File name:

WifiAutoInstall.zip

Full analysis: https://app.any.run/tasks/bfbba583-9bf7-4124-b784-7e200519428e
Verdict: Malicious activity
Analysis date: December 09, 2024, 18:05:51
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

B35507076D30C363C41AE2FDE617BCAB

SHA1:

803E6853AD5FE7B5BCC108D019BF8C8D20D76E33

SHA256:

643C1D74B0453159827E0835E9769FDD8C3B82F22A0771E408A48D83332BBD33

SSDEEP:

196608:GDd+IgXAxnA4AN3qCbIRThDEHQfyeZUKIG:I1gQxA4ANHIRpEHQfEG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 3612)
    • Antivirus name has been found in the command line (generic signature)

      • MpCmdRun.exe (PID: 848)
  • SUSPICIOUS

    • Uses ICACLS.EXE to modify access control lists

      • cmd.exe (PID: 3552)
      • cmd.exe (PID: 2424)
      • cmd.exe (PID: 1344)
      • cmd.exe (PID: 5868)
    • The process executes VB scripts

      • cmd.exe (PID: 3552)
      • cmd.exe (PID: 1344)
    • Executing commands from a ".bat" file

      • wscript.exe (PID: 5256)
      • wscript.exe (PID: 5592)
      • WinRAR.exe (PID: 3612)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 5256)
      • wscript.exe (PID: 5592)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 5256)
      • WinRAR.exe (PID: 3612)
      • wscript.exe (PID: 5592)
    • Reads security settings of Internet Explorer

      • WifiAutoInstallSrv.exe (PID: 5040)
      • WifiAutoInstallDriver.exe (PID: 3420)
      • WifiAutoInstallDriver.exe (PID: 2136)
      • WinRAR.exe (PID: 3612)
    • Application launched itself

      • WifiAutoInstallDriver.exe (PID: 3420)
      • WifiAutoInstallSrv.exe (PID: 5040)
      • WifiAutoInstallDriver.exe (PID: 2136)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 2424)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 2424)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 3612)
    • Drops a system driver (possible attempt to evade defenses)

      • WinRAR.exe (PID: 3612)
    • Executable content was dropped or overwritten

      • xcopy.exe (PID: 5548)
  • INFO

    • Create files in a temporary directory

      • xcopy.exe (PID: 5572)
      • xcopy.exe (PID: 5548)
    • Manual execution by a user

      • cmd.exe (PID: 3552)
      • WifiAutoInstallSrv.exe (PID: 5040)
      • WifiAutoInstallDriver.exe (PID: 3420)
      • WifiAutoInstallDriver.exe (PID: 2136)
      • cmd.exe (PID: 1344)
      • RtkBtManServ.exe (PID: 3816)
      • RTUWPSrvcMain.exe (PID: 5576)
      • RTUWPSrvcMain.exe (PID: 3260)
      • RtkBtManServ.exe (PID: 5092)
    • Sends debugging messages

      • WifiAutoInstallSrv.exe (PID: 5040)
      • WifiAutoInstallSrv.exe (PID: 5252)
      • WifiAutoInstallDriver.exe (PID: 3420)
      • WifiAutoInstallDriver.exe (PID: 4824)
      • WifiAutoInstallDriver.exe (PID: 4204)
      • WifiAutoInstallDriver.exe (PID: 2136)
      • RtkBtManServ.exe (PID: 3816)
    • Checks supported languages

      • WifiAutoInstallSrv.exe (PID: 5040)
      • WifiAutoInstallDriver.exe (PID: 3420)
      • WifiAutoInstallSrv.exe (PID: 5252)
      • WifiAutoInstallDriver.exe (PID: 4204)
      • RtkBtManServ.exe (PID: 3816)
      • WifiAutoInstallDriver.exe (PID: 4824)
      • RtkBtManServ.exe (PID: 5092)
    • Reads the computer name

      • WifiAutoInstallSrv.exe (PID: 5040)
      • WifiAutoInstallSrv.exe (PID: 5252)
      • WifiAutoInstallDriver.exe (PID: 3420)
      • WifiAutoInstallDriver.exe (PID: 2136)
      • RtkBtManServ.exe (PID: 3816)
      • RtkBtManServ.exe (PID: 5092)
      • MpCmdRun.exe (PID: 848)
    • The process uses the downloaded file

      • WifiAutoInstallDriver.exe (PID: 3420)
      • WifiAutoInstallSrv.exe (PID: 5040)
      • WifiAutoInstallDriver.exe (PID: 2136)
      • wscript.exe (PID: 5592)
      • WinRAR.exe (PID: 3612)
    • Process checks computer location settings

      • WifiAutoInstallDriver.exe (PID: 3420)
      • WifiAutoInstallSrv.exe (PID: 5040)
    • Creates files in the program directory

      • RtkBtManServ.exe (PID: 5092)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.xpi | Mozilla Firefox browser extension (66.6)
.zip | ZIP compressed archive (33.3)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0002
ZipCompression: None
ZipModifyDate: 2024:12:09 18:46:16
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: WifiAutoInstall/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
165
Monitored processes
43
Malicious processes
2
Suspicious processes
4

Behavior graph

Click at the process to see the details
start winrar.exe cmd.exe no specs conhost.exe no specs cacls.exe no specs xcopy.exe no specs wscript.exe no specs wifiautoinstallsrv.exe conhost.exe no specs cmd.exe conhost.exe no specs cacls.exe no specs sc.exe no specs sc.exe no specs ping.exe no specs wifiautoinstallsrv.exe conhost.exe no specs wifiautoinstalldriver.exe conhost.exe no specs wifiautoinstalldriver.exe conhost.exe no specs rtuwpsrvcmain.exe no specs rtuwpsrvcmain.exe conhost.exe no specs wifiautoinstalldriver.exe conhost.exe no specs wifiautoinstalldriver.exe conhost.exe no specs rtkbtmanserv.exe conhost.exe no specs cmd.exe no specs conhost.exe no specs cacls.exe no specs xcopy.exe wscript.exe no specs cmd.exe conhost.exe no specs cacls.exe no specs xcopy.exe no specs rtkbtmanserv.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs mpcmdrun.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
732\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWifiAutoInstallSrv.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
836ping -n 3 127.0.0.1C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\nsi.dll
836\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeRtkBtManServ.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
848"C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\Users\admin\AppData\Local\Temp\Rar$VR3612.45969"C:\Program Files\Windows Defender\MpCmdRun.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Malware Protection Command Line Utility
Exit code:
2
Version:
4.18.1909.6 (WinBuild.160101.0800)
Modules
Images
c:\program files\windows defender\mpcmdrun.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
1344C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\install.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
1944\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeRTUWPSrvcMain.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2136sc delete RtkBtManServC:\Windows\System32\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
1060
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
2136"C:\Users\admin\Desktop\WifiAutoInstallDriver.exe" C:\Users\admin\Desktop\WifiAutoInstallDriver.exe
explorer.exe
User:
admin
Company:
Realtek
Integrity Level:
MEDIUM
Description:
WifiAutoInstall
Exit code:
1
Version:
2.0.1.0
Modules
Images
c:\users\admin\desktop\wifiautoinstalldriver.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\difxapi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2160"C:\WINDOWS\system32\cacls.exe" "C:\WINDOWS\system32\config\system"C:\Windows\System32\cacls.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Control ACLs Program
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ucrtbase.dll
2160"C:\WINDOWS\system32\cacls.exe" "C:\WINDOWS\system32\config\system"C:\Windows\System32\cacls.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Control ACLs Program
Exit code:
5
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ucrtbase.dll
Total events
5 228
Read events
5 217
Write events
11
Delete events
0

Modification events

(PID) Process:(3612) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(3612) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(3612) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(3612) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\WifiAutoInstall.zip
(PID) Process:(3612) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3612) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3612) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3612) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3552) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
(PID) Process:(1344) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
Executable files
31
Suspicious files
14
Text files
21
Unknown types
0

Dropped files

PID
Process
Filename
Type
5548xcopy.exeC:\Users\admin\AppData\Local\Temp\Bluetooth\install.battext
MD5:24A495CD48FF2106B9F73E453195DE94
SHA256:5F5BE22EC35CB4D90BDF61A39CF0FFE755948673245345D23C204DC00DFB0189
5572xcopy.exeC:\Users\admin\AppData\Local\Temp\Bluetooth\germanfashion.rtftext
MD5:4B01EE976F512265903C9C92DD70EE2A
SHA256:9B8C2C0FB741577D856B04FD1A8AF89713A0F220CA773EF8E510D78BF931AB20
5572xcopy.exeC:\Users\admin\AppData\Local\Temp\Bluetooth\lightllc.rtftext
MD5:FF7E13B06FE437C51E27E82C6C5D930F
SHA256:2071ACDBCF45D7BCF90263C0F39C45A7A4E58812374E4DFB412F83DDE4EAEE59
5572xcopy.exeC:\Users\admin\AppData\Local\Temp\Bluetooth\WifiAutoInstall.zipcompressed
MD5:B35507076D30C363C41AE2FDE617BCAB
SHA256:643C1D74B0453159827E0835E9769FDD8C3B82F22A0771E408A48D83332BBD33
5572xcopy.exeC:\Users\admin\AppData\Local\Temp\Bluetooth\lowdelivery.rtftext
MD5:1B2C06424AE1775B7AF22C0D7AD4A7FA
SHA256:B6E9560107AAD03C8DAFCD9378EDC289E4676A8F39C31CD47462FF253F36684B
5572xcopy.exeC:\Users\admin\AppData\Local\Temp\Bluetooth\staffmode.pngimage
MD5:E1BF4772FA6F174195166421408B027E
SHA256:22C05AC88AACD9B4654EDA1EDFA83EA0D2F142B2F4F74E040E04CC672AB8DA15
5572xcopy.exeC:\Users\admin\AppData\Local\Temp\Bluetooth\lstandard.rtftext
MD5:485FA430F43993D514DABF0A68C9B8E9
SHA256:9F1EB49DECD08186CA9ABF9D861C034444CE236DF9C19830CFCDD3576D1378AC
5040WifiAutoInstallSrv.exeC:\Users\admin\Desktop\WifiAutoInstall.logtext
MD5:07D4D7A988767225BEEB508C0FC1150B
SHA256:354F31BAD4DC3CEC38F0128ACAF294DD07A9FBB6FBA689EAC4E1371820057D11
5572xcopy.exeC:\Users\admin\AppData\Local\Temp\Bluetooth\uninstall.battext
MD5:C1E066A26EC6A8EB95433E6B32E0A3AE
SHA256:3A34D6077BDB4AC0776B8AFF6B0B7C83FD9BE312B63977F49D57E72D6509DEDE
3552cmd.exeC:\Users\admin\AppData\Local\Temp\getadmin.vbstext
MD5:D14A6C18536B08C2D91CC10129CEC2CA
SHA256:88F0E55BE41422957E8F4FEC8CAF0F9ED4E68D1F0290171BA8F4BD26C19FA17D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
19
DNS requests
6
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
448
svchost.exe
GET
200
2.16.164.96:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.96:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
448
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
448
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
448
svchost.exe
2.16.164.96:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.96:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
448
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 2.16.164.96
  • 2.16.164.17
  • 2.16.164.42
  • 2.16.164.19
  • 2.16.164.8
  • 2.16.164.67
  • 2.16.164.24
  • 2.16.164.99
  • 2.16.164.112
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
self.events.data.microsoft.com
  • 52.168.117.171
whitelisted

Threats

No threats detected
Process
Message
WifiAutoInstallSrv.exe
Retry run C:\Users\admin\Desktop\WifiAutoInstallSrv.exe
WifiAutoInstallSrv.exe
sei.lpParameters = (null)
WifiAutoInstallSrv.exe
_tmain() Option =
WifiAutoInstallDriver.exe
sei.lpParameters = (null)
WifiAutoInstallDriver.exe
Retry run C:\Users\admin\Desktop\WifiAutoInstallDriver.exe
WifiAutoInstallDriver.exe
_tmain() Option =
WifiAutoInstallDriver.exe
sei.lpParameters = (null)
WifiAutoInstallDriver.exe
Retry run C:\Users\admin\Desktop\WifiAutoInstallDriver.exe
WifiAutoInstallDriver.exe
_tmain() Option =
RtkBtManServ.exe
_tfopen , GetLastError=0x0