fa 1579->1581 1580->1562 1582 7ff670ff5c34 12 API calls 1581->1582 1585 7ff670ff187d 1581->1585 1582->1585 1583 7ff670ff1cb7 1587 7ff670ff1ce1 1583->1587 1588 7ff670ff5c34 12 API calls 1583->1588 1584 7ff670ff19ff RtlAllocateHeap 1584->1583 1586 7ff670ff1a37 memset 1584->1586 1585->1583 1585->1584 1592 7ff670ff1ad8 1586->1592 1596 7ff670ff1a87 1586->1596 1589 7ff670ff6098 13 API calls 1587->1589 1588->1587 1589->1594 1590 7ff670ff1c84 1616 7ff670ff4ce0 1590->1616 1592->1590 1595 7ff670ff1c72 memcpy 1592->1595 1594->1578 1595->1590 1596->1592 1597 7ff670ff1b18 memcpy 1596->1597 1597->1596 1599 7ff670ff5ee5 1598->1599 1600 7ff670ff6068 1598->1600 1599->1600 1601 7ff670ff5ef0 1599->1601 1602 7ff670ff6082 1600->1602 1604 7ff670ff5c34 12 API calls 1600->1604 1603 7ff670ff6059 1601->1603 1609 7ff670ff5f47 1601->1609 1605 7ff670ff6098 13 API calls 1602->1605 1606 7ff670ff6098 13 API calls 1603->1606 1604->1602 1612 7ff670ff6037 1605->1612 1606->1612 1607 7ff670ff4910 7 API calls 1608 7ff670ff50a0 1607->1608 1610 7ff670ff4ce0 14 API calls 1609->1610 1611 7ff670ff600a 1610->1611 1611->1612 1613 7ff670ff602d 1611->1613 1615 7ff670ff5c34 12 API calls 1611->1615 1612->1607 1614 7ff670ff6098 13 API calls 1613->1614 1614->1612 1615->1613 1617 7ff670ff4ced 1616->1617 1619 7ff670ff4d62 1616->1619 1617->1619 1620 7ff670ff4cf1 DeviceIoControl 1617->1620 1618 7ff670ff1c93 RtlFreeHeap 1618->1583 1618->1594 1619->1618 1621 7ff670ff5c34 12 API calls 1619->1621 1620->1618 1622 7ff670ff4d24 GetLastError 1620->1622 1621->1618 1623 7ff670ff4d34 1622->1623 1623->1618 1624 7ff670ff5c34 12 API calls 1623->1624 1624->1618 1533 7ff670ff4c0c 1534 7ff670ff4c18 1533->1534 1536 7ff670ff4800 ResolveDelayLoadedAPI 1534->1536 1536->1534

    Callgraph

    Hide Legend
    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00007FF670FF4844 1 Function_00007FF670FF4E42 2 Function_00007FF670FF2440 3 Function_00007FF670FF21C0 3->2 13 Function_00007FF670FF2CD0 3->13 14 Function_00007FF670FF23D0 3->14 15 Function_00007FF670FF27D0 3->15 24 Function_00007FF670FF35E0 3->24 26 Function_00007FF670FF32E0 3->26 37 Function_00007FF670FF4500 3->37 39 Function_00007FF670FF2880 3->39 40 Function_00007FF670FF2380 3->40 41 Function_00007FF670FF2510 3->41 44 Function_00007FF670FF3290 3->44 49 Function_00007FF670FF4710 3->49 54 Function_00007FF670FF24A0 3->54 57 Function_00007FF670FF3F20 3->57 64 Function_00007FF670FF5C34 3->64 4 Function_00007FF670FF11C0 5 Function_00007FF670FF15C0 28 Function_00007FF670FF4CE0 5->28 43 Function_00007FF670FF4910 5->43 61 Function_00007FF670FF6098 5->61 5->64 6 Function_00007FF670FF47C0 7 Function_00007FF670FF5DC0 8 Function_00007FF670FF4CBB 36 Function_00007FF670FF4800 8->36 9 Function_00007FF670FF2650 25 Function_00007FF670FF42E0 9->25 32 Function_00007FF670FF43F0 9->32 9->64 10 Function_00007FF670FF3550 11 Function_00007FF670FF1450 12 Function_00007FF670FF2FD0 52 Function_00007FF670FF31A0 12->52 56 Function_00007FF670FF3120 12->56 12->64 13->12 13->64 14->64 31 Function_00007FF670FF2AF0 15->31 16 Function_00007FF670FF20D0 17 Function_00007FF670FF4DD0 18 Function_00007FF670FF494C 19 Function_00007FF670FF12CC 20 Function_00007FF670FF4CCD 20->36 21 Function_00007FF670FF48E0 21->0 21->3 21->18 22 Function_00007FF670FF1360 23 Function_00007FF670FF2860 35 Function_00007FF670FF3B00 24->35 58 Function_00007FF670FF3720 24->58 24->64 25->64 26->10 26->64 27 Function_00007FF670FF12E0 28->64 29 Function_00007FF670FF1170 30 Function_00007FF670FF1270 53 Function_00007FF670FF2CA0 31->53 32->64 33 Function_00007FF670FF10F0 34 Function_00007FF670FF13F0 35->43 37->43 37->64 38 Function_00007FF670FF2E80 38->12 39->38 39->43 50 Function_00007FF670FF2A90 39->50 39->64 41->9 41->64 42 Function_00007FF670FF1490 69 Function_00007FF670FF4A28 43->69 44->10 44->64 45 Function_00007FF670FF1010 45->43 45->64 46 Function_00007FF670FF1E10 46->61 46->64 47 Function_00007FF670FF1390 48 Function_00007FF670FF5E90 49->43 49->64 50->31 51 Function_00007FF670FF4C0C 51->36 55 Function_00007FF670FF12A0 57->43 58->43 59 Function_00007FF670FF1420 60 Function_00007FF670FF111C 61->47 61->64 62 Function_00007FF670FF4C97 62->36 63 Function_00007FF670FF5EB4 63->28 63->43 63->61 63->64 64->43 65 Function_00007FF670FF1130 66 Function_00007FF670FF14B0 66->5 66->61 66->63 66->64 67 Function_00007FF670FF1230 68 Function_00007FF670FF4DAC 68->17 70 Function_00007FF670FF4CA9 70->36

    Executed Functions

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 7ff670ff21c0-7ff670ff223f SetErrorMode SetUnhandledExceptionFilter RtlSetProcessIsCritical WerSetFlags 1 7ff670ff2245-7ff670ff2273 NtSetInformationProcess 0->1 2 7ff670ff50c2-7ff670ff50ff NtSetInformationProcess 0->2 4 7ff670ff2279-7ff670ff22a7 NtSetInformationProcess 1->4 5 7ff670ff2366-7ff670ff2368 ExitThread 1->5 2->1 3 7ff670ff5105-7ff670ff510b 2->3 3->5 6 7ff670ff5111 3->6 4->5 7 7ff670ff22ad-7ff670ff22bb call 7ff670ff4710 call 7ff670ff3f20 4->7 6->1 12 7ff670ff22c1-7ff670ff22ca call 7ff670ff32e0 7->12 13 7ff670ff5116-7ff670ff511d 7->13 23 7ff670ff22d0-7ff670ff22d9 call 7ff670ff27d0 12->23 24 7ff670ff512c-7ff670ff5133 12->24 15 7ff670ff5123-7ff670ff512a 13->15 16 7ff670ff22df-7ff670ff22e1 13->16 20 7ff670ff5156-7ff670ff515e call 7ff670ff5c34 15->20 18 7ff670ff5169-7ff670ff5170 16->18 19 7ff670ff22e7-7ff670ff22f0 call 7ff670ff4500 16->19 18->5 22 7ff670ff5176-7ff670ff517d 18->22 32 7ff670ff517f-7ff670ff5186 19->32 33 7ff670ff22f6-7ff670ff22fd call 7ff670ff2cd0 19->33 26 7ff670ff5163-7ff670ff5164 20->26 27 7ff670ff51f1 22->27 23->16 37 7ff670ff5142-7ff670ff5149 23->37 24->16 30 7ff670ff5139-7ff670ff5140 24->30 26->16 34 7ff670ff51f4-7ff670ff51ff call 7ff670ff5c34 27->34 30->20 32->5 36 7ff670ff518c-7ff670ff5196 32->36 42 7ff670ff2303-7ff670ff230a call 7ff670ff2880 33->42 43 7ff670ff51ca-7ff670ff51e4 SetLastError 33->43 34->5 36->34 37->16 39 7ff670ff514f 37->39 39->20 42->43 47 7ff670ff2310-7ff670ff2319 call 7ff670ff35e0 42->47 43->5 45 7ff670ff51ea 43->45 45->27 47->5 50 7ff670ff231b-7ff670ff2332 47->50 50->5 52 7ff670ff2334-7ff670ff233d call 7ff670ff3290 50->52 55 7ff670ff2343-7ff670ff2351 call 7ff670ff2510 call 7ff670ff24a0 52->55 56 7ff670ff5198-7ff670ff519f 52->56 62 7ff670ff51b1-7ff670ff51b8 55->62 63 7ff670ff2357-7ff670ff2361 call 7ff670ff2440 call 7ff670ff23d0 call 7ff670ff2380 55->63 56->5 57 7ff670ff51a5-7ff670ff51af 56->57 57->34 62->5 65 7ff670ff51be-7ff670ff51c8 62->65 63->5 65->34
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Process$Information$CriticalErrorExceptionExitFilterFlagsModeThreadUnhandled
    • String ID: Failed to init LSA interface list: 0x%x$Failed to init Lsass global states: 0x%x$Failed to init RM: 0x%x$Failed to init well known SIDs: 0x%x$Failed to load extensions: 0x%x$Failed to set Ksec security: 0x%x$Failed to start LPR server: 0x%lx$LSA$SetKsecEvent failed: 0x%lx
    • API String ID: 2130539193-3182054039
    • Opcode ID: 11e73e338f1ef857a8f5cffe3151d805c120caa17276c55a1172e4798c70cf25
    • Instruction ID: da20da3c370141a3a7a6a028b8dc007f70a8f2158b5375736b4d70b7935926a5
    • Opcode Fuzzy Hash: 11e73e338f1ef857a8f5cffe3151d805c120caa17276c55a1172e4798c70cf25
    • Instruction Fuzzy Hash: BE712323A2C683A2F750AB24D8443B82AADBF05794F444231CE19C73D2EFADF544CE61

    Control-flow Graph

    APIs
      • Part of subcall function 00007FF670FF494C: GetSystemTimeAsFileTime.API-MS-WIN-CORE-SYSINFO-L1-1-0 ref: 00007FF670FF497C
      • Part of subcall function 00007FF670FF494C: GetCurrentProcessId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF670FF498A
      • Part of subcall function 00007FF670FF494C: GetCurrentThreadId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF670FF4996
      • Part of subcall function 00007FF670FF494C: GetTickCount.API-MS-WIN-CORE-SYSINFO-L1-1-0 ref: 00007FF670FF49A2
      • Part of subcall function 00007FF670FF494C: GetTickCount.API-MS-WIN-CORE-SYSINFO-L1-1-0 ref: 00007FF670FF49B2
      • Part of subcall function 00007FF670FF494C: QueryPerformanceCounter.API-MS-WIN-CORE-PROFILE-L1-1-0 ref: 00007FF670FF49CD
    • exit.API-MS-WIN-CORE-CRT-L2-1-0 ref: 00007FF670FF48C6
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThreadexit
    • String ID:
    • API String ID: 2242362623-0
    • Opcode ID: 00e75031e03ec63cebe82126e99dbed41005b224c4bd70de82f7f75710e44839
    • Instruction ID: 5ebfe2b30160ebd42559b4dbed9622b109a38a25e7d6997e5d39658519d3a39e
    • Opcode Fuzzy Hash: 00e75031e03ec63cebe82126e99dbed41005b224c4bd70de82f7f75710e44839
    • Instruction Fuzzy Hash: 8A014063A3C682A2EA00A710E485BB92368EB50780F900035E90DC73A5DFBCF549CF60

    Non-executed Functions

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 84 7ff670ff3f20-7ff670ff3fc7 RtlLengthRequiredSid RtlAllocateHeap 85 7ff670ff3fcd-7ff670ff4032 RtlInitializeSid RtlSubAuthoritySid RtlLengthRequiredSid RtlAllocateHeap 84->85 86 7ff670ff596a 84->86 87 7ff670ff5974 85->87 88 7ff670ff4038-7ff670ff4095 RtlInitializeSid RtlSubAuthoritySid RtlLengthRequiredSid RtlAllocateHeap 85->88 86->87 89 7ff670ff5979-7ff670ff599e RtlFreeHeap 87->89 88->87 90 7ff670ff409b-7ff670ff40fc RtlInitializeSid RtlSubAuthoritySid RtlLengthRequiredSid RtlAllocateHeap 88->90 91 7ff670ff59a0-7ff670ff59b6 RtlFreeHeap 89->91 92 7ff670ff59bb-7ff670ff59be 89->92 90->87 93 7ff670ff4102-7ff670ff417b RtlInitializeSid RtlSubAuthoritySid * 2 RtlLengthRequiredSid RtlAllocateHeap 90->93 91->92 94 7ff670ff59c0-7ff670ff59d9 RtlFreeHeap 92->94 95 7ff670ff59de-7ff670ff59e1 92->95 93->87 96 7ff670ff4181-7ff670ff41fa RtlInitializeSid RtlSubAuthoritySid * 2 RtlLengthRequiredSid RtlAllocateHeap 93->96 94->95 97 7ff670ff59e3-7ff670ff59fc RtlFreeHeap 95->97 98 7ff670ff5a01-7ff670ff5a04 95->98 96->87 99 7ff670ff4200-7ff670ff4234 RtlLengthRequiredSid RtlAllocateHeap 96->99 97->98 101 7ff670ff5a24-7ff670ff5a27 98->101 102 7ff670ff5a06-7ff670ff5a1f RtlFreeHeap 98->102 99->87 100 7ff670ff423a-7ff670ff4254 RtlDeriveCapabilitySidsFromName 99->100 100->89 103 7ff670ff425a-7ff670ff4281 100->103 104 7ff670ff5a2d-7ff670ff5a4c RtlFreeHeap 101->104 105 7ff670ff4288-7ff670ff428b 101->105 102->101 103->105 104->105 106 7ff670ff428d-7ff670ff42a6 RtlFreeHeap 105->106 107 7ff670ff42ab-7ff670ff42d6 call 7ff670ff4910 105->107 106->107
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Heap$AllocateAuthorityFreeLengthRequired$Initialize$CapabilityDeriveFromNameSids
    • String ID: ($lpacIdentityServices
    • API String ID: 26768282-937675705
    • Opcode ID: 6d59f63558e9b3ae9250777bdcb14d0b916e38d13a4711c723816a8cddaa7941
    • Instruction ID: edd15faead74826fa2a732543f0421a839c77e0a422f750fbeb3c3ac6d224502
    • Opcode Fuzzy Hash: 6d59f63558e9b3ae9250777bdcb14d0b916e38d13a4711c723816a8cddaa7941
    • Instruction Fuzzy Hash: 94C1F832628A81DAEB04CF12E8541B9BBA5FB8AF95F449135CE0E97314DF3DE446CB50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 110 7ff670ff3b00-7ff670ff3b93 call 7ff670ff4da0 RtlAllocateHeap 113 7ff670ff591e 110->113 114 7ff670ff3b99-7ff670ff3bb1 RtlCreateSecurityDescriptor 110->114 118 7ff670ff5928-7ff670ff592d 113->118 115 7ff670ff3e8f-7ff670ff3e97 114->115 116 7ff670ff3bb7-7ff670ff3bde GetCurrentProcess OpenProcessToken 114->116 119 7ff670ff3ea5-7ff670ff3f09 RtlFreeHeap * 2 call 7ff670ff4910 115->119 120 7ff670ff3e99-7ff670ff3ea0 CloseHandle 115->120 117 7ff670ff3be4-7ff670ff3c0f GetTokenInformation 116->117 116->118 121 7ff670ff3c15-7ff670ff3c71 RtlLengthSid * 2 RtlAllocateHeap 117->121 122 7ff670ff5932-7ff670ff5937 117->122 118->115 120->119 124 7ff670ff593c 121->124 125 7ff670ff3c77-7ff670ff3c91 RtlSetOwnerSecurityDescriptor 121->125 122->115 130 7ff670ff5946-7ff670ff594b 124->130 127 7ff670ff3e87 125->127 128 7ff670ff3c97-7ff670ff3cb1 RtlCreateAcl 125->128 127->115 128->127 129 7ff670ff3cb7-7ff670ff3cdc RtlAddAccessAllowedAce 128->129 129->127 131 7ff670ff3ce2-7ff670ff3d07 RtlAddAccessAllowedAce 129->131 130->127 131->127 132 7ff670ff3d0d-7ff670ff3d2f RtlAddAccessAllowedAce 131->132 132->127 133 7ff670ff3d35-7ff670ff3d4e RtlSetDaclSecurityDescriptor 132->133 133->130 134 7ff670ff3d54-7ff670ff3d99 RtlAllocateAndInitializeSid 133->134 134->127 135 7ff670ff3d9f-7ff670ff3dbd RtlCreateAcl 134->135 135->127 136 7ff670ff3dc3-7ff670ff3df1 RtlAddMandatoryAce 135->136 136->127 137 7ff670ff3df7-7ff670ff3e13 RtlSetSaclSecurityDescriptor 136->137 137->127 138 7ff670ff3e15-7ff670ff3e32 RtlMakeSelfRelativeSD 137->138 139 7ff670ff595a-7ff670ff5964 138->139 140 7ff670ff3e38-7ff670ff3e61 RtlAllocateHeap 138->140 139->127 141 7ff670ff5950-7ff670ff5955 140->141 142 7ff670ff3e67-7ff670ff3e82 RtlMakeSelfRelativeSD 140->142 141->127 142->127 143 7ff670ff3e84 142->143 143->127
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Heap$AllocateDescriptorSecurity$AccessAllowedCreate$FreeLengthMakeProcessRelativeSelfToken$CloseCurrentDaclHandleInformationInitializeMandatoryOpenOwnerSacl
    • String ID: L
    • API String ID: 598312902-2909332022
    • Opcode ID: 506d46e6beef75c7f215ccb76f1581593da3995ec034d3192a43e9cbbe5fd192
    • Instruction ID: 9c4d0ded73822ca0138102971c2b5d861b5df8e8f672db36f509ec0764eeb8a3
    • Opcode Fuzzy Hash: 506d46e6beef75c7f215ccb76f1581593da3995ec034d3192a43e9cbbe5fd192
    • Instruction Fuzzy Hash: 1DB11932B28B92DAE7108B15E4546B97BA8FB89B84F414135CE4DD3714DF3CE509CB50

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: AccessAllowedLength$Security$CreateDescriptorHeap$AllocateCloseDaclErrorEventFreeHandleInitLastObjectOpenStringUnicode
    • String ID: Failed to set event SD: 0x%x$LsapBuildSD: Could not open %ws, %d$\SECURITY\LSA_AUTHENTICATION_INITIALIZED
    • API String ID: 3005728438-4258887979
    • Opcode ID: 6abc520488d19def496a043c590a70bfebc8871324256bd286a9b73a6291d30c
    • Instruction ID: f11fd8d6bfa1e3cf1100021744d69497a9c63a56b3d3f53ca29aa0cdda4ad67c
    • Opcode Fuzzy Hash: 6abc520488d19def496a043c590a70bfebc8871324256bd286a9b73a6291d30c
    • Instruction Fuzzy Hash: A3612E22B2CB82E7E7109B55A8442756BA8FB8AB85F445131CE0ED7750DF7DF446CB20

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Port$Connect$CloseCreateInitStringUnicode$AcceptCompleteHandleListenThread
    • String ID: 0$LsapRmInitializeServer: CreateThread failed: 0x%lx$LsapRmInitializeServer: NtAcceptConnectPort failed: 0x%lx$LsapRmInitializeServer: NtCompleteConnectPort failed: 0x%lx$LsapRmInitializeServer: NtConnectPort failed: 0x%lx$LsapRmInitializeServer: NtCreatePort failed: 0x%lx$LsapRmInitializeServer: NtListenPort failed: 0x%lx$LsapRmInitializeServer: Server protocol mismatch$\SeLsaCommandPort$\SeRmCommandPort
    • API String ID: 930521548-1997921343
    • Opcode ID: 3c840595d18e7e85745ffedd1369cc2e6112a80490d38167f083d6cdedc30972
    • Instruction ID: 9c5eafd2f5a3906be66ff74d610b7029e9881220bf48144d7540b40a1a6d2270
    • Opcode Fuzzy Hash: 3c840595d18e7e85745ffedd1369cc2e6112a80490d38167f083d6cdedc30972
    • Instruction Fuzzy Hash: 41812633A2CB86AAE7109B50E4806A9B7A9FB89744F401136CE4DC7754EFBCF145CB60

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 316 7ff670ff1e10-7ff670ff1e26 317 7ff670ff1e52-7ff670ff1e64 316->317 318 7ff670ff1e28-7ff670ff1e2f 316->318 321 7ff670ff1e94-7ff670ff1eb0 317->321 322 7ff670ff1e66-7ff670ff1e6d 317->322 319 7ff670ff1e35-7ff670ff1e50 call 7ff670ff5c34 318->319 320 7ff670ff20bb-7ff670ff20c3 318->320 326 7ff670ff1eb2-7ff670ff1eba 321->326 327 7ff670ff1ebf-7ff670ff1ec9 321->327 324 7ff670ff20b3 322->324 325 7ff670ff1e73-7ff670ff1e92 call 7ff670ff5c34 322->325 324->320 326->327 328 7ff670ff1ecf 327->328 329 7ff670ff1f9b-7ff670ff1faa 327->329 332 7ff670ff1ed0-7ff670ff1ef8 RtlAllocateHeap 328->332 334 7ff670ff1fb5-7ff670ff1fd6 NtFreeVirtualMemory 329->334 335 7ff670ff1fac-7ff670ff1fb3 329->335 337 7ff670ff1f14-7ff670ff1f42 memcpy TrySubmitThreadpoolCallback 332->337 338 7ff670ff1efa-7ff670ff1f01 332->338 336 7ff670ff1fdb-7ff670ff1fe9 334->336 335->336 339 7ff670ff1ff0-7ff670ff200a StartThreadpoolIo 336->339 342 7ff670ff1f44-7ff670ff1f4b 337->342 343 7ff670ff1f7a-7ff670ff1f8e 337->343 340 7ff670ff1f03-7ff670ff1f12 call 7ff670ff5c34 338->340 341 7ff670ff1f6d-7ff670ff1f75 call 7ff670ff6098 338->341 344 7ff670ff200c-7ff670ff2015 339->344 345 7ff670ff2017-7ff670ff201a 339->345 340->341 341->343 342->341 347 7ff670ff1f4d-7ff670ff1f68 GetLastError call 7ff670ff5c34 342->347 343->332 349 7ff670ff1f94 343->349 350 7ff670ff201d-7ff670ff204e DeviceIoControl 344->350 345->350 347->341 349->329 353 7ff670ff2050-7ff670ff2061 GetLastError 350->353 354 7ff670ff20a9-7ff670ff20ae 350->354 353->354 355 7ff670ff2063-7ff670ff206a 353->355 354->324 356 7ff670ff2080-7ff670ff20a4 CancelThreadpoolIo Sleep 355->356 357 7ff670ff206c-7ff670ff207b call 7ff670ff5c34 355->357 356->339 357->356
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Printstrcpy_s
    • String ID: Error processing work on worker thread: %d$Error requesting async ksecdd function call: %d$IOCTL_KSEC_IPC_GET_QUEUED_FUNCTION_CALLS failed. Error %d$KsecRpcIncomingBuffer is NULL returning from ksecdd.$Out of memory while processing work from ksecdd
    • API String ID: 3787927933-2101580765
    • Opcode ID: bec0eb10cb48b36c8b9a3e34b002e5c4ec85025f2c15571b0c26bb520b549cee
    • Instruction ID: cccfe88fbbb97929ce85449013dadc2b7f5a7437ae7c20f5ed802673740f8e97
    • Opcode Fuzzy Hash: bec0eb10cb48b36c8b9a3e34b002e5c4ec85025f2c15571b0c26bb520b549cee
    • Instruction Fuzzy Hash: A6710533A2CAC6A2E6509B11E84026976A9FB45B90F445535CE4ED77A4CF3DF446CF20

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: ErrorLastThreadpool$CreateOpen$AllocAllocateFileInfoMaximumMemoryQuerySystemThreadValueVirtual
    • String ID: FAILED to allocate TLS slot for impersonation token: %d$FAILED to open %ws, status %x$Failed to create worker pool: %d$Unable to setup IO completion thread pool object: %d$\Device\KsecDD
    • API String ID: 4269934032-29491320
    • Opcode ID: 0171794512f477fe5252ade48e0c5e10f03ce1b324161197bf42ae480ddce56a
    • Instruction ID: a97ed32d6fafea27c37cf92de4e01812e24e38b0f06a8fd13cc677e4c1deb674
    • Opcode Fuzzy Hash: 0171794512f477fe5252ade48e0c5e10f03ce1b324161197bf42ae480ddce56a
    • Instruction Fuzzy Hash: 4051297392CBC2A6E750AB14A8442787AAAFB49790F445236DD1DC73A4DFBCB145CF20

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 465 7ff670ff14b0-7ff670ff14e2 TlsSetValue 466 7ff670ff4f5e-7ff670ff4f8b RtlEnterCriticalSection 465->466 467 7ff670ff14e8-7ff670ff14f0 465->467 468 7ff670ff4fe5-7ff670ff5002 RtlLeaveCriticalSection 466->468 469 7ff670ff4f8d-7ff670ff4f9d 466->469 470 7ff670ff14f2-7ff670ff14f5 call 7ff670ff15c0 467->470 471 7ff670ff154b-7ff670ff1551 467->471 468->467 477 7ff670ff5008-7ff670ff5016 call 7ff670ff6098 468->477 472 7ff670ff4f9f-7ff670ff4fa9 469->472 473 7ff670ff4fcb-7ff670ff4fd2 469->473 480 7ff670ff14fa-7ff670ff153f TlsSetValue NtClose RtlFreeHeap 470->480 475 7ff670ff5098-7ff670ff50a0 call 7ff670ff5eb4 471->475 476 7ff670ff1557-7ff670ff155a 471->476 472->473 479 7ff670ff4fab-7ff670ff4fc9 472->479 473->468 481 7ff670ff4fd4-7ff670ff4fe0 call 7ff670ff5c34 473->481 476->470 482 7ff670ff155c-7ff670ff155f 476->482 477->480 479->468 479->473 480->471 481->468 486 7ff670ff1565-7ff670ff156f 482->486 487 7ff670ff501b-7ff670ff5022 482->487 492 7ff670ff1575-7ff670ff157a 486->492 493 7ff670ff506b-7ff670ff5072 486->493 489 7ff670ff5024-7ff670ff5030 call 7ff670ff5c34 487->489 490 7ff670ff5035-7ff670ff5043 call 7ff670ff6098 487->490 489->490 490->480 492->493 498 7ff670ff1580-7ff670ff1584 492->498 496 7ff670ff5074-7ff670ff5080 call 7ff670ff5c34 493->496 497 7ff670ff5085-7ff670ff5093 call 7ff670ff6098 493->497 496->497 497->480 502 7ff670ff158a-7ff670ff15a5 498->502 503 7ff670ff5048-7ff670ff5056 call 7ff670ff6098 498->503 502->480 508 7ff670ff15ab-7ff670ff5066 call 7ff670ff6098 502->508 503->480 508->480
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: CriticalSectionValue$CloseEnterLeave
    • String ID: AsyncKsecDD$Failed to init connection handle. Status: 0x%x$Invalid async ksecdd function call: %d$P$The registered SSPI extenstion does not support ACH
    • API String ID: 761430418-3069603324
    • Opcode ID: d039fbce875294b45697b531774b534c02e19a775d8752ed146dc0fc0b77d779
    • Instruction ID: 742ce0d5196c060428ddada359471cde143c67490f867c3b8b82123cf27b77ea
    • Opcode Fuzzy Hash: d039fbce875294b45697b531774b534c02e19a775d8752ed146dc0fc0b77d779
    • Instruction Fuzzy Hash: 0D513823A2CA82A6FB149B11E444778676AFF8AB44F545031CD0EC73A5CF7CF546CA60

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: File$ControlDeviceInformationInitOpenStringUnicode
    • String ID: )$0$FAILED to open %ws, status %x$FAILED to send ioctl, status %x$Failed to set IOCTL completion modes: 0x%lx$\Device\KsecDD
    • API String ID: 418738462-3470522629
    • Opcode ID: 4e328e762357967a101232e4f3e82f125420dcd6220893dbf7a07ceb950ddc9c
    • Instruction ID: fce4be67929bdb5c1f5bbb90f2526777fa79d85b9bb07864a26c8fe7b64eb4b2
    • Opcode Fuzzy Hash: 4e328e762357967a101232e4f3e82f125420dcd6220893dbf7a07ceb950ddc9c
    • Instruction Fuzzy Hash: 0741E433A2CB82A6E7209B10E4407AAB7A9FB85744F905136DA8DC3754DF7CE149CF20
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Heapmemcpy$AllocateFreememset
    • String ID: %hs - Ignoring API status as marshaling failed$AsyncProcessSecurityContext$The registered SSPI extenstion does not support PSC$Unable to marshal result to caller - sending status only. Status: 0x%x
    • API String ID: 1198260955-2715783643
    • Opcode ID: d3e7c02a1baa2e3ec3beeb51cd41bae28a40bdded41a7396fdfd41674998f21d
    • Instruction ID: 6ced27a2fb5aa7f4baf3f8203ec297e65fa0315d8424f10392825ed0ba14bf96
    • Opcode Fuzzy Hash: d3e7c02a1baa2e3ec3beeb51cd41bae28a40bdded41a7396fdfd41674998f21d
    • Instruction Fuzzy Hash: 85429A37A29B8196EB14CB25D4846AD73A9FB88B84F548635CE4D93754DF3CF481CB10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: InfoOpenQuerySystemValue
    • String ID: %S reg value is missing or invalid, setting %d max async worker threads.$%S reg value is valid, setting %d max async worker threads.$MaxAsyncWorkerThreadsPerCpu$RegOpenKeyEx(%S) failed: %d$System\CurrentControlSet\Control\Lsa
    • API String ID: 1723273871-1864339747
    • Opcode ID: 3262d8f56931d4e025d329bc8ab3e7d016a9381a27b2e5142c0d4870a4f0f3e6
    • Instruction ID: eacb96dafa24183b54ca8cd2c0d18ede48893c7893acb515169ce3f2a4338184
    • Opcode Fuzzy Hash: 3262d8f56931d4e025d329bc8ab3e7d016a9381a27b2e5142c0d4870a4f0f3e6
    • Instruction Fuzzy Hash: 42416A23A2DAC2A6EA20DB10E4847A97368FB84754F445235DE4DD3790EF7CF589CB20
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Event$CreateErrorLastListenOpenServerStatusWin32
    • String ID: LSA_RPC_SERVER_ACTIVE
    • API String ID: 2333346198-676222292
    • Opcode ID: 107d00f422c140182653bcef98be9c980e0dcc3dff63146eb792c6eccc540188
    • Instruction ID: b1ade91fe8188e23fdaf964e4a74878b106eae51175a8b97c4c622fb263a5ac6
    • Opcode Fuzzy Hash: 107d00f422c140182653bcef98be9c980e0dcc3dff63146eb792c6eccc540188
    • Instruction Fuzzy Hash: F2011232A2D682E7E7545B10E8042786A95FF8EB11F898575CD0ED7350DF7CB549CE20
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Error$EventInitLastOpenStatusStringUnicode
    • String ID: 0$@$\SECURITY\LSA_AUTHENTICATION_INITIALIZED
    • API String ID: 1829697641-1309367779
    • Opcode ID: 3ee69b9f7fe7d5b51228079679dfe1ea3bd5f1c4b2418dcc8a699adcbd9e0786
    • Instruction ID: dd72684d60f687b30d04eab6f804a4657bbb308384c8c2cd9be6b4567d9cd468
    • Opcode Fuzzy Hash: 3ee69b9f7fe7d5b51228079679dfe1ea3bd5f1c4b2418dcc8a699adcbd9e0786
    • Instruction Fuzzy Hash: 2701DB32A2CAC196DB108B20E4443AABBA4FB89744F945125DA8E97754DF7CD149CF50
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: CountCurrentTickTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 4104442557-0
    • Opcode ID: f9034db8db06b15acdfbb2eb8ca8321a74d8e79f887fee5fa6c3e4f60b8b5fb4
    • Instruction ID: 7f353438915e3baa1b767aade9a8616b498e1a8117744cfbf94eb9a7c980edc2
    • Opcode Fuzzy Hash: f9034db8db06b15acdfbb2eb8ca8321a74d8e79f887fee5fa6c3e4f60b8b5fb4
    • Instruction Fuzzy Hash: 83111D22B19B819AEB00DF60E8442A833A8FB09758F400A35EE5DC7794DF7CE5A5C754
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: CurrentProcess$DuplicateHandleInformationThreadValue
    • String ID:
    • API String ID: 2014987598-0
    • Opcode ID: 1b5136a208f2c25444dd4bc9e9ddf789073cec38cf328338cc10ecee92c6dbe7
    • Instruction ID: 2bd6459306b11aca6457552f2b9b4bd4e01550f31f5b2099b2cf641e23e0358f
    • Opcode Fuzzy Hash: 1b5136a208f2c25444dd4bc9e9ddf789073cec38cf328338cc10ecee92c6dbe7
    • Instruction Fuzzy Hash: 31110A32618B81CAE6008F51E804379BBA4FB8ABA5F488234DE5D97794CF7CE409CB10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: PortReplyRequestWaitmemcpy
    • String ID: LsapCallRm: Command sent from LSA to RM failed: 0x%lx
    • API String ID: 588455312-852739191
    • Opcode ID: 9ebe98563c8e98c9322fbeb7af6b4d54fac5ee88f59f0f088cf753b353241b78
    • Instruction ID: 49648f7be7e52304d24bbbbb348d87ac67dd9d2f690532b66c51476264347c07
    • Opcode Fuzzy Hash: 9ebe98563c8e98c9322fbeb7af6b4d54fac5ee88f59f0f088cf753b353241b78
    • Instruction Fuzzy Hash: 65212A23A2C6C2A6EB30AB15E444BA96268FB89744F401136DE4DC7BA5CF7DF585CF10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: ControlDeviceFile
    • String ID: 0$<
    • API String ID: 3512290074-95265187
    • Opcode ID: 53398734940d5b0fcf1b4b49582678c8f88c8c3b73eddad79cc3e865c087a130
    • Instruction ID: 453c499bdbbc26aa81eafc4d3b3a7ba4d594011800c426acf0b02671082a833d
    • Opcode Fuzzy Hash: 53398734940d5b0fcf1b4b49582678c8f88c8c3b73eddad79cc3e865c087a130
    • Instruction Fuzzy Hash: 47114633A1CB84C5E3208B14E48836E77A4F789790F515239DB9D83764DF39D598CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: PortReceiveReplyWaitmemset
    • String ID:
    • API String ID: 1999590558-0
    • Opcode ID: cc708829147770dee30ca4b05b4ca2cb57c529d1e532347d68d010b765aef9c0
    • Instruction ID: f0bce06d686ad3349dd074b95f876a28412cfd5e24d4806533983700417d352a
    • Opcode Fuzzy Hash: cc708829147770dee30ca4b05b4ca2cb57c529d1e532347d68d010b765aef9c0
    • Instruction Fuzzy Hash: 96212C23A2CAC6A1E6219F54E8842BAA3A5FF88744F444135DB8DC3754DF3CE146DF10
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: ControlDeviceFile
    • String ID:
    • API String ID: 3512290074-0
    • Opcode ID: 668f92e07f5a9bf0d30e045b9d269a06976b1fe05938d5a44826a5ccc55c35d0
    • Instruction ID: 324598b2f91acc9d9e6a0ca3c02dd244bdefcc7a20c7b83723c3b4659e24939e
    • Opcode Fuzzy Hash: 668f92e07f5a9bf0d30e045b9d269a06976b1fe05938d5a44826a5ccc55c35d0
    • Instruction Fuzzy Hash: 26E0C977928B8087D720DB54B44165ABBA4F7C9744F906125EB8A83B18DF3CD015CF04

    Control-flow Graph

    APIs
      • Part of subcall function 00007FF670FF3B00: RtlAllocateHeap.NTDLL ref: 00007FF670FF3B81
      • Part of subcall function 00007FF670FF3B00: RtlCreateSecurityDescriptor.NTDLL ref: 00007FF670FF3BA1
      • Part of subcall function 00007FF670FF3B00: GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF670FF3BB7
      • Part of subcall function 00007FF670FF3B00: OpenProcessToken.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF670FF3BD0
      • Part of subcall function 00007FF670FF3B00: GetTokenInformation.API-MS-WIN-SECURITY-BASE-L1-1-0 ref: 00007FF670FF3C01
      • Part of subcall function 00007FF670FF3B00: RtlLengthSid.NTDLL ref: 00007FF670FF3C24
      • Part of subcall function 00007FF670FF3B00: RtlLengthSid.NTDLL ref: 00007FF670FF3C39
      • Part of subcall function 00007FF670FF3B00: RtlAllocateHeap.NTDLL ref: 00007FF670FF3C5F
      • Part of subcall function 00007FF670FF3B00: RtlSetOwnerSecurityDescriptor.NTDLL ref: 00007FF670FF3C81
      • Part of subcall function 00007FF670FF3B00: RtlCreateAcl.NTDLL ref: 00007FF670FF3CA1
      • Part of subcall function 00007FF670FF3B00: RtlAddAccessAllowedAce.NTDLL ref: 00007FF670FF3CCC
    • RpcServerUseProtseqEpW.RPCRT4 ref: 00007FF670FF3620
    • RtlFreeHeap.NTDLL ref: 00007FF670FF364B
    • RpcServerUseProtseqEpW.RPCRT4 ref: 00007FF670FF368E
    • RpcServerRegisterIf3.RPCRT4 ref: 00007FF670FF36D5
    • RtlFreeHeap.NTDLL ref: 00007FF670FF36F7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Heap$Server$AllocateCreateDescriptorFreeLengthProcessProtseqSecurityToken$AccessAllowedCurrentInformationOpenOwnerRegister
    • String ID: LsapLookupRpcInit: LsapMakeLowBoxRpcSD failed %#x$LsapRPCInit: RpcServerRegisterIf2 failed: 0x%lx$LsapRPCInit: RpcServerUseProtseqEp failed for ncalrpc: 0x%lx$LsapRPCInit: RpcServerUseProtseqEpW failed: 0x%lx$LsapRPCInit: failed to build pipe SD: 0x%lx$\pipe\lsass$lsapolicylookup$ncacn_np$ncalrpc
    • API String ID: 101309030-2159772780
    • Opcode ID: a2e6ec28e67b9fd7d386a7b343d8576f82a6352846eb08262d4de88d22a529e1
    • Instruction ID: f4d6121cfd32d9817b1a20b3a9c750bcb755f502abef6f003fdad878788a9f0c
    • Opcode Fuzzy Hash: a2e6ec28e67b9fd7d386a7b343d8576f82a6352846eb08262d4de88d22a529e1
    • Instruction Fuzzy Hash: 3B515E63A2CA82A6E7109B14E4402B9B7A9FB89B84F405136CE0ED7764DF7CF545CF20

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: AllocateFreeInitialize$CapabilityCreateDeriveFromNameSids
    • String ID: lpacIdentityServices
    • API String ID: 270063187-619869300
    • Opcode ID: 850bed3ad35a0aaa1f5b7561a737a667b97a8a1c29c1443ad4c0e44c6ac77ec9
    • Instruction ID: 9b980b8ea634e618c5e176c5b769c26aa8fe2ed969abc30c0780a3af072cb6d3
    • Opcode Fuzzy Hash: 850bed3ad35a0aaa1f5b7561a737a667b97a8a1c29c1443ad4c0e44c6ac77ec9
    • Instruction Fuzzy Hash: CFC1E937A28B919AE7108F64E48019EBBB8FB88748F505126EF8993B18DF7DD144CF50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 265 7ff670ff2cd0-7ff670ff2d23 RegOpenKeyExW 266 7ff670ff54ca-7ff670ff54d0 265->266 267 7ff670ff2d29-7ff670ff2d5c RegQueryValueExW 265->267 270 7ff670ff2e32-7ff670ff2e44 266->270 271 7ff670ff54d6-7ff670ff54eb call 7ff670ff5c34 266->271 268 7ff670ff2d62-7ff670ff2d6b 267->268 269 7ff670ff54f0-7ff670ff54f5 267->269 272 7ff670ff5521-7ff670ff5528 268->272 273 7ff670ff2d71-7ff670ff2d75 268->273 269->268 275 7ff670ff54fb-7ff670ff5501 269->275 276 7ff670ff2e52-7ff670ff2e55 270->276 277 7ff670ff2e46-7ff670ff2e4d RegCloseKey 270->277 271->270 282 7ff670ff554d-7ff670ff5550 272->282 283 7ff670ff552a-7ff670ff5530 272->283 278 7ff670ff2d7b-7ff670ff2d82 273->278 279 7ff670ff55a7-7ff670ff55ad 273->279 275->270 281 7ff670ff5507-7ff670ff551c call 7ff670ff5c34 275->281 284 7ff670ff55ca-7ff670ff55e8 RtlFreeHeap 276->284 285 7ff670ff2e5b-7ff670ff2e62 276->285 277->276 288 7ff670ff2d88-7ff670ff2db1 RtlAllocateHeap 278->288 289 7ff670ff5559-7ff670ff555f 278->289 291 7ff670ff55c0-7ff670ff55c5 279->291 292 7ff670ff55af-7ff670ff55bb call 7ff670ff5c34 279->292 281->270 282->289 293 7ff670ff5532-7ff670ff553e call 7ff670ff5c34 283->293 294 7ff670ff5543-7ff670ff5548 283->294 286 7ff670ff55ee-7ff670ff55f5 284->286 285->286 287 7ff670ff2e68-7ff670ff2e6f 285->287 286->287 295 7ff670ff55fb-7ff670ff5610 call 7ff670ff5c34 286->295 288->270 297 7ff670ff2db3-7ff670ff2de6 RegQueryValueExW 288->297 289->294 296 7ff670ff5561-7ff670ff5577 call 7ff670ff5c34 289->296 291->270 292->291 293->294 294->270 295->287 296->270 303 7ff670ff557c-7ff670ff5582 297->303 304 7ff670ff2dec-7ff670ff2e0d 297->304 303->270 307 7ff670ff5588-7ff670ff55a2 call 7ff670ff5c34 303->307 304->270 308 7ff670ff2e0f-7ff670ff2e11 304->308 307->270 310 7ff670ff2e14 call 7ff670ff2fd0 308->310 312 7ff670ff2e19-7ff670ff2e1c 310->312 313 7ff670ff2e1e 312->313 314 7ff670ff2e29-7ff670ff2e30 312->314 315 7ff670ff2e20-7ff670ff2e27 313->315 314->270 314->308 315->314 315->315
    APIs
    • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF670FF2D13
    • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF670FF2D4C
    • RtlAllocateHeap.NTDLL ref: 00007FF670FF2D9F
    • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF670FF2DD6
      • Part of subcall function 00007FF670FF2FD0: wcschr.API-MS-WIN-CORE-CRT-L1-1-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF2FED
      • Part of subcall function 00007FF670FF2FD0: LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF3067
      • Part of subcall function 00007FF670FF2FD0: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF308D
      • Part of subcall function 00007FF670FF2FD0: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF30B3
    • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF670FF2E46
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: AddressProcQueryValue$AllocateCloseHeapLibraryLoadOpenwcschr
    • String ID: Extensions$LsapLoadRequiredExtensions failed: 0x%x$LsapLoadRequiredExtensions: Bad REG_MULTI_SZ size for LSA extensions value$LsapLoadRequiredExtensions: Bad REG_SZ size for LSA extensions value$LsapLoadRequiredExtensions: Bad reg type %lu for LSA extensions value$LsapLoadRequiredExtensions: RegOpenKeyEx for LSA key failed: %lu$LsapLoadRequiredExtensions: RegQueryValueEx for LSA key failed with Size %lu: %lu$LsapLoadRequiredExtensions: RegQueryValueEx for LSA key failed: %lu$System\CurrentControlSet\Control\LsaExtensionConfig\LsaSrv
    • API String ID: 2560936009-2540380729
    • Opcode ID: 15e62ca1fbdbf18b6326764320d2013e54f81fa27f34b70837d0380722beba09
    • Instruction ID: 4eb1561803c90deceaa8e0d8a8252bb2fe507b243024ed78f793e626bb1125ae
    • Opcode Fuzzy Hash: 15e62ca1fbdbf18b6326764320d2013e54f81fa27f34b70837d0380722beba09
    • Instruction Fuzzy Hash: 65716B23A2C682A6EB608B14E850279B7A9FB84B40F585131DE4ED7794DF7CF941CF20

    Control-flow Graph

    APIs
    • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF670FF28D7
    • RegEnumKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF670FF2929
    • wcstol.API-MS-WIN-CORE-CRT-L1-1-0 ref: 00007FF670FF2954
    • RegOpenKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF670FF298A
      • Part of subcall function 00007FF670FF2E80: RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,00007FF670FF29AB), ref: 00007FF670FF2EBA
      • Part of subcall function 00007FF670FF2E80: RtlAllocateHeap.NTDLL ref: 00007FF670FF2F05
      • Part of subcall function 00007FF670FF2E80: RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,00007FF670FF29AB), ref: 00007FF670FF2F3E
      • Part of subcall function 00007FF670FF2E80: RtlFreeHeap.NTDLL(?,?,?,?,?,00007FF670FF29AB), ref: 00007FF670FF2F8F
    • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF670FF29D2
    • RegEnumKeyExW.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF670FF2A0D
    • RegCloseKey.API-MS-WIN-CORE-REGISTRY-L1-1-0 ref: 00007FF670FF2A42
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: CloseEnumHeapOpenQueryValue$AllocateFreewcstol
    • String ID: Ignore failure to load LSA extension from %ws: 0x%X$Ignore failure to load interface %ul from extension %ws: 0x%X$Ignore failure to open interface reg key %ws: 0x%X$LsapLoadLsaInterfaces failed: 0x%X$RegEnumKeyEx failed at index %u: 0x%X$System\CurrentControlSet\Control\LsaExtensionConfig\Interfaces
    • API String ID: 1856249899-1759407294
    • Opcode ID: cf9f0174076546a2b90615f0cbfd6a0d667aae48a3f512f7ca916d96d10072d5
    • Instruction ID: 55147c5c1dbf8f9036d72f749a6b81533be014fecec75ed352ddc1d7f2eac530
    • Opcode Fuzzy Hash: cf9f0174076546a2b90615f0cbfd6a0d667aae48a3f512f7ca916d96d10072d5
    • Instruction Fuzzy Hash: BF713D32B2CA82AAE7608F61E8502B87769FB48748F005135CE4DE7B54DF7CE505DB60

    Control-flow Graph

    APIs
    • wcschr.API-MS-WIN-CORE-CRT-L1-1-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF2FED
      • Part of subcall function 00007FF670FF3120: _wcsicmp.API-MS-WIN-CORE-CRT-L1-1-0(?,?,00000000,00007FF670FF300A,?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF314C
      • Part of subcall function 00007FF670FF31A0: RtlAllocateHeap.NTDLL ref: 00007FF670FF31D0
      • Part of subcall function 00007FF670FF31A0: RtlAllocateHeap.NTDLL ref: 00007FF670FF322F
    • LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF3067
    • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF308D
    • GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF30B3
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF5645
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF5675
    • RtlNtStatusToDosError.NTDLL ref: 00007FF670FF56C7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Error$AddressAllocateHeapLastProc$LibraryLoadStatus_wcsicmpwcschr
    • String ID: InitializeLsaExtension$LsaInitializeExtension: Can't get init routine for %ws: %lu$LsaInitializeExtension: Init routine for %ws failed: 0x%lx$LsapLoadLsaExtension: Can't load library for %ws: %lu$QueryLsaInterface
    • API String ID: 3760715416-925660137
    • Opcode ID: 83c2e5219bb234051b898bfcea99360255b6155258536f4c90e73e430355c187
    • Instruction ID: 9345961c67e27aeb5a49cfb6265815d7b79a835416f7e7241b7207d0e1296f18
    • Opcode Fuzzy Hash: 83c2e5219bb234051b898bfcea99360255b6155258536f4c90e73e430355c187
    • Instruction Fuzzy Hash: FF514C33A2DB82A7EB148B11A40027876A8FB44B94F894136CE0ED7790EF7CB551CF60
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Print$_vsnprintf_sstrcpy_s
    • String ID: $Error printing message$Error printing message: Bad ComponentName
    • API String ID: 3553409722-1160014140
    • Opcode ID: 4b3a8ac37d490b3f6776a85756809935cd66aaa570da6ba9245325964ddfffd7
    • Instruction ID: e6f80326568bedd4152cfd859ff06008a8e770878c7402ddb2693b5eb7da8500
    • Opcode Fuzzy Hash: 4b3a8ac37d490b3f6776a85756809935cd66aaa570da6ba9245325964ddfffd7
    • Instruction Fuzzy Hash: 62414C32A2CBC296E7108B20A4543A977A9FB89B40F545235CE5ED7794CF3CF106CB10
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: CloseErrorEventHandleLast$InitOpenStringUnicode
    • String ID: SetKsecEvent: Could not open event %ws: %lu$SetKsecEvent: Failed to set ksec event: %lu$\SECURITY\LSA_AUTHENTICATION_INITIALIZED
    • API String ID: 809771776-2870219596
    • Opcode ID: 208c6abdec9711598f65e0158595158e30e9393eff1efcbc29aa4e5ef41a8334
    • Instruction ID: abbd9c5ac1277d608e44f44cab7f157acbbb32c87a16027577b3770b190a6952
    • Opcode Fuzzy Hash: 208c6abdec9711598f65e0158595158e30e9393eff1efcbc29aa4e5ef41a8334
    • Instruction Fuzzy Hash: 7211F123A2C687E6FB145B21A8442B86A98EF49B55F485135CD0EDB390DF3CB585CF60
    APIs
    Strings
    • IOCTL_KSEC_IPC_GET_QUEUED_FUNCTION_CALLS failed. Error %d, xrefs: 00007FF670FF438E
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Threadpool$CancelControlDeviceErrorLastSleepStart
    • String ID: IOCTL_KSEC_IPC_GET_QUEUED_FUNCTION_CALLS failed. Error %d
    • API String ID: 2717079082-2034248344
    • Opcode ID: efe3dbda4c9d22f01a96fb8478ecec70392ddb40b96ba97110f809a42686819d
    • Instruction ID: 8b5dd685b50c7e6057325ef14117651303b292ae383e75a7b7955a122af78bc5
    • Opcode Fuzzy Hash: efe3dbda4c9d22f01a96fb8478ecec70392ddb40b96ba97110f809a42686819d
    • Instruction Fuzzy Hash: 7D210A3392CAC1A6E710AB01A840579BAA9FB89B81F445135DE4ED7764CF7CF546CB10
    APIs
    • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,00007FF670FF29AB), ref: 00007FF670FF2EBA
    • RtlAllocateHeap.NTDLL ref: 00007FF670FF2F05
    • RegQueryValueExW.API-MS-WIN-CORE-REGISTRY-L1-1-0(?,?,?,?,?,00007FF670FF29AB), ref: 00007FF670FF2F3E
    • RtlFreeHeap.NTDLL(?,?,?,?,?,00007FF670FF29AB), ref: 00007FF670FF2F8F
      • Part of subcall function 00007FF670FF2FD0: wcschr.API-MS-WIN-CORE-CRT-L1-1-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF2FED
      • Part of subcall function 00007FF670FF2FD0: LoadLibraryExW.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF3067
      • Part of subcall function 00007FF670FF2FD0: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF308D
      • Part of subcall function 00007FF670FF2FD0: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0(?,00000000,00000000,00007FF670FF2E19), ref: 00007FF670FF30B3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: AddressHeapProcQueryValue$AllocateFreeLibraryLoadwcschr
    • String ID: Extension
    • API String ID: 61847128-491175892
    • Opcode ID: 4421651393d5d5b515d2dc0557c9540934e69e32595b0117bc92461119de655b
    • Instruction ID: aecd180ad7ee3020a524a73119d520a72b0d3723985e0f09d9d229c23050c4ea
    • Opcode Fuzzy Hash: 4421651393d5d5b515d2dc0557c9540934e69e32595b0117bc92461119de655b
    • Instruction Fuzzy Hash: 9F311D3272CA8192EB508B15E80016AA7A5FB89B90F944235EE9DC7B94DF3CE445CF10
    APIs
    • GetEnvironmentVariableW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF670FF474F
    • SetEnvironmentVariableW.API-MS-WIN-CORE-PROCESSENVIRONMENT-L1-1-0 ref: 00007FF670FF4794
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: EnvironmentVariable
    • String ID: FixupEnvironment: Setting PATH to %ws$Path$SystemRoot
    • API String ID: 1431749950-63685687
    • Opcode ID: 429548a632e4cda0035b4c7d1bf668710c36a0dbdf565ae9989af7319a8b2c6b
    • Instruction ID: 53de3e57e273948545449af6900805b8995b4670c3f75662be85b34d0bbeaf7a
    • Opcode Fuzzy Hash: 429548a632e4cda0035b4c7d1bf668710c36a0dbdf565ae9989af7319a8b2c6b
    • Instruction Fuzzy Hash: D7114F23A2CAC2A2EB109B20E8547B96368FB99704F405135DE4ED3765EF7CF185CE24
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Resource$AcquireRelease$AllocateExclusiveHeapShared
    • String ID:
    • API String ID: 1184658403-0
    • Opcode ID: 3c72bee56e70b81a63db3848d96423109738bd3ef05a0838ff556a580b943940
    • Instruction ID: dc64fe76d697adafa73f25fb7f88ebe2c926ae25aafe69919842d3b47437b2e3
    • Opcode Fuzzy Hash: 3c72bee56e70b81a63db3848d96423109738bd3ef05a0838ff556a580b943940
    • Instruction Fuzzy Hash: 6D412732A2CA82A6EB508F15E85016877A9FB88B94F598432DE4DC7354DF3CF851CB60
    APIs
    • DeviceIoControl.API-MS-WIN-CORE-IO-L1-1-0(?,?,?,?,?,?,?,00007FF670FF600A), ref: 00007FF670FF4D14
    • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,?,?,?,?,00007FF670FF600A), ref: 00007FF670FF4D24
    Strings
    • AsyncKsecSendResponse parameter check failed. Response: 0x%p ResponseSize: 0x%x, xrefs: 00007FF670FF4D71
    • AsyncKsecSendResponse DeviceIoControl failed. Error: 0x%x, xrefs: 00007FF670FF4D4D
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: ControlDeviceErrorLast
    • String ID: AsyncKsecSendResponse DeviceIoControl failed. Error: 0x%x$AsyncKsecSendResponse parameter check failed. Response: 0x%p ResponseSize: 0x%x
    • API String ID: 2645620995-2917768095
    • Opcode ID: 26e6bc6893c822819c25de5b9ec054255117805be13f6a5d23426108b26867b3
    • Instruction ID: 44d301070e4c00ec9c6e397f81432657d9f3e9d5b4e65c4a95708a5baf6ba859
    • Opcode Fuzzy Hash: 26e6bc6893c822819c25de5b9ec054255117805be13f6a5d23426108b26867b3
    • Instruction Fuzzy Hash: C3119123B2C782A6FB106B55944477C3598AF89B40F444235CE0ECB390DFACB841CA60
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: Event$CreateErrorLastOpen
    • String ID: LSA_SUBSYSTEM_INITIALIZED
    • API String ID: 287663209-443175204
    • Opcode ID: b4573ca23f7e1bc54eca2cbff7b8823785a1b4424b67c20f2c7439f019d9b5c2
    • Instruction ID: 8d62ca062c26ea6b597f4f10dbfabbce7309e821f9fe4ba12349801e11c00bb3
    • Opcode Fuzzy Hash: b4573ca23f7e1bc54eca2cbff7b8823785a1b4424b67c20f2c7439f019d9b5c2
    • Instruction Fuzzy Hash: 0CF03063E2EAC2EAFA545F5098002786694EF89711F848475CD0ED3390CF3C7545CE21
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2141496588.00007FF670FF1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF670FF0000, based on PE: true
    • Associated: 00000000.00000002.2141454745.00007FF670FF0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141519478.00007FF670FF7000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF670FFE000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2141537040.00007FF671000000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff670ff0000_lsass.jbxd
    Similarity
    • API ID: CaptureContextEntryFunctionLookupUnwindVirtual__raise_securityfailure
    • String ID:
    • API String ID: 140117192-0
    • Opcode ID: cbb0e41fbf2ff064e311a48bc028aa05b758296750af8ad691d823895dd5b11e
    • Instruction ID: bda961fe80bff53b6b139de84d2e755acc25f7fde764130a3b27e1048eeef1f0
    • Opcode Fuzzy Hash: cbb0e41fbf2ff064e311a48bc028aa05b758296750af8ad691d823895dd5b11e
    • Instruction Fuzzy Hash: 8A41C636A2CB81A1EA109B08F8903657369FB88784F904136DD8DC37A4DF7DF546CB24