Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RDM_Root_Cert_Update_Windows.exe

Overview

General Information

Sample name:RDM_Root_Cert_Update_Windows.exe
Analysis ID:1500637
MD5:d4b2995d38da119e5b0db2cb90778224
SHA1:2570198aafaf5d6f394ffd6e7e741c2316510ee0
SHA256:05a6215fbf82c755b73dcfa297f229bf5b88c879b4a7a2edf680ebd97a4580ad
Infos:

Detection

Score:26
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Installs new ROOT certificates
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Creates a process in suspended mode (likely to inject code)
Drops PE files
Drops certificate files (DER)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses net.exe to stop services

Classification

  • System is w10x64
  • RDM_Root_Cert_Update_Windows.exe (PID: 7420 cmdline: "C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe" MD5: D4B2995D38DA119E5B0DB2CB90778224)
    • RDM_Root_Cert_Update_Windows.tmp (PID: 7436 cmdline: "C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$1044E,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe" MD5: A5388235BBD3513D95A2A5C172A55680)
      • RDM_ROOTCERTIFICATE.exe (PID: 7512 cmdline: "C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT MD5: 5DAEC5D62A1B06418E5EAE25B7857748)
        • RDM_ROOTCERTIFICATE.tmp (PID: 7528 cmdline: "C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp" /SL5="$104B6,1902883,887296,C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT MD5: 05CB53C8116FA798AB00B737F7B94015)
          • cmd.exe (PID: 7544 cmdline: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/certremoval.bat"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 7552 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • cmd.exe (PID: 7596 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo 1 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • certmgr.exe (PID: 7604 cmdline: CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root MD5: 5D077A0CDD077C014EEDB768FEB249BA)
            • certmgr.exe (PID: 7628 cmdline: CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root MD5: 5D077A0CDD077C014EEDB768FEB249BA)
          • certmgr.exe (PID: 7648 cmdline: "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/CertMgr.exe" -add -c RDM_RootCA.pem -s -r localmachine Root MD5: 5D077A0CDD077C014EEDB768FEB249BA)
            • conhost.exe (PID: 7656 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 7704 cmdline: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/AddCert.bat" "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\RDM_RootCA.pem"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 7712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • cmd.exe (PID: 7756 cmdline: C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • certutil.exe (PID: 7772 cmdline: certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\." -i "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\RDM_RootCA.pem" MD5: 0DDA4F16AE041578B4E250AE12E06EB1)
          • certutil.exe (PID: 7788 cmdline: "C:\Windows\system32/certutil.exe" f p rdm736 importpfx "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\rdm.pfx" MD5: 0DDA4F16AE041578B4E250AE12E06EB1)
            • conhost.exe (PID: 7796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • net.exe (PID: 7856 cmdline: "C:\Windows\system32\net.exe" stop "RDMAppweb" MD5: 31890A7DE89936F922D44D677F681A7F)
        • conhost.exe (PID: 7864 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • net1.exe (PID: 7904 cmdline: C:\Windows\system32\net1 stop "RDMAppweb" MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
      • net.exe (PID: 7940 cmdline: "C:\Windows\system32\net.exe" stop "Embedthis Rdmappweb" MD5: 31890A7DE89936F922D44D677F681A7F)
        • conhost.exe (PID: 7948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • net1.exe (PID: 7984 cmdline: C:\Windows\system32\net1 stop "Embedthis Rdmappweb" MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
      • net.exe (PID: 8000 cmdline: "C:\Windows\system32\net.exe" start "RDMAppweb" MD5: 31890A7DE89936F922D44D677F681A7F)
        • conhost.exe (PID: 8008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • net1.exe (PID: 8052 cmdline: C:\Windows\system32\net1 start "RDMAppweb" MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
      • net.exe (PID: 8072 cmdline: "C:\Windows\system32\net.exe" start "Embedthis Rdmappweb" MD5: 31890A7DE89936F922D44D677F681A7F)
        • conhost.exe (PID: 8080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • net1.exe (PID: 8128 cmdline: C:\Windows\system32\net1 start "Embedthis Rdmappweb" MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/certremoval.bat"", CommandLine: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/certremoval.bat"", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp" /SL5="$104B6,1902883,887296,C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT, ParentImage: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp, ParentProcessId: 7528, ParentProcessName: RDM_ROOTCERTIFICATE.tmp, ProcessCommandLine: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/certremoval.bat"", ProcessId: 7544, ProcessName: cmd.exe
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/certremoval.bat"", CommandLine: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/certremoval.bat"", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp" /SL5="$104B6,1902883,887296,C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT, ParentImage: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp, ParentProcessId: 7528, ParentProcessName: RDM_ROOTCERTIFICATE.tmp, ProcessCommandLine: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/certremoval.bat"", ProcessId: 7544, ProcessName: cmd.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*", CommandLine: C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/AddCert.bat" "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\RDM_RootCA.pem"", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7704, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*", ProcessId: 7756, ProcessName: cmd.exe
Source: Process startedAuthor: Michael Haag, Mark Woan (improvements), James Pemberton / @4A616D6573 / oscd.community (improvements): Data: Command: "C:\Windows\system32\net.exe" stop "RDMAppweb", CommandLine: "C:\Windows\system32\net.exe" stop "RDMAppweb", CommandLine|base64offset|contains: ), Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$1044E,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp, ParentProcessId: 7436, ParentProcessName: RDM_Root_Cert_Update_Windows.tmp, ProcessCommandLine: "C:\Windows\system32\net.exe" stop "RDMAppweb", ProcessId: 7856, ProcessName: net.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: "C:\Windows\system32\net.exe" start "RDMAppweb", CommandLine: "C:\Windows\system32\net.exe" start "RDMAppweb", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$1044E,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp, ParentProcessId: 7436, ParentProcessName: RDM_Root_Cert_Update_Windows.tmp, ProcessCommandLine: "C:\Windows\system32\net.exe" start "RDMAppweb", ProcessId: 8000, ProcessName: net.exe
Source: Process startedAuthor: Jakob Weinzettl, oscd.community, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\net.exe" stop "RDMAppweb", CommandLine: "C:\Windows\system32\net.exe" stop "RDMAppweb", CommandLine|base64offset|contains: ), Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$1044E,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp, ParentProcessId: 7436, ParentProcessName: RDM_Root_Cert_Update_Windows.tmp, ProcessCommandLine: "C:\Windows\system32\net.exe" stop "RDMAppweb", ProcessId: 7856, ProcessName: net.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_0100197F CryptMsgClose,CertCloseStore,7_2_0100197F
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_01001AD0 GetModuleHandleA,CryptInitOIDFunctionSet,CryptInstallOIDFunctionAddress,CryptRegisterOIDInfo,7_2_01001AD0
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_01006F21 CryptDecodeObject,printf,7_2_01006F21
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_0100812A CryptFindOIDInfo,7_2_0100812A
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_01007E5A CryptFindOIDInfo,7_2_01007E5A
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_01001965 CryptMsgClose,CertCloseStore,7_2_01001965
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_01008168 CryptFindOIDInfo,7_2_01008168
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_0100826B CryptDecodeObject,CryptDecodeObject,CryptDecodeObject,7_2_0100826B
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_01008186 CryptMsgGetParam,CryptMsgGetParam,CryptMsgGetParam,7_2_01008186
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_010052A5 CertOpenStore,CryptSIPRetrieveSubjectGuid,CryptSIPLoad,CertOpenStore,CryptMsgOpenToDecode,CertCloseStore,CryptMsgUpdate,CertCloseStore,CryptMsgClose,7_2_010052A5
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_01006FB3 CryptDecodeObject,printf,7_2_01006FB3
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_010018CB CryptMsgClose,CertCloseStore,7_2_010018CB
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_010050E8 CryptMsgGetAndVerifySigner,CertFreeCTLContext,7_2_010050E8
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_010076EB CryptDecodeObject,printf,printf,printf,7_2_010076EB
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_010037EC strtok,strtok,CryptEncodeObject,CryptEncodeObject,CryptEncodeObject,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertSetCertificateContextProperty,CertSetCertificateContextProperty,CertSetCertificateContextProperty,CertEnumCertificatesInStore,CertFreeCTLContext,7_2_010037EC
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_01007FF1 CryptGetOIDFunctionAddress,wprintf,CryptFreeOIDFunctionAddress,7_2_01007FF1
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_010045F3 CryptHashPublicKeyInfo,CryptReleaseContext,CertGetCertificateContextProperty,printf,printf,printf,CertGetPublicKeyLength,printf,printf,printf,7_2_010045F3
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDirectory created: C:\Program Files\Mozilla Firefox\defaults\pref\is-JJ6M4.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDirectory created: C:\Program Files\Mozilla Firefox\defaults\pref\is-29CV0.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDirectory created: C:\Program Files\Mozilla Firefox\is-HUELK.tmpJump to behavior
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: certificate valid
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://acedicom.edicomgroup.com/doc0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://ca.disig.sk/ca/crl/ca_disig.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://cps.chambersign.org/cps/chambersignroot.html0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.chambersign.org/chambersignroot.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.comodoca.com/SecureCertificateServices.crl09
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.comodoca.com/TrustedCertificateServices.crl0:
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.geotrust.com/crls/globalca1.crl0
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0V
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://crl.globalsign.com/gsgccr45codesignca2020.crl0
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.oces.certifikat.dk/oces.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.pki.wellsfargo.com/wsprca.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.securetrust.com/STCA.crl0
Source: certutil.exe, 0000000F.00000002.1885386211.00000000032BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.veris
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignCA.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://ocsp.comodoca.com0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://ocsp.comodoca.com0%
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://ocsp.comodoca.com0-
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://ocsp.comodoca.com0/
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://ocsp.comodoca.com05
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://ocsp.entrust.net03
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://ocsp.entrust.net0D
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45codesignca20200V
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://ocsp.globalsign.com/rootr30;
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://ocsp.pki.gva.es0
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://policy.camerfirma.com0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://repository.swisssign.com/0
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45codesignca2020.crt0=
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.certicamara.com/dpc/0Z
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.certifikat.dk/repository0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
Source: is-6P8G2.tmp.3.drString found in binary or memory: http://www.chambersign.org1
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.disig.sk/ca/crl/ca_disig.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.disig.sk/ca0f
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.e-szigno.hu/RootCA.crl
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.e-szigno.hu/RootCA.crt0
Source: is-6P8G2.tmp.3.drString found in binary or memory: http://www.e-szigno.hu/SZSZ/0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.entrust.net/CRL/net1.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.firmaprofesional.com/cps0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.firmaprofesional.com0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-EMD50.tmp.3.dr, is-HQ20L.tmp.3.dr, is-NPANL.tmp.3.drString found in binary or memory: http://www.mozilla.org/MPL/
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-EMD50.tmp.3.dr, is-HQ20L.tmp.3.dr, is-NPANL.tmp.3.drString found in binary or memory: http://www.mozilla.org/MPL/Copyright
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.phreedom.org/md5)
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.phreedom.org/md5)0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.phreedom.org/md5)MD5
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.pki.gva.es/cps0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.pki.gva.es/cps0%
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy-G20
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.quovadis.bm0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.quovadisglobal.com/cps0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1871419884.00000000034B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.rdmcorp.com
Source: RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.1941838091.00000000022E3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.rdmcorp.comQ6.
Source: RDM_ROOTCERTIFICATE.exe, 00000002.00000003.1890953766.000000000231C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.rdmcorp.coma
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.sk.ee/cps/0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.sk.ee/juur/crl/0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.trustdst.com/certificates/policy/ACES-index.html0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.valicert.com/1
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: http://www.wellsfargo.com/certpolicy0
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: https://ocsp.quovadisoffshore.com0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: https://rca.e-szigno.hu/ocsp0-
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: https://secure.comodo.com/CPS0
Source: is-6P8G2.tmp.3.drString found in binary or memory: https://www.catcert.net/verarrel
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drString found in binary or memory: https://www.catcert.net/verarrel05
Source: RDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.1806649998.000000007FB30000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.1806093387.0000000002540000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.tmp, 00000001.00000000.1808503230.0000000000401000.00000020.00000001.01000000.00000004.sdmp, RDM_ROOTCERTIFICATE.tmp.2.dr, RDM_Root_Cert_Update_Windows.tmp.0.drString found in binary or memory: https://www.innosetup.com/
Source: is-6P8G2.tmp.3.drString found in binary or memory: https://www.netlock.hu/docs/
Source: is-6P8G2.tmp.3.drString found in binary or memory: https://www.netlock.net/docs
Source: RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.1806649998.000000007FB30000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.1806093387.0000000002540000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.tmp, 00000001.00000000.1808503230.0000000000401000.00000020.00000001.01000000.00000004.sdmp, RDM_ROOTCERTIFICATE.tmp.2.dr, RDM_Root_Cert_Update_Windows.tmp.0.drString found in binary or memory: https://www.remobjects.com/ps
Source: certutil.exe, 0000000F.00000002.1885386211.00000000032BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.verisign.
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-P11BP.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\rdm.pfx (copy)Jump to dropped file
Source: RDM_Root_Cert_Update_Windows.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: RDM_ROOTCERTIFICATE.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.1806649998.000000007FE30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs RDM_Root_Cert_Update_Windows.exe
Source: RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.1806093387.0000000002644000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs RDM_Root_Cert_Update_Windows.exe
Source: RDM_Root_Cert_Update_Windows.exe, 00000000.00000000.1804668035.00000000004DF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs RDM_Root_Cert_Update_Windows.exe
Source: RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.1941838091.00000000022A8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs RDM_Root_Cert_Update_Windows.exe
Source: RDM_Root_Cert_Update_Windows.exeBinary or memory string: OriginalFileName vs RDM_Root_Cert_Update_Windows.exe
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: sus26.winEXE@49/59@0/0
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpFile created: C:\Program Files (x86)\RDM CorporationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7712:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7948:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7656:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8008:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7864:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7552:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8080:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7796:120:WilError_03
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeFile created: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/certremoval.bat""
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-7MPF9.tmp.3.drBinary or memory string: CREATE TABLE metaData (id PRIMARY KEY UNIQUE ON CONFLICT REPLACE, item1, item2);
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-3HNSB.tmp.3.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-7MPF9.tmp.3.drBinary or memory string: SELECT ALL %s FROM %s WHERE id=$ID;
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-3HNSB.tmp.3.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-3HNSB.tmp.3.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-7MPF9.tmp.3.drBinary or memory string: SELECT ALL * FROM %s LIMIT 0;
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-3HNSB.tmp.3.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-7MPF9.tmp.3.drBinary or memory string: UPDATE %s SET %s WHERE id=$ID;
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-7MPF9.tmp.3.drBinary or memory string: SELECT ALL * FROM %s WHERE %s;
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-7MPF9.tmp.3.drBinary or memory string: SELECT ALL * FROM metaData WHERE id=$ID;
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-3HNSB.tmp.3.drBinary or memory string: UPDATE sqlite_master SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-7MPF9.tmp.3.drBinary or memory string: INSERT INTO metaData (id,item1) VALUES($ID,$ITEM1);
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-7MPF9.tmp.3.drBinary or memory string: INSERT INTO %s (id%s) VALUES($ID%s);
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-3HNSB.tmp.3.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-7MPF9.tmp.3.drBinary or memory string: INSERT INTO metaData (id,item1,item2) VALUES($ID,$ITEM1,$ITEM2);
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-7MPF9.tmp.3.drBinary or memory string: SELECT ALL * FROM %s;
Source: RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-3HNSB.tmp.3.drBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
Source: RDM_Root_Cert_Update_Windows.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeFile read: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe "C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe"
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeProcess created: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp "C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$1044E,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe"
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe "C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT
Source: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exeProcess created: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp "C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp" /SL5="$104B6,1902883,887296,C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/certremoval.bat""
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo 1 "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/CertMgr.exe" -add -c RDM_RootCA.pem -s -r localmachine Root
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/AddCert.bat" "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\RDM_RootCA.pem""
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\." -i "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\RDM_RootCA.pem"
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\certutil.exe "C:\Windows\system32/certutil.exe" f p rdm736 importpfx "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\rdm.pfx"
Source: C:\Windows\SysWOW64\certutil.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" stop "RDMAppweb"
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop "RDMAppweb"
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" stop "Embedthis Rdmappweb"
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop "Embedthis Rdmappweb"
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" start "RDMAppweb"
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start "RDMAppweb"
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" start "Embedthis Rdmappweb"
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start "Embedthis Rdmappweb"
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeProcess created: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp "C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$1044E,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe "C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENTJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" stop "RDMAppweb"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" stop "Embedthis Rdmappweb"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" start "RDMAppweb"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" start "Embedthis Rdmappweb"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exeProcess created: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp "C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp" /SL5="$104B6,1902883,887296,C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENTJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/certremoval.bat""Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/CertMgr.exe" -add -c RDM_RootCA.pem -s -r localmachine RootJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/AddCert.bat" "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\RDM_RootCA.pem""Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\certutil.exe "C:\Windows\system32/certutil.exe" f p rdm736 importpfx "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\rdm.pfx"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo 1 "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine RootJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine RootJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\." -i "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\RDM_RootCA.pem"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop "RDMAppweb"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop "Embedthis Rdmappweb"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start "RDMAppweb"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start "Embedthis Rdmappweb"Jump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certenroll.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dsparse.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: webservices.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpWindow found: window name: TMainFormJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpAutomated click: Install
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpAutomated click: Next
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpAutomated click: Next
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDirectory created: C:\Program Files\Mozilla Firefox\defaults\pref\is-JJ6M4.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDirectory created: C:\Program Files\Mozilla Firefox\defaults\pref\is-29CV0.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDirectory created: C:\Program Files\Mozilla Firefox\is-HUELK.tmpJump to behavior
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: certificate valid
Source: RDM_Root_Cert_Update_Windows.exeStatic file information: File size 3838992 > 1048576
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: section name: .didata
Source: RDM_Root_Cert_Update_Windows.tmp.0.drStatic PE information: section name: .didata
Source: is-E52HS.tmp.1.drStatic PE information: section name: .didata
Source: RDM_ROOTCERTIFICATE.tmp.2.drStatic PE information: section name: .didata

Persistence and Installation Behavior

barindex
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\nss3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-3HNSB.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpFile created: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\is-E52HS.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\nssutil3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\nssdbm3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\nssckbi.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-C7M5T.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpFile created: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\smime3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\libnspr4.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exeFile created: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\libplds4.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\libplc4.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-EMD50.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-FPHRG.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-329QV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-NPANL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\sqlite3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\freebl3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-N9SOU.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-28PQ0.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-HQ20L.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-9AB3G.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-7MPF9.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\ssl3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpFile created: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\softokn3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-6P8G2.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-JS3UT.tmpJump to dropped file
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeFile created: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" stop "RDMAppweb"
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\nss3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-3HNSB.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\nssutil3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\nssdbm3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\nssckbi.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-C7M5T.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\smime3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\libnspr4.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\libplds4.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\libplc4.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-EMD50.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-329QV.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-NPANL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\sqlite3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\freebl3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-N9SOU.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-28PQ0.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-HQ20L.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-9AB3G.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-7MPF9.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\ssl3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\softokn3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-6P8G2.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-JS3UT.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeAPI coverage: 8.5 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: RDM_Root_Cert_Update_Windows.exeBinary or memory string: QeMU5
Source: C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo 1 "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine RootJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine RootJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\." -i "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\RDM_RootCA.pem"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop "RDMAppweb"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop "Embedthis Rdmappweb"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start "RDMAppweb"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start "Embedthis Rdmappweb"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_010082F1 GetSystemTime,SystemTimeToFileTime,CompareFileTime,7_2_010082F1
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeCode function: 7_2_0100877A GetVersionExA,7_2_0100877A
Source: C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts2
Command and Scripting Interpreter
1
Windows Service
1
Windows Service
3
Masquerading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Service Execution
1
Scripting
11
Process Injection
11
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
1
DLL Side-Loading
1
Install Root Certificate
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS2
System Owner/User Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials4
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1500637 Sample: RDM_Root_Cert_Update_Windows.exe Startdate: 28/08/2024 Architecture: WINDOWS Score: 26 89 Sigma detected: Invoke-Obfuscation CLIP+ Launcher 2->89 91 Sigma detected: Invoke-Obfuscation VAR+ Launcher 2->91 10 RDM_Root_Cert_Update_Windows.exe 2 2->10         started        process3 file4 81 C:\Users\...\RDM_Root_Cert_Update_Windows.tmp, PE32 10->81 dropped 13 RDM_Root_Cert_Update_Windows.tmp 5 15 10->13         started        process5 file6 83 C:\Users\user\AppData\Local\...\is-E52HS.tmp, PE32 13->83 dropped 85 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->85 dropped 87 C:\Users\...\RDM_ROOTCERTIFICATE.exe (copy), PE32 13->87 dropped 16 RDM_ROOTCERTIFICATE.exe 2 13->16         started        19 net.exe 1 13->19         started        21 net.exe 1 13->21         started        23 2 other processes 13->23 process7 file8 71 C:\Users\user\...\RDM_ROOTCERTIFICATE.tmp, PE32 16->71 dropped 25 RDM_ROOTCERTIFICATE.tmp 37 16->25         started        28 conhost.exe 19->28         started        30 net1.exe 1 19->30         started        32 conhost.exe 21->32         started        34 net1.exe 1 21->34         started        36 conhost.exe 23->36         started        38 conhost.exe 23->38         started        40 net1.exe 1 23->40         started        42 net1.exe 1 23->42         started        process9 file10 73 C:\Users\user\AppData\...\certmgr.exe (copy), PE32 25->73 dropped 75 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 25->75 dropped 77 C:\Users\user\AppData\...\ssl3.dll (copy), PE32 25->77 dropped 79 24 other files (none is malicious) 25->79 dropped 44 certutil.exe 1 51 25->44         started        47 certmgr.exe 1 1 25->47         started        49 cmd.exe 1 25->49         started        51 cmd.exe 1 25->51         started        process11 signatures12 93 Installs new ROOT certificates 44->93 53 conhost.exe 44->53         started        55 conhost.exe 47->55         started        57 conhost.exe 49->57         started        59 cmd.exe 1 49->59         started        61 certmgr.exe 11 1 49->61         started        63 certmgr.exe 1 49->63         started        65 conhost.exe 51->65         started        67 cmd.exe 1 51->67         started        69 certutil.exe 1 51->69         started        process13

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
RDM_Root_Cert_Update_Windows.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\is-E52HS.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\freebl3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-28PQ0.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-329QV.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-3HNSB.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-6P8G2.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-7MPF9.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-9AB3G.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-C7M5T.tmp3%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-EMD50.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-FPHRG.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-HQ20L.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-JS3UT.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-N9SOU.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\is-NPANL.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\libnspr4.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\libplc4.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\libplds4.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\nss3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\nssckbi.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\nssdbm3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\nssutil3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\smime3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\softokn3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\sqlite3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\ssl3.dll (copy)3%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.entrust.net030%URL Reputationsafe
http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
http://www.chambersign.org10%URL Reputationsafe
http://www.firmaprofesional.com/cps00%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
http://repository.swisssign.com/00%URL Reputationsafe
http://crl.securetrust.com/SGCA.crl00%URL Reputationsafe
http://crl.securetrust.com/STCA.crl00%URL Reputationsafe
http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU0%Avira URL Cloudsafe
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl00%Avira URL Cloudsafe
http://www.quovadisglobal.com/cps00%URL Reputationsafe
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl00%Avira URL Cloudsafe
https://www.remobjects.com/ps0%URL Reputationsafe
https://www.innosetup.com/0%URL Reputationsafe
http://crl.chambersign.org/chambersroot.crl00%Avira URL Cloudsafe
http://www.certifikat.dk/repository00%Avira URL Cloudsafe
http://fedir.comsign.co.il/crl/ComSignCA.crl00%Avira URL Cloudsafe
https://ocsp.quovadisoffshore.com00%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
http://policy.camerfirma.com00%URL Reputationsafe
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%Avira URL Cloudsafe
http://crl.entrust.net/server1.crl00%URL Reputationsafe
http://www.phreedom.org/md5)MD50%Avira URL Cloudsafe
http://www.pkioverheid.nl/policies/root-policy00%Avira URL Cloudsafe
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%Avira URL Cloudsafe
https://www.catcert.net/verarrel0%URL Reputationsafe
http://crl.veris0%Avira URL Cloudsafe
http://ca.disig.sk/ca/crl/ca_disig.crl00%Avira URL Cloudsafe
http://www.disig.sk/ca/crl/ca_disig.crl00%Avira URL Cloudsafe
https://www.catcert.net/verarrel050%URL Reputationsafe
http://www.quovadis.bm00%URL Reputationsafe
http://www.e-szigno.hu/RootCA.crt00%Avira URL Cloudsafe
https://secure.comodo.com/CPS00%URL Reputationsafe
http://www.valicert.com/10%Avira URL Cloudsafe
http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
http://www.e-szigno.hu/SZSZ/00%Avira URL Cloudsafe
http://www.rdmcorp.comQ6.0%Avira URL Cloudsafe
http://www.rdmcorp.coma0%Avira URL Cloudsafe
http://www.sk.ee/cps/00%Avira URL Cloudsafe
http://cps.chambersign.org/cps/chambersignroot.html00%Avira URL Cloudsafe
http://www.phreedom.org/md5)0%Avira URL Cloudsafe
http://www.rdmcorp.com0%Avira URL Cloudsafe
http://ocsp.pki.gva.es00%Avira URL Cloudsafe
http://crl.oces.certifikat.dk/oces.crl00%Avira URL Cloudsafe
http://www.certicamara.com/dpc/0Z0%Avira URL Cloudsafe
https://www.netlock.hu/docs/0%Avira URL Cloudsafe
https://www.verisign.0%Avira URL Cloudsafe
http://crl.pki.wellsfargo.com/wsprca.crl00%Avira URL Cloudsafe
https://rca.e-szigno.hu/ocsp0-0%Avira URL Cloudsafe
http://acedicom.edicomgroup.com/doc00%Avira URL Cloudsafe
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%Avira URL Cloudsafe
http://www.entrust.net/CRL/net1.crl00%Avira URL Cloudsafe
http://www.disig.sk/ca0f0%Avira URL Cloudsafe
http://www.e-szigno.hu/RootCA.crl0%Avira URL Cloudsafe
http://crl.chambersign.org/chambersignroot.crl00%Avira URL Cloudsafe
http://www.sk.ee/juur/crl/00%Avira URL Cloudsafe
http://www.firmaprofesional.com00%Avira URL Cloudsafe
http://crl.xrampsecurity.com/XGCA.crl00%Avira URL Cloudsafe
http://www.trustdst.com/certificates/policy/ACES-index.html00%Avira URL Cloudsafe
http://www.pki.gva.es/cps00%Avira URL Cloudsafe
http://www.pkioverheid.nl/policies/root-policy-G200%Avira URL Cloudsafe
http://www.pki.gva.es/cps0%0%Avira URL Cloudsafe
http://www.wellsfargo.com/certpolicy00%Avira URL Cloudsafe
https://www.netlock.net/docs0%Avira URL Cloudsafe
http://www.phreedom.org/md5)00%Avira URL Cloudsafe
http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupURDM_Root_Cert_Update_Windows.exe, is-E52HS.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://fedir.comsign.co.il/crl/ComSignCA.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.chambersign.org/chambersroot.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://ocsp.entrust.net03RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://cps.chambersign.org/cps/chambersroot.html0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://www.certifikat.dk/repository0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.chambersign.org1is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.firmaprofesional.com/cps0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://www.diginotar.nl/cps/pkioverheid0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://www.pkioverheid.nl/policies/root-policy0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://repository.swisssign.com/0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://crl.securetrust.com/SGCA.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://www.phreedom.org/md5)MD5RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.securetrust.com/STCA.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crlRDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://ca.disig.sk/ca/crl/ca_disig.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.certplus.com/CRL/class2.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://www.disig.sk/ca/crl/ca_disig.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.e-szigno.hu/RootCA.crt0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.quovadisglobal.com/cps0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://crl.veriscertutil.exe, 0000000F.00000002.1885386211.00000000032BD000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://www.remobjects.com/psRDM_Root_Cert_Update_Windows.exe, 00000000.00000003.1806649998.000000007FB30000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.1806093387.0000000002540000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.tmp, 00000001.00000000.1808503230.0000000000401000.00000020.00000001.01000000.00000004.sdmp, RDM_ROOTCERTIFICATE.tmp.2.dr, RDM_Root_Cert_Update_Windows.tmp.0.drfalse
  • URL Reputation: safe
unknown
https://www.innosetup.com/RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.1806649998.000000007FB30000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.1806093387.0000000002540000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.tmp, 00000001.00000000.1808503230.0000000000401000.00000020.00000001.01000000.00000004.sdmp, RDM_ROOTCERTIFICATE.tmp.2.dr, RDM_Root_Cert_Update_Windows.tmp.0.drfalse
  • URL Reputation: safe
unknown
http://www.sk.ee/cps/0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.valicert.com/1RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.e-szigno.hu/SZSZ/0is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.rdmcorp.comQ6.RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.1941838091.00000000022E3000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
https://ocsp.quovadisoffshore.com0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://ocsp.entrust.net0DRDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://www.rdmcorp.comaRDM_ROOTCERTIFICATE.exe, 00000002.00000003.1890953766.000000000231C000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://cps.chambersign.org/cps/chambersignroot.html0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://policy.camerfirma.com0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://ocsp.pki.gva.es0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.phreedom.org/md5)RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.rdmcorp.comRDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1871419884.00000000034B0000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.oces.certifikat.dk/oces.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.entrust.net/server1.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://www.certicamara.com/dpc/0ZRDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.pki.wellsfargo.com/wsprca.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
https://rca.e-szigno.hu/ocsp0-RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
https://www.netlock.hu/docs/is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
https://www.verisign.certutil.exe, 0000000F.00000002.1885386211.00000000032BD000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://acedicom.edicomgroup.com/doc0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.entrust.net/CRL/net1.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
https://www.catcert.net/verarrelis-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://www.disig.sk/ca0fRDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.e-szigno.hu/RootCA.crlRDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.sk.ee/juur/crl/0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.chambersign.org/chambersignroot.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.xrampsecurity.com/XGCA.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
https://www.catcert.net/verarrel05RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://www.quovadis.bm0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
http://www.trustdst.com/certificates/policy/ACES-index.html0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.firmaprofesional.com0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.pki.gva.es/cps0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.pki.gva.es/cps0%RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.pkioverheid.nl/policies/root-policy-G20RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.wellsfargo.com/certpolicy0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
https://secure.comodo.com/CPS0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
https://www.netlock.net/docsis-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.phreedom.org/md5)0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crlRDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.entrust.net/2048ca.crl0RDM_ROOTCERTIFICATE.tmp, 00000003.00000003.1886003739.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-6P8G2.tmp.3.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1500637
Start date and time:2024-08-28 18:56:27 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 38s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:32
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:RDM_Root_Cert_Update_Windows.exe
Detection:SUS
Classification:sus26.winEXE@49/59@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 83%
  • Number of executed functions: 10
  • Number of non-executed functions: 55
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: RDM_Root_Cert_Update_Windows.exe
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\_isetup\_setup64.tmpYGESetup_de.exeGet hashmaliciousUnknownBrowse
    https://github.com/VioletteChiara/AnimalTA/releases/download/v3.2.2/AnimalTA_installer_v3.2.2.exeGet hashmaliciousUnknownBrowse
      creSCsjX3L.exeGet hashmaliciousHackBrowserData Tool, Kimsuky, TrollStealerBrowse
        creSCsjX3L.exeGet hashmaliciousHackBrowserData Tool, Kimsuky, TrollStealerBrowse
          file.exeGet hashmaliciousUnknownBrowse
            M5Dial_SPIFFS_Uploader_Setup.exeGet hashmaliciousUnknownBrowse
              kNjsRsHUsT.exeGet hashmaliciousRemcosBrowse
                kNjsRsHUsT.exeGet hashmaliciousUnknownBrowse
                  IvPdpGB9EA.exeGet hashmaliciousUnknownBrowse
                    m1GWsSz9Xa.exeGet hashmaliciousUnknownBrowse
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):103
                      Entropy (8bit):4.493835447768373
                      Encrypted:false
                      SSDEEP:3:URZqeeLfCXdQFiFyy6HAe+WA6nWZmrXpn:Ui5LKuFiFr6HAe+WfWErZn
                      MD5:9556062A739F56D168C1581A11192A17
                      SHA1:81EE37E3990A004B9F50CBE99D512A5A5247AA90
                      SHA-256:D151A50870503A2D394E3FFD65E2C0DAED043AE1E54C974E80AF811C7A60C78E
                      SHA-512:57AB815C4F4F4F7C96D05A714F6CFEBD3DF47EC5C5E8363E07C3180E05BBECB03A472690EDE29BB8690B2E2C0570B5512338B13710E031DE8622D68667031D92
                      Malicious:false
                      Preview:/* Enable experimental Windows trust store support */..pref("security.enterprise_roots.enabled", true);
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):90
                      Entropy (8bit):4.4385634049235
                      Encrypted:false
                      SSDEEP:3:iDVDuE8Lxm0wf9sDuE8LzLpFw6XFn:iDVDopDoNjXF
                      MD5:30573ACFC9586271A3F800A10C284479
                      SHA1:9CC1A1329258379698A04C33DC5D62E9CE8E06FD
                      SHA-256:30B9CF8F9760BCD38617A3878D43FC19E981C6DD13D6400C2A19D2ECAB746CB5
                      SHA-512:4A6DF4E50D8C04AD9E65A9D183D4C8B723FCB50E1E786018010A33CEE2B4F73296045864FFFB526D887579BEC8EC5C4CA5353127FB07E632B18C5B4684719015
                      Malicious:false
                      Preview:pref("general.config.obscure_value", 0);..pref("general.config.filename", "umbrella.cfg");
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):103
                      Entropy (8bit):4.493835447768373
                      Encrypted:false
                      SSDEEP:3:URZqeeLfCXdQFiFyy6HAe+WA6nWZmrXpn:Ui5LKuFiFr6HAe+WfWErZn
                      MD5:9556062A739F56D168C1581A11192A17
                      SHA1:81EE37E3990A004B9F50CBE99D512A5A5247AA90
                      SHA-256:D151A50870503A2D394E3FFD65E2C0DAED043AE1E54C974E80AF811C7A60C78E
                      SHA-512:57AB815C4F4F4F7C96D05A714F6CFEBD3DF47EC5C5E8363E07C3180E05BBECB03A472690EDE29BB8690B2E2C0570B5512338B13710E031DE8622D68667031D92
                      Malicious:false
                      Preview:/* Enable experimental Windows trust store support */..pref("security.enterprise_roots.enabled", true);
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):90
                      Entropy (8bit):4.4385634049235
                      Encrypted:false
                      SSDEEP:3:iDVDuE8Lxm0wf9sDuE8LzLpFw6XFn:iDVDopDoNjXF
                      MD5:30573ACFC9586271A3F800A10C284479
                      SHA1:9CC1A1329258379698A04C33DC5D62E9CE8E06FD
                      SHA-256:30B9CF8F9760BCD38617A3878D43FC19E981C6DD13D6400C2A19D2ECAB746CB5
                      SHA-512:4A6DF4E50D8C04AD9E65A9D183D4C8B723FCB50E1E786018010A33CEE2B4F73296045864FFFB526D887579BEC8EC5C4CA5353127FB07E632B18C5B4684719015
                      Malicious:false
                      Preview:pref("general.config.obscure_value", 0);..pref("general.config.filename", "umbrella.cfg");
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):56
                      Entropy (8bit):4.503434386188784
                      Encrypted:false
                      SSDEEP:3:RBkAe+WA6nWZmrXpn:rkAe+WfWErZn
                      MD5:E40A3D559E4B85251943E071CD036D90
                      SHA1:10FC58DF075108C912589F7954244A807776A0FB
                      SHA-256:E179CA82C741D7D4842E42BC339C0E2C9BEFA1A5EFFE33D69D6821B3121FECCA
                      SHA-512:07CC337D7EB364FC78B0B36ACBE9F89B85D932B3D616B8EDFB5F12214ECD17853ECAC4725CAE929CCE8A803D868FC3F5A5AD4D394554BB4783B0CCAFEA981959
                      Malicious:false
                      Preview://..lockPref("security.enterprise_roots.enabled", true);
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):56
                      Entropy (8bit):4.503434386188784
                      Encrypted:false
                      SSDEEP:3:RBkAe+WA6nWZmrXpn:rkAe+WfWErZn
                      MD5:E40A3D559E4B85251943E071CD036D90
                      SHA1:10FC58DF075108C912589F7954244A807776A0FB
                      SHA-256:E179CA82C741D7D4842E42BC339C0E2C9BEFA1A5EFFE33D69D6821B3121FECCA
                      SHA-512:07CC337D7EB364FC78B0B36ACBE9F89B85D932B3D616B8EDFB5F12214ECD17853ECAC4725CAE929CCE8A803D868FC3F5A5AD4D394554BB4783B0CCAFEA981959
                      Malicious:false
                      Preview://..lockPref("security.enterprise_roots.enabled", true);
                      Process:C:\Windows\SysWOW64\certutil.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2251
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3::
                      MD5:0158FE9CEAD91D1B027B795984737614
                      SHA1:B41A11F909A7BDF1115088790A5680AC4E23031B
                      SHA-256:513257326E783A862909A2A0F0941D6FF899C403E104FBD1DBC10443C41D9F9A
                      SHA-512:C48A55CC7A92CEFCEFE5FB2382CCD8EF651FC8E0885E88A256CD2F5D83B824B7D910F755180B29ECCB54D9361D6AF82F9CC741BD7E6752122949B657DA973676
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\SysWOW64\certutil.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2271
                      Entropy (8bit):7.6373591090883775
                      Encrypted:false
                      SSDEEP:48:qwTdnQwCBUbZnXqBolVVm3XYDLjq/qJO/dUa1j4hJJh:qsdnJCBeVXqulfaXYDLjq/bUa12V
                      MD5:4D03C77CF2ECB1BC1381269D8E31D79D
                      SHA1:ABD4ACE3E95E521E92216BA5725863D6DFC70C02
                      SHA-256:331CF6D59E103B978F1FFAB34355A90415C63C30D4088BC47CCF346B92D5AF75
                      SHA-512:8A6A252640C9C4B028E28C335DB8B38EC8AD8B68E00F42D1FA1617ABA0B8067A09AF7AC363D5F3EDAD5AB077E8A86687A3F5756A9F78FC2BAE21544612DF5D2E
                      Malicious:false
                      Preview:........;...............P...............RDM Localhost Service-434ceaa7-2d72-47f3-85dc-9e8610883c95.....................RSA1................M...r....m....(.q..F|........o.@A..1.@hD..y.e...).w..^......#.5X;.$.G....%f.^t^...f...7.H..6 ..0 ........]............P...V.....>.3W..l.s.X..=(.....0.....0.F4..6.....yC...|...&]j.<.,X....I< K.l%uC......).r..4.....H..M^.!.nU.....Ge..V.........................z..O.........b.'bO...d}.......,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... .....$8.i!.....*.iz.C..S".C:J.3^.}*............ .....N....iZ..+....p(.....{'76...$P....i......TV(.."...d*...z|):.X..H...-.D;.o.....s..k...-..l.]/.........{1H!I...;.c/T....g.G.L*..4..-.Q.c..1N.|%e.h.($...P.l.*....V.f`tb..n^....<7...v."\...m..pR@._.(7....C.{......k.9.#..V..y.:(.<...D.?.......f....:...P\.: MJ......5.I......V....VS]...dQ......../[!.2Ue.z..c~G).h.-.$$^;..Bs..u.......=..m.. ..rS.%......{............N..B....\7.....av[0..E.ym.|q<Ey.mj..v..2..q.C1_._.@....]!
                      Process:C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):2752392
                      Entropy (8bit):7.69362175399761
                      Encrypted:false
                      SSDEEP:49152:iqe3f6ECWVVX/QSJKYkljNXONfDevXUCH+s+U0WBAW:7SiE3ROj0CEqvV0CAW
                      MD5:5DAEC5D62A1B06418E5EAE25B7857748
                      SHA1:8A56F34F6A62B6EE1489AB2DFFF643BC5DC22276
                      SHA-256:9F395107A54B5393D98B7AA5D4A039D32BE780E691CACF75EF7D4CE58D074D83
                      SHA-512:10B3AF9C90B875294EF606EB471E1E30A7A8DB56FAB2874F6EF32D33D088C97E4802A4980B196AA419BD0DDDC568F13C5453E822A190E5165C96C4E7E2CF0CB1
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...'..`.................P...6.......^.......p....@..........................`......h1*...@......@...................@....... ..6....p..T.............).p1...................................`......................."..D....0.......................text....6.......8.................. ..`.itext.......P.......<.............. ..`.data....7...p...8...T..............@....bss.....m...............................idata..6.... ......................@....didata......0......................@....edata.......@......................@..@.tls.........P...........................rdata..]....`......................@..@.rsrc...T....p......................@..@....................................@..@........................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp
                      File Type:PE32+ executable (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):6144
                      Entropy (8bit):4.720366600008286
                      Encrypted:false
                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                      MD5:E4211D6D009757C078A9FAC7FF4F03D4
                      SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                      SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                      SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Joe Sandbox View:
                      • Filename: YGESetup_de.exe, Detection: malicious, Browse
                      • Filename: , Detection: malicious, Browse
                      • Filename: creSCsjX3L.exe, Detection: malicious, Browse
                      • Filename: creSCsjX3L.exe, Detection: malicious, Browse
                      • Filename: file.exe, Detection: malicious, Browse
                      • Filename: M5Dial_SPIFFS_Uploader_Setup.exe, Detection: malicious, Browse
                      • Filename: kNjsRsHUsT.exe, Detection: malicious, Browse
                      • Filename: kNjsRsHUsT.exe, Detection: malicious, Browse
                      • Filename: IvPdpGB9EA.exe, Detection: malicious, Browse
                      • Filename: m1GWsSz9Xa.exe, Detection: malicious, Browse
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):2752392
                      Entropy (8bit):7.69362175399761
                      Encrypted:false
                      SSDEEP:49152:iqe3f6ECWVVX/QSJKYkljNXONfDevXUCH+s+U0WBAW:7SiE3ROj0CEqvV0CAW
                      MD5:5DAEC5D62A1B06418E5EAE25B7857748
                      SHA1:8A56F34F6A62B6EE1489AB2DFFF643BC5DC22276
                      SHA-256:9F395107A54B5393D98B7AA5D4A039D32BE780E691CACF75EF7D4CE58D074D83
                      SHA-512:10B3AF9C90B875294EF606EB471E1E30A7A8DB56FAB2874F6EF32D33D088C97E4802A4980B196AA419BD0DDDC568F13C5453E822A190E5165C96C4E7E2CF0CB1
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...'..`.................P...6.......^.......p....@..........................`......h1*...@......@...................@....... ..6....p..T.............).p1...................................`......................."..D....0.......................text....6.......8.................. ..`.itext.......P.......<.............. ..`.data....7...p...8...T..............@....bss.....m...............................idata..6.... ......................@....didata......0......................@....edata.......@......................@..@.tls.........P...........................rdata..]....`......................@..@.rsrc...T....p......................@..@....................................@..@........................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):236
                      Entropy (8bit):5.232996410780511
                      Encrypted:false
                      SSDEEP:6:rFHGxQ61kH7HE9bwe9hc1axKsyGpeJ/nleB/H7HE9bkgjqY1axKs5v:r026ebH279hc14KsyNJ/nAB/bH2714Ks
                      MD5:0A7F6C64EEF31DDB78A7EA184A1E526C
                      SHA1:222BB7F9444AE8124EAE1F243DCEA4436A32D3AD
                      SHA-256:FDCDD7E21E9CCEDACB8BFC166FD945F2CB08979682BD15E70A88BBAAC48714EA
                      SHA-512:A9C38DE565354EAF5ADBB714A409056DAF73E7B2F1CCFE4D26D91C687351CE29A8DEA34DA73FC829F0852A5A5E0839A7E4D4AA68802607AA55974F538A5EA5E4
                      Malicious:false
                      Preview:FOR /F "tokens=*" %%A IN ('dir /B "%APPDATA%\Mozilla\Firefox\Profiles\*.default*"') DO set FIREFOX_PROFILE_DIR=%%A..certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "%APPDATA%\Mozilla\Firefox\Profiles\%FIREFOX_PROFILE_DIR%\." -i %1..
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:MS Windows icon resource - 5 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                      Category:dropped
                      Size (bytes):99678
                      Entropy (8bit):2.399880160860077
                      Encrypted:false
                      SSDEEP:384:ckeXhftI9DRRRQwXF6jI2PmdFUMUaaS8FPm0AjaP:ZexftsDRRRPSP
                      MD5:C6B1F4998CA0242B1EB448C9694EFF20
                      SHA1:D002E4878B16AFD33885553F3507BA2BC23E2179
                      SHA-256:15C5C4D9FC4E4FCD10D130A558D4F89931340B40EB6FAECB0BCE1FB5CCCC1CAB
                      SHA-512:902117AA14D95A3493D4DB341CE1DCBCF07D8ADA9DF8E4B29100C5FC7D8E732245D9512AE378C9BF2EAA2AEA9B371F089D0BCDD66B71B1EEF84D931874E8528A
                      Malicious:false
                      Preview:............ .h...V... .... .........00.... ..%..f...@@.... .(B...;........ .(...6}..(....... ..... .....@...................................................................................................................................................................................................................................................................................................................................................uW....Y....wY..y[..uW..uW..wZ....n....uW.....}`........Y..f..uW....Y...x.uW....p.uW....H...=.uW....I.uW.....uW....O...Y..f..uW..}a..x[...f.....uW.........vX..wY..uW...._..k..}a....R..f..uW....C....y\..{^..uW.........vX..x[..uW...i......}a...i...f..uW...n$...\.vX...i..uW...u...m".vY....[.uW..uW........M.uW...f...w1..w1..w1...N.....w1..w1...@........w1..z6.........w1...D...........................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PEM certificate
                      Category:dropped
                      Size (bytes):1452
                      Entropy (8bit):5.903783238657704
                      Encrypted:false
                      SSDEEP:24:LrcM4PB8jfzTKpfU7Kjp9oBePz72nNk7Kj/Xno0fOIJLc/3j2KQo60xHBeBGNbSh:LrcXPCjfzmpfU7MoBePz72nNk7Ao0rLt
                      MD5:5236FC957397FB2700DC025C29543CB5
                      SHA1:18B222ED28C757645D6986E92E2317839A7A6C6D
                      SHA-256:60DB73E7D89E86F33E26E735CD9D37BFC6A097790200E9A32A4AFE7B80CF3F4A
                      SHA-512:F3A6DA5BA7130984EDCAF323A42BF3D5B99A6BFED01F4893F215918210F4573B287E2E3F26FA384D013BC2EE7C993592541B99614A0F733DC3FCEF3D1F5C10E7
                      Malicious:false
                      Preview:-----BEGIN CERTIFICATE-----.MIIEAzCCAusCFGsVDWHO9qoFY2Z2rm9tvBPBsr+yMA0GCSqGSIb3DQEBCwUAMIG8.MQswCQYDVQQGEwJDQTEQMA4GA1UECAwHT250YXJpbzERMA8GA1UEBwwIV2F0ZXJs.b28xGDAWBgNVBAoMD1JETSBDb3Jwb3JhdGlvbjEwMC4GA1UECwwnRGV2aWNlIC0g.Zm9yIEludGVybmFsIEludHJhbmV0IHVzZSBPbmx5MRgwFgYDVQQDDA9SRE0gRGV2.aWNlIFJvb3QxIjAgBgkqhkiG9w0BCQEWE3N1cHBvcnRAcmRtY29ycC5jb20wIBcN.MjExMTI2MDEyNjE4WhgPMjA1NjExMTcwMTI2MThaMIG8MQswCQYDVQQGEwJDQTEQ.MA4GA1UECAwHT250YXJpbzERMA8GA1UEBwwIV2F0ZXJsb28xGDAWBgNVBAoMD1JE.TSBDb3Jwb3JhdGlvbjEwMC4GA1UECwwnRGV2aWNlIC0gZm9yIEludGVybmFsIElu.dHJhbmV0IHVzZSBPbmx5MRgwFgYDVQQDDA9SRE0gRGV2aWNlIFJvb3QxIjAgBgkq.hkiG9w0BCQEWE3N1cHBvcnRAcmRtY29ycC5jb20wggEiMA0GCSqGSIb3DQEBAQUA.A4IBDwAwggEKAoIBAQDnTUJ19cJ2FQi1jQkDljQwn9Mr84flRNWJxaf4qfKLQZEY.0MiHk310N6jlfbVvAAIdm0elbAyIvY9wf6FHR3DYWZ/rMNAFgoZ4bLrBTsvRvtLx.NvKK8Zb4qz2lLgtFCgqfNjp4X1sjEWFtpQGBur8olbFAibgQ5cxJ6OaCaT8qiH37.s/yNVv2SnVL0BpUPPjmPpv/NOTPNHgQ/4ZVWjNYxk3jCEOYTYSmvHNwKTGvUZjSY.R8fEKMuraKWsX0zPoKvW8vX0a7UfExt0AlIzWogDEAblduX2gA/MxQfDN1ekvO
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                      Category:dropped
                      Size (bytes):59664
                      Entropy (8bit):5.552981290836808
                      Encrypted:false
                      SSDEEP:1536:/RQvLjWiALqLkHbp7m8GYT3WXs39i4zv:/Vz2Lk71m8Ge3WXs1
                      MD5:5D077A0CDD077C014EEDB768FEB249BA
                      SHA1:EA2C62D69A1F6B9D643FE16319EC7632C9533B3F
                      SHA-256:8A830C48C4D78159DD80F4DAD81C0BEBBF9314710026B1A2EF0FFDDDCB24B83D
                      SHA-512:71BF48DCB6916A810F63710968894B431357AA694AA169067F567CC82B8E4EE732F581AFB85B256E5C5A9D15A8B7B5746FA6A8B4127B273FEB5B0E03E91B607A
                      Malicious:true
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;.}h.}h.}hh.nh.}h.|h..}h...h.}h.{h.}h.}h..}hRich.}h................PE..L....B.5.....................l............................................... ..........................................................0W..................................................................@........................................text............................... ..`.data...............................@....rsrc...0W.......X..................@..@.0248...c,.5C....[.5P....[.5]......5i...b,.5u...........MSVCRT.dll.ADVAPI32.dll.KERNEL32.dll.CRYPT32.dll.CRYPTUI.dll.USER32.dll.........................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):143
                      Entropy (8bit):4.304898083502664
                      Encrypted:false
                      SSDEEP:3:jWrxTAoV6VGa/IhgZGZNRRo/XOxTAoV6VGa/IhgZGZNRRoa:iRA3sa/0hA+A3sa/0hn
                      MD5:E8C0E44371C4EDCC8908173BB91CA75C
                      SHA1:5479F75580E366CBB2BB03B15C1518CEBDFC5CB0
                      SHA-256:30AA7A6E165232DCA4B1B3ADF8C74BEA54A29686F8802C6DE92075EF53B5C1AA
                      SHA-512:3AD2442EA854B2C7B1620A6E679ED36110A0F30023CF12552DE28C70E3E883F859C114D5A14CEC4280564AD280204FA549F7F5680CEFAFFF8A2857E16AC36B7D
                      Malicious:false
                      Preview:echo 1 | CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root..CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root....
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):103
                      Entropy (8bit):4.493835447768373
                      Encrypted:false
                      SSDEEP:3:URZqeeLfCXdQFiFyy6HAe+WA6nWZmrXpn:Ui5LKuFiFr6HAe+WfWErZn
                      MD5:9556062A739F56D168C1581A11192A17
                      SHA1:81EE37E3990A004B9F50CBE99D512A5A5247AA90
                      SHA-256:D151A50870503A2D394E3FFD65E2C0DAED043AE1E54C974E80AF811C7A60C78E
                      SHA-512:57AB815C4F4F4F7C96D05A714F6CFEBD3DF47EC5C5E8363E07C3180E05BBECB03A472690EDE29BB8690B2E2C0570B5512338B13710E031DE8622D68667031D92
                      Malicious:false
                      Preview:/* Enable experimental Windows trust store support */..pref("security.enterprise_roots.enabled", true);
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):222208
                      Entropy (8bit):6.697487951906348
                      Encrypted:false
                      SSDEEP:6144:ScTE2XtnPcWNo4eT4hs8LP71DRIUqqDL67PXGHrIrH:lTE2XtNrLP71Dyxqn6jI
                      MD5:269BEB631B580C6D54DB45B5573B1DE5
                      SHA1:64050C1159C2BCFC0E75DA407EF0098AD2DE17C8
                      SHA-256:FFC7558A61A4E6546CF095BDEABEA19F05247A0DAA02DCA20EA3605E7FC62C77
                      SHA-512:649CD40F3E02C2F2711F56AA21F39CCBDA9108143D4766A9728C9AD98F329D5F64F77090DF769C55B66AB48FB9AA4A380944EBE54F2C450F96CF76E5A6ADD31E
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........[x.5+.5+.5+..+.5+..+.5+..+.5+..+.5+.4+..5+..+.5+..+.5+..+.5+..+.5+Rich.5+................PE..L....A.O...........!.....\...J.......f.......p............................................@..........................U..O...,M..x...............................,...................................hL..@............p..x............................text....[.......\.................. ..`.rdata.......p.......`..............@..@.data....F...`.......F..............@....rsrc................H..............@..@.reloc..x............L..............@..B........................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):108544
                      Entropy (8bit):6.45689405407938
                      Encrypted:false
                      SSDEEP:3072:ES2ipxnUGhrFxZHkZvmYHG+iI2iV6nu+ZfX6AKVqzzF+:ES2ipxUSwv/m+1rAKVqz5
                      MD5:051652BA7CA426846E936BC5AA3F39F3
                      SHA1:0012007876DDE3A2D764249AD86BC428300FE91E
                      SHA-256:8ECA993570FA55E8FE8F417143EEA8128A58472E23074CBD2E6AF4D3BB0F0D9A
                      SHA-512:005B22BD5A4CCA9930C5ECA95AF01FC034BB496F4E599CAC3F20B0B9CE0957B4DB685B8E47977E5B289DC5CF1C8A81F4DD7434D0347E41D008E2C8F7F12006F0
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........D[...[...[...R...Y.......S...4...Z...4...Y...4...P...[......4./.z...4...Z...4...Z...4...Z...Rich[...........................PE..L....A.O...........!.....n...:.......w....................................................@............................................................................................................@...............D............................text....l.......n.................. ..`.rdata...............r..............@..@.data...............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):93696
                      Entropy (8bit):6.44977499578729
                      Encrypted:false
                      SSDEEP:1536:W3Hq5zbjpPQ4Y0epuuwCbDz5xAFKL8kycL7:gHQxPQfGuz5uFKL8kyu7
                      MD5:C26E940B474728E728CAFE5912BA418A
                      SHA1:7256E378A419F8D87DE71835E6AD12FAADAAAF73
                      SHA-256:1AF1AC51A92B36DE8D85D1F572369815404912908C3A489A6CD7CA2350C2A93D
                      SHA-512:BD8673FACD416C8F2EB9A45C4DEEF50E53D0BC41E6B3941FC20CDA8E2D88267205526DADB44BD89869BD333BF7D6F8DB589C95997E1F3322F7A66A09D562B1DF
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................`....C.k.....m.....X.....o...........Y.....h.....i.....n....Rich...........PE..L....A.O...........!................p.....................................................@..........................O.......F..x...................................................................0F..@...............l............................text...~........................... ..`.rdata..............................@..@.data........p.......Z..............@....rsrc................\..............@..@.reloc...............`..............@..B........................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):423936
                      Entropy (8bit):6.751461394308889
                      Encrypted:false
                      SSDEEP:6144:Cf41DoFqNI3Cm39XWYJkW07RlqHYOE1o2exosU8iZEJKvncrghAvLWDKnADA3/AF:DD76rrQ7ngYLo2MliPSghmLYk3/n
                      MD5:B58848A28A1EFB85677E344DB1FD67E6
                      SHA1:DAD48E2B2B3B936EFC15AC2C5F9099B7A1749976
                      SHA-256:00DB98AB4D50E9B26ECD193BFAD6569E1DD395DB14246F8C233FEBBA93965F7A
                      SHA-512:762B3BD7F1F1A5C3ACCDE8C36406B9BEADD4270C570EB95A05935C1F7731513938AE5E99950C648B1EACDD2A85F002319B78B7E4EA9577C72335A2FA54796B13
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,J..h+.Yh+.Yh+.YaS0Yj+.Y.]?Yk+.Yh+.Y&+.Y.]=Yd+.Y.].Yj+.Y.].Yf+.Y.]8Yi+.Y.]>Yi+.YRichh+.Y........................PE..L....A.O...........!......................................................................@..........................J.......C..<...............................@&..................................@B..@...............@............................text............................... ..`.rdata..............................@..@.data........`.......D..............@....reloc..Z(.......*...N..............@..B................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):370176
                      Entropy (8bit):6.863300763286356
                      Encrypted:false
                      SSDEEP:6144:eeP90QTcdMTWfpUwFygo5zUM38ME/Hs3nXHkUX:eA/TcWTWfpf0gmzY03nXHkUX
                      MD5:D1243817A1B22B855DE0852CF5B53BF5
                      SHA1:C64F4851A2FCFE8D1E4A5B5743498870B676755E
                      SHA-256:93E99CFBA00348BE3A102DC9F41ACD39BBA91D7F4E0149A9EA6C53FCC50ADAEE
                      SHA-512:59ABD87F8DA58F0F4D8D3919A84B2E4FA853AA0E76DBFEA3BC011E21267909ED7C3BB42A714F030773767329A8D3DA0810E789AB5A061BC0E4452159849C4CC2
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......??fs{^. {^. {^. r&. y^. .(. z^. .(. y^. .(. r^. {^. C^. .(. R^. .(. z^. .(. z^. .(. z^. Rich{^. ................PE..L....A.O...........!......................................................................@..........................6..P...L1..x...............................t,...................................0..@............................................text............................... ..`.rdata..07.......8..................@..@.data....T...@...R... ..............@....rsrc................r..............@..@.reloc.../.......0...v..............@..B........................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):172544
                      Entropy (8bit):6.496240878001019
                      Encrypted:false
                      SSDEEP:3072:KfHTwBGo4uYvGG3byHhQNP4IP/zsu9zvKwMNJ+Z/9tRpK:KsGTudG3GHhMz3SNY9R
                      MD5:2AB31C9401870ADB4E9D88B5A6837ABF
                      SHA1:4F0FDD699E63F614D79ED6E47EF61938117D3B7A
                      SHA-256:22ECECE561510F77B100CFF8109E5ED492C34707B7B14E0774AAA9CA813DE4AD
                      SHA-512:BC58C4DA15E902351F1F161E9D8C1EE4D10ACEB5EDA7DEF4B4454CADF4CD9F437118BA9D63F25F4F0A5694E9D34A4DEF33D40AD51EFB1CDEBB6F02A81C481871
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.e./.6./.6./.6.W.6./.6;a.6./.6.Y.6./.6.Y36./.6.Y.6./.6./.61/.6.Y26./.6.Y.6./.6.Y.6./.6.Y.6./.6Rich./.6................PE..L....A.O...........!.....*...x.......3.......@............................................@.................................<...................................|...................................x...@............@...............................text....(.......*.................. ..`.rdata...O...@...P..................@..@.data................~..............@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):222208
                      Entropy (8bit):6.697487951906348
                      Encrypted:false
                      SSDEEP:6144:ScTE2XtnPcWNo4eT4hs8LP71DRIUqqDL67PXGHrIrH:lTE2XtNrLP71Dyxqn6jI
                      MD5:269BEB631B580C6D54DB45B5573B1DE5
                      SHA1:64050C1159C2BCFC0E75DA407EF0098AD2DE17C8
                      SHA-256:FFC7558A61A4E6546CF095BDEABEA19F05247A0DAA02DCA20EA3605E7FC62C77
                      SHA-512:649CD40F3E02C2F2711F56AA21F39CCBDA9108143D4766A9728C9AD98F329D5F64F77090DF769C55B66AB48FB9AA4A380944EBE54F2C450F96CF76E5A6ADD31E
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........[x.5+.5+.5+..+.5+..+.5+..+.5+..+.5+.4+..5+..+.5+..+.5+..+.5+..+.5+Rich.5+................PE..L....A.O...........!.....\...J.......f.......p............................................@..........................U..O...,M..x...............................,...................................hL..@............p..x............................text....[.......\.................. ..`.rdata.......p.......`..............@..@.data....F...`.......F..............@....rsrc................H..............@..@.reloc..x............L..............@..B........................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):143
                      Entropy (8bit):4.304898083502664
                      Encrypted:false
                      SSDEEP:3:jWrxTAoV6VGa/IhgZGZNRRo/XOxTAoV6VGa/IhgZGZNRRoa:iRA3sa/0hA+A3sa/0hn
                      MD5:E8C0E44371C4EDCC8908173BB91CA75C
                      SHA1:5479F75580E366CBB2BB03B15C1518CEBDFC5CB0
                      SHA-256:30AA7A6E165232DCA4B1B3ADF8C74BEA54A29686F8802C6DE92075EF53B5C1AA
                      SHA-512:3AD2442EA854B2C7B1620A6E679ED36110A0F30023CF12552DE28C70E3E883F859C114D5A14CEC4280564AD280204FA549F7F5680CEFAFFF8A2857E16AC36B7D
                      Malicious:false
                      Preview:echo 1 | CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root..CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root....
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):190976
                      Entropy (8bit):6.662915165682162
                      Encrypted:false
                      SSDEEP:3072:82ya/vPWqodwFYAjkiV6vnjBr/WPUShgk04YZEnhacoAX8+FeHbnGmgjZzpTBfRP:j7JoiVGj+hIWNmKFpTBJ8B
                      MD5:717DBDF0E1F616EA8A038259E273C530
                      SHA1:926CE8EC8F79B62202ED487C5FB0C3E1A18F5F70
                      SHA-256:E3227EA4C39F5B44F685EEA13D9F6663945E46B12CABE5D29DAEF28B6EEF1A9B
                      SHA-512:C09BF38AC93C350DFD0638BEEDD40FBCC9435A06B0013D214F57B181C1B4292E4B8A8310DB2DB48200BCFED872BC656EA92A207ACB6F7B344E3F134226C2AB3F
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 3%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Af......................jq......jq=.....jq..............jq<.5...jq......jq......jq......Rich............................PE..L....A.O...........!.................".......0............................... ............@.........................p...j.......................................l......................................@............0...............................text............................... ..`.rdata......0......................@..@.data...<...........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):12288
                      Entropy (8bit):5.576295270591411
                      Encrypted:false
                      SSDEEP:192:y8/u6mEWZYr/YDmJrFirLPAxHU413X7PVlD63YlFfP:1/uHE6Yr/Y+h0AlU4prPVlZlFfP
                      MD5:9AE76DB13972553A5DE5BDD07B1B654D
                      SHA1:0C4508EB6F13B9B178237CCC4DA759BFF10AF658
                      SHA-256:38A906373419501966DAF6EC19CA2F8DB7B29609128AE5CB424D2AA511652C29
                      SHA-512:DB6FD98A2B27DD7622F10491BBA08793D26AB59016D6862168AAD278644F737DDDBD312A690DED5091D5E999DC3C3518FD95B200124BE8349829E5CE6685CF4B
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................g......j......_......h............^......o......n......i....Rich............................PE..L...mA.O...........!.................".......0...............................p............@.........................P6......l2..P....P.......................`.......................................1..@............0...............................text............................... ..`.rdata..R....0......................@..@.data........@.......&..............@....rsrc........P.......(..............@..@.reloc..(....`.......,..............@..B................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                      Category:dropped
                      Size (bytes):59664
                      Entropy (8bit):5.552981290836808
                      Encrypted:false
                      SSDEEP:1536:/RQvLjWiALqLkHbp7m8GYT3WXs39i4zv:/Vz2Lk71m8Ge3WXs1
                      MD5:5D077A0CDD077C014EEDB768FEB249BA
                      SHA1:EA2C62D69A1F6B9D643FE16319EC7632C9533B3F
                      SHA-256:8A830C48C4D78159DD80F4DAD81C0BEBBF9314710026B1A2EF0FFDDDCB24B83D
                      SHA-512:71BF48DCB6916A810F63710968894B431357AA694AA169067F567CC82B8E4EE732F581AFB85B256E5C5A9D15A8B7B5746FA6A8B4127B273FEB5B0E03E91B607A
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;.}h.}h.}hh.nh.}h.|h..}h...h.}h.{h.}h.}h..}hRich.}h................PE..L....B.5.....................l............................................... ..........................................................0W..................................................................@........................................text............................... ..`.data...............................@....rsrc...0W.......X..................@..@.0248...c,.5C....[.5P....[.5]......5i...b,.5u...........MSVCRT.dll.ADVAPI32.dll.KERNEL32.dll.CRYPT32.dll.CRYPTUI.dll.USER32.dll.........................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):199680
                      Entropy (8bit):6.678065290017203
                      Encrypted:false
                      SSDEEP:3072:/zcwXcVnDhH5YI6KkEK7207EmrRelzafK+AnF4xH6dVHwpXpE92jDBSRYO6s0eEw:TUDF5YTyBJuF6DHwpXpfSRYO6Z
                      MD5:6E84AF2875700285309DD29294365C6A
                      SHA1:FC3CB3B2A704250FC36010E2AB495CDC5E7378A9
                      SHA-256:1C158E680749E642E55F721F60A71314E26E03E785CD92E560BF650B83C4C3C8
                      SHA-512:0ADD9479B2FD631BAFC617C787BCA331E915EDC6A29DD72269B6A24490EC1C85E677698E07944F5FF3BD8D849D3D20ACE61A194A044C697FEFCF992C6F05E747
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Wp.6...6...6..-x...6...@...6...@...6...@...6...N...6...6..m6...@...6...@...6...@...6...@...6..Rich.6..........PE..L...lA.O...........!.....^...........h.......p...............................p............@..............................+..<...x....0.......................@..."..................................X...@............p..`............................text....].......^.................. ..`.rdata...s...p...t...b..............@..@.data...P(..........................@....tls......... ......................@....rsrc........0......................@..@.reloc...&...@...(..................@..B................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):90
                      Entropy (8bit):4.4385634049235
                      Encrypted:false
                      SSDEEP:3:iDVDuE8Lxm0wf9sDuE8LzLpFw6XFn:iDVDopDoNjXF
                      MD5:30573ACFC9586271A3F800A10C284479
                      SHA1:9CC1A1329258379698A04C33DC5D62E9CE8E06FD
                      SHA-256:30B9CF8F9760BCD38617A3878D43FC19E981C6DD13D6400C2A19D2ECAB746CB5
                      SHA-512:4A6DF4E50D8C04AD9E65A9D183D4C8B723FCB50E1E786018010A33CEE2B4F73296045864FFFB526D887579BEC8EC5C4CA5353127FB07E632B18C5B4684719015
                      Malicious:false
                      Preview:pref("general.config.obscure_value", 0);..pref("general.config.filename", "umbrella.cfg");
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):97792
                      Entropy (8bit):6.240650542976671
                      Encrypted:false
                      SSDEEP:1536:xtTRGG7+CF7k9QTPHkis9rGDE9tJ7kdsolb5XpIKz1TpNs6IRcgAGEFDGSs1f8b6:xGG6CF7k9QbHkCE9tJ7kdsW5Xh5s6IRV
                      MD5:A5C670EDF4411BF7F132F4280026137B
                      SHA1:C0E3CBDDE7D3CEBF41A193EECA96A11CE2B6DA58
                      SHA-256:ABA2732C7A016730E94E645DD04E8FAFCC173FC2E5E2AAC01A1C0C66EAD1983E
                      SHA-512:ACFCDE89A968D81363AE1CD599A6A362B047AE207722FEA8541577AC609BC5FEFB2231ED946E13F0B4B3BCD56B947C13837C1B9E360D521EC7D580BEFCBB0F46
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r...6.k.6.k.6.k.?...4.k.Y...7.k.Y...4.k.Y...;.k.6.j..k.Y.....k.Y..7.k.Y..7.k.Y...7.k.Rich6.k.........................PE..L....A.O...........!.........j...............0............................................@.........................Pj..v...\N.......................................................................M..@............0...............................text............................... ..`.rdata...S...0...T..................@..@.data...h............l..............@....rsrc................n..............@..@.reloc...............r..............@..B................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PEM certificate
                      Category:dropped
                      Size (bytes):1452
                      Entropy (8bit):5.903783238657704
                      Encrypted:false
                      SSDEEP:24:LrcM4PB8jfzTKpfU7Kjp9oBePz72nNk7Kj/Xno0fOIJLc/3j2KQo60xHBeBGNbSh:LrcXPCjfzmpfU7MoBePz72nNk7Ao0rLt
                      MD5:5236FC957397FB2700DC025C29543CB5
                      SHA1:18B222ED28C757645D6986E92E2317839A7A6C6D
                      SHA-256:60DB73E7D89E86F33E26E735CD9D37BFC6A097790200E9A32A4AFE7B80CF3F4A
                      SHA-512:F3A6DA5BA7130984EDCAF323A42BF3D5B99A6BFED01F4893F215918210F4573B287E2E3F26FA384D013BC2EE7C993592541B99614A0F733DC3FCEF3D1F5C10E7
                      Malicious:false
                      Preview:-----BEGIN CERTIFICATE-----.MIIEAzCCAusCFGsVDWHO9qoFY2Z2rm9tvBPBsr+yMA0GCSqGSIb3DQEBCwUAMIG8.MQswCQYDVQQGEwJDQTEQMA4GA1UECAwHT250YXJpbzERMA8GA1UEBwwIV2F0ZXJs.b28xGDAWBgNVBAoMD1JETSBDb3Jwb3JhdGlvbjEwMC4GA1UECwwnRGV2aWNlIC0g.Zm9yIEludGVybmFsIEludHJhbmV0IHVzZSBPbmx5MRgwFgYDVQQDDA9SRE0gRGV2.aWNlIFJvb3QxIjAgBgkqhkiG9w0BCQEWE3N1cHBvcnRAcmRtY29ycC5jb20wIBcN.MjExMTI2MDEyNjE4WhgPMjA1NjExMTcwMTI2MThaMIG8MQswCQYDVQQGEwJDQTEQ.MA4GA1UECAwHT250YXJpbzERMA8GA1UEBwwIV2F0ZXJsb28xGDAWBgNVBAoMD1JE.TSBDb3Jwb3JhdGlvbjEwMC4GA1UECwwnRGV2aWNlIC0gZm9yIEludGVybmFsIElu.dHJhbmV0IHVzZSBPbmx5MRgwFgYDVQQDDA9SRE0gRGV2aWNlIFJvb3QxIjAgBgkq.hkiG9w0BCQEWE3N1cHBvcnRAcmRtY29ycC5jb20wggEiMA0GCSqGSIb3DQEBAQUA.A4IBDwAwggEKAoIBAQDnTUJ19cJ2FQi1jQkDljQwn9Mr84flRNWJxaf4qfKLQZEY.0MiHk310N6jlfbVvAAIdm0elbAyIvY9wf6FHR3DYWZ/rMNAFgoZ4bLrBTsvRvtLx.NvKK8Zb4qz2lLgtFCgqfNjp4X1sjEWFtpQGBur8olbFAibgQ5cxJ6OaCaT8qiH37.s/yNVv2SnVL0BpUPPjmPpv/NOTPNHgQ/4ZVWjNYxk3jCEOYTYSmvHNwKTGvUZjSY.R8fEKMuraKWsX0zPoKvW8vX0a7UfExt0AlIzWogDEAblduX2gA/MxQfDN1ekvO
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):103
                      Entropy (8bit):4.493835447768373
                      Encrypted:false
                      SSDEEP:3:URZqeeLfCXdQFiFyy6HAe+WA6nWZmrXpn:Ui5LKuFiFr6HAe+WfWErZn
                      MD5:9556062A739F56D168C1581A11192A17
                      SHA1:81EE37E3990A004B9F50CBE99D512A5A5247AA90
                      SHA-256:D151A50870503A2D394E3FFD65E2C0DAED043AE1E54C974E80AF811C7A60C78E
                      SHA-512:57AB815C4F4F4F7C96D05A714F6CFEBD3DF47EC5C5E8363E07C3180E05BBECB03A472690EDE29BB8690B2E2C0570B5512338B13710E031DE8622D68667031D92
                      Malicious:false
                      Preview:/* Enable experimental Windows trust store support */..pref("security.enterprise_roots.enabled", true);
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):798720
                      Entropy (8bit):6.523188898405281
                      Encrypted:false
                      SSDEEP:24576:uN/cDx/LcwkjTGAq8f54Y6ifuGJk3c8IXRvg/W68IALE/ZcaFL4FzS17BAw:6ci+m9LEazS1
                      MD5:A1C4628D184B6AB25550B1CE74F44792
                      SHA1:C2C447FD2FDA68C0EC44B3529A2550D2E2A8C3BC
                      SHA-256:3F997D3F1674DE9FD119F275638861BC229352F12C70536D8C83A70FCC370847
                      SHA-512:07737AC24C91645D9B4D376327B84CB0B470CECBAD60920D7EE0E9B11EF4EEB8EE68FB38BF74B5D1F8817D104CECC65E461950242D940E8FF9CA64CE9D3FFBB7
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........^..............T.......Y......l.......[..............m.T.....\.......].......Z.....Rich............PE..L....A.O...........!.....2..........V;.......P...............................p............@..........................z..zb...Z..................................TS..................................0Z..@............P...............................text...^0.......2.................. ..`.rdata.......P.......6..............@..@.data...............................@....rsrc...............................@..@.reloc...\.......^..................@..B................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):14336
                      Entropy (8bit):5.794541181301596
                      Encrypted:false
                      SSDEEP:192:y39iNAtUyE7ioVwAFzuh+pOWo1v26wJMnnnLIQBIc3X7PVlD6QHS6CV+:mRUyZoVwAFzusie6wcZxrPVlpHS6c+
                      MD5:1FAE68B740F18290B98B2F9E23313CC2
                      SHA1:FA3545DC8DB38B3B27F1009E1D61DC2949DF3878
                      SHA-256:751C2156DC00525668DD990D99F7F61C257951C3FAD01C0EE6359FCDFF69F933
                      SHA-512:5386AAD83C76C625E2D64439B2B25BDA8D0F8B1EB9344B58306883B66675D1F1E98E3189C1BC29CD4B2C98A9D4A594761488AAE04D3748BBA5775A51425B11EC
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......vx..2...2...2...;aS.0...]o^.3...]ok.0...]o\.7...2.......]oj.(...]o[.3...]oZ.3...]o].3...Rich2...................PE..L...oA.O...........!.................'.......0...............................p............@......................... 8.......3..P....P.......................`.......................................3..@............0...............................text...T........................... ..`.rdata.......0......."..............@..@.data........@......................@....rsrc........P.......0..............@..@.reloc.......`.......4..............@..B........................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:MS Windows icon resource - 5 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                      Category:dropped
                      Size (bytes):99678
                      Entropy (8bit):2.399880160860077
                      Encrypted:false
                      SSDEEP:384:ckeXhftI9DRRRQwXF6jI2PmdFUMUaaS8FPm0AjaP:ZexftsDRRRPSP
                      MD5:C6B1F4998CA0242B1EB448C9694EFF20
                      SHA1:D002E4878B16AFD33885553F3507BA2BC23E2179
                      SHA-256:15C5C4D9FC4E4FCD10D130A558D4F89931340B40EB6FAECB0BCE1FB5CCCC1CAB
                      SHA-512:902117AA14D95A3493D4DB341CE1DCBCF07D8ADA9DF8E4B29100C5FC7D8E732245D9512AE378C9BF2EAA2AEA9B371F089D0BCDD66B71B1EEF84D931874E8528A
                      Malicious:false
                      Preview:............ .h...V... .... .........00.... ..%..f...@@.... .(B...;........ .(...6}..(....... ..... .....@...................................................................................................................................................................................................................................................................................................................................................uW....Y....wY..y[..uW..uW..wZ....n....uW.....}`........Y..f..uW....Y...x.uW....p.uW....H...=.uW....I.uW.....uW....O...Y..f..uW..}a..x[...f.....uW.........vX..wY..uW...._..k..}a....R..f..uW....C....y\..{^..uW.........vX..x[..uW...i......}a...i...f..uW...n$...\.vX...i..uW...u...m".vY....[.uW..uW........M.uW...f...w1..w1..w1...N.....w1..w1...@........w1..z6.........w1...D...........................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):2685
                      Entropy (8bit):7.881499470740637
                      Encrypted:false
                      SSDEEP:48:R5t7MR3RzOzFv1Zbiyp8wST7kLxC7XPYgT7a0FSpczbVn0q+dBzl:N7MzCpjiyp8wNczPYSe8SuR0/BJ
                      MD5:CB24F524AB36239CDA47EBEB8CBD6EDB
                      SHA1:4CDC6226288F2D5868C48457F124569ECB91608F
                      SHA-256:7EE7F861AF655E38B08FC3112E0B19C518673251478B2DD44C2580659FE402F0
                      SHA-512:C1BA2485C5900BBE5B0A7AEEA8856EE77DE8D1544F2F71EFFCA80F3E8DD49B01C309AD3163740263F027AB66ECBDB679B8609AC601D33F98670E406C4C6604B0
                      Malicious:false
                      Preview:0..y...0..?..*.H.........0...,0..(0.....*.H..........0......0.....*.H......0...*.H.......0...=......[..........R^b...o...VY..<...".NR.FTS[Fd.W.8..= rY.......p./.^..1..0U/...i....[Q.@.KLPg.....<...m.....:/Z.....O7}....y5.Y..\..).W.E.G.....#.$._.O.......,.t..+:.....wX.....G!RYM.1i..........G!.S.uX.].S30.M.......Y.*d..':......{Z.^W....&..n....A.4.>...F.:A ...ah..m.I..b....s:.........6.y.xH3t!0.dT.N)...nE.......~r..!......=..YQ..n..nlr.z[*..0.P.\E_...4...U..y:.._56O\C..4.5&.J...+.... /..............^..l3..+_:....#.<,........f,.L/".'...QA...1J'9>...........xM..Gz...Ih.4F.R.q...%.J.......oTS.W6C..L#...K\.r7...de.B..)Go...I..w...5..B.Z.s1KmU...Y*.x).......2gp@..uI..#......3.Hv.5.?..-X.a.........W....=B>...]:..H..c...B.......czdNc.v..?..xP..R...I.(T...CpI.<.H>.a.....R..}R.._v..w....L...X..4=....nX.xn....mn.yfG...lV....xE.$...._.-.....P..Xq3Y)=..yvD........7..2.3...O...N.55h..f.."y.h.`.~M...E..B....l~~.S|... 4.h...3..G.o.G.;.*`.Tr..M..8.B.....+u.#C.....
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):56
                      Entropy (8bit):4.503434386188784
                      Encrypted:false
                      SSDEEP:3:RBkAe+WA6nWZmrXpn:rkAe+WfWErZn
                      MD5:E40A3D559E4B85251943E071CD036D90
                      SHA1:10FC58DF075108C912589F7954244A807776A0FB
                      SHA-256:E179CA82C741D7D4842E42BC339C0E2C9BEFA1A5EFFE33D69D6821B3121FECCA
                      SHA-512:07CC337D7EB364FC78B0B36ACBE9F89B85D932B3D616B8EDFB5F12214ECD17853ECAC4725CAE929CCE8A803D868FC3F5A5AD4D394554BB4783B0CCAFEA981959
                      Malicious:false
                      Preview://..lockPref("security.enterprise_roots.enabled", true);
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):236
                      Entropy (8bit):5.232996410780511
                      Encrypted:false
                      SSDEEP:6:rFHGxQ61kH7HE9bwe9hc1axKsyGpeJ/nleB/H7HE9bkgjqY1axKs5v:r026ebH279hc14KsyNJ/nAB/bH2714Ks
                      MD5:0A7F6C64EEF31DDB78A7EA184A1E526C
                      SHA1:222BB7F9444AE8124EAE1F243DCEA4436A32D3AD
                      SHA-256:FDCDD7E21E9CCEDACB8BFC166FD945F2CB08979682BD15E70A88BBAAC48714EA
                      SHA-512:A9C38DE565354EAF5ADBB714A409056DAF73E7B2F1CCFE4D26D91C687351CE29A8DEA34DA73FC829F0852A5A5E0839A7E4D4AA68802607AA55974F538A5EA5E4
                      Malicious:false
                      Preview:FOR /F "tokens=*" %%A IN ('dir /B "%APPDATA%\Mozilla\Firefox\Profiles\*.default*"') DO set FIREFOX_PROFILE_DIR=%%A..certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "%APPDATA%\Mozilla\Firefox\Profiles\%FIREFOX_PROFILE_DIR%\." -i %1..
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):199680
                      Entropy (8bit):6.678065290017203
                      Encrypted:false
                      SSDEEP:3072:/zcwXcVnDhH5YI6KkEK7207EmrRelzafK+AnF4xH6dVHwpXpE92jDBSRYO6s0eEw:TUDF5YTyBJuF6DHwpXpfSRYO6Z
                      MD5:6E84AF2875700285309DD29294365C6A
                      SHA1:FC3CB3B2A704250FC36010E2AB495CDC5E7378A9
                      SHA-256:1C158E680749E642E55F721F60A71314E26E03E785CD92E560BF650B83C4C3C8
                      SHA-512:0ADD9479B2FD631BAFC617C787BCA331E915EDC6A29DD72269B6A24490EC1C85E677698E07944F5FF3BD8D849D3D20ACE61A194A044C697FEFCF992C6F05E747
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Wp.6...6...6..-x...6...@...6...@...6...@...6...N...6...6..m6...@...6...@...6...@...6...@...6..Rich.6..........PE..L...lA.O...........!.....^...........h.......p...............................p............@..............................+..<...x....0.......................@..."..................................X...@............p..`............................text....].......^.................. ..`.rdata...s...p...t...b..............@..@.data...P(..........................@....tls......... ......................@....rsrc........0......................@..@.reloc...&...@...(..................@..B................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):14336
                      Entropy (8bit):5.794541181301596
                      Encrypted:false
                      SSDEEP:192:y39iNAtUyE7ioVwAFzuh+pOWo1v26wJMnnnLIQBIc3X7PVlD6QHS6CV+:mRUyZoVwAFzusie6wcZxrPVlpHS6c+
                      MD5:1FAE68B740F18290B98B2F9E23313CC2
                      SHA1:FA3545DC8DB38B3B27F1009E1D61DC2949DF3878
                      SHA-256:751C2156DC00525668DD990D99F7F61C257951C3FAD01C0EE6359FCDFF69F933
                      SHA-512:5386AAD83C76C625E2D64439B2B25BDA8D0F8B1EB9344B58306883B66675D1F1E98E3189C1BC29CD4B2C98A9D4A594761488AAE04D3748BBA5775A51425B11EC
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......vx..2...2...2...;aS.0...]o^.3...]ok.0...]o\.7...2.......]oj.(...]o[.3...]oZ.3...]o].3...Rich2...................PE..L...oA.O...........!.................'.......0...............................p............@......................... 8.......3..P....P.......................`.......................................3..@............0...............................text...T........................... ..`.rdata.......0......."..............@..@.data........@......................@....rsrc........P.......0..............@..@.reloc.......`.......4..............@..B........................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):12288
                      Entropy (8bit):5.576295270591411
                      Encrypted:false
                      SSDEEP:192:y8/u6mEWZYr/YDmJrFirLPAxHU413X7PVlD63YlFfP:1/uHE6Yr/Y+h0AlU4prPVlZlFfP
                      MD5:9AE76DB13972553A5DE5BDD07B1B654D
                      SHA1:0C4508EB6F13B9B178237CCC4DA759BFF10AF658
                      SHA-256:38A906373419501966DAF6EC19CA2F8DB7B29609128AE5CB424D2AA511652C29
                      SHA-512:DB6FD98A2B27DD7622F10491BBA08793D26AB59016D6862168AAD278644F737DDDBD312A690DED5091D5E999DC3C3518FD95B200124BE8349829E5CE6685CF4B
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................g......j......_......h............^......o......n......i....Rich............................PE..L...mA.O...........!.................".......0...............................p............@.........................P6......l2..P....P.......................`.......................................1..@............0...............................text............................... ..`.rdata..R....0......................@..@.data........@.......&..............@....rsrc........P.......(..............@..@.reloc..(....`.......,..............@..B................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):90
                      Entropy (8bit):4.4385634049235
                      Encrypted:false
                      SSDEEP:3:iDVDuE8Lxm0wf9sDuE8LzLpFw6XFn:iDVDopDoNjXF
                      MD5:30573ACFC9586271A3F800A10C284479
                      SHA1:9CC1A1329258379698A04C33DC5D62E9CE8E06FD
                      SHA-256:30B9CF8F9760BCD38617A3878D43FC19E981C6DD13D6400C2A19D2ECAB746CB5
                      SHA-512:4A6DF4E50D8C04AD9E65A9D183D4C8B723FCB50E1E786018010A33CEE2B4F73296045864FFFB526D887579BEC8EC5C4CA5353127FB07E632B18C5B4684719015
                      Malicious:false
                      Preview:pref("general.config.obscure_value", 0);..pref("general.config.filename", "umbrella.cfg");
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):798720
                      Entropy (8bit):6.523188898405281
                      Encrypted:false
                      SSDEEP:24576:uN/cDx/LcwkjTGAq8f54Y6ifuGJk3c8IXRvg/W68IALE/ZcaFL4FzS17BAw:6ci+m9LEazS1
                      MD5:A1C4628D184B6AB25550B1CE74F44792
                      SHA1:C2C447FD2FDA68C0EC44B3529A2550D2E2A8C3BC
                      SHA-256:3F997D3F1674DE9FD119F275638861BC229352F12C70536D8C83A70FCC370847
                      SHA-512:07737AC24C91645D9B4D376327B84CB0B470CECBAD60920D7EE0E9B11EF4EEB8EE68FB38BF74B5D1F8817D104CECC65E461950242D940E8FF9CA64CE9D3FFBB7
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........^..............T.......Y......l.......[..............m.T.....\.......].......Z.....Rich............PE..L....A.O...........!.....2..........V;.......P...............................p............@..........................z..zb...Z..................................TS..................................0Z..@............P...............................text...^0.......2.................. ..`.rdata.......P.......6..............@..@.data...............................@....rsrc...............................@..@.reloc...\.......^..................@..B................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):370176
                      Entropy (8bit):6.863300763286356
                      Encrypted:false
                      SSDEEP:6144:eeP90QTcdMTWfpUwFygo5zUM38ME/Hs3nXHkUX:eA/TcWTWfpf0gmzY03nXHkUX
                      MD5:D1243817A1B22B855DE0852CF5B53BF5
                      SHA1:C64F4851A2FCFE8D1E4A5B5743498870B676755E
                      SHA-256:93E99CFBA00348BE3A102DC9F41ACD39BBA91D7F4E0149A9EA6C53FCC50ADAEE
                      SHA-512:59ABD87F8DA58F0F4D8D3919A84B2E4FA853AA0E76DBFEA3BC011E21267909ED7C3BB42A714F030773767329A8D3DA0810E789AB5A061BC0E4452159849C4CC2
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......??fs{^. {^. {^. r&. y^. .(. z^. .(. y^. .(. r^. {^. C^. .(. R^. .(. z^. .(. z^. .(. z^. Rich{^. ................PE..L....A.O...........!......................................................................@..........................6..P...L1..x...............................t,...................................0..@............................................text............................... ..`.rdata..07.......8..................@..@.data....T...@...R... ..............@....rsrc................r..............@..@.reloc.../.......0...v..............@..B........................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):108544
                      Entropy (8bit):6.45689405407938
                      Encrypted:false
                      SSDEEP:3072:ES2ipxnUGhrFxZHkZvmYHG+iI2iV6nu+ZfX6AKVqzzF+:ES2ipxUSwv/m+1rAKVqz5
                      MD5:051652BA7CA426846E936BC5AA3F39F3
                      SHA1:0012007876DDE3A2D764249AD86BC428300FE91E
                      SHA-256:8ECA993570FA55E8FE8F417143EEA8128A58472E23074CBD2E6AF4D3BB0F0D9A
                      SHA-512:005B22BD5A4CCA9930C5ECA95AF01FC034BB496F4E599CAC3F20B0B9CE0957B4DB685B8E47977E5B289DC5CF1C8A81F4DD7434D0347E41D008E2C8F7F12006F0
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........D[...[...[...R...Y.......S...4...Z...4...Y...4...P...[......4./.z...4...Z...4...Z...4...Z...Rich[...........................PE..L....A.O...........!.....n...:.......w....................................................@............................................................................................................@...............D............................text....l.......n.................. ..`.rdata...............r..............@..@.data...............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):93696
                      Entropy (8bit):6.44977499578729
                      Encrypted:false
                      SSDEEP:1536:W3Hq5zbjpPQ4Y0epuuwCbDz5xAFKL8kycL7:gHQxPQfGuz5uFKL8kyu7
                      MD5:C26E940B474728E728CAFE5912BA418A
                      SHA1:7256E378A419F8D87DE71835E6AD12FAADAAAF73
                      SHA-256:1AF1AC51A92B36DE8D85D1F572369815404912908C3A489A6CD7CA2350C2A93D
                      SHA-512:BD8673FACD416C8F2EB9A45C4DEEF50E53D0BC41E6B3941FC20CDA8E2D88267205526DADB44BD89869BD333BF7D6F8DB589C95997E1F3322F7A66A09D562B1DF
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................`....C.k.....m.....X.....o...........Y.....h.....i.....n....Rich...........PE..L....A.O...........!................p.....................................................@..........................O.......F..x...................................................................0F..@...............l............................text...~........................... ..`.rdata..............................@..@.data........p.......Z..............@....rsrc................\..............@..@.reloc...............`..............@..B........................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:data
                      Category:dropped
                      Size (bytes):2685
                      Entropy (8bit):7.881499470740637
                      Encrypted:false
                      SSDEEP:48:R5t7MR3RzOzFv1Zbiyp8wST7kLxC7XPYgT7a0FSpczbVn0q+dBzl:N7MzCpjiyp8wNczPYSe8SuR0/BJ
                      MD5:CB24F524AB36239CDA47EBEB8CBD6EDB
                      SHA1:4CDC6226288F2D5868C48457F124569ECB91608F
                      SHA-256:7EE7F861AF655E38B08FC3112E0B19C518673251478B2DD44C2580659FE402F0
                      SHA-512:C1BA2485C5900BBE5B0A7AEEA8856EE77DE8D1544F2F71EFFCA80F3E8DD49B01C309AD3163740263F027AB66ECBDB679B8609AC601D33F98670E406C4C6604B0
                      Malicious:false
                      Preview:0..y...0..?..*.H.........0...,0..(0.....*.H..........0......0.....*.H......0...*.H.......0...=......[..........R^b...o...VY..<...".NR.FTS[Fd.W.8..= rY.......p./.^..1..0U/...i....[Q.@.KLPg.....<...m.....:/Z.....O7}....y5.Y..\..).W.E.G.....#.$._.O.......,.t..+:.....wX.....G!RYM.1i..........G!.S.uX.].S30.M.......Y.*d..':......{Z.^W....&..n....A.4.>...F.:A ...ah..m.I..b....s:.........6.y.xH3t!0.dT.N)...nE.......~r..!......=..YQ..n..nlr.z[*..0.P.\E_...4...U..y:.._56O\C..4.5&.J...+.... /..............^..l3..+_:....#.<,........f,.L/".'...QA...1J'9>...........xM..Gz...Ih.4F.R.q...%.J.......oTS.W6C..L#...K\.r7...de.B..)Go...I..w...5..B.Z.s1KmU...Y*.x).......2gp@..uI..#......3.Hv.5.?..-X.a.........W....=B>...]:..H..c...B.......czdNc.v..?..xP..R...I.(T...CpI.<.H>.a.....R..}R.._v..w....L...X..4=....nX.xn....mn.yfG...lV....xE.$...._.-.....P..Xq3Y)=..yvD........7..2.3...O...N.55h..f.."y.h.`.~M...E..B....l~~.S|... 4.h...3..G.o.G.;.*`.Tr..M..8.B.....+u.#C.....
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):97792
                      Entropy (8bit):6.240650542976671
                      Encrypted:false
                      SSDEEP:1536:xtTRGG7+CF7k9QTPHkis9rGDE9tJ7kdsolb5XpIKz1TpNs6IRcgAGEFDGSs1f8b6:xGG6CF7k9QbHkCE9tJ7kdsW5Xh5s6IRV
                      MD5:A5C670EDF4411BF7F132F4280026137B
                      SHA1:C0E3CBDDE7D3CEBF41A193EECA96A11CE2B6DA58
                      SHA-256:ABA2732C7A016730E94E645DD04E8FAFCC173FC2E5E2AAC01A1C0C66EAD1983E
                      SHA-512:ACFCDE89A968D81363AE1CD599A6A362B047AE207722FEA8541577AC609BC5FEFB2231ED946E13F0B4B3BCD56B947C13837C1B9E360D521EC7D580BEFCBB0F46
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r...6.k.6.k.6.k.?...4.k.Y...7.k.Y...4.k.Y...;.k.6.j..k.Y.....k.Y..7.k.Y..7.k.Y...7.k.Rich6.k.........................PE..L....A.O...........!.........j...............0............................................@.........................Pj..v...\N.......................................................................M..@............0...............................text............................... ..`.rdata...S...0...T..................@..@.data...h............l..............@....rsrc................n..............@..@.reloc...............r..............@..B................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):172544
                      Entropy (8bit):6.496240878001019
                      Encrypted:false
                      SSDEEP:3072:KfHTwBGo4uYvGG3byHhQNP4IP/zsu9zvKwMNJ+Z/9tRpK:KsGTudG3GHhMz3SNY9R
                      MD5:2AB31C9401870ADB4E9D88B5A6837ABF
                      SHA1:4F0FDD699E63F614D79ED6E47EF61938117D3B7A
                      SHA-256:22ECECE561510F77B100CFF8109E5ED492C34707B7B14E0774AAA9CA813DE4AD
                      SHA-512:BC58C4DA15E902351F1F161E9D8C1EE4D10ACEB5EDA7DEF4B4454CADF4CD9F437118BA9D63F25F4F0A5694E9D34A4DEF33D40AD51EFB1CDEBB6F02A81C481871
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.e./.6./.6./.6.W.6./.6;a.6./.6.Y.6./.6.Y36./.6.Y.6./.6./.61/.6.Y26./.6.Y.6./.6.Y.6./.6.Y.6./.6Rich./.6................PE..L....A.O...........!.....*...x.......3.......@............................................@.................................<...................................|...................................x...@............@...............................text....(.......*.................. ..`.rdata...O...@...P..................@..@.data................~..............@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):423936
                      Entropy (8bit):6.751461394308889
                      Encrypted:false
                      SSDEEP:6144:Cf41DoFqNI3Cm39XWYJkW07RlqHYOE1o2exosU8iZEJKvncrghAvLWDKnADA3/AF:DD76rrQ7ngYLo2MliPSghmLYk3/n
                      MD5:B58848A28A1EFB85677E344DB1FD67E6
                      SHA1:DAD48E2B2B3B936EFC15AC2C5F9099B7A1749976
                      SHA-256:00DB98AB4D50E9B26ECD193BFAD6569E1DD395DB14246F8C233FEBBA93965F7A
                      SHA-512:762B3BD7F1F1A5C3ACCDE8C36406B9BEADD4270C570EB95A05935C1F7731513938AE5E99950C648B1EACDD2A85F002319B78B7E4EA9577C72335A2FA54796B13
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,J..h+.Yh+.Yh+.YaS0Yj+.Y.]?Yk+.Yh+.Y&+.Y.]=Yd+.Y.].Yj+.Y.].Yf+.Y.]8Yi+.Y.]>Yi+.YRichh+.Y........................PE..L....A.O...........!......................................................................@..........................J.......C..<...............................@&..................................@B..@...............@............................text............................... ..`.rdata..............................@..@.data........`.......D..............@....reloc..Z(.......*...N..............@..B................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):190976
                      Entropy (8bit):6.662915165682162
                      Encrypted:false
                      SSDEEP:3072:82ya/vPWqodwFYAjkiV6vnjBr/WPUShgk04YZEnhacoAX8+FeHbnGmgjZzpTBfRP:j7JoiVGj+hIWNmKFpTBJ8B
                      MD5:717DBDF0E1F616EA8A038259E273C530
                      SHA1:926CE8EC8F79B62202ED487C5FB0C3E1A18F5F70
                      SHA-256:E3227EA4C39F5B44F685EEA13D9F6663945E46B12CABE5D29DAEF28B6EEF1A9B
                      SHA-512:C09BF38AC93C350DFD0638BEEDD40FBCC9435A06B0013D214F57B181C1B4292E4B8A8310DB2DB48200BCFED872BC656EA92A207ACB6F7B344E3F134226C2AB3F
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 3%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Af......................jq......jq=.....jq..............jq<.5...jq......jq......jq......Rich............................PE..L....A.O...........!.................".......0............................... ............@.........................p...j.......................................l......................................@............0...............................text............................... ..`.rdata......0......................@..@.data...<...........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):56
                      Entropy (8bit):4.503434386188784
                      Encrypted:false
                      SSDEEP:3:RBkAe+WA6nWZmrXpn:rkAe+WfWErZn
                      MD5:E40A3D559E4B85251943E071CD036D90
                      SHA1:10FC58DF075108C912589F7954244A807776A0FB
                      SHA-256:E179CA82C741D7D4842E42BC339C0E2C9BEFA1A5EFFE33D69D6821B3121FECCA
                      SHA-512:07CC337D7EB364FC78B0B36ACBE9F89B85D932B3D616B8EDFB5F12214ECD17853ECAC4725CAE929CCE8A803D868FC3F5A5AD4D394554BB4783B0CCAFEA981959
                      Malicious:false
                      Preview://..lockPref("security.enterprise_roots.enabled", true);
                      Process:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      File Type:PE32+ executable (console) x86-64, for MS Windows
                      Category:dropped
                      Size (bytes):6144
                      Entropy (8bit):4.720366600008286
                      Encrypted:false
                      SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                      MD5:E4211D6D009757C078A9FAC7FF4F03D4
                      SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                      SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                      SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):3218944
                      Entropy (8bit):6.344016161695555
                      Encrypted:false
                      SSDEEP:49152:6EA9P+bz2cHPcUb6HSb4SOEMkBeH7nQckO6bAGx7jXTV63338F:K92bz2Eb6pd7B6bAGx7M333K
                      MD5:A5388235BBD3513D95A2A5C172A55680
                      SHA1:E9BEB5AE74748344085EFC937D8B5ACFCF194E7B
                      SHA-256:109DFA3633727AEE046973A9D59DFD493C4F4EDFA50BCBCC37999C4BF020550F
                      SHA-512:68E6111FFEB231668914C66D2A09BC21F5FC616767284AF699919AE98B09082C0F89D567CF6CB33B087C5F0C59B4CE813836CD12EEC62E54AA10A584EC4FD970
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...(..`.................:,.........`F,......P,...@...........................2...........@......@....................-......p-.29....-.L.....................................................-......................y-.......-......................text.....,.......,................. ..`.itext...(... ,..*....,............. ..`.data........P,......>,.............@....bss.....y....,..........................idata..29...p-..:....,.............@....didata.......-.......-.............@....edata........-.......-.............@..@.tls....L.....-..........................rdata..].....-.......-.............@..@.rsrc...L.....-.......-.............@..@..............1.......0.............@..@........................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe
                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):3218944
                      Entropy (8bit):6.344016460665066
                      Encrypted:false
                      SSDEEP:49152:6EA9P+bz2cHPcUb6HSb4SOEMkBeH7nQckO6bAGx7jXTV633385:K92bz2Eb6pd7B6bAGx7M333e
                      MD5:05CB53C8116FA798AB00B737F7B94015
                      SHA1:BC5F54566CA4A156030372CEFEAD56540FB3D9FF
                      SHA-256:41355B9DE8550C19DE59BA6555BAC91BCCA1529F0EABFF8C239A7B151F4012EB
                      SHA-512:66E96ACA190FD2069C6E24B37EDE8F38D1B0E3D11696E93AD09E0EBDF3E8809D49D0C9B0E5C68F479E88F6440302E07A1D5327BE489D1095DAD0746657ACDEAE
                      Malicious:true
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...(..`.................:,.........`F,......P,...@...........................2...........@......@....................-......p-.29....-.L.....................................................-......................y-.......-......................text.....,.......,................. ..`.itext...(... ,..*....,............. ..`.data........P,......>,.............@....bss.....y....,..........................idata..29...p-..:....,.............@....didata.......-.......-.............@....edata........-.......-.............@..@.tls....L.....-..........................rdata..].....-.......-.............@..@.rsrc...L.....-.......-.............@..@..............1.......0.............@..@........................................................
                      Process:C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):19
                      Entropy (8bit):3.5110854081804286
                      Encrypted:false
                      SSDEEP:3:RoHQGQB5:RZGU5
                      MD5:E3AC0178A28CF8E44D82A62FAE2290D7
                      SHA1:C0F1C66E831ADD5EA81B19BFA0E85D1D2CA192BA
                      SHA-256:2C61108AC0158F555B0632F5658D79D502B0929F2090848A7DEB77158667D43C
                      SHA-512:F7C2290526630DEF784459621007F389D720034D3BCE1EFF9B761C7A959061FDB465B9D239290EB543E7B0CFB41682361D0400459621F8756A8A09782F33693A
                      Malicious:false
                      Preview:CertMgr Succeeded..
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.817721379244328
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 98.45%
                      • Inno Setup installer (109748/4) 1.08%
                      • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                      • Win16/32 Executable Delphi generic (2074/23) 0.02%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      File name:RDM_Root_Cert_Update_Windows.exe
                      File size:3'838'992 bytes
                      MD5:d4b2995d38da119e5b0db2cb90778224
                      SHA1:2570198aafaf5d6f394ffd6e7e741c2316510ee0
                      SHA256:05a6215fbf82c755b73dcfa297f229bf5b88c879b4a7a2edf680ebd97a4580ad
                      SHA512:a611e1fbd0b9997e395f1b829e4b08f833cf5d70e9e846c7eb81d8faeef9fee4af11fc43f4f47776692595ed880eda6b7fd68210cc381984fb70ccf75d680366
                      SSDEEP:98304:uSiKiNyE3pWHFowVGfO1xW8zjoix6b8/CEqvV0CAe:/KyE5WHFowQsxVwzE/cH
                      TLSH:CD06F13BB298753EC45A0B364573A220587BBEA1BC1A8C1E5BF0381DDF760B11E3B655
                      File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                      Icon Hash:54525a4a525e5600
                      Entrypoint:0x4b5eec
                      Entrypoint Section:.itext
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x60B88E27 [Thu Jun 3 08:09:11 2021 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:1
                      File Version Major:6
                      File Version Minor:1
                      Subsystem Version Major:6
                      Subsystem Version Minor:1
                      Import Hash:5a594319a0d69dbc452e748bcf05892e
                      Signature Valid:true
                      Signature Issuer:CN=GlobalSign GCC R45 CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                      Signature Validation Error:The operation completed successfully
                      Error Number:0
                      Not Before, Not After
                      • 26/03/2024 21:00:39 27/03/2025 21:00:39
                      Subject Chain
                      • E=certadmin@deluxe.com, CN=Deluxe Corporation, O=Deluxe Corporation, L=Shoreview, S=Minnesota, C=US
                      Version:3
                      Thumbprint MD5:BEF0171825682D9817D1C9940167515E
                      Thumbprint SHA-1:DB6FF586745306742F40BE5C5A9A1CFB5CA60DFF
                      Thumbprint SHA-256:33443DC874D3E0CD8D3D0076DCA011CF28A961E83940EC357D8D2FCF87DCD4BF
                      Serial:7D9B3C2EFCA6B8143D0373D7
                      Instruction
                      push ebp
                      mov ebp, esp
                      add esp, FFFFFFA4h
                      push ebx
                      push esi
                      push edi
                      xor eax, eax
                      mov dword ptr [ebp-3Ch], eax
                      mov dword ptr [ebp-40h], eax
                      mov dword ptr [ebp-5Ch], eax
                      mov dword ptr [ebp-30h], eax
                      mov dword ptr [ebp-38h], eax
                      mov dword ptr [ebp-34h], eax
                      mov dword ptr [ebp-2Ch], eax
                      mov dword ptr [ebp-28h], eax
                      mov dword ptr [ebp-14h], eax
                      mov eax, 004B10F0h
                      call 00007F875447C155h
                      xor eax, eax
                      push ebp
                      push 004B65E2h
                      push dword ptr fs:[eax]
                      mov dword ptr fs:[eax], esp
                      xor edx, edx
                      push ebp
                      push 004B659Eh
                      push dword ptr fs:[edx]
                      mov dword ptr fs:[edx], esp
                      mov eax, dword ptr [004BE634h]
                      call 00007F875451E87Fh
                      call 00007F875451E3D2h
                      lea edx, dword ptr [ebp-14h]
                      xor eax, eax
                      call 00007F8754491BC8h
                      mov edx, dword ptr [ebp-14h]
                      mov eax, 004C1D84h
                      call 00007F8754476D47h
                      push 00000002h
                      push 00000000h
                      push 00000001h
                      mov ecx, dword ptr [004C1D84h]
                      mov dl, 01h
                      mov eax, dword ptr [004237A4h]
                      call 00007F8754492C2Fh
                      mov dword ptr [004C1D88h], eax
                      xor edx, edx
                      push ebp
                      push 004B654Ah
                      push dword ptr fs:[edx]
                      mov dword ptr fs:[edx], esp
                      call 00007F875451E907h
                      mov dword ptr [004C1D90h], eax
                      mov eax, dword ptr [004C1D90h]
                      cmp dword ptr [eax+0Ch], 01h
                      jne 00007F8754524EEAh
                      mov eax, dword ptr [004C1D90h]
                      mov edx, 00000028h
                      call 00007F8754493524h
                      mov edx, dword ptr [004C1D90h]
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0xc40000x9a.edata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc20000xf36.idata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x1e754.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x3a62b80x3158
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0xc60000x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0xc22e40x244.idata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xc30000x1a4.didata
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000xb361c0xb3800ad6e46e3a3acdb533eb6a077f6d065afFalse0.3448639341051532data6.356058204328091IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .itext0xb50000x16880x1800d40fc822339d01f2abcc5493ac101c94False0.544921875data5.972750055221053IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .data0xb70000x37a40x38004c195d5591f6d61265df08a3733de3a2False0.36097935267857145data5.044400562007734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .bss0xbb0000x6de80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .idata0xc20000xf360x1000a73d686f1e8b9bb06ec767721135e397False0.3681640625data4.8987046479600425IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .didata0xc30000x1a40x20041b8ce23dd243d14beebc71771885c89False0.345703125data2.7563628682496506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .edata0xc40000x9a0x20037c1a5c63717831863e018c0f51dabb7False0.2578125data1.8722228665884297IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .tls0xc50000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rdata0xc60000x5d0x2008f2f090acd9622c88a6a852e72f94e96False0.189453125data1.3838943752217987IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .rsrc0xc70000x1e7540x1e800b71fbe8719fa2368d3fd04dcc632bceaFalse0.22003073770491804data3.605316662907013IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xc75280x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/mEnglishUnited States0.42021276595744683
                      RT_ICON0xc79900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/mEnglishUnited States0.2804878048780488
                      RT_ICON0xc8a380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/mEnglishUnited States0.2024896265560166
                      RT_ICON0xcafe00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/mEnglishUnited States0.1614903164855928
                      RT_ICON0xcf2080x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/mEnglishUnited States0.08491068259789424
                      RT_ICON0xdfa300x2db4PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9390598290598291
                      RT_STRING0xe27e40x360data0.34375
                      RT_STRING0xe2b440x260data0.3256578947368421
                      RT_STRING0xe2da40x45cdata0.4068100358422939
                      RT_STRING0xe32000x40cdata0.3754826254826255
                      RT_STRING0xe360c0x2d4data0.39226519337016574
                      RT_STRING0xe38e00xb8data0.6467391304347826
                      RT_STRING0xe39980x9cdata0.6410256410256411
                      RT_STRING0xe3a340x374data0.4230769230769231
                      RT_STRING0xe3da80x398data0.3358695652173913
                      RT_STRING0xe41400x368data0.3795871559633027
                      RT_STRING0xe44a80x2a4data0.4275147928994083
                      RT_RCDATA0xe474c0x10data1.5
                      RT_RCDATA0xe475c0x2c4data0.6384180790960452
                      RT_RCDATA0xe4a200x2cdata1.1818181818181819
                      RT_GROUP_ICON0xe4a4c0x5adataEnglishUnited States0.7444444444444445
                      RT_VERSION0xe4aa80x584dataEnglishUnited States0.27124645892351273
                      RT_MANIFEST0xe502c0x726XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4005464480874317
                      DLLImport
                      kernel32.dllGetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                      comctl32.dllInitCommonControls
                      version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
                      user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                      oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                      netapi32.dllNetWkstaGetInfo, NetApiBufferFree
                      advapi32.dllRegQueryValueExW, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW
                      NameOrdinalAddress
                      TMethodImplementationIntercept30x454060
                      __dbk_fcall_wrapper20x40d0a0
                      dbkFCallWrapperAddr10x4be63c
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSource PortDest PortSource IPDest IP
                      Aug 28, 2024 18:57:53.710097075 CEST53585251.1.1.1192.168.2.4

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:12:57:31
                      Start date:28/08/2024
                      Path:C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe"
                      Imagebase:0x400000
                      File size:3'838'992 bytes
                      MD5 hash:D4B2995D38DA119E5B0DB2CB90778224
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Reputation:low
                      Has exited:true

                      Target ID:1
                      Start time:12:57:32
                      Start date:28/08/2024
                      Path:C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\is-ICJ31.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$1044E,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe"
                      Imagebase:0x400000
                      File size:3'218'944 bytes
                      MD5 hash:A5388235BBD3513D95A2A5C172A55680
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Antivirus matches:
                      • Detection: 0%, ReversingLabs
                      Reputation:low
                      Has exited:true

                      Target ID:2
                      Start time:12:57:37
                      Start date:28/08/2024
                      Path:C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT
                      Imagebase:0x400000
                      File size:2'752'392 bytes
                      MD5 hash:5DAEC5D62A1B06418E5EAE25B7857748
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Reputation:low
                      Has exited:true

                      Target ID:3
                      Start time:12:57:38
                      Start date:28/08/2024
                      Path:C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\is-QJPHV.tmp\RDM_ROOTCERTIFICATE.tmp" /SL5="$104B6,1902883,887296,C:\Users\user\AppData\Local\Temp\is-C0CB8.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT
                      Imagebase:0x400000
                      File size:3'218'944 bytes
                      MD5 hash:05CB53C8116FA798AB00B737F7B94015
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:Borland Delphi
                      Antivirus matches:
                      • Detection: 0%, ReversingLabs
                      Reputation:low
                      Has exited:true

                      Target ID:4
                      Start time:12:57:39
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/certremoval.bat""
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:5
                      Start time:12:57:39
                      Start date:28/08/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:6
                      Start time:12:57:39
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo 1 "
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:7
                      Start time:12:57:39
                      Start date:28/08/2024
                      Path:C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe
                      Wow64 process (32bit):true
                      Commandline:CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root
                      Imagebase:0x1000000
                      File size:59'664 bytes
                      MD5 hash:5D077A0CDD077C014EEDB768FEB249BA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:8
                      Start time:12:57:39
                      Start date:28/08/2024
                      Path:C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe
                      Wow64 process (32bit):true
                      Commandline:CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root
                      Imagebase:0x1000000
                      File size:59'664 bytes
                      MD5 hash:5D077A0CDD077C014EEDB768FEB249BA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:9
                      Start time:12:57:39
                      Start date:28/08/2024
                      Path:C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\certmgr.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/CertMgr.exe" -add -c RDM_RootCA.pem -s -r localmachine Root
                      Imagebase:0x1000000
                      File size:59'664 bytes
                      MD5 hash:5D077A0CDD077C014EEDB768FEB249BA
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:10
                      Start time:12:57:39
                      Start date:28/08/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:11
                      Start time:12:57:39
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp/RdmCert/AddCert.bat" "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\RDM_RootCA.pem""
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:12
                      Start time:12:57:39
                      Start date:28/08/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:13
                      Start time:12:57:39
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\cmd.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*"
                      Imagebase:0x240000
                      File size:236'544 bytes
                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:14
                      Start time:12:57:39
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\certutil.exe
                      Wow64 process (32bit):true
                      Commandline:certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\." -i "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\RDM_RootCA.pem"
                      Imagebase:0xc30000
                      File size:1'277'440 bytes
                      MD5 hash:0DDA4F16AE041578B4E250AE12E06EB1
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:15
                      Start time:12:57:39
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\certutil.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\system32/certutil.exe" f p rdm736 importpfx "C:\Users\user\AppData\Local\Temp\is-F5SOP.tmp\RdmCert\rdm.pfx"
                      Imagebase:0xc30000
                      File size:1'277'440 bytes
                      MD5 hash:0DDA4F16AE041578B4E250AE12E06EB1
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:16
                      Start time:12:57:39
                      Start date:28/08/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:17
                      Start time:12:57:40
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\net.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\system32\net.exe" stop "RDMAppweb"
                      Imagebase:0x4d0000
                      File size:47'104 bytes
                      MD5 hash:31890A7DE89936F922D44D677F681A7F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:18
                      Start time:12:57:40
                      Start date:28/08/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:19
                      Start time:12:57:40
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\net1.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\net1 stop "RDMAppweb"
                      Imagebase:0x8f0000
                      File size:139'776 bytes
                      MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:20
                      Start time:12:57:41
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\net.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\system32\net.exe" stop "Embedthis Rdmappweb"
                      Imagebase:0x4d0000
                      File size:47'104 bytes
                      MD5 hash:31890A7DE89936F922D44D677F681A7F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:21
                      Start time:12:57:41
                      Start date:28/08/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:22
                      Start time:12:57:41
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\net1.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\net1 stop "Embedthis Rdmappweb"
                      Imagebase:0x8f0000
                      File size:139'776 bytes
                      MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:23
                      Start time:12:57:41
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\net.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\system32\net.exe" start "RDMAppweb"
                      Imagebase:0x4d0000
                      File size:47'104 bytes
                      MD5 hash:31890A7DE89936F922D44D677F681A7F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:24
                      Start time:12:57:42
                      Start date:28/08/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:25
                      Start time:12:57:42
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\net1.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\net1 start "RDMAppweb"
                      Imagebase:0x8f0000
                      File size:139'776 bytes
                      MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:26
                      Start time:12:57:42
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\net.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\system32\net.exe" start "Embedthis Rdmappweb"
                      Imagebase:0x4d0000
                      File size:47'104 bytes
                      MD5 hash:31890A7DE89936F922D44D677F681A7F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:27
                      Start time:12:57:42
                      Start date:28/08/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff7699e0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:28
                      Start time:12:57:42
                      Start date:28/08/2024
                      Path:C:\Windows\SysWOW64\net1.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Windows\system32\net1 start "Embedthis Rdmappweb"
                      Imagebase:0x8f0000
                      File size:139'776 bytes
                      MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:7.1%
                        Dynamic/Decrypted Code Coverage:53.2%
                        Signature Coverage:16.8%
                        Total number of Nodes:1751
                        Total number of Limit Nodes:10
                        execution_graph 4072 1006804 4073 10067fc 4072->4073 4073->4072 4076 100740a 4073->4076 4077 100826b 9 API calls 4076->4077 4078 100741e 4077->4078 4079 1006835 4078->4079 4080 100885a 5 API calls 4078->4080 4081 1007438 4080->4081 4082 100885a 5 API calls 4081->4082 4083 100744a 4082->4083 4084 1007471 4083->4084 4085 100885a 5 API calls 4083->4085 4086 1007451 4083->4086 4084->4086 4088 100885a 5 API calls 4084->4088 4085->4084 4087 100885a 5 API calls 4086->4087 4089 10074a1 printf 4086->4089 4090 100749f 4087->4090 4088->4086 4091 100885a 5 API calls 4089->4091 4090->4089 4092 10074c0 4091->4092 4093 10074d4 4092->4093 4094 10074c8 printf 4092->4094 4096 100885a 5 API calls 4093->4096 4095 10074e4 printf 4094->4095 4097 1007525 4095->4097 4100 10074f1 4095->4100 4096->4095 4097->4079 4099 1008811 free 4097->4099 4098 100885a 5 API calls 4098->4100 4099->4079 4100->4097 4100->4098 4101 10061b4 27 API calls 4100->4101 4101->4100 4102 1006587 4103 100657f 4102->4103 4103->4102 4106 100796c 4103->4106 4107 100826b 9 API calls 4106->4107 4108 1007982 4107->4108 4109 10065b8 4108->4109 4110 1007998 4108->4110 4116 10079af 4108->4116 4111 100885a 5 API calls 4110->4111 4112 10079a8 4111->4112 4112->4109 4113 1008811 free 4112->4113 4113->4109 4114 1005be8 29 API calls 4114->4116 4115 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 4115->4116 4116->4112 4116->4114 4116->4115 4117 1007b03 printf 4116->4117 4117->4116 4121 1006b0b 4122 1006b03 4121->4122 4122->4121 4125 1007d47 4122->4125 4126 100826b 9 API calls 4125->4126 4127 1007d5b 4126->4127 4128 1006b41 4127->4128 4129 100885a 5 API calls 4127->4129 4130 1007d74 4129->4130 4131 1007db5 4130->4131 4132 1007d7d printf 4130->4132 4135 1007df2 4131->4135 4136 1007db9 printf 4131->4136 4133 1007d9a 4132->4133 4134 1007dab printf 4132->4134 4137 100885a 5 API calls 4133->4137 4141 1007e02 4134->4141 4140 100885a 5 API calls 4135->4140 4139 10058ed 12 API calls 4136->4139 4137->4134 4142 1007dd7 4139->4142 4140->4141 4141->4128 4144 1008811 free 4141->4144 4143 100885a 5 API calls 4142->4143 4143->4134 4144->4128 4145 1006890 4146 1006888 4145->4146 4146->4145 4149 1007363 4146->4149 4150 100826b 9 API calls 4149->4150 4151 1007377 4150->4151 4152 10068c1 4151->4152 4153 100885a 5 API calls 4151->4153 4154 1007391 4153->4154 4155 100885a 5 API calls 4154->4155 4156 10073af printf 4155->4156 4157 100885a 5 API calls 4156->4157 4158 10073d0 4157->4158 4159 10073e4 4158->4159 4160 10073d8 printf 4158->4160 4162 100885a 5 API calls 4159->4162 4161 10073f4 printf 4160->4161 4161->4152 4163 10073fe 4161->4163 4162->4161 4164 1008811 free 4163->4164 4164->4152 4165 1006618 4166 1006610 4165->4166 4166->4165 4169 10077e6 4166->4169 4170 100826b 9 API calls 4169->4170 4171 10077f9 4170->4171 4172 1006649 4171->4172 4173 100885a 5 API calls 4171->4173 4174 1007813 4173->4174 4175 100783b 4174->4175 4177 100885a 5 API calls 4174->4177 4176 100791f 4175->4176 4179 100885a 5 API calls 4175->4179 4180 100795a 4176->4180 4183 1005d9d 12 API calls 4176->4183 4178 100782a 4177->4178 4181 10058ed 12 API calls 4178->4181 4182 100785a 4179->4182 4180->4172 4184 1008811 free 4180->4184 4181->4175 4185 1007870 4182->4185 4187 100885a 5 API calls 4182->4187 4186 100792c 4183->4186 4184->4172 4188 1007887 4185->4188 4190 100885a 5 API calls 4185->4190 4189 100885a 5 API calls 4186->4189 4187->4185 4192 100789e 4188->4192 4195 100885a 5 API calls 4188->4195 4191 100793d 4189->4191 4190->4188 4194 1005d9d 12 API calls 4191->4194 4193 10078b5 4192->4193 4196 100885a 5 API calls 4192->4196 4197 10078cc 4193->4197 4199 100885a 5 API calls 4193->4199 4198 1007949 4194->4198 4195->4192 4196->4193 4200 10078e3 4197->4200 4202 100885a 5 API calls 4197->4202 4201 100885a 5 API calls 4198->4201 4199->4197 4203 10078fa 4200->4203 4205 100885a 5 API calls 4200->4205 4201->4180 4202->4200 4204 1007913 printf 4203->4204 4206 100885a 5 API calls 4203->4206 4204->4176 4205->4203 4207 1007911 4206->4207 4207->4204 4208 1006b9c 4209 1006b94 4208->4209 4209->4208 4212 1007cc7 4209->4212 4213 100826b 9 API calls 4212->4213 4214 1007cd9 4213->4214 4215 1006d2d 4214->4215 4216 100885a 5 API calls 4214->4216 4217 1007cee 4216->4217 4218 1007d15 4217->4218 4219 1007cfc 4217->4219 4220 100885a 5 API calls 4218->4220 4221 100885a 5 API calls 4219->4221 4222 1007d26 4220->4222 4224 1007d10 4221->4224 4223 10058ed 12 API calls 4222->4223 4223->4224 4224->4215 4225 1008811 free 4224->4225 4225->4215 4226 10083a0 __set_app_type __p__fmode __p__commode 4227 100841a 4226->4227 4233 1008500 _controlfp 4227->4233 4229 1008436 _initterm __wgetmainargs _initterm __p___winitenv 4230 10017d0 4229->4230 4231 100849f exit 4230->4231 4232 10084d0 4231->4232 4233->4229 4234 1006921 4235 1006919 4234->4235 4235->4234 4238 10070a3 4235->4238 4239 100826b 9 API calls 4238->4239 4240 10070ba 4239->4240 4241 1006952 4240->4241 4242 100885a 5 API calls 4240->4242 4243 10070d4 4242->4243 4244 10070f4 4243->4244 4245 100885a 5 API calls 4243->4245 4246 100710c 4244->4246 4248 100885a 5 API calls 4244->4248 4247 10070eb 4245->4247 4249 10071cd 4246->4249 4252 1007138 4246->4252 4255 100885a 5 API calls 4246->4255 4275 1007024 4247->4275 4248->4246 4251 10071ed 4249->4251 4254 100885a 5 API calls 4249->4254 4251->4241 4258 1008811 free 4251->4258 4253 1007161 4252->4253 4256 100885a 5 API calls 4252->4256 4261 100885a 5 API calls 4253->4261 4264 1007185 4253->4264 4257 10071e3 4254->4257 4259 100712f 4255->4259 4260 1007153 4256->4260 4262 1007024 14 API calls 4257->4262 4258->4241 4265 1007024 14 API calls 4259->4265 4266 10058ed 12 API calls 4260->4266 4267 1007177 4261->4267 4262->4251 4263 10071a9 4263->4249 4269 100885a 5 API calls 4263->4269 4264->4263 4268 100885a 5 API calls 4264->4268 4265->4252 4266->4253 4270 10058ed 12 API calls 4267->4270 4271 100719b 4268->4271 4272 10071bf 4269->4272 4270->4264 4273 10058ed 12 API calls 4271->4273 4274 10058ed 12 API calls 4272->4274 4273->4263 4274->4249 4276 1007030 4275->4276 4277 1007033 4275->4277 4276->4277 4278 1007048 4276->4278 4280 100885a 5 API calls 4277->4280 4287 10080d7 swprintf 4278->4287 4286 1007087 4280->4286 4281 1007051 wprintf 4282 1007065 4281->4282 4281->4286 4283 100885a 5 API calls 4282->4283 4284 1007075 4283->4284 4285 10058ed 12 API calls 4284->4285 4285->4286 4286->4244 4287->4281 3447 1008423 __setusermatherr 3448 1008431 3447->3448 3454 1008500 _controlfp 3448->3454 3450 1008436 _initterm __wgetmainargs _initterm __p___winitenv 3451 10017d0 3450->3451 3452 100849f exit 3451->3452 3453 10084d0 3452->3453 3454->3450 4288 10066a4 4289 100669c 4288->4289 4289->4288 4292 10077c1 4289->4292 4293 100885a 5 API calls 4292->4293 4294 10077d0 4293->4294 4297 1005bb8 4294->4297 4298 100826b 9 API calls 4297->4298 4299 1005bca 4298->4299 4300 1005be4 4299->4300 4304 1005be8 4299->4304 4303 1008811 free 4303->4300 4305 1005bda 4304->4305 4306 1005bfa wprintf 4304->4306 4305->4300 4305->4303 4309 1005c20 4306->4309 4310 1005c33 4309->4310 4311 1005c80 4309->4311 4310->4311 4312 1005c3a 4310->4312 4313 1005cc2 4310->4313 4314 1005c48 4310->4314 4315 1005c9e 4310->4315 4318 100885a 5 API calls 4311->4318 4322 100885a 5 API calls 4312->4322 4317 100885a 5 API calls 4313->4317 4316 100885a 5 API calls 4314->4316 4319 100885a 5 API calls 4315->4319 4320 1005c58 4316->4320 4321 1005cd2 printf 4317->4321 4325 1005c12 4318->4325 4323 1005cae 4319->4323 4324 10061b4 27 API calls 4320->4324 4321->4325 4322->4325 4326 10058ed 12 API calls 4323->4326 4324->4325 4325->4305 4325->4306 4326->4325 4331 100212b 4334 100213c 4331->4334 4332 100885a 5 API calls 4333 100250c 4332->4333 4335 1002185 4334->4335 4338 10021a1 4334->4338 4357 1002156 4334->4357 4336 100885a 5 API calls 4335->4336 4336->4357 4337 100224a 4340 1002266 4337->4340 4341 100225d _wtol 4337->4341 4337->4357 4338->4337 4339 100894a 12 API calls 4338->4339 4338->4357 4339->4337 4342 100227a 4340->4342 4343 100894a 12 API calls 4340->4343 4341->4340 4344 1002291 _wtol 4342->4344 4345 100229a 4342->4345 4342->4357 4343->4342 4344->4345 4346 10022a3 _wtol 4345->4346 4347 10022ac 4345->4347 4346->4347 4348 10022e5 4347->4348 4358 1008826 4347->4358 4350 100232b 4348->4350 4352 1008826 5 API calls 4348->4352 4348->4357 4350->4357 4363 100573b 4350->4363 4353 1002323 4352->4353 4353->4350 4356 1008826 5 API calls 4353->4356 4355 1008826 5 API calls 4355->4348 4356->4350 4357->4332 4357->4333 4359 100871b 4 API calls 4358->4359 4360 1008840 4359->4360 4361 10022e1 4360->4361 4362 1008849 _wcsicmp 4360->4362 4361->4348 4361->4355 4362->4361 4364 1005775 4363->4364 4365 100574c 4363->4365 4364->4357 4365->4364 4366 1005762 wcslen 4365->4366 4366->4364 4367 100577f 4366->4367 4368 10087df 6 API calls 4367->4368 4370 1005788 4368->4370 4369 10057b5 towupper towupper 4372 10057cf towupper 4369->4372 4374 1005854 4369->4374 4370->4364 4370->4369 4371 10057fb towupper towupper 4370->4371 4373 1005812 towupper 4371->4373 4371->4374 4372->4370 4373->4370 4374->4364 4375 1008811 free 4374->4375 4375->4364 4376 10069ad 4377 10069a5 4376->4377 4377->4376 4380 1006fb3 CryptDecodeObject 4377->4380 4381 10069de 4380->4381 4382 1006fe3 4380->4382 4383 100885a 5 API calls 4382->4383 4384 1006ff3 4383->4384 4385 100885a 5 API calls 4384->4385 4386 1007012 printf 4385->4386 4386->4381 4387 10084ae _XcptFilter 4392 1002eb2 4393 1002ed9 CertAddCTLContextToStore 4392->4393 4394 1002ef2 CertSaveStore 4393->4394 4395 1002ee6 4393->4395 4399 1002f1f 4394->4399 4397 1002fc4 CertFreeCTLContext 4395->4397 4398 1002fcd 4395->4398 4397->4398 4400 1002fd2 CertFreeCTLContext 4398->4400 4401 1002fdb 4398->4401 4404 100885a 5 API calls 4399->4404 4400->4401 4402 1002fe0 CertFreeCTLContext 4401->4402 4403 1002fe9 4401->4403 4402->4403 4405 1002ff7 4403->4405 4406 1002fee CertFreeCTLContext 4403->4406 4404->4395 4407 1003005 4405->4407 4408 1002ffc CertFreeCTLContext 4405->4408 4406->4405 4409 1003013 4407->4409 4410 100300a CertFreeCTLContext 4407->4410 4408->4407 4411 1003046 4409->4411 4413 1003040 free 4409->4413 4414 1003026 CertFreeCTLContext 4409->4414 4410->4409 4412 1003073 4411->4412 4415 1003053 CertFreeCTLContext 4411->4415 4416 100306d free 4411->4416 4417 10030a0 4412->4417 4418 1003080 CertFreeCTLContext 4412->4418 4419 100309a free 4412->4419 4413->4411 4414->4413 4414->4414 4415->4415 4415->4416 4416->4412 4420 10030a5 CertCloseStore 4417->4420 4421 10030af 4417->4421 4418->4418 4418->4419 4419->4417 4420->4421 4422 10030c2 4421->4422 4423 100885a 5 API calls 4421->4423 4423->4422 4424 1006a39 4425 1006a31 4424->4425 4425->4424 4428 1006e23 4425->4428 4429 100885a 5 API calls 4428->4429 4430 1006e33 4429->4430 4433 1005fd8 4430->4433 4434 100826b 9 API calls 4433->4434 4435 1005fed 4434->4435 4436 100603e 4435->4436 4437 100885a 5 API calls 4435->4437 4439 100600c 4435->4439 4437->4439 4438 1006016 printf 4438->4438 4440 1006034 4438->4440 4439->4438 4439->4440 4440->4436 4441 1008811 free 4440->4441 4441->4436 4442 1008abd 4443 1008ad1 4442->4443 4451 1008b72 4442->4451 4444 1008ae3 CreateFileU 4443->4444 4443->4451 4445 1008b21 WriteFile 4444->4445 4446 1008afd GetLastError 4444->4446 4449 1008b37 GetLastError 4445->4449 4450 1008b5b 4445->4450 4447 1008b09 GetLastError 4446->4447 4448 1008b0f GetLastError 4446->4448 4447->4451 4448->4451 4452 1008b43 GetLastError 4449->4452 4453 1008b49 GetLastError 4449->4453 4454 1008b6b CloseHandle 4450->4454 4452->4454 4453->4454 4454->4451 4455 10067be 4456 10067b6 4455->4456 4456->4455 4459 1007601 4456->4459 4460 100826b 9 API calls 4459->4460 4461 1007617 4460->4461 4462 10067ef 4461->4462 4463 100885a 5 API calls 4461->4463 4464 1007631 4463->4464 4465 10076b1 4464->4465 4467 100885a 5 API calls 4464->4467 4466 10076da 4465->4466 4468 100885a 5 API calls 4465->4468 4466->4462 4470 1008811 free 4466->4470 4473 1007647 4467->4473 4469 10076d0 4468->4469 4475 1007535 4469->4475 4470->4462 4472 1007659 printf 4472->4473 4473->4465 4473->4472 4474 1007688 printf 4473->4474 4474->4473 4476 100754e 4475->4476 4477 100753e 4475->4477 4479 100885a 5 API calls 4476->4479 4480 1007565 4476->4480 4478 100885a 5 API calls 4477->4478 4478->4476 4479->4480 4481 100885a 5 API calls 4480->4481 4482 100757c 4480->4482 4481->4482 4483 1007593 4482->4483 4484 100885a 5 API calls 4482->4484 4485 10075aa 4483->4485 4487 100885a 5 API calls 4483->4487 4484->4483 4486 10075c1 4485->4486 4488 100885a 5 API calls 4485->4488 4489 10075d8 4486->4489 4490 100885a 5 API calls 4486->4490 4487->4485 4488->4486 4491 10075f1 printf 4489->4491 4492 100885a 5 API calls 4489->4492 4490->4489 4491->4466 4493 10075ef 4492->4493 4493->4491 4494 1003ebf 4495 1003f23 4494->4495 4499 1003e9f 4494->4499 4497 100885a 5 API calls 4495->4497 4496 1003ecc 4500 100885a 5 API calls 4496->4500 4502 1003f12 4497->4502 4498 100885a 5 API calls 4498->4499 4499->4494 4499->4496 4499->4498 4501 1003efb scanf 4500->4501 4501->4502 4503 1006541 4504 1006539 4503->4504 4504->4503 4507 1007c11 4504->4507 4508 100885a 5 API calls 4507->4508 4509 1007c23 4508->4509 4510 100826b 9 API calls 4509->4510 4511 1007c36 4510->4511 4512 1006572 4511->4512 4513 1007c66 4511->4513 4514 100885a 5 API calls 4511->4514 4515 1007c8b 4513->4515 4517 100885a 5 API calls 4513->4517 4516 1007c55 4514->4516 4518 100885a 5 API calls 4515->4518 4519 1007cb8 4515->4519 4520 10058ed 12 API calls 4516->4520 4521 1007c7f 4517->4521 4522 1007ca4 4518->4522 4519->4512 4523 1008811 free 4519->4523 4520->4513 4524 1005be8 29 API calls 4521->4524 4525 1008340 printf 4522->4525 4523->4512 4524->4515 4526 1007cac printf 4525->4526 4526->4519 4527 10084c3 _exit 4528 10084d0 4527->4528 4529 1006ac5 4530 1006abd 4529->4530 4530->4529 4533 10076eb CryptDecodeObject 4530->4533 4534 1006af6 4533->4534 4535 100771b 4533->4535 4536 100885a 5 API calls 4535->4536 4537 100772c 4536->4537 4538 1007786 printf 4537->4538 4539 1007743 4537->4539 4540 100778e printf 4538->4540 4541 100885a 5 API calls 4539->4541 4540->4534 4542 1007784 4541->4542 4542->4540 4543 1006449 printf 4544 100885a 5 API calls 4543->4544 4545 100647c printf 4544->4545 4546 1007e5a CryptFindOIDInfo 4545->4546 4547 1006499 4546->4547 4548 100885a 5 API calls 4547->4548 4549 10064aa 4548->4549 4558 1008884 4549->4558 4551 10064be 4552 10064d4 4551->4552 4554 10058ed 12 API calls 4551->4554 4563 1007ff1 4552->4563 4554->4552 4555 100652c 4559 100871b 4 API calls 4558->4559 4560 100889f 4559->4560 4561 100871b 4 API calls 4560->4561 4562 10088b8 wprintf 4561->4562 4562->4551 4564 1008015 4563->4564 4565 10064e2 4564->4565 4566 100802a CryptGetOIDFunctionAddress 4564->4566 4565->4555 4575 1007b59 4565->4575 4567 10080b0 4566->4567 4568 100804c 4566->4568 4569 10080ba 4567->4569 4570 1008811 free 4567->4570 4568->4567 4572 10087df 6 API calls 4568->4572 4569->4565 4571 10080bf CryptFreeOIDFunctionAddress 4569->4571 4570->4569 4571->4565 4573 1008077 4572->4573 4573->4567 4573->4569 4574 100809b wprintf 4573->4574 4574->4567 4576 100885a 5 API calls 4575->4576 4577 1007b6b 4576->4577 4578 100826b 9 API calls 4577->4578 4579 1007b7e 4578->4579 4580 1007c0c 4579->4580 4581 1007bae 4579->4581 4583 100885a 5 API calls 4579->4583 4580->4555 4582 1007bd5 4581->4582 4585 100885a 5 API calls 4581->4585 4586 1007c02 4582->4586 4589 100885a 5 API calls 4582->4589 4584 1007b9d 4583->4584 4587 10058ed 12 API calls 4584->4587 4588 1007bc4 4585->4588 4586->4580 4592 1008811 free 4586->4592 4587->4581 4590 10061b4 27 API calls 4588->4590 4591 1007bee 4589->4591 4590->4582 4593 1008340 printf 4591->4593 4592->4580 4594 1007bf6 printf 4593->4594 4594->4586 4595 100684a 4596 1006842 4595->4596 4596->4595 4599 100730e 4596->4599 4600 100826b 9 API calls 4599->4600 4601 1007321 4600->4601 4602 100687b 4601->4602 4603 100885a 5 API calls 4601->4603 4604 1007337 4603->4604 4605 1007535 6 API calls 4604->4605 4606 1007354 4605->4606 4606->4602 4607 1008811 free 4606->4607 4607->4602 4608 1002eca 4609 1002ee6 4608->4609 4610 1002ece CertAddCTLContextToStore 4608->4610 4612 1002fc4 CertFreeCTLContext 4609->4612 4613 1002fcd 4609->4613 4610->4609 4614 1002ef2 CertSaveStore 4610->4614 4612->4613 4615 1002fd2 CertFreeCTLContext 4613->4615 4616 1002fdb 4613->4616 4620 1002f1f 4614->4620 4615->4616 4618 1002fe0 CertFreeCTLContext 4616->4618 4619 1002fe9 4616->4619 4618->4619 4621 1002ff7 4619->4621 4622 1002fee CertFreeCTLContext 4619->4622 4625 100885a 5 API calls 4620->4625 4623 1003005 4621->4623 4624 1002ffc CertFreeCTLContext 4621->4624 4622->4621 4626 1003013 4623->4626 4627 100300a CertFreeCTLContext 4623->4627 4624->4623 4625->4609 4628 1003046 4626->4628 4629 1003040 free 4626->4629 4630 1003026 CertFreeCTLContext 4626->4630 4627->4626 4631 1003053 CertFreeCTLContext 4628->4631 4632 100306d free 4628->4632 4634 1003073 4628->4634 4629->4628 4630->4629 4630->4630 4631->4631 4631->4632 4632->4634 4633 10030a0 4637 10030a5 CertCloseStore 4633->4637 4638 10030af 4633->4638 4634->4633 4635 1003080 CertFreeCTLContext 4634->4635 4636 100309a free 4634->4636 4635->4635 4635->4636 4636->4633 4637->4638 4639 10030c2 4638->4639 4640 100885a 5 API calls 4638->4640 4640->4639 4641 10018cb 4643 10018c6 4641->4643 4643->4641 4644 1001915 4643->4644 4646 1001931 4643->4646 4661 1005710 4643->4661 4665 1001dc7 4643->4665 4644->4646 4647 100191e 4644->4647 4720 1001bb1 4646->4720 4709 1001d6c 4647->4709 4650 1001923 4651 1008811 free 4650->4651 4653 10019c4 4650->4653 4651->4653 4652 10019d3 4654 10019e2 4652->4654 4656 1008811 free 4652->4656 4653->4652 4655 1008811 free 4653->4655 4657 10019f2 4654->4657 4658 10019eb CryptMsgClose 4654->4658 4655->4652 4656->4654 4659 1001a03 4657->4659 4660 10019f8 CertCloseStore 4657->4660 4658->4657 4660->4659 4662 1005719 4661->4662 4663 1005729 4661->4663 4664 100885a 5 API calls 4662->4664 4663->4643 4664->4663 4666 1008826 5 API calls 4665->4666 4667 1001de6 4666->4667 4668 1008826 5 API calls 4667->4668 4676 1001dea 4667->4676 4669 1001e07 4668->4669 4670 1008826 5 API calls 4669->4670 4669->4676 4671 1001e28 4670->4671 4672 1008826 5 API calls 4671->4672 4671->4676 4673 1001e49 4672->4673 4674 1008826 5 API calls 4673->4674 4673->4676 4675 1001e7d 4674->4675 4677 1008826 5 API calls 4675->4677 4679 1001e81 4675->4679 4676->4643 4678 1001ec1 4677->4678 4678->4676 4680 1008826 5 API calls 4678->4680 4679->4676 4681 1005710 5 API calls 4679->4681 4682 1001ee4 4680->4682 4681->4676 4682->4676 4683 1008826 5 API calls 4682->4683 4684 1001f02 4683->4684 4684->4676 4685 1008826 5 API calls 4684->4685 4686 1001f20 4685->4686 4686->4676 4687 1008826 5 API calls 4686->4687 4688 1001f44 4687->4688 4688->4676 4689 1008826 5 API calls 4688->4689 4690 1001f66 4689->4690 4690->4679 4691 1008826 5 API calls 4690->4691 4692 1001f97 4691->4692 4692->4679 4693 1008826 5 API calls 4692->4693 4694 1001fc8 4693->4694 4694->4676 4695 1008826 5 API calls 4694->4695 4696 1001fea 4695->4696 4696->4679 4697 1008826 5 API calls 4696->4697 4698 100201b 4697->4698 4698->4679 4699 1008826 5 API calls 4698->4699 4700 100205f 4699->4700 4700->4679 4701 1008826 5 API calls 4700->4701 4702 100209d 4701->4702 4702->4679 4703 1008826 5 API calls 4702->4703 4704 10020c7 4703->4704 4704->4679 4705 10020e5 4704->4705 4706 1008826 5 API calls 4705->4706 4707 10020f6 4706->4707 4707->4676 4708 1008826 5 API calls 4707->4708 4708->4676 4710 100885a 5 API calls 4709->4710 4711 1001d7c 4710->4711 4712 100885a 5 API calls 4711->4712 4713 1001d8e 4712->4713 4714 100885a 5 API calls 4713->4714 4715 1001da0 4714->4715 4716 100885a 5 API calls 4715->4716 4717 1001db2 4716->4717 4718 100885a 5 API calls 4717->4718 4719 1001dc4 4718->4719 4719->4650 4721 100885a 5 API calls 4720->4721 4722 1001bc1 4721->4722 4723 100885a 5 API calls 4722->4723 4724 1001bd3 4723->4724 4725 100885a 5 API calls 4724->4725 4726 1001be5 4725->4726 4727 100885a 5 API calls 4726->4727 4728 1001bf7 4727->4728 4729 100885a 5 API calls 4728->4729 4730 1001c09 4729->4730 4731 100885a 5 API calls 4730->4731 4732 1001c1b 4731->4732 4733 100885a 5 API calls 4732->4733 4734 1001c2d 4733->4734 4735 100885a 5 API calls 4734->4735 4736 1001c3f 4735->4736 4737 100885a 5 API calls 4736->4737 4738 1001c51 4737->4738 4739 100885a 5 API calls 4738->4739 4740 1001c63 4739->4740 4741 100885a 5 API calls 4740->4741 4742 1001c75 4741->4742 4769 10088c7 4742->4769 4744 1001c93 4745 100885a 5 API calls 4744->4745 4746 1001ca3 4745->4746 4747 100885a 5 API calls 4746->4747 4748 1001cb5 4747->4748 4749 100885a 5 API calls 4748->4749 4750 1001cc7 4749->4750 4751 100885a 5 API calls 4750->4751 4752 1001cd9 4751->4752 4753 100885a 5 API calls 4752->4753 4754 1001ceb 4753->4754 4755 100885a 5 API calls 4754->4755 4756 1001cfd 4755->4756 4757 100885a 5 API calls 4756->4757 4758 1001d0f 4757->4758 4759 100885a 5 API calls 4758->4759 4760 1001d21 4759->4760 4761 100885a 5 API calls 4760->4761 4762 1001d33 4761->4762 4763 100885a 5 API calls 4762->4763 4764 1001d45 4763->4764 4765 100885a 5 API calls 4764->4765 4766 1001d57 4765->4766 4767 100885a 5 API calls 4766->4767 4768 1001d69 4767->4768 4768->4650 4770 100871b 4 API calls 4769->4770 4771 10088ea 4770->4771 4772 100871b 4 API calls 4771->4772 4773 1008901 4772->4773 4774 100871b 4 API calls 4773->4774 4775 1008918 4774->4775 4776 100871b 4 API calls 4775->4776 4777 1008930 wprintf 4776->4777 4777->4744 4778 10065cd 4779 10065c5 4778->4779 4779->4778 4782 1007e14 4779->4782 4783 100826b 9 API calls 4782->4783 4784 1007e26 4783->4784 4785 1006603 4784->4785 4786 100885a 5 API calls 4784->4786 4787 1007e3b 4786->4787 4788 10058ed 12 API calls 4787->4788 4789 1007e4c 4788->4789 4789->4785 4790 1008811 free 4789->4790 4790->4785 3424 1001ad0 GetModuleHandleA 3425 1001aee CryptInitOIDFunctionSet 3424->3425 3429 1001b39 3424->3429 3426 1001b04 3425->3426 3427 1001b0b CryptInstallOIDFunctionAddress 3425->3427 3440 100885a 3426->3440 3427->3426 3431 1001b3f 3427->3431 3431->3429 3432 1001b84 CryptRegisterOIDInfo 3431->3432 3433 100871b 3431->3433 3432->3429 3432->3431 3443 100877a 3433->3443 3435 1008729 3436 1008741 LoadStringA 3435->3436 3437 100872d LoadStringW 3435->3437 3438 1008776 3436->3438 3439 100875d MultiByteToWideChar 3436->3439 3437->3438 3438->3431 3439->3438 3441 100871b 4 API calls 3440->3441 3442 1008874 vwprintf 3441->3442 3442->3429 3444 1008793 GetVersionExA 3443->3444 3445 100878c 3443->3445 3446 10087bc 3444->3446 3445->3435 3446->3435 4791 1002cd5 4792 1002fbf 4791->4792 4793 1002fc4 CertFreeCTLContext 4792->4793 4794 1002fcd 4792->4794 4793->4794 4795 1002fd2 CertFreeCTLContext 4794->4795 4796 1002fdb 4794->4796 4795->4796 4797 1002fe0 CertFreeCTLContext 4796->4797 4798 1002fe9 4796->4798 4797->4798 4799 1002ff7 4798->4799 4800 1002fee CertFreeCTLContext 4798->4800 4801 1003005 4799->4801 4802 1002ffc CertFreeCTLContext 4799->4802 4800->4799 4803 1003013 4801->4803 4804 100300a CertFreeCTLContext 4801->4804 4802->4801 4805 1003046 4803->4805 4807 1003040 free 4803->4807 4808 1003026 CertFreeCTLContext 4803->4808 4804->4803 4806 1003073 4805->4806 4809 1003053 CertFreeCTLContext 4805->4809 4810 100306d free 4805->4810 4811 10030a0 4806->4811 4812 1003080 CertFreeCTLContext 4806->4812 4813 100309a free 4806->4813 4807->4805 4808->4807 4808->4808 4809->4809 4809->4810 4810->4806 4814 10030a5 CertCloseStore 4811->4814 4815 10030af 4811->4815 4812->4812 4812->4813 4813->4811 4814->4815 4816 10030c2 4815->4816 4817 100885a 5 API calls 4815->4817 4817->4816 4818 1006b56 4819 1006b4e 4818->4819 4819->4818 4820 1007cc7 16 API calls 4819->4820 4821 1006d2d 4820->4821 4822 10068d6 4823 10068ce 4822->4823 4823->4822 4826 10071fd 4823->4826 4827 100826b 9 API calls 4826->4827 4828 1007214 4827->4828 4829 100690c 4828->4829 4830 100885a 5 API calls 4828->4830 4831 1007237 4830->4831 4833 100885a 5 API calls 4831->4833 4840 100724d 4831->4840 4832 10072fa 4832->4829 4835 1008811 free 4832->4835 4833->4840 4834 1007261 printf 4834->4840 4835->4829 4836 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 4836->4840 4837 1007299 printf 4838 10072d2 printf 4837->4838 4837->4840 4838->4840 4839 10058ed 12 API calls 4839->4840 4840->4832 4840->4834 4840->4836 4840->4837 4840->4839 4841 1004b5e 4842 100885a 5 API calls 4841->4842 4843 1004b6e 4842->4843 4844 1004bc0 4843->4844 4846 100885a 5 API calls 4843->4846 4845 1004bed 4844->4845 4847 100885a 5 API calls 4844->4847 4848 1005d9d 12 API calls 4845->4848 4849 1004bae 4846->4849 4851 1004bd9 4847->4851 4852 1004bfc 4848->4852 4850 10058ed 12 API calls 4849->4850 4850->4844 4853 1008340 printf 4851->4853 4854 100885a 5 API calls 4852->4854 4855 1004be1 printf 4853->4855 4856 1004c0d 4854->4856 4855->4845 4857 1005d9d 12 API calls 4856->4857 4858 1004c1c 4857->4858 4859 100885a 5 API calls 4858->4859 4860 1004c2d 4859->4860 4881 10082f1 GetSystemTime SystemTimeToFileTime 4860->4881 4863 1004c4c CertGetCRLContextProperty 4865 1005d22 9 API calls 4863->4865 4864 100885a 5 API calls 4866 1004c4a 4864->4866 4867 1004c70 CertGetCRLContextProperty 4865->4867 4866->4863 4868 1005d22 9 API calls 4867->4868 4869 1004c95 4868->4869 4870 1004d04 4869->4870 4871 100885a 5 API calls 4869->4871 4872 100885a 5 API calls 4870->4872 4873 1004cad 4871->4873 4877 1004d2d 4872->4877 4874 100885a 5 API calls 4873->4874 4875 1004ccc printf 4874->4875 4875->4870 4876 1004ce2 4875->4876 4878 100885a 5 API calls 4876->4878 4879 1004cf2 4878->4879 4880 10058ed 12 API calls 4879->4880 4880->4870 4882 1008325 CompareFileTime 4881->4882 4883 100831f 4881->4883 4884 1004c36 4882->4884 4883->4882 4883->4884 4884->4863 4884->4864 4885 100665e 4886 1006656 4885->4886 4886->4885 4887 10077c1 29 API calls 4886->4887 4888 10067a9 4887->4888 4889 1004d61 4890 1004d79 4889->4890 4891 1004ddd 4889->4891 4890->4891 4892 10058ed 12 API calls 4890->4892 4893 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 4890->4893 4895 10059bd 4890->4895 4892->4890 4893->4890 4896 1005ba3 4895->4896 4901 10059d7 4895->4901 4897 1005bb1 4896->4897 4898 1008811 free 4896->4898 4897->4890 4898->4897 4899 1005a02 printf 4899->4901 4901->4896 4901->4899 4902 10058ed 12 API calls 4901->4902 4903 1005bb8 29 API calls 4901->4903 4905 100826b 9 API calls 4901->4905 4906 1005d9d 12 API calls 4901->4906 4907 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 4901->4907 4908 1008811 free 4901->4908 4909 1004440 4901->4909 4932 10081ef 4901->4932 4902->4901 4903->4901 4905->4901 4906->4901 4907->4901 4908->4901 4910 100826b 9 API calls 4909->4910 4911 1004456 4910->4911 4912 100450c 4911->4912 4913 100885a 5 API calls 4911->4913 4912->4901 4914 1004472 4913->4914 4915 100885a 5 API calls 4914->4915 4916 1004485 4915->4916 4917 10061b4 27 API calls 4916->4917 4918 1004495 4917->4918 4919 100885a 5 API calls 4918->4919 4920 10044a5 4919->4920 4921 1008340 printf 4920->4921 4922 10044b0 printf 4921->4922 4923 100885a 5 API calls 4922->4923 4924 10044cc 4923->4924 4925 10059bd 42 API calls 4924->4925 4926 10044dc 4925->4926 4927 1004502 4926->4927 4928 100885a 5 API calls 4926->4928 4927->4912 4930 1008811 free 4927->4930 4929 10044f2 4928->4929 4931 10059bd 42 API calls 4929->4931 4930->4912 4931->4927 4933 1008201 MultiByteToWideChar 4932->4933 4936 100822c 4932->4936 4934 1008250 GetLastError 4933->4934 4935 1008218 4933->4935 4934->4936 4937 10087df 6 API calls 4935->4937 4936->4901 4938 1008223 4937->4938 4938->4936 4939 1008233 MultiByteToWideChar 4938->4939 4939->4936 4940 1008246 4939->4940 4941 1008811 free 4940->4941 4941->4934 4946 1001965 4947 1001996 4946->4947 4948 100885a 5 API calls 4947->4948 4949 10019a1 4948->4949 4950 100885a 5 API calls 4949->4950 4951 10019b3 4950->4951 4952 10019c4 4951->4952 4953 1008811 free 4951->4953 4954 10019d3 4952->4954 4956 1008811 free 4952->4956 4953->4952 4955 10019e2 4954->4955 4957 1008811 free 4954->4957 4958 10019f2 4955->4958 4959 10019eb CryptMsgClose 4955->4959 4956->4954 4957->4955 4960 1001a03 4958->4960 4961 10019f8 CertCloseStore 4958->4961 4959->4958 4961->4960 4962 1006967 4963 100695f 4962->4963 4963->4962 4966 1006f21 CryptDecodeObject 4963->4966 4967 1006f53 4966->4967 4968 1006998 4966->4968 4969 100885a 5 API calls 4967->4969 4970 1006f63 4969->4970 4971 100885a 5 API calls 4970->4971 4972 1006f82 4971->4972 4973 100885a 5 API calls 4972->4973 4974 1006fa1 printf 4973->4974 4974->4968 4975 10050e8 4985 10050b5 4975->4985 4976 1007e5a CryptFindOIDInfo 4976->4985 4977 10058ed 12 API calls 4977->4985 4978 10051a4 CryptMsgGetAndVerifySigner 4978->4985 4979 10051e4 CertFreeCTLContext 4987 1008186 CryptMsgGetParam 4979->4987 4981 1008186 9 API calls 4981->4985 4982 1005280 4983 1008811 free 4983->4985 4984 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 4984->4985 4985->4975 4985->4976 4985->4977 4985->4978 4985->4979 4985->4981 4985->4982 4985->4983 4985->4984 4986 10059bd 43 API calls 4985->4986 4986->4985 4988 10081a7 4987->4988 4989 10081d9 4987->4989 4988->4989 4990 10087df 6 API calls 4988->4990 4989->4985 4991 10081b9 4990->4991 4991->4989 4992 10081bf CryptMsgGetParam 4991->4992 4992->4989 4993 10081d3 4992->4993 4994 1008811 free 4993->4994 4994->4989 4999 100506b 5000 100885a 5 API calls 4999->5000 5001 100507b 5000->5001 5002 1002ced 5003 10030e4 5002->5003 5004 1002cfa CertFindCertificateInStore 5002->5004 5006 1003104 5003->5006 5007 10030ed 5003->5007 5005 1002d2f CertAddCertificateContextToStore 5004->5005 5017 1002d23 5004->5017 5009 1002d45 CertFreeCTLContext 5005->5009 5005->5017 5008 1003f3f 11 API calls 5006->5008 5010 1003f3f 11 API calls 5007->5010 5025 10030fe 5008->5025 5013 1002d51 5009->5013 5010->5025 5011 1002fc4 CertFreeCTLContext 5012 1002fcd 5011->5012 5014 1002fd2 CertFreeCTLContext 5012->5014 5015 1002fdb 5012->5015 5016 1002e1c 5013->5016 5021 1002db0 5013->5021 5022 1002d67 5013->5022 5014->5015 5019 1002fe0 CertFreeCTLContext 5015->5019 5020 1002fe9 5015->5020 5018 1002ef2 CertSaveStore 5016->5018 5023 1002e32 CertFindCTLInStore 5016->5023 5017->5011 5017->5012 5034 1002f1f 5018->5034 5019->5020 5026 1002ff7 5020->5026 5027 1002fee CertFreeCTLContext 5020->5027 5024 10040a4 7 API calls 5021->5024 5029 1003a45 12 API calls 5022->5029 5023->5017 5030 1002e6a CertAddCTLContextToStore 5023->5030 5046 1002dc0 5024->5046 5025->5013 5025->5017 5037 1003ced 6 API calls 5025->5037 5042 100313d 5025->5042 5032 1003005 5026->5032 5033 1002ffc CertFreeCTLContext 5026->5033 5027->5026 5035 1002d7f 5029->5035 5030->5017 5036 1002e7a CertFreeCTLContext 5030->5036 5031 1003168 CertAddCertificateContextToStore 5031->5013 5031->5017 5038 1003013 5032->5038 5039 100300a CertFreeCTLContext 5032->5039 5033->5032 5044 100885a 5 API calls 5034->5044 5035->5017 5040 1002d94 CertAddCTLContextToStore 5035->5040 5036->5017 5036->5018 5037->5042 5043 1003046 5038->5043 5047 1003040 free 5038->5047 5048 1003026 CertFreeCTLContext 5038->5048 5039->5038 5040->5017 5041 1002da4 CertFreeCTLContext 5040->5041 5041->5016 5042->5017 5042->5031 5045 1003073 5043->5045 5049 1003053 CertFreeCTLContext 5043->5049 5050 100306d free 5043->5050 5044->5017 5051 10030a0 5045->5051 5053 1003080 CertFreeCTLContext 5045->5053 5054 100309a free 5045->5054 5046->5016 5046->5017 5057 1003db3 45 API calls 5046->5057 5058 1002ddc 5046->5058 5047->5043 5048->5047 5048->5048 5049->5049 5049->5050 5050->5045 5055 10030a5 CertCloseStore 5051->5055 5056 10030af 5051->5056 5052 1002e03 CertAddCTLContextToStore 5052->5016 5052->5017 5053->5053 5053->5054 5054->5051 5055->5056 5059 10030c2 5056->5059 5060 100885a 5 API calls 5056->5060 5057->5058 5058->5017 5058->5052 5060->5059 5065 10045f3 CryptHashPublicKeyInfo 5066 100885a 5 API calls 5065->5066 5067 100462b 5066->5067 5068 1005d22 9 API calls 5067->5068 5069 100463e CryptReleaseContext CertGetCertificateContextProperty 5068->5069 5070 1004663 5069->5070 5071 1004737 5069->5071 5073 10087df 6 API calls 5070->5073 5072 1005d9d 12 API calls 5071->5072 5074 1004743 5072->5074 5080 100466d 5073->5080 5075 100885a 5 API calls 5074->5075 5076 1004754 5075->5076 5077 1005d9d 12 API calls 5076->5077 5078 1004763 5077->5078 5081 100885a 5 API calls 5078->5081 5079 1004731 5083 1008811 free 5079->5083 5080->5071 5080->5079 5082 100885a 5 API calls 5080->5082 5084 1004774 5081->5084 5085 100469c 5082->5085 5083->5071 5086 100478b 5084->5086 5180 1005efb CertEnumCertificateContextProperties 5084->5180 5087 10046b7 5085->5087 5089 100885a 5 API calls 5085->5089 5091 100885a 5 API calls 5086->5091 5157 1004b0c 5086->5157 5090 10046d2 5087->5090 5092 100885a 5 API calls 5087->5092 5089->5087 5093 10046ec 5090->5093 5096 100885a 5 API calls 5090->5096 5095 10047a8 5091->5095 5092->5090 5094 1004707 5093->5094 5097 100885a 5 API calls 5093->5097 5098 1004725 printf 5094->5098 5099 100885a 5 API calls 5094->5099 5100 100885a 5 API calls 5095->5100 5096->5093 5097->5094 5098->5079 5101 1004722 5099->5101 5102 10047ca 5100->5102 5101->5098 5103 1007e5a CryptFindOIDInfo 5102->5103 5104 10047d4 printf 5103->5104 5105 10047f3 5104->5105 5106 1004814 5104->5106 5107 100885a 5 API calls 5105->5107 5109 100885a 5 API calls 5106->5109 5108 1004803 5107->5108 5110 10058ed 12 API calls 5108->5110 5111 1004838 5109->5111 5110->5106 5112 1007e5a CryptFindOIDInfo 5111->5112 5113 1004844 printf 5112->5113 5192 1008168 CryptFindOIDInfo 5113->5192 5116 100492f 5117 100885a 5 API calls 5116->5117 5120 100493f CertGetPublicKeyLength 5117->5120 5118 100885a 5 API calls 5119 100487c 5118->5119 5121 10058ed 12 API calls 5119->5121 5122 1004958 5120->5122 5123 1004969 5120->5123 5124 100488d 5121->5124 5125 100885a 5 API calls 5122->5125 5126 100498a printf 5123->5126 5128 100885a 5 API calls 5123->5128 5124->5116 5130 100826b 9 API calls 5124->5130 5125->5123 5127 10049a5 5126->5127 5129 10058ed 12 API calls 5127->5129 5131 1004987 5128->5131 5132 10049af 5129->5132 5133 10048ae 5130->5133 5131->5126 5134 1004a0b 5132->5134 5135 10049c1 5132->5135 5133->5116 5136 100885a 5 API calls 5133->5136 5137 100885a 5 API calls 5134->5137 5141 100885a 5 API calls 5135->5141 5171 1004a4a 5135->5171 5139 10048cd 5136->5139 5138 1004a1b 5137->5138 5140 100826b 9 API calls 5138->5140 5142 100885a 5 API calls 5139->5142 5144 1004a31 5140->5144 5145 10049de 5141->5145 5146 10048e0 5142->5146 5151 10058ed 12 API calls 5144->5151 5144->5171 5148 100826b 9 API calls 5145->5148 5149 10058ed 12 API calls 5146->5149 5152 10049f4 5148->5152 5153 10048ed 5149->5153 5150 1004abc 5155 100885a 5 API calls 5150->5155 5150->5157 5159 1004a06 5151->5159 5161 10058ed 12 API calls 5152->5161 5152->5171 5156 100885a 5 API calls 5153->5156 5154 100885a 5 API calls 5158 1004a85 5154->5158 5160 1004ad5 5155->5160 5162 10048fd 5156->5162 5163 1004aa5 printf 5158->5163 5164 100885a 5 API calls 5158->5164 5166 1008811 free 5159->5166 5167 1004af5 printf 5160->5167 5172 100885a 5 API calls 5160->5172 5161->5159 5168 10058ed 12 API calls 5162->5168 5165 10058ed 12 API calls 5163->5165 5170 1004aa2 5164->5170 5165->5150 5166->5171 5173 10058ed 12 API calls 5167->5173 5169 100490b 5168->5169 5174 100885a 5 API calls 5169->5174 5170->5163 5194 1006045 5171->5194 5175 1004af2 5172->5175 5173->5157 5176 100491b 5174->5176 5175->5167 5177 10058ed 12 API calls 5176->5177 5178 1004929 5177->5178 5179 1008811 free 5178->5179 5179->5116 5181 1005fd1 5180->5181 5188 1005f17 5180->5188 5181->5086 5182 100885a 5 API calls 5184 1005f3e CertGetCertificateContextProperty 5182->5184 5183 1005fbb CertEnumCertificateContextProperties 5183->5181 5183->5188 5184->5188 5185 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 5185->5188 5186 10087df 6 API calls 5186->5188 5187 1005f61 CertGetCertificateContextProperty 5187->5188 5188->5182 5188->5183 5188->5185 5188->5186 5188->5187 5189 10058ed 12 API calls 5188->5189 5190 1008811 free 5188->5190 5191 1005fd8 10 API calls 5188->5191 5189->5188 5190->5188 5191->5188 5193 100485c 5192->5193 5193->5116 5193->5118 5195 100826b 9 API calls 5194->5195 5196 1006059 5195->5196 5197 1004a6c 5196->5197 5198 100885a 5 API calls 5196->5198 5197->5150 5197->5154 5199 1006081 5198->5199 5200 1007e5a CryptFindOIDInfo 5199->5200 5201 100608b printf 5200->5201 5202 10060c4 5201->5202 5203 10060a6 5201->5203 5204 1006195 5202->5204 5205 10060ce 5202->5205 5206 100885a 5 API calls 5203->5206 5209 100885a 5 API calls 5204->5209 5207 100885a 5 API calls 5205->5207 5208 10060b6 5206->5208 5210 10060de 5207->5210 5211 10058ed 12 API calls 5208->5211 5231 1006193 5209->5231 5212 10058ed 12 API calls 5210->5212 5211->5202 5214 10060ec 5212->5214 5213 1008811 free 5213->5197 5232 100812a CryptFindOIDInfo 5214->5232 5216 10060fa 5217 100826b 9 API calls 5216->5217 5216->5231 5218 1006130 5217->5218 5219 1006171 5218->5219 5220 100613c 5218->5220 5218->5231 5221 100885a 5 API calls 5219->5221 5222 100885a 5 API calls 5220->5222 5224 1006167 5221->5224 5223 100614c 5222->5223 5225 10058ed 12 API calls 5223->5225 5227 10058ed 12 API calls 5224->5227 5226 1006157 5225->5226 5228 100885a 5 API calls 5226->5228 5229 100618d 5227->5229 5228->5224 5230 1008811 free 5229->5230 5230->5231 5231->5213 5233 100814c 5232->5233 5233->5216 5234 10069f3 5235 10069eb 5234->5235 5235->5234 5238 1006e49 5235->5238 5239 100826b 9 API calls 5238->5239 5241 1006e64 5239->5241 5240 1006f0a 5242 1006a24 5240->5242 5244 1008811 free 5240->5244 5241->5240 5243 100885a 5 API calls 5241->5243 5245 1006e7e CertRDNValueToStrW 5243->5245 5244->5242 5246 1006eb3 5245->5246 5247 1006e97 5245->5247 5249 100885a 5 API calls 5246->5249 5248 10087df 6 API calls 5247->5248 5250 1006ea4 5248->5250 5251 1006ec5 5249->5251 5250->5246 5252 1006eac CertRDNValueToStrW 5250->5252 5253 1006ee0 5251->5253 5254 1006ecf wprintf 5251->5254 5252->5246 5256 100885a 5 API calls 5253->5256 5255 1006ef0 printf 5254->5255 5255->5240 5257 1006f04 5255->5257 5256->5255 5258 1008811 free 5257->5258 5258->5240 5259 1004b7b printf 5260 1004b98 5259->5260 5261 1004b7a 5259->5261 5262 1004bc0 5260->5262 5264 100885a 5 API calls 5260->5264 5261->5259 5263 1004bed 5262->5263 5265 100885a 5 API calls 5262->5265 5266 1005d9d 12 API calls 5263->5266 5267 1004bae 5264->5267 5269 1004bd9 5265->5269 5270 1004bfc 5266->5270 5268 10058ed 12 API calls 5267->5268 5268->5262 5271 1008340 printf 5269->5271 5272 100885a 5 API calls 5270->5272 5273 1004be1 printf 5271->5273 5274 1004c0d 5272->5274 5273->5263 5275 1005d9d 12 API calls 5274->5275 5276 1004c1c 5275->5276 5277 100885a 5 API calls 5276->5277 5278 1004c2d 5277->5278 5279 10082f1 3 API calls 5278->5279 5280 1004c36 5279->5280 5281 1004c4c CertGetCRLContextProperty 5280->5281 5282 100885a 5 API calls 5280->5282 5283 1005d22 9 API calls 5281->5283 5284 1004c4a 5282->5284 5285 1004c70 CertGetCRLContextProperty 5283->5285 5284->5281 5286 1005d22 9 API calls 5285->5286 5287 1004c95 5286->5287 5288 1004d04 5287->5288 5289 100885a 5 API calls 5287->5289 5290 100885a 5 API calls 5288->5290 5291 1004cad 5289->5291 5295 1004d2d 5290->5295 5292 100885a 5 API calls 5291->5292 5293 1004ccc printf 5292->5293 5293->5288 5294 1004ce2 5293->5294 5296 100885a 5 API calls 5294->5296 5297 1004cf2 5296->5297 5298 10058ed 12 API calls 5297->5298 5298->5288 3455 100197f 3456 1001988 3455->3456 3462 1001a09 3455->3462 3458 1001991 3456->3458 3456->3462 3457 1001a42 3459 1001a55 3457->3459 3480 1003185 3457->3480 3461 100885a 5 API calls 3458->3461 3465 10019a1 3459->3465 3586 1002798 3459->3586 3461->3465 3462->3457 3462->3465 3562 1004277 3462->3562 3467 100885a 5 API calls 3465->3467 3469 10019b3 3467->3469 3468 100885a 5 API calls 3468->3457 3470 10019c4 3469->3470 3559 1008811 3469->3559 3472 10019d3 3470->3472 3474 1008811 free 3470->3474 3473 10019e2 3472->3473 3475 1008811 free 3472->3475 3476 10019f2 3473->3476 3477 10019eb CryptMsgClose 3473->3477 3474->3472 3475->3473 3478 1001a03 3476->3478 3479 10019f8 CertCloseStore 3476->3479 3477->3476 3479->3478 3481 10031c5 3480->3481 3482 10035ef 3480->3482 3481->3482 3483 10031d2 3481->3483 3484 100885a 5 API calls 3482->3484 3485 10031f3 CertOpenStore 3483->3485 3486 1003229 3483->3486 3544 10035e8 3484->3544 3487 100321b 3485->3487 3501 100320f 3485->3501 3491 1003251 3486->3491 3492 1003268 3486->3492 3486->3501 3502 1003258 3486->3502 3693 1003b26 3487->3693 3489 1003512 3493 1003522 3489->3493 3494 100351d CertFreeCTLContext 3489->3494 3490 100350d CertFreeCTLContext 3490->3489 3710 1003c14 3491->3710 3497 1003275 CertFindCertificateInStore 3492->3497 3498 100360a 3492->3498 3503 1003530 3493->3503 3504 1003527 CertFreeCTLContext 3493->3504 3494->3493 3496 10032de 3496->3501 3505 10033cb 3496->3505 3512 10033c3 3496->3512 3513 10033df 3496->3513 3497->3501 3506 10032aa CertDeleteCTLFromStore 3497->3506 3675 1003f3f 3498->3675 3499 10032f2 3508 1003334 3499->3508 3509 10032fb 3499->3509 3500 10032d6 3507 1003c14 12 API calls 3500->3507 3501->3489 3501->3490 3502->3496 3502->3499 3502->3500 3502->3501 3511 1003563 3503->3511 3517 1003545 CertFreeCTLContext 3503->3517 3518 100355b free 3503->3518 3504->3503 3505->3501 3515 10034ae 3505->3515 3775 10037ec 3505->3775 3506->3501 3506->3502 3507->3496 3740 10040a4 3508->3740 3727 1003a45 3509->3727 3520 100358e 3511->3520 3529 1003570 CertFreeCTLContext 3511->3529 3530 1003586 free 3511->3530 3523 1003c14 12 API calls 3512->3523 3524 10033e8 CertFindCTLInStore 3513->3524 3525 100342b 3513->3525 3515->3501 3522 10034c9 3515->3522 3805 10039bf wcslen CertEnumCertificatesInStore 3515->3805 3517->3517 3517->3518 3518->3511 3531 10035bd 3520->3531 3538 10035b5 free 3520->3538 3539 100359b CertFreeCTLContext 3520->3539 3522->3501 3656 10036b8 3522->3656 3523->3505 3524->3501 3533 100341b CertDeleteCTLFromStore 3524->3533 3763 1004193 3525->3763 3528 1003324 CertDeleteCTLFromStore 3528->3496 3528->3501 3529->3529 3529->3530 3530->3520 3540 10035d5 3531->3540 3543 10035c8 CertCloseStore 3531->3543 3533->3501 3533->3505 3536 1003357 CertDuplicateCTLContext 3542 1003396 CertDeleteCTLFromStore 3536->3542 3537 1003369 3537->3496 3753 1003db3 3537->3753 3538->3531 3539->3538 3539->3539 3540->3544 3549 100885a 5 API calls 3540->3549 3542->3496 3542->3501 3543->3540 3544->3459 3545 100344e CertDuplicateCTLContext 3550 100348d CertDeleteCTLFromStore 3545->3550 3546 100365d CertDuplicateCertificateContext 3551 100369e CertDeleteCTLFromStore 3546->3551 3547 100366f 3547->3502 3813 1003ced 3547->3813 3549->3544 3550->3501 3550->3505 3551->3501 3551->3502 3554 100337e CertDuplicateCTLContext 3554->3542 3555 1003460 3555->3501 3555->3505 3557 1003475 CertDuplicateCTLContext 3555->3557 3557->3550 3558 1003686 CertDuplicateCertificateContext 3558->3551 3560 1008823 3559->3560 3561 1008818 free 3559->3561 3560->3470 3561->3560 3563 100429b 3562->3563 3580 1004303 3562->3580 3564 10042a3 CertEnumCertificatesInStore 3563->3564 3584 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 3563->3584 3564->3563 3566 10042ec 3564->3566 3565 100431c CertEnumCTLsInStore 3570 1004365 3565->3570 3565->3580 3571 100885a 5 API calls 3566->3571 3566->3580 3567 1004410 CertFreeCTLContext 3568 1004417 3567->3568 3572 1004422 3568->3572 3573 100441b CertFreeCTLContext 3568->3573 3569 100439b CertGetCRLFromStore 3574 10043f3 3569->3574 3583 100437c 3569->3583 3575 100885a 5 API calls 3570->3575 3570->3583 3571->3580 3577 1001a2a 3572->3577 3578 1004429 CertFreeCTLContext 3572->3578 3573->3572 3579 100885a 5 API calls 3574->3579 3581 100440a 3574->3581 3575->3583 3576 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 3576->3583 3577->3465 3577->3468 3578->3577 3579->3581 3580->3565 3580->3583 3585 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 3580->3585 3581->3567 3581->3568 3582 1004de4 44 API calls 3582->3583 3583->3569 3583->3576 3583->3581 3583->3582 3584->3563 3585->3580 3587 10027d4 3586->3587 3588 1002baa 3586->3588 3587->3588 3590 10027e1 CertOpenStore 3587->3590 3589 100885a 5 API calls 3588->3589 3646 1002ba3 3589->3646 3591 1002805 3590->3591 3637 10027f9 3590->3637 3592 1002828 3591->3592 3596 1002838 3591->3596 3597 100281d 3591->3597 3595 10028bb 3592->3595 3601 10028b0 3592->3601 3602 10028cf 3592->3602 3592->3637 3593 1002ad8 3603 1002ae6 3593->3603 3604 1002add CertFreeCTLContext 3593->3604 3594 1002acf CertFreeCTLContext 3594->3593 3598 10029a8 3595->3598 3606 10029bc 3595->3606 3607 100299d 3595->3607 3595->3637 3599 1002bc5 3596->3599 3600 1002845 CertFindCertificateInStore 3596->3600 3605 1003b26 9 API calls 3597->3605 3609 1002a8d 3598->3609 3616 10037ec 20 API calls 3598->3616 3598->3637 3627 1003f3f 11 API calls 3599->3627 3608 1002878 CertAddCertificateContextToStore 3600->3608 3600->3637 3610 1003b26 9 API calls 3601->3610 3613 1002920 3602->3613 3614 10028d8 3602->3614 3611 1002af4 3603->3611 3612 1002aeb CertFreeCTLContext 3603->3612 3604->3603 3605->3592 3619 10029c5 CertFindCTLInStore 3606->3619 3620 1002a18 3606->3620 3617 1003b26 9 API calls 3607->3617 3618 100288f CertFreeCTLContext 3608->3618 3608->3637 3625 10039bf 6 API calls 3609->3625 3609->3637 3638 1002aaa 3609->3638 3610->3595 3621 1002b27 3611->3621 3630 1002b21 free 3611->3630 3631 1002b07 CertFreeCTLContext 3611->3631 3612->3611 3615 10040a4 7 API calls 3613->3615 3622 1003a45 12 API calls 3614->3622 3636 100292e 3615->3636 3616->3609 3617->3598 3618->3592 3628 10029fb CertAddCTLContextToStore 3619->3628 3619->3637 3629 1004193 7 API calls 3620->3629 3624 1002b54 3621->3624 3633 1002b34 CertFreeCTLContext 3621->3633 3634 1002b4e free 3621->3634 3623 10028ee 3622->3623 3632 1002903 CertAddCTLContextToStore 3623->3632 3623->3637 3635 1002b81 3624->3635 3641 1002b61 CertFreeCTLContext 3624->3641 3642 1002b7b free 3624->3642 3625->3638 3626 10036b8 63 API calls 3626->3637 3651 1002be8 3627->3651 3628->3637 3639 1002a0c CertFreeCTLContext 3628->3639 3648 1002a26 3629->3648 3630->3621 3631->3630 3631->3631 3632->3637 3640 1002914 CertFreeCTLContext 3632->3640 3633->3633 3633->3634 3634->3624 3643 1002b90 3635->3643 3644 1002b86 CertCloseStore 3635->3644 3636->3595 3636->3637 3649 1003db3 45 API calls 3636->3649 3653 1002944 3636->3653 3637->3593 3637->3594 3638->3626 3638->3637 3639->3598 3640->3595 3641->3641 3641->3642 3642->3635 3643->3646 3650 100885a 5 API calls 3643->3650 3644->3643 3645 100296f CertAddCTLContextToStore 3645->3595 3645->3637 3646->3465 3647 1002a67 CertAddCTLContextToStore 3647->3598 3647->3637 3648->3598 3648->3637 3648->3647 3649->3653 3650->3646 3651->3592 3651->3637 3654 1003ced 6 API calls 3651->3654 3655 1002c18 3651->3655 3652 1002c45 CertAddCertificateContextToStore 3652->3592 3652->3637 3653->3637 3653->3645 3654->3655 3655->3637 3655->3652 3657 10036e6 3656->3657 3658 10036cd 3656->3658 3659 100376d CertOpenStore 3657->3659 3661 10036fb 3657->3661 3660 100885a 5 API calls 3658->3660 3664 10037b0 3659->3664 3670 10037a9 3659->3670 3663 10036dd 3660->3663 3665 100373a 3661->3665 3822 1002558 3661->3822 3663->3501 3667 1003b26 9 API calls 3664->3667 3669 1003754 CertSaveStore 3665->3669 3665->3670 3667->3670 3669->3670 3671 100885a 5 API calls 3670->3671 3672 10037cd 3670->3672 3671->3672 3672->3663 3674 10037d9 CertCloseStore 3672->3674 3673 1003b26 9 API calls 3673->3665 3674->3663 3676 1003f5a 3675->3676 3677 100362e 3675->3677 3676->3677 3678 1003fd0 CertFindCertificateInStore 3676->3678 3679 1003f6f CertEnumCertificatesInStore 3676->3679 3677->3501 3677->3546 3677->3547 3680 1003fef 3678->3680 3692 1003fce 3678->3692 3681 1003f83 3679->3681 3679->3692 3683 1003ff1 realloc 3680->3683 3682 1003f85 realloc 3681->3682 3684 1003fa0 CertDuplicateCertificateContext 3682->3684 3682->3692 3685 1004008 CertDuplicateCertificateContext 3683->3685 3683->3692 3687 1003fbb CertEnumCertificatesInStore 3684->3687 3684->3692 3688 100401f CertFindCertificateInStore 3685->3688 3685->3692 3686 1004077 3686->3677 3689 100408d CertFreeCTLContext 3686->3689 3687->3682 3687->3692 3688->3683 3688->3692 3689->3677 3690 100406e free 3690->3686 3691 1004061 CertFreeCTLContext 3691->3692 3692->3686 3692->3690 3692->3691 3694 1003b45 CertEnumCertificatesInStore 3693->3694 3704 1003b6e 3693->3704 3696 1003b57 CertAddCertificateContextToStore 3694->3696 3694->3704 3696->3694 3698 1003bdc 3696->3698 3697 1003b7e CertEnumCTLsInStore 3699 1003b87 CertAddCTLContextToStore 3697->3699 3705 1003ba0 3697->3705 3702 1003be7 CertFreeCTLContext 3698->3702 3703 1003bee 3698->3703 3699->3698 3699->3704 3700 1003bb5 CertGetCRLFromStore 3700->3698 3701 1003bbe CertAddCTLContextToStore 3700->3701 3701->3698 3701->3705 3702->3703 3706 1003bf3 CertFreeCTLContext 3703->3706 3707 1003bfc 3703->3707 3704->3697 3704->3705 3705->3698 3705->3700 3706->3707 3708 1003c01 CertFreeCTLContext 3707->3708 3709 1003c0a 3707->3709 3708->3709 3709->3486 3711 1003c33 CertEnumCertificatesInStore 3710->3711 3712 1003c55 3710->3712 3711->3712 3713 1003c41 CertDuplicateCertificateContext CertDeleteCTLFromStore 3711->3713 3715 1003c80 3712->3715 3717 1003c5e CertEnumCTLsInStore 3712->3717 3714 1003cb7 3713->3714 3716 1003c53 3713->3716 3720 1003cc3 CertFreeCTLContext 3714->3720 3721 1003cca 3714->3721 3715->3714 3719 1003c8e CertGetCRLFromStore 3715->3719 3716->3711 3717->3715 3718 1003c6b CertDuplicateCTLContext CertDeleteCTLFromStore 3717->3718 3718->3712 3718->3714 3719->3714 3722 1003c9d CertDuplicateCTLContext CertDeleteCTLFromStore 3719->3722 3720->3721 3723 1003cd5 3721->3723 3724 1003cce CertFreeCTLContext 3721->3724 3722->3714 3722->3715 3725 1003ce0 3723->3725 3726 1003cd9 CertFreeCTLContext 3723->3726 3724->3723 3725->3502 3726->3725 3728 1003a63 3727->3728 3729 1003311 3727->3729 3728->3729 3730 1003a6f CertGetCRLFromStore 3728->3730 3729->3501 3729->3528 3731 1003aee 3730->3731 3739 1003a85 3730->3739 3732 1003b06 3731->3732 3734 1008811 free 3731->3734 3732->3729 3735 1003b10 CertFreeCTLContext 3732->3735 3733 1003a8b CertGetCRLContextProperty 3733->3731 3733->3739 3734->3732 3735->3729 3736 10087df 6 API calls 3736->3739 3737 1003aac CertGetCRLContextProperty 3737->3731 3737->3739 3738 1003ad6 CertGetCRLFromStore 3738->3731 3738->3733 3739->3731 3739->3733 3739->3736 3739->3737 3739->3738 3741 10040c3 3740->3741 3750 1003342 3740->3750 3742 10040ce CertGetCRLFromStore 3741->3742 3741->3750 3743 10040e8 3742->3743 3747 1004130 3742->3747 3744 10040ea realloc 3743->3744 3746 1004101 CertDuplicateCTLContext 3744->3746 3744->3747 3745 1004166 3745->3750 3751 100417c CertFreeCTLContext 3745->3751 3746->3747 3748 1004118 CertGetCRLFromStore 3746->3748 3747->3745 3749 100415d free 3747->3749 3752 1004150 CertFreeCTLContext 3747->3752 3748->3744 3748->3747 3749->3745 3750->3501 3750->3536 3750->3537 3751->3750 3752->3747 3757 1003dc2 3753->3757 3761 100337a 3753->3761 3754 100885a 5 API calls 3754->3757 3755 1003e06 3756 100885a 5 API calls 3755->3756 3758 1003e35 scanf 3756->3758 3757->3754 3757->3755 3760 1003e4c 3757->3760 3757->3761 3944 1004de4 3757->3944 3758->3760 3760->3761 3762 100885a 5 API calls 3760->3762 3761->3501 3761->3554 3762->3761 3764 10041ae 3763->3764 3772 1003439 3763->3772 3765 10041b9 CertEnumCTLsInStore 3764->3765 3764->3772 3766 10041d0 realloc 3765->3766 3770 100420e 3765->3770 3767 10041e7 CertDuplicateCTLContext 3766->3767 3766->3770 3768 10041ff CertEnumCTLsInStore 3767->3768 3767->3770 3768->3766 3768->3770 3769 100424a 3771 1004260 CertFreeCTLContext 3769->3771 3769->3772 3770->3769 3773 1004241 free 3770->3773 3774 1004234 CertFreeCTLContext 3770->3774 3771->3772 3772->3501 3772->3545 3772->3555 3773->3769 3774->3770 4060 100894a 3775->4060 3777 1003835 strtok 3778 1003819 3777->3778 3781 1003844 3777->3781 3778->3777 3792 100381d 3778->3792 3779 10087df 6 API calls 3780 1003891 3779->3780 3782 100396c 3780->3782 3784 10087df 6 API calls 3780->3784 3781->3779 3781->3782 3785 1003916 CertEnumCertificatesInStore 3781->3785 3783 1003980 3782->3783 3786 1008811 free 3782->3786 3789 1003994 3783->3789 3791 100399a 3783->3791 3795 1008811 free 3783->3795 3787 10038ad CryptEncodeObject 3784->3787 3785->3782 3800 1003929 3785->3800 3786->3783 3787->3782 3794 10038f4 3787->3794 3796 1008811 free 3789->3796 3790 10039a7 3790->3792 3793 10039ac CertFreeCTLContext 3790->3793 3791->3790 3798 1008811 free 3791->3798 3792->3515 3793->3792 3799 10087df 6 API calls 3794->3799 3795->3789 3796->3791 3797 100392f CertSetCertificateContextProperty 3797->3782 3797->3800 3798->3790 3803 10038fe 3799->3803 3800->3797 3801 1003941 CertSetCertificateContextProperty 3800->3801 3802 100395d CertEnumCertificatesInStore 3800->3802 3801->3782 3801->3802 3802->3782 3802->3797 3803->3782 3804 1003905 CryptEncodeObject 3803->3804 3804->3782 3804->3785 3806 1003a29 3805->3806 3807 10039fb 3805->3807 3809 1003a34 CertFreeCTLContext 3806->3809 3810 1003a3b 3806->3810 3808 1003a01 CertSetCertificateContextProperty 3807->3808 3808->3806 3811 1003a0e CertSetCertificateContextProperty 3808->3811 3809->3810 3810->3522 3811->3806 3812 1003a1d CertEnumCertificatesInStore 3811->3812 3812->3806 3812->3808 3814 1003682 3813->3814 3819 1003cfc 3813->3819 3814->3501 3814->3558 3815 1003d40 3817 100885a 5 API calls 3815->3817 3816 100885a 5 API calls 3816->3819 3818 1003d6f scanf 3817->3818 3820 1003d86 3818->3820 3819->3814 3819->3815 3819->3816 3819->3820 3820->3814 3821 100885a 5 API calls 3820->3821 3821->3814 3823 1002574 3822->3823 3824 1002781 3822->3824 3823->3824 3825 1002582 CertOpenStore 3823->3825 3827 1002600 3823->3827 3828 1002597 3823->3828 3824->3665 3824->3673 3833 100260c 3825->3833 3853 10056a4 3827->3853 3828->3825 3830 100259e CertOpenStore 3828->3830 3832 10025c0 3830->3832 3830->3833 3832->3833 3834 10025cd CertCloseStore 3832->3834 3833->3824 3835 1008811 free 3833->3835 3837 1002770 CertOpenStore 3834->3837 3835->3824 3837->3833 3841 1002690 CertOpenStore 3841->3833 3842 10026ad 3841->3842 3880 10052a5 CryptSIPRetrieveSubjectGuid 3842->3880 3847 10026d7 CertOpenStore 3847->3833 3848 10026f6 CertAddEncodedCTLToStore 3847->3848 3848->3833 3849 1002710 CertAddEncodedCRLToStore 3848->3849 3849->3833 3850 100272a CertAddEncodedCertificateToStore 3849->3850 3850->3833 3851 1002744 CertCloseStore CertOpenStore 3850->3851 3851->3833 3852 1002762 3851->3852 3852->3837 3904 10089cf 3853->3904 3856 10056c0 CertOpenStore 3858 10056d6 CertAddEncodedCTLToStore 3856->3858 3859 10056fa 3856->3859 3857 1002606 3857->3833 3862 10055cc 3857->3862 3858->3859 3860 10056f0 CertCloseStore 3858->3860 3859->3857 3861 10056ff UnmapViewOfFile 3859->3861 3860->3859 3861->3857 3863 10089cf 9 API calls 3862->3863 3864 10055e0 3863->3864 3865 10055e8 CertOpenStore 3864->3865 3866 1002636 3864->3866 3867 1005622 3865->3867 3868 10055fe CertAddEncodedCRLToStore 3865->3868 3866->3833 3871 1005638 3866->3871 3867->3866 3870 1005627 UnmapViewOfFile 3867->3870 3868->3867 3869 1005618 CertCloseStore 3868->3869 3869->3867 3870->3866 3872 10089cf 9 API calls 3871->3872 3873 100564c 3872->3873 3874 1005654 CertOpenStore 3873->3874 3879 1002666 3873->3879 3875 100566a CertAddEncodedCertificateToStore 3874->3875 3876 100568e 3874->3876 3875->3876 3877 1005684 CertCloseStore 3875->3877 3878 1005693 UnmapViewOfFile 3876->3878 3876->3879 3877->3876 3878->3879 3879->3833 3879->3841 3881 10052d6 CryptSIPLoad 3880->3881 3883 1005411 3880->3883 3882 10052fd 3881->3882 3881->3883 3882->3883 3886 1005354 3882->3886 3884 10026b5 3883->3884 3885 1008811 free 3883->3885 3884->3833 3895 100555c 3884->3895 3885->3884 3920 10087df malloc 3886->3920 3889 1005385 CertOpenStore 3889->3883 3890 10053a2 3889->3890 3891 10053b8 CryptMsgOpenToDecode 3890->3891 3892 10053e1 CryptMsgUpdate 3891->3892 3893 10053d4 CertCloseStore 3891->3893 3892->3883 3894 10053f4 CertCloseStore CryptMsgClose 3892->3894 3893->3883 3894->3883 3896 10089cf 9 API calls 3895->3896 3897 100557a 3896->3897 3898 10026cf 3897->3898 3924 1005428 3897->3924 3898->3833 3898->3847 3901 10055af 3901->3898 3903 10055bc UnmapViewOfFile 3901->3903 3903->3898 3905 10056b8 3904->3905 3906 10089ea 3904->3906 3905->3856 3905->3857 3906->3905 3907 10089fe CreateFileU 3906->3907 3908 1008a22 GetFileSize 3907->3908 3909 1008a66 GetLastError 3907->3909 3908->3909 3910 1008a34 3908->3910 3911 1008a72 GetLastError 3909->3911 3912 1008a78 GetLastError 3909->3912 3913 1008a40 CreateFileMappingA 3910->3913 3914 1008a39 3910->3914 3911->3914 3912->3914 3913->3909 3915 1008a56 MapViewOfFile 3913->3915 3916 1008aa2 3914->3916 3917 1008a9d CloseHandle 3914->3917 3915->3909 3919 1008a8a 3915->3919 3916->3905 3918 1008aa8 CloseHandle 3916->3918 3917->3916 3918->3905 3919->3914 3921 10087f3 3920->3921 3922 100535e 3920->3922 3921->3922 3923 100885a 5 API calls 3921->3923 3922->3883 3922->3889 3923->3922 3925 100544e 3924->3925 3926 10087df 6 API calls 3925->3926 3928 1005452 3925->3928 3927 100546f 3926->3927 3927->3928 3929 1008811 free 3927->3929 3928->3901 3930 10054c2 3928->3930 3929->3928 3939 10086b0 LocalAlloc 3930->3939 3933 10087df 6 API calls 3934 1005509 3933->3934 3935 10086b0 3 API calls 3934->3935 3937 10054ec 3934->3937 3936 1005526 3935->3936 3936->3937 3938 1008811 free 3936->3938 3937->3901 3938->3937 3940 10086cf WideCharToMultiByte 3939->3940 3943 10086ca 3939->3943 3940->3943 3941 10054e8 3941->3933 3941->3937 3942 100870b LocalFree 3942->3941 3943->3941 3943->3942 3945 100885a 5 API calls 3944->3945 3946 1004e03 3945->3946 3977 10061b4 3946->3977 3951 100885a 5 API calls 3952 1004e36 3951->3952 3953 1005d9d 12 API calls 3952->3953 3954 1004e45 3953->3954 3955 100885a 5 API calls 3954->3955 3956 1004e56 CertGetCRLContextProperty 3955->3956 4017 1005d22 3956->4017 3958 1004e7d CertGetCRLContextProperty 3959 1005d22 9 API calls 3958->3959 3960 1004e9e 3959->3960 3961 1004f1d 3960->3961 3964 100885a 5 API calls 3960->3964 3962 1004f50 3961->3962 3963 1004f3c 3961->3963 3967 100885a 5 API calls 3962->3967 3965 100885a 5 API calls 3963->3965 3966 1004ebd 3964->3966 3968 1004f4c 3965->3968 3970 100885a 5 API calls 3966->3970 3969 1004f60 3967->3969 3968->3757 4037 1004f7d 3969->4037 3972 1004edf printf 3970->3972 3972->3961 3973 1004ef8 3972->3973 3974 100885a 5 API calls 3973->3974 3975 1004f08 3974->3975 4025 10058ed 3975->4025 4044 100826b 3977->4044 3979 10061d5 3980 1004e19 3979->3980 3981 1008811 free 3979->3981 4003 1005d9d 3980->4003 3981->3980 3982 10061cd 3982->3979 3983 1007e5a CryptFindOIDInfo 3982->3983 3987 10058ed 12 API calls 3982->3987 3989 1007e5a CryptFindOIDInfo 3982->3989 3992 10063c9 printf 3982->3992 3994 10062ef CertRDNValueToStrW 3982->3994 3995 10087df 6 API calls 3982->3995 3996 10062bc CertRDNValueToStrA 3982->3996 3997 100631c CertRDNValueToStrW 3982->3997 4002 1008811 free 3982->4002 4054 1007e5a CryptFindOIDInfo 3982->4054 3984 10063da printf 3983->3984 3985 100885a 5 API calls 3984->3985 3985->3982 3987->3982 3989->3982 3990 1006270 3993 1006274 printf 3990->3993 3991 1006289 printf CertRDNValueToStrA 3991->3982 3991->3994 3992->3982 3993->3991 3993->3993 3994->3982 3995->3982 3998 100885a 5 API calls 3996->3998 4000 100885a 5 API calls 3997->4000 3999 10062d7 printf 3998->3999 4001 1008811 free 3999->4001 4000->3982 4001->3994 4002->3982 4004 1005db9 4003->4004 4005 1005ddb 4003->4005 4004->4005 4006 1005dbe 4004->4006 4007 100871b 4 API calls 4005->4007 4008 100871b 4 API calls 4006->4008 4009 1005df4 4007->4009 4010 1004e25 4008->4010 4009->4010 4011 100871b 4 API calls 4009->4011 4010->3951 4012 1005e15 4011->4012 4012->4010 4013 1005e1d FileTimeToLocalFileTime FileTimeToSystemTime 4012->4013 4014 1005ed0 swprintf 4013->4014 4015 1005e3e _wasctime wcscpy wcslen 4013->4015 4014->4010 4015->4010 4016 1005ead wcslen swprintf 4015->4016 4016->4010 4018 100885a 5 API calls 4017->4018 4019 1005d39 4018->4019 4020 1005d4a printf 4019->4020 4022 1005d66 4019->4022 4021 1005d58 printf 4020->4021 4021->3958 4022->4021 4023 1005d93 printf 4022->4023 4024 1005d7b printf 4022->4024 4023->4022 4024->4023 4024->4024 4026 10058f9 4025->4026 4031 1005914 4025->4031 4027 100885a 5 API calls 4026->4027 4028 100590c 4027->4028 4028->3961 4029 1005920 wprintf 4029->4031 4030 1005940 wprintf 4030->4030 4030->4031 4031->4028 4031->4029 4031->4030 4032 100596a wprintf 4031->4032 4033 10059a1 wprintf 4031->4033 4034 100595f wprintf 4031->4034 4035 1005994 wprintf 4031->4035 4036 1005986 wprintf 4031->4036 4032->4031 4032->4033 4033->4028 4033->4029 4034->4032 4034->4034 4035->4031 4036->4031 4038 100502c 4037->4038 4043 1004f8c 4037->4043 4038->3968 4041 1005d9d 12 API calls 4041->4043 4042 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 4042->4043 4043->4038 4043->4041 4043->4042 4056 1008340 4043->4056 4045 100827b 4044->4045 4046 100827d CryptDecodeObject 4044->4046 4045->4046 4047 10082a6 4046->4047 4051 10082d8 4046->4051 4048 10087df 6 API calls 4047->4048 4047->4051 4049 10082b5 4048->4049 4050 10082bb CryptDecodeObject 4049->4050 4049->4051 4050->4051 4052 10082d2 4050->4052 4051->3982 4053 1008811 free 4052->4053 4053->4051 4055 100624e printf 4054->4055 4055->3990 4055->3991 4057 1008352 4056->4057 4058 1004fb4 printf 4056->4058 4059 1008355 printf 4057->4059 4058->4043 4059->4058 4059->4059 4061 100895c WideCharToMultiByte 4060->4061 4062 1008986 4060->4062 4063 1008975 4061->4063 4064 10089ac GetLastError 4061->4064 4062->3778 4067 10087df 6 API calls 4063->4067 4065 10089b8 GetLastError 4064->4065 4066 10089bc GetLastError 4064->4066 4065->4062 4066->4062 4068 100897d 4067->4068 4068->4062 4069 100898d WideCharToMultiByte 4068->4069 4069->4062 4070 10089a2 4069->4070 4071 1008811 free 4070->4071 4071->4064 5299 1007e7f 5302 1007eaf 5299->5302 5300 1007ec2 5301 1007fc2 SetLastError 5300->5301 5303 1007ed4 5300->5303 5301->5303 5302->5300 5302->5303 5304 100826b 9 API calls 5302->5304 5305 1007ee5 5304->5305 5305->5303 5320 1001a9b 5305->5320 5308 1001a9b 5 API calls 5309 1007f28 5308->5309 5310 1001a9b 5 API calls 5309->5310 5311 1007f3f 5310->5311 5312 1001a9b 5 API calls 5311->5312 5313 1007f56 5312->5313 5314 1007f85 5313->5314 5315 1007f5b swprintf wcscat 5313->5315 5317 1001a9b 5 API calls 5314->5317 5316 1007f9c 5315->5316 5318 1008811 free 5316->5318 5317->5316 5319 1007fa2 wcslen 5318->5319 5319->5300 5319->5303 5321 100871b 4 API calls 5320->5321 5322 1001ab5 5321->5322 5323 1001ab9 5322->5323 5324 1001abf wcscat 5322->5324 5323->5308 5324->5323 5325 1006a7f 5326 1006a77 5325->5326 5326->5325 5329 1006d5e 5326->5329 5330 100826b 9 API calls 5329->5330 5331 1006d73 5330->5331 5332 1006ab0 5331->5332 5333 100885a 5 API calls 5331->5333 5334 1006d92 5333->5334 5336 100885a 5 API calls 5334->5336 5340 1006da8 5334->5340 5335 1006e12 5335->5332 5339 1008811 free 5335->5339 5336->5340 5337 1007e5a CryptFindOIDInfo 5338 1006dbd printf 5337->5338 5338->5340 5341 1006dfd printf 5338->5341 5339->5332 5340->5335 5340->5337 5342 100885a 5 API calls 5340->5342 5343 10058ed 12 API calls 5340->5343 5341->5340 5342->5340 5343->5340

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 238 100197f-1001982 239 1001988-100198f 238->239 240 1001a09-1001a0c 238->240 239->240 243 1001991-10019a2 call 100885a 239->243 241 1001a44-1001a4b 240->241 242 1001a0e-1001a10 240->242 246 1001a5d-1001a64 241->246 247 1001a4d-1001a50 call 1003185 241->247 244 1001a22-1001a2c call 1004277 242->244 245 1001a12-1001a20 call 1005033 242->245 262 10019a3 243->262 244->262 266 1001a32-1001a43 call 100885a 244->266 245->244 245->262 250 1001a76-1001a7d 246->250 251 1001a66-1001a70 call 1002798 246->251 255 1001a55-1001a57 247->255 258 1001a8f-1001a96 250->258 259 1001a7f-1001a89 call 1002c62 250->259 251->250 251->262 255->246 255->262 265 10019a8-10019bc call 100885a 258->265 259->258 259->262 262->265 273 10019c4-10019cb 265->273 274 10019be-10019bf call 1008811 265->274 266->241 276 10019d3-10019da 273->276 277 10019cd-10019ce call 1008811 273->277 274->273 278 10019e2-10019e9 276->278 279 10019dc-10019dd call 1008811 276->279 277->276 282 10019f2-10019f6 278->282 283 10019eb-10019ec CryptMsgClose 278->283 279->278 284 1001a03-1001a08 282->284 285 10019f8-10019fd CertCloseStore 282->285 283->282 285->284
                        APIs
                        • CryptMsgClose.CRYPT32(00000000), ref: 010019EC
                        • CertCloseStore.CRYPT32(00000000,00000000), ref: 010019FD
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Close$CertCryptStorevwprintf
                        • String ID: P/n$P>n$PMn
                        • API String ID: 3389936734-1834489009
                        • Opcode ID: 63eb66c14e7fda0570ea376976dc1e18f64bbe9a91587ae554e77367a3c350e3
                        • Instruction ID: 42b3134e16393f13461df84badb692253946a8e87c09028ea51888cae73f54e6
                        • Opcode Fuzzy Hash: 63eb66c14e7fda0570ea376976dc1e18f64bbe9a91587ae554e77367a3c350e3
                        • Instruction Fuzzy Hash: 6E215330B04301EAFF679B69ED09B993BF9BF48341F184065AAC0920E4DF7ACA40D715

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 286 1001ad0-1001aec GetModuleHandleA 287 1001b3b-1001b3d 286->287 288 1001aee-1001b02 CryptInitOIDFunctionSet 286->288 291 1001bac-1001bb0 287->291 289 1001b04-1001b09 288->289 290 1001b0b-1001b27 CryptInstallOIDFunctionAddress 288->290 292 1001b2e-1001b3a call 100885a 289->292 293 1001b29 290->293 294 1001b3f-1001b5f 290->294 292->287 293->292 296 1001b61 294->296 297 1001ba9-1001bab 294->297 298 1001b66-1001b82 call 100871b 296->298 297->291 298->287 302 1001b84-1001ba7 CryptRegisterOIDInfo 298->302 302->297 302->298
                        APIs
                        • GetModuleHandleA.KERNEL32(00000000), ref: 01001ADF
                        • CryptInitOIDFunctionSet.CRYPT32(CryptDllFormatObject,00000000), ref: 01001AF5
                        • CryptInstallOIDFunctionAddress.CRYPT32(00000000,CryptDllFormatObject,01001328,00000000), ref: 01001B1F
                        • CryptRegisterOIDInfo.CRYPT32(0000001C,00000000), ref: 01001B97
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Crypt$Function$AddressHandleInfoInitInstallModuleRegister
                        • String ID: CryptDllFormatObject
                        • API String ID: 2804595984-3973519293
                        • Opcode ID: 4c74154022490254554ef6326925eb3718cf50a35f994ad4199bc7a9ad7ba923
                        • Instruction ID: 6f13abbe2aab8b1e5bb8b6f4405c84a7c177d83238a80c1cc21b34735506dcde
                        • Opcode Fuzzy Hash: 4c74154022490254554ef6326925eb3718cf50a35f994ad4199bc7a9ad7ba923
                        • Instruction Fuzzy Hash: 502180B1E40708EBF7239F65EC84EEA7BB9FB04340F004526F295A2084E77AD9458B50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 303 10018cb-10018db 304 1001904-1001913 call 1001dc7 303->304 305 10018dd-10018e1 303->305 311 1001915-100191c 304->311 312 10018c6-10018c9 304->312 305->304 307 10018e3-10018ea 305->307 309 10018f3-1001900 call 1005710 307->309 310 10018ec-10018f1 307->310 315 1001931-1001936 call 1001bb1 309->315 317 1001902 309->317 310->312 311->315 316 100191e-1001923 call 1001d6c 311->316 312->303 322 10019b5-10019bc 315->322 316->322 317->312 323 10019c4-10019cb 322->323 324 10019be-10019bf call 1008811 322->324 326 10019d3-10019da 323->326 327 10019cd-10019ce call 1008811 323->327 324->323 328 10019e2-10019e9 326->328 329 10019dc-10019dd call 1008811 326->329 327->326 332 10019f2-10019f6 328->332 333 10019eb-10019ec CryptMsgClose 328->333 329->328 334 1001a03-1001a08 332->334 335 10019f8-10019fd CertCloseStore 332->335 333->332 335->334
                        APIs
                        • CryptMsgClose.CRYPT32(00000000), ref: 010019EC
                        • CertCloseStore.CRYPT32(00000000,00000000), ref: 010019FD
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Close$CertCryptStore
                        • String ID: P/n$P>n$PMn
                        • API String ID: 1306282253-1834489009
                        • Opcode ID: 10a47abec8d88a5924ec7f7d0afb7ba57d3237583ddbfdd2884d6f74a2bf1f38
                        • Instruction ID: dbb7c2de19337d5fef51ebb3680b7a4a5f2b0570c407ca8ccf1c5ea7785461a4
                        • Opcode Fuzzy Hash: 10a47abec8d88a5924ec7f7d0afb7ba57d3237583ddbfdd2884d6f74a2bf1f38
                        • Instruction Fuzzy Hash: 9611FC71B04205EAFB63AB69E948BA937F8BB44340F048065EAC1D71C0EB75DA40CB60

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 336 1001965-10019bc call 100885a * 2 345 10019c4-10019cb 336->345 346 10019be-10019bf call 1008811 336->346 348 10019d3-10019da 345->348 349 10019cd-10019ce call 1008811 345->349 346->345 350 10019e2-10019e9 348->350 351 10019dc-10019dd call 1008811 348->351 349->348 354 10019f2-10019f6 350->354 355 10019eb-10019ec CryptMsgClose 350->355 351->350 356 1001a03-1001a08 354->356 357 10019f8-10019fd CertCloseStore 354->357 355->354 357->356
                        APIs
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        • CryptMsgClose.CRYPT32(00000000), ref: 010019EC
                        • CertCloseStore.CRYPT32(00000000,00000000), ref: 010019FD
                          • Part of subcall function 01008811: free.MSVCRT(00000000,010019E2,00000000), ref: 0100881C
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Close$CertCryptStorefreevwprintf
                        • String ID: P/n$P>n$PMn
                        • API String ID: 1118940313-1834489009
                        • Opcode ID: 76a2339dfe4cb4e017245fc44dcbcfbfc9c8a530502f8862358d6e7c4aa865a9
                        • Instruction ID: 77acb240a226d128f079d2490b685ddcd47dd1abc9d13d3f23a27c0d587eddd9
                        • Opcode Fuzzy Hash: 76a2339dfe4cb4e017245fc44dcbcfbfc9c8a530502f8862358d6e7c4aa865a9
                        • Instruction Fuzzy Hash: 99F01971B05301EAFA23AB28FC49B993BB8BB44341F14806AB6C4D70C4DA7ADA419710

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 1003185-10031bf 1 10031c5-10031cc 0->1 2 10035ef-1003602 call 100885a 0->2 1->2 3 10031d2-10031e1 1->3 11 1003603-1003607 2->11 5 10031e3-10031e5 3->5 6 10031e7-10031e9 3->6 5->6 8 10031f3-100320d CertOpenStore 5->8 9 1003239-100323c 6->9 10 10031eb-10031f1 6->10 12 100321b-100322b call 1003b26 8->12 13 100320f-1003216 8->13 14 100323f-1003246 9->14 10->8 10->9 12->14 34 100322d-1003234 12->34 15 1003500-100350b 13->15 17 1003248-100324f 14->17 18 10032bf-10032c6 14->18 22 1003512-100351b 15->22 23 100350d-1003510 CertFreeCTLContext 15->23 24 1003251-100325a call 1003c14 17->24 25 1003268-100326f 17->25 19 10033ac 18->19 20 10032cc-10032d4 18->20 29 10033ae-10033b5 19->29 32 10032f2-10032f9 20->32 33 10032d6-10032e0 call 1003c14 20->33 26 1003522-1003525 22->26 27 100351d-1003520 CertFreeCTLContext 22->27 23->22 24->18 48 100325c-1003263 24->48 30 1003275-100329c CertFindCertificateInStore 25->30 31 100360a-1003611 25->31 36 1003530-100353b 26->36 37 1003527-100352a CertFreeCTLContext 26->37 27->26 38 10034a0-10034a6 29->38 39 10033bb-10033c1 29->39 40 10032aa-10032b5 CertDeleteCTLFromStore 30->40 41 100329e-10032a5 30->41 43 1003613-100361c 31->43 44 100361e-1003626 31->44 45 1003334-1003344 call 10040a4 32->45 46 10032fb-1003316 call 1003a45 32->46 33->29 72 10032e6-10032ed 33->72 34->15 49 1003563-1003566 36->49 50 100353d-1003543 36->50 37->36 56 10034a8-10034b0 call 10037ec 38->56 57 10034bb-10034c1 38->57 51 10033c3-10033cd call 1003c14 39->51 52 10033df-10033e6 39->52 54 10032bb 40->54 55 10036ac-10036b3 40->55 41->15 59 1003628-1003629 call 1003f3f 43->59 44->59 77 1003352-1003355 45->77 78 1003346-100334d 45->78 75 1003324-100332d CertDeleteCTLFromStore 46->75 76 1003318-100331f 46->76 48->15 64 1003568-100356e 49->64 65 100358e-1003591 49->65 61 1003545-1003559 CertFreeCTLContext 50->61 62 100355b-1003561 free 50->62 51->38 106 10033d3-10033da 51->106 70 10033e8-100340d CertFindCTLInStore 52->70 71 100342b-100343b call 1004193 52->71 54->18 55->15 56->57 100 10034b2-10034b9 56->100 67 10034c3-10034cb call 10039bf 57->67 68 10034d6-10034dd 57->68 74 100362e-1003630 59->74 61->61 61->62 62->49 79 1003570-1003584 CertFreeCTLContext 64->79 80 1003586-100358c free 64->80 81 1003593-1003599 65->81 82 10035bd-10035c0 65->82 67->68 119 10034cd-10034d4 67->119 85 10034f3-10034f4 call 10036b8 68->85 86 10034df-10034e5 68->86 88 100341b-1003424 CertDeleteCTLFromStore 70->88 89 100340f-1003416 70->89 110 1003449-100344c 71->110 111 100343d-1003444 71->111 72->15 92 1003632-1003639 74->92 93 100363e-1003643 74->93 94 10033a0-10033a7 75->94 95 100332f-1003332 75->95 76->15 96 1003357-1003367 CertDuplicateCTLContext 77->96 97 1003369 77->97 78->15 79->79 79->80 80->65 98 10035b5-10035bb free 81->98 99 100359b-10035b3 CertFreeCTLContext 81->99 101 10035c2-10035c6 82->101 102 10035d5-10035d8 82->102 121 10034f9-10034fb 85->121 104 10034e7-10034e9 86->104 105 10034fd 86->105 108 1003426-1003429 88->108 109 1003497-100349e 88->109 89->15 92->15 112 1003645-100364b 93->112 113 1003659-100365b 93->113 94->15 95->29 114 1003396-100339e CertDeleteCTLFromStore 96->114 97->29 115 100336b-100337c call 1003db3 97->115 98->82 99->98 99->99 100->15 101->102 116 10035c8-10035d3 CertCloseStore 101->116 117 10035ea-10035ed 102->117 118 10035da-10035e9 call 100885a 102->118 104->85 120 10034eb-10034f1 104->120 105->15 106->15 108->38 109->15 122 1003460 110->122 123 100344e-100345e CertDuplicateCTLContext 110->123 111->15 112->113 124 100364d-1003654 112->124 125 100365d-100366d CertDuplicateCertificateContext 113->125 126 100366f 113->126 114->29 114->94 115->94 137 100337e-1003393 CertDuplicateCTLContext 115->137 116->102 117->11 118->117 119->15 120->85 120->105 121->15 121->105 122->38 130 1003462-1003473 call 1003e79 122->130 129 100348d-1003495 CertDeleteCTLFromStore 123->129 124->15 131 100369e-10036a6 CertDeleteCTLFromStore 125->131 126->18 132 1003675-1003684 call 1003ced 126->132 129->38 129->109 130->109 140 1003475-100348a CertDuplicateCTLContext 130->140 131->18 131->55 132->55 141 1003686-100369b CertDuplicateCertificateContext 132->141 137->114 140->129 141->131
                        APIs
                        • CertOpenStore.CRYPT32(00000002,00000000,00000000,00000000), ref: 01003200
                        • CertFindCertificateInStore.CRYPT32(?,00000000,00010000,?,00000000), ref: 01003291
                          • Part of subcall function 01003C14: CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 01003C35
                          • Part of subcall function 01003C14: CertDuplicateCertificateContext.CRYPT32(00000000), ref: 01003C42
                          • Part of subcall function 01003C14: CertDeleteCTLFromStore.CRYPT32(00000000,?,00000001), ref: 01003C49
                          • Part of subcall function 01003C14: CertEnumCTLsInStore.CRYPT32(?,00000000), ref: 01003C5F
                          • Part of subcall function 01003C14: CertDuplicateCTLContext.CRYPT32(00000000,?,00000001), ref: 01003C6C
                          • Part of subcall function 01003C14: CertDeleteCTLFromStore.CRYPT32(00000000,?,00000001), ref: 01003C73
                          • Part of subcall function 01003C14: CertGetCRLFromStore.CRYPT32(?,00000000,00000000,00000002), ref: 01003C91
                          • Part of subcall function 01003C14: CertDuplicateCTLContext.CRYPT32(00000000,?,00000001), ref: 01003C9E
                          • Part of subcall function 01003C14: CertDeleteCTLFromStore.CRYPT32(00000000,?,00000001), ref: 01003CA5
                          • Part of subcall function 01003C14: CertFreeCTLContext.CRYPT32(00000000,00000000,?,?,00000001), ref: 01003CC4
                          • Part of subcall function 01003C14: CertFreeCTLContext.CRYPT32(00000000,00000000,?,?,00000001), ref: 01003CCF
                          • Part of subcall function 01003C14: CertFreeCTLContext.CRYPT32(00000000,00000000,?,?,00000001), ref: 01003CDA
                        • CertFreeCTLContext.CRYPT32(?,?), ref: 01003510
                        • CertFreeCTLContext.CRYPT32(?,?), ref: 01003520
                        • CertFreeCTLContext.CRYPT32(?,?), ref: 0100352A
                        • CertFreeCTLContext.CRYPT32(?,?), ref: 0100354E
                        • free.MSVCRT(?,?), ref: 0100355E
                        • CertFreeCTLContext.CRYPT32(?,?), ref: 01003579
                        • free.MSVCRT(?,?), ref: 01003589
                        • CertFreeCTLContext.CRYPT32(?,?), ref: 010035A4
                        • free.MSVCRT(?,?), ref: 010035B8
                        • CertCloseStore.CRYPT32(?,00000000), ref: 010035CD
                        • CertDuplicateCertificateContext.CRYPT32(?), ref: 01003662
                        • CertDuplicateCertificateContext.CRYPT32(?), ref: 0100368F
                        • CertDeleteCTLFromStore.CRYPT32(?), ref: 0100369E
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$Context$Store$Free$DuplicateFrom$CertificateDelete$free$Enum$CertificatesCloseFindOpen
                        • String ID:
                        • API String ID: 2937819547-0
                        • Opcode ID: 00397b16635c81cae4848901f55ef5f8b817b23ffd5f059c687f173048bbcf1c
                        • Instruction ID: ceba202226e1c52c8d753938b8a5235e252ee34b61ded21cb78c9f9364dbaa25
                        • Opcode Fuzzy Hash: 00397b16635c81cae4848901f55ef5f8b817b23ffd5f059c687f173048bbcf1c
                        • Instruction Fuzzy Hash: B5F12371A04209EFEF63DF94D944AEDBBF5FB48301F104069E581EB294EB369A41CB11

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 142 1002558-100256e 143 1002574-1002577 142->143 144 100278f 142->144 143->144 145 100257d-1002580 143->145 146 1002791-1002795 144->146 147 1002592-1002595 145->147 148 1002582-1002590 145->148 150 1002600-100260a call 10056a4 147->150 151 1002597-100259c 147->151 149 10025f5-10025fb CertOpenStore 148->149 152 1002772 149->152 161 1002630-100263a call 10055cc 150->161 162 100260c-1002612 150->162 154 10025e9-10025f3 151->154 155 100259e-10025ba CertOpenStore 151->155 156 1002774-1002777 152->156 154->149 155->156 158 10025c0-10025c7 155->158 159 1002781-1002783 156->159 160 1002779-100277c call 1008811 156->160 158->156 163 10025cd-10025e4 CertCloseStore 158->163 159->144 167 1002785-100278d 159->167 160->159 171 1002660-100266a call 1005638 161->171 172 100263c-1002642 161->172 165 1002624-100262b 162->165 166 1002614-100261e 162->166 169 1002770 CertOpenStore 163->169 165->156 166->156 166->165 167->146 169->152 177 1002690-10026a7 CertOpenStore 171->177 178 100266c-1002672 171->178 173 1002654-100265b 172->173 174 1002644-100264e 172->174 173->156 174->156 174->173 177->156 181 10026ad-10026b9 call 10052a5 177->181 179 1002684-100268b 178->179 180 1002674-100267e 178->180 179->156 180->156 180->179 181->156 184 10026bf-10026d1 call 100555c 181->184 184->156 187 10026d7-10026f4 CertOpenStore 184->187 187->156 188 10026f6-100270e CertAddEncodedCTLToStore 187->188 188->156 189 1002710-1002728 CertAddEncodedCRLToStore 188->189 189->156 190 100272a-1002742 CertAddEncodedCertificateToStore 189->190 190->156 191 1002744-1002760 CertCloseStore CertOpenStore 190->191 191->156 192 1002762-100276e 191->192 192->169
                        APIs
                        • CertOpenStore.CRYPT32(0000000A,00000000,?,?), ref: 010025B4
                        • CertCloseStore.CRYPT32(00000000,00000000), ref: 010025CF
                        • CertOpenStore.CRYPT32(0000000A,00000000,?,?), ref: 010025F5
                        • CertOpenStore.CRYPT32(00000006,00000000,00000000,?), ref: 01002770
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CertStore$Open$Close
                        • String ID:
                        • API String ID: 2754197958-0
                        • Opcode ID: 66eb3ab7076ffe95061d62a5c389f5189901e907c95eb4f1a77a95065bf80f19
                        • Instruction ID: c9ddbc5a20286c3309f0bfccd5a5b6e99f19dee535933a9edc4c3c0e3cdfaecd
                        • Opcode Fuzzy Hash: 66eb3ab7076ffe95061d62a5c389f5189901e907c95eb4f1a77a95065bf80f19
                        • Instruction Fuzzy Hash: 00517E31600614FBEF339FA99C4CEAE7BB8FB89741F140259F6D9A2084D73A8940DB55

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 193 1003f3f-1003f54 194 1003f5a-1003f5f 193->194 195 100409b 193->195 194->195 197 1003f65-1003f6d 194->197 196 100409d-10040a1 195->196 198 1003fd0-1003fed CertFindCertificateInStore 197->198 199 1003f6f-1003f7d CertEnumCertificatesInStore 197->199 200 1004041 198->200 201 1003fef 198->201 199->200 202 1003f83 199->202 205 1004048-100404b 200->205 204 1003ff1-1004006 realloc 201->204 203 1003f85-1003f9a realloc 202->203 203->205 206 1003fa0-1003fb5 CertDuplicateCertificateContext 203->206 204->205 207 1004008-100401d CertDuplicateCertificateContext 204->207 208 1004080-1004086 205->208 209 100404d-100404f 205->209 206->205 210 1003fbb-1003fcc CertEnumCertificatesInStore 206->210 207->205 212 100401f-100403f CertFindCertificateInStore 207->212 211 1004088-100408b 208->211 213 1004051-1004056 209->213 214 1004077-100407e 209->214 210->203 215 1003fce 210->215 216 1004096-1004099 211->216 217 100408d-1004090 CertFreeCTLContext 211->217 212->200 212->204 218 1004058-100405f 213->218 219 100406e-1004076 free 213->219 214->211 215->200 216->196 217->216 220 1004061-1004062 CertFreeCTLContext 218->220 221 1004068-100406c 218->221 219->214 220->221 221->218 221->219
                        APIs
                        • CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 01003F72
                        • realloc.MSVCRT ref: 01003F8E
                        • CertDuplicateCertificateContext.CRYPT32(?), ref: 01003FA3
                        • CertEnumCertificatesInStore.CRYPT32(?,?), ref: 01003FC1
                        • CertFindCertificateInStore.CRYPT32(?,00000000,00080007,?,00000000,00000000), ref: 01003FE2
                        • realloc.MSVCRT ref: 01003FFA
                        • CertDuplicateCertificateContext.CRYPT32(?), ref: 0100400B
                        • CertFindCertificateInStore.CRYPT32(?,00000000,00080007,?,?), ref: 01004034
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,01002BE8,?,00000000,?,?), ref: 01004062
                        • free.MSVCRT(?,?,?,?,01002BE8,?,00000000,?,?), ref: 01004070
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,01002BE8,?,00000000,?,?), ref: 01004090
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$CertificateContextStore$CertificatesDuplicateEnumFindFreerealloc$free
                        • String ID:
                        • API String ID: 1636303725-0
                        • Opcode ID: 1f4ee6068f1e8aea42f31af4c687cb09dde60afd68d6b8c1d34b77a0c8dda3a4
                        • Instruction ID: 9782e854247bb6023672c0a45df3072e1ed033e8617539a9c2345dc92b0eb93d
                        • Opcode Fuzzy Hash: 1f4ee6068f1e8aea42f31af4c687cb09dde60afd68d6b8c1d34b77a0c8dda3a4
                        • Instruction Fuzzy Hash: D1413871604246EFEB22DF68D8848AD7BF1FB44341F20486DF6D5E7290CB329994DB10

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: _initterm$__p___winitenv__p__commode__p__fmode__set_app_type__wgetmainargs
                        • String ID:
                        • API String ID: 1994959623-0
                        • Opcode ID: ae44a37183254d00835b9000c12113839250642764c810b338a186780a498866
                        • Instruction ID: 5570a4e0811c03a8a4a44dfca9dc969cf19f863603b224f5608ae785088c858c
                        • Opcode Fuzzy Hash: ae44a37183254d00835b9000c12113839250642764c810b338a186780a498866
                        • Instruction Fuzzy Hash: 1B216DB5A00308EFD726DF99DC45EDA77B8BB48710F108219F5A5A73C8DB3A95008B61

                        Control-flow Graph

                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: _initterm$__p___winitenv__setusermatherr__wgetmainargs_controlfpexit
                        • String ID:
                        • API String ID: 2704923724-0
                        • Opcode ID: b6ec3d73afdbacb6fb99eaf93588aeee621479e86df01ea7de40f688c0e2ecdb
                        • Instruction ID: 315827a1ee821c1f4935d66a40762d536e8d1ce74b8fac43ed90e89bc0abd2dc
                        • Opcode Fuzzy Hash: b6ec3d73afdbacb6fb99eaf93588aeee621479e86df01ea7de40f688c0e2ecdb
                        • Instruction Fuzzy Hash: 3E1182B2E00208DBD716DFD8EC45DEE7774BB9C315F048129F549A3284EA3695048B71

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 358 100885a-1008883 call 100871b vwprintf
                        APIs
                          • Part of subcall function 0100871B: LoadStringW.USER32(?,?,00000200,?), ref: 01008739
                        • vwprintf.MSVCRT ref: 0100887A
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: LoadStringvwprintf
                        • String ID: CertMgr Failed$CryptDllFormatObject
                        • API String ID: 1051060134-3788540627
                        • Opcode ID: d0190c0cfcd4c59cea5f43fc1432d9acab967ab62127b66740c1381843548774
                        • Instruction ID: 0b99e269634fa5a0d08168cef0d2f09bb0364d49c9215f1acf8a3bd6d1372054
                        • Opcode Fuzzy Hash: d0190c0cfcd4c59cea5f43fc1432d9acab967ab62127b66740c1381843548774
                        • Instruction Fuzzy Hash: 3DD09232409221AAEB179F54BC05CDB7BA9FB89221F04041AF58492094D72698649BA6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 639 10045f3-100465d CryptHashPublicKeyInfo call 100885a call 1005d22 CryptReleaseContext CertGetCertificateContextProperty 644 1004663-1004665 639->644 645 1004737-1004780 call 1005d9d call 100885a call 1005d9d call 100885a 639->645 647 1004668 call 10087df 644->647 663 1004782-1004786 call 1005efb 645->663 664 100478b-100478d 645->664 649 100466d-1004671 647->649 649->645 650 1004677-1004683 649->650 656 1004731-1004732 call 1008811 650->656 657 1004689-10046a4 call 100885a 650->657 656->645 665 10046a6-10046b7 call 100885a 657->665 666 10046ba-10046bf 657->666 663->664 669 1004b22-1004b29 664->669 670 1004793-10047b3 call 100885a 664->670 665->666 671 10046c1-10046d2 call 100885a 666->671 672 10046d5-10046d9 666->672 687 10047b5 670->687 688 10047ba-10047f1 call 100885a call 1007e5a printf 670->688 671->672 676 10046db-10046ec call 100885a 672->676 677 10046ef-10046f4 672->677 676->677 678 10046f6-1004707 call 100885a 677->678 679 100470a-100470f 677->679 678->679 685 1004711-1004722 call 100885a 679->685 686 1004725-1004730 printf 679->686 685->686 686->656 687->688 696 10047f3-100480f call 100885a call 10058ed 688->696 697 1004814-100481f 688->697 696->697 699 1004821 697->699 700 1004828-1004866 call 100885a call 1007e5a printf call 1008168 697->700 699->700 709 100486c-1004894 call 100885a call 10058ed 700->709 710 100492f-1004956 call 100885a CertGetPublicKeyLength 700->710 709->710 723 100489a-10048b2 call 100826b 709->723 716 1004958-1004969 call 100885a 710->716 717 100496c-1004974 710->717 716->717 720 1004976-1004987 call 100885a 717->720 721 100498a-10049b6 printf call 10058ed 717->721 720->721 731 10049b8-10049bf 721->731 732 1004a0b-1004a36 call 100885a call 100826b 721->732 723->710 733 10048b4-100492a call 100885a * 2 call 10058ed call 100885a call 10058ed call 100885a call 10058ed call 1008811 723->733 731->732 734 10049c1-10049c8 731->734 738 1004a5e-1004a73 call 1006045 732->738 749 1004a38-1004a42 call 10058ed 732->749 733->710 734->738 739 10049ce-10049f9 call 100885a call 100826b 734->739 752 1004a75-1004a8f call 100885a 738->752 753 1004abc-1004ac3 738->753 739->738 762 10049fb-1004a09 call 10058ed 739->762 766 1004a45-1004a4a call 1008811 749->766 771 1004a91-1004aa2 call 100885a 752->771 772 1004aa5-1004ab7 printf call 10058ed 752->772 755 1004ac5-1004adf call 100885a 753->755 756 1004b0c-1004b14 753->756 776 1004ae1-1004af2 call 100885a 755->776 777 1004af5-1004b07 printf call 10058ed 755->777 756->669 764 1004b16-1004b1d call 1006419 756->764 762->766 764->669 766->738 771->772 772->753 776->777 777->756
                        APIs
                        • CryptReleaseContext.ADVAPI32(?,00000000,MD5,?,?), ref: 01004643
                        • CertGetCertificateContextProperty.CRYPT32(00000000,00000002,00000000,00000000), ref: 01004656
                        • printf.MSVCRT ref: 0100472A
                        • CryptHashPublicKeyInfo.CRYPT32(?,00008003,00000000,?,?,?), ref: 01004615
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                          • Part of subcall function 01005D22: printf.MSVCRT ref: 01005D54
                          • Part of subcall function 01005D22: printf.MSVCRT ref: 01005D5D
                        • printf.MSVCRT ref: 010047DC
                        • printf.MSVCRT ref: 01004849
                          • Part of subcall function 010087DF: malloc.MSVCRT ref: 010087E6
                        • CertGetPublicKeyLength.CRYPT32(?,00000003), ref: 0100494E
                        • printf.MSVCRT ref: 01004990
                        • printf.MSVCRT ref: 01004AA6
                        • printf.MSVCRT ref: 01004AF6
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: printf$CertContextCryptPublic$CertificateHashInfoLengthPropertyReleasemallocvwprintf
                        • String ID: $%s (%S)$<NULL>$MD5$"@$@
                        • API String ID: 3252116695-720032102
                        • Opcode ID: 5f47ba163a8f5487d697a36692f403af8a0e254acf5a77b92a6cb57bb1b12a27
                        • Instruction ID: 86ecd996dec41b75314290f4de11290c562387a63d4e99c161d87747d2f252fd
                        • Opcode Fuzzy Hash: 5f47ba163a8f5487d697a36692f403af8a0e254acf5a77b92a6cb57bb1b12a27
                        • Instruction Fuzzy Hash: 11E18B71A00700EFFB17AF14EC85EAA3BB5FB18310F14C569F6849A1E1EB76D9119B18
                        APIs
                          • Part of subcall function 0100894A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,75963D80,?,?,0100227A,00000000,0100A688), ref: 0100896D
                        • strtok.MSVCRT ref: 01003835
                        • CryptEncodeObject.CRYPT32(00000001,2.5.29.37,?,00000000,01002A8D), ref: 010038EE
                        • CryptEncodeObject.CRYPT32(00000001,2.5.29.37,?,00000000,01002A8D), ref: 01003910
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptEncodeObject$ByteCharMultiWidestrtok
                        • String ID: 2.5.29.37
                        • API String ID: 722503527-3842544949
                        • Opcode ID: a292249613b1763ea29f4c1edc6f4f1df83ed2498d6ccd8199e275abe18d0251
                        • Instruction ID: b860460594227b93c8124e25a01a2def9a46fe50629c487eb601de37f54bba0f
                        • Opcode Fuzzy Hash: a292249613b1763ea29f4c1edc6f4f1df83ed2498d6ccd8199e275abe18d0251
                        • Instruction Fuzzy Hash: F8516375D0021AAFEF139FA9CC809AEBBF9FF04240F1440A9E695A7190D7319E45DBA0
                        APIs
                        • CryptSIPRetrieveSubjectGuid.CRYPT32(00000014,00000000,?), ref: 010052C9
                        • CryptSIPLoad.CRYPT32(?,00000000,?,00000000,00000000,754894E0), ref: 010052F0
                          • Part of subcall function 010087DF: malloc.MSVCRT ref: 010087E6
                        • CertOpenStore.CRYPT32(00000005,00000000,00000000,00000014), ref: 01005393
                        • CryptMsgOpenToDecode.CRYPT32(00000000,?,00000000,00000000,00000000,?), ref: 010053C5
                        • CertCloseStore.CRYPT32(00000000,00000000), ref: 010053D6
                        • CryptMsgUpdate.CRYPT32(00000000,?,00000014,00000001), ref: 010053EA
                        • CertCloseStore.CRYPT32(00000000,00000000), ref: 010053F6
                        • CryptMsgClose.CRYPT32 ref: 01005405
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Crypt$CertCloseStore$Open$DecodeGuidLoadRetrieveSubjectUpdatemalloc
                        • String ID: P
                        • API String ID: 2612970599-3110715001
                        • Opcode ID: adec96a5f5fa256dc24dddbe384e1a1c19b6a707cc696c539e4dedd743b142a4
                        • Instruction ID: b79b5d030fb68defac3c4168e1d0e744cba54ef8a6fd8182e5e4b2aa1f9a581b
                        • Opcode Fuzzy Hash: adec96a5f5fa256dc24dddbe384e1a1c19b6a707cc696c539e4dedd743b142a4
                        • Instruction Fuzzy Hash: 3741EA71A01228ABEF229B95DC48ADFBFBDFB08751F008066F695E2154DB758644CFA0
                        APIs
                        • CryptMsgGetAndVerifySigner.CRYPT32(?,00000000,00000000,00000004,?,00000014), ref: 010051B3
                        • CertFreeCTLContext.CRYPT32(?,?,?), ref: 010051E7
                          • Part of subcall function 01008186: CryptMsgGetParam.CRYPT32(00000014,00000006,?,00000000,?), ref: 010081A1
                          • Part of subcall function 01008186: CryptMsgGetParam.CRYPT32(00000014,00000006,?,00000000,00000000), ref: 010081CD
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                          • Part of subcall function 010059BD: printf.MSVCRT ref: 01005A0E
                          • Part of subcall function 01008811: free.MSVCRT(00000000,010019E2,00000000), ref: 0100881C
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Crypt$Param$CertContextFreeSignerVerifyfreeprintfvwprintf
                        • String ID: $%s (%S)$<NULL>
                        • API String ID: 1607567234-2923719891
                        • Opcode ID: a2cc370de8905cfd463e87757b93c377935dc9b7d348b015e306b42786883676
                        • Instruction ID: 92bca0db7f65d22edff000fd8d56fbaab9da7fa5f8df34a42b6d8fa7d1a7d36a
                        • Opcode Fuzzy Hash: a2cc370de8905cfd463e87757b93c377935dc9b7d348b015e306b42786883676
                        • Instruction Fuzzy Hash: 4C41AC32A40204FEFB23AB50ED41DEE7BBAFF54710F108519FAC4660E0EB729A519B50
                        APIs
                        • CryptGetOIDFunctionAddress.CRYPT32(00001BB1,00000000,00001BB1,?,?,-00001BAE), ref: 01008042
                        • wprintf.MSVCRT ref: 010080A1
                        • CryptFreeOIDFunctionAddress.CRYPT32(?,00000000), ref: 010080C3
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: AddressCryptFunction$Freewprintf
                        • String ID: %s
                        • API String ID: 1836932162-620797490
                        • Opcode ID: dd37bf7ee46febbc036273550b200ea95b8f3cf3d889ab71ea1f4efa0ccecf7e
                        • Instruction ID: ae9ebcde7074f3427b28406c2ea721576cd98c390dd7c43420ce9a5e998d0c75
                        • Opcode Fuzzy Hash: dd37bf7ee46febbc036273550b200ea95b8f3cf3d889ab71ea1f4efa0ccecf7e
                        • Instruction Fuzzy Hash: D1211636A01228FBEB62DFA5DC48DEF7FB9FB04751F008056FA4492090C7768654DBA0
                        APIs
                        • CryptDecodeObject.CRYPT32(2.5.29.21,?,?,00000000,?,?), ref: 01007711
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        • printf.MSVCRT ref: 0100778C
                        • printf.MSVCRT ref: 01007795
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: printf$CryptDecodeObjectvwprintf
                        • String ID: 2.5.29.21
                        • API String ID: 141116906-359661889
                        • Opcode ID: 636bbf38a5d317e38e3c6387f97156947c477660528b6178884334b33cab2109
                        • Instruction ID: 604cb0df0c639c08ae5e724361b11889c9a03312fa331b237a752a71003b9e20
                        • Opcode Fuzzy Hash: 636bbf38a5d317e38e3c6387f97156947c477660528b6178884334b33cab2109
                        • Instruction Fuzzy Hash: 3E011E75689309FAF7175B50AC42EDD3765F704791F10801AB7C9A90D0EBB9B9018A91
                        APIs
                        • CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                        • CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptDecodeObject
                        • String ID: 1.2.840.113549.1.9.5
                        • API String ID: 1207547050-925610549
                        • Opcode ID: bda695397514f3fee6e3046ae6edda84bebadf11517ceb8097cdc9ec799a9215
                        • Instruction ID: 846f05ef3e627ff923ec03161ef7dbed8af35a42488942c709b8441ef5f5e21e
                        • Opcode Fuzzy Hash: bda695397514f3fee6e3046ae6edda84bebadf11517ceb8097cdc9ec799a9215
                        • Instruction Fuzzy Hash: EC112A76A00609BFEF128E989D80DAF7AADBB08244F108476FA4096190D671DE109B20
                        APIs
                        • CryptDecodeObject.CRYPT32(1.3.6.1.4.1.311.2.1.27,?,?,00000000,?,?), ref: 01006F49
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        • printf.MSVCRT ref: 01006FA8
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptDecodeObjectprintfvwprintf
                        • String ID: 1.3.6.1.4.1.311.2.1.27
                        • API String ID: 2064051232-3254324927
                        • Opcode ID: 50587eb5af338e51fadaf433e0fe8bb0e14413c90f8a0a40aed8e81b19aa8bce
                        • Instruction ID: a40f8fcbc5df7a7741f39d032763650f3e7bbc26de7a4f6c5f7eb4b792bec615
                        • Opcode Fuzzy Hash: 50587eb5af338e51fadaf433e0fe8bb0e14413c90f8a0a40aed8e81b19aa8bce
                        • Instruction Fuzzy Hash: 5B014F71A48305FEFF275B50FC46F9C3BB5AB04701F60816EF284A50D4DBB666648B45
                        APIs
                        • CryptDecodeObject.CRYPT32(1.3.6.1.4.1.311.2.1.26,?,?,00000000,?,?), ref: 01006FD9
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        • printf.MSVCRT ref: 01007019
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptDecodeObjectprintfvwprintf
                        • String ID: 1.3.6.1.4.1.311.2.1.26
                        • API String ID: 2064051232-3070115369
                        • Opcode ID: ce6be71bbfede8040b3dd8588647cbc673b80bbafdea763f8c919ec8b6e125fe
                        • Instruction ID: c880fe999930be683d3f2e77d68b54266f9f90a4ee39e2af295de1dd9e8f41b0
                        • Opcode Fuzzy Hash: ce6be71bbfede8040b3dd8588647cbc673b80bbafdea763f8c919ec8b6e125fe
                        • Instruction Fuzzy Hash: A1F03076644308FAFB279B50EC06FDD3BB8FB04760F10C11AF685590D0DBBAA6149B58
                        APIs
                        • GetSystemTime.KERNEL32(?,?,?,?,?,?,01004C36,00000000,?,?,?,?,00000001,0000000A), ref: 01008302
                        • SystemTimeToFileTime.KERNEL32(?,01004C36,?,?,?,?,01004C36,00000000,?,?,?,?,00000001,0000000A), ref: 01008310
                        • CompareFileTime.KERNEL32(E80100CA,01004C36,?,?,?,?,01004C36,00000000,?,?,?,?,00000001,0000000A), ref: 0100832A
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Time$FileSystem$Compare
                        • String ID:
                        • API String ID: 2701012859-0
                        • Opcode ID: 29485ba8917972643eb751f90bc0b0930ff26f685867e9332db32897801ae220
                        • Instruction ID: 4aba3ffc9628d597b2dade0704a49769f045ab056c2b93999336ab32b65d5af0
                        • Opcode Fuzzy Hash: 29485ba8917972643eb751f90bc0b0930ff26f685867e9332db32897801ae220
                        • Instruction Fuzzy Hash: 41F05471900209EFEB11DB95D849FDA7BFCBB04354F408556F682D3090E7B4E289CBA4
                        APIs
                        • CryptFindOIDInfo.CRYPT32(00000001,?,00000004), ref: 01008142
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptFindInfo
                        • String ID:
                        • API String ID: 4232373045-399585960
                        • Opcode ID: 82cb662c5139adc79914bdd92f9a03b1b13f993d0efccfc6ee54132e69f199d6
                        • Instruction ID: 2c12d7960dfe1052e08b092bc00a13c045acbfa13a3bc0b070c4649c9602dbe5
                        • Opcode Fuzzy Hash: 82cb662c5139adc79914bdd92f9a03b1b13f993d0efccfc6ee54132e69f199d6
                        • Instruction Fuzzy Hash: 30F032326043028FE725CF08D841F96B7E8FF94721F21484AE2D19B290D3B0E860CBA5
                        APIs
                        • CryptFindOIDInfo.CRYPT32(00000001,?,?), ref: 01007E64
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptFindInfo
                        • String ID: <UNKNOWN OID>
                        • API String ID: 4232373045-3377398671
                        • Opcode ID: 7980f1f6f52001df9c7e8d35204e7d8dde8c049863cb83881a6129005cb12277
                        • Instruction ID: 784702876f8729f255bafaaaf60c1ad1af978e134d3cbec85b0a87c43ac6ec32
                        • Opcode Fuzzy Hash: 7980f1f6f52001df9c7e8d35204e7d8dde8c049863cb83881a6129005cb12277
                        • Instruction Fuzzy Hash: B6D0C9356042419EE7539B48C804E557AE5BB48380F00C444F2C48B0F1C3B5DC94D721
                        APIs
                        • CryptMsgGetParam.CRYPT32(00000014,00000006,?,00000000,?), ref: 010081A1
                          • Part of subcall function 010087DF: malloc.MSVCRT ref: 010087E6
                        • CryptMsgGetParam.CRYPT32(00000014,00000006,?,00000000,00000000), ref: 010081CD
                          • Part of subcall function 01008811: free.MSVCRT(00000000,010019E2,00000000), ref: 0100881C
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptParam$freemalloc
                        • String ID:
                        • API String ID: 2367485992-0
                        • Opcode ID: adf3a42ce27c442b389434658677714e6a74ce59a07f4cbf9e2db1c4dc5a88bb
                        • Instruction ID: b3c547420d5a6bd63a33aa8aa87b0f3f52753ff7fbb4b7b0f3ac1b29e9df4a44
                        • Opcode Fuzzy Hash: adf3a42ce27c442b389434658677714e6a74ce59a07f4cbf9e2db1c4dc5a88bb
                        • Instruction Fuzzy Hash: 4701EC36A00209FAEF129E55CD00FEF3BBEFF84650F148066BE4596194D771DA11EB60
                        APIs
                        • GetVersionExA.KERNEL32(?,00000000), ref: 010087B2
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Version
                        • String ID:
                        • API String ID: 1889659487-0
                        • Opcode ID: ac5f0212b35ebecbe4954b66f4b7803148b0c8486a6e16b36b63e5b5f9e79701
                        • Instruction ID: 32b058e7832969f901bcf3efe038367cb72c475154847f14ec00cf830c866a46
                        • Opcode Fuzzy Hash: ac5f0212b35ebecbe4954b66f4b7803148b0c8486a6e16b36b63e5b5f9e79701
                        • Instruction Fuzzy Hash: 6EF05E35B01304DFEB328B38ED09B8677F4A798308F0044A59289A7284D7B9D586CF41
                        APIs
                        • CryptFindOIDInfo.CRYPT32(00000001,00000000,00000000), ref: 01008172
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptFindInfo
                        • String ID:
                        • API String ID: 4232373045-0
                        • Opcode ID: 682c5f194ba7d06e2907ea4b456c06efcc41087d9342ac626dd1fc760805c02b
                        • Instruction ID: ca48236bc263845dfec324a9d0da35e7288f0e0fb88e63e53fe64c0a53713fbf
                        • Opcode Fuzzy Hash: 682c5f194ba7d06e2907ea4b456c06efcc41087d9342ac626dd1fc760805c02b
                        • Instruction Fuzzy Hash: 44C01232B04201FBE7828A60C809E8ABEA9BF54780F08C885B2C4860A4CB72C0509B51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 361 1002ced-1002cf4 362 10030e4-10030eb 361->362 363 1002cfa-1002d21 CertFindCertificateInStore 361->363 366 1003104-1003117 call 1003f3f 362->366 367 10030ed-1003100 call 1003f3f 362->367 364 1002d23-1002d2a 363->364 365 1002d2f-1002d3f CertAddCertificateContextToStore 363->365 369 1002fbf-1002fc2 364->369 370 1002d45-1002d4e CertFreeCTLContext 365->370 371 1003179-1003180 365->371 378 1003125-100312a 366->378 379 1003119-1003120 366->379 367->378 384 1003102 367->384 374 1002fc4-1002fc7 CertFreeCTLContext 369->374 375 1002fcd-1002fd0 369->375 376 1002d51-1002d58 370->376 371->369 374->375 380 1002fd2-1002fd5 CertFreeCTLContext 375->380 381 1002fdb-1002fde 375->381 382 1002e1c-1002e23 376->382 383 1002d5e-1002d65 376->383 387 1003138-100313b 378->387 388 100312c-1003133 378->388 379->369 380->381 389 1002fe0-1002fe3 CertFreeCTLContext 381->389 390 1002fe9-1002fec 381->390 385 1002ef2-1002fba CertSaveStore call 100885a 382->385 386 1002e29-1002e5c CertFindCTLInStore 382->386 391 1002db0-1002dc2 call 10040a4 383->391 392 1002d67-1002d86 call 1003a45 383->392 384->388 385->369 401 1002e6a-1002e78 CertAddCTLContextToStore 386->401 402 1002e5e-1002e65 386->402 395 1003146 387->395 396 100313d-1003144 387->396 388->369 389->390 397 1002ff7-1002ffa 390->397 398 1002fee-1002ff1 CertFreeCTLContext 390->398 412 1002dc4-1002dc9 391->412 413 1002dcb-1002dd2 391->413 418 1002d94-1002da2 CertAddCTLContextToStore 392->418 419 1002d88-1002d8f 392->419 395->376 405 100314c-100315b call 1003ced 395->405 404 1003168-1003173 CertAddCertificateContextToStore 396->404 406 1003005-1003008 397->406 407 1002ffc-1002fff CertFreeCTLContext 397->407 398->397 410 1002ee6-1002eed 401->410 411 1002e7a-1002e84 CertFreeCTLContext 401->411 402->369 404->371 404->376 405->371 432 100315d-1003165 405->432 415 1003013-100301c 406->415 416 100300a-100300d CertFreeCTLContext 406->416 407->406 410->369 411->385 411->410 412->413 422 1002dd7-1002dda 412->422 413->369 424 1003046-1003049 415->424 425 100301e-1003024 415->425 416->415 420 1002e10-1002e17 418->420 421 1002da4-1002dae CertFreeCTLContext 418->421 419->369 420->369 421->382 430 1002de5 422->430 431 1002ddc-1002de3 422->431 428 1003073-1003076 424->428 429 100304b-1003051 424->429 433 1003040-1003045 free 425->433 434 1003026-100303e CertFreeCTLContext 425->434 437 10030a0-10030a3 428->437 438 1003078-100307e 428->438 435 1003053-100306b CertFreeCTLContext 429->435 436 100306d-1003072 free 429->436 430->382 440 1002de7-1002df6 call 1003db3 430->440 439 1002e03-1002e0e CertAddCTLContextToStore 431->439 432->404 433->424 434->433 434->434 435->435 435->436 436->428 443 10030a5-10030a9 CertCloseStore 437->443 444 10030af-10030b2 437->444 441 1003080-1003098 CertFreeCTLContext 438->441 442 100309a-100309f free 438->442 439->382 439->420 440->420 450 1002df8-1002e00 440->450 441->441 441->442 442->437 443->444 447 10030c4-10030e1 444->447 448 10030b4-10030c3 call 100885a 444->448 448->447 450->439
                        APIs
                        • CertFindCertificateInStore.CRYPT32(?,?,?,?), ref: 01002D16
                        • CertAddCertificateContextToStore.CRYPT32(?,?), ref: 01002D37
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,?,?), ref: 01002D48
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FC7
                        • CertFreeCTLContext.CRYPT32(00000014,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FD5
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FE3
                        • CertFreeCTLContext.CRYPT32(00000001,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FF1
                        • CertFreeCTLContext.CRYPT32(00000000,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FFF
                        • CertFreeCTLContext.CRYPT32(01001A87,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100300D
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100302F
                        • free.MSVCRT(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003043
                        • CertFreeCTLContext.CRYPT32(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100305C
                        • free.MSVCRT(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003070
                        • CertFreeCTLContext.CRYPT32(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003089
                        • free.MSVCRT(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100309D
                        • CertCloseStore.CRYPT32(0000000A,00000000), ref: 010030A9
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$Context$Free$Storefree$Certificate$CloseFind
                        • String ID:
                        • API String ID: 130065044-0
                        • Opcode ID: 3bdfc37a5d618b4b03b1f22adc64ee428c58dd3893b6d4778e4e88838572d4ec
                        • Instruction ID: eb9862162d1094444616c4199cfab3bfad784c34e436f95c684893f0ed41291d
                        • Opcode Fuzzy Hash: 3bdfc37a5d618b4b03b1f22adc64ee428c58dd3893b6d4778e4e88838572d4ec
                        • Instruction Fuzzy Hash: 06C11670A04248EFEF23DF98DD489EEBBB5FF44340F24416AF581A61A4D7768A54DB10

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 453 1002798-10027ce 454 10027d4-10027db 453->454 455 1002baa-1002bbd call 100885a 453->455 454->455 457 10027e1-10027f7 CertOpenStore 454->457 461 1002bbe-1002bc2 455->461 459 1002805-100280f 457->459 460 10027f9-1002800 457->460 463 1002815-100281b 459->463 464 100289b-10028a2 459->464 462 1002aca-1002acd 460->462 465 1002ad8-1002adb 462->465 466 1002acf-1002ad2 CertFreeCTLContext 462->466 469 1002838-100283f 463->469 470 100281d-100282a call 1003b26 463->470 467 1002988-100298f 464->467 468 10028a8-10028ae 464->468 477 1002ae6-1002ae9 465->477 478 1002add-1002ae0 CertFreeCTLContext 465->478 466->465 471 1002995-100299b 467->471 472 1002a7d-1002a83 467->472 475 10028b0-10028bd call 1003b26 468->475 476 10028cf-10028d6 468->476 473 1002bc5-1002bcc 469->473 474 1002845-100286a CertFindCertificateInStore 469->474 470->464 498 100282c-1002833 470->498 481 10029bc-10029c3 471->481 482 100299d-10029aa call 1003b26 471->482 487 1002a85-1002a8f call 10037ec 472->487 488 1002a9a-1002aa0 472->488 485 1002bd9-1002be1 473->485 486 1002bce-1002bd7 473->486 483 1002878-1002889 CertAddCertificateContextToStore 474->483 484 100286c-1002873 474->484 475->467 520 10028c3-10028ca 475->520 492 1002920-1002930 call 10040a4 476->492 493 10028d8-10028f5 call 1003a45 476->493 490 1002af4-1002afd 477->490 491 1002aeb-1002aee CertFreeCTLContext 477->491 478->477 503 10029c5-10029ed CertFindCTLInStore 481->503 504 1002a18-1002a28 call 1004193 481->504 482->472 535 10029b0-10029b7 482->535 500 1002c56-1002c5d 483->500 501 100288f-1002898 CertFreeCTLContext 483->501 484->462 502 1002be2-1002bea call 1003f3f 485->502 486->502 487->488 532 1002a91-1002a98 487->532 496 1002aa2-1002aac call 10039bf 488->496 497 1002ab7-1002ac1 call 10036b8 488->497 506 1002b27-1002b2a 490->506 507 1002aff-1002b05 490->507 491->490 530 1002932-1002939 492->530 531 100293e-1002942 492->531 524 1002903-1002912 CertAddCTLContextToStore 493->524 525 10028f7-10028fe 493->525 496->497 548 1002aae-1002ab5 496->548 497->462 549 1002ac3 497->549 498->462 500->462 501->464 550 1002bf8-1002bfd 502->550 551 1002bec-1002bf3 502->551 518 10029fb-1002a0a CertAddCTLContextToStore 503->518 519 10029ef-10029f6 503->519 552 1002a36-1002a3a 504->552 553 1002a2a-1002a31 504->553 510 1002b54-1002b57 506->510 511 1002b2c-1002b32 506->511 522 1002b21-1002b26 free 507->522 523 1002b07-1002b1f CertFreeCTLContext 507->523 528 1002b81-1002b84 510->528 529 1002b59-1002b5f 510->529 526 1002b34-1002b4c CertFreeCTLContext 511->526 527 1002b4e-1002b53 free 511->527 537 1002a74-1002a7b 518->537 538 1002a0c-1002a16 CertFreeCTLContext 518->538 519->462 520->462 522->506 523->522 523->523 540 1002914-100291e CertFreeCTLContext 524->540 541 100297c-1002983 524->541 525->462 526->526 526->527 527->510 546 1002b90-1002b93 528->546 547 1002b86-1002b8a CertCloseStore 528->547 542 1002b61-1002b79 CertFreeCTLContext 529->542 543 1002b7b-1002b80 free 529->543 530->462 544 1002944-100294c 531->544 545 100294e 531->545 532->462 535->462 537->462 538->472 540->467 541->462 542->542 542->543 543->528 556 100296f-100297a CertAddCTLContextToStore 544->556 545->467 557 1002950-1002961 call 1003db3 545->557 558 1002ba5-1002ba8 546->558 559 1002b95-1002ba4 call 100885a 546->559 547->546 548->462 549->462 560 1002c13-1002c16 550->560 561 1002bff-1002c05 550->561 551->462 554 1002a46 552->554 555 1002a3c-1002a44 552->555 553->462 554->472 563 1002a48-1002a59 call 1003e79 554->563 562 1002a67-1002a72 CertAddCTLContextToStore 555->562 556->467 556->541 557->541 576 1002963-100296c 557->576 558->461 559->558 567 1002c22 560->567 568 1002c18-1002c20 560->568 561->560 566 1002c07-1002c0e 561->566 562->472 562->537 563->537 578 1002a5b-1002a64 563->578 566->462 567->464 570 1002c28-1002c37 call 1003ced 567->570 569 1002c45-1002c50 CertAddCertificateContextToStore 568->569 569->464 569->500 570->500 579 1002c39-1002c42 570->579 576->556 578->562 579->569
                        APIs
                        • CertOpenStore.CRYPT32(00000002,00000000,00000000,00000000), ref: 010027EC
                        • CertFreeCTLContext.CRYPT32(?,?), ref: 01002AD2
                        • CertFreeCTLContext.CRYPT32(?,?), ref: 01002AE0
                        • CertFreeCTLContext.CRYPT32(?,?), ref: 01002AEE
                        • CertFreeCTLContext.CRYPT32(?,?), ref: 01002B10
                        • free.MSVCRT(?,?), ref: 01002B24
                        • CertFreeCTLContext.CRYPT32(?,?), ref: 01002B3D
                        • free.MSVCRT(?,?), ref: 01002B51
                        • CertFreeCTLContext.CRYPT32(?,?), ref: 01002B6A
                        • free.MSVCRT(?,?), ref: 01002B7E
                        • CertCloseStore.CRYPT32(?,00000000), ref: 01002B8A
                        • CertAddCertificateContextToStore.CRYPT32(?,?,00000003,00000000), ref: 01002C48
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$Context$Free$Storefree$CertificateCloseOpen
                        • String ID:
                        • API String ID: 1406681850-0
                        • Opcode ID: 045ae89b60602ae98f6894c9f6585b8c08aa957313f1b1a0f09ef2c55fd5420a
                        • Instruction ID: 34fd6ed0ad1e52c2d3e3974f2dbc3af9f0b04a175075539df2dc6701a0a6086b
                        • Opcode Fuzzy Hash: 045ae89b60602ae98f6894c9f6585b8c08aa957313f1b1a0f09ef2c55fd5420a
                        • Instruction Fuzzy Hash: F4E13B70E04609EFEF23DF99DD48AEEBBB9FF45340F14409AE581A2194D7768A80CB10

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 580 10061b4-10061d3 call 100826b 583 10061d5-10061d7 580->583 584 10061dc-10061e9 580->584 585 100637f-1006381 583->585 586 100637c-100637e 584->586 587 10061ef 584->587 588 1006383-1006384 call 1008811 585->588 589 1006389-1006392 585->589 586->585 590 10061f5-10061ff 587->590 588->589 592 1006365-1006376 590->592 593 1006205-100620e 590->593 592->586 592->590 594 1006212-1006218 593->594 595 100621a 594->595 596 100621f-1006223 594->596 595->596 597 10063d3-1006414 call 1007e5a printf call 100885a call 10058ed 596->597 598 1006229-100622f 596->598 619 100634b-1006359 597->619 598->597 599 1006235-1006238 598->599 599->597 601 100623e-1006241 599->601 603 1006395-100639d 601->603 604 1006247-100626e call 1007e5a printf 601->604 606 10063b5-10063c4 call 1007e5a 603->606 607 100639f-10063b3 call 1007e5a 603->607 616 1006270 604->616 617 1006289-10062a8 printf CertRDNValueToStrA 604->617 620 10063c9-10063ce printf 606->620 607->620 621 1006274-1006287 printf 616->621 622 10062aa-10062ae 617->622 623 10062ef-1006306 CertRDNValueToStrW 617->623 619->594 626 100635f-1006363 619->626 620->619 621->617 621->621 627 10062af call 10087df 622->627 624 1006347 623->624 625 1006308-100630e 623->625 624->619 628 100630f call 10087df 625->628 626->592 629 10062b4-10062ba 627->629 630 1006314-100631a 628->630 629->623 631 10062bc-10062ea CertRDNValueToStrA call 100885a printf call 1008811 629->631 630->624 632 100631c-1006342 CertRDNValueToStrW call 100885a call 1008811 630->632 631->623 632->624
                        APIs
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                        • printf.MSVCRT ref: 0100625D
                        • printf.MSVCRT ref: 0100627C
                        • printf.MSVCRT ref: 0100628E
                        • CertRDNValueToStrA.CRYPT32(?,00000008,00000000,00000000), ref: 0100629F
                        • CertRDNValueToStrA.CRYPT32(?,00000008,00000000,?), ref: 010062C5
                        • printf.MSVCRT ref: 010062E2
                        • CertRDNValueToStrW.CRYPT32(?,00000008,00000000,00000000), ref: 010062FD
                          • Part of subcall function 01008811: free.MSVCRT(00000000,010019E2,00000000), ref: 0100881C
                        • printf.MSVCRT ref: 010063C9
                        • printf.MSVCRT ref: 010063E9
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: printf$CertValue$CryptDecodeObject$free
                        • String ID: $ [%d,%d] %s (%S)$ [%d,%d] %s (%S) $ [%d,%d] %s (%S) %S$ [%d,%d] %s (%S) %s$ 0x%08X$%s$<NULL>
                        • API String ID: 2812972246-790891399
                        • Opcode ID: 6111c4928c2ac3d638f084be19f3e276c73f52cde3cdc2ced2399629f530f36e
                        • Instruction ID: e74627299f22922c4e45c7e90be67055b470c84a2c9a99562eac8e0645b30a3a
                        • Opcode Fuzzy Hash: 6111c4928c2ac3d638f084be19f3e276c73f52cde3cdc2ced2399629f530f36e
                        • Instruction Fuzzy Hash: 91518B71504305AFE712AF54DC41A6BBBEAFF84744F00882DF6C5961A1D672ED208B62

                        Control-flow Graph

                        APIs
                        • printf.MSVCRT ref: 01004B84
                        • printf.MSVCRT ref: 01004BE6
                        • CertGetCRLContextProperty.CRYPT32(00000000,00000003,?,00000014), ref: 01004C5D
                        • CertGetCRLContextProperty.CRYPT32(00000000,00000004,?,00000014), ref: 01004C82
                        • printf.MSVCRT ref: 01004CD4
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: printf$CertContextProperty$vwprintf
                        • String ID: $ [%d] %s$%s $<NULL>$MD5$SHA1$-<$M<
                        • API String ID: 21191961-3450786771
                        • Opcode ID: 82275641a5fc0f0d39834bc25ecf01e808d18fe86dbd4543574247826e20e04b
                        • Instruction ID: 9d0a5b4a088e6354c4df037c23d7952e0cd7c073e0700367d6bff15a6fcff5f6
                        • Opcode Fuzzy Hash: 82275641a5fc0f0d39834bc25ecf01e808d18fe86dbd4543574247826e20e04b
                        • Instruction Fuzzy Hash: EB41B032A40305FAFB276BA0EC41EDE3BB9FF44710F10851AF6C5A64D0DB76A6118B14
                        APIs
                        • CertAddCTLContextToStore.CRYPT32(?,?), ref: 01002EDC
                        • CertSaveStore.CRYPT32(0000000A,00000002,00000004,00000000,?,00000014), ref: 01002F11
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FC7
                        • CertFreeCTLContext.CRYPT32(00000014,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FD5
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FE3
                        • CertFreeCTLContext.CRYPT32(00000001,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FF1
                        • CertFreeCTLContext.CRYPT32(00000000,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FFF
                        • CertFreeCTLContext.CRYPT32(01001A87,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100300D
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100302F
                        • free.MSVCRT(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003043
                        • CertFreeCTLContext.CRYPT32(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100305C
                        • free.MSVCRT(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003070
                        • CertFreeCTLContext.CRYPT32(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003089
                        • free.MSVCRT(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100309D
                        • CertCloseStore.CRYPT32(0000000A,00000000), ref: 010030A9
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$Context$Free$Storefree$CloseSavevwprintf
                        • String ID:
                        • API String ID: 3899236436-0
                        • Opcode ID: 82ccb76044befd0f0c9d8df628e9aa3788654e2b0cee29a206605203eb8ba0fc
                        • Instruction ID: 0d48f32fa6eb499900837a5549afe58c902de287f41537b1617c15c5d5e4c5f9
                        • Opcode Fuzzy Hash: 82ccb76044befd0f0c9d8df628e9aa3788654e2b0cee29a206605203eb8ba0fc
                        • Instruction Fuzzy Hash: E741C630E04508EFEB23DF98E8589ADBBB2FB44751F20416AF181A61A4D7764990DF10
                        APIs
                        • CertAddCTLContextToStore.CRYPT32(?,?), ref: 01002EDC
                        • CertSaveStore.CRYPT32(0000000A,00000002,00000004,00000000,?,00000014), ref: 01002F11
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FC7
                        • CertFreeCTLContext.CRYPT32(00000014,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FD5
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FE3
                        • CertFreeCTLContext.CRYPT32(00000001,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FF1
                        • CertFreeCTLContext.CRYPT32(00000000,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FFF
                        • CertFreeCTLContext.CRYPT32(01001A87,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100300D
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100302F
                        • free.MSVCRT(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003043
                        • CertFreeCTLContext.CRYPT32(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100305C
                        • free.MSVCRT(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003070
                        • CertFreeCTLContext.CRYPT32(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003089
                        • free.MSVCRT(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100309D
                        • CertCloseStore.CRYPT32(0000000A,00000000), ref: 010030A9
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$Context$Free$Storefree$CloseSave
                        • String ID:
                        • API String ID: 2383314234-0
                        • Opcode ID: 44f24ea2f3b1b9111daca72f347d77c9825db06b8cf0918004aecb4cbf145063
                        • Instruction ID: 7a6e763276f1ff6a1583ed280b2d0cd277c8e7bb0b8b454caa168fca8f759725
                        • Opcode Fuzzy Hash: 44f24ea2f3b1b9111daca72f347d77c9825db06b8cf0918004aecb4cbf145063
                        • Instruction Fuzzy Hash: 5741A230D01509EFEF63DF98E8588ADBBB2FF44351F2041AAF181A61A4D7365A90DF10
                        APIs
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FC7
                        • CertFreeCTLContext.CRYPT32(00000014,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FD5
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FE3
                        • CertFreeCTLContext.CRYPT32(00000001,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FF1
                        • CertFreeCTLContext.CRYPT32(00000000,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FFF
                        • CertFreeCTLContext.CRYPT32(01001A87,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100300D
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100302F
                        • free.MSVCRT(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003043
                        • CertFreeCTLContext.CRYPT32(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100305C
                        • free.MSVCRT(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003070
                        • CertFreeCTLContext.CRYPT32(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003089
                        • free.MSVCRT(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100309D
                        • CertCloseStore.CRYPT32(0000000A,00000000), ref: 010030A9
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$ContextFree$free$CloseStore
                        • String ID:
                        • API String ID: 912534999-0
                        • Opcode ID: 0b9b1a8d95d0a15ebdfa217c3d6cb6d1215d841cd4f5a3eacdf94ecb0c9337c0
                        • Instruction ID: 99188bbe496bf8758c5ea39b80305226f1081637001da1457b9d533289462e6a
                        • Opcode Fuzzy Hash: 0b9b1a8d95d0a15ebdfa217c3d6cb6d1215d841cd4f5a3eacdf94ecb0c9337c0
                        • Instruction Fuzzy Hash: 48419F30D01518EFDB63DB98E8588ADBBB2FF44351F2041AAF181B61A4DB765A90DF10
                        APIs
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        • printf.MSVCRT ref: 01004BE6
                        • CertGetCRLContextProperty.CRYPT32(00000000,00000003,?,00000014), ref: 01004C5D
                        • CertGetCRLContextProperty.CRYPT32(00000000,00000004,?,00000014), ref: 01004C82
                        • printf.MSVCRT ref: 01004CD4
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CertContextPropertyprintf$vwprintf
                        • String ID: $%s $<NULL>$MD5$SHA1$-<$M<
                        • API String ID: 965754941-1913507623
                        • Opcode ID: bc194e09554f3ad080c54f1c94400a3d217923589b23381cf0e65655e601a870
                        • Instruction ID: 1b0accdc72fc96e108dfb705b1481be5d94914ce0dba3e5b056fda0701430da9
                        • Opcode Fuzzy Hash: bc194e09554f3ad080c54f1c94400a3d217923589b23381cf0e65655e601a870
                        • Instruction Fuzzy Hash: 6A41BF32A44305FAFB277B60EC41E9A3BB9FB54710F10851AF6C5AA4D0DB76A6118B14
                        APIs
                        • CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 01003C35
                        • CertDuplicateCertificateContext.CRYPT32(00000000), ref: 01003C42
                        • CertDeleteCTLFromStore.CRYPT32(00000000,?,00000001), ref: 01003C49
                        • CertEnumCTLsInStore.CRYPT32(?,00000000), ref: 01003C5F
                        • CertDuplicateCTLContext.CRYPT32(00000000,?,00000001), ref: 01003C6C
                        • CertDeleteCTLFromStore.CRYPT32(00000000,?,00000001), ref: 01003C73
                        • CertGetCRLFromStore.CRYPT32(?,00000000,00000000,00000002), ref: 01003C91
                        • CertDuplicateCTLContext.CRYPT32(00000000,?,00000001), ref: 01003C9E
                        • CertDeleteCTLFromStore.CRYPT32(00000000,?,00000001), ref: 01003CA5
                        • CertFreeCTLContext.CRYPT32(00000000,00000000,?,?,00000001), ref: 01003CC4
                        • CertFreeCTLContext.CRYPT32(00000000,00000000,?,?,00000001), ref: 01003CCF
                        • CertFreeCTLContext.CRYPT32(00000000,00000000,?,?,00000001), ref: 01003CDA
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$ContextStore$From$DeleteDuplicateFree$Enum$CertificateCertificates
                        • String ID:
                        • API String ID: 4186978145-0
                        • Opcode ID: 69323ae7f165615aa63ff37f18db1fa40dddc2f2f00fb5c5464ccbf51c553884
                        • Instruction ID: 3d4f8e321d260166deb2c37b4722702f530a5fe9b12f1c2784a3adff5fa3238a
                        • Opcode Fuzzy Hash: 69323ae7f165615aa63ff37f18db1fa40dddc2f2f00fb5c5464ccbf51c553884
                        • Instruction Fuzzy Hash: BB219F31208389AFF3238F66994CF6BBADCBB80B00F04051DFAC6D5184DBBAD4088761
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: wprintf$vwprintf
                        • String ID: $ '$ %02X
                        • API String ID: 3863390932-3839679036
                        • Opcode ID: 245ba5faa3f9159075175ac61e8e4ce443989ae8e7eac280a279cfb65d9a8e45
                        • Instruction ID: 119df7375fa19e6f2ab5bdbf58a660095d498569f61a997e21fed4e990c2eee5
                        • Opcode Fuzzy Hash: 245ba5faa3f9159075175ac61e8e4ce443989ae8e7eac280a279cfb65d9a8e45
                        • Instruction Fuzzy Hash: 48212733644319AAFB174E5AAC81ABD7B55EB82731F10412FFBC4490C0DBB189518FA5
                        APIs
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                          • Part of subcall function 01005D9D: FileTimeToLocalFileTime.KERNEL32(00000001,?,00001B9E,?,00000032,00001B9D,?,00000032,00000000,?,00000000), ref: 01005E22
                          • Part of subcall function 01005D9D: FileTimeToSystemTime.KERNEL32(?,01004BFC), ref: 01005E30
                          • Part of subcall function 01005D9D: _wasctime.MSVCRT ref: 01005E7F
                          • Part of subcall function 01005D9D: wcscpy.MSVCRT ref: 01005E8D
                          • Part of subcall function 01005D9D: wcslen.MSVCRT ref: 01005E9C
                          • Part of subcall function 01005D9D: wcslen.MSVCRT ref: 01005EAE
                          • Part of subcall function 01005D9D: swprintf.MSVCRT(00000000,?,?), ref: 01005EC5
                        • CertGetCRLContextProperty.CRYPT32(?,00000003,?,00000000), ref: 01004E6A
                          • Part of subcall function 01005D22: printf.MSVCRT ref: 01005D54
                          • Part of subcall function 01005D22: printf.MSVCRT ref: 01005D5D
                        • CertGetCRLContextProperty.CRYPT32(?,00000004,?,00000000), ref: 01004E8B
                          • Part of subcall function 01005D22: printf.MSVCRT ref: 01005D88
                          • Part of subcall function 01005D22: printf.MSVCRT ref: 01005D98
                        • printf.MSVCRT ref: 01004EE7
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: printf$Time$File$CertContextPropertywcslen$LocalSystem_wasctimeswprintfvwprintfwcscpy
                        • String ID: $%s $<NULL>$MD5$SHA1
                        • API String ID: 877868225-3298317204
                        • Opcode ID: ef0dc58a638ec4c96e9b5cf8bc8724160ce880f0840a3869fb4893d97a94868a
                        • Instruction ID: 7f8b3de2b8d94eedb18c579de51c5a4a42e3cc02c95025c86376e5c6403baddd
                        • Opcode Fuzzy Hash: ef0dc58a638ec4c96e9b5cf8bc8724160ce880f0840a3869fb4893d97a94868a
                        • Instruction Fuzzy Hash: 2A41AE32A40305EFEB17AB50EC45EDA7BB5EF54320F14851AF6889B1E0D732EA11DB04
                        APIs
                        • CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 01003B4F
                        • CertAddCertificateContextToStore.CRYPT32(?,00000000,00000003,00000000), ref: 01003B5E
                        • CertEnumCTLsInStore.CRYPT32(?,00000000), ref: 01003B7E
                        • CertAddCTLContextToStore.CRYPT32(?,00000000,00000003,00000000), ref: 01003B8E
                        • CertGetCRLFromStore.CRYPT32(?,00000000,00000000,?), ref: 01003BB5
                        • CertAddCTLContextToStore.CRYPT32(?,00000000,00000003,00000000), ref: 01003BC5
                        • CertFreeCTLContext.CRYPT32(00000000,?,00000000,00000000), ref: 01003BE8
                        • CertFreeCTLContext.CRYPT32(?,?,00000000,00000000), ref: 01003BF6
                        • CertFreeCTLContext.CRYPT32(?,?,00000000,00000000), ref: 01003C04
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$ContextStore$Free$Enum$CertificateCertificatesFrom
                        • String ID:
                        • API String ID: 1456163896-0
                        • Opcode ID: c3a9a6b756158b32af717f50f29f024c4bfb7f9630b8aa6ffe042a46a28ae4e2
                        • Instruction ID: 62fc009a319d8c0195a875f5ee685bc7a5d0235e1fb2cd9ae9274de3586ab868
                        • Opcode Fuzzy Hash: c3a9a6b756158b32af717f50f29f024c4bfb7f9630b8aa6ffe042a46a28ae4e2
                        • Instruction Fuzzy Hash: E9312E30A00658BFEB239F99DD44AEE7FB9FF00744F144095FA85A6090C7B6DA50DB90
                        APIs
                        • CreateFileU.CRYPT32(00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8,00000014,?), ref: 01008A15
                        • GetFileSize.KERNEL32(00000000,00000014,00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8), ref: 01008A27
                        • CreateFileMappingA.KERNEL32(00000014,00000000,00000002,00000000,00000000,00000000), ref: 01008A49
                        • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008A5C
                        • GetLastError.KERNEL32(00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8,00000014,?), ref: 01008A6C
                        • GetLastError.KERNEL32(?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?,?,00000014,?,SHA1,0000000A), ref: 01008A72
                        • GetLastError.KERNEL32(?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?,?,00000014,?,SHA1,0000000A), ref: 01008A78
                        • CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AA0
                        • CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AAB
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: File$ErrorLast$CloseCreateHandle$MappingSizeView
                        • String ID:
                        • API String ID: 524788506-0
                        • Opcode ID: 96daecd4b54f800760b7eba25ae76a1021dbf1a70837195a7a57605f8b42a680
                        • Instruction ID: 0b943f0ce0dfe5c40595c24f9d9a73b7fc00af20ea95221383c830475f75e040
                        • Opcode Fuzzy Hash: 96daecd4b54f800760b7eba25ae76a1021dbf1a70837195a7a57605f8b42a680
                        • Instruction Fuzzy Hash: 0F218031D41125FBFB228F58CC44A9E7EA8FB067A0F148166FA85A65C0D7749AC0CBE0
                        APIs
                        • CreateFileU.CRYPT32(00000014,40000000,00000000,00000000,00000002,00000000,00000000,00000000,00000001,?,?,01002FA4,?,?,?,00000014), ref: 01008AF1
                        • GetLastError.KERNEL32(00000014,40000000,00000000,00000000,00000002,00000000,00000000,00000000,00000001,?,?,01002FA4,?,?,?,00000014), ref: 01008B03
                        • GetLastError.KERNEL32(?,01002FA4,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001), ref: 01008B09
                        • GetLastError.KERNEL32(?,01002FA4,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001), ref: 01008B0F
                        • WriteFile.KERNEL32(00000000,?,?,?,00000000,00000014,40000000,00000000,00000000,00000002,00000000,00000000,00000000,00000001,?), ref: 01008B2D
                        • GetLastError.KERNEL32(?,01002FA4,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001), ref: 01008B3D
                        • GetLastError.KERNEL32(?,01002FA4,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001), ref: 01008B43
                        • CloseHandle.KERNEL32(00000000,?,01002FA4,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000), ref: 01008B6C
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: ErrorLast$File$CloseCreateHandleWrite
                        • String ID:
                        • API String ID: 1274442398-0
                        • Opcode ID: 017fd4a2c61951ceca550178e63e1fe5baddd7945ade91736ae77703dc99b890
                        • Instruction ID: ca36d6a8c764a1ad78762d8e90c0044b46dda13cbba7938ceeca0ec5e291ba97
                        • Opcode Fuzzy Hash: 017fd4a2c61951ceca550178e63e1fe5baddd7945ade91736ae77703dc99b890
                        • Instruction Fuzzy Hash: AC11B772D05935EBE7324E698C049AE7EA8BF457B0F05C277BC85A7180D2789D418BD0
                        APIs
                        • printf.MSVCRT ref: 01005A0E
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                          • Part of subcall function 01008811: free.MSVCRT(00000000,010019E2,00000000), ref: 0100881C
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptDecodeObject$freeprintfvwprintf
                        • String ID: $ [%d,%d] %s$1.2.840.113549.1.9.5$1.2.840.113549.1.9.6$1.3.6.1.4.1.311.10.2$<NULL>
                        • API String ID: 1924496982-3034289211
                        • Opcode ID: dc4e416ac7ec221467000f34955533da29cb243de22aa6c715d33c878ee53ce2
                        • Instruction ID: dc23ba973dc3d7395123d3090bad1c8b21ddef8e4e577f654d15181199a09b3c
                        • Opcode Fuzzy Hash: dc4e416ac7ec221467000f34955533da29cb243de22aa6c715d33c878ee53ce2
                        • Instruction Fuzzy Hash: FA510230900646ABFB136F288C90AED7BEAEF06214F1485A0EAD5972D1E7329955CF50
                        APIs
                        • FileTimeToLocalFileTime.KERNEL32(00000001,?,00001B9E,?,00000032,00001B9D,?,00000032,00000000,?,00000000), ref: 01005E22
                        • FileTimeToSystemTime.KERNEL32(?,01004BFC), ref: 01005E30
                        • _wasctime.MSVCRT ref: 01005E7F
                        • wcscpy.MSVCRT ref: 01005E8D
                        • wcslen.MSVCRT ref: 01005E9C
                        • wcslen.MSVCRT ref: 01005EAE
                        • swprintf.MSVCRT(00000000,?,?), ref: 01005EC5
                        • swprintf.MSVCRT(0100A138,?,?,00000001), ref: 01005EE2
                          • Part of subcall function 0100871B: LoadStringW.USER32(?,?,00000200,?), ref: 01008739
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Time$File$swprintfwcslen$LoadLocalStringSystem_wasctimewcscpy
                        • String ID:
                        • API String ID: 1198059487-0
                        • Opcode ID: 9cb0004046fe059e89af9bf4c2c924899fde024fb2407f6cb232af7db561f201
                        • Instruction ID: 80bea964167c077ebb7f29613c425d7d5d4cc7692e59d2015936a7dcd1f1c136
                        • Opcode Fuzzy Hash: 9cb0004046fe059e89af9bf4c2c924899fde024fb2407f6cb232af7db561f201
                        • Instruction Fuzzy Hash: B5414D71D00218EAEF26DF98DC459FEB7B8FF08341F10406AF9C5A2180E7798A41CB64
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: towupper$wcslen
                        • String ID:
                        • API String ID: 1941851458-0
                        • Opcode ID: cbfc4fe8f45473ed4f58da605a210825dd77f785ce66fbee264452b09ad26d69
                        • Instruction ID: 3e599955c825a32831a7801ae95c97f7390e987df3e4e7e2b89ac7e520e1f868
                        • Opcode Fuzzy Hash: cbfc4fe8f45473ed4f58da605a210825dd77f785ce66fbee264452b09ad26d69
                        • Instruction Fuzzy Hash: 51312435500225ABEB165F2CCC84AAEBBE8EF05720F21805AFD94DB6D0D638C941CFA1
                        APIs
                        • CertGetCRLFromStore.CRYPT32(?,00000000,00000000,?), ref: 010040DB
                        • realloc.MSVCRT ref: 010040F3
                        • CertDuplicateCTLContext.CRYPT32(?), ref: 01004104
                        • CertGetCRLFromStore.CRYPT32(?,00000000,?,?), ref: 01004123
                        • CertFreeCTLContext.CRYPT32(?), ref: 01004151
                        • free.MSVCRT(?), ref: 0100415F
                        • CertFreeCTLContext.CRYPT32(?), ref: 0100417F
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$Context$FreeFromStore$Duplicatefreerealloc
                        • String ID:
                        • API String ID: 706885998-0
                        • Opcode ID: a4579f29af3d61a213aa29d82e2a73b783707612c536d4dd2498aed8bbe69d25
                        • Instruction ID: 06b2f77ad534f3675ef950e49a2527f6f29af8039c94654542f0ba4c1af1809e
                        • Opcode Fuzzy Hash: a4579f29af3d61a213aa29d82e2a73b783707612c536d4dd2498aed8bbe69d25
                        • Instruction Fuzzy Hash: CC310475A00249EFEB228F98D8848ADBBF5FB54344F2084AEF695D7290C7319A40CF14
                        APIs
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        • printf.MSVCRT ref: 01007271
                        • printf.MSVCRT ref: 010072A3
                        • printf.MSVCRT ref: 010072D7
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: printf$CryptDecodeObject$vwprintf
                        • String ID: $ [%d] %s$ [%d] %s
                        • API String ID: 3452401527-2298187835
                        • Opcode ID: b312dbc6e18425c30db84d4642973e5e972353b81b3877b2819612ac7e623f52
                        • Instruction ID: 882fe6f7da37c13c2543c962c30eb4a42de4d7b53b3bc19d79fce25d7286019f
                        • Opcode Fuzzy Hash: b312dbc6e18425c30db84d4642973e5e972353b81b3877b2819612ac7e623f52
                        • Instruction Fuzzy Hash: CF317C32900715FBFB235F44EC81A997BB0FB04721F14852AFED82A1C0D77AB9509B94
                        APIs
                        • CertEnumCTLsInStore.CRYPT32(00000014,00000000), ref: 010041C7
                        • realloc.MSVCRT ref: 010041D9
                        • CertDuplicateCTLContext.CRYPT32(?,?,01002E96,?,0000000A,00000000,?,00000014), ref: 010041EA
                        • CertEnumCTLsInStore.CRYPT32(00000014,?), ref: 01004205
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,01002E96,?,0000000A,00000000), ref: 01004235
                        • free.MSVCRT(?,?,?,?,01002E96,?,0000000A,00000000), ref: 01004243
                        • CertFreeCTLContext.CRYPT32(?,?,?,?,01002E96,?,0000000A,00000000), ref: 01004263
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$Context$EnumFreeStore$Duplicatefreerealloc
                        • String ID:
                        • API String ID: 2405492650-0
                        • Opcode ID: 0d1ffa640bb80b646c121726a86532bd0176b07425315ef086298706068492f2
                        • Instruction ID: b8602d62794de092fa67e34e8c73dc166317c74f750f4fddc74d5c51a450e016
                        • Opcode Fuzzy Hash: 0d1ffa640bb80b646c121726a86532bd0176b07425315ef086298706068492f2
                        • Instruction Fuzzy Hash: 3A314774604204EFEB238F69D88489DBBF5FF94310F60846AEAD5D72A4D7729980CF14
                        APIs
                        • printf.MSVCRT ref: 01006462
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        • printf.MSVCRT ref: 01006487
                          • Part of subcall function 01007E5A: CryptFindOIDInfo.CRYPT32(00000001,?,?), ref: 01007E64
                          • Part of subcall function 01008884: wprintf.MSVCRT ref: 010088BA
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: printf$CryptFindInfovwprintfwprintf
                        • String ID: $2.5.29.1$<NULL>$YYj
                        • API String ID: 2372032126-1827054270
                        • Opcode ID: 3ce55a3ac641689d4da5e610dd0a21e4a884b30f0edf9fdab88a9a4ee829ef21
                        • Instruction ID: e2173d48011786a04bbbd323a138fdd67020d4b7a5b54f531858a7685aed5299
                        • Opcode Fuzzy Hash: 3ce55a3ac641689d4da5e610dd0a21e4a884b30f0edf9fdab88a9a4ee829ef21
                        • Instruction Fuzzy Hash: 7E219C32900605FBEB131F68EC41AD97FA3BF09324F25C664F9D45A1E0E73799249B80
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: printf$vwprintf
                        • String ID: %02X$<NULL>
                        • API String ID: 4289833226-3318528641
                        • Opcode ID: 4a137df0517ab863c06208d53aa088258c8621137941eede9edbcf4e6dfd2ce9
                        • Instruction ID: f9fe6916a933d13dcca72205d7af782751b05d53ef6a1981e00ced3b7e208adc
                        • Opcode Fuzzy Hash: 4a137df0517ab863c06208d53aa088258c8621137941eede9edbcf4e6dfd2ce9
                        • Instruction Fuzzy Hash: 5DF0F932B487115AF32366696C05A2A6BE1DBC46A1F15046FF6C4D71C1FD61D8028B62
                        APIs
                        • CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 010042A3
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        • CertEnumCTLsInStore.CRYPT32(?,00000000), ref: 0100431C
                        • CertGetCRLFromStore.CRYPT32(?,00000000,00000000,?), ref: 0100439B
                        • CertFreeCTLContext.CRYPT32(00000000), ref: 01004411
                        • CertFreeCTLContext.CRYPT32(00000000), ref: 0100441C
                        • CertFreeCTLContext.CRYPT32(00000000,?,?,?,?,?,?,?,01001A2A,?), ref: 0100442D
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$ContextFreeStore$Enum$CertificatesFromvwprintf
                        • String ID:
                        • API String ID: 1639122641-0
                        • Opcode ID: c9073336187c8e82f2f2bd043e5061598acd76ff3d8de0184bc67dfcab132269
                        • Instruction ID: b52028145a84832f983472691433bc19133d5d9b79e4e00939670f7ef0bddb46
                        • Opcode Fuzzy Hash: c9073336187c8e82f2f2bd043e5061598acd76ff3d8de0184bc67dfcab132269
                        • Instruction Fuzzy Hash: A441DF32608302EBF7239F54AC44B6A7FF9BB94701F04492EFBC4920D5DBBA94088759
                        APIs
                        • wcslen.MSVCRT ref: 010039D2
                        • CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 010039F3
                        • CertSetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000,00000000), ref: 01003A08
                        • CertSetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000,?), ref: 01003A17
                        • CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 01003A21
                        • CertFreeCTLContext.CRYPT32(00000000), ref: 01003A35
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$Context$CertificateCertificatesEnumPropertyStore$Freewcslen
                        • String ID:
                        • API String ID: 1159493799-0
                        • Opcode ID: 21b92ba0d5092098acfdb986d0ebb50d72bb8a6cadc2bcb0498bba632f6abb39
                        • Instruction ID: 00b4ee517128738ce0e66dfd4b50f8033352f8963b99a324ced2bd7391445894
                        • Opcode Fuzzy Hash: 21b92ba0d5092098acfdb986d0ebb50d72bb8a6cadc2bcb0498bba632f6abb39
                        • Instruction Fuzzy Hash: 21018476E01214FBE733DB69DC44F9E7BB8AB09750F114151FA40AB2C4D775DA008BA4
                        APIs
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                        • printf.MSVCRT ref: 01006092
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptDecodeObject$printfvwprintf
                        • String ID: $%s (%S)$($<NULL>
                        • API String ID: 3955122273-3389890325
                        • Opcode ID: 6d2ef1b96f2741b592e2059373e4232a5f5b25b1d4095d31cea419576d6f5ea0
                        • Instruction ID: fdd8930d580e06e56ed02b80320afa0a1d12be04b54cc1497755a94cb02b1a5c
                        • Opcode Fuzzy Hash: 6d2ef1b96f2741b592e2059373e4232a5f5b25b1d4095d31cea419576d6f5ea0
                        • Instruction Fuzzy Hash: E931E472540701FEFB272B50EC85EEA3BB9FF14710F14812AF6C5250D1EB769A649B11
                        APIs
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        • printf.MSVCRT ref: 01007666
                        • printf.MSVCRT ref: 01007692
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptDecodeObjectprintf$vwprintf
                        • String ID: [%d,%d] %s$ [%d,*] %s$<NULL>
                        • API String ID: 3053794160-3661550745
                        • Opcode ID: f89045c4d54666e58aebac5b30074587f46f9c4f2cbc8131f8b47ed58dfb799d
                        • Instruction ID: eb1ce1aba800e34c694246015e497e9ac9b31efe6a12d2fbde37d99fb5c947bb
                        • Opcode Fuzzy Hash: f89045c4d54666e58aebac5b30074587f46f9c4f2cbc8131f8b47ed58dfb799d
                        • Instruction Fuzzy Hash: C121DE75604206FFFB125FACECC0C997BA0FB09364F24C02AF6D94A280D776A960CB54
                        APIs
                        • CertEnumCertificateContextProperties.CRYPT32(?,00000000), ref: 01005F07
                        • CertGetCertificateContextProperty.CRYPT32(?,00000000,00000000,?), ref: 01005F4A
                        • CertGetCertificateContextProperty.CRYPT32(?,00000000,00000000,?), ref: 01005F6A
                        • CertEnumCertificateContextProperties.CRYPT32(?,00000000), ref: 01005FBF
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CertCertificateContext$EnumPropertiesProperty$vwprintf
                        • String ID:
                        • API String ID: 2836338242-399585960
                        • Opcode ID: 8551b7d497840789ec1c4916242e124f8ad2d69c5eda4b00177c1361a1591910
                        • Instruction ID: 7f24652fe2f217508ea7fcbb6c712aeaf65bf0a7948b9f041a1daa78529b24be
                        • Opcode Fuzzy Hash: 8551b7d497840789ec1c4916242e124f8ad2d69c5eda4b00177c1361a1591910
                        • Instruction Fuzzy Hash: B8218472904219FFFB236B94DC85CFE7E6DEB10294F114069FA8862090D7768E109B61
                        APIs
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        • printf.MSVCRT ref: 01007D8F
                        • printf.MSVCRT ref: 01007DC5
                        • printf.MSVCRT ref: 01007DEE
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: printf$CryptDecodeObject$vwprintf
                        • String ID: $ %02X
                        • API String ID: 3452401527-2119626176
                        • Opcode ID: 8e908ba8431071937f372095f3a21809828b6f7e6a604cacfb8711bd09aac418
                        • Instruction ID: 3791f41939ce4824e053cc04017bcd257817170b35b011f1549c8897ff7e117b
                        • Opcode Fuzzy Hash: 8e908ba8431071937f372095f3a21809828b6f7e6a604cacfb8711bd09aac418
                        • Instruction Fuzzy Hash: 8D110432601712EBF7273B64FC40D9A3BA5FF88710F24892AF5C09A1D0DB66ED119B50
                        APIs
                        • CertGetCRLFromStore.CRYPT32(?,00000000,00000000,?), ref: 01003A78
                        • CertGetCRLContextProperty.CRYPT32(?,00000003,00000000,?), ref: 01003A95
                        • CertGetCRLContextProperty.CRYPT32(?,00000003,?,?), ref: 01003AB8
                        • CertGetCRLFromStore.CRYPT32(?,00000000,?,?), ref: 01003AE1
                        • CertFreeCTLContext.CRYPT32(?), ref: 01003B13
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: Cert$Context$FromPropertyStore$Free
                        • String ID:
                        • API String ID: 1268920413-0
                        • Opcode ID: 38caa68dd6e200693609f83d9f2fc5759b66c8bbbdb8d6b27bc93e4fa8dece61
                        • Instruction ID: 2d6f6cedad14925c553a5a531fc029d50201c4a55b32bf08b2cbf524748e4937
                        • Opcode Fuzzy Hash: 38caa68dd6e200693609f83d9f2fc5759b66c8bbbdb8d6b27bc93e4fa8dece61
                        • Instruction Fuzzy Hash: 4A310471D01129FFEF23CBD8D9449AEBFB9FF05650F1480A6E640AA190D7709B80DBA0
                        APIs
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,75963D80,?,?,0100227A,00000000,0100A688), ref: 0100896D
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,0100227A,00000000,0100A688), ref: 01008998
                        • GetLastError.KERNEL32(?,?,0100227A,00000000,0100A688,?,00000014,?,?,0100192D,00001B5B,<UNKNOWN OID>,00000014,00001B5A,MD5,0000000A), ref: 010089B2
                        • GetLastError.KERNEL32(?,?,0100227A,00000000,0100A688,?,00000014,?,?,0100192D,00001B5B,<UNKNOWN OID>,00000014,00001B5A,MD5,0000000A), ref: 010089B8
                          • Part of subcall function 010087DF: malloc.MSVCRT ref: 010087E6
                        • GetLastError.KERNEL32(?,?,0100227A,00000000,0100A688,?,00000014,?,?,0100192D,00001B5B,<UNKNOWN OID>,00000014,00001B5A,MD5,0000000A), ref: 010089BC
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: ErrorLast$ByteCharMultiWide$malloc
                        • String ID:
                        • API String ID: 3472615102-0
                        • Opcode ID: d06ba5bac7a6af725c550f3c2cebc075e7a3ac333290ac74100df823bac362df
                        • Instruction ID: 6a107113e91b84a03d814a294c1758f0eb4b117dcdb9fe8ebaf36570cdc106f5
                        • Opcode Fuzzy Hash: d06ba5bac7a6af725c550f3c2cebc075e7a3ac333290ac74100df823bac362df
                        • Instruction Fuzzy Hash: D1018432902139BAA7227A5A8C44DDF7E9CFF066B0B14C222F598D61D0C675D840C7F2
                        APIs
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        • printf.MSVCRT ref: 01006DCE
                        • printf.MSVCRT ref: 01006E02
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptDecodeObjectprintf$vwprintf
                        • String ID: $ [%d] %s (%S)
                        • API String ID: 3053794160-4092857480
                        • Opcode ID: ed17a94d53a8b843a2ed15e62e7b675af76c9e425c7016927d0d2750494a233a
                        • Instruction ID: 01505842b482cc6809bb7b9b6da085859eaf2e3d688aaf3425822afcafecb341
                        • Opcode Fuzzy Hash: ed17a94d53a8b843a2ed15e62e7b675af76c9e425c7016927d0d2750494a233a
                        • Instruction Fuzzy Hash: EC112632644701EBF7232F84EC41FAA7BA5FB95711F14842EF6C01A0D0DB7798619B51
                        APIs
                        • SetLastError.KERNEL32(000000EA), ref: 01007FC2
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                        • swprintf.MSVCRT(?,01001600,?,?,00001BDE,?,00001C08,?,00001BE2,?,00001BDD,0000000F,?,?,00000000), ref: 01007F67
                        • wcscat.MSVCRT ref: 01007F7B
                        • wcslen.MSVCRT ref: 01007FA9
                          • Part of subcall function 01001A9B: wcscat.MSVCRT ref: 01001AC4
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptDecodeObjectwcscat$ErrorLastswprintfwcslen
                        • String ID:
                        • API String ID: 3517545609-0
                        • Opcode ID: a34ae2b90946bb38d713910c960b8082deca7e3b1e347333ff75163c7fe83b1e
                        • Instruction ID: c549eef07bb15a57e9c452e6f139c625c5f846825e59a85b576ac9db3539dcee
                        • Opcode Fuzzy Hash: a34ae2b90946bb38d713910c960b8082deca7e3b1e347333ff75163c7fe83b1e
                        • Instruction Fuzzy Hash: 724192716406599AEB33DB54DC40EFE77F9EB48700F1484AAE6CAA60C0E735A9858B50
                        APIs
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                        • CertRDNValueToStrW.CRYPT32(00000000,00000004,00000000,00000000), ref: 01006E8E
                        • CertRDNValueToStrW.CRYPT32(00000000,00000004,00000000,00000000), ref: 01006EB1
                        • wprintf.MSVCRT ref: 01006ED8
                        • printf.MSVCRT ref: 01006EF7
                          • Part of subcall function 010087DF: malloc.MSVCRT ref: 010087E6
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CertCryptDecodeObjectValue$mallocprintfvwprintfwprintf
                        • String ID:
                        • API String ID: 422403839-0
                        • Opcode ID: 73c6a995ae2694a5e3f543555c47f27e60e0e45555cabc846884b01f5d2a93d0
                        • Instruction ID: 949d65c3e3cb98c50c9d180278654844201179eb9e933f5cff64211629e52488
                        • Opcode Fuzzy Hash: 73c6a995ae2694a5e3f543555c47f27e60e0e45555cabc846884b01f5d2a93d0
                        • Instruction Fuzzy Hash: F6119F32904341EBF7236B15EC49EABBBAAFB84750F10492EF1C4520D0EB738920C761
                        APIs
                          • Part of subcall function 010089CF: CreateFileU.CRYPT32(00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8,00000014,?), ref: 01008A15
                          • Part of subcall function 010089CF: GetFileSize.KERNEL32(00000000,00000014,00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8), ref: 01008A27
                          • Part of subcall function 010089CF: CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AA0
                          • Part of subcall function 010089CF: CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AAB
                        • CertOpenStore.CRYPT32(00000002,00000000,00000000,00000000,00000000), ref: 0100565E
                        • CertAddEncodedCertificateToStore.CRYPT32(00000000,00000014,?,00000004,00000000), ref: 0100567A
                        • CertCloseStore.CRYPT32(00000000,00000000), ref: 01005686
                        • UnmapViewOfFile.KERNEL32(00000014,?,?,01002666,?,?,?,?,00000014,?,SHA1,0000000A), ref: 01005696
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CertCloseFileStore$Handle$CertificateCreateEncodedOpenSizeUnmapView
                        • String ID:
                        • API String ID: 2836849460-0
                        • Opcode ID: ca1aa411c66d1c0410b41a7702d1f43bb57505d1c654becfd7533e8ffcd0176d
                        • Instruction ID: 37cb10d7b76febe12317a3c067e934ed60c0cbf2470bde60b70878876058a3cd
                        • Opcode Fuzzy Hash: ca1aa411c66d1c0410b41a7702d1f43bb57505d1c654becfd7533e8ffcd0176d
                        • Instruction Fuzzy Hash: 9D014B76201128BBEB235B66DC48EEF7EADEF497D0F004025FA89D6044DA768501DBA5
                        APIs
                          • Part of subcall function 010089CF: CreateFileU.CRYPT32(00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8,00000014,?), ref: 01008A15
                          • Part of subcall function 010089CF: GetFileSize.KERNEL32(00000000,00000014,00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8), ref: 01008A27
                          • Part of subcall function 010089CF: CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AA0
                          • Part of subcall function 010089CF: CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AAB
                        • CertOpenStore.CRYPT32(00000002,00000000,00000000,00000000,00000000), ref: 010056CA
                        • CertAddEncodedCTLToStore.CRYPT32(00000000,00000014,?,00000004,00000000), ref: 010056E6
                        • CertCloseStore.CRYPT32(00000000,00000000), ref: 010056F2
                        • UnmapViewOfFile.KERNEL32(00000014,?,?,01002606,?,?,00000014,?,SHA1,0000000A), ref: 01005702
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CertCloseFileStore$Handle$CreateEncodedOpenSizeUnmapView
                        • String ID:
                        • API String ID: 2155480357-0
                        • Opcode ID: 5e0100efab947cc34f2bedc1425696db73913a2c09c0408946b5dc9015651bd9
                        • Instruction ID: 2c05ff15c60448d41003a431b096c5c9d90047f6d8fd11dadf97d1566b7af47f
                        • Opcode Fuzzy Hash: 5e0100efab947cc34f2bedc1425696db73913a2c09c0408946b5dc9015651bd9
                        • Instruction Fuzzy Hash: 2F01FF76201114FBEB235B66EC48DEF7EADFB497D1F004025FA8A95054DA758501DBA0
                        APIs
                          • Part of subcall function 010089CF: CreateFileU.CRYPT32(00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8,00000014,?), ref: 01008A15
                          • Part of subcall function 010089CF: GetFileSize.KERNEL32(00000000,00000014,00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8), ref: 01008A27
                          • Part of subcall function 010089CF: CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AA0
                          • Part of subcall function 010089CF: CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AAB
                        • CertOpenStore.CRYPT32(00000002,00000000,00000000,00000000,00000000), ref: 010055F2
                        • CertAddEncodedCRLToStore.CRYPT32(00000000,00000014,?,00000004,00000000), ref: 0100560E
                        • CertCloseStore.CRYPT32(00000000,00000000), ref: 0100561A
                        • UnmapViewOfFile.KERNEL32(00000014,?,?,01002636,?,?,?,00000014,?,SHA1,0000000A), ref: 0100562A
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CertCloseFileStore$Handle$CreateEncodedOpenSizeUnmapView
                        • String ID:
                        • API String ID: 2155480357-0
                        • Opcode ID: 6b5c87c6544a87be6891c55ebf2ade5181a0901a2ddd9f5bc5ebbc01311d5002
                        • Instruction ID: e54639ea79bd19f13beabd818f347e3bab6400d40fb3b860ed1ea97a6c7ab2b3
                        • Opcode Fuzzy Hash: 6b5c87c6544a87be6891c55ebf2ade5181a0901a2ddd9f5bc5ebbc01311d5002
                        • Instruction Fuzzy Hash: 91016D36201124BBEB235B66DC4CEDF7EADEF4A7D1F008021FA8996044D636C645DBE0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: printf
                        • String ID: $%s
                        • API String ID: 3524737521-1620431320
                        • Opcode ID: 832a939498ca5c54dccd47193ac068a8b9a4694dd7b43a4c8c9ae73bb091ee82
                        • Instruction ID: 54b9187c37f542afa39c023b547ba663b869e8c4564ba06dc11e8b2b1756b5f6
                        • Opcode Fuzzy Hash: 832a939498ca5c54dccd47193ac068a8b9a4694dd7b43a4c8c9ae73bb091ee82
                        • Instruction Fuzzy Hash: 74113036148705FEF7172B50FD06CA97BA2FB14B10F108A2EF2CA154E0EB6655129F05
                        APIs
                          • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                          • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                        • printf.MSVCRT ref: 01007BFB
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: CryptDecodeObject$printfvwprintf
                        • String ID: $2.5.29.1
                        • API String ID: 3955122273-3951722430
                        • Opcode ID: 7ca381df2652aa7d180789d9e66e273edfc9d45d98226173321b015fd8576d13
                        • Instruction ID: cf0fc0226f966f60d2a764fd71cbc4d2b005ec1c3172848fb35415eb3df189f1
                        • Opcode Fuzzy Hash: 7ca381df2652aa7d180789d9e66e273edfc9d45d98226173321b015fd8576d13
                        • Instruction Fuzzy Hash: 0611A032544B02EAF7372B14FC06F8A7BA1FB44B11F24891EE2C4254E0DB6AA8519B51
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: scanf
                        • String ID: ,I$_I
                        • API String ID: 1199118012-3940272718
                        • Opcode ID: ca101df3259d03fc336c4c528397dc519d8e31adbb33dc6afae083b1c29359d4
                        • Instruction ID: 323b94659c0a78f8425be748a0ea1a1aa538074ebec5e4d42bbeafb621d42eda
                        • Opcode Fuzzy Hash: ca101df3259d03fc336c4c528397dc519d8e31adbb33dc6afae083b1c29359d4
                        • Instruction Fuzzy Hash: 8E01F732748302EEF7275F10BC45AD92FB1FB54760F24852EE6C49E0D0D55298418744
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.1877375908.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                        • Associated: 00000007.00000002.1877363937.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877389285.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                        • Associated: 00000007.00000002.1877402880.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_1000000_certmgr.jbxd
                        Similarity
                        • API ID: wprintf
                        • String ID: $%s
                        • API String ID: 3614878089-1620431320
                        • Opcode ID: 0cfcd77455245e8f38bf2108cdf96b010bc0f7eb2ddf4a18d3689b7d5f2d12cf
                        • Instruction ID: 61e4408ed4a96367af9554db99206b70cdff698fab4a52f2a8054b871a27b1a4
                        • Opcode Fuzzy Hash: 0cfcd77455245e8f38bf2108cdf96b010bc0f7eb2ddf4a18d3689b7d5f2d12cf
                        • Instruction Fuzzy Hash: 2FF0A479204706EAF6779B50EC01CA67BE5FB14700F148A1EF3C6554D0EB6AB440CB51