Edit tour

Windows Analysis Report
RuntimeBroker.exe

Overview

General Information

Sample name:RuntimeBroker.exe
Analysis ID:1500468
MD5:864daf03da104a8aa3ba7c2ed5ffddbc
SHA1:0811c39fd76395ed47646310bf5ecf57a0ac8ce4
SHA256:579dfced8f02a7e1e6e8df10c400117d3127ead7231776a1e467eb507261e920
Tags:exe
Infos:

Detection

Score:24
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Sigma detected: System File Execution Location Anomaly
Binary contains a suspicious time stamp
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found evasive API chain checking for process token information
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • RuntimeBroker.exe (PID: 7416 cmdline: "C:\Users\user\Desktop\RuntimeBroker.exe" MD5: 864DAF03DA104A8AA3BA7C2ED5FFDDBC)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\Desktop\RuntimeBroker.exe", CommandLine: "C:\Users\user\Desktop\RuntimeBroker.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\RuntimeBroker.exe, NewProcessName: C:\Users\user\Desktop\RuntimeBroker.exe, OriginalFileName: C:\Users\user\Desktop\RuntimeBroker.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Users\user\Desktop\RuntimeBroker.exe", ProcessId: 7416, ProcessName: RuntimeBroker.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: RuntimeBroker.exeStatic PE information: certificate valid
Source: RuntimeBroker.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, FORCE_INTEGRITY, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: RuntimeBroker.pdbUGP source: RuntimeBroker.exe
Source: Binary string: RuntimeBroker.pdb source: RuntimeBroker.exe
Source: C:\Users\user\Desktop\RuntimeBroker.exeCode function: 0_2_00007FF64EEC7470 NtQueryWnfStateData,GetProcAddress,0_2_00007FF64EEC7470
Source: C:\Users\user\Desktop\RuntimeBroker.exeCode function: 0_2_00007FF64EEC32C00_2_00007FF64EEC32C0
Source: C:\Users\user\Desktop\RuntimeBroker.exeCode function: 0_2_00007FF64EEC75940_2_00007FF64EEC7594
Source: C:\Users\user\Desktop\RuntimeBroker.exeCode function: 0_2_00007FF64EEC29400_2_00007FF64EEC2940
Source: C:\Users\user\Desktop\RuntimeBroker.exeCode function: 0_2_00007FF64EEC26C00_2_00007FF64EEC26C0
Source: RuntimeBroker.exeBinary or memory string: OriginalFilename vs RuntimeBroker.exe
Source: classification engineClassification label: sus24.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\RuntimeBroker.exeCode function: 0_2_00007FF64EEC3040 SetErrorMode,SetProcessShutdownParameters,CoInitializeEx,CoIncrementMTAUsage,CoCreateInstance,#99,CoInitializeSecurity,CoDecrementMTAUsage,EtwEventUnregister,PowerSettingUnregisterNotification,CloseHandle,GetCurrentProcess,TerminateProcess,0_2_00007FF64EEC3040
Source: RuntimeBroker.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\RuntimeBroker.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Users\user\Desktop\RuntimeBroker.exeSection loaded: umpdc.dllJump to behavior
Source: RuntimeBroker.exeStatic PE information: certificate valid
Source: initial sampleStatic PE information: Valid certificate with Microsoft Issuer
Source: RuntimeBroker.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: RuntimeBroker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: RuntimeBroker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: RuntimeBroker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: RuntimeBroker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: RuntimeBroker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: RuntimeBroker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: RuntimeBroker.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, FORCE_INTEGRITY, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: RuntimeBroker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: RuntimeBroker.pdbUGP source: RuntimeBroker.exe
Source: Binary string: RuntimeBroker.pdb source: RuntimeBroker.exe
Source: RuntimeBroker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: RuntimeBroker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: RuntimeBroker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: RuntimeBroker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: RuntimeBroker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: RuntimeBroker.exeStatic PE information: 0x6B2DB9AF [Fri Dec 25 00:32:47 2026 UTC]
Source: RuntimeBroker.exeStatic PE information: section name: .imrsiv
Source: C:\Users\user\Desktop\RuntimeBroker.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RuntimeBroker.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-5055
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\RuntimeBroker.exeCode function: 0_2_00007FF64EECF60C VirtualQuery,GetSystemInfo,SetThreadStackGuarantee,VirtualAlloc,VirtualProtect,0_2_00007FF64EECF60C
Source: C:\Users\user\Desktop\RuntimeBroker.exeCode function: 0_2_00007FF64EECEF7C IsDebuggerPresent,0_2_00007FF64EECEF7C
Source: C:\Users\user\Desktop\RuntimeBroker.exeCode function: 0_2_00007FF64EECA014 GetProcessHeap,HeapFree,0_2_00007FF64EECA014
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\RuntimeBroker.exeCode function: 0_2_00007FF64EEC6470 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF64EEC6470
Source: C:\Users\user\Desktop\RuntimeBroker.exeCode function: 0_2_00007FF64EEC5E68 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF64EEC5E68
Source: C:\Users\user\Desktop\RuntimeBroker.exeCode function: 0_2_00007FF64EEC6668 SetUnhandledExceptionFilter,0_2_00007FF64EEC6668
Source: C:\Users\user\Desktop\RuntimeBroker.exeCode function: 0_2_00007FF64EEC630C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF64EEC630C
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Timestomp
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1500468 Sample: RuntimeBroker.exe Startdate: 28/08/2024 Architecture: WINDOWS Score: 24 7 Sigma detected: System File Execution Location Anomaly 2->7 5 RuntimeBroker.exe 2->5         started        process3

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
RuntimeBroker.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1500468
Start date and time:2024-08-28 14:38:04 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 33s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:1
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:RuntimeBroker.exe
Detection:SUS
Classification:sus24.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 9
  • Number of non-executed functions: 32
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • VT rate limit hit for: RuntimeBroker.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.337301399311605
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:RuntimeBroker.exe
File size:102'832 bytes
MD5:864daf03da104a8aa3ba7c2ed5ffddbc
SHA1:0811c39fd76395ed47646310bf5ecf57a0ac8ce4
SHA256:579dfced8f02a7e1e6e8df10c400117d3127ead7231776a1e467eb507261e920
SHA512:2c96d780e809c5153e0239dd0d3e4f34a6195b4ae8b651a3299c5a2cff5db779fba4c9d54044444a375e36686d8e86f2d8ac5438b534bbe103dbc4384adf7cc2
SSDEEP:3072:dJemf/mcwOwR0G94tunr/nhxm+AofjOkjf/:dJemfDwvR0G94EnrGZAjOE
TLSH:13A36C6E22A830D9E47B52BCC5D24606E7B1B430131257EF06A0C5BD0F27BD5AE39F56
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......[K...*...*...*...A...*...R..R*...*.......A...*...A...*...A...*...A...*...Aq..*...As..*...A...*..Rich.*..........PE..d.....-k...
Icon Hash:90cececece8e8eb0
Entrypoint:0x140005e10
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, FORCE_INTEGRITY, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Time Stamp:0x6B2DB9AF [Fri Dec 25 00:32:47 2026 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:d4d98acf3243e0c97c83c6548571a44e
Signature Valid:true
Signature Issuer:CN=Microsoft Windows Production PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 16/11/2023 19:20:08 14/11/2024 19:20:08
Subject Chain
  • CN=Microsoft Windows, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Version:3
Thumbprint MD5:1E2354965A83BD0EB745A2611567E5DF
Thumbprint SHA-1:71F53A26BB1625E466727183409A30D03D7923DF
Thumbprint SHA-256:CE08760345BD5A18AA9091E6F083522AD593BD42F587699E025AFD55BE589334
Serial:330000045FF3C96C1A7FF7DA1D00000000045F
Instruction
dec eax
sub esp, 28h
call 00007FE89C926EB8h
dec eax
add esp, 28h
jmp 00007FE89C926833h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
nop word ptr [eax+eax+00000000h]
dec eax
cmp ecx, dword ptr [00011289h]
jne 00007FE89C9269D5h
dec eax
rol ecx, 10h
test cx, FFFFh
jne 00007FE89C9269C5h
ret
dec eax
ror ecx, 10h
jmp 00007FE89C926A34h
int3
int3
int3
int3
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, ecx
call dword ptr [0000B7F1h]
mov ecx, 00000001h
mov dword ptr [0001181Eh], eax
call 00007FE89C926F9Eh
xor ecx, ecx
call dword ptr [0000B801h]
dec eax
mov ecx, ebx
call dword ptr [0000B7F0h]
cmp dword ptr [00011801h], 00000000h
jne 00007FE89C9269CCh
mov ecx, 00000001h
call 00007FE89C926F7Ah
call dword ptr [0000B8EFh]
dec eax
mov ecx, eax
mov edx, C0000409h
dec eax
add esp, 20h
pop ebx
dec eax
jmp dword ptr [0000B8B3h]
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
dec eax
mov dword ptr [esp+08h], ecx
dec eax
sub esp, 00000000h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x14dd00x2e4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x958.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x180000x13d4.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x168000x29b0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1b0000x158.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x129100x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x111e00x118.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x115900x650.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xe75d0xe800db8d480a3344ac6953cef18a1d64afe5False0.5401400862068966data6.130989005624656IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.imrsiv0x100000x40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x110000x597e0x5a000fa260a97d9b497e4ca205dd17c2f646False0.38446180555555554data5.037831171378161IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x170000xcb80x200c44a01605dc1a307054db0e92aeec2ddFalse0.166015625data1.0142839915743904IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x180000x13d40x1400140d4dd1279d1b87c8d59ab149d942feFalse0.4953125PEX Binary Archive4.953094732387179IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x1a0000x9580xa00f9adbad9bac51281f82e113a1e7c13dcFalse0.400390625data4.556481347061354IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1b0000x1580x2000a449cec708320ce6ef29e182baffa42False0.533203125data4.029164530294979IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x1a5b00x3a4dataEnglishUnited States0.44527896995708155
RT_MANIFEST0x1a0a00x50bXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.42989930286599537
DLLImport
api-ms-win-crt-runtime-l1-1-0.dll_register_thread_local_exe_atexit_callback, _c_exit, _initterm_e, _initterm
api-ms-win-crt-private-l1-1-0.dll_o__get_wide_winmain_command_line, _o__initialize_onexit_table, _o__initialize_wide_environment, _o__invalid_parameter_noinfo, _o__purecall, _o__register_onexit_function, _o__resetstkoflw, _o__seh_filter_exe, _o__set_app_type, _o__set_fmode, _o__set_new_mode, memmove, _o__exit, _o_exit, _o_terminate, __C_specific_handler, __CxxFrameHandler3, _o___stdio_common_vswprintf, _o__crt_atexit, _o__configure_wide_argv, _o__configthreadlocale, _o__errno, _o__cexit, memcmp, _o___p__commode, memcpy
api-ms-win-crt-string-l1-1-0.dllwcsncmp, memset
ntdll.dllEtwTraceMessage, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, RtlNtStatusToDosError, RtlEqualSid, RtlIsMultiSessionSku, RtlQueryPackageClaims, RtlQueryPackageIdentity, EtwEventRegister, EtwEventUnregister, EtwEventWriteTransfer, EtwEventSetInformation
api-ms-win-security-base-l1-1-0.dllGetKernelObjectSecurity, PrivilegeCheck, AccessCheckByType, GetTokenInformation, GetLengthSid, CreateWellKnownSid, CopySid, MapGenericMask, AccessCheck
api-ms-win-core-com-l1-1-0.dllCoTaskMemAlloc, CoReleaseServerProcess, CoAddRefServerProcess, CoCreateInstance, CoCreateFreeThreadedMarshaler, CoFreeUnusedLibrariesEx, CoTaskMemFree, CoImpersonateClient, CoRegisterClassObject, CoGetCallContext, CoRevokeClassObject, CoResumeClassObjects, CoInitializeEx, CoDecrementMTAUsage, CoRevertToSelf, CoInitializeSecurity, CoIncrementMTAUsage
api-ms-win-core-libraryloader-l1-2-0.dllGetModuleFileNameA, GetProcAddress, GetModuleHandleExW, GetModuleHandleW
api-ms-win-power-setting-l1-1-0.dllPowerSettingUnregisterNotification, PowerSettingRegisterNotification
api-ms-win-core-synch-l1-2-0.dllInitOnceExecuteOnce, InitOnceBeginInitialize, InitOnceComplete
api-ms-win-core-registry-l1-1-0.dllRegCloseKey, RegOpenKeyExW, RegQueryValueExW
api-ms-win-core-synch-l1-1-0.dllReleaseMutex, CreateEventW, InitializeCriticalSectionEx, AcquireSRWLockShared, LeaveCriticalSection, CreateMutexExW, SetEvent, OpenSemaphoreW, ReleaseSRWLockShared, AcquireSRWLockExclusive, DeleteCriticalSection, WaitForSingleObjectEx, WaitForSingleObject, ReleaseSemaphore, CreateSemaphoreExW, EnterCriticalSection, ReleaseSRWLockExclusive
api-ms-win-core-winrt-error-l1-1-0.dllRoGetErrorReportingFlags, RoOriginateError, RoOriginateErrorW, RoSetErrorReportingFlags
api-ms-win-core-heap-l1-1-0.dllGetProcessHeap, HeapAlloc, HeapSetInformation, HeapFree
api-ms-win-core-errorhandling-l1-1-0.dllRaiseException, UnhandledExceptionFilter, SetUnhandledExceptionFilter, SetLastError, GetLastError, SetErrorMode
api-ms-win-core-winrt-string-l1-1-0.dllWindowsDeleteString, WindowsCreateStringReference, WindowsCreateString, WindowsGetStringRawBuffer
api-ms-win-core-processthreads-l1-1-0.dllOpenThreadToken, GetStartupInfoW, TerminateProcess, SetThreadStackGuarantee, GetCurrentProcessId, SetProcessShutdownParameters, GetCurrentThreadId, GetCurrentProcess, GetCurrentThread
RPCRT4.dllUuidEqual
api-ms-win-core-synch-l1-2-1.dllWaitForMultipleObjects
api-ms-win-eventing-provider-l1-1-0.dllEventWriteTransfer, EventUnregister, EventRegister, EventSetInformation
api-ms-win-core-processthreads-l1-1-1.dllSetProcessMitigationPolicy, IsProcessorFeaturePresent, GetProcessMitigationPolicy
api-ms-win-core-winrt-l1-1-0.dllRoGetActivationFactory, RoActivateInstance
api-ms-win-core-threadpool-l1-2-0.dllWaitForThreadpoolTimerCallbacks, CloseThreadpoolTimer, CreateThreadpoolTimer, SetThreadpoolTimer
api-ms-win-core-localization-l1-2-0.dllFormatMessageW
api-ms-win-core-debug-l1-1-0.dllOutputDebugStringW, IsDebuggerPresent, DebugBreak
api-ms-win-core-handle-l1-1-0.dllCloseHandle
api-ms-win-core-heap-l2-1-0.dllLocalFree
api-ms-win-core-psapi-l1-1-0.dllQueryFullProcessImageNameW
api-ms-win-core-profile-l1-1-0.dllQueryPerformanceCounter
api-ms-win-core-sysinfo-l1-1-0.dllGetSystemInfo, GetSystemTimeAsFileTime
api-ms-win-core-interlocked-l1-1-0.dllInitializeSListHead
combase.dll
api-ms-win-security-lsalookup-l1-1-0.dllLsaLookupFreeMemory, LsaLookupClose, LsaLookupOpenLocalPolicy, LsaLookupGetDomainInfo
api-ms-win-appmodel-runtime-l1-1-1.dllGetApplicationUserModelIdFromToken
api-ms-win-core-apiquery-l1-1-0.dllApiSetQueryApiSetPresence
RMCLIENT.dllHamCloseActivity
api-ms-win-core-memory-l1-1-0.dllVirtualAlloc, VirtualProtect, VirtualQuery
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found
0246s020406080100

Click to jump to process

Click to jump to process

Target ID:0
Start time:08:38:53
Start date:28/08/2024
Path:C:\Users\user\Desktop\RuntimeBroker.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\RuntimeBroker.exe"
Imagebase:0x7ff64eec0000
File size:102'832 bytes
MD5 hash:864DAF03DA104A8AA3BA7C2ED5FFDDBC
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Execution Graph

Execution Coverage

Dynamic/Packed Code Coverage

Signature Coverage

Execution Coverage:6.5%
Dynamic/Decrypted Code Coverage:0%
Signature Coverage:12.1%
Total number of Nodes:1351
Total number of Limit Nodes:20
Show Legend
Hide Nodes/Edges
execution_graph 3986 7ff64eec3bb0 RegOpenKeyExW 3987 7ff64eec8f92 RegQueryValueExW 3986->3987 3989 7ff64eec3c03 3986->3989 3992 7ff64eec8fd0 3987->3992 3988 7ff64eec3c0c 3995 7ff64eec3c1e 3988->3995 3999 7ff64eec3c4c 3988->3999 3989->3988 3990 7ff64eec9079 3989->3990 3996 7ff64eecd9e4 20 API calls 3990->3996 3991 7ff64eec8fd5 3993 7ff64eec903b RegCloseKey 3991->3993 3992->3991 3992->3993 4005 7ff64eecd9e4 3992->4005 3993->3989 3998 7ff64eec90aa 3996->3998 4000 7ff64eec3c74 3999->4000 4001 7ff64eec3c6a 3999->4001 4008 7ff64eec6b00 4000->4008 4012 7ff64eec3d60 4001->4012 4399 7ff64eecef7c 4005->4399 4009 7ff64eec6b24 4008->4009 4018 7ff64eec6b90 4009->4018 4013 7ff64eec3d8a 4012->4013 4016 7ff64eec3d7b 4012->4016 4015 7ff64eec3da5 4013->4015 4384 7ff64eec3ee0 4013->4384 4015->4016 4389 7ff64eec4080 4015->4389 4016->4000 4019 7ff64eec6bc9 4018->4019 4020 7ff64eec6c1d 4019->4020 4031 7ff64eec3e3c 4019->4031 4022 7ff64eec3cb6 4020->4022 4024 7ff64eec3f94 4020->4024 4022->3995 4025 7ff64eec3fae AcquireSRWLockExclusive 4024->4025 4029 7ff64eec4000 4024->4029 4026 7ff64eec3fcb 4025->4026 4028 7ff64eec3fec 4025->4028 4026->4028 4040 7ff64eec39f0 4026->4040 4027 7ff64eec3ff1 ReleaseSRWLockExclusive 4027->4029 4028->4027 4028->4029 4029->4022 4029->4029 4032 7ff64eec3e5d 4031->4032 4033 7ff64eec3eba 4031->4033 4032->4033 4034 7ff64eec3e66 AcquireSRWLockExclusive 4032->4034 4033->4020 4361 7ff64eec4018 4034->4361 4039 7ff64eec3eab ReleaseSRWLockExclusive 4039->4033 4041 7ff64eec3a08 4040->4041 4045 7ff64eec39f6 4040->4045 4043 7ff64eec3cf6 AcquireSRWLockExclusive 4041->4043 4044 7ff64eec3d3b 4041->4044 4042 7ff64eec3ab6 4042->4028 4084 7ff64eec44f4 4043->4084 4044->4028 4045->4042 4059 7ff64eec3ad4 4045->4059 4048 7ff64eec3d27 4048->4044 4051 7ff64eec3d2c ReleaseSRWLockExclusive 4048->4051 4050 7ff64eec4160 16 API calls 4050->4048 4051->4044 4053 7ff64eec3a5f AcquireSRWLockExclusive 4071 7ff64eec5228 4053->4071 4058 7ff64eec3aa7 ReleaseSRWLockExclusive 4058->4042 4060 7ff64eec3af1 4059->4060 4061 7ff64eec3a5b 4059->4061 4092 7ff64eec9fe8 GetLastError 4060->4092 4061->4042 4061->4053 4063 7ff64eec3afb 4067 7ff64eec3b02 AcquireSRWLockExclusive 4063->4067 4093 7ff64eec4660 GetCurrentProcessId 4063->4093 4066 7ff64eec3b60 4068 7ff64eec3b69 ReleaseSRWLockExclusive 4066->4068 4069 7ff64eec3b78 4066->4069 4067->4066 4068->4069 4121 7ff64eeca20c 4069->4121 4072 7ff64eec5247 4071->4072 4073 7ff64eec3a7a 4071->4073 4072->4073 4074 7ff64eec5250 AcquireSRWLockExclusive 4072->4074 4077 7ff64eec4160 4073->4077 4075 7ff64eec4160 16 API calls 4074->4075 4076 7ff64eec527c ReleaseSRWLockExclusive 4075->4076 4076->4073 4078 7ff64eec4190 4077->4078 4082 7ff64eec41f5 4077->4082 4296 7ff64eec4270 4078->4296 4080 7ff64eec41a7 4081 7ff64eec3a8f 4080->4081 4318 7ff64eec4210 4080->4318 4081->4042 4081->4058 4085 7ff64eec450f 4084->4085 4086 7ff64eec4521 4084->4086 4326 7ff64eec7708 4085->4326 4088 7ff64eec3d11 4086->4088 4331 7ff64eec4580 4086->4331 4088->4048 4088->4050 4091 7ff64eec4580 15 API calls 4091->4088 4092->4063 4124 7ff64eec5170 4093->4124 4095 7ff64eec46ba CreateMutexW 4126 7ff64eec4c5c 4095->4126 4098 7ff64eec91c2 4178 7ff64eecb3d4 4098->4178 4099 7ff64eec46f6 4131 7ff64eec5114 WaitForSingleObjectEx 4099->4131 4102 7ff64eec91c7 4181 7ff64eecccc4 4102->4181 4107 7ff64eec472b 4108 7ff64eec91e9 4107->4108 4143 7ff64eec4950 4107->4143 4112 7ff64eecccc4 15 API calls 4108->4112 4111 7ff64eec4755 4113 7ff64eec476b 4111->4113 4162 7ff64eec58f0 ReleaseMutex 4111->4162 4114 7ff64eec921c 4112->4114 4113->4114 4116 7ff64eec4774 4113->4116 4184 7ff64eecaa5c CloseHandle 4114->4184 4169 7ff64eec5e40 4116->4169 4122 7ff64eeca224 4121->4122 4123 7ff64eeca215 SetLastError 4121->4123 4122->4061 4123->4122 4125 7ff64eec51a1 4124->4125 4125->4095 4127 7ff64eec46e8 4126->4127 4128 7ff64eec94dc GetLastError 4126->4128 4127->4098 4127->4099 4129 7ff64eecaa5c 17 API calls 4128->4129 4130 7ff64eec94f2 SetLastError 4129->4130 4132 7ff64eec5142 4131->4132 4134 7ff64eec470d 4131->4134 4132->4134 4188 7ff64eecacd4 4132->4188 4135 7ff64eec47a0 4134->4135 4194 7ff64eec4804 4135->4194 4138 7ff64eec4721 4138->4102 4138->4107 4139 7ff64eec47d0 4139->4138 4141 7ff64eecccc4 15 API calls 4139->4141 4140 7ff64eecccc4 15 API calls 4140->4139 4142 7ff64eec9268 4141->4142 4236 7ff64eec50a4 GetProcessHeap HeapAlloc 4143->4236 4145 7ff64eec4989 4146 7ff64eec4995 4145->4146 4147 7ff64eec93e8 4145->4147 4148 7ff64eec49d4 4146->4148 4239 7ff64eec4a30 4146->4239 4149 7ff64eecccc4 15 API calls 4147->4149 4155 7ff64eecaa5c 17 API calls 4148->4155 4157 7ff64eec49e5 4148->4157 4152 7ff64eec9406 4149->4152 4151 7ff64eec49ba 4151->4152 4153 7ff64eec49c4 4151->4153 4154 7ff64eecccc4 15 API calls 4152->4154 4262 7ff64eec4d30 memset 4153->4262 4161 7ff64eec49ef 4154->4161 4155->4157 4160 7ff64eecaa5c 17 API calls 4157->4160 4157->4161 4158 7ff64eec942b GetProcessHeap HeapFree 4159 7ff64eec474b 4159->4108 4159->4111 4160->4161 4161->4158 4161->4159 4163 7ff64eec98d0 4162->4163 4164 7ff64eec5908 4162->4164 4267 7ff64eecd564 4163->4267 4164->4113 4167 7ff64eec9909 4167->4113 4170 7ff64eec5e4a 4169->4170 4171 7ff64eec5ed0 IsProcessorFeaturePresent 4170->4171 4172 7ff64eec478e 4170->4172 4173 7ff64eec5ee8 4171->4173 4172->4067 4282 7ff64eec5fa8 RtlCaptureContext 4173->4282 4292 7ff64eecb360 GetLastError 4178->4292 4182 7ff64eeccb00 15 API calls 4181->4182 4183 7ff64eeccced 4182->4183 4183->4108 4185 7ff64eecaa70 4184->4185 4187 7ff64eec922a 4184->4187 4186 7ff64eecd564 16 API calls 4185->4186 4186->4187 4191 7ff64eeccb00 4188->4191 4192 7ff64eecc8c4 15 API calls 4191->4192 4193 7ff64eecad00 4192->4193 4193->4134 4195 7ff64eec4854 4194->4195 4196 7ff64eec48d4 OpenSemaphoreW 4195->4196 4210 7ff64eec9270 4195->4210 4197 7ff64eec48f8 GetLastError 4196->4197 4196->4210 4199 7ff64eec490d 4197->4199 4197->4210 4200 7ff64eec93c1 4199->4200 4201 7ff64eec4919 4199->4201 4203 7ff64eecaa5c 17 API calls 4200->4203 4204 7ff64eec5e40 9 API calls 4201->4204 4206 7ff64eec93e2 4203->4206 4207 7ff64eec47c6 4204->4207 4205 7ff64eecccc4 15 API calls 4205->4210 4207->4139 4207->4140 4208 7ff64eec9359 OpenSemaphoreW 4209 7ff64eec937d 4208->4209 4208->4210 4211 7ff64eecb910 24 API calls 4209->4211 4210->4205 4210->4208 4218 7ff64eeccca4 4210->4218 4221 7ff64eecb910 WaitForSingleObject 4210->4221 4212 7ff64eec938a 4211->4212 4213 7ff64eec93b3 4212->4213 4215 7ff64eecccc4 15 API calls 4212->4215 4214 7ff64eecaa5c 17 API calls 4213->4214 4214->4200 4216 7ff64eec93ab 4215->4216 4217 7ff64eecaa5c 17 API calls 4216->4217 4217->4213 4219 7ff64eecca6c 16 API calls 4218->4219 4220 7ff64eecccb7 4219->4220 4220->4210 4222 7ff64eecb94e 4221->4222 4223 7ff64eecb933 4221->4223 4224 7ff64eecb974 ReleaseSemaphore 4222->4224 4225 7ff64eecb9cf ReleaseSemaphore 4222->4225 4235 7ff64eecb959 4222->4235 4226 7ff64eeccca4 16 API calls 4223->4226 4224->4223 4227 7ff64eecb990 ReleaseSemaphore 4224->4227 4225->4223 4228 7ff64eecb9f3 4225->4228 4229 7ff64eecb949 4226->4229 4231 7ff64eecb9ae GetLastError 4227->4231 4227->4235 4232 7ff64eecba01 ReleaseSemaphore 4228->4232 4228->4235 4229->4210 4230 7ff64eecccc4 15 API calls 4230->4229 4231->4229 4231->4235 4233 7ff64eecba1b GetLastError 4232->4233 4232->4235 4234 7ff64eecba2e WaitForSingleObject 4233->4234 4233->4235 4234->4235 4235->4229 4235->4230 4237 7ff64eec50e2 GetProcessHeap 4236->4237 4238 7ff64eec50fd 4236->4238 4237->4238 4238->4145 4240 7ff64eec4ab0 4239->4240 4241 7ff64eec4a68 4239->4241 4240->4151 4241->4240 4242 7ff64eec9467 4241->4242 4243 7ff64eec4b2b CreateSemaphoreExW 4241->4243 4245 7ff64eecb3d4 16 API calls 4242->4245 4243->4242 4244 7ff64eec4b58 4243->4244 4246 7ff64eec4c5c 19 API calls 4244->4246 4247 7ff64eec9474 4245->4247 4250 7ff64eec4b63 4246->4250 4248 7ff64eec947e 4247->4248 4247->4250 4249 7ff64eecccc4 15 API calls 4248->4249 4258 7ff64eec4c0a 4249->4258 4251 7ff64eec4bcb CreateSemaphoreExW 4250->4251 4257 7ff64eec4bba 4250->4257 4252 7ff64eec4bfe 4251->4252 4253 7ff64eec94aa 4251->4253 4254 7ff64eec4c5c 19 API calls 4252->4254 4256 7ff64eecb3d4 16 API calls 4253->4256 4254->4258 4255 7ff64eec5e40 9 API calls 4259 7ff64eec4c44 4255->4259 4260 7ff64eec94af 4256->4260 4257->4151 4258->4255 4259->4151 4260->4258 4261 7ff64eecccc4 15 API calls 4260->4261 4261->4258 4263 7ff64eec4d81 4262->4263 4266 7ff64eec4e40 InitializeCriticalSectionEx 4263->4266 4265 7ff64eec4d8d 4265->4148 4266->4265 4277 7ff64eecc9d8 4267->4277 4270 7ff64eecc22c AcquireSRWLockShared 4271 7ff64eecc26a ReleaseSRWLockShared 4270->4271 4275 7ff64eecc279 4270->4275 4271->4275 4272 7ff64eecc284 EnterCriticalSection AcquireSRWLockExclusive 4272->4275 4273 7ff64eecc32e 4273->4167 4274 7ff64eecc2f1 ReleaseSRWLockExclusive 4274->4275 4275->4272 4275->4273 4275->4274 4276 7ff64eecc316 LeaveCriticalSection 4275->4276 4276->4275 4278 7ff64eecb360 16 API calls 4277->4278 4279 7ff64eecca09 4278->4279 4280 7ff64eecc8c4 15 API calls 4279->4280 4281 7ff64eec98df 4280->4281 4281->4167 4281->4270 4283 7ff64eec5fc2 RtlLookupFunctionEntry 4282->4283 4284 7ff64eec5efb 4283->4284 4285 7ff64eec5fd8 RtlVirtualUnwind 4283->4285 4286 7ff64eec5e68 IsDebuggerPresent 4284->4286 4285->4283 4285->4284 4291 7ff64eec6460 4286->4291 4288 7ff64eec5e87 SetUnhandledExceptionFilter UnhandledExceptionFilter 4289 7ff64eec5ea1 4288->4289 4290 7ff64eec5eab GetCurrentProcess TerminateProcess 4288->4290 4289->4290 4291->4288 4293 7ff64eecb3b7 4292->4293 4294 7ff64eecb387 4292->4294 4293->4102 4295 7ff64eeccb00 15 API calls 4294->4295 4295->4293 4297 7ff64eec4293 4296->4297 4298 7ff64eec429d 4296->4298 4297->4080 4315 7ff64eec43f1 4298->4315 4325 7ff64eec9fe8 GetLastError 4298->4325 4300 7ff64eec42c5 GetProcessHeap HeapAlloc 4301 7ff64eec4317 4300->4301 4302 7ff64eec42fc GetProcessHeap 4300->4302 4303 7ff64eec431c 4301->4303 4309 7ff64eec433a 4301->4309 4302->4301 4304 7ff64eeca20c SetLastError 4303->4304 4308 7ff64eec4326 4304->4308 4305 7ff64eec43a7 4306 7ff64eec43d4 4305->4306 4307 7ff64eec43b4 GetProcessHeap HeapFree 4305->4307 4311 7ff64eeca20c SetLastError 4306->4311 4307->4306 4308->4080 4309->4305 4310 7ff64eec4365 memset 4309->4310 4312 7ff64eec4355 memmove 4309->4312 4313 7ff64eec4377 _o__errno 4310->4313 4314 7ff64eec438b 4310->4314 4311->4315 4312->4305 4316 7ff64eec43a2 _o__invalid_parameter_noinfo 4313->4316 4314->4305 4317 7ff64eec4390 _o__errno 4314->4317 4315->4080 4316->4305 4317->4316 4319 7ff64eec422d 4318->4319 4321 7ff64eec4248 4318->4321 4320 7ff64eec9138 _o__errno 4319->4320 4319->4321 4322 7ff64eec9159 memset 4319->4322 4320->4321 4321->4081 4322->4320 4323 7ff64eec9168 4322->4323 4323->4321 4324 7ff64eec916d _o__errno _o__invalid_parameter_noinfo 4323->4324 4324->4321 4325->4300 4327 7ff64eec772c 4326->4327 4329 7ff64eec7753 4326->4329 4343 7ff64eec54f4 4327->4343 4329->4086 4332 7ff64eec45b0 4331->4332 4333 7ff64eec4617 4331->4333 4346 7ff64eec7470 4332->4346 4336 7ff64eec5e40 9 API calls 4333->4336 4339 7ff64eec453f 4336->4339 4337 7ff64eec918e GetLastError 4356 7ff64eecd2e4 4337->4356 4338 7ff64eec45fa 4351 7ff64eec7784 4338->4351 4339->4088 4339->4091 4344 7ff64eec5504 GetProcAddress 4343->4344 4345 7ff64eec550a GetModuleHandleW 4343->4345 4344->4329 4345->4344 4347 7ff64eec45e4 4346->4347 4348 7ff64eec748c 4346->4348 4347->4337 4347->4338 4349 7ff64eec54f4 GetModuleHandleW 4348->4349 4350 7ff64eec7491 GetProcAddress 4349->4350 4350->4347 4352 7ff64eec77b0 4351->4352 4355 7ff64eec77da 4351->4355 4353 7ff64eec54f4 GetModuleHandleW 4352->4353 4354 7ff64eec77b5 GetProcAddress 4353->4354 4354->4355 4355->4333 4357 7ff64eec91a9 SetLastError 4356->4357 4358 7ff64eecd2f9 4356->4358 4359 7ff64eec54f4 GetModuleHandleW 4358->4359 4360 7ff64eecd2fe GetProcAddress 4359->4360 4360->4357 4362 7ff64eec4270 12 API calls 4361->4362 4363 7ff64eec4038 4362->4363 4364 7ff64eec3e96 4363->4364 4365 7ff64eec4210 4 API calls 4363->4365 4366 7ff64eec552c 4364->4366 4365->4364 4367 7ff64eec3ea6 4366->4367 4368 7ff64eec5546 4366->4368 4367->4033 4367->4039 4369 7ff64eec55ae 4368->4369 4379 7ff64eec9fe8 GetLastError 4368->4379 4381 7ff64eec55d4 4369->4381 4372 7ff64eec5556 CreateThreadpoolTimer 4373 7ff64eec55a1 4372->4373 4374 7ff64eec557a GetLastError 4372->4374 4376 7ff64eeca20c SetLastError 4373->4376 4380 7ff64eecac38 SetThreadpoolTimer WaitForThreadpoolTimerCallbacks CloseThreadpoolTimer 4374->4380 4376->4369 4379->4372 4382 7ff64eec560f 4381->4382 4383 7ff64eec55e5 SetThreadpoolTimer 4381->4383 4382->4367 4383->4382 4385 7ff64eec3ef2 AcquireSRWLockExclusive 4384->4385 4388 7ff64eec3f70 4384->4388 4386 7ff64eec3f1b 4385->4386 4387 7ff64eec3f61 ReleaseSRWLockExclusive 4386->4387 4386->4388 4387->4388 4388->4015 4390 7ff64eec40aa AcquireSRWLockExclusive 4389->4390 4398 7ff64eec412e 4389->4398 4391 7ff64eec90f0 4390->4391 4392 7ff64eec40cd 4390->4392 4392->4391 4393 7ff64eec4270 12 API calls 4392->4393 4394 7ff64eec40ed 4393->4394 4394->4391 4395 7ff64eec4210 4 API calls 4394->4395 4396 7ff64eec4115 4395->4396 4397 7ff64eec411f ReleaseSRWLockExclusive 4396->4397 4396->4398 4397->4398 4398->4016 4400 7ff64eecefc5 4399->4400 4402 7ff64eecefd9 4399->4402 4401 7ff64eecefc9 IsDebuggerPresent 4400->4401 4400->4402 4401->4402 4406 7ff64eecf02e 4402->4406 4413 7ff64eecf269 4402->4413 4426 7ff64eecf5c0 4402->4426 4403 7ff64eec5e40 9 API calls 4405 7ff64eecda08 4403->4405 4405->3993 4407 7ff64eecf0c9 4406->4407 4406->4413 4429 7ff64eecea58 4406->4429 4436 7ff64eece3a8 memset 4407->4436 4410 7ff64eecf22a 4411 7ff64eecf22e 4410->4411 4412 7ff64eecf26b 4410->4412 4411->4413 4445 7ff64eece58c 4411->4445 4414 7ff64eece58c 13 API calls 4412->4414 4413->4403 4417 7ff64eecf282 4414->4417 4417->4413 4420 7ff64eeceedc 13 API calls 4417->4420 4419 7ff64eecf24a 4419->4413 4448 7ff64eeceedc InitOnceBeginInitialize 4419->4448 4422 7ff64eecf292 4420->4422 4457 7ff64eece2e4 4422->4457 4462 7ff64eecf56c 4426->4462 4430 7ff64eecea85 4429->4430 4431 7ff64eeceb09 4430->4431 4432 7ff64eeceacf 4430->4432 4433 7ff64eeceba2 4430->4433 4431->4407 4432->4431 4466 7ff64eecec94 4432->4466 4433->4431 4470 7ff64eecec68 4433->4470 4437 7ff64eece531 4436->4437 4441 7ff64eece41c 4436->4441 4438 7ff64eec5e40 9 API calls 4437->4438 4439 7ff64eece558 4438->4439 4439->4410 4442 7ff64eecf3a0 4439->4442 4440 7ff64eece4a5 wcsncmp 4440->4441 4441->4437 4441->4440 4443 7ff64eecf3ac EtwTraceMessage 4442->4443 4443->4410 4446 7ff64eeceedc 13 API calls 4445->4446 4447 7ff64eece59c 4446->4447 4447->4419 4449 7ff64eecef63 4448->4449 4450 7ff64eecef18 4448->4450 4452 7ff64eecee18 4449->4452 4450->4449 4473 7ff64eece198 4450->4473 4453 7ff64eeceedc 13 API calls 4452->4453 4454 7ff64eecee4a 4453->4454 4455 7ff64eeceeb9 4454->4455 4483 7ff64eecda74 4454->4483 4455->4413 4458 7ff64eeceedc 13 API calls 4457->4458 4459 7ff64eece316 4458->4459 4460 7ff64eece385 4459->4460 4461 7ff64eecda74 10 API calls 4459->4461 4460->4413 4461->4460 4463 7ff64eecf58e 4462->4463 4464 7ff64eec5e40 9 API calls 4463->4464 4465 7ff64eecf5b0 4464->4465 4465->4406 4467 7ff64eececc3 4466->4467 4468 7ff64eecece1 memset 4467->4468 4469 7ff64eececf4 4467->4469 4468->4469 4469->4431 4471 7ff64eecec85 4470->4471 4472 7ff64eecec75 memset 4470->4472 4471->4431 4472->4471 4474 7ff64eece1dc InitOnceComplete 4473->4474 4475 7ff64eece1ac 4473->4475 4478 7ff64eecf2f0 EtwEventRegister 4475->4478 4479 7ff64eecf34e 4478->4479 4480 7ff64eecf35b EtwEventSetInformation 4478->4480 4481 7ff64eec5e40 9 API calls 4479->4481 4480->4479 4482 7ff64eece1c0 4481->4482 4482->4474 4484 7ff64eecdabe 4483->4484 4484->4484 4489 7ff64eecf410 EtwEventWriteTransfer 4484->4489 4486 7ff64eecdbad 4487 7ff64eec5e40 9 API calls 4486->4487 4488 7ff64eecdbb9 4487->4488 4488->4455 4489->4486 4711 7ff64eec1030 4714 7ff64eec4da0 4711->4714 4713 7ff64eec1040 _onexit 4719 7ff64eec4e40 InitializeCriticalSectionEx 4714->4719 4716 7ff64eec4de1 4720 7ff64eec4e40 InitializeCriticalSectionEx 4716->4720 4718 7ff64eec4e02 4718->4713 4719->4716 4720->4718 4721 7ff64eec5430 4722 7ff64eec5455 4721->4722 4723 7ff64eec5444 4721->4723 4724 7ff64eec54f4 GetModuleHandleW 4722->4724 4725 7ff64eec545a GetProcAddress 4724->4725 4725->4723 4726 7ff64eec1530 4727 7ff64eec1550 4726->4727 4728 7ff64eec155d 4726->4728 4727->4728 4731 7ff64eec8d22 4727->4731 4729 7ff64eec8d34 4728->4729 4730 7ff64eec1567 4728->4730 4767 7ff64eecc4d4 4729->4767 4732 7ff64eec1578 4730->4732 4734 7ff64eec8d49 4730->4734 4759 7ff64eecad0c 4731->4759 4741 7ff64eec15b0 4732->4741 4782 7ff64eec6ecc 4734->4782 4740 7ff64eec158c 4742 7ff64eec15d8 4741->4742 4743 7ff64eec168b 4741->4743 4744 7ff64eec3ad4 53 API calls 4742->4744 4743->4740 4745 7ff64eec15dd 4744->4745 4745->4743 4796 7ff64eec16a8 4745->4796 4747 7ff64eec15f6 4747->4743 4748 7ff64eec160b AcquireSRWLockExclusive 4747->4748 4749 7ff64eec1624 4748->4749 4750 7ff64eec1677 4748->4750 4751 7ff64eec1664 4749->4751 4809 7ff64eec9fe8 GetLastError 4749->4809 4750->4743 4752 7ff64eec167c ReleaseSRWLockExclusive 4750->4752 4754 7ff64eec55d4 SetThreadpoolTimer 4751->4754 4752->4743 4754->4750 4755 7ff64eec1635 CreateThreadpoolTimer 4810 7ff64eec1294 4755->4810 4758 7ff64eeca20c SetLastError 4758->4751 4760 7ff64eecad1a 4759->4760 4761 7ff64eecad43 4760->4761 4762 7ff64eec3ad4 53 API calls 4760->4762 4761->4740 4763 7ff64eecad26 4762->4763 4763->4761 4764 7ff64eecc22c 6 API calls 4763->4764 4765 7ff64eecad3a 4764->4765 4766 7ff64eec174c 32 API calls 4765->4766 4766->4761 4768 7ff64eecc505 4767->4768 4769 7ff64eecc5bb 4767->4769 4768->4769 4770 7ff64eecc512 AcquireSRWLockExclusive 4768->4770 4769->4734 4771 7ff64eec4018 16 API calls 4770->4771 4773 7ff64eecc54e 4771->4773 4772 7ff64eecc5a7 4772->4769 4774 7ff64eecc5ac ReleaseSRWLockExclusive 4772->4774 4773->4772 4775 7ff64eecc595 4773->4775 4974 7ff64eec9fe8 GetLastError 4773->4974 4774->4769 4776 7ff64eec55d4 SetThreadpoolTimer 4775->4776 4776->4772 4778 7ff64eecc567 CreateThreadpoolTimer 4779 7ff64eec1294 5 API calls 4778->4779 4780 7ff64eecc58b 4779->4780 4781 7ff64eeca20c SetLastError 4780->4781 4781->4775 4783 7ff64eec6ee4 4782->4783 4784 7ff64eec6f1c 4783->4784 4785 7ff64eec54f4 GetModuleHandleW 4783->4785 4784->4740 4787 7ff64eec7010 4784->4787 4786 7ff64eec6efa GetProcAddress 4785->4786 4786->4784 4975 7ff64eec7b20 memset 4787->4975 4790 7ff64eec7071 4792 7ff64eec5e40 9 API calls 4790->4792 4794 7ff64eec7083 4792->4794 4794->4740 4797 7ff64eec16d0 4796->4797 4798 7ff64eec173c 4796->4798 4800 7ff64eec16dc AcquireSRWLockExclusive 4797->4800 4808 7ff64eec1724 4797->4808 4818 7ff64eec174c 4798->4818 4801 7ff64eec16f1 4800->4801 4802 7ff64eec16ff 4801->4802 4803 7ff64eec8d9e 4801->4803 4815 7ff64eec1a68 4802->4815 4829 7ff64eecc678 4803->4829 4806 7ff64eec170d 4807 7ff64eec1715 ReleaseSRWLockExclusive 4806->4807 4806->4808 4807->4808 4808->4747 4809->4755 4811 7ff64eec831c GetLastError 4810->4811 4812 7ff64eec12ba 4810->4812 4973 7ff64eecac38 SetThreadpoolTimer WaitForThreadpoolTimerCallbacks CloseThreadpoolTimer 4811->4973 4812->4758 4832 7ff64eec1ef0 4815->4832 4910 7ff64eec4f70 4818->4910 4820 7ff64eec1762 AcquireSRWLockExclusive 4912 7ff64eec18a4 4820->4912 4823 7ff64eec1783 ReleaseSRWLockExclusive 4824 7ff64eec1792 4823->4824 4921 7ff64eec1814 4824->4921 4830 7ff64eec1ef0 45 API calls 4829->4830 4831 7ff64eecc6a1 4830->4831 4831->4806 4849 7ff64eec2000 4832->4849 4835 7ff64eec1a94 4835->4806 4836 7ff64eec1f6e 4838 7ff64eec4270 12 API calls 4836->4838 4837 7ff64eec958a 4839 7ff64eec4270 12 API calls 4837->4839 4848 7ff64eec1fae 4837->4848 4840 7ff64eec1f8e 4838->4840 4839->4848 4842 7ff64eec1f96 4840->4842 4843 7ff64eec9556 4840->4843 4841 7ff64eec2000 12 API calls 4844 7ff64eec1fe3 4841->4844 4860 7ff64eec2390 4842->4860 4845 7ff64eec9564 GetProcessHeap HeapFree 4843->4845 4843->4848 4844->4835 4847 7ff64eec9530 GetProcessHeap HeapFree 4844->4847 4845->4848 4848->4841 4848->4847 4859 7ff64eec2038 4849->4859 4850 7ff64eec208c memcmp 4850->4859 4852 7ff64eec1f33 4852->4835 4852->4836 4852->4837 4853 7ff64eec2230 6 API calls 4853->4859 4854 7ff64eecd338 _o__errno memset _o__errno _o__invalid_parameter_noinfo 4854->4859 4855 7ff64eec965c _o__errno 4856 7ff64eec966e _o__invalid_parameter_noinfo 4855->4856 4856->4859 4857 7ff64eec22d8 _o__errno memset _o__errno _o__invalid_parameter_noinfo 4857->4859 4858 7ff64eec9648 _o__errno 4858->4856 4859->4850 4859->4852 4859->4853 4859->4854 4859->4855 4859->4857 4859->4858 4866 7ff64eec1aa0 4859->4866 4861 7ff64eec97a4 4860->4861 4862 7ff64eec23b2 4860->4862 4907 7ff64eecd5c8 4861->4907 4864 7ff64eec97af GetProcessHeap HeapFree 4862->4864 4865 7ff64eec23d0 4862->4865 4865->4848 4867 7ff64eec1af7 4866->4867 4877 7ff64eec1b74 4866->4877 4868 7ff64eec1b16 4867->4868 4883 7ff64eecd338 4867->4883 4887 7ff64eec1c50 4868->4887 4869 7ff64eec2230 6 API calls 4869->4877 4873 7ff64eec1bbb 4875 7ff64eecd338 4 API calls 4873->4875 4874 7ff64eec1c18 memcmp 4874->4877 4878 7ff64eec1b6f 4875->4878 4877->4869 4877->4873 4877->4874 4877->4878 4881 7ff64eec1bdf 4877->4881 4878->4881 4882 7ff64eecd338 4 API calls 4878->4882 4881->4859 4882->4881 4884 7ff64eecd345 4883->4884 4885 7ff64eecd379 4883->4885 4884->4885 4886 7ff64eec4210 4 API calls 4884->4886 4885->4868 4886->4885 4890 7ff64eec1ca3 4887->4890 4894 7ff64eec1b3f 4887->4894 4888 7ff64eec1d1b memcmp 4888->4890 4889 7ff64eec4210 _o__errno memset _o__errno _o__invalid_parameter_noinfo 4889->4890 4890->4888 4890->4889 4891 7ff64eec8f49 4890->4891 4890->4894 4892 7ff64eec4210 4 API calls 4891->4892 4893 7ff64eec8f5f 4892->4893 4894->4881 4895 7ff64eec2230 4894->4895 4896 7ff64eec225e 4895->4896 4900 7ff64eec22c2 4895->4900 4897 7ff64eec1b60 4896->4897 4898 7ff64eec96a4 _o__errno _o__invalid_parameter_noinfo 4896->4898 4899 7ff64eec2274 4896->4899 4904 7ff64eec1c18 4897->4904 4898->4900 4899->4897 4901 7ff64eec4210 4 API calls 4899->4901 4900->4897 4900->4899 4902 7ff64eec4210 4 API calls 4900->4902 4903 7ff64eec970a 4901->4903 4902->4899 4905 7ff64eec1c37 4904->4905 4906 7ff64eec1c28 memcmp 4904->4906 4905->4878 4906->4905 4908 7ff64eeccb00 15 API calls 4907->4908 4909 7ff64eecd600 4908->4909 4909->4862 4911 7ff64eec4f94 4910->4911 4911->4820 4913 7ff64eec18e0 4912->4913 4914 7ff64eec18ba 4912->4914 4942 7ff64eec24c0 4913->4942 4915 7ff64eec18c7 4914->4915 4918 7ff64eec24c0 2 API calls 4914->4918 4917 7ff64eec177e 4915->4917 4919 7ff64eec24c0 2 API calls 4915->4919 4917->4823 4917->4824 4918->4915 4920 7ff64eec8e72 4919->4920 4922 7ff64eec1838 4921->4922 4923 7ff64eec1867 4921->4923 4924 7ff64eec1842 4922->4924 4925 7ff64eec8db6 4922->4925 4950 7ff64eec13a8 4923->4950 4927 7ff64eec184f 4924->4927 4928 7ff64eec8de9 4924->4928 4929 7ff64eec13a8 30 API calls 4925->4929 4930 7ff64eec5e40 9 API calls 4927->4930 4931 7ff64eec13a8 30 API calls 4928->4931 4929->4928 4932 7ff64eec179c 4930->4932 4933 7ff64eec8e46 4931->4933 4934 7ff64eec17b8 4932->4934 4935 7ff64eec17fd 4934->4935 4940 7ff64eec17d5 4934->4940 4971 7ff64eec1304 GetProcessHeap HeapFree 4935->4971 4936 7ff64eec17e3 4939 7ff64eec17a6 4936->4939 4970 7ff64eec1304 GetProcessHeap HeapFree 4936->4970 4939->4808 4940->4936 4972 7ff64eec1304 GetProcessHeap HeapFree 4940->4972 4943 7ff64eec2563 4942->4943 4944 7ff64eec2519 4942->4944 4948 7ff64eec1304 GetProcessHeap HeapFree 4943->4948 4945 7ff64eec253a 4944->4945 4949 7ff64eec1304 GetProcessHeap HeapFree 4944->4949 4945->4914 4960 7ff64eec13c6 4950->4960 4951 7ff64eec7470 2 API calls 4951->4960 4952 7ff64eec2390 17 API calls 4952->4960 4953 7ff64eec74f8 GetModuleHandleW GetProcAddress 4953->4960 4954 7ff64eec8d04 4955 7ff64eec14f6 4954->4955 4969 7ff64eec1304 GetProcessHeap HeapFree 4954->4969 4957 7ff64eec5e40 9 API calls 4955->4957 4959 7ff64eec1505 4957->4959 4959->4922 4960->4951 4960->4952 4960->4953 4960->4954 4960->4955 4962 7ff64eec1dac 4960->4962 4968 7ff64eec1304 GetProcessHeap HeapFree 4960->4968 4964 7ff64eec1e14 4962->4964 4963 7ff64eec2230 6 API calls 4963->4964 4964->4963 4965 7ff64eec1ec1 4964->4965 4966 7ff64eec9529 GetProcessHeap HeapFree 4964->4966 4965->4960 4974->4778 4976 7ff64eec7470 2 API calls 4975->4976 4981 7ff64eec7bc0 4976->4981 4977 7ff64eec7c7f 4980 7ff64eec7de0 4977->4980 4986 7ff64eec7c91 4977->4986 4978 7ff64eec7c1d GetProcessHeap HeapAlloc 4978->4981 4988 7ff64eec7d26 4978->4988 4979 7ff64eec7bfd GetProcessHeap HeapFree 4979->4978 4982 7ff64eec7de5 GetProcessHeap HeapFree 4980->4982 4980->4988 4981->4977 4981->4978 4981->4979 4983 7ff64eec7470 2 API calls 4981->4983 4982->4988 4983->4981 4984 7ff64eec5e40 9 API calls 4985 7ff64eec704c 4984->4985 4985->4790 4989 7ff64eec7920 4985->4989 4987 7ff64eec7470 2 API calls 4986->4987 4986->4988 4987->4988 4988->4984 4991 7ff64eec7949 4989->4991 4990 7ff64eec7a90 4992 7ff64eec5e40 9 API calls 4990->4992 4991->4990 4994 7ff64eec7470 2 API calls 4991->4994 4999 7ff64eec74f8 4991->4999 4993 7ff64eec7065 4992->4993 4996 7ff64eec7acc 4993->4996 4994->4991 4997 7ff64eec7adf GetProcessHeap HeapFree 4996->4997 4998 7ff64eec7b0d 4996->4998 4997->4998 4998->4790 5000 7ff64eec7546 4999->5000 5001 7ff64eec751c 4999->5001 5000->4991 5002 7ff64eec54f4 GetModuleHandleW 5001->5002 5003 7ff64eec7521 GetProcAddress 5002->5003 5003->5000 5004 7ff64eec5330 5005 7ff64eec534c 5004->5005 5006 7ff64eec535a 5004->5006 5006->5005 5007 7ff64eec535f CoReleaseServerProcess 5006->5007 5007->5005 5290 7ff64eec2fb0 5291 7ff64eec2fc1 UuidEqual 5290->5291 5292 7ff64eec3013 5290->5292 5291->5292 5293 7ff64eec2fe0 5291->5293 5293->5292 5294 7ff64eec3007 SetEvent 5293->5294 5294->5292 5008 7ff64eeccd30 5009 7ff64eeccd4a 5008->5009 5012 7ff64eeccd71 5008->5012 5010 7ff64eec54f4 GetModuleHandleW 5009->5010 5011 7ff64eeccd4f GetProcAddress 5010->5011 5011->5012 5013 7ff64eec9930 5016 7ff64eecc3e0 5013->5016 5017 7ff64eec993c 5016->5017 5018 7ff64eecc3e9 5016->5018 5019 7ff64eecc22c 6 API calls 5018->5019 5019->5017 5020 7ff64eecb330 RoOriginateError 5021 7ff64eeccf30 5026 7ff64eeca65c CoImpersonateClient 5021->5026 5023 7ff64eeccf6a 5025 7ff64eeccf5c RoSetErrorReportingFlags 5025->5023 5027 7ff64eeca689 GetCurrentThread OpenThreadToken 5026->5027 5037 7ff64eeca706 5026->5037 5030 7ff64eeca6d1 CoRevertToSelf 5027->5030 5031 7ff64eeca6b6 GetLastError 5027->5031 5028 7ff64eeca712 CloseHandle 5029 7ff64eeca71e 5028->5029 5029->5023 5029->5025 5033 7ff64eeca6e1 5030->5033 5030->5037 5031->5030 5032 7ff64eeca6c8 5031->5032 5032->5030 5038 7ff64eeca8f0 PrivilegeCheck 5033->5038 5037->5028 5037->5029 5039 7ff64eeca960 5038->5039 5040 7ff64eeca950 GetLastError 5038->5040 5041 7ff64eec5e40 9 API calls 5039->5041 5040->5039 5042 7ff64eeca6ee 5041->5042 5042->5037 5043 7ff64eeca734 MapGenericMask GetCurrentProcess GetKernelObjectSecurity CoTaskMemAlloc 5042->5043 5044 7ff64eeca7db GetCurrentProcess GetKernelObjectSecurity 5043->5044 5045 7ff64eeca82c RoOriginateError 5043->5045 5046 7ff64eeca845 AccessCheck 5044->5046 5047 7ff64eeca80f GetLastError 5044->5047 5048 7ff64eeca821 5045->5048 5049 7ff64eeca899 5046->5049 5050 7ff64eeca887 GetLastError 5046->5050 5047->5048 5048->5046 5048->5049 5051 7ff64eeca8c2 5049->5051 5052 7ff64eeca8b3 CoTaskMemFree 5049->5052 5050->5049 5053 7ff64eec5e40 9 API calls 5051->5053 5052->5051 5054 7ff64eeca8d0 5053->5054 5054->5037 5295 7ff64eec89a7 5296 7ff64eec3646 5295->5296 5297 7ff64eec5e40 9 API calls 5296->5297 5298 7ff64eec3652 5297->5298 5055 7ff64eec5820 GetTokenInformation 5056 7ff64eec5871 GetLengthSid CopySid 5055->5056 5057 7ff64eec589d 5055->5057 5056->5057 5058 7ff64eec5e40 9 API calls 5057->5058 5059 7ff64eec58af 5058->5059 5060 7ff64eec5620 GetApplicationUserModelIdFromToken 5061 7ff64eec5666 5060->5061 5063 7ff64eec5670 5060->5063 5068 7ff64eec569c 5061->5068 5066 7ff64eec5678 5063->5066 5072 7ff64eecd948 EtwEventWriteTransfer 5063->5072 5064 7ff64eec5e40 9 API calls 5065 7ff64eec568d 5064->5065 5066->5064 5069 7ff64eec56b4 5068->5069 5069->5069 5070 7ff64eec56c7 WindowsDeleteString WindowsCreateString 5069->5070 5071 7ff64eec56f9 5069->5071 5070->5071 5071->5063 5072->5066 5299 7ff64eec5ba0 5300 7ff64eec5bb0 5299->5300 5308 7ff64eec60d4 5300->5308 5302 7ff64eec6470 9 API calls 5303 7ff64eec5c40 __scrt_initialize_default_local_stdio_options 5302->5303 5304 7ff64eec5bd4 _RTC_Initialize 5306 7ff64eec5bfe __scrt_initialize_crt 5304->5306 5316 7ff64eec63e4 InitializeSListHead 5304->5316 5306->5302 5307 7ff64eec5c30 5306->5307 5309 7ff64eec60e9 5308->5309 5313 7ff64eec611f 5308->5313 5310 7ff64eec6179 5309->5310 5314 7ff64eec60f2 __scrt_acquire_startup_lock 5309->5314 5311 7ff64eec6470 9 API calls 5310->5311 5312 7ff64eec6183 5311->5312 5313->5304 5314->5313 5315 7ff64eec610f _o__initialize_onexit_table 5314->5315 5315->5313 5317 7ff64eec25a0 5318 7ff64eec25d6 5317->5318 5319 7ff64eec8346 RoOriginateErrorW 5317->5319 5320 7ff64eec8399 RoOriginateErrorW 5318->5320 5321 7ff64eec25fd WindowsDeleteString WindowsCreateString 5318->5321 5319->5320 5322 7ff64eec83ec CoImpersonateClient 5320->5322 5323 7ff64eec2684 WindowsDeleteString 5321->5323 5324 7ff64eec262c 5321->5324 5322->5323 5332 7ff64eec267b 5322->5332 5326 7ff64eec5e40 9 API calls 5323->5326 5333 7ff64eec2940 5324->5333 5327 7ff64eec26ac 5326->5327 5329 7ff64eec840a CoRevertToSelf 5329->5323 5330 7ff64eec264a RoGetActivationFactory 5365 7ff64eec26c0 InitOnceExecuteOnce 5330->5365 5332->5323 5332->5329 5334 7ff64eec2987 5333->5334 5335 7ff64eec86ae 5333->5335 5334->5335 5337 7ff64eec29a7 WindowsDeleteString WindowsCreateString 5334->5337 5400 7ff64eeccd90 WindowsDeleteString WindowsCreateString 5335->5400 5338 7ff64eec29cf 5337->5338 5350 7ff64eec2a07 5337->5350 5339 7ff64eec29dd #153 5338->5339 5353 7ff64eec2cf2 5338->5353 5339->5350 5340 7ff64eec2d64 WindowsDeleteString 5342 7ff64eec2d96 5340->5342 5346 7ff64eec5e40 9 API calls 5342->5346 5343 7ff64eec87ec 5344 7ff64eec2dc5 LocalFree 5345 7ff64eec2d09 WindowsDeleteString 5344->5345 5348 7ff64eec2d37 WindowsDeleteString WindowsDeleteString 5345->5348 5349 7ff64eec2d26 5345->5349 5347 7ff64eec2639 5346->5347 5347->5322 5347->5323 5347->5330 5348->5340 5349->5348 5350->5340 5350->5343 5351 7ff64eec2b8b CoImpersonateClient 5350->5351 5350->5353 5352 7ff64eec2bb8 GetCurrentThread OpenThreadToken 5351->5352 5351->5353 5354 7ff64eec2bff 5352->5354 5355 7ff64eec875c GetLastError 5352->5355 5353->5343 5353->5344 5353->5345 5356 7ff64eec2c02 CoRevertToSelf 5354->5356 5355->5354 5355->5356 5357 7ff64eec2cc4 5356->5357 5358 7ff64eec2c16 InitOnceExecuteOnce AccessCheckByType 5356->5358 5357->5353 5361 7ff64eec2cea 5357->5361 5398 7ff64eec5300 CloseHandle 5357->5398 5358->5357 5359 7ff64eec8780 GetLastError 5358->5359 5359->5357 5361->5353 5362 7ff64eec87a8 GetLastError 5361->5362 5363 7ff64eec87c0 RaiseException 5362->5363 5364 7ff64eec87b8 5362->5364 5363->5353 5364->5363 5366 7ff64eec2732 WindowsGetStringRawBuffer 5365->5366 5371 7ff64eec841c 5365->5371 5367 7ff64eec2753 5366->5367 5366->5371 5368 7ff64eec2760 CoImpersonateClient 5367->5368 5369 7ff64eec2772 5367->5369 5368->5369 5370 7ff64eec2780 GetApplicationUserModelIdFromToken 5369->5370 5369->5371 5370->5371 5373 7ff64eec27a9 5370->5373 5372 7ff64eec849c 5371->5372 5401 7ff64eecd948 EtwEventWriteTransfer 5371->5401 5378 7ff64eec84a8 GetLastError CloseHandle SetLastError 5372->5378 5373->5371 5374 7ff64eec27b5 5373->5374 5376 7ff64eec27c6 CoGetCallContext 5374->5376 5377 7ff64eec27ba CoRevertToSelf 5374->5377 5379 7ff64eec27f3 5376->5379 5380 7ff64eec84fd 5376->5380 5377->5376 5382 7ff64eec84d9 GetLastError 5378->5382 5379->5378 5381 7ff64eec2821 5379->5381 5383 7ff64eec28ae 5380->5383 5402 7ff64eecd948 EtwEventWriteTransfer 5380->5402 5381->5380 5389 7ff64eec2851 QueryFullProcessImageNameW 5381->5389 5384 7ff64eec2880 5382->5384 5387 7ff64eec8559 WindowsGetStringRawBuffer 5383->5387 5390 7ff64eec28b7 5383->5390 5384->5380 5386 7ff64eec288f 5384->5386 5386->5383 5393 7ff64eec2921 5386->5393 5403 7ff64eec9c20 5387->5403 5389->5382 5389->5384 5391 7ff64eec28de CloseHandle 5390->5391 5392 7ff64eec28ea 5390->5392 5391->5392 5394 7ff64eec5e40 9 API calls 5392->5394 5393->5390 5396 7ff64eec8619 WindowsGetStringRawBuffer 5393->5396 5395 7ff64eec2917 5394->5395 5395->5332 5409 7ff64eec9ab0 5396->5409 5399 7ff64eec5318 5398->5399 5399->5361 5401->5372 5402->5383 5404 7ff64eec9c63 5403->5404 5415 7ff64eecd948 EtwEventWriteTransfer 5404->5415 5406 7ff64eec9da4 5407 7ff64eec5e40 9 API calls 5406->5407 5408 7ff64eec9db0 5407->5408 5408->5390 5410 7ff64eec9ae8 5409->5410 5410->5410 5416 7ff64eecd948 EtwEventWriteTransfer 5410->5416 5412 7ff64eec9c03 5413 7ff64eec5e40 9 API calls 5412->5413 5414 7ff64eec9c0f 5413->5414 5414->5390 5415->5406 5416->5412 5073 7ff64eecd420 GetModuleHandleW GetProcAddress 5074 7ff64eecd466 5073->5074 5075 7ff64eecb020 5076 7ff64eecb02e 5075->5076 5077 7ff64eecb049 5075->5077 5079 7ff64eecb590 5076->5079 5080 7ff64eecb5ec 5079->5080 5081 7ff64eecb5c6 GetModuleHandleExW 5079->5081 5082 7ff64eecb604 GetModuleFileNameA 5080->5082 5085 7ff64eecb5e3 5080->5085 5081->5080 5081->5085 5082->5085 5083 7ff64eec5e40 9 API calls 5084 7ff64eecb670 5083->5084 5084->5077 5085->5083 5086 7ff64eecda20 InitOnceBeginInitialize 5087 7ff64eecda4a 5086->5087 5417 7ff64eecaba0 5418 7ff64eeca65c 28 API calls 5417->5418 5419 7ff64eecabb3 5418->5419 5420 7ff64eece6a0 5421 7ff64eece6c8 5420->5421 5422 7ff64eece6a8 5420->5422 5423 7ff64eece6ba 5422->5423 5426 7ff64eece6ae 5422->5426 5423->5421 5428 7ff64eece828 5423->5428 5425 7ff64eece816 5426->5425 5432 7ff64eecdbd4 5426->5432 5429 7ff64eece844 5428->5429 5430 7ff64eece97a 5428->5430 5438 7ff64eecde8c 5429->5438 5430->5421 5433 7ff64eecdc1d 5432->5433 5445 7ff64eecf410 EtwEventWriteTransfer 5433->5445 5435 7ff64eecde5e 5436 7ff64eec5e40 9 API calls 5435->5436 5437 7ff64eecde6a 5436->5437 5437->5425 5439 7ff64eecded6 5438->5439 5444 7ff64eecf410 EtwEventWriteTransfer 5439->5444 5441 7ff64eece16b 5442 7ff64eec5e40 9 API calls 5441->5442 5443 7ff64eece177 5442->5443 5443->5430 5444->5441 5445->5435 5446 7ff64eec5a98 5447 7ff64eec5aa8 5446->5447 5448 7ff64eec5aad 5446->5448 5450 7ff64eecc6b0 5447->5450 5451 7ff64eecc6be 5450->5451 5452 7ff64eecc6c2 5451->5452 5453 7ff64eec5114 16 API calls 5451->5453 5452->5448 5455 7ff64eecc6dd 5453->5455 5454 7ff64eecc723 5456 7ff64eecc732 5454->5456 5458 7ff64eec58f0 23 API calls 5454->5458 5455->5454 5464 7ff64eecac84 5455->5464 5456->5448 5458->5456 5465 7ff64eec4c5c 19 API calls 5464->5465 5466 7ff64eecac94 5465->5466 4490 7ff64eec5c90 4491 7ff64eec5ca4 __scrt_initialize_crt 4490->4491 4492 7ff64eec5ddc 4491->4492 4493 7ff64eec5cac __scrt_acquire_startup_lock 4491->4493 4545 7ff64eec6470 IsProcessorFeaturePresent 4492->4545 4495 7ff64eec5de6 4493->4495 4496 7ff64eec5cca __scrt_release_startup_lock 4493->4496 4497 7ff64eec6470 9 API calls 4495->4497 4499 7ff64eec5cef 4496->4499 4501 7ff64eec5d75 4496->4501 4504 7ff64eec5d6d _register_thread_local_exe_atexit_callback 4496->4504 4498 7ff64eec5df1 4497->4498 4500 7ff64eec5df9 _o__exit 4498->4500 4512 7ff64eec65c4 memset GetStartupInfoW 4501->4512 4503 7ff64eec5d7a _o__get_wide_winmain_command_line 4513 7ff64eec3040 4503->4513 4504->4501 4506 7ff64eec5d96 4543 7ff64eec6610 GetModuleHandleW 4506->4543 4509 7ff64eec5da1 4510 7ff64eec5da6 _o__cexit 4509->4510 4511 7ff64eec5dab 4509->4511 4510->4511 4511->4499 4512->4503 4551 7ff64eec37c0 HeapSetInformation GetCurrentProcess GetProcessMitigationPolicy 4513->4551 4515 7ff64eec304f SetErrorMode SetProcessShutdownParameters 4554 7ff64eec4e7c EtwEventRegister 4515->4554 4518 7ff64eec3092 4559 7ff64eec3750 CreateEventW 4518->4559 4519 7ff64eec3227 EtwEventUnregister 4521 7ff64eec3253 PowerSettingUnregisterNotification 4519->4521 4522 7ff64eec3266 4519->4522 4521->4522 4524 7ff64eec3285 GetCurrentProcess TerminateProcess 4522->4524 4525 7ff64eec3272 CloseHandle 4522->4525 4523 7ff64eec3097 4523->4519 4526 7ff64eec30a9 CoIncrementMTAUsage 4523->4526 4541 7ff64eec3188 4523->4541 4524->4506 4525->4524 4526->4519 4527 7ff64eec30c9 CoCreateInstance 4526->4527 4534 7ff64eec3102 #99 4527->4534 4537 7ff64eec3203 4527->4537 4528 7ff64eec31a0 4532 7ff64eec31ac CoInitializeSecurity 4528->4532 4533 7ff64eec8838 4528->4533 4528->4537 4529 7ff64eec8828 4612 7ff64eecd584 4529->4612 4531 7ff64eec3216 CoDecrementMTAUsage 4531->4519 4535 7ff64eec31fe 4532->4535 4532->4537 4533->4506 4599 7ff64eec36c8 RtlQueryPackageIdentity 4534->4599 4562 7ff64eec32c0 CreateEventW 4535->4562 4537->4531 4541->4528 4541->4529 4544 7ff64eec5d9d 4543->4544 4544->4498 4544->4509 4546 7ff64eec6496 4545->4546 4547 7ff64eec64a4 memset RtlCaptureContext RtlLookupFunctionEntry 4546->4547 4548 7ff64eec64de RtlVirtualUnwind 4547->4548 4549 7ff64eec651a memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 4547->4549 4548->4549 4550 7ff64eec659e 4549->4550 4550->4495 4552 7ff64eec382e SetProcessMitigationPolicy 4551->4552 4553 7ff64eec3812 SetProcessMitigationPolicy 4551->4553 4552->4515 4553->4552 4555 7ff64eec4efe 4554->4555 4556 7ff64eec4edd EtwEventSetInformation 4554->4556 4557 7ff64eec5e40 9 API calls 4555->4557 4556->4555 4558 7ff64eec3076 CoInitializeEx 4557->4558 4558->4518 4558->4519 4560 7ff64eec8c1a GetLastError 4559->4560 4561 7ff64eec378d PowerSettingRegisterNotification 4559->4561 4561->4523 4563 7ff64eec8846 GetLastError 4562->4563 4564 7ff64eec32ec 4562->4564 4565 7ff64eec3593 4563->4565 4566 7ff64eec3303 RegOpenKeyExW 4564->4566 4567 7ff64eec8867 4564->4567 4565->4537 4568 7ff64eec8876 RegQueryValueExW 4566->4568 4569 7ff64eec333d #69 4566->4569 4567->4568 4572 7ff64eec88be 4568->4572 4573 7ff64eec88cc RegCloseKey 4568->4573 4570 7ff64eec3360 4569->4570 4571 7ff64eec3547 AcquireSRWLockExclusive CloseHandle ReleaseSRWLockExclusive 4569->4571 4615 7ff64eec3600 RtlIsMultiSessionSku 4570->4615 4571->4565 4572->4573 4576 7ff64eec88e3 4573->4576 4585 7ff64eec88f7 CoRegisterClassObject 4576->4585 4577 7ff64eec3388 InitOnceExecuteOnce 4580 7ff64eec33b5 4577->4580 4581 7ff64eec3453 4577->4581 4578 7ff64eec351b #69 4582 7ff64eec8964 4578->4582 4583 7ff64eec3542 4578->4583 4580->4576 4584 7ff64eec33df CoRegisterClassObject 4580->4584 4581->4578 4581->4585 4586 7ff64eec3468 4581->4586 4583->4571 4584->4578 4590 7ff64eec33fc 4584->4590 4588 7ff64eec892e CoRevokeClassObject 4585->4588 4586->4578 4587 7ff64eec3470 CoResumeClassObjects 4586->4587 4587->4578 4589 7ff64eec3486 4587->4589 4588->4578 4591 7ff64eec34a0 WaitForMultipleObjects CoFreeUnusedLibrariesEx 4589->4591 4594 7ff64eec34e1 4589->4594 4590->4576 4636 7ff64eec35a0 4590->4636 4591->4589 4591->4591 4593 7ff64eec341e CoRegisterClassObject 4593->4581 4594->4588 4595 7ff64eec34ef 4594->4595 4596 7ff64eec3505 4595->4596 4597 7ff64eec34f9 CoRevokeClassObject 4595->4597 4596->4578 4598 7ff64eec350f CoRevokeClassObject 4596->4598 4597->4596 4598->4578 4600 7ff64eec3723 4599->4600 4601 7ff64eec8bec 4599->4601 4603 7ff64eec5e40 9 API calls 4600->4603 4601->4600 4602 7ff64eec8bf7 RtlNtStatusToDosError 4601->4602 4602->4600 4604 7ff64eec317d 4603->4604 4604->4541 4605 7ff64eec3670 4604->4605 4709 7ff64eec5718 RtlQueryPackageClaims 4605->4709 4608 7ff64eec36a6 4610 7ff64eec36b6 4608->4610 4611 7ff64eecacd4 15 API calls 4608->4611 4609 7ff64eecccc4 15 API calls 4609->4608 4610->4541 4611->4610 4613 7ff64eeccb00 15 API calls 4612->4613 4614 7ff64eecd5b9 4613->4614 4614->4533 4616 7ff64eec897a 4615->4616 4629 7ff64eec3644 4615->4629 4639 7ff64eecbb60 4616->4639 4618 7ff64eec5e40 9 API calls 4620 7ff64eec337e 4618->4620 4620->4577 4620->4578 4621 7ff64eec89bf 4623 7ff64eec89c9 WindowsCreateStringReference 4621->4623 4621->4629 4622 7ff64eec898d 4624 7ff64eecccc4 15 API calls 4622->4624 4625 7ff64eec8a12 RoGetActivationFactory 4623->4625 4626 7ff64eec89f9 RaiseException 4623->4626 4624->4629 4627 7ff64eec8a33 4625->4627 4631 7ff64eec8a40 4625->4631 4626->4625 4628 7ff64eecccc4 15 API calls 4627->4628 4628->4629 4629->4618 4630 7ff64eec8b9e 4629->4630 4630->4630 4631->4627 4658 7ff64eec9ec4 4631->4658 4634 7ff64eec8ab2 4634->4629 4635 7ff64eecccc4 15 API calls 4634->4635 4635->4629 4707 7ff64eec58c8 4636->4707 4661 7ff64eecb6bc InitOnceExecuteOnce 4639->4661 4642 7ff64eecbbd3 4663 7ff64eecccfc 4642->4663 4643 7ff64eecbbda 4644 7ff64eecbbe3 GetLastError LsaLookupFreeMemory SetLastError 4643->4644 4645 7ff64eecbc0e LsaLookupGetDomainInfo 4643->4645 4644->4645 4645->4642 4646 7ff64eecbc45 CreateWellKnownSid 4645->4646 4648 7ff64eecbc83 RtlEqualSid 4646->4648 4649 7ff64eecbc6a 4646->4649 4651 7ff64eecbc43 4648->4651 4650 7ff64eeccca4 16 API calls 4649->4650 4650->4651 4652 7ff64eecbcb4 4651->4652 4653 7ff64eecbca8 LsaLookupFreeMemory 4651->4653 4654 7ff64eecbcbd LsaLookupClose 4652->4654 4655 7ff64eecbcc9 4652->4655 4653->4652 4654->4655 4656 7ff64eec5e40 9 API calls 4655->4656 4657 7ff64eec8987 4656->4657 4657->4621 4657->4622 4701 7ff64eec9f44 4658->4701 4660 7ff64eec8aa6 4660->4627 4660->4634 4662 7ff64eecb6e4 LsaLookupOpenLocalPolicy 4661->4662 4662->4642 4662->4643 4666 7ff64eeccb4c 4663->4666 4667 7ff64eeccb74 4666->4667 4670 7ff64eecc8c4 4667->4670 4671 7ff64eecc8d1 4670->4671 4678 7ff64eecbcf8 4671->4678 4675 7ff64eecc9b4 4676 7ff64eec5e40 9 API calls 4675->4676 4677 7ff64eecc9c5 4676->4677 4677->4651 4679 7ff64eecbd51 4678->4679 4680 7ff64eecbd5d 4678->4680 4679->4680 4681 7ff64eeccb00 12 API calls 4679->4681 4682 7ff64eecbdf5 GetCurrentThreadId 4680->4682 4681->4680 4683 7ff64eecbe5d 4682->4683 4684 7ff64eecbef1 IsDebuggerPresent 4683->4684 4687 7ff64eecbee6 4683->4687 4684->4687 4685 7ff64eecbf68 OutputDebugStringW 4686 7ff64eecbf07 4685->4686 4686->4675 4689 7ff64eecd48c 4686->4689 4687->4685 4687->4686 4693 7ff64eecb0bc 4687->4693 4690 7ff64eecd4a4 4689->4690 4691 7ff64eecd4aa memset 4689->4691 4690->4691 4692 7ff64eecd4e9 4691->4692 4696 7ff64eecb0f6 4693->4696 4700 7ff64eecb259 4693->4700 4694 7ff64eec5e40 9 API calls 4695 7ff64eecb311 4694->4695 4695->4685 4697 7ff64eecb16f FormatMessageW 4696->4697 4696->4700 4699 7ff64eecb1c4 4697->4699 4698 7ff64eecb21c GetCurrentThreadId 4698->4700 4699->4698 4700->4694 4705 7ff64eecbad8 4701->4705 4704 7ff64eec9f93 4704->4660 4706 7ff64eec9f7c CoCreateFreeThreadedMarshaler 4705->4706 4706->4704 4708 7ff64eec35d9 CoCreateFreeThreadedMarshaler 4707->4708 4708->4593 4710 7ff64eec3698 4709->4710 4710->4608 4710->4609 5088 7ff64eec5e10 5091 7ff64eec630c 5088->5091 5092 7ff64eec632f GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 5091->5092 5093 7ff64eec5e19 5091->5093 5092->5093 5467 7ff64eec5390 5468 7ff64eec53b0 CoTaskMemAlloc 5467->5468 5469 7ff64eec9826 5467->5469 5470 7ff64eec53cc CoAddRefServerProcess 5468->5470 5471 7ff64eec53fe 5468->5471 5470->5471 5094 7ff64eecbb10 AcquireSRWLockShared 5095 7ff64eecbb33 SetEvent 5094->5095 5096 7ff64eecbb3f ReleaseSRWLockShared 5094->5096 5095->5096 5477 7ff64eecd390 5479 7ff64eecd39e 5477->5479 5478 7ff64eecd3dc 5479->5478 5480 7ff64eecd214 4 API calls 5479->5480 5480->5478 5481 7ff64eecaa90 5482 7ff64eecaaaa 5481->5482 5483 7ff64eecaab4 5481->5483 5483->5482 5484 7ff64eecab30 5483->5484 5485 7ff64eecab11 CoAddRefServerProcess 5483->5485 5484->5482 5487 7ff64eecccc4 15 API calls 5484->5487 5488 7ff64eeccbd0 5485->5488 5487->5482 5489 7ff64eeccbee 5488->5489 5492 7ff64eeccbf8 5488->5492 5494 7ff64eecad50 5489->5494 5491 7ff64eec6b00 90 API calls 5493 7ff64eeccc3a 5491->5493 5492->5491 5493->5484 5495 7ff64eecad74 5494->5495 5498 7ff64eecae02 5494->5498 5496 7ff64eecad8a 5495->5496 5497 7ff64eec3ee0 2 API calls 5495->5497 5496->5498 5499 7ff64eec4080 18 API calls 5496->5499 5497->5496 5498->5492 5499->5498 5097 7ff64eec1a00 5098 7ff64eec1a19 5097->5098 5099 7ff64eec1a45 5097->5099 5100 7ff64eec1ef0 45 API calls 5098->5100 5100->5099 5501 7ff64eec817f _o__seh_filter_exe 5101 7ff64eecaf00 5109 7ff64eecae30 5101->5109 5104 7ff64eecaf53 5105 7ff64eecaf24 5105->5104 5115 7ff64eecb854 5105->5115 5110 7ff64eecae62 5109->5110 5111 7ff64eecae67 5109->5111 5127 7ff64eecb408 GetCurrentThreadId 5110->5127 5113 7ff64eecae8d GetCurrentThreadId 5111->5113 5129 7ff64eecb75c 5111->5129 5113->5104 5113->5105 5116 7ff64eecaf43 5115->5116 5117 7ff64eecb869 5115->5117 5116->5104 5121 7ff64eeccf78 5116->5121 5135 7ff64eecb6fc 5117->5135 5122 7ff64eeccfa9 5121->5122 5126 7ff64eeccfbf 5121->5126 5123 7ff64eecd070 5122->5123 5125 7ff64eec50a4 3 API calls 5122->5125 5123->5104 5125->5126 5126->5123 5185 7ff64eeccde4 5126->5185 5128 7ff64eecb448 5127->5128 5128->5111 5130 7ff64eecb78b 5129->5130 5133 7ff64eecb831 5129->5133 5131 7ff64eecb75c 4 API calls 5130->5131 5132 7ff64eecb794 5131->5132 5132->5133 5134 7ff64eec4210 4 API calls 5132->5134 5133->5113 5134->5133 5136 7ff64eecb714 5135->5136 5138 7ff64eecb727 5135->5138 5141 7ff64eeca4c4 GetCurrentProcessId 5136->5141 5138->5116 5139 7ff64eecb46c GetCurrentThreadId 5138->5139 5140 7ff64eecb4a7 5139->5140 5140->5116 5142 7ff64eec5170 5141->5142 5143 7ff64eeca528 CreateMutexExW 5142->5143 5144 7ff64eec4c5c 19 API calls 5143->5144 5145 7ff64eeca557 5144->5145 5146 7ff64eeca561 5145->5146 5147 7ff64eeca56d 5145->5147 5148 7ff64eecb3d4 16 API calls 5146->5148 5149 7ff64eec5114 16 API calls 5147->5149 5150 7ff64eeca566 5148->5150 5151 7ff64eeca57c 5149->5151 5153 7ff64eec5e40 9 API calls 5150->5153 5152 7ff64eec47a0 28 API calls 5151->5152 5154 7ff64eeca591 5152->5154 5155 7ff64eeca5fe 5153->5155 5156 7ff64eeca5b4 5154->5156 5157 7ff64eeca597 5154->5157 5155->5138 5160 7ff64eeca5b2 5156->5160 5166 7ff64eecc008 5156->5166 5158 7ff64eecccc4 15 API calls 5157->5158 5158->5160 5161 7ff64eeca5e0 5160->5161 5163 7ff64eec58f0 23 API calls 5160->5163 5161->5150 5165 7ff64eecaa5c 17 API calls 5161->5165 5163->5161 5164 7ff64eecccc4 15 API calls 5164->5160 5165->5150 5167 7ff64eec50a4 3 API calls 5166->5167 5168 7ff64eecc03a 5167->5168 5169 7ff64eecc047 5168->5169 5170 7ff64eecc06a 5168->5170 5171 7ff64eecccc4 15 API calls 5169->5171 5173 7ff64eec4a30 21 API calls 5170->5173 5172 7ff64eeca624 5171->5172 5172->5160 5172->5164 5174 7ff64eecc092 5173->5174 5175 7ff64eecc0bd memset memset 5174->5175 5176 7ff64eecc098 5174->5176 5178 7ff64eecc0b1 5175->5178 5177 7ff64eecccc4 15 API calls 5176->5177 5177->5178 5179 7ff64eecc132 5178->5179 5181 7ff64eecaa5c 17 API calls 5178->5181 5180 7ff64eecc13f 5179->5180 5182 7ff64eecaa5c 17 API calls 5179->5182 5180->5172 5184 7ff64eec1304 GetProcessHeap HeapFree 5180->5184 5181->5179 5182->5180 5186 7ff64eecce4b 5185->5186 5187 7ff64eec50a4 3 API calls 5186->5187 5188 7ff64eecceb4 5186->5188 5189 7ff64eecce80 5187->5189 5190 7ff64eeccf0a 5188->5190 5198 7ff64eec9dc8 5188->5198 5189->5188 5191 7ff64eecce88 GetProcessHeap HeapFree 5189->5191 5190->5123 5191->5188 5194 7ff64eec9dc8 4 API calls 5195 7ff64eeccee7 5194->5195 5202 7ff64eec9e3c 5195->5202 5199 7ff64eec9de2 5198->5199 5200 7ff64eec9e0b 5198->5200 5199->5200 5201 7ff64eec4210 4 API calls 5199->5201 5200->5194 5201->5200 5203 7ff64eec9e8c memset 5202->5203 5204 7ff64eec9e60 5202->5204 5203->5190 5204->5203 5205 7ff64eec4210 4 API calls 5204->5205 5205->5203 5502 7ff64eece280 5505 7ff64eece200 5502->5505 5504 7ff64eece294 5506 7ff64eece215 EtwEventUnregister 5505->5506 5507 7ff64eece22f 5505->5507 5506->5507 5507->5504 5508 7ff64eec1170 5509 7ff64eec11a4 5508->5509 5510 7ff64eec8246 RoOriginateErrorW 5508->5510 5511 7ff64eec8299 RoOriginateErrorW 5509->5511 5512 7ff64eec11cb WindowsDeleteString WindowsCreateString 5509->5512 5510->5511 5513 7ff64eec82ec CoImpersonateClient 5511->5513 5514 7ff64eec1253 WindowsDeleteString 5512->5514 5515 7ff64eec11fa 5512->5515 5513->5514 5523 7ff64eec124a 5513->5523 5516 7ff64eec5e40 9 API calls 5514->5516 5517 7ff64eec2940 30 API calls 5515->5517 5518 7ff64eec127b 5516->5518 5520 7ff64eec1207 5517->5520 5519 7ff64eec830a CoRevertToSelf 5519->5514 5520->5513 5520->5514 5521 7ff64eec1218 RoActivateInstance 5520->5521 5522 7ff64eec26c0 24 API calls 5521->5522 5522->5523 5523->5514 5523->5519 5524 7ff64eec5c70 5528 7ff64eec6668 SetUnhandledExceptionFilter 5524->5528 5206 7ff64eec99f0 5207 7ff64eecc350 5206->5207 5208 7ff64eecc362 AcquireSRWLockExclusive 5207->5208 5209 7ff64eecc3cd 5207->5209 5210 7ff64eecc37d 5208->5210 5210->5209 5211 7ff64eecc3be ReleaseSRWLockExclusive 5210->5211 5211->5209 5529 7ff64eecb070 5530 7ff64eeca65c 28 API calls 5529->5530 5531 7ff64eecb088 5530->5531 5532 7ff64eecb0ac 5531->5532 5533 7ff64eecb09d RoGetErrorReportingFlags 5531->5533 5533->5532 5534 7ff64eec3860 5537 7ff64eec38e0 5534->5537 5538 7ff64eec391f 5537->5538 5539 7ff64eec38a0 5538->5539 5540 7ff64eec8c49 5538->5540 5541 7ff64eec8c3d 5538->5541 5542 7ff64eec394d 5538->5542 5543 7ff64eec6d2c 21 API calls 5540->5543 5544 7ff64eec3ee0 2 API calls 5541->5544 5542->5540 5545 7ff64eec3958 5542->5545 5546 7ff64eec8c73 5543->5546 5544->5540 5550 7ff64eec6d2c 5545->5550 5549 7ff64eec4080 18 API calls 5549->5539 5551 7ff64eec6d5a 5550->5551 5556 7ff64eec6dac 5551->5556 5554 7ff64eec3980 5554->5539 5554->5549 5557 7ff64eec6df9 5556->5557 5558 7ff64eec6e20 5556->5558 5559 7ff64eec54f4 GetModuleHandleW 5557->5559 5561 7ff64eec5e40 9 API calls 5558->5561 5560 7ff64eec6dfe GetProcAddress 5559->5560 5560->5558 5562 7ff64eec6d70 5561->5562 5562->5554 5563 7ff64eec6f3c 5562->5563 5564 7ff64eec7b20 18 API calls 5563->5564 5569 7ff64eec6f8a 5564->5569 5565 7ff64eec6fdd 5566 7ff64eec5e40 9 API calls 5565->5566 5567 7ff64eec6fef 5566->5567 5567->5554 5568 7ff64eec7acc 2 API calls 5568->5565 5569->5565 5569->5568 5570 7ff64eec5a64 5571 7ff64eec5a6d 5570->5571 5572 7ff64eec1294 5 API calls 5571->5572 5573 7ff64eeca453 5572->5573 5582 7ff64eec194c 5573->5582 5575 7ff64eeca45e 5576 7ff64eeca471 5575->5576 5586 7ff64eec1304 GetProcessHeap HeapFree 5575->5586 5578 7ff64eeca484 5576->5578 5587 7ff64eec1304 GetProcessHeap HeapFree 5576->5587 5580 7ff64eeca4ae 5578->5580 5588 7ff64eecac38 SetThreadpoolTimer WaitForThreadpoolTimerCallbacks CloseThreadpoolTimer 5578->5588 5584 7ff64eec1972 5582->5584 5585 7ff64eec1988 5582->5585 5584->5585 5589 7ff64eec7594 5584->5589 5585->5575 5585->5585 5590 7ff64eec75bb 5589->5590 5591 7ff64eec5e40 9 API calls 5590->5591 5592 7ff64eec76f0 5591->5592 5592->5584 5212 7ff64eecabe0 5213 7ff64eeca65c 28 API calls 5212->5213 5214 7ff64eecabf3 5213->5214 5215 7ff64eecac29 5214->5215 5216 7ff64eecac18 RoSetErrorReportingFlags 5214->5216 5216->5215 5217 7ff64eec81e0 WindowsDeleteString 5218 7ff64eec59e2 5219 7ff64eec5a06 5218->5219 5220 7ff64eec5a0b GetProcessHeap HeapFree 5219->5220 5221 7ff64eec5a4a 5219->5221 5220->5219 5222 7ff64eecf5d2 5225 7ff64eecf60c VirtualQuery 5222->5225 5226 7ff64eecf676 GetSystemInfo SetThreadStackGuarantee 5225->5226 5232 7ff64eecf728 5225->5232 5227 7ff64eecf6a4 5226->5227 5230 7ff64eecf6e7 VirtualAlloc 5227->5230 5227->5232 5228 7ff64eec5e40 9 API calls 5229 7ff64eecf5d9 5228->5229 5231 7ff64eecf709 VirtualProtect 5230->5231 5230->5232 5231->5232 5232->5228 5593 7ff64eec1350 5594 7ff64eec1395 5593->5594 5595 7ff64eec1362 AcquireSRWLockExclusive 5593->5595 5596 7ff64eec137e ReleaseSRWLockExclusive 5595->5596 5597 7ff64eec138d 5595->5597 5596->5597 5598 7ff64eecad0c 70 API calls 5597->5598 5598->5594 5599 7ff64eec9950 5600 7ff64eec99b5 5599->5600 5601 7ff64eec9967 AcquireSRWLockExclusive 5599->5601 5602 7ff64eec998e 5601->5602 5603 7ff64eec9996 5601->5603 5606 7ff64eecd69c 5602->5606 5603->5600 5605 7ff64eec99a6 ReleaseSRWLockExclusive 5603->5605 5605->5600 5611 7ff64eecd6c5 5606->5611 5607 7ff64eecd836 5608 7ff64eec5e40 9 API calls 5607->5608 5610 7ff64eecd84c 5608->5610 5609 7ff64eec7470 2 API calls 5609->5611 5610->5603 5611->5607 5611->5609 5612 7ff64eec74f8 2 API calls 5611->5612 5612->5611 5233 7ff64eeca0cc 5234 7ff64eec1294 5 API calls 5233->5234 5235 7ff64eeca0f2 5234->5235 5236 7ff64eec1294 5 API calls 5235->5236 5237 7ff64eeca0fd 5236->5237 5238 7ff64eeca116 5237->5238 5259 7ff64eec1304 GetProcessHeap HeapFree 5237->5259 5240 7ff64eeca127 5238->5240 5260 7ff64eecd2b4 5238->5260 5242 7ff64eeca141 DeleteCriticalSection 5240->5242 5264 7ff64eec1304 GetProcessHeap HeapFree 5240->5264 5244 7ff64eeca161 5242->5244 5245 7ff64eeca15c 5242->5245 5247 7ff64eeca172 5244->5247 5248 7ff64eecd2e4 2 API calls 5244->5248 5265 7ff64eecd1c0 5245->5265 5249 7ff64eeca183 5247->5249 5250 7ff64eecd2e4 2 API calls 5247->5250 5248->5247 5270 7ff64eeca1d4 5249->5270 5250->5249 5261 7ff64eecd2c0 5260->5261 5262 7ff64eecd2d8 5260->5262 5261->5262 5274 7ff64eecd214 5261->5274 5262->5240 5266 7ff64eecd1d5 5265->5266 5267 7ff64eecd1fc 5265->5267 5268 7ff64eec54f4 GetModuleHandleW 5266->5268 5267->5244 5269 7ff64eecd1da GetProcAddress 5268->5269 5269->5267 5271 7ff64eeca1f0 DeleteCriticalSection 5270->5271 5272 7ff64eeca1eb 5270->5272 5281 7ff64eec1304 GetProcessHeap HeapFree 5272->5281 5275 7ff64eecd21d EnterCriticalSection AcquireSRWLockExclusive 5274->5275 5279 7ff64eecd29b 5274->5279 5276 7ff64eecd268 5275->5276 5277 7ff64eecd287 5276->5277 5278 7ff64eecd278 ReleaseSRWLockExclusive 5276->5278 5277->5279 5280 7ff64eecd28c LeaveCriticalSection 5277->5280 5278->5277 5279->5262 5280->5279 5282 7ff64eece2c3 5283 7ff64eece2ca _o__resetstkoflw 5282->5283 5284 7ff64eece2d7 5282->5284 5283->5284 5613 7ff64eec1340 5614 7ff64eec18f4 5613->5614 5615 7ff64eec1939 5614->5615 5616 7ff64eec1906 AcquireSRWLockExclusive 5614->5616 5617 7ff64eec194c 9 API calls 5616->5617 5618 7ff64eec1921 5617->5618 5618->5615 5619 7ff64eec192a ReleaseSRWLockExclusive 5618->5619 5619->5615 5620 7ff64eecc840 5621 7ff64eecc853 5620->5621 5622 7ff64eecc85d 5620->5622 5621->5622 5624 7ff64eeca3d4 CoReleaseServerProcess 5621->5624 5625 7ff64eeca401 5624->5625 5627 7ff64eeca406 5624->5627 5628 7ff64eecf4ec 5625->5628 5627->5622 5629 7ff64eecf501 HamCloseActivity 5628->5629 5630 7ff64eecf4ac 5628->5630 5631 7ff64eecf525 5629->5631 5632 7ff64eecf518 5629->5632 5634 7ff64eecf4c3 CloseHandle 5630->5634 5635 7ff64eecf4cf 5630->5635 5631->5627 5636 7ff64eecf534 5632->5636 5634->5635 5635->5627 5637 7ff64eeccb4c 15 API calls 5636->5637 5638 7ff64eecf560 5637->5638 5638->5631 5639 7ff64eece240 5640 7ff64eece200 Concurrency::wait EtwEventUnregister 5639->5640 5641 7ff64eece254 5640->5641 5285 7ff64eec5db8 5286 7ff64eec6610 __scrt_is_managed_app GetModuleHandleW 5285->5286 5287 7ff64eec5dbf 5286->5287 5288 7ff64eec5df9 _o__exit 5287->5288 5289 7ff64eec5dc3 5287->5289

Executed Functions

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 0 7ff64eec32c0-7ff64eec32e6 CreateEventW 1 7ff64eec8846-7ff64eec8854 GetLastError 0->1 2 7ff64eec32ec-7ff64eec32fd call 7ff64eec6aac 0->2 4 7ff64eec3593-7ff64eec3597 1->4 5 7ff64eec885a-7ff64eec8862 1->5 7 7ff64eec3303-7ff64eec3337 RegOpenKeyExW 2->7 8 7ff64eec8867 2->8 5->4 9 7ff64eec8876-7ff64eec88bc RegQueryValueExW 7->9 10 7ff64eec333d-7ff64eec335a #69 7->10 8->9 13 7ff64eec88be-7ff64eec88c6 9->13 14 7ff64eec88cc-7ff64eec88dd RegCloseKey 9->14 11 7ff64eec3360-7ff64eec3382 call 7ff64eec3600 10->11 12 7ff64eec3547-7ff64eec358e AcquireSRWLockExclusive CloseHandle ReleaseSRWLockExclusive 10->12 18 7ff64eec3388-7ff64eec33af InitOnceExecuteOnce 11->18 19 7ff64eec351b-7ff64eec3523 11->19 12->4 13->14 17 7ff64eec88e3 14->17 20 7ff64eec88ef 17->20 23 7ff64eec33b5-7ff64eec33d9 18->23 24 7ff64eec3453-7ff64eec3455 18->24 21 7ff64eec8940-7ff64eec8948 19->21 22 7ff64eec3529-7ff64eec353c #69 19->22 30 7ff64eec88f7-7ff64eec8927 CoRegisterClassObject 20->30 21->22 28 7ff64eec894e-7ff64eec895f 21->28 25 7ff64eec8964-7ff64eec8974 22->25 26 7ff64eec3542 22->26 23->17 29 7ff64eec33df-7ff64eec33f6 CoRegisterClassObject 23->29 24->19 27 7ff64eec345b-7ff64eec3462 24->27 26->12 27->30 31 7ff64eec3468-7ff64eec346a 27->31 28->22 29->19 32 7ff64eec33fc-7ff64eec3410 call 7ff64eec6020 29->32 38 7ff64eec892e-7ff64eec893a CoRevokeClassObject 30->38 31->19 34 7ff64eec3470-7ff64eec3480 CoResumeClassObjects 31->34 32->20 40 7ff64eec3416-7ff64eec3451 call 7ff64eec35a0 CoRegisterClassObject 32->40 34->19 39 7ff64eec3486-7ff64eec349e 34->39 38->21 41 7ff64eec34a0-7ff64eec34da WaitForMultipleObjects CoFreeUnusedLibrariesEx 39->41 40->24 41->41 43 7ff64eec34dc-7ff64eec34df 41->43 43->41 45 7ff64eec34e1-7ff64eec34e9 43->45 45->38 46 7ff64eec34ef-7ff64eec34f7 45->46 47 7ff64eec3505-7ff64eec350d 46->47 48 7ff64eec34f9-7ff64eec3500 CoRevokeClassObject 46->48 47->19 49 7ff64eec350f-7ff64eec3516 CoRevokeClassObject 47->49 48->47 49->19
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: Class$Object$CloseCreateExclusiveFreeLockObjectsOnceRegisterRevoke$AcquireErrorEventExecuteHandleInitLastLibrariesMarshalerMultiMultipleOpenQueryReleaseResumeSessionThreadedUnusedValueWait
  • String ID: RuntimeBrokerIdleExitTimeout$SOFTWARE\Microsoft\Ole\Extensions\AppCompat
  • API String ID: 1720284953-2752388663
  • Opcode ID: 25cf93062caf1ac11777a3095b713c40efa49ee0f3b794c08add41d4a2590d1b
  • Instruction ID: 091aa9c3f8234234e54caae35aa6da04b9bf8399777178542141e33851088b22
  • Opcode Fuzzy Hash: 25cf93062caf1ac11777a3095b713c40efa49ee0f3b794c08add41d4a2590d1b
  • Instruction Fuzzy Hash: 09B11A3AA0CB5386EB20BB14E8409797BA1FFA9B41F845175EA4E83764DFBDE445C700

Control-flow Graph

APIs
    • Part of subcall function 00007FF64EEC37C0: HeapSetInformation.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF64EEC304F), ref: 00007FF64EEC37D7
    • Part of subcall function 00007FF64EEC37C0: GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00007FF64EEC304F), ref: 00007FF64EEC37E3
    • Part of subcall function 00007FF64EEC37C0: GetProcessMitigationPolicy.KERNELBASE(?,?,?,00007FF64EEC304F), ref: 00007FF64EEC3802
    • Part of subcall function 00007FF64EEC37C0: SetProcessMitigationPolicy.KERNELBASE ref: 00007FF64EEC3822
    • Part of subcall function 00007FF64EEC37C0: SetProcessMitigationPolicy.KERNELBASE(?,?,?,00007FF64EEC304F), ref: 00007FF64EEC383F
  • SetErrorMode.KERNELBASE ref: 00007FF64EEC3054
  • SetProcessShutdownParameters.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF64EEC3065
    • Part of subcall function 00007FF64EEC4E7C: EtwEventRegister.NTDLL ref: 00007FF64EEC4EC7
    • Part of subcall function 00007FF64EEC4E7C: EtwEventSetInformation.NTDLL ref: 00007FF64EEC4EF2
  • CoInitializeEx.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF64EEC307A
  • CoIncrementMTAUsage.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF64EEC30B3
  • CoCreateInstance.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF64EEC30EC
  • #99.COMBASE ref: 00007FF64EEC316C
    • Part of subcall function 00007FF64EEC36C8: RtlQueryPackageIdentity.NTDLL ref: 00007FF64EEC370F
  • CoInitializeSecurity.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF64EEC31EC
  • CoDecrementMTAUsage.API-MS-WIN-CORE-COM-L1-1-0 ref: 00007FF64EEC321B
  • EtwEventUnregister.NTDLL ref: 00007FF64EEC323B
  • PowerSettingUnregisterNotification.API-MS-WIN-POWER-SETTING-L1-1-0 ref: 00007FF64EEC3253
  • CloseHandle.API-MS-WIN-CORE-HANDLE-L1-1-0 ref: 00007FF64EEC3272
  • GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF64EEC3285
  • TerminateProcess.KERNELBASE ref: 00007FF64EEC3296
    • Part of subcall function 00007FF64EEC3750: CreateEventW.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF64EEC3771
    • Part of subcall function 00007FF64EEC3750: PowerSettingRegisterNotification.API-MS-WIN-POWER-SETTING-L1-1-0 ref: 00007FF64EEC37A5
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: Process$Event$MitigationPolicy$CreateCurrentInformationInitializeNotificationPowerRegisterSettingUnregisterUsage$CloseDecrementErrorHandleHeapIdentityIncrementInstanceModePackageParametersQuerySecurityShutdownTerminate
  • String ID: H
  • API String ID: 617550459-2852464175
  • Opcode ID: 599b0346224084a25877cd22d9dd4c57c4b538764803e7ef0202359cfb087da7
  • Instruction ID: 7b071e1d242fe7eba40e45b194809af39fd30bd9ec574e7777a068666a458153
  • Opcode Fuzzy Hash: 599b0346224084a25877cd22d9dd4c57c4b538764803e7ef0202359cfb087da7
  • Instruction Fuzzy Hash: C1712939B0CA4386EB10BB51E840679BBA0FFA9B51F448175EA4E83765DFBDE448C700

Control-flow Graph

APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: CloseOpenQueryValue
  • String ID: %!WINERROR!$CheckPerAppBrokerInstancingRegistryValue$EnablePerStoreApplicationBrokerInstance$SOFTWARE\Microsoft\OLE\Diagnosis$error %!WINERROR! type %d$onecore\com\combase\common\core\perappruntimebroker.cpp
  • API String ID: 3677997916-685290384
  • Opcode ID: 306870c6963b1916a868d7878903f85fecc6b36e56131fdd7d9351f31c9c74c2
  • Instruction ID: 9ddbfefae41ece5800be1d6f497e34aee5cc3fb64182b6e2eb0a4164de091113
  • Opcode Fuzzy Hash: 306870c6963b1916a868d7878903f85fecc6b36e56131fdd7d9351f31c9c74c2
  • Instruction Fuzzy Hash: BA413E36A0C74386F720BB14E441B797BA0FBA9755F544236EA5D827A8CFBDE544C700

Control-flow Graph

APIs
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: __scrt_acquire_startup_lock__scrt_get_show_window_mode__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock_o__cexit_o__exit_o__get_wide_winmain_command_line_register_thread_local_exe_atexit_callback
  • String ID:
  • API String ID: 105026157-0
  • Opcode ID: 395f1534df9de8ab3adec9ee24f61f7a7a4b0758e2b300751a48127d34ce18a7
  • Instruction ID: 7e711ff0925455bd4f357e0e939256054d2c7cfd758da82f04286cde6af01f94
  • Opcode Fuzzy Hash: 395f1534df9de8ab3adec9ee24f61f7a7a4b0758e2b300751a48127d34ce18a7
  • Instruction Fuzzy Hash: C5315221F0C24385FA54BB6494593BB1F91BF71B88F444934F94DCB2E7DEEDA8088201

Control-flow Graph

APIs
  • HeapSetInformation.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,00007FF64EEC304F), ref: 00007FF64EEC37D7
  • GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00007FF64EEC304F), ref: 00007FF64EEC37E3
  • GetProcessMitigationPolicy.KERNELBASE(?,?,?,00007FF64EEC304F), ref: 00007FF64EEC3802
  • SetProcessMitigationPolicy.KERNELBASE ref: 00007FF64EEC3822
  • SetProcessMitigationPolicy.KERNELBASE(?,?,?,00007FF64EEC304F), ref: 00007FF64EEC383F
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: Process$MitigationPolicy$CurrentHeapInformation
  • String ID:
  • API String ID: 3749489763-0
  • Opcode ID: 677136a38e7d958ea9ecc17ae655fa23a4c397fcc89a5c215e0403869d97f88b
  • Instruction ID: f1ff0a6e40424abc5cf83b5e3ea2b71a938adbc7d369bec940f7126728f8ed0d
  • Opcode Fuzzy Hash: 677136a38e7d958ea9ecc17ae655fa23a4c397fcc89a5c215e0403869d97f88b
  • Instruction Fuzzy Hash: F8015E36618642C7E350AF11E4449B9BFA0FB9AB51F84A234EA0B82724DF79D144CB40

Control-flow Graph

APIs
  • GetCurrentProcessId.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0 ref: 00007FF64EEC4688
  • CreateMutexW.KERNELBASE ref: 00007FF64EEC46CF
    • Part of subcall function 00007FF64EEC5114: WaitForSingleObjectEx.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF64EEC512D
    • Part of subcall function 00007FF64EEC58F0: ReleaseMutex.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF64EEC58F4
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: Mutex$CreateCurrentObjectProcessReleaseSingleWait
  • String ID: Local\SM0:%d:%d:%hs$wil
  • API String ID: 273201903-2303653343
  • Opcode ID: 0fe779117beee832b1706a9ec7a4b0207ad036baf88f8acd9c56f510a3128e24
  • Instruction ID: 9da6216302147b09e2016b1f13736584e48a5f5ba6d220241e83da99dfdc1145
  • Opcode Fuzzy Hash: 0fe779117beee832b1706a9ec7a4b0207ad036baf88f8acd9c56f510a3128e24
  • Instruction Fuzzy Hash: B141303671DA8286E610BB51E4446BAAB55FFA9780F445031FA8E87799DFBCD444C700

Control-flow Graph

APIs
  • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF64EEC3A66
    • Part of subcall function 00007FF64EEC5228: AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EEC3A7A), ref: 00007FF64EEC5257
    • Part of subcall function 00007FF64EEC5228: ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EEC3A7A), ref: 00007FF64EEC527F
  • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF64EEC3AAA
  • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF64EEC3CFD
  • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0 ref: 00007FF64EEC3D2F
    • Part of subcall function 00007FF64EEC3AD4: AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EECAD26), ref: 00007FF64EEC3B4D
    • Part of subcall function 00007FF64EEC3AD4: ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EECAD26), ref: 00007FF64EEC3B6C
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: f46bff268b9657942f7b2e4df2066148980f2a2b2eaeba0bb5018e9d15c16713
  • Instruction ID: fe3432738484976e6cae9e072464fce5cc6a57de4331190705fca3626f5e8cd6
  • Opcode Fuzzy Hash: f46bff268b9657942f7b2e4df2066148980f2a2b2eaeba0bb5018e9d15c16713
  • Instruction Fuzzy Hash: C7418F65B0CB8285EA14BB12E4002B97FA0FBAAFD4F485170EE5D47796CF7DD4558300

Control-flow Graph

APIs
    • Part of subcall function 00007FF64EEC9FE8: GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF64EEC3AFB,?,?,?,00007FF64EECAD26), ref: 00007FF64EEC9FF4
  • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EECAD26), ref: 00007FF64EEC3B4D
  • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EECAD26), ref: 00007FF64EEC3B6C
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireErrorLastRelease
  • String ID:
  • API String ID: 1379261800-0
  • Opcode ID: b6c7c0d633a564d6684451f2e965e1e678ac283138d0ed472914fe622c8fdf85
  • Instruction ID: 04a845e81fc5c9c506c0920741aad9339ecdb4d6634b443a58ec03ac5024ad67
  • Opcode Fuzzy Hash: b6c7c0d633a564d6684451f2e965e1e678ac283138d0ed472914fe622c8fdf85
  • Instruction Fuzzy Hash: 8A21623260CA4682EB64BF10E04037D6BB0F7A4B88F500171EB4D86698DFBCD995C340

Control-flow Graph

APIs
  • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EEC6C67,?,?,?,?,?,?,?,?,?,?,00000000,00007FF64EEC6B35), ref: 00007FF64EEC3FB5
  • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EEC6C67,?,?,?,?,?,?,?,?,?,?,00000000,00007FF64EEC6B35), ref: 00007FF64EEC3FF4
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID:
  • API String ID: 17069307-0
  • Opcode ID: deb08c1a9b696f3be48f9cb6279c0bdd98be1b2ff889c631f1d3928c3a90d6cf
  • Instruction ID: 5f4a4570adb058625bf66803434840711d04628e69aa4044d576518b1d10c483
  • Opcode Fuzzy Hash: deb08c1a9b696f3be48f9cb6279c0bdd98be1b2ff889c631f1d3928c3a90d6cf
  • Instruction Fuzzy Hash: 7F014026B0DA8681EA11BF15E4407786BA0FF69BA0F5C9271EA2D477D4DF7DD451C300

Non-executed Functions

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 301 7ff64eec26c0-7ff64eec272c InitOnceExecuteOnce 302 7ff64eec2732-7ff64eec274d WindowsGetStringRawBuffer 301->302 303 7ff64eec841c 301->303 302->303 304 7ff64eec2753-7ff64eec275e 302->304 305 7ff64eec8428-7ff64eec842d 303->305 306 7ff64eec2760-7ff64eec2770 CoImpersonateClient 304->306 307 7ff64eec2775-7ff64eec277a 304->307 308 7ff64eec842f 305->308 309 7ff64eec843b-7ff64eec843d 305->309 306->307 310 7ff64eec2772 306->310 311 7ff64eec2780-7ff64eec27a3 GetApplicationUserModelIdFromToken 307->311 312 7ff64eec8454-7ff64eec845b 307->312 308->309 315 7ff64eec843f 309->315 316 7ff64eec8446-7ff64eec8449 309->316 310->307 311->305 317 7ff64eec27a9-7ff64eec27af 311->317 313 7ff64eec849c 312->313 314 7ff64eec845d-7ff64eec8497 call 7ff64eecd948 312->314 322 7ff64eec84a8-7ff64eec84d3 GetLastError CloseHandle SetLastError 313->322 314->313 315->316 316->312 317->312 318 7ff64eec27b5-7ff64eec27b8 317->318 320 7ff64eec27c6-7ff64eec27ed CoGetCallContext 318->320 321 7ff64eec27ba-7ff64eec27c1 CoRevertToSelf 318->321 323 7ff64eec27f3-7ff64eec281b 320->323 324 7ff64eec84fd-7ff64eec8506 320->324 321->320 326 7ff64eec84d9-7ff64eec84e9 GetLastError 322->326 323->322 325 7ff64eec2821-7ff64eec284b 323->325 327 7ff64eec854d 324->327 328 7ff64eec8508-7ff64eec8547 call 7ff64eecd948 324->328 325->324 337 7ff64eec2851-7ff64eec287a QueryFullProcessImageNameW 325->337 329 7ff64eec84ef-7ff64eec84f8 326->329 330 7ff64eec2887-7ff64eec2889 326->330 335 7ff64eec8559-7ff64eec85f6 WindowsGetStringRawBuffer call 7ff64eec9c20 327->335 328->327 329->330 330->324 333 7ff64eec288f-7ff64eec28ac 330->333 338 7ff64eec2921-7ff64eec2924 333->338 339 7ff64eec28ae-7ff64eec28b1 333->339 341 7ff64eec28b7-7ff64eec28dc 335->341 337->326 343 7ff64eec2880 337->343 338->341 342 7ff64eec2926-7ff64eec8613 call 7ff64eecd91c 338->342 339->335 339->341 345 7ff64eec28de-7ff64eec28e5 CloseHandle 341->345 346 7ff64eec28ea-7ff64eec28f1 341->346 342->341 353 7ff64eec8619-7ff64eec86a9 WindowsGetStringRawBuffer call 7ff64eec9ab0 342->353 343->330 345->346 348 7ff64eec28f3-7ff64eec28fe 346->348 349 7ff64eec2908-7ff64eec291f call 7ff64eec5e40 346->349 348->349 353->341
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: Once$ApplicationBufferCallClientCloseContextExecuteFromFullHandleImageImpersonateInitModelNameProcessQueryRevertSelfStringTokenUserWindows
  • String ID: ActivateInstance$ERROR$GetActivationFactory
  • API String ID: 2418767327-382788514
  • Opcode ID: 3d085c315d2330e0b0d2472606634b96ee0fbf77c5a6f2525d3ff3fca275303c
  • Instruction ID: 116c15eb0177b025023302f5ff14327e65e6402fc6bb08bb5fa45bede449099e
  • Opcode Fuzzy Hash: 3d085c315d2330e0b0d2472606634b96ee0fbf77c5a6f2525d3ff3fca275303c
  • Instruction Fuzzy Hash: 00D11B36B0CB42CAF710AB64E4806AD7BA4FB99758F904235EA4D83B59DFBCE545C700

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 356 7ff64eec2940-7ff64eec2981 357 7ff64eec2987-7ff64eec298e 356->357 358 7ff64eec86b8-7ff64eec86cc call 7ff64eeccd90 356->358 360 7ff64eec2990-7ff64eec2997 357->360 365 7ff64eec86d2-7ff64eec86df 358->365 360->360 362 7ff64eec2999-7ff64eec29a1 360->362 363 7ff64eec86ae 362->363 364 7ff64eec29a7-7ff64eec29cd WindowsDeleteString WindowsCreateString 362->364 363->358 366 7ff64eec29cf-7ff64eec29d7 364->366 367 7ff64eec2a24-7ff64eec2a33 364->367 369 7ff64eec86e5 365->369 366->365 368 7ff64eec29dd-7ff64eec2a05 #153 366->368 367->369 370 7ff64eec2a39-7ff64eec2a3b 367->370 368->367 374 7ff64eec2a07-7ff64eec2a22 368->374 377 7ff64eec86ef-7ff64eec86f4 369->377 371 7ff64eec2a41-7ff64eec2ac1 370->371 372 7ff64eec2d64-7ff64eec2d67 370->372 383 7ff64eec87f3 371->383 384 7ff64eec2ac7-7ff64eec2ad1 371->384 375 7ff64eec2d69-7ff64eec2d6c 372->375 376 7ff64eec2d76-7ff64eec2d94 WindowsDeleteString 372->376 374->367 375->376 379 7ff64eec2da8-7ff64eec2dc3 call 7ff64eec5e40 376->379 380 7ff64eec2d96-7ff64eec2d9e 376->380 382 7ff64eec2cfc-7ff64eec2d03 377->382 380->379 385 7ff64eec2dc5-7ff64eec2dda LocalFree 382->385 386 7ff64eec2d09-7ff64eec2d24 WindowsDeleteString 382->386 389 7ff64eec2ae5-7ff64eec2aea 384->389 390 7ff64eec2ad3-7ff64eec2ad6 384->390 385->386 391 7ff64eec2d37-7ff64eec2d60 WindowsDeleteString * 2 386->391 392 7ff64eec2d26-7ff64eec2d2d 386->392 389->383 394 7ff64eec2af0-7ff64eec2af2 389->394 390->383 393 7ff64eec2adc-7ff64eec2adf 390->393 391->372 392->391 393->377 393->389 394->382 395 7ff64eec2af8-7ff64eec2afc 394->395 395->383 396 7ff64eec2b02-7ff64eec2b05 395->396 397 7ff64eec2b0b-7ff64eec2b0e 396->397 398 7ff64eec86f9-7ff64eec86fe 396->398 399 7ff64eec8703-7ff64eec8708 397->399 400 7ff64eec2b14-7ff64eec2b18 397->400 398->382 399->382 400->383 401 7ff64eec2b1e-7ff64eec2b22 400->401 402 7ff64eec2b28-7ff64eec2b30 401->402 403 7ff64eec870d 401->403 404 7ff64eec2b36-7ff64eec2b39 402->404 405 7ff64eec8717-7ff64eec871c 402->405 403->405 406 7ff64eec2b3f-7ff64eec2b41 404->406 407 7ff64eec8721-7ff64eec8726 404->407 405->382 406->382 408 7ff64eec2b47-7ff64eec2b4e 406->408 407->382 409 7ff64eec2b50-7ff64eec2b55 408->409 410 7ff64eec2b77-7ff64eec2b7b 408->410 411 7ff64eec872b 409->411 412 7ff64eec2b5b-7ff64eec2b5f 409->412 413 7ff64eec2b81-7ff64eec2b85 410->413 414 7ff64eec8748-7ff64eec874d 410->414 415 7ff64eec8734-7ff64eec8739 411->415 412->415 416 7ff64eec2b65-7ff64eec2b69 412->416 417 7ff64eec8752-7ff64eec8757 413->417 418 7ff64eec2b8b-7ff64eec2bb2 CoImpersonateClient 413->418 414->382 415->382 419 7ff64eec2b6f-7ff64eec2b71 416->419 420 7ff64eec873e-7ff64eec8743 416->420 417->382 421 7ff64eec2bb8-7ff64eec2bf9 GetCurrentThread OpenThreadToken 418->421 422 7ff64eec87d9-7ff64eec87de 418->422 419->383 419->410 420->382 425 7ff64eec2bff 421->425 426 7ff64eec875c-7ff64eec876c GetLastError 421->426 423 7ff64eec87e4-7ff64eec87e7 422->423 424 7ff64eec2cf2-7ff64eec2cf4 422->424 428 7ff64eec2cfa 423->428 427 7ff64eec87ec 424->427 424->428 429 7ff64eec2c02-7ff64eec2c10 CoRevertToSelf 425->429 426->429 430 7ff64eec8772-7ff64eec877b 426->430 427->383 428->382 431 7ff64eec2ccf-7ff64eec2cdf 429->431 432 7ff64eec2c16-7ff64eec2cbe InitOnceExecuteOnce AccessCheckByType 429->432 430->429 431->424 435 7ff64eec2ce1 431->435 433 7ff64eec2cc4-7ff64eec2ccb 432->433 434 7ff64eec8780-7ff64eec8790 GetLastError 432->434 433->431 436 7ff64eec8792-7ff64eec8795 434->436 437 7ff64eec879b-7ff64eec879d 434->437 438 7ff64eec2ce5 call 7ff64eec5300 435->438 436->437 437->431 439 7ff64eec87a3 437->439 440 7ff64eec2cea-7ff64eec2cec 438->440 441 7ff64eec87a8-7ff64eec87b6 GetLastError 439->441 440->424 440->441 442 7ff64eec87c0-7ff64eec87d8 RaiseException 441->442 443 7ff64eec87b8-7ff64eec87bb 441->443 442->422 443->442
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: StringWindows$Delete$OnceThread$#153AccessCheckClientCreateCurrentExecuteImpersonateInitOpenRevertSelfTokenType
  • String ID:
  • API String ID: 2298634945-0
  • Opcode ID: 905ccab0c48f81b5989ea0f1cb6033083a2aaee62740c1047354079afc711d9d
  • Instruction ID: 0686654d2a3a6d330e594ab0c5b477ceec71a45e2f84f460f1799165f5180baa
  • Opcode Fuzzy Hash: 905ccab0c48f81b5989ea0f1cb6033083a2aaee62740c1047354079afc711d9d
  • Instruction Fuzzy Hash: EFF16936B0CB82CAFB10BB65E4406AD7BA0FBA9794F104235EA4D93B65DF7DE4418704
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
  • String ID:
  • API String ID: 313767242-0
  • Opcode ID: f94f21ead2ceb3be62a7d8e1d1e16f48b9d97544c8733c5bb34711c8e8d4b39a
  • Instruction ID: 885cb83ed84181a876f4988d70d29fa42b691da29352fc45054263e1dc15cb81
  • Opcode Fuzzy Hash: f94f21ead2ceb3be62a7d8e1d1e16f48b9d97544c8733c5bb34711c8e8d4b39a
  • Instruction Fuzzy Hash: A8317276709B82C6EB60AF60E8407EE3764FB94B48F444439EA4D87B99EF78D548C700
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: Virtual$AllocGuaranteeInfoProtectQueryStackSystemThread
  • String ID:
  • API String ID: 513674450-0
  • Opcode ID: e0e5fa3caaed48ca95fe91ce30dfae3f8c3964ddc5e94379271a4387380ac3b6
  • Instruction ID: 94fae5a47341aa30bdd083356a48c13dd22110a9977b08149ec0bf5db2ea666f
  • Opcode Fuzzy Hash: e0e5fa3caaed48ca95fe91ce30dfae3f8c3964ddc5e94379271a4387380ac3b6
  • Instruction Fuzzy Hash: 21316F36718A82CAEB10EF21E8507E83BE5FB59B88F485135EA0E87754DFB8E545C700
APIs
  • IsDebuggerPresent.API-MS-WIN-CORE-DEBUG-L1-1-0(?,?,?,00007FF64EEC5F9D,?,?,?,?,?,?,00007FF64EEC127B), ref: 00007FF64EEC5E71
  • SetUnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF64EEC5F9D,?,?,?,?,?,?,00007FF64EEC127B), ref: 00007FF64EEC5E89
  • UnhandledExceptionFilter.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0(?,?,?,00007FF64EEC5F9D,?,?,?,?,?,?,00007FF64EEC127B), ref: 00007FF64EEC5E92
  • GetCurrentProcess.API-MS-WIN-CORE-PROCESSTHREADS-L1-1-0(?,?,?,00007FF64EEC5F9D,?,?,?,?,?,?,00007FF64EEC127B), ref: 00007FF64EEC5EAB
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: ExceptionFilterUnhandled$CurrentDebuggerPresentProcess
  • String ID:
  • API String ID: 2506494423-0
  • Opcode ID: b99d5c8af2301ba828a70b6bdf3be2bb36a2210073049334444f13574ba8f8ea
  • Instruction ID: 79f9c73d7b63c634d59a658f72ece63951a1b653c9fb6af3770185f32d385647
  • Opcode Fuzzy Hash: b99d5c8af2301ba828a70b6bdf3be2bb36a2210073049334444f13574ba8f8ea
  • Instruction Fuzzy Hash: 9EF0E568F0C6078AF7143B71B8156752664BFF5B55F441534F91EC5292DFFE6485C200
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: DebuggerPresent
  • String ID: (%S):(%S):(%d) $Heap
  • API String ID: 1347740429-3299253117
  • Opcode ID: 15e4b1ebb7461e4b991496a1aa5a6b2fb7fff6d12c2960c1921c633e75f12054
  • Instruction ID: 489f5ea6233fc84e9221090ae7a138eaa87a64bf76eee0acd0f0aa04653ff689
  • Opcode Fuzzy Hash: 15e4b1ebb7461e4b991496a1aa5a6b2fb7fff6d12c2960c1921c633e75f12054
  • Instruction Fuzzy Hash: 99A15C26B0CA4385EB68BB61E8107B82BD4FF64798F544035F91E87BA9DEBCE441C740
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: AddressProc
  • String ID: NtQueryWnfStateData
  • API String ID: 190572456-3685890079
  • Opcode ID: 15cf0db0ead2dfaae78878805870650b9523135ce89cf485b564fc3c991a47fe
  • Instruction ID: b66c4db1f87c7d450fb2767c83d7966c4a8ecbf0ffd282215489cdd00125afe8
  • Opcode Fuzzy Hash: 15cf0db0ead2dfaae78878805870650b9523135ce89cf485b564fc3c991a47fe
  • Instruction Fuzzy Hash: 91F06229B0DF4686EB10BB1AF400465AA91FFA9BD4F444231ED4D87764EEBCD4508B00
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 3e1317747797472a79fe395459715ef81b1726784e11e9f95ac1da4c82d9799a
  • Instruction ID: 63ce08c8466c9e291695bfce86e54b89f2b3817d6ede5ef5badf727b039fdecd
  • Opcode Fuzzy Hash: 3e1317747797472a79fe395459715ef81b1726784e11e9f95ac1da4c82d9799a
  • Instruction Fuzzy Hash: D2111C26B0DA42C9EA24BF52E451178BB60FBA4FC0B485132EB9F87759CF79E4519304
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 89f38db50dbd013c15691e5ee87d9c7cbb41a20b20831d27c9b0bcdd0b79d70c
  • Instruction ID: ed494bfe1ce74904649878b4f544b1db77de101141f8481a8b4527bdf8b35684
  • Opcode Fuzzy Hash: 89f38db50dbd013c15691e5ee87d9c7cbb41a20b20831d27c9b0bcdd0b79d70c
  • Instruction Fuzzy Hash: 7241A173F296118EF350EBB9D8457AD3AF1BB55349F148039EE09D6A88DFBC94418B40
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID:
  • String ID:
  • API String ID:
  • Opcode ID: 9388206ab06eae6549325f9595ecf8226ceaac0c2fabe80f9dfe2727cefdb58e
  • Instruction ID: 0c64151acb7e7a84c589f59972ad751bcf0f37c0a58197336bf6b0dff19c4edf
  • Opcode Fuzzy Hash: 9388206ab06eae6549325f9595ecf8226ceaac0c2fabe80f9dfe2727cefdb58e
  • Instruction Fuzzy Hash: AFA00269A0CD03D1E644BF50F8544312734FBB4740B450931F05DC10A1DFBDA400C301

Control-flow Graph

  • Executed
  • Not Executed
control_flow_graph 444 7ff64eecb0bc-7ff64eecb0f0 445 7ff64eecb2ff-7ff64eecb327 call 7ff64eec5e40 444->445 446 7ff64eecb0f6-7ff64eecb0f9 444->446 446->445 448 7ff64eecb0ff-7ff64eecb10d 446->448 450 7ff64eecb10f-7ff64eecb116 448->450 451 7ff64eecb131-7ff64eecb13c 448->451 450->451 452 7ff64eecb118-7ff64eecb12b 450->452 453 7ff64eecb13e-7ff64eecb141 451->453 454 7ff64eecb168 451->454 452->445 452->451 456 7ff64eecb143-7ff64eecb146 453->456 457 7ff64eecb15f-7ff64eecb166 453->457 455 7ff64eecb16f-7ff64eecb1c2 FormatMessageW 454->455 458 7ff64eecb1c4-7ff64eecb1e5 call 7ff64eecbfb8 455->458 459 7ff64eecb1e7-7ff64eecb1f3 call 7ff64eecbfb8 455->459 461 7ff64eecb156-7ff64eecb15d 456->461 462 7ff64eecb148-7ff64eecb14b 456->462 457->455 467 7ff64eecb1f8-7ff64eecb205 458->467 459->467 461->455 462->455 465 7ff64eecb14d-7ff64eecb154 462->465 465->455 468 7ff64eecb21c-7ff64eecb25d GetCurrentThreadId call 7ff64eecbfb8 467->468 469 7ff64eecb207-7ff64eecb219 call 7ff64eecbfb8 467->469 474 7ff64eecb26f-7ff64eecb288 call 7ff64eecbfb8 468->474 475 7ff64eecb25f-7ff64eecb263 468->475 469->468 479 7ff64eecb28a-7ff64eecb297 call 7ff64eecbfb8 474->479 480 7ff64eecb29c-7ff64eecb2a3 474->480 475->474 476 7ff64eecb265-7ff64eecb269 475->476 476->445 476->474 479->480 482 7ff64eecb2a5-7ff64eecb2b2 call 7ff64eecbfb8 480->482 483 7ff64eecb2b7-7ff64eecb2c5 480->483 482->483 485 7ff64eecb2dd-7ff64eecb2e3 483->485 486 7ff64eecb2c7-7ff64eecb2db call 7ff64eecbfb8 483->486 488 7ff64eecb2f3-7ff64eecb2fa call 7ff64eecbfb8 485->488 489 7ff64eecb2e5-7ff64eecb2f1 call 7ff64eecbfb8 485->489 486->445 488->445 489->445
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: CurrentFormatMessageThread
  • String ID: $%hs!%p: $%hs(%d) tid(%x) %08X %ws$%hs(%u)\%hs!%p: $(caller: %p) $CallContext:[%hs] $Exception$FailFast$LogHr$Msg:[%ws] $ReturnHr$[%hs(%hs)]$[%hs]
  • API String ID: 2411632146-3173542853
  • Opcode ID: bb7ef0f976bdc84ac4fed5ca1c1db839bb1912d2077f87e76b0afc6e05c7d31c
  • Instruction ID: e44bc369c17f5513e0631446301baaecc18b4e8ff8d4f1ee2b92844bf9f72d9f
  • Opcode Fuzzy Hash: bb7ef0f976bdc84ac4fed5ca1c1db839bb1912d2077f87e76b0afc6e05c7d31c
  • Instruction Fuzzy Hash: 62618D35B0CB8282EA29FF51A8009B967A4FFA9784F404536FA4D83B95DF7CE5608700
APIs
    • Part of subcall function 00007FF64EECB6BC: InitOnceExecuteOnce.API-MS-WIN-CORE-SYNCH-L1-2-0(?,?,?,?,00007FF64EECBB93), ref: 00007FF64EECB6D4
  • LsaLookupOpenLocalPolicy.API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0 ref: 00007FF64EECBBC3
  • GetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF64EECBBE3
  • LsaLookupFreeMemory.API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0 ref: 00007FF64EECBBF4
  • SetLastError.API-MS-WIN-CORE-ERRORHANDLING-L1-1-0 ref: 00007FF64EECBC02
  • LsaLookupGetDomainInfo.API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0 ref: 00007FF64EECBC1B
  • CreateWellKnownSid.API-MS-WIN-SECURITY-BASE-L1-1-0 ref: 00007FF64EECBC5A
  • RtlEqualSid.NTDLL ref: 00007FF64EECBC8A
  • LsaLookupFreeMemory.API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0 ref: 00007FF64EECBCA8
  • LsaLookupClose.API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0 ref: 00007FF64EECBCBD
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: Lookup$ErrorFreeLastMemoryOnce$CloseCreateDomainEqualExecuteInfoInitKnownLocalOpenPolicyWell
  • String ID: onecore\com\combase\runtimebroker\exe\runtimebroker.cpp
  • API String ID: 2178992486-1046603397
  • Opcode ID: 16f694b7c587e33cd115ef84b23960b5e79c59e81de7df628830f99a31141214
  • Instruction ID: a093bbf8c5dfd4b7fc400f4113193f25841717da87bcc348976c5d2e9837d752
  • Opcode Fuzzy Hash: 16f694b7c587e33cd115ef84b23960b5e79c59e81de7df628830f99a31141214
  • Instruction Fuzzy Hash: 0C414926B08B428AEB00AFA1D4007BC6B61FBA9B89F459531EE0D97644DFB9E445C340
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: Error$CurrentKernelLastObjectProcessSecurityTask$AccessAllocCheckFreeGenericMaskOriginate
  • String ID:
  • API String ID: 2648494228-0
  • Opcode ID: f2a0d9cbb5b4286209861aef11bf62254016d01634515dee56654fb34c1de0d1
  • Instruction ID: 6bbf06b8f3760b1bfcc55fa21c80d956aad492ba0bcbec4eaee24372dc527599
  • Opcode Fuzzy Hash: f2a0d9cbb5b4286209861aef11bf62254016d01634515dee56654fb34c1de0d1
  • Instruction Fuzzy Hash: FC514C37B08A42CBE710AB61E4146BD7BA1FB99B49F458235EE4E87B54DF78D109C700
APIs
  • WaitForSingleObject.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,00000000,00007FF64EEC92B5), ref: 00007FF64EECB922
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: ObjectSingleWait
  • String ID: wil
  • API String ID: 24740636-1589926490
  • Opcode ID: aa878ce9232380ecc258523c0c66fccec9adce65c0040defde86804a8322f0bf
  • Instruction ID: 36179955672d6b5f2f60710b4a008da429ceb11623ba6ecafe4e2f79460aa8ee
  • Opcode Fuzzy Hash: aa878ce9232380ecc258523c0c66fccec9adce65c0040defde86804a8322f0bf
  • Instruction Fuzzy Hash: 1B417E21B0C68387F320BB11E40477E7AA1FFA5781F649631E95EC6AA4CFBDD8458701
APIs
  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,0000000C,?,00007FF64EEC4038,?,?,00007FF64EEC8D49,00007FF64EECC54E,?,?,?,?,?,00007FF64EEC8D49), ref: 00007FF64EEC42CD
  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,0000000C,?,00007FF64EEC4038,?,?,00007FF64EEC8D49,00007FF64EECC54E,?,?,?,?,?,00007FF64EEC8D49), ref: 00007FF64EEC42E1
  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,0000000C,?,00007FF64EEC4038,?,?,00007FF64EEC8D49,00007FF64EECC54E,?,?,?,?,?,00007FF64EEC8D49), ref: 00007FF64EEC42FC
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: Heap$Process$Alloc
  • String ID:
  • API String ID: 651230671-0
  • Opcode ID: 741cb74d1ca26d461ce3e1a4ee28967abacef77ca6491e2e37201321a8afc90f
  • Instruction ID: 8aa51de55c607349708d3a9e049b936e2036892e4a65f796c42b96c2efcc3b2a
  • Opcode Fuzzy Hash: 741cb74d1ca26d461ce3e1a4ee28967abacef77ca6491e2e37201321a8afc90f
  • Instruction Fuzzy Hash: 9A419D26B0DA42C6EA00BF56E5041BDABA0FFA9B95B088130EF5D83755DF7DE0628700
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: StringWindows$Delete$ActivationCreateErrorFactoryOriginate
  • String ID:
  • API String ID: 1130540099-0
  • Opcode ID: 0e1c1bbde761e005811a8302011d86a26311fccce2f7424362cc06ac131b1f25
  • Instruction ID: 56a740abed7202bedccd8421486d60b35d82ac0cd014ec7acf39fa709c8a2ad6
  • Opcode Fuzzy Hash: 0e1c1bbde761e005811a8302011d86a26311fccce2f7424362cc06ac131b1f25
  • Instruction Fuzzy Hash: D7517F26B0CB8386E700BB25B500679ABA0FBAD794F509235FE4E82665DFBDE4418700
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: StringWindows$Delete$ActivateCreateErrorInstanceOriginate
  • String ID:
  • API String ID: 3245081336-0
  • Opcode ID: 21e60a127233947812c7fb1cfbad7e22973c352145760b60870a6a9facd8b6b8
  • Instruction ID: e4932417fa06d03de519f8fcb2cd6532a8c0584da49df0aa1892a33853f3cc71
  • Opcode Fuzzy Hash: 21e60a127233947812c7fb1cfbad7e22973c352145760b60870a6a9facd8b6b8
  • Instruction Fuzzy Hash: 66515D25B0CB87C7E710BB24E5406B9ABA0FBA9750F109331FA9D82769DFBDE4459700
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: MultiSession
  • String ID: Windows.System.User$onecore\com\combase\runtimebroker\exe\runtimebroker.cpp
  • API String ID: 1909026881-2095041590
  • Opcode ID: e8acd4fab34d1bab0fbf8186052c28a5cbe856b33871e8decdf3d09a8537b8b1
  • Instruction ID: c49b827a7081bab886793222d47f7668de2efb2546fe91176e1084b36916941e
  • Opcode Fuzzy Hash: e8acd4fab34d1bab0fbf8186052c28a5cbe856b33871e8decdf3d09a8537b8b1
  • Instruction Fuzzy Hash: F6712F26B0CB46C5FB10FBA5D9505BD2BA0BFA8B88B144535EE0D97B64DF78E446C304
APIs
  • AcquireSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00000000,00007FF64EEC9909), ref: 00007FF64EECC24D
  • ReleaseSRWLockShared.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00000000,00007FF64EEC9909), ref: 00007FF64EECC26D
  • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00000000,00007FF64EEC9909), ref: 00007FF64EECC28D
  • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00000000,00007FF64EEC9909), ref: 00007FF64EECC29C
  • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00000000,00007FF64EEC9909), ref: 00007FF64EECC2F4
  • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,?,00000000,00007FF64EEC9909), ref: 00007FF64EECC319
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: Lock$AcquireCriticalExclusiveReleaseSectionShared$EnterLeave
  • String ID:
  • API String ID: 3221859647-0
  • Opcode ID: 2d2040665af4a4f281ccd8ae2bcf3059a02c1352d54abbf191629f6e1790d5df
  • Instruction ID: 077035d64f176dbf42f00126c43fc5e57a38c3e52262e293d9e49271eb15d12b
  • Opcode Fuzzy Hash: 2d2040665af4a4f281ccd8ae2bcf3059a02c1352d54abbf191629f6e1790d5df
  • Instruction Fuzzy Hash: D8317F26B0CE8286EA15BF52A500179ABA0FBA9FD1B499170EE4E47B14DF7CD585C700
APIs
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: Thread$ClientCloseCurrentErrorHandleImpersonateLastOpenRevertSelfToken
  • String ID:
  • API String ID: 1175436245-0
  • Opcode ID: be395eaf02807ca0d5cd71520071d9415fb31a5c34e52a4edf894477fb9124c6
  • Instruction ID: b950d12591c105dc9da9da2297ba47caefc321b2e6220a9f198672fe63b5f82d
  • Opcode Fuzzy Hash: be395eaf02807ca0d5cd71520071d9415fb31a5c34e52a4edf894477fb9124c6
  • Instruction Fuzzy Hash: D1214A25B1CB8387E7407B61E4447B9BEA0FB9AB81F449234FA8EC2741DFACD4849700
APIs
  • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF64EEC704C), ref: 00007FF64EEC7B5E
    • Part of subcall function 00007FF64EEC7470: GetProcAddress.API-MS-WIN-CORE-LIBRARYLOADER-L1-2-0 ref: 00007FF64EEC749B
  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF64EEC704C), ref: 00007FF64EEC7BFD
  • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF64EEC704C), ref: 00007FF64EEC7C11
  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF64EEC704C), ref: 00007FF64EEC7C1D
  • HeapAlloc.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF64EEC704C), ref: 00007FF64EEC7C31
  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF64EEC704C), ref: 00007FF64EEC7DE5
  • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF64EEC704C), ref: 00007FF64EEC7DF9
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: Heap$Process$Free$AddressAllocProcmemset
  • String ID:
  • API String ID: 2515388404-0
  • Opcode ID: f32ca9d152b81742a32523ce705242412f49e242848a67d0c0d14747b15cdaf7
  • Instruction ID: f4e4092e9acd63e8e7ad9f2bee11159ab24108ffb6cd0f2aef21d40945d3f4be
  • Opcode Fuzzy Hash: f32ca9d152b81742a32523ce705242412f49e242848a67d0c0d14747b15cdaf7
  • Instruction Fuzzy Hash: 1D916D36B18B528AEB20EF66E4005B97BB0FB69B88B448535EE8E83754DF78D154C710
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: ErrorLastOpenSemaphore
  • String ID: _p0$wil
  • API String ID: 1909229842-1814513734
  • Opcode ID: a5cd399a27205ceef1c2beec119a410a58b8f779cab6bd0e0e58c142d57e1180
  • Instruction ID: 254933e809c57bf65b140a7232187fd02375471ff0e7477aea9c5895493cd95c
  • Opcode Fuzzy Hash: a5cd399a27205ceef1c2beec119a410a58b8f779cab6bd0e0e58c142d57e1180
  • Instruction Fuzzy Hash: 3D71D162B1DA8285EF21FF5994106B92BA0FFA8B80F444532FA4E87795DFBDE505C300
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: memsetwcsncmp
  • String ID: CheckPerAppBrokerInstancingRegistryValue$Failed to handle format string %s$onecore\com\combase\common\core\perappruntimebroker.cpp
  • API String ID: 1181335886-259689217
  • Opcode ID: 5690f14769ec5ce86af37efc14a6e33ec8f84abfd0566ea1fdf18aafda7f84db
  • Instruction ID: 2a361da62f6d81b935cf660ca5b0b141591b9515d9d997997735b5f645486610
  • Opcode Fuzzy Hash: 5690f14769ec5ce86af37efc14a6e33ec8f84abfd0566ea1fdf18aafda7f84db
  • Instruction Fuzzy Hash: F941B522B1CA4281E720BF55E8045BA77A5FBA4794F845231FE9E877A4EFBCD445C300
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: CreateCurrentMutexProcess
  • String ID: Local\SM0:%d:%d:%hs$wil$x
  • API String ID: 3937467467-630742106
  • Opcode ID: 719f68025b03c92c310b1719f4d30fdc95cb7cfc46a067599a3f77b2d9a280db
  • Instruction ID: 5fa36f9b8b729bf3840b65dd406419f28be93f2d023e986572c60e880141f377
  • Opcode Fuzzy Hash: 719f68025b03c92c310b1719f4d30fdc95cb7cfc46a067599a3f77b2d9a280db
  • Instruction Fuzzy Hash: D8415032B1CA8286EB11BB55E4407FA6BA0FBA8784F449031FA8EC7795DEBCD545C700
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: CreateSemaphore
  • String ID: _p0$wil
  • API String ID: 1078844751-1814513734
  • Opcode ID: 3ec56fafa09b94896648085c11ab3e16d0b800b57fe4b7839010c4953298520c
  • Instruction ID: bcffbb14cb5b94e81ef5b8362b8e60790157d68175823701a1a244ef23b2cb3b
  • Opcode Fuzzy Hash: 3ec56fafa09b94896648085c11ab3e16d0b800b57fe4b7839010c4953298520c
  • Instruction Fuzzy Hash: 8661C361B1C68285EB61BF6194447BA6A90FFA8B80F544135FB1DC7798EFBDE404C700
APIs
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: AddressHandleModuleProc
  • String ID: RaiseFailFastException$kernelbase.dll
  • API String ID: 1646373207-919018592
  • Opcode ID: b4047b3d9d79572b1f8a17285da983a8aff476f7ab7082397e3ebcf01806d9c2
  • Instruction ID: 27659265a4beb10f3cd6269c3764b8f8cfc0214c0255bec3c52e35a937175cb1
  • Opcode Fuzzy Hash: b4047b3d9d79572b1f8a17285da983a8aff476f7ab7082397e3ebcf01806d9c2
  • Instruction Fuzzy Hash: ADF0D02571CB9282EB046B02F544479AA60FB9DBD0B44A535EA4E57768DF7DD481C700
APIs
  • memcmp.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,?,?,?,?,?,?,00000014,?,?,0000001C,00007FF64EEC1F33), ref: 00007FF64EEC2096
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: memcmp
  • String ID:
  • API String ID: 1475443563-0
  • Opcode ID: a227adf3986fb5740f1334595c41e9aee6258706b3285243a2f960f0cea880d3
  • Instruction ID: 0ba101032ff3261916cd660a5ae3776c72be1fdcb13af39c61c441f2c6813987
  • Opcode Fuzzy Hash: a227adf3986fb5740f1334595c41e9aee6258706b3285243a2f960f0cea880d3
  • Instruction Fuzzy Hash: 0F918F62F18A918AEB00FF6194400FD3B70FB69B88B105126FE4E97B89DFB9D541C340
APIs
  • _o__errno.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF64EEC970A,?,?,?,00007FF64EEC1E25), ref: 00007FF64EEC9138
  • memset.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF64EEC970A,?,?,?,00007FF64EEC1E25), ref: 00007FF64EEC915E
  • _o__errno.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF64EEC970A,?,?,?,00007FF64EEC1E25), ref: 00007FF64EEC916D
  • _o__invalid_parameter_noinfo.API-MS-WIN-CRT-PRIVATE-L1-1-0(?,?,?,00007FF64EEC970A,?,?,?,00007FF64EEC1E25), ref: 00007FF64EEC917F
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: _o__errno$_o__invalid_parameter_noinfomemset
  • String ID:
  • API String ID: 1330570140-0
  • Opcode ID: 7ed881f3b96514f9a5b7ec82e0e572938635dce3114c8860b36ede808ead0b47
  • Instruction ID: 11d285aeceb278c270d50c0130a4aca83ae1d0d8cdfaa0cf19e358d56f67e008
  • Opcode Fuzzy Hash: 7ed881f3b96514f9a5b7ec82e0e572938635dce3114c8860b36ede808ead0b47
  • Instruction Fuzzy Hash: E6019220F0C64281FB147F91A5092BA6E90BF68BD0F499530FA1D8778ACEADE4414301
APIs
  • EnterCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EECD2D8,?,?,?,?,?,?,?,?,00007FF64EEC5AF1), ref: 00007FF64EECD235
  • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EECD2D8,?,?,?,?,?,?,?,?,00007FF64EEC5AF1), ref: 00007FF64EECD244
  • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EECD2D8,?,?,?,?,?,?,?,?,00007FF64EEC5AF1), ref: 00007FF64EECD27B
  • LeaveCriticalSection.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EECD2D8,?,?,?,?,?,?,?,?,00007FF64EEC5AF1), ref: 00007FF64EECD28F
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: CriticalExclusiveLockSection$AcquireEnterLeaveRelease
  • String ID:
  • API String ID: 1115728412-0
  • Opcode ID: d295c3e35a24f548409453d96cd0de7d8d4a095642c44d4602c7f2e097f9bd9b
  • Instruction ID: 64f67c70c2a8dcdd87d450ca20d1b0259ebfc86718a90ff2d90ed9e3cd01302f
  • Opcode Fuzzy Hash: d295c3e35a24f548409453d96cd0de7d8d4a095642c44d4602c7f2e097f9bd9b
  • Instruction Fuzzy Hash: BD015276B1CB8282EE18BF51A544578AB60FBAEFC17199270EE4E43714DF7DD4918700
APIs
  • AcquireSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EEC8C49,?,?,?,?,?,00007FF64EEC38A0), ref: 00007FF64EEC3F08
  • ReleaseSRWLockExclusive.API-MS-WIN-CORE-SYNCH-L1-1-0(?,?,?,00007FF64EEC8C49,?,?,?,?,?,00007FF64EEC38A0), ref: 00007FF64EEC3F64
Strings
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: ExclusiveLock$AcquireRelease
  • String ID: [)
  • API String ID: 17069307-4291594351
  • Opcode ID: d710c684ec76256ea2a1128f63be0e6e2c8dab3fd5af79bc3c0905aa0bc11db4
  • Instruction ID: 91e8746d411dc0b8527698df3f9b7a16efbe53d26838bccb578c1334038fea50
  • Opcode Fuzzy Hash: d710c684ec76256ea2a1128f63be0e6e2c8dab3fd5af79bc3c0905aa0bc11db4
  • Instruction Fuzzy Hash: B9117935A0DB8686EB60BF21E4402B87BB0FB59B84F480574EA4E87794CFBDE855C700
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: memcmp
  • String ID:
  • API String ID: 1475443563-0
  • Opcode ID: e69db0821044a7a6169fef2bc5046518f2427ef212224ae0726b2b5db3d53e53
  • Instruction ID: 59539608b4d3074f53a9785bd3324a2b6166bb970e4c8744cf0f9e549fe809dc
  • Opcode Fuzzy Hash: e69db0821044a7a6169fef2bc5046518f2427ef212224ae0726b2b5db3d53e53
  • Instruction Fuzzy Hash: E9316236A0CB8186D720BF22A0006A9ABA5FB9ABC4F185235FE9D4375ACF7DD045C700
APIs
  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000078,00007FF64EECA04F,?,?,?,00007FF64EECC703,?,?,?,?,?,00007FF64EEC5AAD), ref: 00007FF64EECA9DA
  • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000078,00007FF64EECA04F,?,?,?,00007FF64EECC703,?,?,?,?,?,00007FF64EEC5AAD), ref: 00007FF64EECA9EE
  • GetProcessHeap.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000078,00007FF64EECA04F,?,?,?,00007FF64EECC703,?,?,?,?,?,00007FF64EEC5AAD), ref: 00007FF64EECAA12
  • HeapFree.API-MS-WIN-CORE-HEAP-L1-1-0(?,?,00000078,00007FF64EECA04F,?,?,?,00007FF64EECC703,?,?,?,?,?,00007FF64EEC5AAD), ref: 00007FF64EECAA26
Memory Dump Source
  • Source File: 00000000.00000002.1654005556.00007FF64EEC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64EEC0000, based on PE: true
  • Associated: 00000000.00000002.1653992847.00007FF64EEC0000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654020972.00007FF64EED1000.00000002.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654033413.00007FF64EED7000.00000004.00000001.01000000.00000003.sdmpDownload File
  • Associated: 00000000.00000002.1654045733.00007FF64EED8000.00000002.00000001.01000000.00000003.sdmpDownload File
Joe Sandbox IDA Plugin
  • Snapshot File: hcaresult_0_2_7ff64eec0000_RuntimeBroker.jbxd
Similarity
  • API ID: Heap$FreeProcess
  • String ID:
  • API String ID: 3859560861-0
  • Opcode ID: ade627b6d864314d11873174303ac8568b2ea4ccad8a1765aeb89a088a835f77
  • Instruction ID: a57e533f050675110be6ed018905ac947077b986c12b85738d203c2032550474
  • Opcode Fuzzy Hash: ade627b6d864314d11873174303ac8568b2ea4ccad8a1765aeb89a088a835f77
  • Instruction Fuzzy Hash: C111373A608B81C6DB10AF52F4400A9BBB4F799F80B4D9121DB8E53B25CF39E496C700