Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TlsPatcher-1.1.1.exe

Overview

General Information

Sample name:TlsPatcher-1.1.1.exe
Analysis ID:1545113
MD5:fdeac4be6f9e9154d54956760c3f0f58
SHA1:b706a826fbfdf577e5806927d43fb7d9138093e6
SHA256:7a16eee0bac29b88ad46a147dcad633860e81541538d91cc0e397b5d6b5986fe
Infos:

Detection

Score:6
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Checks for available system drives (often done to infect USB drives)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
Modifies existing windows services
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Uses 32bit PE files

Classification

  • System is w10x64_ra
  • TlsPatcher-1.1.1.exe (PID: 6528 cmdline: "C:\Users\user\Desktop\TlsPatcher-1.1.1.exe" MD5: FDEAC4BE6F9E9154D54956760C3F0F58)
    • TlsPatcher-1.1.1.exe (PID: 6680 cmdline: "C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe" -burn.clean.room="C:\Users\user\Desktop\TlsPatcher-1.1.1.exe" -burn.filehandle.attached=544 -burn.filehandle.self=536 MD5: 52A35A13FBEE36EA9BDD03038941A70C)
      • LevelUp.Integrations.TlsPatcher.Bootstrapper.exe (PID: 1552 cmdline: "C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exe" -q -burn.elevated BurnPipe.{D7715E5A-A98B-4BC4-B1C8-5EDCB8A18E89} {50E56F73-065C-4E5D-B245-F2777C85F34E} 6680 MD5: 52A35A13FBEE36EA9BDD03038941A70C)
  • SrTasks.exe (PID: 4892 cmdline: C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1 MD5: 2694D2D28C368B921686FE567BD319EB)
    • conhost.exe (PID: 4872 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • msiexec.exe (PID: 6540 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 6172 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding D15F1F4D54A0A6818E53558F3B46DD87 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
No yara matches
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\ProgramData\Package Cache\{fe0fc20b-fc4f-4233-98e4-e30940c5703c}\LevelUp.Integrations.TlsPatcher.Bootstrapper.exe" /burn.runonce, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exe, ProcessId: 1552, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{fe0fc20b-fc4f-4233-98e4-e30940c5703c}
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: TlsPatcher-1.1.1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\SystemRestore SRInitDone
Source: C:\Windows\System32\msiexec.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{114CA666-974E-4CC7-BE0E-45C1F713825B}
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\TLS_Patcher_v1.1.1_20241030012147_000_LevelUp.Integrations.TlsPatcher.Installer_1.1.1_x64.msi.log
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeFile created: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.ba\license.rtf
Source: TlsPatcher-1.1.1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Windows\System32\msiexec.exeFile opened: z:
Source: C:\Windows\System32\msiexec.exeFile opened: x:
Source: C:\Windows\System32\msiexec.exeFile opened: v:
Source: C:\Windows\System32\msiexec.exeFile opened: t:
Source: C:\Windows\System32\msiexec.exeFile opened: r:
Source: C:\Windows\System32\msiexec.exeFile opened: p:
Source: C:\Windows\System32\msiexec.exeFile opened: n:
Source: C:\Windows\System32\msiexec.exeFile opened: l:
Source: C:\Windows\System32\msiexec.exeFile opened: j:
Source: C:\Windows\System32\msiexec.exeFile opened: h:
Source: C:\Windows\System32\msiexec.exeFile opened: f:
Source: C:\Windows\System32\msiexec.exeFile opened: b:
Source: C:\Windows\System32\msiexec.exeFile opened: y:
Source: C:\Windows\System32\msiexec.exeFile opened: w:
Source: C:\Windows\System32\msiexec.exeFile opened: u:
Source: C:\Windows\System32\msiexec.exeFile opened: s:
Source: C:\Windows\System32\msiexec.exeFile opened: q:
Source: C:\Windows\System32\msiexec.exeFile opened: o:
Source: C:\Windows\System32\msiexec.exeFile opened: m:
Source: C:\Windows\System32\msiexec.exeFile opened: k:
Source: C:\Windows\System32\msiexec.exeFile opened: i:
Source: C:\Windows\System32\msiexec.exeFile opened: g:
Source: C:\Windows\System32\msiexec.exeFile opened: e:
Source: C:\Windows\System32\msiexec.exeFile opened: c:
Source: C:\Windows\System32\msiexec.exeFile opened: a:
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile opened: C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\NULL
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile opened: C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\packages
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile opened: C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\packages\vcRuntimeAdditional_amd64
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile opened: C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile opened: C:\ProgramData\Package Cache\NULL
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile opened: C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\packages\NULL
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6d73a7.msi
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI74D0.tmp
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipi
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{114CA666-974E-4CC7-BE0E-45C1F713825B}
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI758C.tmp
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6d73aa.msi
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\6d73aa.msi
Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI74D0.tmp
Source: TlsPatcher-1.1.1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP
Source: classification engineClassification label: clean6.winEXE@10/16@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4872:120:WilError_03
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeFile created: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\
Source: TlsPatcher-1.1.1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeFile read: C:\Windows\win.ini
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeFile read: C:\Users\user\Desktop\TlsPatcher-1.1.1.exe
Source: unknownProcess created: C:\Users\user\Desktop\TlsPatcher-1.1.1.exe "C:\Users\user\Desktop\TlsPatcher-1.1.1.exe"
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeProcess created: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe "C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe" -burn.clean.room="C:\Users\user\Desktop\TlsPatcher-1.1.1.exe" -burn.filehandle.attached=544 -burn.filehandle.self=536
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeProcess created: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exe "C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exe" -q -burn.elevated BurnPipe.{D7715E5A-A98B-4BC4-B1C8-5EDCB8A18E89} {50E56F73-065C-4E5D-B245-F2777C85F34E} 6680
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeProcess created: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe "C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe" -burn.clean.room="C:\Users\user\Desktop\TlsPatcher-1.1.1.exe" -burn.filehandle.attached=544 -burn.filehandle.self=536
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeProcess created: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exe "C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exe" -q -burn.elevated BurnPipe.{D7715E5A-A98B-4BC4-B1C8-5EDCB8A18E89} {50E56F73-065C-4E5D-B245-F2777C85F34E} 6680
Source: unknownProcess created: C:\Windows\System32\SrTasks.exe C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:1
Source: C:\Windows\System32\SrTasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding D15F1F4D54A0A6818E53558F3B46DD87
Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding D15F1F4D54A0A6818E53558F3B46DD87
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeSection loaded: cryptbase.dll
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeSection loaded: msi.dll
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeSection loaded: version.dll
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeSection loaded: cabinet.dll
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeSection loaded: msxml3.dll
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeSection loaded: windows.storage.dll
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeSection loaded: wldp.dll
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeSection loaded: profapi.dll
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeSection loaded: feclient.dll
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeSection loaded: iertutil.dll
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeSection loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: msi.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: cabinet.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: msxml3.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: feclient.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: textinputframework.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: coreuicomponents.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: coremessaging.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: msimg32.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: windowscodecs.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: explorerframe.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: riched20.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: usp10.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: msls31.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: textshaping.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: propsys.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: edputil.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: urlmon.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: srvcli.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: netutils.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: windows.staterepositoryps.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: sspicli.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: appresolver.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: bcp47langs.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: slc.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: userenv.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: sppc.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: onecorecommonproxystub.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: onecoreuapcommonproxystub.dll
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeSection loaded: apphelp.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: cryptbase.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: msi.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: cabinet.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: msxml3.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: windows.storage.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: wldp.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: profapi.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: uxtheme.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: textinputframework.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: coreuicomponents.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: coremessaging.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: ntmarta.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: wintypes.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: srclient.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: spp.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: powrprof.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: vssapi.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: vsstrace.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: umpdc.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: usoapi.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: sxproxy.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: cryptsp.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: rsaenh.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: feclient.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: iertutil.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: srpapi.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: tsappcmp.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: netapi32.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: wkscli.dll
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeSection loaded: netutils.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: spp.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: srclient.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: srcore.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: vssapi.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: vssapi.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: vsstrace.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: ktmw32.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: wer.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: bcd.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: powrprof.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: umpdc.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: ntmarta.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: dsrole.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: msxml3.dll
Source: C:\Windows\System32\SrTasks.exeSection loaded: vss_ps.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: version.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dll
Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dll
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dll
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F6D90F11-9C73-11D3-B32E-00C04F990BB4}\InProcServer32
Source: C:\Windows\System32\msiexec.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{114CA666-974E-4CC7-BE0E-45C1F713825B}
Source: TlsPatcher-1.1.1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: TlsPatcher-1.1.1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: TlsPatcher-1.1.1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: TlsPatcher-1.1.1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: TlsPatcher-1.1.1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: TlsPatcher-1.1.1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: TlsPatcher-1.1.1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: TlsPatcher-1.1.1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: TlsPatcher-1.1.1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: TlsPatcher-1.1.1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: TlsPatcher-1.1.1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: TlsPatcher-1.1.1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: TlsPatcher-1.1.1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: TlsPatcher-1.1.1.exeStatic PE information: section name: .wixburn
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeFile created: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeFile created: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.ba\wixstdba.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI74D0.tmpJump to dropped file
Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI74D0.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile created: C:\Users\user\AppData\Local\Temp\TLS_Patcher_v1.1.1_20241030012147_000_LevelUp.Integrations.TlsPatcher.Installer_1.1.1_x64.msi.log
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeFile created: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.ba\license.rtf
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Source: C:\Windows\System32\SrTasks.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce {fe0fc20b-fc4f-4233-98e4-e30940c5703c}
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce {fe0fc20b-fc4f-4233-98e4-e30940c5703c}
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce {fe0fc20b-fc4f-4233-98e4-e30940c5703c}
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce {fe0fc20b-fc4f-4233-98e4-e30940c5703c}
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.ba\wixstdba.dllJump to dropped file
Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI74D0.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile Volume queried: C:\Windows FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformation
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile opened: C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\NULL
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile opened: C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\packages
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile opened: C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\packages\vcRuntimeAdditional_amd64
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile opened: C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile opened: C:\ProgramData\Package Cache\NULL
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeFile opened: C:\ProgramData\Package Cache\{0025DD72-A959-45B5-A0A3-7EFEB15A8050}v14.36.32532\packages\NULL
Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\TlsPatcher-1.1.1.exeProcess created: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe "C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe" -burn.clean.room="C:\Users\user\Desktop\TlsPatcher-1.1.1.exe" -burn.filehandle.attached=544 -burn.filehandle.self=536
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeProcess created: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exe "C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exe" -q -burn.elevated BurnPipe.{D7715E5A-A98B-4BC4-B1C8-5EDCB8A18E89} {50E56F73-065C-4E5D-B245-F2777C85F34E} 6680
Source: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exeQueries volume information: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.ba\logo.png VolumeInformation
Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Replication Through Removable Media
Windows Management Instrumentation21
Windows Service
21
Windows Service
2
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
11
Process Injection
11
Process Injection
LSASS Memory11
Peripheral Device Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
Registry Run Keys / Startup Folder
1
DLL Side-Loading
1
DLL Side-Loading
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Registry Run Keys / Startup Folder
1
File Deletion
NTDS13
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
TlsPatcher-1.1.1.exe0%ReversingLabs
TlsPatcher-1.1.1.exe0%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.ba\wixstdba.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.ba\wixstdba.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exe0%VirustotalBrowse
C:\Windows\Installer\MSI74D0.tmp0%ReversingLabs
C:\Windows\Installer\MSI74D0.tmp0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1545113
Start date and time:2024-10-30 06:21:23 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:20
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
Analysis Mode:stream
Analysis stop reason:Timeout
Sample name:TlsPatcher-1.1.1.exe
Detection:CLEAN
Classification:clean6.winEXE@10/16@0/0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Excluded IPs from analysis (whitelisted): 184.28.90.27, 52.165.164.15
  • Excluded domains from analysis (whitelisted): fe3.delivery.mp.microsoft.com, fs.microsoft.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, glb.cws.prod.dcat.dsp.trafficmanager.net, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
Process:C:\Windows\System32\msiexec.exe
File Type:data
Category:modified
Size (bytes):10880
Entropy (8bit):5.626558358696894
Encrypted:false
SSDEEP:
MD5:1E1DE91E150F26FD491EC47E1080DB54
SHA1:3D9D79B6767B4D0F951034CDA37D18CC516D07A7
SHA-256:87F036EBB4ACDABCAA19DACAD2BDBD2E0120579045470F1C75427472298F5D4A
SHA-512:2F0D9B99F47D8D237191DDB0B7135375038AD193A80FA62210C7394BF89E0C0568DC079A912CBB729345A8A672A06C95AB9FD5471477CB567AF1A3045E6E9CEC
Malicious:false
Reputation:unknown
Preview:...@IXOS.@.....@..^Y.@.....@.....@.....@.....@.....@......&.{114CA666-974E-4CC7-BE0E-45C1F713825B}..LevelUp TLS Patcher v1.1.17.LevelUp.Integrations.TlsPatcher.Installer-1.1.1_x64.msi.@.....@.....@.....@........&.{64FB791B-0D06-4040-84F4-E3B4AFF5A845}.....@.....@.....@.....@.......@.....@.....@.......@......LevelUp TLS Patcher v1.1.1......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{C27227B8-F9AB-57BB-858E-3538D043481D}&.{114CA666-974E-4CC7-BE0E-45C1F713825B}.@......&.{701C99F0-E37A-511E-958A-455B2897E080}&.{114CA666-974E-4CC7-BE0E-45C1F713825B}.@......&.{29DE66C5-0EE4-538D-8A3C-09F37312DFD6}&.{114CA666-974E-4CC7-BE0E-45C1F713825B}.@......&.{29DE66C5-0EE4-538D-8A3C-09F37312DFD6}&.{00000000-0000-0000-0000-000000000000}.@......&.{BD01D325-8513-5613-A699-84601BF8EDB3}&.{114CA666-974E-4CC7-BE0E-45C1F713825B}.@......&.{BD01D325-8513-5613-A699-84601BF8EDB3}&.{00000000-0000-0000-0000-0000000000
Process:C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):0
Entropy (8bit):0.0
Encrypted:false
SSDEEP:
MD5:52A35A13FBEE36EA9BDD03038941A70C
SHA1:682F46047D6DFF83181449316FA91DF0E1600305
SHA-256:1915B0393F91AF34EF23A7E3AC1C41A62294978B1E396D7C72D50D1DFD6F4791
SHA-512:8CDC9544046F7B220E902D48AA3EE30401D3D39141229B05D25187575DD5C5596075E611DE8B1FAA642A68F2561AAF6BFDFA8B68CEF79FAEBBB155DBAC7EBFA4
Malicious:false
Reputation:unknown
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../a..N...N...N..m....N..m...N..m....N..J....N..J....N..J....N...6...N...6...N...N..O..`/..N..`/...N...N...N..`/...N..Rich.N..........................PE..L...PG.Y.....................v....................@..........................`............@.............................................|:................... ...=..Pu..T....................u......`o..@...................4........................text...g........................... ..`.rdata..`...........................@..@.data...0...........................@....wixburn8...........................@..@.tls................................@....rsrc...|:.......<..................@..@.reloc...=... ...>..................@..B................................................................................................................................................................................................
Process:C:\Users\user\AppData\Local\Temp\{F1724056-37B1-4B0D-BC4A-FDF68DC088E5}\.be\LevelUp.Integrations.TlsPatcher.Bootstrapper.exe
File Type:data
Category:dropped
Size (bytes):774
Entropy (8bit):2.2923329657201905
Encrypted:false
SSDEEP:
MD5:A28AA3B3F976E68E91F4532C37BE8240
SHA1:EF2FAA2EDC33320FC3B33B2D83252DE57F08630F
SHA-256:23626E7704DF61CC225E62934D3382A85C4A43390DDCC1FD597ED9BAAB827C47
SHA-512:9287B07D17C33E679C8BBCE9493753C9B140C8F5DB4AD7534846048F6A13884A4C2C78EFAB001F0F66E5B771EBD945DABAB2E2CC8DC147142F7A6441CCD56623
Malicious:false
Reputation:unknown
Preview:K...................................................................................................................................................................................................................................................W.i.x.B.u.n.d.l.e.F.o.r.c.e.d.R.e.s.t.a.r.t.P.a.c.k.a.g.e.....................W.i.x.B.u.n.d.l.e.L.a.s.t.U.s.e.d.S.o.u.r.c.e.............................W.i.x.B.u.n.d.l.e.N.a.m.e.........T.L.S. .P.a.t.c.h.e.r. .v.1...1...1.............W.i.x.B.u.n.d.l.e.O.r.i.g.i.n.a.l.S.o.u.r.c.e.....*...C.:.\.U.s.e.r.s.\.c.a.l.i.\.D.e.s.k.t.o.p.\.T.l.s.P.a.t.c.h.e.r.-.1...1...1...e.x.e.............W.i.x.B.u.n.d.l.e.O.r.i.g.i.n.a.l.S.o.u.r.c.e.F.o.l.d.e.r.........C.:.\.U.s.e.r.s.\.c.a.l.i.\.D.e.s.k.t.o.p.\.....................................
Process:C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe
File Type:ASCII text, with very long lines (369), with CRLF line terminators
Category:modified
Size (bytes):9299
Entropy (8bit):5.43100653391406
Encrypted:false
SSDEEP:
MD5:9D6F784A410B48692471FE2161005850
SHA1:D3450E8B87A234E519EE05618700A39B577F7E97
SHA-256:D0D46CF393B0AD26E60D82CDC6A893D9CB25589DE9170198E0600417B35703CC
SHA-512:D329B102675DF2F9F70451C596C0F4A330968E6A6E61195EB8700BE46B25A354C4A17E4CC348C6CA487A88D08840CB5664E5505492EF5FD6A7ED2A5CF140B47B
Malicious:false
Reputation:unknown
Preview:[1A18:1938][2024-10-30T01:21:47]i001: Burn v3.11.0.1701, Windows v10.0 (Build 19045: Service Pack 0), path: C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe..[1A18:1938][2024-10-30T01:21:47]i009: Command Line: '-burn.clean.room=C:\Users\user\Desktop\TlsPatcher-1.1.1.exe -burn.filehandle.attached=544 -burn.filehandle.self=536'..[1A18:1938][2024-10-30T01:21:47]i000: Setting string variable 'WixBundleOriginalSource' to value 'C:\Users\user\Desktop\TlsPatcher-1.1.1.exe'..[1A18:1938][2024-10-30T01:21:47]i000: Setting string variable 'WixBundleOriginalSourceFolder' to value 'C:\Users\user\Desktop\'..[1A18:1938][2024-10-30T01:21:47]i000: Setting string variable 'WixBundleLog' to value 'C:\Users\user\AppData\Local\Temp\TLS_Patcher_v1.1.1_20241030012147.log'..[1A18:1938][2024-10-30T01:21:47]i000: Setting string variable 'WixBundleName' to value 'TLS Patcher v1.1.1'..[1A18:1938][2024-10-30T01:21:47]i000: Setting string variable 'WixBundleManufactur
Process:C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (639), with CRLF line terminators
Category:dropped
Size (bytes):5922
Entropy (8bit):3.724738137701262
Encrypted:false
SSDEEP:
MD5:7D43513A24A9F06D7E5A729AED76AA8C
SHA1:FD552BA21023477AB6FA29766886FE21A3AFFE98
SHA-256:D8F73EFACAE0976AD9B3224929E9A71FA84452F31051541454024DEE6B25B268
SHA-512:1FF866662F9A66DEF241154B79D86ABD6AAA495E97B823BE0A47195984D107D128DEAB8F333D63D5E69788ECEC9DD3C3219D0B6697E90C7ED90A44372DD4B43F
Malicious:false
Reputation:unknown
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".u.t.f.-.1.6.".?.>.....<.B.o.o.t.s.t.r.a.p.p.e.r.A.p.p.l.i.c.a.t.i.o.n.D.a.t.a. .x.m.l.n.s.=.".h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.x./.2.0.1.0./.B.o.o.t.s.t.r.a.p.p.e.r.A.p.p.l.i.c.a.t.i.o.n.D.a.t.a.".>..... . .<.W.i.x.B.u.n.d.l.e.P.r.o.p.e.r.t.i.e.s. .D.i.s.p.l.a.y.N.a.m.e.=.".T.L.S. .P.a.t.c.h.e.r. .v.1...1...1.". .L.o.g.P.a.t.h.V.a.r.i.a.b.l.e.=.".W.i.x.B.u.n.d.l.e.L.o.g.". .C.o.m.p.r.e.s.s.e.d.=.".n.o.". .I.d.=.".{.f.e.0.f.c.2.0.b.-.f.c.4.f.-.4.2.3.3.-.9.8.e.4.-.e.3.0.9.4.0.c.5.7.0.3.c.}.". .U.p.g.r.a.d.e.C.o.d.e.=.".{.9.2.1.8.4.3.E.8.-.0.9.F.5.-.4.F.6.0.-.B.9.D.2.-.F.2.9.8.B.7.E.8.5.A.8.4.}.". .P.e.r.M.a.c.h.i.n.e.=.".y.e.s.". ./.>..... . .<.W.i.x.P.a.c.k.a.g.e.P.r.o.p.e.r.t.i.e.s. .P.a.c.k.a.g.e.=.".N.e.t.F.x.4.6.W.e.b.". .V.i.t.a.l.=.".y.e.s.". .D.i.s.p.l.a.y.N.a.m.e.=.".M.i.c.r.o.s.o.f.t. ...N.E.T. .F.r.a.m.e.w.o.r.k. .4...6.". .D.e.s.c.r.i.p.t.i.o.n.=.".M.i.c.r.o.s.o.f.t. ...N.E.T. .F.r.a.m.
Process:C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe
File Type:Rich Text Format data, version 1, ANSI, code page 1252, default language ID 1033
Category:dropped
Size (bytes):9729
Entropy (8bit):4.667736038457987
Encrypted:false
SSDEEP:
MD5:2F77829B4E38131943432F00100954E7
SHA1:8C9F134F95ED99C566955CDEAB97EFECCA17751B
SHA-256:7B13D9BD4479FFBD871EA5CD34E7DA82B23F302566D3364B62B7C4CE3592C0FE
SHA-512:9EEFDF8AD42853E8AC4F248D6CB8F793B079370C3FDAEA421660224B90751971514B6C00B9DC853EC1416A8BE8EAC6040716388BB0B4E788F911D26F53B97F74
Malicious:false
Reputation:unknown
Preview:{\rtf1\ansi\ansicpg1252\deff0\nouicompat\deflang1033{\fonttbl{\f0\fnil\fcharset0 userbri;}}..{\colortbl ;\red0\green0\blue255;}..{\*\generator Riched20 10.0.16299}\viewkind4\uc1 ..\pard\sa200\sl276\slmult1\ul\b\f0\fs22\lang9 License Agreement\par..\ulnone\b0 Copyright 2018 SCVNGR, Inc. d/b/a LevelUp\par..Licensed under the Apache License, Version 2.0 (the "License").\par..Apache License\par..Version 2.0, January 2004\par..{{\field{\*\fldinst{HYPERLINK http://www.apache.org/licenses/ }}{\fldrslt{http://www.apache.org/licenses/\ul0\cf0}}}}\f0\fs22\par..TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION\par..1. Definitions.\par.."License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document.\par.."Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.\par.."Legal Entity" shall mean the union of the acting entity and all other entities that contro
Process:C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe
File Type:PC bitmap, Windows 3.x format, 64 x 64 x 24, image size 12290, resolution 2834 x 2834 px/m, cbSize 12344, bits offset 54
Category:dropped
Size (bytes):12344
Entropy (8bit):3.5351498143481073
Encrypted:false
SSDEEP:
MD5:2DB77FD097089DF6DF35C6EED482622C
SHA1:1A4F568BDF4A25547D9965E1D4D8C046EAFAF601
SHA-256:1CACA6C6363D1EF664602163BDED7CC2C9FF5DD3F75824B49C565AF7DE716B48
SHA-512:385042F788336F723169BE5E5C4E09F55C5AEBE424C14D87F18E572FDDC09778B2FD178C97A0C71DD1F642C5D3038C9C06A8FC96E6EB4895215CB6F68EB46A43
Malicious:false
Reputation:unknown
Preview:BM80......6...(...@...@............0..................p.G.{M..M..M..M..M..M..M..M..M..M..M..M..M..M..M..M..M..M..M..M..M..M..M..M..M..M..H.{f................)..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4..4^.0.j7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o7.o1.kS...............q..........................................................`.3.l:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q4.mV...............s..........................................................`.3.l:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q4.mV...............s..........................................................`.3.l:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q:.q4.mV...............s.................................................
Process:C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4180
Entropy (8bit):5.021251704645758
Encrypted:false
SSDEEP:
MD5:5D492AF2E8C9B2AB58CA1A10248C726F
SHA1:4784F32B8A0D16D3E05B10BACEF1F840D8FACA51
SHA-256:ACCF0D8BFCEF21F5F80730D90705446FC0253174A484FD73B6523A092224322D
SHA-512:9FE13508082C974BADAB14A6B02D0A64BC8FA6FC8D7525E0746DA5A0E628304862D625F36334E9719686965422E97BDF44D97CBB380A8EA761F4E5D752001D6D
Malicious:false
Reputation:unknown
Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<WixLouserzation Culture="en-us" Language="1033" xmlns="http://schemas.microsoft.com/wix/2006/louserzation">.. <String Id="Caption">[WixBundleName] Setup</String>.. <String Id="Title">[WixBundleName]</String>.. <String Id="InstallVersion">Version [WixBundleVersion]</String>.. <String Id="ConfirmCancelMessage">Are you sure you want to cancel?</String>.. <String Id="ExecuteUpgradeRelatedBundleMessage">Previous version</String>.. <String Id="HelpHeader">Setup Help</String>.. <String Id="HelpText">/install | /repair | /uninstall | /layout [directory] - installs, repairs, uninstalls or.. creates a complete local copy of the bundle in directory. Install is the default...../passive | /quiet - displays minimal UI with no prompts or displays no U
Process:C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):8332
Entropy (8bit):5.184632608060528
Encrypted:false
SSDEEP:
MD5:F62729C6D2540015E072514226C121C7
SHA1:C1E189D693F41AC2EAFCC363F7890FC0FEA6979C
SHA-256:F13BAE0EC08C91B4A315BB2D86EE48FADE597E7A5440DCE6F751F98A3A4D6916
SHA-512:CBBFBFA7E013A2B85B78D71D32FDF65323534816978E7544CA6CEA5286A0F6E8E7E5FFC4C538200211F11B94373D5658732D5D8AA1D01F9CCFDBF20F154F1471
Malicious:false
Reputation:unknown
Preview:<?xml version="1.0" encoding="utf-8"?>.. Copyright (c) .NET Foundation and contributors. All rights reserved. Licensed under the Microsoft Reciprocal License. See LICENSE.TXT file in the project root for full license information. -->......<Theme xmlns="http://wixtoolset.org/schemas/thmutil/2010">.. <Window Width="485" Height="300" HexStyle="100a0000" FontId="0">#(loc.Caption)</Window>.. <Font Id="0" Height="-12" Weight="500" Foreground="000000" Background="FFFFFF">Segoe UI</Font>.. <Font Id="1" Height="-24" Weight="500" Foreground="000000">Segoe UI</Font>.. <Font Id="2" Height="-22" Weight="500" Foreground="666666">Segoe UI</Font>.. <Font Id="3" Height="-12" Weight="500" Foreground="000000" Background="FFFFFF">Segoe UI</Font>.. <Font Id="4" Height="-12" Weight="500" Foreground="ff0000" Background="FFFFFF" Underline="yes">Segoe UI</Font>.... <Image X="11" Y="11" Width="64" Height="64" ImageFile="logo.png" Visible="yes"/>.. <Text X="80" Y="11" Width="-11" Heig
Process:C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):179200
Entropy (8bit):6.530154771613059
Encrypted:false
SSDEEP:
MD5:6BA2E331E0F447AAFF0E8142DF5F7230
SHA1:7A3F7FB93E7BDCF04FA83B50BDE1D939B1864023
SHA-256:58A135101A2044D96F470E29369A8214C5C2ADD774488D73C6AE81A588582239
SHA-512:E137EB9F07E3B8ED03B309DD63E4FA9A4993E53B6D54C4C77AC289609811144FD66B49126B1168EBE8FA80669A765A51C1E72444D8C4DEACE091B65708D67D3B
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
  • Antivirus: Virustotal, Detection: 0%, Browse
Reputation:unknown
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............e..e..e.v.8..e.v.:..e.v.;..e.Q...e.Q...e.Q...e...J..e...Z..e..e..d.{...e.{...e.{.6..e..e^..e.{...e.Rich.e.........PE..L...UG.Y...........!......................................................................@.....................................................................8.......T...............................@...............\............................text............................... ..`.rdata..............................@..@.data...............................@....rsrc...............................@..@.reloc..8...........................@..B........................................................................................................................................................................................................................................................................................
Process:C:\Users\user\AppData\Local\Temp\{20881945-CFBC-4931-AB3C-C938DFE5C3F4}\.cr\TlsPatcher-1.1.1.exe
File Type:PE32 executable (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):568673
Entropy (8bit):7.034550317467372
Encrypted:false
SSDEEP:
MD5:52A35A13FBEE36EA9BDD03038941A70C
SHA1:682F46047D6DFF83181449316FA91DF0E1600305
SHA-256:1915B0393F91AF34EF23A7E3AC1C41A62294978B1E396D7C72D50D1DFD6F4791
SHA-512:8CDC9544046F7B220E902D48AA3EE30401D3D39141229B05D25187575DD5C5596075E611DE8B1FAA642A68F2561AAF6BFDFA8B68CEF79FAEBBB155DBAC7EBFA4
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
  • Antivirus: Virustotal, Detection: 0%, Browse
Reputation:unknown
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../a..N...N...N..m....N..m...N..m....N..J....N..J....N..J....N...6...N...6...N...N..O..`/..N..`/...N...N...N..`/...N..Rich.N..........................PE..L...PG.Y.....................v....................@..........................`............@.............................................|:................... ...=..Pu..T....................u......`o..@...................4........................text...g........................... ..`.rdata..`...........................@..@.data...0...........................@....wixburn8...........................@..@.tls................................@....rsrc...|:.......<..................@..@.reloc...=... ...>..................@..B................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: LevelUp TLS Patcher v1.1.1, Author: LevelUp, Keywords: Installer, Comments: This installer database contains the logic and data required to install LevelUp TLS Patcher v1.1.1., Template: x64;1033, Revision Number: {64FB791B-0D06-4040-84F4-E3B4AFF5A845}, Create Time/Date: Wed May 13 21:18:44 2020, Last Saved Time/Date: Wed May 13 21:18:44 2020, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.0.1701), Security: 2
Category:dropped
Size (bytes):339968
Entropy (8bit):5.633658786054681
Encrypted:false
SSDEEP:
MD5:A6C9ABEF89C6B65B9C059C45B716296F
SHA1:C27B20620A72836594DB24A0952BE3B09AC29DDA
SHA-256:4FD2C775176EB0C600AF76F595A0D8FB164B16F725FF1444EF6C6F7A8B285C0A
SHA-512:B9F8CFC78A0FA96B87E3E3E0B3B4DB881FC2F2ACA1344BE936A9C5148B73CCB682EC9D2A230BE14F6973B1469BC072DC96417E9D476048555AA75A898E202225
Malicious:false
Reputation:unknown
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Category:dropped
Size (bytes):207360
Entropy (8bit):6.573348437503042
Encrypted:false
SSDEEP:
MD5:BA84DD4E0C1408828CCC1DE09F585EDA
SHA1:E8E10065D479F8F591B9885EA8487BC673301298
SHA-256:3CFF4AC91288A0FF0C13278E73B282A64E83D089C5A61A45D483194AB336B852
SHA-512:7A38418F6EE8DBC66FAB2CD5AD8E033E761912EFC465DAA484858D451DA4B8576079FE90FD3B6640410EDC8B3CAC31C57719898134F246F4000D60A252D88290
Malicious:false
Antivirus:
  • Antivirus: ReversingLabs, Detection: 0%
  • Antivirus: Virustotal, Detection: 0%, Browse
Reputation:unknown
Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........AF../.../.../.'D..../.'D..../.'D..../...,.../...+.../...*.../......./......./.....n./.*.*.../.*./.../.*...../....../.*.-.../.Rich../.........................PE..L...pG.Y...........!.........L......&.....................................................@.................................P........P..x....................`......P...T...............................@...............<............................text...+........................... ..`.rdata..*...........................@..@.data...."... ......................@....rsrc...x....P......................@..@.reloc.......`......................@..B........................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:data
Category:dropped
Size (bytes):4385
Entropy (8bit):5.648505543910054
Encrypted:false
SSDEEP:
MD5:D6E0ACF03947DD478C6DAB052602F58A
SHA1:89CC57F5EDD72C118495BFFDE8F4D13028F966F5
SHA-256:F3202D40393F9AB280D1089B7A9382C25E07C0C9456721C53143D94A87553C4F
SHA-512:28EB6CEF1665A031D47A5C95D7F8FBCA29174D887F699655D208BD50294848008A3710506BF4A26509507C444E817B96992AE4EFACBFDF7AA738556B7ABE3527
Malicious:false
Reputation:unknown
Preview:...@IXOS.@.....@..^Y.@.....@.....@.....@.....@.....@......&.{114CA666-974E-4CC7-BE0E-45C1F713825B}..LevelUp TLS Patcher v1.1.17.LevelUp.Integrations.TlsPatcher.Installer-1.1.1_x64.msi.@.....@.....@.....@........&.{64FB791B-0D06-4040-84F4-E3B4AFF5A845}.....@.....@.....@.....@.......@.....@.....@.......@......LevelUp TLS Patcher v1.1.1......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{C27227B8-F9AB-57BB-858E-3538D043481D}&.02:\SOFTWARE\LevelUp\TlsPatcherVersion.@.......@.....@.....@......&.{701C99F0-E37A-511E-958A-455B2897E080}&.22:\SOFTWARE\LevelUp\TlsPatcherVersion.@.......@.....@.....@......&.{29DE66C5-0EE4-538D-8A3C-09F37312DFD6}`.22:\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.2\Client\Enabled.@.......@.....@.....@...........@....&.{00000000-0000-0000-0000-000000000000}.@.....@.....@......&.{BD01D325-8513-5613-A699-
Process:C:\Windows\System32\msiexec.exe
File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
Category:dropped
Size (bytes):454234
Entropy (8bit):5.356155832470658
Encrypted:false
SSDEEP:
MD5:68A260461EDE07A81DDE9669EE561D61
SHA1:0541D5BFC3E04FC798F153F64CD17D38D24A5E2C
SHA-256:FF2007479AF78CEACBAA883F93C624C4C7B8E58D562289F1E569E5B00B43284F
SHA-512:7A4D1CD55AE92A925B3537F00C1CFB7277EF0A73823227BBCF58727206581720CEE1A2BFFE1B4BB8C14A49C608B6FEA78C79AF387FBD108E92AE18AC5C1EE70B
Malicious:false
Reputation:unknown
Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
Process:C:\Windows\System32\msiexec.exe
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):32768
Entropy (8bit):1.351756150763117
Encrypted:false
SSDEEP:
MD5:1CA81449E2B2A79D2922EE61EA08B8E7
SHA1:1EDE7E02013B57A98076400E111339BBD4B71FEB
SHA-256:F9300EB0A9A8D36C3AF3E4E96A9BCB9A4F65CC9923D15AEAFB8B23FE4851E6BB
SHA-512:3BB6A3C56BFBAA1FEAD91521D48BE9F1E84FAB25D3D576EDEB63E138544EA6D8FF3FF0EF5973D9159DC7CF4E5ED63CC88D90F30D0B90CB31F4E414C449710CAF
Malicious:false
Reputation:unknown
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\msiexec.exe
File Type:data
Category:dropped
Size (bytes):512
Entropy (8bit):0.0
Encrypted:false
SSDEEP:
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
Malicious:false
Reputation:unknown
Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.460412984327442
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:TlsPatcher-1.1.1.exe
File size:806'476 bytes
MD5:fdeac4be6f9e9154d54956760c3f0f58
SHA1:b706a826fbfdf577e5806927d43fb7d9138093e6
SHA256:7a16eee0bac29b88ad46a147dcad633860e81541538d91cc0e397b5d6b5986fe
SHA512:de39889967f3d46046422fd49c1f5cd81c47592c21dfe1fcff35470a4e5644fab45345fe71aebd1c0f8602bdb56b4473659c9280e1233951016052875d06541d
SSDEEP:12288:u79g/k9Ygb25zyaaEqrHqm/AoPd7yksBdD+m1YBQuM+i1pdcfl:agwYgb25FJsqIAkV7svDxuS13Ul
TLSH:8805BF3195614032E6F106B3BD28A2303E7CE328175489AEE7D8ED1D7EB84916BF7257
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......../a..N...N...N..m....N..m....N..m....N..J....N..J....N..J....N...6...N...6...N...N...O..`/...N..`/...N...N...N..`/...N..Rich.N.
Icon Hash:2d2e3797b32b2b99
Entrypoint:0x42e1fd
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, REMOVABLE_RUN_FROM_SWAP, NET_RUN_FROM_SWAP
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x59074750 [Mon May 1 14:33:52 2017 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:945b38293d63de197023e59f28a06bb8
Instruction
call 00007F12D104C9F6h
jmp 00007F12D104C383h
int3
int3
int3
int3
int3
int3
int3
int3
int3
mov eax, dword ptr [esp+08h]
mov ecx, dword ptr [esp+10h]
or ecx, eax
mov ecx, dword ptr [esp+0Ch]
jne 00007F12D104C4FBh
mov eax, dword ptr [esp+04h]
mul ecx
retn 0010h
push ebx
mul ecx
mov ebx, eax
mov eax, dword ptr [esp+08h]
mul dword ptr [esp+14h]
add ebx, eax
mov eax, dword ptr [esp+08h]
mul ecx
add edx, ebx
pop ebx
retn 0010h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
cmp cl, 00000040h
jnc 00007F12D104C507h
cmp cl, 00000020h
jnc 00007F12D104C4F8h
shrd eax, edx, cl
shr edx, cl
ret
mov eax, edx
xor edx, edx
and cl, 0000001Fh
shr eax, cl
ret
xor eax, eax
xor edx, edx
ret
push ebp
mov ebp, esp
jmp 00007F12D104C511h
push dword ptr [ebp+08h]
call 00007F12D1052F66h
pop ecx
test eax, eax
jne 00007F12D104C504h
cmp dword ptr [ebp+08h], FFFFFFFFh
jne 00007F12D104C4F9h
call 00007F12D104CE11h
jmp 00007F12D104C4F7h
call 00007F12D104CDEDh
push dword ptr [ebp+08h]
call 00007F12D1052FDDh
pop ecx
test eax, eax
je 00007F12D104C4C6h
pop ebp
ret
push ebp
mov ebp, esp
push dword ptr [ebp+08h]
call 00007F12D104CE1Ah
pop ecx
pop ebp
ret
push ebp
mov ebp, esp
test byte ptr [ebp+08h], 00000001h
push esi
mov esi, ecx
mov dword ptr [esi], 00460CE8h
je 00007F12D104C4FCh
push 0000000Ch
Programming Language:
  • [ C ] VS2008 SP1 build 30729
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x685b40xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x6e0000x3a7c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x720000x3dec.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x675500x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x675a40x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x66f600x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x4b0000x3e0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x681340x100.rdata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x49a670x49c00a67b51c27aac0c4dfc083827d24d4658False0.5307567531779661data6.562821923349037IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x4b0000x1ec600x1ee00119b8fb4aff26bdb2b70951b3ce2b221False0.3131642206477733data5.108405897376974IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x6a0000x17300xa007dfb613b52fd85bf38fe5b511a5c8a45False0.273828125firmware 2005 v9319 (revision 0) \261\031\277DN\346@\273 V2, 0 bytes or less, UNKNOWN2 0xffffffff, at 0 0 bytes , at 0 0 bytes , at 0x20a146003.1545761028353714IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.wixburn0x6c0000x380x200843ae5cb9611d7788c06d425ef453ae0False0.107421875data0.5813091016060967IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tls0x6d0000x90x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x6e0000x3a7c0x3c0026115f13dc7924bb188c71ad777c74b4False0.3317057291666667data5.532199701906671IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x720000x3dec0x3e0064b4055db26d6e5c21cfca5abb774e9eFalse0.8085307459677419data6.790256745431247IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x6e1780x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.43185920577617326
RT_MESSAGETABLE0x6ea200x2840dataEnglishUnited States0.28823757763975155
RT_GROUP_ICON0x712600x14dataEnglishUnited States1.15
RT_VERSION0x712740x334dataEnglishUnited States0.4451219512195122
RT_MANIFEST0x715a80x4d2XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1174), with CRLF line terminatorsEnglishUnited States0.47568881685575365
DLLImport
ADVAPI32.dllRegCloseKey, RegOpenKeyExW, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueW, InitiateSystemShutdownExW, GetUserNameW, RegQueryValueExW, RegDeleteValueW, CloseEventLog, OpenEventLogW, ReportEventW, ConvertStringSecurityDescriptorToSecurityDescriptorW, DecryptFileW, CreateWellKnownSid, InitializeAcl, SetEntriesInAclW, ChangeServiceConfigW, CloseServiceHandle, ControlService, OpenSCManagerW, OpenServiceW, QueryServiceStatus, SetNamedSecurityInfoW, CheckTokenMembership, AllocateAndInitializeSid, SetEntriesInAclA, SetSecurityDescriptorGroup, SetSecurityDescriptorOwner, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, RegSetValueExW, RegQueryInfoKeyW, RegEnumValueW, RegEnumKeyExW, RegDeleteKeyW, RegCreateKeyExW, GetTokenInformation, CryptDestroyHash, CryptHashData, CryptCreateHash, CryptGetHashParam, CryptReleaseContext, CryptAcquireContextW, QueryServiceConfigW
USER32.dllGetMessageW, PostMessageW, IsWindow, WaitForInputIdle, PostQuitMessage, PeekMessageW, MsgWaitForMultipleObjects, PostThreadMessageW, GetMonitorInfoW, MonitorFromPoint, IsDialogMessageW, LoadCursorW, LoadBitmapW, SetWindowLongW, GetWindowLongW, GetCursorPos, MessageBoxW, CreateWindowExW, UnregisterClassW, RegisterClassW, DefWindowProcW, DispatchMessageW, TranslateMessage
OLEAUT32.dllSysFreeString, SysAllocString, VariantInit, VariantClear
GDI32.dllCreateCompatibleDC, DeleteObject, SelectObject, StretchBlt, GetObjectW, DeleteDC
SHELL32.dllSHGetFolderPathW, CommandLineToArgvW, ShellExecuteExW
ole32.dllCoUninitialize, CoInitializeEx, CoInitialize, StringFromGUID2, CoCreateInstance, CoTaskMemFree, CoInitializeSecurity, CLSIDFromProgID
KERNEL32.dllGetCommandLineA, GetCPInfo, GetOEMCP, CloseHandle, CreateFileW, GetProcAddress, LocalFree, HeapSetInformation, GetLastError, GetModuleHandleW, FormatMessageW, lstrlenA, lstrlenW, MultiByteToWideChar, WideCharToMultiByte, LCMapStringW, Sleep, GetLocalTime, GetModuleFileNameW, ExpandEnvironmentStringsW, GetTempPathW, GetTempFileNameW, CreateDirectoryW, GetFullPathNameW, CompareStringW, GetCurrentProcessId, WriteFile, SetFilePointer, LoadLibraryW, GetSystemDirectoryW, CreateFileA, HeapAlloc, HeapReAlloc, HeapFree, HeapSize, GetProcessHeap, FindClose, GetCommandLineW, GetCurrentDirectoryW, RemoveDirectoryW, SetFileAttributesW, GetFileAttributesW, DeleteFileW, FindFirstFileW, FindNextFileW, MoveFileExW, GetCurrentProcess, GetCurrentThreadId, InitializeCriticalSection, DeleteCriticalSection, ReleaseMutex, TlsAlloc, GetEnvironmentStringsW, TlsSetValue, TlsFree, CreateProcessW, GetVersionExW, VerSetConditionMask, FreeLibrary, EnterCriticalSection, LeaveCriticalSection, GetSystemTime, GetNativeSystemInfo, GetModuleHandleExW, GetWindowsDirectoryW, GetSystemWow64DirectoryW, GetComputerNameW, VerifyVersionInfoW, GetVolumePathNameW, GetDateFormatW, GetUserDefaultUILanguage, GetSystemDefaultLangID, GetUserDefaultLangID, GetStringTypeW, ReadFile, SetFilePointerEx, DuplicateHandle, InterlockedExchange, InterlockedCompareExchange, LoadLibraryExW, CreateEventW, ProcessIdToSessionId, OpenProcess, GetProcessId, WaitForSingleObject, ConnectNamedPipe, SetNamedPipeHandleState, CreateNamedPipeW, CreateThread, GetExitCodeThread, SetEvent, WaitForMultipleObjects, InterlockedIncrement, InterlockedDecrement, ResetEvent, SetEndOfFile, SetFileTime, LocalFileTimeToFileTime, DosDateTimeToFileTime, CompareStringA, GetExitCodeProcess, SetThreadExecutionState, CopyFileExW, MapViewOfFile, UnmapViewOfFile, CreateMutexW, CreateFileMappingW, GetThreadLocale, IsValidCodePage, FreeEnvironmentStringsW, TlsGetValue, SetStdHandle, GetConsoleCP, GetConsoleMode, FlushFileBuffers, DecodePointer, WriteConsoleW, GetModuleHandleA, GlobalAlloc, GlobalFree, GetFileSizeEx, CopyFileW, VirtualAlloc, VirtualFree, SystemTimeToTzSpecificLocalTime, GetTimeZoneInformation, SystemTimeToFileTime, GetSystemInfo, VirtualProtect, VirtualQuery, SetCurrentDirectoryW, FindFirstFileExW, GetFileType, GetACP, ExitProcess, GetStdHandle, InitializeCriticalSectionAndSpinCount, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, RaiseException, RtlUnwind, LoadLibraryExA
RPCRT4.dllUuidCreate
Language of compilation systemCountry where language is spokenMap
EnglishUnited States