Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RDM_Root_Cert_Update_Windows.exe

Overview

General Information

Sample name:RDM_Root_Cert_Update_Windows.exe
Analysis ID:1500639
MD5:d4b2995d38da119e5b0db2cb90778224
SHA1:2570198aafaf5d6f394ffd6e7e741c2316510ee0
SHA256:05a6215fbf82c755b73dcfa297f229bf5b88c879b4a7a2edf680ebd97a4580ad
Infos:

Detection

Score:26
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Installs new ROOT certificates
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Creates a process in suspended mode (likely to inject code)
Dropped file seen in connection with other malware
Drops PE files
Drops certificate files (DER)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses net.exe to stop services

Classification

  • System is w10x64
  • RDM_Root_Cert_Update_Windows.exe (PID: 5844 cmdline: "C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe" MD5: D4B2995D38DA119E5B0DB2CB90778224)
    • RDM_Root_Cert_Update_Windows.tmp (PID: 5900 cmdline: "C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$10476,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe" MD5: A5388235BBD3513D95A2A5C172A55680)
      • RDM_ROOTCERTIFICATE.exe (PID: 6204 cmdline: "C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT MD5: 5DAEC5D62A1B06418E5EAE25B7857748)
        • RDM_ROOTCERTIFICATE.tmp (PID: 6400 cmdline: "C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp" /SL5="$2047A,1902883,887296,C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT MD5: 05CB53C8116FA798AB00B737F7B94015)
          • cmd.exe (PID: 6164 cmdline: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/certremoval.bat"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 6348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • cmd.exe (PID: 7056 cmdline: C:\Windows\system32\cmd.exe /S /D /c" echo 1 " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • certmgr.exe (PID: 2820 cmdline: CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root MD5: 5D077A0CDD077C014EEDB768FEB249BA)
            • certmgr.exe (PID: 5632 cmdline: CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root MD5: 5D077A0CDD077C014EEDB768FEB249BA)
          • certmgr.exe (PID: 5344 cmdline: "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/CertMgr.exe" -add -c RDM_RootCA.pem -s -r localmachine Root MD5: 5D077A0CDD077C014EEDB768FEB249BA)
            • conhost.exe (PID: 6056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 320 cmdline: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/AddCert.bat" "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\RDM_RootCA.pem"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 6160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • cmd.exe (PID: 1784 cmdline: C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • certutil.exe (PID: 3116 cmdline: certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\." -i "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\RDM_RootCA.pem" MD5: 0DDA4F16AE041578B4E250AE12E06EB1)
          • certutil.exe (PID: 6392 cmdline: "C:\Windows\system32/certutil.exe" f p rdm736 importpfx "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\rdm.pfx" MD5: 0DDA4F16AE041578B4E250AE12E06EB1)
            • conhost.exe (PID: 4720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • net.exe (PID: 3784 cmdline: "C:\Windows\system32\net.exe" stop "RDMAppweb" MD5: 31890A7DE89936F922D44D677F681A7F)
        • conhost.exe (PID: 5712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • net1.exe (PID: 7064 cmdline: C:\Windows\system32\net1 stop "RDMAppweb" MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
      • net.exe (PID: 7056 cmdline: "C:\Windows\system32\net.exe" stop "Embedthis Rdmappweb" MD5: 31890A7DE89936F922D44D677F681A7F)
        • conhost.exe (PID: 3608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • net1.exe (PID: 5604 cmdline: C:\Windows\system32\net1 stop "Embedthis Rdmappweb" MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
      • net.exe (PID: 6392 cmdline: "C:\Windows\system32\net.exe" start "RDMAppweb" MD5: 31890A7DE89936F922D44D677F681A7F)
        • conhost.exe (PID: 5952 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • net1.exe (PID: 3504 cmdline: C:\Windows\system32\net1 start "RDMAppweb" MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
      • net.exe (PID: 6720 cmdline: "C:\Windows\system32\net.exe" start "Embedthis Rdmappweb" MD5: 31890A7DE89936F922D44D677F681A7F)
        • conhost.exe (PID: 7064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • net1.exe (PID: 3292 cmdline: C:\Windows\system32\net1 start "Embedthis Rdmappweb" MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/certremoval.bat"", CommandLine: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/certremoval.bat"", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp" /SL5="$2047A,1902883,887296,C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT, ParentImage: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp, ParentProcessId: 6400, ParentProcessName: RDM_ROOTCERTIFICATE.tmp, ProcessCommandLine: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/certremoval.bat"", ProcessId: 6164, ProcessName: cmd.exe
Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/certremoval.bat"", CommandLine: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/certremoval.bat"", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp" /SL5="$2047A,1902883,887296,C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT, ParentImage: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp, ParentProcessId: 6400, ParentProcessName: RDM_ROOTCERTIFICATE.tmp, ProcessCommandLine: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/certremoval.bat"", ProcessId: 6164, ProcessName: cmd.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*", CommandLine: C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/AddCert.bat" "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\RDM_RootCA.pem"", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 320, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*", ProcessId: 1784, ProcessName: cmd.exe
Source: Process startedAuthor: Michael Haag, Mark Woan (improvements), James Pemberton / @4A616D6573 / oscd.community (improvements): Data: Command: "C:\Windows\system32\net.exe" stop "RDMAppweb", CommandLine: "C:\Windows\system32\net.exe" stop "RDMAppweb", CommandLine|base64offset|contains: ), Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$10476,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp, ParentProcessId: 5900, ParentProcessName: RDM_Root_Cert_Update_Windows.tmp, ProcessCommandLine: "C:\Windows\system32\net.exe" stop "RDMAppweb", ProcessId: 3784, ProcessName: net.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: "C:\Windows\system32\net.exe" start "RDMAppweb", CommandLine: "C:\Windows\system32\net.exe" start "RDMAppweb", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$10476,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp, ParentProcessId: 5900, ParentProcessName: RDM_Root_Cert_Update_Windows.tmp, ProcessCommandLine: "C:\Windows\system32\net.exe" start "RDMAppweb", ProcessId: 6392, ProcessName: net.exe
Source: Process startedAuthor: Jakob Weinzettl, oscd.community, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\net.exe" stop "RDMAppweb", CommandLine: "C:\Windows\system32\net.exe" stop "RDMAppweb", CommandLine|base64offset|contains: ), Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$10476,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp, ParentProcessId: 5900, ParentProcessName: RDM_Root_Cert_Update_Windows.tmp, ProcessCommandLine: "C:\Windows\system32\net.exe" stop "RDMAppweb", ProcessId: 3784, ProcessName: net.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_0100197F CryptMsgClose,CertCloseStore,8_2_0100197F
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_01001AD0 GetModuleHandleA,CryptInitOIDFunctionSet,CryptInstallOIDFunctionAddress,CryptRegisterOIDInfo,8_2_01001AD0
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_01006F21 CryptDecodeObject,printf,8_2_01006F21
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_0100812A CryptFindOIDInfo,8_2_0100812A
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_01007E5A CryptFindOIDInfo,8_2_01007E5A
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_01001965 CryptMsgClose,CertCloseStore,8_2_01001965
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_01008168 CryptFindOIDInfo,8_2_01008168
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_0100826B CryptDecodeObject,CryptDecodeObject,CryptDecodeObject,8_2_0100826B
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_01008186 CryptMsgGetParam,CryptMsgGetParam,CryptMsgGetParam,8_2_01008186
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_010052A5 CertOpenStore,CryptSIPRetrieveSubjectGuid,CryptSIPLoad,CertOpenStore,CryptMsgOpenToDecode,CertCloseStore,CryptMsgUpdate,CertCloseStore,CryptMsgClose,8_2_010052A5
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_01006FB3 CryptDecodeObject,printf,8_2_01006FB3
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_010018CB CryptMsgClose,CertCloseStore,8_2_010018CB
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_010050E8 CryptMsgGetAndVerifySigner,CertFreeCTLContext,8_2_010050E8
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_010076EB CryptDecodeObject,printf,printf,printf,8_2_010076EB
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_010037EC strtok,strtok,CryptEncodeObject,CryptEncodeObject,CryptEncodeObject,CertEnumCertificatesInStore,CertEnumCertificatesInStore,CertSetCertificateContextProperty,CertSetCertificateContextProperty,CertSetCertificateContextProperty,CertEnumCertificatesInStore,CertFreeCTLContext,8_2_010037EC
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_01007FF1 CryptGetOIDFunctionAddress,wprintf,CryptFreeOIDFunctionAddress,8_2_01007FF1
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_010045F3 CryptHashPublicKeyInfo,CryptReleaseContext,CertGetCertificateContextProperty,printf,printf,printf,CertGetPublicKeyLength,printf,printf,printf,8_2_010045F3
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDirectory created: C:\Program Files\Mozilla Firefox\defaults\pref\is-PMF5D.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDirectory created: C:\Program Files\Mozilla Firefox\defaults\pref\is-K76D6.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDirectory created: C:\Program Files\Mozilla Firefox\is-PGH5D.tmpJump to behavior
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: certificate valid
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\Jump to behavior
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://acedicom.edicomgroup.com/doc0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://ca.disig.sk/ca/crl/ca_disig.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://cps.chambersign.org/cps/chambersignroot.html0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://cps.chambersign.org/cps/chambersroot.html0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.chambersign.org/chambersignroot.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.chambersign.org/chambersroot.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.comodoca.com/COMODOCertificationAuthority.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.comodoca.com/SecureCertificateServices.crl09
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.comodoca.com/TrustedCertificateServices.crl0:
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.geotrust.com/crls/globalca1.crl0
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0V
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://crl.globalsign.com/gsgccr45codesignca2020.crl0
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.oces.certifikat.dk/oces.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.pki.wellsfargo.com/wsprca.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.securetrust.com/SGCA.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.securetrust.com/STCA.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://crl.xrampsecurity.com/XGCA.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignCA.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://ocsp.comodoca.com0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://ocsp.comodoca.com0%
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://ocsp.comodoca.com0-
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://ocsp.comodoca.com0/
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://ocsp.comodoca.com05
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://ocsp.entrust.net03
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://ocsp.entrust.net0D
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45codesignca20200V
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://ocsp.globalsign.com/rootr30;
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://ocsp.pki.gva.es0
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://policy.camerfirma.com0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://repository.swisssign.com/0
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45codesignca2020.crt0=
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.certicamara.com/dpc/0Z
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.certifikat.dk/repository0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.certplus.com/CRL/class2.crl0
Source: is-SJL0P.tmp.4.drString found in binary or memory: http://www.chambersign.org1
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.disig.sk/ca/crl/ca_disig.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.disig.sk/ca0f
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.e-szigno.hu/RootCA.crl
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.e-szigno.hu/RootCA.crt0
Source: is-SJL0P.tmp.4.drString found in binary or memory: http://www.e-szigno.hu/SZSZ/0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.entrust.net/CRL/net1.crl0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.firmaprofesional.com/cps0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.firmaprofesional.com0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-8I24T.tmp.4.dr, is-MK9CH.tmp.4.dr, is-U7N00.tmp.4.drString found in binary or memory: http://www.mozilla.org/MPL/
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-8I24T.tmp.4.dr, is-MK9CH.tmp.4.dr, is-U7N00.tmp.4.drString found in binary or memory: http://www.mozilla.org/MPL/Copyright
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.phreedom.org/md5)
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.phreedom.org/md5)0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.phreedom.org/md5)MD5
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.pki.gva.es/cps0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.pki.gva.es/cps0%
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy-G20
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.pkioverheid.nl/policies/root-policy0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.quovadis.bm0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.quovadisglobal.com/cps0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2123504985.0000000003490000.00000004.00001000.00020000.00000000.sdmp, RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2145776607.0000000000D33000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.rdmcorp.com
Source: RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.2174784142.0000000002343000.00000004.00001000.00020000.00000000.sdmp, RDM_ROOTCERTIFICATE.exe, 00000003.00000003.2148199999.0000000002343000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.rdmcorp.comQ64
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.sk.ee/cps/0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.sk.ee/juur/crl/0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.trustdst.com/certificates/policy/ACES-index.html0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.valicert.com/1
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: http://www.wellsfargo.com/certpolicy0
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: https://ocsp.quovadisoffshore.com0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: https://rca.e-szigno.hu/ocsp0-
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: https://secure.comodo.com/CPS0
Source: is-SJL0P.tmp.4.drString found in binary or memory: https://www.catcert.net/verarrel
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drString found in binary or memory: https://www.catcert.net/verarrel05
Source: RDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drString found in binary or memory: https://www.globalsign.com/repository/0
Source: RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.2066414940.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.2066792410.000000007FB30000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.tmp, 00000001.00000000.2068157919.0000000000401000.00000020.00000001.01000000.00000004.sdmp, RDM_ROOTCERTIFICATE.tmp.3.dr, RDM_Root_Cert_Update_Windows.tmp.0.drString found in binary or memory: https://www.innosetup.com/
Source: is-SJL0P.tmp.4.drString found in binary or memory: https://www.netlock.hu/docs/
Source: is-SJL0P.tmp.4.drString found in binary or memory: https://www.netlock.net/docs
Source: RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.2066414940.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.2066792410.000000007FB30000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.tmp, 00000001.00000000.2068157919.0000000000401000.00000020.00000001.01000000.00000004.sdmp, RDM_ROOTCERTIFICATE.tmp.3.dr, RDM_Root_Cert_Update_Windows.tmp.0.drString found in binary or memory: https://www.remobjects.com/ps
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\rdm.pfx (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-1QMJT.tmpJump to dropped file
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe (copy) 8A830C48C4D78159DD80F4DAD81C0BEBBF9314710026B1A2EF0FFDDDCB24B83D
Source: RDM_Root_Cert_Update_Windows.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: RDM_ROOTCERTIFICATE.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.2066792410.000000007FE30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs RDM_Root_Cert_Update_Windows.exe
Source: RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.2066414940.00000000026A4000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFileName vs RDM_Root_Cert_Update_Windows.exe
Source: RDM_Root_Cert_Update_Windows.exe, 00000000.00000000.2064795778.00000000004DF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileName vs RDM_Root_Cert_Update_Windows.exe
Source: RDM_Root_Cert_Update_Windows.exeBinary or memory string: OriginalFileName vs RDM_Root_Cert_Update_Windows.exe
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: sus26.winEXE@49/59@0/0
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpFile created: C:\Program Files (x86)\RDM CorporationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6056:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5712:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6348:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3608:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6160:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7064:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4720:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5952:120:WilError_03
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeFile created: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/certremoval.bat""
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-M356P.tmp.4.drBinary or memory string: CREATE TABLE metaData (id PRIMARY KEY UNIQUE ON CONFLICT REPLACE, item1, item2);
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-LTALL.tmp.4.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-M356P.tmp.4.drBinary or memory string: SELECT ALL %s FROM %s WHERE id=$ID;
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-LTALL.tmp.4.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-LTALL.tmp.4.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-M356P.tmp.4.drBinary or memory string: SELECT ALL * FROM %s LIMIT 0;
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-LTALL.tmp.4.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-M356P.tmp.4.drBinary or memory string: UPDATE %s SET %s WHERE id=$ID;
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-M356P.tmp.4.drBinary or memory string: SELECT ALL * FROM %s WHERE %s;
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-M356P.tmp.4.drBinary or memory string: SELECT ALL * FROM metaData WHERE id=$ID;
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-LTALL.tmp.4.drBinary or memory string: UPDATE sqlite_master SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-M356P.tmp.4.drBinary or memory string: INSERT INTO metaData (id,item1) VALUES($ID,$ITEM1);
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-M356P.tmp.4.drBinary or memory string: INSERT INTO %s (id%s) VALUES($ID%s);
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-LTALL.tmp.4.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-M356P.tmp.4.drBinary or memory string: INSERT INTO metaData (id,item1,item2) VALUES($ID,$ITEM1,$ITEM2);
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-M356P.tmp.4.drBinary or memory string: SELECT ALL * FROM %s;
Source: RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000005142000.00000004.00001000.00020000.00000000.sdmp, is-LTALL.tmp.4.drBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
Source: RDM_Root_Cert_Update_Windows.exeString found in binary or memory: /LOADINF="filename"
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeFile read: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe "C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe"
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeProcess created: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp "C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$10476,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe"
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe "C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT
Source: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exeProcess created: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp "C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp" /SL5="$2047A,1902883,887296,C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/certremoval.bat""
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo 1 "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/CertMgr.exe" -add -c RDM_RootCA.pem -s -r localmachine Root
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/AddCert.bat" "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\RDM_RootCA.pem""
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\." -i "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\RDM_RootCA.pem"
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\certutil.exe "C:\Windows\system32/certutil.exe" f p rdm736 importpfx "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\rdm.pfx"
Source: C:\Windows\SysWOW64\certutil.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" stop "RDMAppweb"
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop "RDMAppweb"
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" stop "Embedthis Rdmappweb"
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop "Embedthis Rdmappweb"
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" start "RDMAppweb"
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start "RDMAppweb"
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" start "Embedthis Rdmappweb"
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start "Embedthis Rdmappweb"
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeProcess created: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp "C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$10476,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe "C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENTJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" stop "RDMAppweb"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo 1 "Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\certutil.exe "C:\Windows\system32/certutil.exe" f p rdm736 importpfx "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\rdm.pfx"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" start "Embedthis Rdmappweb"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exeProcess created: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp "C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp" /SL5="$2047A,1902883,887296,C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENTJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/certremoval.bat""Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/CertMgr.exe" -add -c RDM_RootCA.pem -s -r localmachine RootJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/AddCert.bat" "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\RDM_RootCA.pem""Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess created: C:\Windows\SysWOW64\certutil.exe "C:\Windows\system32/certutil.exe" f p rdm736 importpfx "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\rdm.pfx"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo 1 "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine RootJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine RootJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\." -i "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\RDM_RootCA.pem"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop "RDMAppweb"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop "Embedthis Rdmappweb"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start "RDMAppweb"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start "Embedthis Rdmappweb"Jump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpSection loaded: explorerframe.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: certenroll.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: dsparse.dllJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeSection loaded: webservices.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpWindow found: window name: TMainFormJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpAutomated click: Install
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpAutomated click: Next
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpAutomated click: Next
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDirectory created: C:\Program Files\Mozilla Firefox\defaults\pref\is-PMF5D.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDirectory created: C:\Program Files\Mozilla Firefox\defaults\pref\is-K76D6.tmpJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDirectory created: C:\Program Files\Mozilla Firefox\is-PGH5D.tmpJump to behavior
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: certificate valid
Source: RDM_Root_Cert_Update_Windows.exeStatic file information: File size 3838992 > 1048576
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: RDM_Root_Cert_Update_Windows.exeStatic PE information: section name: .didata
Source: RDM_Root_Cert_Update_Windows.tmp.0.drStatic PE information: section name: .didata
Source: is-N0SQK.tmp.1.drStatic PE information: section name: .didata
Source: RDM_ROOTCERTIFICATE.tmp.3.drStatic PE information: section name: .didata

Persistence and Installation Behavior

barindex
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Windows\SysWOW64\certutil.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CAFAC3A697F2F0A9D66F8F1DC86BEE6AD15E425C BlobJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\nssckbi.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-SJL0P.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-AUFQA.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-U7N00.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\libnspr4.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exeFile created: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\sqlite3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-T2GKH.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-QG9HH.tmpJump to dropped file
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeFile created: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\nss3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\nssdbm3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\libplds4.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-8C4S6.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-K24N6.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\softokn3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\libplc4.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\nssutil3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-MK9CH.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpFile created: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\is-N0SQK.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpFile created: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-8I24T.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-3KPG9.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\freebl3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-LTALL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-PBG95.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\smime3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\ssl3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpFile created: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-M356P.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess created: C:\Windows\SysWOW64\net.exe "C:\Windows\system32\net.exe" stop "RDMAppweb"
Source: C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\nssckbi.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-SJL0P.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-AUFQA.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-U7N00.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\libnspr4.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\sqlite3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-T2GKH.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-QG9HH.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\nss3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\nssdbm3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\libplds4.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-8C4S6.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-K24N6.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\softokn3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\nssutil3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\libplc4.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-MK9CH.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-8I24T.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\freebl3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-3KPG9.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-LTALL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\smime3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\ssl3.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-M356P.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeAPI coverage: 8.5 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\Jump to behavior
Source: RDM_Root_Cert_Update_Windows.exeBinary or memory string: QeMU5
Source: C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmpProcess information queried: ProcessInformationJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" echo 1 "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine RootJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine RootJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\certutil.exe certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\." -i "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\RDM_RootCA.pem"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop "RDMAppweb"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop "Embedthis Rdmappweb"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start "RDMAppweb"Jump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start "Embedthis Rdmappweb"Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_010082F1 GetSystemTime,SystemTimeToFileTime,CompareFileTime,8_2_010082F1
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeCode function: 8_2_0100877A GetVersionExA,8_2_0100877A
Source: C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts2
Command and Scripting Interpreter
1
Windows Service
1
Windows Service
3
Masquerading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Service Execution
1
Scripting
11
Process Injection
11
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
1
DLL Side-Loading
1
Install Root Certificate
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS2
System Owner/User Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials4
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1500639 Sample: RDM_Root_Cert_Update_Windows.exe Startdate: 28/08/2024 Architecture: WINDOWS Score: 26 89 Sigma detected: Invoke-Obfuscation CLIP+ Launcher 2->89 91 Sigma detected: Invoke-Obfuscation VAR+ Launcher 2->91 10 RDM_Root_Cert_Update_Windows.exe 2 2->10         started        process3 file4 81 C:\Users\...\RDM_Root_Cert_Update_Windows.tmp, PE32 10->81 dropped 13 RDM_Root_Cert_Update_Windows.tmp 5 15 10->13         started        process5 file6 83 C:\Users\user\AppData\Local\...\is-N0SQK.tmp, PE32 13->83 dropped 85 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 13->85 dropped 87 C:\Users\...\RDM_ROOTCERTIFICATE.exe (copy), PE32 13->87 dropped 16 RDM_ROOTCERTIFICATE.exe 2 13->16         started        19 net.exe 1 13->19         started        21 net.exe 1 13->21         started        23 2 other processes 13->23 process7 file8 71 C:\Users\user\...\RDM_ROOTCERTIFICATE.tmp, PE32 16->71 dropped 25 RDM_ROOTCERTIFICATE.tmp 37 16->25         started        28 conhost.exe 19->28         started        30 net1.exe 1 19->30         started        32 conhost.exe 21->32         started        34 net1.exe 1 21->34         started        36 conhost.exe 23->36         started        38 conhost.exe 23->38         started        40 net1.exe 1 23->40         started        42 net1.exe 1 23->42         started        process9 file10 73 C:\Users\user\AppData\...\certmgr.exe (copy), PE32 25->73 dropped 75 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 25->75 dropped 77 C:\Users\user\AppData\...\ssl3.dll (copy), PE32 25->77 dropped 79 24 other files (none is malicious) 25->79 dropped 44 certutil.exe 1 51 25->44         started        47 certmgr.exe 1 1 25->47         started        49 cmd.exe 1 25->49         started        51 cmd.exe 1 25->51         started        process11 signatures12 93 Installs new ROOT certificates 44->93 53 conhost.exe 44->53         started        55 conhost.exe 47->55         started        57 conhost.exe 49->57         started        59 cmd.exe 1 49->59         started        61 certmgr.exe 11 1 49->61         started        63 certmgr.exe 1 49->63         started        65 conhost.exe 51->65         started        67 cmd.exe 1 51->67         started        69 certutil.exe 1 51->69         started        process13

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
RDM_Root_Cert_Update_Windows.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\freebl3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-3KPG9.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-8C4S6.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-8I24T.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-AUFQA.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-K24N6.tmp3%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-LTALL.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-M356P.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-MK9CH.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-PBG95.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-QG9HH.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-SJL0P.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-T2GKH.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\is-U7N00.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\libnspr4.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\libplc4.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\libplds4.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\nss3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\nssckbi.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\nssdbm3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\nssutil3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\smime3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\softokn3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\sqlite3.dll (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\ssl3.dll (copy)3%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe (copy)0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\is-N0SQK.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.entrust.net030%URL Reputationsafe
http://cps.chambersign.org/cps/chambersroot.html00%URL Reputationsafe
http://www.chambersign.org10%URL Reputationsafe
http://www.firmaprofesional.com/cps00%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
http://repository.swisssign.com/00%URL Reputationsafe
http://crl.securetrust.com/SGCA.crl00%URL Reputationsafe
http://crl.securetrust.com/STCA.crl00%URL Reputationsafe
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU0%Avira URL Cloudsafe
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl00%Avira URL Cloudsafe
http://crl.chambersign.org/chambersroot.crl00%Avira URL Cloudsafe
http://fedir.comsign.co.il/crl/ComSignCA.crl00%Avira URL Cloudsafe
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl00%Avira URL Cloudsafe
http://www.certplus.com/CRL/class2.crl00%URL Reputationsafe
http://www.rdmcorp.comQ640%Avira URL Cloudsafe
http://www.quovadisglobal.com/cps00%URL Reputationsafe
http://www.certifikat.dk/repository00%Avira URL Cloudsafe
https://www.remobjects.com/ps0%URL Reputationsafe
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%Avira URL Cloudsafe
https://www.innosetup.com/0%URL Reputationsafe
http://www.phreedom.org/md5)MD50%Avira URL Cloudsafe
http://ca.disig.sk/ca/crl/ca_disig.crl00%Avira URL Cloudsafe
http://www.pkioverheid.nl/policies/root-policy00%Avira URL Cloudsafe
http://www.e-szigno.hu/RootCA.crt00%Avira URL Cloudsafe
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl0%Avira URL Cloudsafe
http://www.disig.sk/ca/crl/ca_disig.crl00%Avira URL Cloudsafe
https://ocsp.quovadisoffshore.com00%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
http://policy.camerfirma.com00%URL Reputationsafe
http://crl.entrust.net/server1.crl00%URL Reputationsafe
https://www.catcert.net/verarrel0%URL Reputationsafe
https://www.catcert.net/verarrel050%URL Reputationsafe
http://www.quovadis.bm00%URL Reputationsafe
http://www.e-szigno.hu/SZSZ/00%Avira URL Cloudsafe
http://www.sk.ee/cps/00%Avira URL Cloudsafe
https://secure.comodo.com/CPS00%URL Reputationsafe
http://www.valicert.com/10%Avira URL Cloudsafe
http://cps.chambersign.org/cps/chambersignroot.html00%Avira URL Cloudsafe
http://www.phreedom.org/md5)0%Avira URL Cloudsafe
http://ocsp.pki.gva.es00%Avira URL Cloudsafe
http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
http://www.rdmcorp.com0%Avira URL Cloudsafe
http://crl.oces.certifikat.dk/oces.crl00%Avira URL Cloudsafe
http://crl.pki.wellsfargo.com/wsprca.crl00%Avira URL Cloudsafe
http://www.certicamara.com/dpc/0Z0%Avira URL Cloudsafe
https://rca.e-szigno.hu/ocsp0-0%Avira URL Cloudsafe
https://www.netlock.hu/docs/0%Avira URL Cloudsafe
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%Avira URL Cloudsafe
http://acedicom.edicomgroup.com/doc00%Avira URL Cloudsafe
http://www.entrust.net/CRL/net1.crl00%Avira URL Cloudsafe
http://www.disig.sk/ca0f0%Avira URL Cloudsafe
http://crl.chambersign.org/chambersignroot.crl00%Avira URL Cloudsafe
http://www.sk.ee/juur/crl/00%Avira URL Cloudsafe
http://www.e-szigno.hu/RootCA.crl0%Avira URL Cloudsafe
http://crl.xrampsecurity.com/XGCA.crl00%Avira URL Cloudsafe
http://www.pki.gva.es/cps00%Avira URL Cloudsafe
http://www.firmaprofesional.com00%Avira URL Cloudsafe
http://www.trustdst.com/certificates/policy/ACES-index.html00%Avira URL Cloudsafe
http://www.pki.gva.es/cps0%0%Avira URL Cloudsafe
http://www.wellsfargo.com/certpolicy00%Avira URL Cloudsafe
http://www.pkioverheid.nl/policies/root-policy-G200%Avira URL Cloudsafe
http://www.phreedom.org/md5)00%Avira URL Cloudsafe
https://www.netlock.net/docs0%Avira URL Cloudsafe
http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crl0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupURDM_Root_Cert_Update_Windows.exe, is-N0SQK.tmp.1.drfalse
  • Avira URL Cloud: safe
unknown
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.netsolssl.com/NetworkSolutionsCertificateAuthority.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://fedir.comsign.co.il/crl/ComSignCA.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.chambersign.org/chambersroot.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://ocsp.entrust.net03RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://cps.chambersign.org/cps/chambersroot.html0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://www.rdmcorp.comQ64RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.2174784142.0000000002343000.00000004.00001000.00020000.00000000.sdmp, RDM_ROOTCERTIFICATE.exe, 00000003.00000003.2148199999.0000000002343000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.certifikat.dk/repository0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.chambersign.org1is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.firmaprofesional.com/cps0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://www.diginotar.nl/cps/pkioverheid0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://www.pkioverheid.nl/policies/root-policy0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://repository.swisssign.com/0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://crl.securetrust.com/SGCA.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://www.phreedom.org/md5)MD5RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.securetrust.com/STCA.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crlRDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://ca.disig.sk/ca/crl/ca_disig.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.certplus.com/CRL/class2.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://www.disig.sk/ca/crl/ca_disig.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.e-szigno.hu/RootCA.crt0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.quovadisglobal.com/cps0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
https://www.remobjects.com/psRDM_Root_Cert_Update_Windows.exe, 00000000.00000003.2066414940.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.2066792410.000000007FB30000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.tmp, 00000001.00000000.2068157919.0000000000401000.00000020.00000001.01000000.00000004.sdmp, RDM_ROOTCERTIFICATE.tmp.3.dr, RDM_Root_Cert_Update_Windows.tmp.0.drfalse
  • URL Reputation: safe
unknown
https://www.innosetup.com/RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.2066414940.00000000025A0000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.exe, 00000000.00000003.2066792410.000000007FB30000.00000004.00001000.00020000.00000000.sdmp, RDM_Root_Cert_Update_Windows.tmp, 00000001.00000000.2068157919.0000000000401000.00000020.00000001.01000000.00000004.sdmp, RDM_ROOTCERTIFICATE.tmp.3.dr, RDM_Root_Cert_Update_Windows.tmp.0.drfalse
  • URL Reputation: safe
unknown
http://www.sk.ee/cps/0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.valicert.com/1RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.e-szigno.hu/SZSZ/0is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
https://ocsp.quovadisoffshore.com0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://ocsp.entrust.net0DRDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://cps.chambersign.org/cps/chambersignroot.html0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://policy.camerfirma.com0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://ocsp.pki.gva.es0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.phreedom.org/md5)RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.rdmcorp.comRDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2123504985.0000000003490000.00000004.00001000.00020000.00000000.sdmp, RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2145776607.0000000000D33000.00000004.00001000.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://crl.oces.certifikat.dk/oces.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.entrust.net/server1.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://www.certicamara.com/dpc/0ZRDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.pki.wellsfargo.com/wsprca.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
https://rca.e-szigno.hu/ocsp0-RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
https://www.netlock.hu/docs/is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://acedicom.edicomgroup.com/doc0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.entrust.net/CRL/net1.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
https://www.catcert.net/verarrelis-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://www.disig.sk/ca0fRDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.e-szigno.hu/RootCA.crlRDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.sk.ee/juur/crl/0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.chambersign.org/chambersignroot.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.xrampsecurity.com/XGCA.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
https://www.catcert.net/verarrel05RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://www.quovadis.bm0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
http://www.trustdst.com/certificates/policy/ACES-index.html0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.firmaprofesional.com0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.pki.gva.es/cps0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.pki.gva.es/cps0%RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.pkioverheid.nl/policies/root-policy-G20RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.wellsfargo.com/certpolicy0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
https://secure.comodo.com/CPS0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
https://www.netlock.net/docsis-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.phreedom.org/md5)0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://www.trustcenter.de/crl/v2/tc_class_2_ca_II.crlRDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • Avira URL Cloud: safe
unknown
http://crl.entrust.net/2048ca.crl0RDM_ROOTCERTIFICATE.tmp, 00000004.00000003.2144186096.0000000004F60000.00000004.00001000.00020000.00000000.sdmp, is-SJL0P.tmp.4.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1500639
Start date and time:2024-08-28 18:57:25 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 36s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:30
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:RDM_Root_Cert_Update_Windows.exe
Detection:SUS
Classification:sus26.winEXE@49/59@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 83%
  • Number of executed functions: 10
  • Number of non-executed functions: 55
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Excluded IPs from analysis (whitelisted): 40.68.123.157
  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, sls.update.microsoft.com, glb.sls.prod.dcat.dsp.trafficmanager.net
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • VT rate limit hit for: RDM_Root_Cert_Update_Windows.exe
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\freebl3.dll (copy)TouchEn_nxKey_32bit.exeGet hashmaliciousUnknownBrowse
    TZCRangerRemote_v2.2.2.3_Installer_x64.exeGet hashmaliciousUnknownBrowse
      SecuriteInfo.com.Trojan.Siggen21.30206.14092.30541.exeGet hashmaliciousUnknownBrowse
        SecuriteInfo.com.Trojan.Siggen21.30206.14092.30541.exeGet hashmaliciousUnknownBrowse
          TouchEn_nxKey_Installer_32bit.exeGet hashmaliciousUnknownBrowse
            TouchEn_nxKey_Installer_32bit.exeGet hashmaliciousUnknownBrowse
              TouchEn_nxKey_Installer_32bit.exeGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.Win32.Malware.KillAV.6KOMSE@gen.22946.22832.exeGet hashmaliciousUnknownBrowse
                  SecuriteInfo.com.Win32.Malware.KillAV.6KOMSE@gen.22946.22832.exeGet hashmaliciousUnknownBrowse
                    SCWSConSetup_1.0.1.65_ver.exeGet hashmaliciousUnknownBrowse
                      C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe (copy)I3GSvcManager.exeGet hashmaliciousUnknownBrowse
                        SecuriteInfo.com.BScope.Trojan.Downloader.22056.5372.exeGet hashmaliciousUnknownBrowse
                          I3GSvcManager.exeGet hashmaliciousUnknownBrowse
                            I3GSvcManager.exeGet hashmaliciousUnknownBrowse
                              Kit_Carteurope_1.7.0.exeGet hashmaliciousUnknownBrowse
                                I3GSvcManager.exeGet hashmaliciousUnknownBrowse
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):103
                                  Entropy (8bit):4.493835447768373
                                  Encrypted:false
                                  SSDEEP:3:URZqeeLfCXdQFiFyy6HAe+WA6nWZmrXpn:Ui5LKuFiFr6HAe+WfWErZn
                                  MD5:9556062A739F56D168C1581A11192A17
                                  SHA1:81EE37E3990A004B9F50CBE99D512A5A5247AA90
                                  SHA-256:D151A50870503A2D394E3FFD65E2C0DAED043AE1E54C974E80AF811C7A60C78E
                                  SHA-512:57AB815C4F4F4F7C96D05A714F6CFEBD3DF47EC5C5E8363E07C3180E05BBECB03A472690EDE29BB8690B2E2C0570B5512338B13710E031DE8622D68667031D92
                                  Malicious:false
                                  Preview:/* Enable experimental Windows trust store support */..pref("security.enterprise_roots.enabled", true);
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):90
                                  Entropy (8bit):4.4385634049235
                                  Encrypted:false
                                  SSDEEP:3:iDVDuE8Lxm0wf9sDuE8LzLpFw6XFn:iDVDopDoNjXF
                                  MD5:30573ACFC9586271A3F800A10C284479
                                  SHA1:9CC1A1329258379698A04C33DC5D62E9CE8E06FD
                                  SHA-256:30B9CF8F9760BCD38617A3878D43FC19E981C6DD13D6400C2A19D2ECAB746CB5
                                  SHA-512:4A6DF4E50D8C04AD9E65A9D183D4C8B723FCB50E1E786018010A33CEE2B4F73296045864FFFB526D887579BEC8EC5C4CA5353127FB07E632B18C5B4684719015
                                  Malicious:false
                                  Preview:pref("general.config.obscure_value", 0);..pref("general.config.filename", "umbrella.cfg");
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):103
                                  Entropy (8bit):4.493835447768373
                                  Encrypted:false
                                  SSDEEP:3:URZqeeLfCXdQFiFyy6HAe+WA6nWZmrXpn:Ui5LKuFiFr6HAe+WfWErZn
                                  MD5:9556062A739F56D168C1581A11192A17
                                  SHA1:81EE37E3990A004B9F50CBE99D512A5A5247AA90
                                  SHA-256:D151A50870503A2D394E3FFD65E2C0DAED043AE1E54C974E80AF811C7A60C78E
                                  SHA-512:57AB815C4F4F4F7C96D05A714F6CFEBD3DF47EC5C5E8363E07C3180E05BBECB03A472690EDE29BB8690B2E2C0570B5512338B13710E031DE8622D68667031D92
                                  Malicious:false
                                  Preview:/* Enable experimental Windows trust store support */..pref("security.enterprise_roots.enabled", true);
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):90
                                  Entropy (8bit):4.4385634049235
                                  Encrypted:false
                                  SSDEEP:3:iDVDuE8Lxm0wf9sDuE8LzLpFw6XFn:iDVDopDoNjXF
                                  MD5:30573ACFC9586271A3F800A10C284479
                                  SHA1:9CC1A1329258379698A04C33DC5D62E9CE8E06FD
                                  SHA-256:30B9CF8F9760BCD38617A3878D43FC19E981C6DD13D6400C2A19D2ECAB746CB5
                                  SHA-512:4A6DF4E50D8C04AD9E65A9D183D4C8B723FCB50E1E786018010A33CEE2B4F73296045864FFFB526D887579BEC8EC5C4CA5353127FB07E632B18C5B4684719015
                                  Malicious:false
                                  Preview:pref("general.config.obscure_value", 0);..pref("general.config.filename", "umbrella.cfg");
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):56
                                  Entropy (8bit):4.503434386188784
                                  Encrypted:false
                                  SSDEEP:3:RBkAe+WA6nWZmrXpn:rkAe+WfWErZn
                                  MD5:E40A3D559E4B85251943E071CD036D90
                                  SHA1:10FC58DF075108C912589F7954244A807776A0FB
                                  SHA-256:E179CA82C741D7D4842E42BC339C0E2C9BEFA1A5EFFE33D69D6821B3121FECCA
                                  SHA-512:07CC337D7EB364FC78B0B36ACBE9F89B85D932B3D616B8EDFB5F12214ECD17853ECAC4725CAE929CCE8A803D868FC3F5A5AD4D394554BB4783B0CCAFEA981959
                                  Malicious:false
                                  Preview://..lockPref("security.enterprise_roots.enabled", true);
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):56
                                  Entropy (8bit):4.503434386188784
                                  Encrypted:false
                                  SSDEEP:3:RBkAe+WA6nWZmrXpn:rkAe+WfWErZn
                                  MD5:E40A3D559E4B85251943E071CD036D90
                                  SHA1:10FC58DF075108C912589F7954244A807776A0FB
                                  SHA-256:E179CA82C741D7D4842E42BC339C0E2C9BEFA1A5EFFE33D69D6821B3121FECCA
                                  SHA-512:07CC337D7EB364FC78B0B36ACBE9F89B85D932B3D616B8EDFB5F12214ECD17853ECAC4725CAE929CCE8A803D868FC3F5A5AD4D394554BB4783B0CCAFEA981959
                                  Malicious:false
                                  Preview://..lockPref("security.enterprise_roots.enabled", true);
                                  Process:C:\Windows\SysWOW64\certutil.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):2251
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:0158FE9CEAD91D1B027B795984737614
                                  SHA1:B41A11F909A7BDF1115088790A5680AC4E23031B
                                  SHA-256:513257326E783A862909A2A0F0941D6FF899C403E104FBD1DBC10443C41D9F9A
                                  SHA-512:C48A55CC7A92CEFCEFE5FB2382CCD8EF651FC8E0885E88A256CD2F5D83B824B7D910F755180B29ECCB54D9361D6AF82F9CC741BD7E6752122949B657DA973676
                                  Malicious:false
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Windows\SysWOW64\certutil.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):2271
                                  Entropy (8bit):7.644791740204127
                                  Encrypted:false
                                  SSDEEP:48:dSwTdnQwCBU8mrX0kb443ShIlxnz1DcOUQA7/WWp8Ad:dSsdnJCBnmrXE4iWF5cJNnj
                                  MD5:10D9BB0149661E5ABBFCC8C9C26D502A
                                  SHA1:F29DE4021C931CFFAD341E86F9AEFDDF40992E08
                                  SHA-256:0F782079588B990762BF4535D8D4693D50963FE99A8577486E49BDF70A873A06
                                  SHA-512:B0EF51E08E444BC08A18186F0A0A2C3EF92699C57EE8A4312B3D1170D7EE9A15B0A95D16CF1193F8FFACD4DD9E8519226244A9AC7668983C505C093792645413
                                  Malicious:false
                                  Preview:........;...............P...............RDM Localhost Service-aab96529-14af-4a48-8def-dfb9a374fcd8.....................RSA1................M...r....m....(.q..F|........o.@A..1.@hD..y.e...).w..^......#.5X;.$.G....%f.^t^...f...7.H..6 ..0 ........]............P...V.....>.3W..l.s.X..=(.....0.....0.F4..6.....yC...|...&]j.<.,X....I< K.l%uC......).r..4.....H..M^.!.nU.....Ge..V.........................z..O.......t..@..O.!..."}P....,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... ...&.G!..*..v=......n.c..n.....j............. ...'.\.&...r.f...}.e.].....R$..m.P...v^i.j.RW...p..]....0kh.;...... .Z.g.......hU.+1........0.]0i6...f:u a.m._...H.F..;-<..%0..a.:....c.?bRZ......j..j..u.#W...Y.x..0...O..F[.F.b...9...mA~...F.:&.%.8..F...2...'......b.u.I1.OL........|9..!["r...7.6 ..u..\........y....}].K.S9...+...S2P.#....'...A4s......$...S0$.....0......./BL;/.}EY...<.T.i..@@.%....w....)M;.xO.D%Dj.>.H.KF.:.O...)y.t..t.+...r.;ru....0`.P$.....8..P.|...
                                  Process:C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):3218944
                                  Entropy (8bit):6.344016161695555
                                  Encrypted:false
                                  SSDEEP:49152:6EA9P+bz2cHPcUb6HSb4SOEMkBeH7nQckO6bAGx7jXTV63338F:K92bz2Eb6pd7B6bAGx7M333K
                                  MD5:A5388235BBD3513D95A2A5C172A55680
                                  SHA1:E9BEB5AE74748344085EFC937D8B5ACFCF194E7B
                                  SHA-256:109DFA3633727AEE046973A9D59DFD493C4F4EDFA50BCBCC37999C4BF020550F
                                  SHA-512:68E6111FFEB231668914C66D2A09BC21F5FC616767284AF699919AE98B09082C0F89D567CF6CB33B087C5F0C59B4CE813836CD12EEC62E54AA10A584EC4FD970
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...(..`.................:,.........`F,......P,...@...........................2...........@......@....................-......p-.29....-.L.....................................................-......................y-.......-......................text.....,.......,................. ..`.itext...(... ,..*....,............. ..`.data........P,......>,.............@....bss.....y....,..........................idata..29...p-..:....,.............@....didata.......-.......-.............@....edata........-.......-.............@..@.tls....L.....-..........................rdata..].....-.......-.............@..@.rsrc...L.....-.......-.............@..@..............1.......0.............@..@........................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):236
                                  Entropy (8bit):5.232996410780511
                                  Encrypted:false
                                  SSDEEP:6:rFHGxQ61kH7HE9bwe9hc1axKsyGpeJ/nleB/H7HE9bkgjqY1axKs5v:r026ebH279hc14KsyNJ/nAB/bH2714Ks
                                  MD5:0A7F6C64EEF31DDB78A7EA184A1E526C
                                  SHA1:222BB7F9444AE8124EAE1F243DCEA4436A32D3AD
                                  SHA-256:FDCDD7E21E9CCEDACB8BFC166FD945F2CB08979682BD15E70A88BBAAC48714EA
                                  SHA-512:A9C38DE565354EAF5ADBB714A409056DAF73E7B2F1CCFE4D26D91C687351CE29A8DEA34DA73FC829F0852A5A5E0839A7E4D4AA68802607AA55974F538A5EA5E4
                                  Malicious:false
                                  Preview:FOR /F "tokens=*" %%A IN ('dir /B "%APPDATA%\Mozilla\Firefox\Profiles\*.default*"') DO set FIREFOX_PROFILE_DIR=%%A..certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "%APPDATA%\Mozilla\Firefox\Profiles\%FIREFOX_PROFILE_DIR%\." -i %1..
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:MS Windows icon resource - 5 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                  Category:dropped
                                  Size (bytes):99678
                                  Entropy (8bit):2.399880160860077
                                  Encrypted:false
                                  SSDEEP:384:ckeXhftI9DRRRQwXF6jI2PmdFUMUaaS8FPm0AjaP:ZexftsDRRRPSP
                                  MD5:C6B1F4998CA0242B1EB448C9694EFF20
                                  SHA1:D002E4878B16AFD33885553F3507BA2BC23E2179
                                  SHA-256:15C5C4D9FC4E4FCD10D130A558D4F89931340B40EB6FAECB0BCE1FB5CCCC1CAB
                                  SHA-512:902117AA14D95A3493D4DB341CE1DCBCF07D8ADA9DF8E4B29100C5FC7D8E732245D9512AE378C9BF2EAA2AEA9B371F089D0BCDD66B71B1EEF84D931874E8528A
                                  Malicious:false
                                  Preview:............ .h...V... .... .........00.... ..%..f...@@.... .(B...;........ .(...6}..(....... ..... .....@...................................................................................................................................................................................................................................................................................................................................................uW....Y....wY..y[..uW..uW..wZ....n....uW.....}`........Y..f..uW....Y...x.uW....p.uW....H...=.uW....I.uW.....uW....O...Y..f..uW..}a..x[...f.....uW.........vX..wY..uW...._..k..}a....R..f..uW....C....y\..{^..uW.........vX..x[..uW...i......}a...i...f..uW...n$...\.vX...i..uW...u...m".vY....[.uW..uW........M.uW...f...w1..w1..w1...N.....w1..w1...@........w1..z6.........w1...D...........................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PEM certificate
                                  Category:dropped
                                  Size (bytes):1452
                                  Entropy (8bit):5.903783238657704
                                  Encrypted:false
                                  SSDEEP:24:LrcM4PB8jfzTKpfU7Kjp9oBePz72nNk7Kj/Xno0fOIJLc/3j2KQo60xHBeBGNbSh:LrcXPCjfzmpfU7MoBePz72nNk7Ao0rLt
                                  MD5:5236FC957397FB2700DC025C29543CB5
                                  SHA1:18B222ED28C757645D6986E92E2317839A7A6C6D
                                  SHA-256:60DB73E7D89E86F33E26E735CD9D37BFC6A097790200E9A32A4AFE7B80CF3F4A
                                  SHA-512:F3A6DA5BA7130984EDCAF323A42BF3D5B99A6BFED01F4893F215918210F4573B287E2E3F26FA384D013BC2EE7C993592541B99614A0F733DC3FCEF3D1F5C10E7
                                  Malicious:false
                                  Preview:-----BEGIN CERTIFICATE-----.MIIEAzCCAusCFGsVDWHO9qoFY2Z2rm9tvBPBsr+yMA0GCSqGSIb3DQEBCwUAMIG8.MQswCQYDVQQGEwJDQTEQMA4GA1UECAwHT250YXJpbzERMA8GA1UEBwwIV2F0ZXJs.b28xGDAWBgNVBAoMD1JETSBDb3Jwb3JhdGlvbjEwMC4GA1UECwwnRGV2aWNlIC0g.Zm9yIEludGVybmFsIEludHJhbmV0IHVzZSBPbmx5MRgwFgYDVQQDDA9SRE0gRGV2.aWNlIFJvb3QxIjAgBgkqhkiG9w0BCQEWE3N1cHBvcnRAcmRtY29ycC5jb20wIBcN.MjExMTI2MDEyNjE4WhgPMjA1NjExMTcwMTI2MThaMIG8MQswCQYDVQQGEwJDQTEQ.MA4GA1UECAwHT250YXJpbzERMA8GA1UEBwwIV2F0ZXJsb28xGDAWBgNVBAoMD1JE.TSBDb3Jwb3JhdGlvbjEwMC4GA1UECwwnRGV2aWNlIC0gZm9yIEludGVybmFsIElu.dHJhbmV0IHVzZSBPbmx5MRgwFgYDVQQDDA9SRE0gRGV2aWNlIFJvb3QxIjAgBgkq.hkiG9w0BCQEWE3N1cHBvcnRAcmRtY29ycC5jb20wggEiMA0GCSqGSIb3DQEBAQUA.A4IBDwAwggEKAoIBAQDnTUJ19cJ2FQi1jQkDljQwn9Mr84flRNWJxaf4qfKLQZEY.0MiHk310N6jlfbVvAAIdm0elbAyIvY9wf6FHR3DYWZ/rMNAFgoZ4bLrBTsvRvtLx.NvKK8Zb4qz2lLgtFCgqfNjp4X1sjEWFtpQGBur8olbFAibgQ5cxJ6OaCaT8qiH37.s/yNVv2SnVL0BpUPPjmPpv/NOTPNHgQ/4ZVWjNYxk3jCEOYTYSmvHNwKTGvUZjSY.R8fEKMuraKWsX0zPoKvW8vX0a7UfExt0AlIzWogDEAblduX2gA/MxQfDN1ekvO
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):59664
                                  Entropy (8bit):5.552981290836808
                                  Encrypted:false
                                  SSDEEP:1536:/RQvLjWiALqLkHbp7m8GYT3WXs39i4zv:/Vz2Lk71m8Ge3WXs1
                                  MD5:5D077A0CDD077C014EEDB768FEB249BA
                                  SHA1:EA2C62D69A1F6B9D643FE16319EC7632C9533B3F
                                  SHA-256:8A830C48C4D78159DD80F4DAD81C0BEBBF9314710026B1A2EF0FFDDDCB24B83D
                                  SHA-512:71BF48DCB6916A810F63710968894B431357AA694AA169067F567CC82B8E4EE732F581AFB85B256E5C5A9D15A8B7B5746FA6A8B4127B273FEB5B0E03E91B607A
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Joe Sandbox View:
                                  • Filename: I3GSvcManager.exe, Detection: malicious, Browse
                                  • Filename: SecuriteInfo.com.BScope.Trojan.Downloader.22056.5372.exe, Detection: malicious, Browse
                                  • Filename: I3GSvcManager.exe, Detection: malicious, Browse
                                  • Filename: I3GSvcManager.exe, Detection: malicious, Browse
                                  • Filename: Kit_Carteurope_1.7.0.exe, Detection: malicious, Browse
                                  • Filename: I3GSvcManager.exe, Detection: malicious, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;.}h.}h.}hh.nh.}h.|h..}h...h.}h.{h.}h.}h..}hRich.}h................PE..L....B.5.....................l............................................... ..........................................................0W..................................................................@........................................text............................... ..`.data...............................@....rsrc...0W.......X..................@..@.0248...c,.5C....[.5P....[.5]......5i...b,.5u...........MSVCRT.dll.ADVAPI32.dll.KERNEL32.dll.CRYPT32.dll.CRYPTUI.dll.USER32.dll.........................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):143
                                  Entropy (8bit):4.304898083502664
                                  Encrypted:false
                                  SSDEEP:3:jWrxTAoV6VGa/IhgZGZNRRo/XOxTAoV6VGa/IhgZGZNRRoa:iRA3sa/0hA+A3sa/0hn
                                  MD5:E8C0E44371C4EDCC8908173BB91CA75C
                                  SHA1:5479F75580E366CBB2BB03B15C1518CEBDFC5CB0
                                  SHA-256:30AA7A6E165232DCA4B1B3ADF8C74BEA54A29686F8802C6DE92075EF53B5C1AA
                                  SHA-512:3AD2442EA854B2C7B1620A6E679ED36110A0F30023CF12552DE28C70E3E883F859C114D5A14CEC4280564AD280204FA549F7F5680CEFAFFF8A2857E16AC36B7D
                                  Malicious:false
                                  Preview:echo 1 | CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root..CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root....
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):103
                                  Entropy (8bit):4.493835447768373
                                  Encrypted:false
                                  SSDEEP:3:URZqeeLfCXdQFiFyy6HAe+WA6nWZmrXpn:Ui5LKuFiFr6HAe+WfWErZn
                                  MD5:9556062A739F56D168C1581A11192A17
                                  SHA1:81EE37E3990A004B9F50CBE99D512A5A5247AA90
                                  SHA-256:D151A50870503A2D394E3FFD65E2C0DAED043AE1E54C974E80AF811C7A60C78E
                                  SHA-512:57AB815C4F4F4F7C96D05A714F6CFEBD3DF47EC5C5E8363E07C3180E05BBECB03A472690EDE29BB8690B2E2C0570B5512338B13710E031DE8622D68667031D92
                                  Malicious:false
                                  Preview:/* Enable experimental Windows trust store support */..pref("security.enterprise_roots.enabled", true);
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):222208
                                  Entropy (8bit):6.697487951906348
                                  Encrypted:false
                                  SSDEEP:6144:ScTE2XtnPcWNo4eT4hs8LP71DRIUqqDL67PXGHrIrH:lTE2XtNrLP71Dyxqn6jI
                                  MD5:269BEB631B580C6D54DB45B5573B1DE5
                                  SHA1:64050C1159C2BCFC0E75DA407EF0098AD2DE17C8
                                  SHA-256:FFC7558A61A4E6546CF095BDEABEA19F05247A0DAA02DCA20EA3605E7FC62C77
                                  SHA-512:649CD40F3E02C2F2711F56AA21F39CCBDA9108143D4766A9728C9AD98F329D5F64F77090DF769C55B66AB48FB9AA4A380944EBE54F2C450F96CF76E5A6ADD31E
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Joe Sandbox View:
                                  • Filename: TouchEn_nxKey_32bit.exe, Detection: malicious, Browse
                                  • Filename: TZCRangerRemote_v2.2.2.3_Installer_x64.exe, Detection: malicious, Browse
                                  • Filename: SecuriteInfo.com.Trojan.Siggen21.30206.14092.30541.exe, Detection: malicious, Browse
                                  • Filename: SecuriteInfo.com.Trojan.Siggen21.30206.14092.30541.exe, Detection: malicious, Browse
                                  • Filename: TouchEn_nxKey_Installer_32bit.exe, Detection: malicious, Browse
                                  • Filename: TouchEn_nxKey_Installer_32bit.exe, Detection: malicious, Browse
                                  • Filename: TouchEn_nxKey_Installer_32bit.exe, Detection: malicious, Browse
                                  • Filename: SecuriteInfo.com.Win32.Malware.KillAV.6KOMSE@gen.22946.22832.exe, Detection: malicious, Browse
                                  • Filename: SecuriteInfo.com.Win32.Malware.KillAV.6KOMSE@gen.22946.22832.exe, Detection: malicious, Browse
                                  • Filename: SCWSConSetup_1.0.1.65_ver.exe, Detection: malicious, Browse
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........[x.5+.5+.5+..+.5+..+.5+..+.5+..+.5+.4+..5+..+.5+..+.5+..+.5+..+.5+Rich.5+................PE..L....A.O...........!.....\...J.......f.......p............................................@..........................U..O...,M..x...............................,...................................hL..@............p..x............................text....[.......\.................. ..`.rdata.......p.......`..............@..@.data....F...`.......F..............@....rsrc................H..............@..@.reloc..x............L..............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):2685
                                  Entropy (8bit):7.881499470740637
                                  Encrypted:false
                                  SSDEEP:48:R5t7MR3RzOzFv1Zbiyp8wST7kLxC7XPYgT7a0FSpczbVn0q+dBzl:N7MzCpjiyp8wNczPYSe8SuR0/BJ
                                  MD5:CB24F524AB36239CDA47EBEB8CBD6EDB
                                  SHA1:4CDC6226288F2D5868C48457F124569ECB91608F
                                  SHA-256:7EE7F861AF655E38B08FC3112E0B19C518673251478B2DD44C2580659FE402F0
                                  SHA-512:C1BA2485C5900BBE5B0A7AEEA8856EE77DE8D1544F2F71EFFCA80F3E8DD49B01C309AD3163740263F027AB66ECBDB679B8609AC601D33F98670E406C4C6604B0
                                  Malicious:false
                                  Preview:0..y...0..?..*.H.........0...,0..(0.....*.H..........0......0.....*.H......0...*.H.......0...=......[..........R^b...o...VY..<...".NR.FTS[Fd.W.8..= rY.......p./.^..1..0U/...i....[Q.@.KLPg.....<...m.....:/Z.....O7}....y5.Y..\..).W.E.G.....#.$._.O.......,.t..+:.....wX.....G!RYM.1i..........G!.S.uX.].S30.M.......Y.*d..':......{Z.^W....&..n....A.4.>...F.:A ...ah..m.I..b....s:.........6.y.xH3t!0.dT.N)...nE.......~r..!......=..YQ..n..nlr.z[*..0.P.\E_...4...U..y:.._56O\C..4.5&.J...+.... /..............^..l3..+_:....#.<,........f,.L/".'...QA...1J'9>...........xM..Gz...Ih.4F.R.q...%.J.......oTS.W6C..L#...K\.r7...de.B..)Go...I..w...5..B.Z.s1KmU...Y*.x).......2gp@..uI..#......3.Hv.5.?..-X.a.........W....=B>...]:..H..c...B.......czdNc.v..?..xP..R...I.(T...CpI.<.H>.a.....R..}R.._v..w....L...X..4=....nX.xn....mn.yfG...lV....xE.$...._.-.....P..Xq3Y)=..yvD........7..2.3...O...N.55h..f.."y.h.`.~M...E..B....l~~.S|... 4.h...3..G.o.G.;.*`.Tr..M..8.B.....+u.#C.....
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):97792
                                  Entropy (8bit):6.240650542976671
                                  Encrypted:false
                                  SSDEEP:1536:xtTRGG7+CF7k9QTPHkis9rGDE9tJ7kdsolb5XpIKz1TpNs6IRcgAGEFDGSs1f8b6:xGG6CF7k9QbHkCE9tJ7kdsW5Xh5s6IRV
                                  MD5:A5C670EDF4411BF7F132F4280026137B
                                  SHA1:C0E3CBDDE7D3CEBF41A193EECA96A11CE2B6DA58
                                  SHA-256:ABA2732C7A016730E94E645DD04E8FAFCC173FC2E5E2AAC01A1C0C66EAD1983E
                                  SHA-512:ACFCDE89A968D81363AE1CD599A6A362B047AE207722FEA8541577AC609BC5FEFB2231ED946E13F0B4B3BCD56B947C13837C1B9E360D521EC7D580BEFCBB0F46
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r...6.k.6.k.6.k.?...4.k.Y...7.k.Y...4.k.Y...;.k.6.j..k.Y.....k.Y..7.k.Y..7.k.Y...7.k.Rich6.k.........................PE..L....A.O...........!.........j...............0............................................@.........................Pj..v...\N.......................................................................M..@............0...............................text............................... ..`.rdata...S...0...T..................@..@.data...h............l..............@....rsrc................n..............@..@.reloc...............r..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):90
                                  Entropy (8bit):4.4385634049235
                                  Encrypted:false
                                  SSDEEP:3:iDVDuE8Lxm0wf9sDuE8LzLpFw6XFn:iDVDopDoNjXF
                                  MD5:30573ACFC9586271A3F800A10C284479
                                  SHA1:9CC1A1329258379698A04C33DC5D62E9CE8E06FD
                                  SHA-256:30B9CF8F9760BCD38617A3878D43FC19E981C6DD13D6400C2A19D2ECAB746CB5
                                  SHA-512:4A6DF4E50D8C04AD9E65A9D183D4C8B723FCB50E1E786018010A33CEE2B4F73296045864FFFB526D887579BEC8EC5C4CA5353127FB07E632B18C5B4684719015
                                  Malicious:false
                                  Preview:pref("general.config.obscure_value", 0);..pref("general.config.filename", "umbrella.cfg");
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):236
                                  Entropy (8bit):5.232996410780511
                                  Encrypted:false
                                  SSDEEP:6:rFHGxQ61kH7HE9bwe9hc1axKsyGpeJ/nleB/H7HE9bkgjqY1axKs5v:r026ebH279hc14KsyNJ/nAB/bH2714Ks
                                  MD5:0A7F6C64EEF31DDB78A7EA184A1E526C
                                  SHA1:222BB7F9444AE8124EAE1F243DCEA4436A32D3AD
                                  SHA-256:FDCDD7E21E9CCEDACB8BFC166FD945F2CB08979682BD15E70A88BBAAC48714EA
                                  SHA-512:A9C38DE565354EAF5ADBB714A409056DAF73E7B2F1CCFE4D26D91C687351CE29A8DEA34DA73FC829F0852A5A5E0839A7E4D4AA68802607AA55974F538A5EA5E4
                                  Malicious:false
                                  Preview:FOR /F "tokens=*" %%A IN ('dir /B "%APPDATA%\Mozilla\Firefox\Profiles\*.default*"') DO set FIREFOX_PROFILE_DIR=%%A..certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "%APPDATA%\Mozilla\Firefox\Profiles\%FIREFOX_PROFILE_DIR%\." -i %1..
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):93696
                                  Entropy (8bit):6.44977499578729
                                  Encrypted:false
                                  SSDEEP:1536:W3Hq5zbjpPQ4Y0epuuwCbDz5xAFKL8kycL7:gHQxPQfGuz5uFKL8kyu7
                                  MD5:C26E940B474728E728CAFE5912BA418A
                                  SHA1:7256E378A419F8D87DE71835E6AD12FAADAAAF73
                                  SHA-256:1AF1AC51A92B36DE8D85D1F572369815404912908C3A489A6CD7CA2350C2A93D
                                  SHA-512:BD8673FACD416C8F2EB9A45C4DEEF50E53D0BC41E6B3941FC20CDA8E2D88267205526DADB44BD89869BD333BF7D6F8DB589C95997E1F3322F7A66A09D562B1DF
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................`....C.k.....m.....X.....o...........Y.....h.....i.....n....Rich...........PE..L....A.O...........!................p.....................................................@..........................O.......F..x...................................................................0F..@...............l............................text...~........................... ..`.rdata..............................@..@.data........p.......Z..............@....rsrc................\..............@..@.reloc...............`..............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):14336
                                  Entropy (8bit):5.794541181301596
                                  Encrypted:false
                                  SSDEEP:192:y39iNAtUyE7ioVwAFzuh+pOWo1v26wJMnnnLIQBIc3X7PVlD6QHS6CV+:mRUyZoVwAFzusie6wcZxrPVlpHS6c+
                                  MD5:1FAE68B740F18290B98B2F9E23313CC2
                                  SHA1:FA3545DC8DB38B3B27F1009E1D61DC2949DF3878
                                  SHA-256:751C2156DC00525668DD990D99F7F61C257951C3FAD01C0EE6359FCDFF69F933
                                  SHA-512:5386AAD83C76C625E2D64439B2B25BDA8D0F8B1EB9344B58306883B66675D1F1E98E3189C1BC29CD4B2C98A9D4A594761488AAE04D3748BBA5775A51425B11EC
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......vx..2...2...2...;aS.0...]o^.3...]ok.0...]o\.7...2.......]oj.(...]o[.3...]oZ.3...]o].3...Rich2...................PE..L...oA.O...........!.................'.......0...............................p............@......................... 8.......3..P....P.......................`.......................................3..@............0...............................text...T........................... ..`.rdata.......0......."..............@..@.data........@......................@....rsrc........P.......0..............@..@.reloc.......`.......4..............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):108544
                                  Entropy (8bit):6.45689405407938
                                  Encrypted:false
                                  SSDEEP:3072:ES2ipxnUGhrFxZHkZvmYHG+iI2iV6nu+ZfX6AKVqzzF+:ES2ipxUSwv/m+1rAKVqz5
                                  MD5:051652BA7CA426846E936BC5AA3F39F3
                                  SHA1:0012007876DDE3A2D764249AD86BC428300FE91E
                                  SHA-256:8ECA993570FA55E8FE8F417143EEA8128A58472E23074CBD2E6AF4D3BB0F0D9A
                                  SHA-512:005B22BD5A4CCA9930C5ECA95AF01FC034BB496F4E599CAC3F20B0B9CE0957B4DB685B8E47977E5B289DC5CF1C8A81F4DD7434D0347E41D008E2C8F7F12006F0
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........D[...[...[...R...Y.......S...4...Z...4...Y...4...P...[......4./.z...4...Z...4...Z...4...Z...Rich[...........................PE..L....A.O...........!.....n...:.......w....................................................@............................................................................................................@...............D............................text....l.......n.................. ..`.rdata...............r..............@..@.data...............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):56
                                  Entropy (8bit):4.503434386188784
                                  Encrypted:false
                                  SSDEEP:3:RBkAe+WA6nWZmrXpn:rkAe+WfWErZn
                                  MD5:E40A3D559E4B85251943E071CD036D90
                                  SHA1:10FC58DF075108C912589F7954244A807776A0FB
                                  SHA-256:E179CA82C741D7D4842E42BC339C0E2C9BEFA1A5EFFE33D69D6821B3121FECCA
                                  SHA-512:07CC337D7EB364FC78B0B36ACBE9F89B85D932B3D616B8EDFB5F12214ECD17853ECAC4725CAE929CCE8A803D868FC3F5A5AD4D394554BB4783B0CCAFEA981959
                                  Malicious:false
                                  Preview://..lockPref("security.enterprise_roots.enabled", true);
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PEM certificate
                                  Category:dropped
                                  Size (bytes):1452
                                  Entropy (8bit):5.903783238657704
                                  Encrypted:false
                                  SSDEEP:24:LrcM4PB8jfzTKpfU7Kjp9oBePz72nNk7Kj/Xno0fOIJLc/3j2KQo60xHBeBGNbSh:LrcXPCjfzmpfU7MoBePz72nNk7Ao0rLt
                                  MD5:5236FC957397FB2700DC025C29543CB5
                                  SHA1:18B222ED28C757645D6986E92E2317839A7A6C6D
                                  SHA-256:60DB73E7D89E86F33E26E735CD9D37BFC6A097790200E9A32A4AFE7B80CF3F4A
                                  SHA-512:F3A6DA5BA7130984EDCAF323A42BF3D5B99A6BFED01F4893F215918210F4573B287E2E3F26FA384D013BC2EE7C993592541B99614A0F733DC3FCEF3D1F5C10E7
                                  Malicious:false
                                  Preview:-----BEGIN CERTIFICATE-----.MIIEAzCCAusCFGsVDWHO9qoFY2Z2rm9tvBPBsr+yMA0GCSqGSIb3DQEBCwUAMIG8.MQswCQYDVQQGEwJDQTEQMA4GA1UECAwHT250YXJpbzERMA8GA1UEBwwIV2F0ZXJs.b28xGDAWBgNVBAoMD1JETSBDb3Jwb3JhdGlvbjEwMC4GA1UECwwnRGV2aWNlIC0g.Zm9yIEludGVybmFsIEludHJhbmV0IHVzZSBPbmx5MRgwFgYDVQQDDA9SRE0gRGV2.aWNlIFJvb3QxIjAgBgkqhkiG9w0BCQEWE3N1cHBvcnRAcmRtY29ycC5jb20wIBcN.MjExMTI2MDEyNjE4WhgPMjA1NjExMTcwMTI2MThaMIG8MQswCQYDVQQGEwJDQTEQ.MA4GA1UECAwHT250YXJpbzERMA8GA1UEBwwIV2F0ZXJsb28xGDAWBgNVBAoMD1JE.TSBDb3Jwb3JhdGlvbjEwMC4GA1UECwwnRGV2aWNlIC0gZm9yIEludGVybmFsIElu.dHJhbmV0IHVzZSBPbmx5MRgwFgYDVQQDDA9SRE0gRGV2aWNlIFJvb3QxIjAgBgkq.hkiG9w0BCQEWE3N1cHBvcnRAcmRtY29ycC5jb20wggEiMA0GCSqGSIb3DQEBAQUA.A4IBDwAwggEKAoIBAQDnTUJ19cJ2FQi1jQkDljQwn9Mr84flRNWJxaf4qfKLQZEY.0MiHk310N6jlfbVvAAIdm0elbAyIvY9wf6FHR3DYWZ/rMNAFgoZ4bLrBTsvRvtLx.NvKK8Zb4qz2lLgtFCgqfNjp4X1sjEWFtpQGBur8olbFAibgQ5cxJ6OaCaT8qiH37.s/yNVv2SnVL0BpUPPjmPpv/NOTPNHgQ/4ZVWjNYxk3jCEOYTYSmvHNwKTGvUZjSY.R8fEKMuraKWsX0zPoKvW8vX0a7UfExt0AlIzWogDEAblduX2gA/MxQfDN1ekvO
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):190976
                                  Entropy (8bit):6.662915165682162
                                  Encrypted:false
                                  SSDEEP:3072:82ya/vPWqodwFYAjkiV6vnjBr/WPUShgk04YZEnhacoAX8+FeHbnGmgjZzpTBfRP:j7JoiVGj+hIWNmKFpTBJ8B
                                  MD5:717DBDF0E1F616EA8A038259E273C530
                                  SHA1:926CE8EC8F79B62202ED487C5FB0C3E1A18F5F70
                                  SHA-256:E3227EA4C39F5B44F685EEA13D9F6663945E46B12CABE5D29DAEF28B6EEF1A9B
                                  SHA-512:C09BF38AC93C350DFD0638BEEDD40FBCC9435A06B0013D214F57B181C1B4292E4B8A8310DB2DB48200BCFED872BC656EA92A207ACB6F7B344E3F134226C2AB3F
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 3%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Af......................jq......jq=.....jq..............jq<.5...jq......jq......jq......Rich............................PE..L....A.O...........!.................".......0............................... ............@.........................p...j.......................................l......................................@............0...............................text............................... ..`.rdata......0......................@..@.data...<...........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):423936
                                  Entropy (8bit):6.751461394308889
                                  Encrypted:false
                                  SSDEEP:6144:Cf41DoFqNI3Cm39XWYJkW07RlqHYOE1o2exosU8iZEJKvncrghAvLWDKnADA3/AF:DD76rrQ7ngYLo2MliPSghmLYk3/n
                                  MD5:B58848A28A1EFB85677E344DB1FD67E6
                                  SHA1:DAD48E2B2B3B936EFC15AC2C5F9099B7A1749976
                                  SHA-256:00DB98AB4D50E9B26ECD193BFAD6569E1DD395DB14246F8C233FEBBA93965F7A
                                  SHA-512:762B3BD7F1F1A5C3ACCDE8C36406B9BEADD4270C570EB95A05935C1F7731513938AE5E99950C648B1EACDD2A85F002319B78B7E4EA9577C72335A2FA54796B13
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,J..h+.Yh+.Yh+.YaS0Yj+.Y.]?Yk+.Yh+.Y&+.Y.]=Yd+.Y.].Yj+.Y.].Yf+.Y.]8Yi+.Y.]>Yi+.YRichh+.Y........................PE..L....A.O...........!......................................................................@..........................J.......C..<...............................@&..................................@B..@...............@............................text............................... ..`.rdata..............................@..@.data........`.......D..............@....reloc..Z(.......*...N..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):172544
                                  Entropy (8bit):6.496240878001019
                                  Encrypted:false
                                  SSDEEP:3072:KfHTwBGo4uYvGG3byHhQNP4IP/zsu9zvKwMNJ+Z/9tRpK:KsGTudG3GHhMz3SNY9R
                                  MD5:2AB31C9401870ADB4E9D88B5A6837ABF
                                  SHA1:4F0FDD699E63F614D79ED6E47EF61938117D3B7A
                                  SHA-256:22ECECE561510F77B100CFF8109E5ED492C34707B7B14E0774AAA9CA813DE4AD
                                  SHA-512:BC58C4DA15E902351F1F161E9D8C1EE4D10ACEB5EDA7DEF4B4454CADF4CD9F437118BA9D63F25F4F0A5694E9D34A4DEF33D40AD51EFB1CDEBB6F02A81C481871
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.e./.6./.6./.6.W.6./.6;a.6./.6.Y.6./.6.Y36./.6.Y.6./.6./.61/.6.Y26./.6.Y.6./.6.Y.6./.6.Y.6./.6Rich./.6................PE..L....A.O...........!.....*...x.......3.......@............................................@.................................<...................................|...................................x...@............@...............................text....(.......*.................. ..`.rdata...O...@...P..................@..@.data................~..............@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):199680
                                  Entropy (8bit):6.678065290017203
                                  Encrypted:false
                                  SSDEEP:3072:/zcwXcVnDhH5YI6KkEK7207EmrRelzafK+AnF4xH6dVHwpXpE92jDBSRYO6s0eEw:TUDF5YTyBJuF6DHwpXpfSRYO6Z
                                  MD5:6E84AF2875700285309DD29294365C6A
                                  SHA1:FC3CB3B2A704250FC36010E2AB495CDC5E7378A9
                                  SHA-256:1C158E680749E642E55F721F60A71314E26E03E785CD92E560BF650B83C4C3C8
                                  SHA-512:0ADD9479B2FD631BAFC617C787BCA331E915EDC6A29DD72269B6A24490EC1C85E677698E07944F5FF3BD8D849D3D20ACE61A194A044C697FEFCF992C6F05E747
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Wp.6...6...6..-x...6...@...6...@...6...@...6...N...6...6..m6...@...6...@...6...@...6...@...6..Rich.6..........PE..L...lA.O...........!.....^...........h.......p...............................p............@..............................+..<...x....0.......................@..."..................................X...@............p..`............................text....].......^.................. ..`.rdata...s...p...t...b..............@..@.data...P(..........................@....tls......... ......................@....rsrc........0......................@..@.reloc...&...@...(..................@..B................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):143
                                  Entropy (8bit):4.304898083502664
                                  Encrypted:false
                                  SSDEEP:3:jWrxTAoV6VGa/IhgZGZNRRo/XOxTAoV6VGa/IhgZGZNRRoa:iRA3sa/0hA+A3sa/0hn
                                  MD5:E8C0E44371C4EDCC8908173BB91CA75C
                                  SHA1:5479F75580E366CBB2BB03B15C1518CEBDFC5CB0
                                  SHA-256:30AA7A6E165232DCA4B1B3ADF8C74BEA54A29686F8802C6DE92075EF53B5C1AA
                                  SHA-512:3AD2442EA854B2C7B1620A6E679ED36110A0F30023CF12552DE28C70E3E883F859C114D5A14CEC4280564AD280204FA549F7F5680CEFAFFF8A2857E16AC36B7D
                                  Malicious:false
                                  Preview:echo 1 | CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root..CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root....
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                  Category:dropped
                                  Size (bytes):59664
                                  Entropy (8bit):5.552981290836808
                                  Encrypted:false
                                  SSDEEP:1536:/RQvLjWiALqLkHbp7m8GYT3WXs39i4zv:/Vz2Lk71m8Ge3WXs1
                                  MD5:5D077A0CDD077C014EEDB768FEB249BA
                                  SHA1:EA2C62D69A1F6B9D643FE16319EC7632C9533B3F
                                  SHA-256:8A830C48C4D78159DD80F4DAD81C0BEBBF9314710026B1A2EF0FFDDDCB24B83D
                                  SHA-512:71BF48DCB6916A810F63710968894B431357AA694AA169067F567CC82B8E4EE732F581AFB85B256E5C5A9D15A8B7B5746FA6A8B4127B273FEB5B0E03E91B607A
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;.}h.}h.}hh.nh.}h.|h..}h...h.}h.{h.}h.}h..}hRich.}h................PE..L....B.5.....................l............................................... ..........................................................0W..................................................................@........................................text............................... ..`.data...............................@....rsrc...0W.......X..................@..@.0248...c,.5C....[.5P....[.5]......5i...b,.5u...........MSVCRT.dll.ADVAPI32.dll.KERNEL32.dll.CRYPT32.dll.CRYPTUI.dll.USER32.dll.........................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):798720
                                  Entropy (8bit):6.523188898405281
                                  Encrypted:false
                                  SSDEEP:24576:uN/cDx/LcwkjTGAq8f54Y6ifuGJk3c8IXRvg/W68IALE/ZcaFL4FzS17BAw:6ci+m9LEazS1
                                  MD5:A1C4628D184B6AB25550B1CE74F44792
                                  SHA1:C2C447FD2FDA68C0EC44B3529A2550D2E2A8C3BC
                                  SHA-256:3F997D3F1674DE9FD119F275638861BC229352F12C70536D8C83A70FCC370847
                                  SHA-512:07737AC24C91645D9B4D376327B84CB0B470CECBAD60920D7EE0E9B11EF4EEB8EE68FB38BF74B5D1F8817D104CECC65E461950242D940E8FF9CA64CE9D3FFBB7
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........^..............T.......Y......l.......[..............m.T.....\.......].......Z.....Rich............PE..L....A.O...........!.....2..........V;.......P...............................p............@..........................z..zb...Z..................................TS..................................0Z..@............P...............................text...^0.......2.................. ..`.rdata.......P.......6..............@..@.data...............................@....rsrc...............................@..@.reloc...\.......^..................@..B................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):103
                                  Entropy (8bit):4.493835447768373
                                  Encrypted:false
                                  SSDEEP:3:URZqeeLfCXdQFiFyy6HAe+WA6nWZmrXpn:Ui5LKuFiFr6HAe+WfWErZn
                                  MD5:9556062A739F56D168C1581A11192A17
                                  SHA1:81EE37E3990A004B9F50CBE99D512A5A5247AA90
                                  SHA-256:D151A50870503A2D394E3FFD65E2C0DAED043AE1E54C974E80AF811C7A60C78E
                                  SHA-512:57AB815C4F4F4F7C96D05A714F6CFEBD3DF47EC5C5E8363E07C3180E05BBECB03A472690EDE29BB8690B2E2C0570B5512338B13710E031DE8622D68667031D92
                                  Malicious:false
                                  Preview:/* Enable experimental Windows trust store support */..pref("security.enterprise_roots.enabled", true);
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):370176
                                  Entropy (8bit):6.863300763286356
                                  Encrypted:false
                                  SSDEEP:6144:eeP90QTcdMTWfpUwFygo5zUM38ME/Hs3nXHkUX:eA/TcWTWfpf0gmzY03nXHkUX
                                  MD5:D1243817A1B22B855DE0852CF5B53BF5
                                  SHA1:C64F4851A2FCFE8D1E4A5B5743498870B676755E
                                  SHA-256:93E99CFBA00348BE3A102DC9F41ACD39BBA91D7F4E0149A9EA6C53FCC50ADAEE
                                  SHA-512:59ABD87F8DA58F0F4D8D3919A84B2E4FA853AA0E76DBFEA3BC011E21267909ED7C3BB42A714F030773767329A8D3DA0810E789AB5A061BC0E4452159849C4CC2
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......??fs{^. {^. {^. r&. y^. .(. z^. .(. y^. .(. r^. {^. C^. .(. R^. .(. z^. .(. z^. .(. z^. Rich{^. ................PE..L....A.O...........!......................................................................@..........................6..P...L1..x...............................t,...................................0..@............................................text............................... ..`.rdata..07.......8..................@..@.data....T...@...R... ..............@....rsrc................r..............@..@.reloc.../.......0...v..............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):222208
                                  Entropy (8bit):6.697487951906348
                                  Encrypted:false
                                  SSDEEP:6144:ScTE2XtnPcWNo4eT4hs8LP71DRIUqqDL67PXGHrIrH:lTE2XtNrLP71Dyxqn6jI
                                  MD5:269BEB631B580C6D54DB45B5573B1DE5
                                  SHA1:64050C1159C2BCFC0E75DA407EF0098AD2DE17C8
                                  SHA-256:FFC7558A61A4E6546CF095BDEABEA19F05247A0DAA02DCA20EA3605E7FC62C77
                                  SHA-512:649CD40F3E02C2F2711F56AA21F39CCBDA9108143D4766A9728C9AD98F329D5F64F77090DF769C55B66AB48FB9AA4A380944EBE54F2C450F96CF76E5A6ADD31E
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........[x.5+.5+.5+..+.5+..+.5+..+.5+..+.5+.4+..5+..+.5+..+.5+..+.5+..+.5+Rich.5+................PE..L....A.O...........!.....\...J.......f.......p............................................@..........................U..O...,M..x...............................,...................................hL..@............p..x............................text....[.......\.................. ..`.rdata.......p.......`..............@..@.data....F...`.......F..............@....rsrc................H..............@..@.reloc..x............L..............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:MS Windows icon resource - 5 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
                                  Category:dropped
                                  Size (bytes):99678
                                  Entropy (8bit):2.399880160860077
                                  Encrypted:false
                                  SSDEEP:384:ckeXhftI9DRRRQwXF6jI2PmdFUMUaaS8FPm0AjaP:ZexftsDRRRPSP
                                  MD5:C6B1F4998CA0242B1EB448C9694EFF20
                                  SHA1:D002E4878B16AFD33885553F3507BA2BC23E2179
                                  SHA-256:15C5C4D9FC4E4FCD10D130A558D4F89931340B40EB6FAECB0BCE1FB5CCCC1CAB
                                  SHA-512:902117AA14D95A3493D4DB341CE1DCBCF07D8ADA9DF8E4B29100C5FC7D8E732245D9512AE378C9BF2EAA2AEA9B371F089D0BCDD66B71B1EEF84D931874E8528A
                                  Malicious:false
                                  Preview:............ .h...V... .... .........00.... ..%..f...@@.... .(B...;........ .(...6}..(....... ..... .....@...................................................................................................................................................................................................................................................................................................................................................uW....Y....wY..y[..uW..uW..wZ....n....uW.....}`........Y..f..uW....Y...x.uW....p.uW....H...=.uW....I.uW.....uW....O...Y..f..uW..}a..x[...f.....uW.........vX..wY..uW...._..k..}a....R..f..uW....C....y\..{^..uW.........vX..x[..uW...i......}a...i...f..uW...n$...\.vX...i..uW...u...m".vY....[.uW..uW........M.uW...f...w1..w1..w1...N.....w1..w1...@........w1..z6.........w1...D...........................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):12288
                                  Entropy (8bit):5.576295270591411
                                  Encrypted:false
                                  SSDEEP:192:y8/u6mEWZYr/YDmJrFirLPAxHU413X7PVlD63YlFfP:1/uHE6Yr/Y+h0AlU4prPVlZlFfP
                                  MD5:9AE76DB13972553A5DE5BDD07B1B654D
                                  SHA1:0C4508EB6F13B9B178237CCC4DA759BFF10AF658
                                  SHA-256:38A906373419501966DAF6EC19CA2F8DB7B29609128AE5CB424D2AA511652C29
                                  SHA-512:DB6FD98A2B27DD7622F10491BBA08793D26AB59016D6862168AAD278644F737DDDBD312A690DED5091D5E999DC3C3518FD95B200124BE8349829E5CE6685CF4B
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................g......j......_......h............^......o......n......i....Rich............................PE..L...mA.O...........!.................".......0...............................p............@.........................P6......l2..P....P.......................`.......................................1..@............0...............................text............................... ..`.rdata..R....0......................@..@.data........@.......&..............@....rsrc........P.......(..............@..@.reloc..(....`.......,..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):199680
                                  Entropy (8bit):6.678065290017203
                                  Encrypted:false
                                  SSDEEP:3072:/zcwXcVnDhH5YI6KkEK7207EmrRelzafK+AnF4xH6dVHwpXpE92jDBSRYO6s0eEw:TUDF5YTyBJuF6DHwpXpfSRYO6Z
                                  MD5:6E84AF2875700285309DD29294365C6A
                                  SHA1:FC3CB3B2A704250FC36010E2AB495CDC5E7378A9
                                  SHA-256:1C158E680749E642E55F721F60A71314E26E03E785CD92E560BF650B83C4C3C8
                                  SHA-512:0ADD9479B2FD631BAFC617C787BCA331E915EDC6A29DD72269B6A24490EC1C85E677698E07944F5FF3BD8D849D3D20ACE61A194A044C697FEFCF992C6F05E747
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Wp.6...6...6..-x...6...@...6...@...6...@...6...N...6...6..m6...@...6...@...6...@...6...@...6..Rich.6..........PE..L...lA.O...........!.....^...........h.......p...............................p............@..............................+..<...x....0.......................@..."..................................X...@............p..`............................text....].......^.................. ..`.rdata...s...p...t...b..............@..@.data...P(..........................@....tls......... ......................@....rsrc........0......................@..@.reloc...&...@...(..................@..B................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):14336
                                  Entropy (8bit):5.794541181301596
                                  Encrypted:false
                                  SSDEEP:192:y39iNAtUyE7ioVwAFzuh+pOWo1v26wJMnnnLIQBIc3X7PVlD6QHS6CV+:mRUyZoVwAFzusie6wcZxrPVlpHS6c+
                                  MD5:1FAE68B740F18290B98B2F9E23313CC2
                                  SHA1:FA3545DC8DB38B3B27F1009E1D61DC2949DF3878
                                  SHA-256:751C2156DC00525668DD990D99F7F61C257951C3FAD01C0EE6359FCDFF69F933
                                  SHA-512:5386AAD83C76C625E2D64439B2B25BDA8D0F8B1EB9344B58306883B66675D1F1E98E3189C1BC29CD4B2C98A9D4A594761488AAE04D3748BBA5775A51425B11EC
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......vx..2...2...2...;aS.0...]o^.3...]ok.0...]o\.7...2.......]oj.(...]o[.3...]oZ.3...]o].3...Rich2...................PE..L...oA.O...........!.................'.......0...............................p............@......................... 8.......3..P....P.......................`.......................................3..@............0...............................text...T........................... ..`.rdata.......0......."..............@..@.data........@......................@....rsrc........P.......0..............@..@.reloc.......`.......4..............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):12288
                                  Entropy (8bit):5.576295270591411
                                  Encrypted:false
                                  SSDEEP:192:y8/u6mEWZYr/YDmJrFirLPAxHU413X7PVlD63YlFfP:1/uHE6Yr/Y+h0AlU4prPVlZlFfP
                                  MD5:9AE76DB13972553A5DE5BDD07B1B654D
                                  SHA1:0C4508EB6F13B9B178237CCC4DA759BFF10AF658
                                  SHA-256:38A906373419501966DAF6EC19CA2F8DB7B29609128AE5CB424D2AA511652C29
                                  SHA-512:DB6FD98A2B27DD7622F10491BBA08793D26AB59016D6862168AAD278644F737DDDBD312A690DED5091D5E999DC3C3518FD95B200124BE8349829E5CE6685CF4B
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................g......j......_......h............^......o......n......i....Rich............................PE..L...mA.O...........!.................".......0...............................p............@.........................P6......l2..P....P.......................`.......................................1..@............0...............................text............................... ..`.rdata..R....0......................@..@.data........@.......&..............@....rsrc........P.......(..............@..@.reloc..(....`.......,..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):90
                                  Entropy (8bit):4.4385634049235
                                  Encrypted:false
                                  SSDEEP:3:iDVDuE8Lxm0wf9sDuE8LzLpFw6XFn:iDVDopDoNjXF
                                  MD5:30573ACFC9586271A3F800A10C284479
                                  SHA1:9CC1A1329258379698A04C33DC5D62E9CE8E06FD
                                  SHA-256:30B9CF8F9760BCD38617A3878D43FC19E981C6DD13D6400C2A19D2ECAB746CB5
                                  SHA-512:4A6DF4E50D8C04AD9E65A9D183D4C8B723FCB50E1E786018010A33CEE2B4F73296045864FFFB526D887579BEC8EC5C4CA5353127FB07E632B18C5B4684719015
                                  Malicious:false
                                  Preview:pref("general.config.obscure_value", 0);..pref("general.config.filename", "umbrella.cfg");
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):798720
                                  Entropy (8bit):6.523188898405281
                                  Encrypted:false
                                  SSDEEP:24576:uN/cDx/LcwkjTGAq8f54Y6ifuGJk3c8IXRvg/W68IALE/ZcaFL4FzS17BAw:6ci+m9LEazS1
                                  MD5:A1C4628D184B6AB25550B1CE74F44792
                                  SHA1:C2C447FD2FDA68C0EC44B3529A2550D2E2A8C3BC
                                  SHA-256:3F997D3F1674DE9FD119F275638861BC229352F12C70536D8C83A70FCC370847
                                  SHA-512:07737AC24C91645D9B4D376327B84CB0B470CECBAD60920D7EE0E9B11EF4EEB8EE68FB38BF74B5D1F8817D104CECC65E461950242D940E8FF9CA64CE9D3FFBB7
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........^..............T.......Y......l.......[..............m.T.....\.......].......Z.....Rich............PE..L....A.O...........!.....2..........V;.......P...............................p............@..........................z..zb...Z..................................TS..................................0Z..@............P...............................text...^0.......2.................. ..`.rdata.......P.......6..............@..@.data...............................@....rsrc...............................@..@.reloc...\.......^..................@..B................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):370176
                                  Entropy (8bit):6.863300763286356
                                  Encrypted:false
                                  SSDEEP:6144:eeP90QTcdMTWfpUwFygo5zUM38ME/Hs3nXHkUX:eA/TcWTWfpf0gmzY03nXHkUX
                                  MD5:D1243817A1B22B855DE0852CF5B53BF5
                                  SHA1:C64F4851A2FCFE8D1E4A5B5743498870B676755E
                                  SHA-256:93E99CFBA00348BE3A102DC9F41ACD39BBA91D7F4E0149A9EA6C53FCC50ADAEE
                                  SHA-512:59ABD87F8DA58F0F4D8D3919A84B2E4FA853AA0E76DBFEA3BC011E21267909ED7C3BB42A714F030773767329A8D3DA0810E789AB5A061BC0E4452159849C4CC2
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......??fs{^. {^. {^. r&. y^. .(. z^. .(. y^. .(. r^. {^. C^. .(. R^. .(. z^. .(. z^. .(. z^. Rich{^. ................PE..L....A.O...........!......................................................................@..........................6..P...L1..x...............................t,...................................0..@............................................text............................... ..`.rdata..07.......8..................@..@.data....T...@...R... ..............@....rsrc................r..............@..@.reloc.../.......0...v..............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):108544
                                  Entropy (8bit):6.45689405407938
                                  Encrypted:false
                                  SSDEEP:3072:ES2ipxnUGhrFxZHkZvmYHG+iI2iV6nu+ZfX6AKVqzzF+:ES2ipxUSwv/m+1rAKVqz5
                                  MD5:051652BA7CA426846E936BC5AA3F39F3
                                  SHA1:0012007876DDE3A2D764249AD86BC428300FE91E
                                  SHA-256:8ECA993570FA55E8FE8F417143EEA8128A58472E23074CBD2E6AF4D3BB0F0D9A
                                  SHA-512:005B22BD5A4CCA9930C5ECA95AF01FC034BB496F4E599CAC3F20B0B9CE0957B4DB685B8E47977E5B289DC5CF1C8A81F4DD7434D0347E41D008E2C8F7F12006F0
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........D[...[...[...R...Y.......S...4...Z...4...Y...4...P...[......4./.z...4...Z...4...Z...4...Z...Rich[...........................PE..L....A.O...........!.....n...:.......w....................................................@............................................................................................................@...............D............................text....l.......n.................. ..`.rdata...............r..............@..@.data...............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):93696
                                  Entropy (8bit):6.44977499578729
                                  Encrypted:false
                                  SSDEEP:1536:W3Hq5zbjpPQ4Y0epuuwCbDz5xAFKL8kycL7:gHQxPQfGuz5uFKL8kyu7
                                  MD5:C26E940B474728E728CAFE5912BA418A
                                  SHA1:7256E378A419F8D87DE71835E6AD12FAADAAAF73
                                  SHA-256:1AF1AC51A92B36DE8D85D1F572369815404912908C3A489A6CD7CA2350C2A93D
                                  SHA-512:BD8673FACD416C8F2EB9A45C4DEEF50E53D0BC41E6B3941FC20CDA8E2D88267205526DADB44BD89869BD333BF7D6F8DB589C95997E1F3322F7A66A09D562B1DF
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................`....C.k.....m.....X.....o...........Y.....h.....i.....n....Rich...........PE..L....A.O...........!................p.....................................................@..........................O.......F..x...................................................................0F..@...............l............................text...~........................... ..`.rdata..............................@..@.data........p.......Z..............@....rsrc................\..............@..@.reloc...............`..............@..B........................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):2685
                                  Entropy (8bit):7.881499470740637
                                  Encrypted:false
                                  SSDEEP:48:R5t7MR3RzOzFv1Zbiyp8wST7kLxC7XPYgT7a0FSpczbVn0q+dBzl:N7MzCpjiyp8wNczPYSe8SuR0/BJ
                                  MD5:CB24F524AB36239CDA47EBEB8CBD6EDB
                                  SHA1:4CDC6226288F2D5868C48457F124569ECB91608F
                                  SHA-256:7EE7F861AF655E38B08FC3112E0B19C518673251478B2DD44C2580659FE402F0
                                  SHA-512:C1BA2485C5900BBE5B0A7AEEA8856EE77DE8D1544F2F71EFFCA80F3E8DD49B01C309AD3163740263F027AB66ECBDB679B8609AC601D33F98670E406C4C6604B0
                                  Malicious:false
                                  Preview:0..y...0..?..*.H.........0...,0..(0.....*.H..........0......0.....*.H......0...*.H.......0...=......[..........R^b...o...VY..<...".NR.FTS[Fd.W.8..= rY.......p./.^..1..0U/...i....[Q.@.KLPg.....<...m.....:/Z.....O7}....y5.Y..\..).W.E.G.....#.$._.O.......,.t..+:.....wX.....G!RYM.1i..........G!.S.uX.].S30.M.......Y.*d..':......{Z.^W....&..n....A.4.>...F.:A ...ah..m.I..b....s:.........6.y.xH3t!0.dT.N)...nE.......~r..!......=..YQ..n..nlr.z[*..0.P.\E_...4...U..y:.._56O\C..4.5&.J...+.... /..............^..l3..+_:....#.<,........f,.L/".'...QA...1J'9>...........xM..Gz...Ih.4F.R.q...%.J.......oTS.W6C..L#...K\.r7...de.B..)Go...I..w...5..B.Z.s1KmU...Y*.x).......2gp@..uI..#......3.Hv.5.?..-X.a.........W....=B>...]:..H..c...B.......czdNc.v..?..xP..R...I.(T...CpI.<.H>.a.....R..}R.._v..w....L...X..4=....nX.xn....mn.yfG...lV....xE.$...._.-.....P..Xq3Y)=..yvD........7..2.3...O...N.55h..f.."y.h.`.~M...E..B....l~~.S|... 4.h...3..G.o.G.;.*`.Tr..M..8.B.....+u.#C.....
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):97792
                                  Entropy (8bit):6.240650542976671
                                  Encrypted:false
                                  SSDEEP:1536:xtTRGG7+CF7k9QTPHkis9rGDE9tJ7kdsolb5XpIKz1TpNs6IRcgAGEFDGSs1f8b6:xGG6CF7k9QbHkCE9tJ7kdsW5Xh5s6IRV
                                  MD5:A5C670EDF4411BF7F132F4280026137B
                                  SHA1:C0E3CBDDE7D3CEBF41A193EECA96A11CE2B6DA58
                                  SHA-256:ABA2732C7A016730E94E645DD04E8FAFCC173FC2E5E2AAC01A1C0C66EAD1983E
                                  SHA-512:ACFCDE89A968D81363AE1CD599A6A362B047AE207722FEA8541577AC609BC5FEFB2231ED946E13F0B4B3BCD56B947C13837C1B9E360D521EC7D580BEFCBB0F46
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r...6.k.6.k.6.k.?...4.k.Y...7.k.Y...4.k.Y...;.k.6.j..k.Y.....k.Y..7.k.Y..7.k.Y...7.k.Rich6.k.........................PE..L....A.O...........!.........j...............0............................................@.........................Pj..v...\N.......................................................................M..@............0...............................text............................... ..`.rdata...S...0...T..................@..@.data...h............l..............@....rsrc................n..............@..@.reloc...............r..............@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):172544
                                  Entropy (8bit):6.496240878001019
                                  Encrypted:false
                                  SSDEEP:3072:KfHTwBGo4uYvGG3byHhQNP4IP/zsu9zvKwMNJ+Z/9tRpK:KsGTudG3GHhMz3SNY9R
                                  MD5:2AB31C9401870ADB4E9D88B5A6837ABF
                                  SHA1:4F0FDD699E63F614D79ED6E47EF61938117D3B7A
                                  SHA-256:22ECECE561510F77B100CFF8109E5ED492C34707B7B14E0774AAA9CA813DE4AD
                                  SHA-512:BC58C4DA15E902351F1F161E9D8C1EE4D10ACEB5EDA7DEF4B4454CADF4CD9F437118BA9D63F25F4F0A5694E9D34A4DEF33D40AD51EFB1CDEBB6F02A81C481871
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.e./.6./.6./.6.W.6./.6;a.6./.6.Y.6./.6.Y36./.6.Y.6./.6./.61/.6.Y26./.6.Y.6./.6.Y.6./.6.Y.6./.6Rich./.6................PE..L....A.O...........!.....*...x.......3.......@............................................@.................................<...................................|...................................x...@............@...............................text....(.......*.................. ..`.rdata...O...@...P..................@..@.data................~..............@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):423936
                                  Entropy (8bit):6.751461394308889
                                  Encrypted:false
                                  SSDEEP:6144:Cf41DoFqNI3Cm39XWYJkW07RlqHYOE1o2exosU8iZEJKvncrghAvLWDKnADA3/AF:DD76rrQ7ngYLo2MliPSghmLYk3/n
                                  MD5:B58848A28A1EFB85677E344DB1FD67E6
                                  SHA1:DAD48E2B2B3B936EFC15AC2C5F9099B7A1749976
                                  SHA-256:00DB98AB4D50E9B26ECD193BFAD6569E1DD395DB14246F8C233FEBBA93965F7A
                                  SHA-512:762B3BD7F1F1A5C3ACCDE8C36406B9BEADD4270C570EB95A05935C1F7731513938AE5E99950C648B1EACDD2A85F002319B78B7E4EA9577C72335A2FA54796B13
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......,J..h+.Yh+.Yh+.YaS0Yj+.Y.]?Yk+.Yh+.Y&+.Y.]=Yd+.Y.].Yj+.Y.].Yf+.Y.]8Yi+.Y.]>Yi+.YRichh+.Y........................PE..L....A.O...........!......................................................................@..........................J.......C..<...............................@&..................................@B..@...............@............................text............................... ..`.rdata..............................@..@.data........`.......D..............@....reloc..Z(.......*...N..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):190976
                                  Entropy (8bit):6.662915165682162
                                  Encrypted:false
                                  SSDEEP:3072:82ya/vPWqodwFYAjkiV6vnjBr/WPUShgk04YZEnhacoAX8+FeHbnGmgjZzpTBfRP:j7JoiVGj+hIWNmKFpTBJ8B
                                  MD5:717DBDF0E1F616EA8A038259E273C530
                                  SHA1:926CE8EC8F79B62202ED487C5FB0C3E1A18F5F70
                                  SHA-256:E3227EA4C39F5B44F685EEA13D9F6663945E46B12CABE5D29DAEF28B6EEF1A9B
                                  SHA-512:C09BF38AC93C350DFD0638BEEDD40FBCC9435A06B0013D214F57B181C1B4292E4B8A8310DB2DB48200BCFED872BC656EA92A207ACB6F7B344E3F134226C2AB3F
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 3%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Af......................jq......jq=.....jq..............jq<.5...jq......jq......jq......Rich............................PE..L....A.O...........!.................".......0............................... ............@.........................p...j.......................................l......................................@............0...............................text............................... ..`.rdata......0......................@..@.data...<...........................@....rsrc...............................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):56
                                  Entropy (8bit):4.503434386188784
                                  Encrypted:false
                                  SSDEEP:3:RBkAe+WA6nWZmrXpn:rkAe+WfWErZn
                                  MD5:E40A3D559E4B85251943E071CD036D90
                                  SHA1:10FC58DF075108C912589F7954244A807776A0FB
                                  SHA-256:E179CA82C741D7D4842E42BC339C0E2C9BEFA1A5EFFE33D69D6821B3121FECCA
                                  SHA-512:07CC337D7EB364FC78B0B36ACBE9F89B85D932B3D616B8EDFB5F12214ECD17853ECAC4725CAE929CCE8A803D868FC3F5A5AD4D394554BB4783B0CCAFEA981959
                                  Malicious:false
                                  Preview://..lockPref("security.enterprise_roots.enabled", true);
                                  Process:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):6144
                                  Entropy (8bit):4.720366600008286
                                  Encrypted:false
                                  SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                  MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                  SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                  SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                  SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):3218944
                                  Entropy (8bit):6.344016460665066
                                  Encrypted:false
                                  SSDEEP:49152:6EA9P+bz2cHPcUb6HSb4SOEMkBeH7nQckO6bAGx7jXTV633385:K92bz2Eb6pd7B6bAGx7M333e
                                  MD5:05CB53C8116FA798AB00B737F7B94015
                                  SHA1:BC5F54566CA4A156030372CEFEAD56540FB3D9FF
                                  SHA-256:41355B9DE8550C19DE59BA6555BAC91BCCA1529F0EABFF8C239A7B151F4012EB
                                  SHA-512:66E96ACA190FD2069C6E24B37EDE8F38D1B0E3D11696E93AD09E0EBDF3E8809D49D0C9B0E5C68F479E88F6440302E07A1D5327BE489D1095DAD0746657ACDEAE
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...(..`.................:,.........`F,......P,...@...........................2...........@......@....................-......p-.29....-.L.....................................................-......................y-.......-......................text.....,.......,................. ..`.itext...(... ,..*....,............. ..`.data........P,......>,.............@....bss.....y....,..........................idata..29...p-..:....,.............@....didata.......-.......-.............@....edata........-.......-.............@..@.tls....L.....-..........................rdata..].....-.......-.............@..@.rsrc...L.....-.......-.............@..@..............1.......0.............@..@........................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2752392
                                  Entropy (8bit):7.69362175399761
                                  Encrypted:false
                                  SSDEEP:49152:iqe3f6ECWVVX/QSJKYkljNXONfDevXUCH+s+U0WBAW:7SiE3ROj0CEqvV0CAW
                                  MD5:5DAEC5D62A1B06418E5EAE25B7857748
                                  SHA1:8A56F34F6A62B6EE1489AB2DFFF643BC5DC22276
                                  SHA-256:9F395107A54B5393D98B7AA5D4A039D32BE780E691CACF75EF7D4CE58D074D83
                                  SHA-512:10B3AF9C90B875294EF606EB471E1E30A7A8DB56FAB2874F6EF32D33D088C97E4802A4980B196AA419BD0DDDC568F13C5453E822A190E5165C96C4E7E2CF0CB1
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...'..`.................P...6.......^.......p....@..........................`......h1*...@......@...................@....... ..6....p..T.............).p1...................................`......................."..D....0.......................text....6.......8.................. ..`.itext.......P.......<.............. ..`.data....7...p...8...T..............@....bss.....m...............................idata..6.... ......................@....didata......0......................@....edata.......@......................@..@.tls.........P...........................rdata..]....`......................@..@.rsrc...T....p......................@..@....................................@..@........................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp
                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                  Category:dropped
                                  Size (bytes):6144
                                  Entropy (8bit):4.720366600008286
                                  Encrypted:false
                                  SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                  MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                  SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                  SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                  SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp
                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Category:dropped
                                  Size (bytes):2752392
                                  Entropy (8bit):7.69362175399761
                                  Encrypted:false
                                  SSDEEP:49152:iqe3f6ECWVVX/QSJKYkljNXONfDevXUCH+s+U0WBAW:7SiE3ROj0CEqvV0CAW
                                  MD5:5DAEC5D62A1B06418E5EAE25B7857748
                                  SHA1:8A56F34F6A62B6EE1489AB2DFFF643BC5DC22276
                                  SHA-256:9F395107A54B5393D98B7AA5D4A039D32BE780E691CACF75EF7D4CE58D074D83
                                  SHA-512:10B3AF9C90B875294EF606EB471E1E30A7A8DB56FAB2874F6EF32D33D088C97E4802A4980B196AA419BD0DDDC568F13C5453E822A190E5165C96C4E7E2CF0CB1
                                  Malicious:false
                                  Antivirus:
                                  • Antivirus: ReversingLabs, Detection: 0%
                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...'..`.................P...6.......^.......p....@..........................`......h1*...@......@...................@....... ..6....p..T.............).p1...................................`......................."..D....0.......................text....6.......8.................. ..`.itext.......P.......<.............. ..`.data....7...p...8...T..............@....bss.....m...............................idata..6.... ......................@....didata......0......................@....edata.......@......................@..@.tls.........P...........................rdata..]....`......................@..@.rsrc...T....p......................@..@....................................@..@........................................................
                                  Process:C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe
                                  File Type:ASCII text, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):19
                                  Entropy (8bit):3.5110854081804286
                                  Encrypted:false
                                  SSDEEP:3:RoHQGQB5:RZGU5
                                  MD5:E3AC0178A28CF8E44D82A62FAE2290D7
                                  SHA1:C0F1C66E831ADD5EA81B19BFA0E85D1D2CA192BA
                                  SHA-256:2C61108AC0158F555B0632F5658D79D502B0929F2090848A7DEB77158667D43C
                                  SHA-512:F7C2290526630DEF784459621007F389D720034D3BCE1EFF9B761C7A959061FDB465B9D239290EB543E7B0CFB41682361D0400459621F8756A8A09782F33693A
                                  Malicious:false
                                  Preview:CertMgr Succeeded..
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):7.817721379244328
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 98.45%
                                  • Inno Setup installer (109748/4) 1.08%
                                  • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  File name:RDM_Root_Cert_Update_Windows.exe
                                  File size:3'838'992 bytes
                                  MD5:d4b2995d38da119e5b0db2cb90778224
                                  SHA1:2570198aafaf5d6f394ffd6e7e741c2316510ee0
                                  SHA256:05a6215fbf82c755b73dcfa297f229bf5b88c879b4a7a2edf680ebd97a4580ad
                                  SHA512:a611e1fbd0b9997e395f1b829e4b08f833cf5d70e9e846c7eb81d8faeef9fee4af11fc43f4f47776692595ed880eda6b7fd68210cc381984fb70ccf75d680366
                                  SSDEEP:98304:uSiKiNyE3pWHFowVGfO1xW8zjoix6b8/CEqvV0CAe:/KyE5WHFowQsxVwzE/cH
                                  TLSH:CD06F13BB298753EC45A0B364573A220587BBEA1BC1A8C1E5BF0381DDF760B11E3B655
                                  File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                  Icon Hash:54525a4a525e5600
                                  Entrypoint:0x4b5eec
                                  Entrypoint Section:.itext
                                  Digitally signed:true
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x60B88E27 [Thu Jun 3 08:09:11 2021 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:1
                                  File Version Major:6
                                  File Version Minor:1
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:1
                                  Import Hash:5a594319a0d69dbc452e748bcf05892e
                                  Signature Valid:true
                                  Signature Issuer:CN=GlobalSign GCC R45 CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                                  Signature Validation Error:The operation completed successfully
                                  Error Number:0
                                  Not Before, Not After
                                  • 26/03/2024 22:00:39 27/03/2025 22:00:39
                                  Subject Chain
                                  • E=certadmin@deluxe.com, CN=Deluxe Corporation, O=Deluxe Corporation, L=Shoreview, S=Minnesota, C=US
                                  Version:3
                                  Thumbprint MD5:BEF0171825682D9817D1C9940167515E
                                  Thumbprint SHA-1:DB6FF586745306742F40BE5C5A9A1CFB5CA60DFF
                                  Thumbprint SHA-256:33443DC874D3E0CD8D3D0076DCA011CF28A961E83940EC357D8D2FCF87DCD4BF
                                  Serial:7D9B3C2EFCA6B8143D0373D7
                                  Instruction
                                  push ebp
                                  mov ebp, esp
                                  add esp, FFFFFFA4h
                                  push ebx
                                  push esi
                                  push edi
                                  xor eax, eax
                                  mov dword ptr [ebp-3Ch], eax
                                  mov dword ptr [ebp-40h], eax
                                  mov dword ptr [ebp-5Ch], eax
                                  mov dword ptr [ebp-30h], eax
                                  mov dword ptr [ebp-38h], eax
                                  mov dword ptr [ebp-34h], eax
                                  mov dword ptr [ebp-2Ch], eax
                                  mov dword ptr [ebp-28h], eax
                                  mov dword ptr [ebp-14h], eax
                                  mov eax, 004B10F0h
                                  call 00007FE394E4C875h
                                  xor eax, eax
                                  push ebp
                                  push 004B65E2h
                                  push dword ptr fs:[eax]
                                  mov dword ptr fs:[eax], esp
                                  xor edx, edx
                                  push ebp
                                  push 004B659Eh
                                  push dword ptr fs:[edx]
                                  mov dword ptr fs:[edx], esp
                                  mov eax, dword ptr [004BE634h]
                                  call 00007FE394EEEF9Fh
                                  call 00007FE394EEEAF2h
                                  lea edx, dword ptr [ebp-14h]
                                  xor eax, eax
                                  call 00007FE394E622E8h
                                  mov edx, dword ptr [ebp-14h]
                                  mov eax, 004C1D84h
                                  call 00007FE394E47467h
                                  push 00000002h
                                  push 00000000h
                                  push 00000001h
                                  mov ecx, dword ptr [004C1D84h]
                                  mov dl, 01h
                                  mov eax, dword ptr [004237A4h]
                                  call 00007FE394E6334Fh
                                  mov dword ptr [004C1D88h], eax
                                  xor edx, edx
                                  push ebp
                                  push 004B654Ah
                                  push dword ptr fs:[edx]
                                  mov dword ptr fs:[edx], esp
                                  call 00007FE394EEF027h
                                  mov dword ptr [004C1D90h], eax
                                  mov eax, dword ptr [004C1D90h]
                                  cmp dword ptr [eax+0Ch], 01h
                                  jne 00007FE394EF560Ah
                                  mov eax, dword ptr [004C1D90h]
                                  mov edx, 00000028h
                                  call 00007FE394E63C44h
                                  mov edx, dword ptr [004C1D90h]
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0xc40000x9a.edata
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc20000xf36.idata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x1e754.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x3a62b80x3158
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0xc60000x18.rdata
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0xc22e40x244.idata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0xc30000x1a4.didata
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000xb361c0xb3800ad6e46e3a3acdb533eb6a077f6d065afFalse0.3448639341051532data6.356058204328091IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .itext0xb50000x16880x1800d40fc822339d01f2abcc5493ac101c94False0.544921875data5.972750055221053IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .data0xb70000x37a40x38004c195d5591f6d61265df08a3733de3a2False0.36097935267857145data5.044400562007734IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .bss0xbb0000x6de80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .idata0xc20000xf360x1000a73d686f1e8b9bb06ec767721135e397False0.3681640625data4.8987046479600425IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .didata0xc30000x1a40x20041b8ce23dd243d14beebc71771885c89False0.345703125data2.7563628682496506IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .edata0xc40000x9a0x20037c1a5c63717831863e018c0f51dabb7False0.2578125data1.8722228665884297IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .tls0xc50000x180x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .rdata0xc60000x5d0x2008f2f090acd9622c88a6a852e72f94e96False0.189453125data1.3838943752217987IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .rsrc0xc70000x1e7540x1e800b71fbe8719fa2368d3fd04dcc632bceaFalse0.22003073770491804data3.605316662907013IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0xc75280x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/mEnglishUnited States0.42021276595744683
                                  RT_ICON0xc79900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/mEnglishUnited States0.2804878048780488
                                  RT_ICON0xc8a380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/mEnglishUnited States0.2024896265560166
                                  RT_ICON0xcafe00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/mEnglishUnited States0.1614903164855928
                                  RT_ICON0xcf2080x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/mEnglishUnited States0.08491068259789424
                                  RT_ICON0xdfa300x2db4PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9390598290598291
                                  RT_STRING0xe27e40x360data0.34375
                                  RT_STRING0xe2b440x260data0.3256578947368421
                                  RT_STRING0xe2da40x45cdata0.4068100358422939
                                  RT_STRING0xe32000x40cdata0.3754826254826255
                                  RT_STRING0xe360c0x2d4data0.39226519337016574
                                  RT_STRING0xe38e00xb8data0.6467391304347826
                                  RT_STRING0xe39980x9cdata0.6410256410256411
                                  RT_STRING0xe3a340x374data0.4230769230769231
                                  RT_STRING0xe3da80x398data0.3358695652173913
                                  RT_STRING0xe41400x368data0.3795871559633027
                                  RT_STRING0xe44a80x2a4data0.4275147928994083
                                  RT_RCDATA0xe474c0x10data1.5
                                  RT_RCDATA0xe475c0x2c4data0.6384180790960452
                                  RT_RCDATA0xe4a200x2cdata1.1818181818181819
                                  RT_GROUP_ICON0xe4a4c0x5adataEnglishUnited States0.7444444444444445
                                  RT_VERSION0xe4aa80x584dataEnglishUnited States0.27124645892351273
                                  RT_MANIFEST0xe502c0x726XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4005464480874317
                                  DLLImport
                                  kernel32.dllGetACP, GetExitCodeProcess, LocalFree, CloseHandle, SizeofResource, VirtualProtect, VirtualFree, GetFullPathNameW, ExitProcess, HeapAlloc, GetCPInfoExW, RtlUnwind, GetCPInfo, GetStdHandle, GetModuleHandleW, FreeLibrary, HeapDestroy, ReadFile, CreateProcessW, GetLastError, GetModuleFileNameW, SetLastError, FindResourceW, CreateThread, CompareStringW, LoadLibraryA, ResetEvent, GetVersion, RaiseException, FormatMessageW, SwitchToThread, GetExitCodeThread, GetCurrentThread, LoadLibraryExW, LockResource, GetCurrentThreadId, UnhandledExceptionFilter, VirtualQuery, VirtualQueryEx, Sleep, EnterCriticalSection, SetFilePointer, LoadResource, SuspendThread, GetTickCount, GetFileSize, GetStartupInfoW, GetFileAttributesW, InitializeCriticalSection, GetThreadPriority, SetThreadPriority, GetCurrentProcess, VirtualAlloc, GetSystemInfo, GetCommandLineW, LeaveCriticalSection, GetProcAddress, ResumeThread, GetVersionExW, VerifyVersionInfoW, HeapCreate, GetWindowsDirectoryW, VerSetConditionMask, GetDiskFreeSpaceW, FindFirstFileW, GetUserDefaultUILanguage, lstrlenW, QueryPerformanceCounter, SetEndOfFile, HeapFree, WideCharToMultiByte, FindClose, MultiByteToWideChar, LoadLibraryW, SetEvent, CreateFileW, GetLocaleInfoW, GetSystemDirectoryW, DeleteFileW, GetLocalTime, GetEnvironmentVariableW, WaitForSingleObject, WriteFile, ExitThread, DeleteCriticalSection, TlsGetValue, GetDateFormatW, SetErrorMode, IsValidLocale, TlsSetValue, CreateDirectoryW, GetSystemDefaultUILanguage, EnumCalendarInfoW, LocalAlloc, GetUserDefaultLangID, RemoveDirectoryW, CreateEventW, SetThreadLocale, GetThreadLocale
                                  comctl32.dllInitCommonControls
                                  version.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
                                  user32.dllCreateWindowExW, TranslateMessage, CharLowerBuffW, CallWindowProcW, CharUpperW, PeekMessageW, GetSystemMetrics, SetWindowLongW, MessageBoxW, DestroyWindow, CharUpperBuffW, CharNextW, MsgWaitForMultipleObjects, LoadStringW, ExitWindowsEx, DispatchMessageW
                                  oleaut32.dllSysAllocStringLen, SafeArrayPtrOfIndex, VariantCopy, SafeArrayGetLBound, SafeArrayGetUBound, VariantInit, VariantClear, SysFreeString, SysReAllocStringLen, VariantChangeType, SafeArrayCreate
                                  netapi32.dllNetWkstaGetInfo, NetApiBufferFree
                                  advapi32.dllRegQueryValueExW, AdjustTokenPrivileges, LookupPrivilegeValueW, RegCloseKey, OpenProcessToken, RegOpenKeyExW
                                  NameOrdinalAddress
                                  TMethodImplementationIntercept30x454060
                                  __dbk_fcall_wrapper20x40d0a0
                                  dbkFCallWrapperAddr10x4be63c
                                  Language of compilation systemCountry where language is spokenMap
                                  EnglishUnited States
                                  No network behavior found

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:12:58:18
                                  Start date:28/08/2024
                                  Path:C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe"
                                  Imagebase:0x400000
                                  File size:3'838'992 bytes
                                  MD5 hash:D4B2995D38DA119E5B0DB2CB90778224
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:Borland Delphi
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:12:58:18
                                  Start date:28/08/2024
                                  Path:C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Local\Temp\is-BUL6H.tmp\RDM_Root_Cert_Update_Windows.tmp" /SL5="$10476,2990719,887296,C:\Users\user\Desktop\RDM_Root_Cert_Update_Windows.exe"
                                  Imagebase:0x400000
                                  File size:3'218'944 bytes
                                  MD5 hash:A5388235BBD3513D95A2A5C172A55680
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:Borland Delphi
                                  Antivirus matches:
                                  • Detection: 0%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:3
                                  Start time:12:58:23
                                  Start date:28/08/2024
                                  Path:C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT
                                  Imagebase:0x400000
                                  File size:2'752'392 bytes
                                  MD5 hash:5DAEC5D62A1B06418E5EAE25B7857748
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:Borland Delphi
                                  Reputation:low
                                  Has exited:true

                                  Target ID:4
                                  Start time:12:58:23
                                  Start date:28/08/2024
                                  Path:C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Local\Temp\is-SC2V1.tmp\RDM_ROOTCERTIFICATE.tmp" /SL5="$2047A,1902883,887296,C:\Users\user\AppData\Local\Temp\is-SU9Q0.tmp\RDM_ROOTCERTIFICATE.exe" /VERYSILENT
                                  Imagebase:0x400000
                                  File size:3'218'944 bytes
                                  MD5 hash:05CB53C8116FA798AB00B737F7B94015
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:Borland Delphi
                                  Antivirus matches:
                                  • Detection: 0%, ReversingLabs
                                  Reputation:low
                                  Has exited:true

                                  Target ID:5
                                  Start time:12:58:24
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/certremoval.bat""
                                  Imagebase:0x790000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:6
                                  Start time:12:58:24
                                  Start date:28/08/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:7
                                  Start time:12:58:24
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\system32\cmd.exe /S /D /c" echo 1 "
                                  Imagebase:0x790000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:8
                                  Start time:12:58:24
                                  Start date:28/08/2024
                                  Path:C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe
                                  Wow64 process (32bit):true
                                  Commandline:CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root
                                  Imagebase:0x1000000
                                  File size:59'664 bytes
                                  MD5 hash:5D077A0CDD077C014EEDB768FEB249BA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:9
                                  Start time:12:58:24
                                  Start date:28/08/2024
                                  Path:C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe
                                  Wow64 process (32bit):true
                                  Commandline:CertMgr.exe -del -c -n "RDM Device Root" -s -r localMachine Root
                                  Imagebase:0x1000000
                                  File size:59'664 bytes
                                  MD5 hash:5D077A0CDD077C014EEDB768FEB249BA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:10
                                  Start time:12:58:24
                                  Start date:28/08/2024
                                  Path:C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\certmgr.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/CertMgr.exe" -add -c RDM_RootCA.pem -s -r localmachine Root
                                  Imagebase:0x1000000
                                  File size:59'664 bytes
                                  MD5 hash:5D077A0CDD077C014EEDB768FEB249BA
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:moderate
                                  Has exited:true

                                  Target ID:11
                                  Start time:12:58:24
                                  Start date:28/08/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:12
                                  Start time:12:58:25
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\system32\cmd.exe" /C ""C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp/RdmCert/AddCert.bat" "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\RDM_RootCA.pem""
                                  Imagebase:0x790000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:13
                                  Start time:12:58:25
                                  Start date:28/08/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:14
                                  Start time:12:58:25
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\cmd.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\system32\cmd.exe /c dir /B "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\*.default*"
                                  Imagebase:0x790000
                                  File size:236'544 bytes
                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:15
                                  Start time:12:58:25
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\certutil.exe
                                  Wow64 process (32bit):true
                                  Commandline:certutil.exe -A -n "RDM_Device" -t "TCu,TCu,TCu" -d "C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\." -i "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\RDM_RootCA.pem"
                                  Imagebase:0xd0000
                                  File size:1'277'440 bytes
                                  MD5 hash:0DDA4F16AE041578B4E250AE12E06EB1
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:16
                                  Start time:12:58:25
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\certutil.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\system32/certutil.exe" f p rdm736 importpfx "C:\Users\user\AppData\Local\Temp\is-N6PB1.tmp\RdmCert\rdm.pfx"
                                  Imagebase:0xd0000
                                  File size:1'277'440 bytes
                                  MD5 hash:0DDA4F16AE041578B4E250AE12E06EB1
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:17
                                  Start time:12:58:25
                                  Start date:28/08/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:18
                                  Start time:12:58:26
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\net.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\system32\net.exe" stop "RDMAppweb"
                                  Imagebase:0xf60000
                                  File size:47'104 bytes
                                  MD5 hash:31890A7DE89936F922D44D677F681A7F
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:19
                                  Start time:12:58:26
                                  Start date:28/08/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:20
                                  Start time:12:58:26
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\net1.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\system32\net1 stop "RDMAppweb"
                                  Imagebase:0xc90000
                                  File size:139'776 bytes
                                  MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:21
                                  Start time:12:58:26
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\net.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\system32\net.exe" stop "Embedthis Rdmappweb"
                                  Imagebase:0xf60000
                                  File size:47'104 bytes
                                  MD5 hash:31890A7DE89936F922D44D677F681A7F
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:22
                                  Start time:12:58:27
                                  Start date:28/08/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:23
                                  Start time:12:58:27
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\net1.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\system32\net1 stop "Embedthis Rdmappweb"
                                  Imagebase:0xc90000
                                  File size:139'776 bytes
                                  MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:24
                                  Start time:12:58:27
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\net.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\system32\net.exe" start "RDMAppweb"
                                  Imagebase:0xf60000
                                  File size:47'104 bytes
                                  MD5 hash:31890A7DE89936F922D44D677F681A7F
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:25
                                  Start time:12:58:27
                                  Start date:28/08/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:26
                                  Start time:12:58:27
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\net1.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\system32\net1 start "RDMAppweb"
                                  Imagebase:0xc90000
                                  File size:139'776 bytes
                                  MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:27
                                  Start time:12:58:27
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\net.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Windows\system32\net.exe" start "Embedthis Rdmappweb"
                                  Imagebase:0xf60000
                                  File size:47'104 bytes
                                  MD5 hash:31890A7DE89936F922D44D677F681A7F
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:28
                                  Start time:12:58:27
                                  Start date:28/08/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff6d64d0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Target ID:29
                                  Start time:12:58:27
                                  Start date:28/08/2024
                                  Path:C:\Windows\SysWOW64\net1.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Windows\system32\net1 start "Embedthis Rdmappweb"
                                  Imagebase:0xc90000
                                  File size:139'776 bytes
                                  MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:7.1%
                                    Dynamic/Decrypted Code Coverage:53%
                                    Signature Coverage:16.8%
                                    Total number of Nodes:1743
                                    Total number of Limit Nodes:10
                                    execution_graph 4066 1006804 4067 10067fc 4066->4067 4067->4066 4070 100740a 4067->4070 4071 100826b 9 API calls 4070->4071 4072 100741e 4071->4072 4073 1006835 4072->4073 4074 100885a 5 API calls 4072->4074 4075 1007438 4074->4075 4076 100885a 5 API calls 4075->4076 4077 100744a 4076->4077 4078 1007471 4077->4078 4079 100885a 5 API calls 4077->4079 4080 1007451 4077->4080 4078->4080 4082 100885a 5 API calls 4078->4082 4079->4078 4081 100885a 5 API calls 4080->4081 4083 10074a1 printf 4080->4083 4084 100749f 4081->4084 4082->4080 4085 100885a 5 API calls 4083->4085 4084->4083 4086 10074c0 4085->4086 4087 10074d4 4086->4087 4088 10074c8 printf 4086->4088 4090 100885a 5 API calls 4087->4090 4089 10074e4 printf 4088->4089 4091 1007525 4089->4091 4094 10074f1 4089->4094 4090->4089 4091->4073 4093 1008811 free 4091->4093 4092 100885a 5 API calls 4092->4094 4093->4073 4094->4091 4094->4092 4095 10061b4 27 API calls 4094->4095 4095->4094 4096 1006587 4097 100657f 4096->4097 4097->4096 4100 100796c 4097->4100 4101 100826b 9 API calls 4100->4101 4102 1007982 4101->4102 4103 10065b8 4102->4103 4104 1007998 4102->4104 4110 10079af 4102->4110 4105 100885a 5 API calls 4104->4105 4106 10079a8 4105->4106 4106->4103 4107 1008811 free 4106->4107 4107->4103 4108 1005be8 29 API calls 4108->4110 4109 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 4109->4110 4110->4106 4110->4108 4110->4109 4111 1007b03 printf 4110->4111 4111->4110 4115 1006b0b 4116 1006b03 4115->4116 4116->4115 4119 1007d47 4116->4119 4120 100826b 9 API calls 4119->4120 4121 1007d5b 4120->4121 4122 1006b41 4121->4122 4123 100885a 5 API calls 4121->4123 4124 1007d74 4123->4124 4125 1007db5 4124->4125 4126 1007d7d printf 4124->4126 4129 1007df2 4125->4129 4130 1007db9 printf 4125->4130 4127 1007d9a 4126->4127 4128 1007dab printf 4126->4128 4131 100885a 5 API calls 4127->4131 4135 1007e02 4128->4135 4134 100885a 5 API calls 4129->4134 4133 10058ed 12 API calls 4130->4133 4131->4128 4136 1007dd7 4133->4136 4134->4135 4135->4122 4138 1008811 free 4135->4138 4137 100885a 5 API calls 4136->4137 4137->4128 4138->4122 4139 1006890 4140 1006888 4139->4140 4140->4139 4143 1007363 4140->4143 4144 100826b 9 API calls 4143->4144 4145 1007377 4144->4145 4146 10068c1 4145->4146 4147 100885a 5 API calls 4145->4147 4148 1007391 4147->4148 4149 100885a 5 API calls 4148->4149 4150 10073af printf 4149->4150 4151 100885a 5 API calls 4150->4151 4152 10073d0 4151->4152 4153 10073e4 4152->4153 4154 10073d8 printf 4152->4154 4156 100885a 5 API calls 4153->4156 4155 10073f4 printf 4154->4155 4155->4146 4157 10073fe 4155->4157 4156->4155 4158 1008811 free 4157->4158 4158->4146 4159 1006618 4160 1006610 4159->4160 4160->4159 4163 10077e6 4160->4163 4164 100826b 9 API calls 4163->4164 4165 10077f9 4164->4165 4166 1006649 4165->4166 4167 100885a 5 API calls 4165->4167 4168 1007813 4167->4168 4169 100783b 4168->4169 4170 100885a 5 API calls 4168->4170 4171 100791f 4169->4171 4174 100885a 5 API calls 4169->4174 4173 100782a 4170->4173 4172 100795a 4171->4172 4175 1005d9d 12 API calls 4171->4175 4172->4166 4180 1008811 free 4172->4180 4176 10058ed 12 API calls 4173->4176 4177 100785a 4174->4177 4179 100792c 4175->4179 4176->4169 4178 1007870 4177->4178 4181 100885a 5 API calls 4177->4181 4182 1007887 4178->4182 4184 100885a 5 API calls 4178->4184 4183 100885a 5 API calls 4179->4183 4180->4166 4181->4178 4186 100789e 4182->4186 4188 100885a 5 API calls 4182->4188 4185 100793d 4183->4185 4184->4182 4187 1005d9d 12 API calls 4185->4187 4189 10078b5 4186->4189 4192 100885a 5 API calls 4186->4192 4191 1007949 4187->4191 4188->4186 4190 10078cc 4189->4190 4193 100885a 5 API calls 4189->4193 4194 10078e3 4190->4194 4196 100885a 5 API calls 4190->4196 4195 100885a 5 API calls 4191->4195 4192->4189 4193->4190 4197 10078fa 4194->4197 4198 100885a 5 API calls 4194->4198 4195->4172 4196->4194 4199 1007913 printf 4197->4199 4200 100885a 5 API calls 4197->4200 4198->4197 4199->4171 4201 1007911 4200->4201 4201->4199 4202 1006b9c 4203 1006b94 4202->4203 4203->4202 4206 1007cc7 4203->4206 4207 100826b 9 API calls 4206->4207 4208 1007cd9 4207->4208 4209 1006d2d 4208->4209 4210 100885a 5 API calls 4208->4210 4211 1007cee 4210->4211 4212 1007d15 4211->4212 4213 1007cfc 4211->4213 4214 100885a 5 API calls 4212->4214 4215 100885a 5 API calls 4213->4215 4216 1007d26 4214->4216 4217 1007d10 4215->4217 4218 10058ed 12 API calls 4216->4218 4217->4209 4219 1008811 free 4217->4219 4218->4217 4219->4209 4220 10083a0 __set_app_type __p__fmode __p__commode 4221 100841a 4220->4221 4227 1008500 _controlfp 4221->4227 4223 1008436 _initterm __wgetmainargs _initterm __p___winitenv 4224 10017d0 4223->4224 4225 100849f exit 4224->4225 4226 10084d0 4225->4226 4227->4223 4228 1006921 4229 1006919 4228->4229 4229->4228 4232 10070a3 4229->4232 4233 100826b 9 API calls 4232->4233 4234 10070ba 4233->4234 4235 1006952 4234->4235 4236 100885a 5 API calls 4234->4236 4237 10070d4 4236->4237 4238 10070f4 4237->4238 4239 100885a 5 API calls 4237->4239 4240 100710c 4238->4240 4242 100885a 5 API calls 4238->4242 4241 10070eb 4239->4241 4243 10071cd 4240->4243 4246 1007138 4240->4246 4249 100885a 5 API calls 4240->4249 4269 1007024 4241->4269 4242->4240 4245 10071ed 4243->4245 4248 100885a 5 API calls 4243->4248 4245->4235 4252 1008811 free 4245->4252 4247 1007161 4246->4247 4250 100885a 5 API calls 4246->4250 4255 100885a 5 API calls 4247->4255 4258 1007185 4247->4258 4251 10071e3 4248->4251 4253 100712f 4249->4253 4254 1007153 4250->4254 4256 1007024 14 API calls 4251->4256 4252->4235 4259 1007024 14 API calls 4253->4259 4260 10058ed 12 API calls 4254->4260 4261 1007177 4255->4261 4256->4245 4257 10071a9 4257->4243 4263 100885a 5 API calls 4257->4263 4258->4257 4262 100885a 5 API calls 4258->4262 4259->4246 4260->4247 4264 10058ed 12 API calls 4261->4264 4265 100719b 4262->4265 4266 10071bf 4263->4266 4264->4258 4267 10058ed 12 API calls 4265->4267 4268 10058ed 12 API calls 4266->4268 4267->4257 4268->4243 4270 1007030 4269->4270 4271 1007033 4269->4271 4270->4271 4272 1007048 4270->4272 4274 100885a 5 API calls 4271->4274 4281 10080d7 swprintf 4272->4281 4280 1007087 4274->4280 4275 1007051 wprintf 4276 1007065 4275->4276 4275->4280 4277 100885a 5 API calls 4276->4277 4278 1007075 4277->4278 4279 10058ed 12 API calls 4278->4279 4279->4280 4280->4238 4281->4275 3441 1008423 __setusermatherr 3442 1008431 3441->3442 3448 1008500 _controlfp 3442->3448 3444 1008436 _initterm __wgetmainargs _initterm __p___winitenv 3445 10017d0 3444->3445 3446 100849f exit 3445->3446 3447 10084d0 3446->3447 3448->3444 4282 10066a4 4283 100669c 4282->4283 4283->4282 4286 10077c1 4283->4286 4287 100885a 5 API calls 4286->4287 4288 10077d0 4287->4288 4291 1005bb8 4288->4291 4292 100826b 9 API calls 4291->4292 4293 1005bca 4292->4293 4294 1005be4 4293->4294 4298 1005be8 4293->4298 4297 1008811 free 4297->4294 4299 1005bda 4298->4299 4300 1005bfa wprintf 4298->4300 4299->4294 4299->4297 4303 1005c20 4300->4303 4304 1005c33 4303->4304 4305 1005c80 4303->4305 4304->4305 4306 1005c3a 4304->4306 4307 1005cc2 4304->4307 4308 1005c48 4304->4308 4309 1005c9e 4304->4309 4312 100885a 5 API calls 4305->4312 4316 100885a 5 API calls 4306->4316 4311 100885a 5 API calls 4307->4311 4310 100885a 5 API calls 4308->4310 4313 100885a 5 API calls 4309->4313 4314 1005c58 4310->4314 4315 1005cd2 printf 4311->4315 4319 1005c12 4312->4319 4317 1005cae 4313->4317 4318 10061b4 27 API calls 4314->4318 4315->4319 4316->4319 4320 10058ed 12 API calls 4317->4320 4318->4319 4319->4299 4319->4300 4320->4319 4325 100212b 4328 100213c 4325->4328 4326 100885a 5 API calls 4327 100250c 4326->4327 4329 1002185 4328->4329 4332 10021a1 4328->4332 4351 1002156 4328->4351 4330 100885a 5 API calls 4329->4330 4330->4351 4331 100224a 4334 1002266 4331->4334 4335 100225d _wtol 4331->4335 4331->4351 4332->4331 4333 100894a 12 API calls 4332->4333 4332->4351 4333->4331 4336 100227a 4334->4336 4337 100894a 12 API calls 4334->4337 4335->4334 4338 1002291 _wtol 4336->4338 4339 100229a 4336->4339 4336->4351 4337->4336 4338->4339 4340 10022a3 _wtol 4339->4340 4341 10022ac 4339->4341 4340->4341 4342 10022e5 4341->4342 4352 1008826 4341->4352 4344 100232b 4342->4344 4346 1008826 5 API calls 4342->4346 4342->4351 4344->4351 4357 100573b 4344->4357 4347 1002323 4346->4347 4347->4344 4350 1008826 5 API calls 4347->4350 4349 1008826 5 API calls 4349->4342 4350->4344 4351->4326 4351->4327 4353 100871b 4 API calls 4352->4353 4354 1008840 4353->4354 4355 10022e1 4354->4355 4356 1008849 _wcsicmp 4354->4356 4355->4342 4355->4349 4356->4355 4358 1005775 4357->4358 4359 100574c 4357->4359 4358->4351 4359->4358 4360 1005762 wcslen 4359->4360 4360->4358 4361 100577f 4360->4361 4362 10087df 6 API calls 4361->4362 4364 1005788 4362->4364 4363 10057b5 towupper towupper 4366 10057cf towupper 4363->4366 4368 1005854 4363->4368 4364->4358 4364->4363 4365 10057fb towupper towupper 4364->4365 4367 1005812 towupper 4365->4367 4365->4368 4366->4364 4367->4364 4368->4358 4369 1008811 free 4368->4369 4369->4358 4370 10069ad 4371 10069a5 4370->4371 4371->4370 4374 1006fb3 CryptDecodeObject 4371->4374 4375 10069de 4374->4375 4376 1006fe3 4374->4376 4377 100885a 5 API calls 4376->4377 4378 1006ff3 4377->4378 4379 100885a 5 API calls 4378->4379 4380 1007012 printf 4379->4380 4380->4375 4381 10084ae _XcptFilter 4386 1002eb2 4387 1002ed9 CertAddCTLContextToStore 4386->4387 4388 1002ef2 CertSaveStore 4387->4388 4400 1002ee6 4387->4400 4392 1002f1f 4388->4392 4390 1002fc4 CertFreeCTLContext 4391 1002fcd 4390->4391 4393 1002fd2 CertFreeCTLContext 4391->4393 4394 1002fdb 4391->4394 4397 100885a 5 API calls 4392->4397 4393->4394 4395 1002fe0 CertFreeCTLContext 4394->4395 4396 1002fe9 4394->4396 4395->4396 4398 1002ff7 4396->4398 4399 1002fee CertFreeCTLContext 4396->4399 4397->4400 4401 1003005 4398->4401 4402 1002ffc CertFreeCTLContext 4398->4402 4399->4398 4400->4390 4400->4391 4403 1003013 4401->4403 4404 100300a CertFreeCTLContext 4401->4404 4402->4401 4405 1003046 4403->4405 4407 1003040 free 4403->4407 4408 1003026 CertFreeCTLContext 4403->4408 4404->4403 4406 1003073 4405->4406 4409 1003053 CertFreeCTLContext 4405->4409 4410 100306d free 4405->4410 4411 10030a0 4406->4411 4412 1003080 CertFreeCTLContext 4406->4412 4413 100309a free 4406->4413 4407->4405 4408->4407 4408->4408 4409->4409 4409->4410 4410->4406 4414 10030a5 CertCloseStore 4411->4414 4415 10030af 4411->4415 4412->4412 4412->4413 4413->4411 4414->4415 4416 10030c2 4415->4416 4417 100885a 5 API calls 4415->4417 4417->4416 4418 1006a39 4419 1006a31 4418->4419 4419->4418 4422 1006e23 4419->4422 4423 100885a 5 API calls 4422->4423 4424 1006e33 4423->4424 4427 1005fd8 4424->4427 4428 100826b 9 API calls 4427->4428 4429 1005fed 4428->4429 4430 100603e 4429->4430 4431 100600c 4429->4431 4432 100885a 5 API calls 4429->4432 4433 1006016 printf 4431->4433 4434 1006034 4431->4434 4432->4431 4433->4433 4433->4434 4434->4430 4435 1008811 free 4434->4435 4435->4430 4436 1008abd 4437 1008ad1 4436->4437 4445 1008b72 4436->4445 4438 1008ae3 CreateFileU 4437->4438 4437->4445 4439 1008b21 WriteFile 4438->4439 4440 1008afd GetLastError 4438->4440 4443 1008b37 GetLastError 4439->4443 4444 1008b5b 4439->4444 4441 1008b09 GetLastError 4440->4441 4442 1008b0f GetLastError 4440->4442 4441->4445 4442->4445 4446 1008b43 GetLastError 4443->4446 4447 1008b49 GetLastError 4443->4447 4448 1008b6b CloseHandle 4444->4448 4446->4448 4447->4448 4448->4445 4449 10067be 4450 10067b6 4449->4450 4450->4449 4453 1007601 4450->4453 4454 100826b 9 API calls 4453->4454 4455 1007617 4454->4455 4456 10067ef 4455->4456 4457 100885a 5 API calls 4455->4457 4458 1007631 4457->4458 4459 10076b1 4458->4459 4461 100885a 5 API calls 4458->4461 4460 10076da 4459->4460 4462 100885a 5 API calls 4459->4462 4460->4456 4464 1008811 free 4460->4464 4467 1007647 4461->4467 4463 10076d0 4462->4463 4469 1007535 4463->4469 4464->4456 4466 1007659 printf 4466->4467 4467->4459 4467->4466 4468 1007688 printf 4467->4468 4468->4467 4470 100754e 4469->4470 4471 100753e 4469->4471 4473 100885a 5 API calls 4470->4473 4474 1007565 4470->4474 4472 100885a 5 API calls 4471->4472 4472->4470 4473->4474 4475 100885a 5 API calls 4474->4475 4476 100757c 4474->4476 4475->4476 4477 1007593 4476->4477 4478 100885a 5 API calls 4476->4478 4479 10075aa 4477->4479 4481 100885a 5 API calls 4477->4481 4478->4477 4480 10075c1 4479->4480 4482 100885a 5 API calls 4479->4482 4483 10075d8 4480->4483 4484 100885a 5 API calls 4480->4484 4481->4479 4482->4480 4485 10075f1 printf 4483->4485 4486 100885a 5 API calls 4483->4486 4484->4483 4485->4460 4487 10075ef 4486->4487 4487->4485 4488 1003ebf 4489 1003f23 4488->4489 4493 1003e9f 4488->4493 4491 100885a 5 API calls 4489->4491 4490 1003ecc 4494 100885a 5 API calls 4490->4494 4496 1003f12 4491->4496 4492 100885a 5 API calls 4492->4493 4493->4488 4493->4490 4493->4492 4495 1003efb scanf 4494->4495 4495->4496 4497 1006541 4498 1006539 4497->4498 4498->4497 4501 1007c11 4498->4501 4502 100885a 5 API calls 4501->4502 4503 1007c23 4502->4503 4504 100826b 9 API calls 4503->4504 4505 1007c36 4504->4505 4506 1006572 4505->4506 4507 1007c66 4505->4507 4508 100885a 5 API calls 4505->4508 4509 1007c8b 4507->4509 4511 100885a 5 API calls 4507->4511 4510 1007c55 4508->4510 4512 100885a 5 API calls 4509->4512 4513 1007cb8 4509->4513 4514 10058ed 12 API calls 4510->4514 4515 1007c7f 4511->4515 4516 1007ca4 4512->4516 4513->4506 4517 1008811 free 4513->4517 4514->4507 4518 1005be8 29 API calls 4515->4518 4519 1008340 printf 4516->4519 4517->4506 4518->4509 4520 1007cac printf 4519->4520 4520->4513 4521 10084c3 _exit 4522 10084d0 4521->4522 4523 1006ac5 4524 1006abd 4523->4524 4524->4523 4527 10076eb CryptDecodeObject 4524->4527 4528 1006af6 4527->4528 4529 100771b 4527->4529 4530 100885a 5 API calls 4529->4530 4531 100772c 4530->4531 4532 1007786 printf 4531->4532 4534 1007743 4531->4534 4533 100778e printf 4532->4533 4533->4528 4535 100885a 5 API calls 4534->4535 4536 1007784 4535->4536 4536->4533 4537 1006449 printf 4538 100885a 5 API calls 4537->4538 4539 100647c printf 4538->4539 4540 1007e5a CryptFindOIDInfo 4539->4540 4541 1006499 4540->4541 4542 100885a 5 API calls 4541->4542 4543 10064aa 4542->4543 4552 1008884 4543->4552 4545 10064be 4546 10064d4 4545->4546 4548 10058ed 12 API calls 4545->4548 4557 1007ff1 4546->4557 4548->4546 4549 100652c 4553 100871b 4 API calls 4552->4553 4554 100889f 4553->4554 4555 100871b 4 API calls 4554->4555 4556 10088b8 wprintf 4555->4556 4556->4545 4558 1008015 4557->4558 4559 10064e2 4558->4559 4560 100802a CryptGetOIDFunctionAddress 4558->4560 4559->4549 4569 1007b59 4559->4569 4561 10080b0 4560->4561 4562 100804c 4560->4562 4563 10080ba 4561->4563 4564 1008811 free 4561->4564 4562->4561 4566 10087df 6 API calls 4562->4566 4563->4559 4565 10080bf CryptFreeOIDFunctionAddress 4563->4565 4564->4563 4565->4559 4567 1008077 4566->4567 4567->4561 4567->4563 4568 100809b wprintf 4567->4568 4568->4561 4570 100885a 5 API calls 4569->4570 4571 1007b6b 4570->4571 4572 100826b 9 API calls 4571->4572 4573 1007b7e 4572->4573 4574 1007c0c 4573->4574 4575 1007bae 4573->4575 4577 100885a 5 API calls 4573->4577 4574->4549 4576 1007bd5 4575->4576 4579 100885a 5 API calls 4575->4579 4580 1007c02 4576->4580 4583 100885a 5 API calls 4576->4583 4578 1007b9d 4577->4578 4581 10058ed 12 API calls 4578->4581 4582 1007bc4 4579->4582 4580->4574 4586 1008811 free 4580->4586 4581->4575 4584 10061b4 27 API calls 4582->4584 4585 1007bee 4583->4585 4584->4576 4587 1008340 printf 4585->4587 4586->4574 4588 1007bf6 printf 4587->4588 4588->4580 4589 100684a 4590 1006842 4589->4590 4590->4589 4593 100730e 4590->4593 4594 100826b 9 API calls 4593->4594 4595 1007321 4594->4595 4596 100687b 4595->4596 4597 100885a 5 API calls 4595->4597 4598 1007337 4597->4598 4599 1007535 6 API calls 4598->4599 4600 1007354 4599->4600 4600->4596 4601 1008811 free 4600->4601 4601->4596 4602 1002eca 4603 1002ece CertAddCTLContextToStore 4602->4603 4621 1002ee6 4602->4621 4607 1002ef2 CertSaveStore 4603->4607 4603->4621 4605 1002fc4 CertFreeCTLContext 4606 1002fcd 4605->4606 4608 1002fd2 CertFreeCTLContext 4606->4608 4609 1002fdb 4606->4609 4615 1002f1f 4607->4615 4608->4609 4611 1002fe0 CertFreeCTLContext 4609->4611 4612 1002fe9 4609->4612 4611->4612 4613 1002ff7 4612->4613 4614 1002fee CertFreeCTLContext 4612->4614 4616 1003005 4613->4616 4617 1002ffc CertFreeCTLContext 4613->4617 4614->4613 4618 100885a 5 API calls 4615->4618 4619 1003013 4616->4619 4620 100300a CertFreeCTLContext 4616->4620 4617->4616 4618->4621 4622 1003046 4619->4622 4624 1003040 free 4619->4624 4625 1003026 CertFreeCTLContext 4619->4625 4620->4619 4621->4605 4621->4606 4623 1003073 4622->4623 4626 1003053 CertFreeCTLContext 4622->4626 4627 100306d free 4622->4627 4628 10030a0 4623->4628 4629 1003080 CertFreeCTLContext 4623->4629 4630 100309a free 4623->4630 4624->4622 4625->4624 4625->4625 4626->4626 4626->4627 4627->4623 4631 10030a5 CertCloseStore 4628->4631 4632 10030af 4628->4632 4629->4629 4629->4630 4630->4628 4631->4632 4633 10030c2 4632->4633 4634 100885a 5 API calls 4632->4634 4634->4633 4635 10018cb 4638 10018c6 4635->4638 4637 1001915 4641 1001923 4637->4641 4700 1001d6c 4637->4700 4638->4635 4638->4637 4638->4641 4652 1005710 4638->4652 4656 1001dc7 4638->4656 4642 10019c4 4641->4642 4643 1008811 free 4641->4643 4644 10019d3 4642->4644 4646 1008811 free 4642->4646 4643->4642 4645 10019e2 4644->4645 4647 1008811 free 4644->4647 4648 10019f2 4645->4648 4649 10019eb CryptMsgClose 4645->4649 4646->4644 4647->4645 4650 1001a03 4648->4650 4651 10019f8 CertCloseStore 4648->4651 4649->4648 4651->4650 4653 1005719 4652->4653 4654 1005729 4652->4654 4655 100885a 5 API calls 4653->4655 4654->4638 4655->4654 4657 1008826 5 API calls 4656->4657 4658 1001de6 4657->4658 4659 1008826 5 API calls 4658->4659 4699 1001dea 4658->4699 4660 1001e07 4659->4660 4661 1008826 5 API calls 4660->4661 4660->4699 4662 1001e28 4661->4662 4663 1008826 5 API calls 4662->4663 4662->4699 4664 1001e49 4663->4664 4665 1008826 5 API calls 4664->4665 4664->4699 4666 1001e7d 4665->4666 4667 1008826 5 API calls 4666->4667 4682 1001e81 4666->4682 4668 1001ec1 4667->4668 4669 1008826 5 API calls 4668->4669 4668->4699 4671 1001ee4 4669->4671 4670 1005710 5 API calls 4670->4699 4672 1008826 5 API calls 4671->4672 4671->4699 4673 1001f02 4672->4673 4674 1008826 5 API calls 4673->4674 4673->4699 4675 1001f20 4674->4675 4676 1008826 5 API calls 4675->4676 4675->4699 4677 1001f44 4676->4677 4678 1008826 5 API calls 4677->4678 4677->4699 4679 1001f66 4678->4679 4680 1008826 5 API calls 4679->4680 4679->4682 4681 1001f97 4680->4681 4681->4682 4683 1008826 5 API calls 4681->4683 4682->4670 4682->4699 4684 1001fc8 4683->4684 4685 1008826 5 API calls 4684->4685 4684->4699 4686 1001fea 4685->4686 4686->4682 4687 1008826 5 API calls 4686->4687 4688 100201b 4687->4688 4688->4682 4689 1008826 5 API calls 4688->4689 4690 100205f 4689->4690 4690->4682 4691 1008826 5 API calls 4690->4691 4692 100209d 4691->4692 4692->4682 4693 1008826 5 API calls 4692->4693 4694 10020c7 4693->4694 4694->4682 4695 10020e5 4694->4695 4696 1008826 5 API calls 4695->4696 4697 10020f6 4696->4697 4698 1008826 5 API calls 4697->4698 4697->4699 4698->4699 4699->4638 4701 100885a 5 API calls 4700->4701 4702 1001d7c 4701->4702 4703 100885a 5 API calls 4702->4703 4704 1001d8e 4703->4704 4705 100885a 5 API calls 4704->4705 4706 1001da0 4705->4706 4707 100885a 5 API calls 4706->4707 4708 1001db2 4707->4708 4709 100885a 5 API calls 4708->4709 4710 1001dc4 4709->4710 4710->4641 4711 10065cd 4712 10065c5 4711->4712 4712->4711 4715 1007e14 4712->4715 4716 100826b 9 API calls 4715->4716 4717 1007e26 4716->4717 4718 1006603 4717->4718 4719 100885a 5 API calls 4717->4719 4720 1007e3b 4719->4720 4721 10058ed 12 API calls 4720->4721 4722 1007e4c 4721->4722 4722->4718 4723 1008811 free 4722->4723 4723->4718 3418 1001ad0 GetModuleHandleA 3419 1001aee CryptInitOIDFunctionSet 3418->3419 3423 1001b39 3418->3423 3420 1001b04 3419->3420 3421 1001b0b CryptInstallOIDFunctionAddress 3419->3421 3434 100885a 3420->3434 3421->3420 3425 1001b3f 3421->3425 3425->3423 3426 1001b84 CryptRegisterOIDInfo 3425->3426 3427 100871b 3425->3427 3426->3423 3426->3425 3437 100877a 3427->3437 3429 1008729 3430 1008741 LoadStringA 3429->3430 3431 100872d LoadStringW 3429->3431 3432 1008776 3430->3432 3433 100875d MultiByteToWideChar 3430->3433 3431->3432 3432->3425 3433->3432 3435 100871b 4 API calls 3434->3435 3436 1008874 vwprintf 3435->3436 3436->3423 3438 1008793 GetVersionExA 3437->3438 3439 100878c 3437->3439 3440 10087bc 3438->3440 3439->3429 3440->3429 4724 1002cd5 4725 1002fbf 4724->4725 4726 1002fc4 CertFreeCTLContext 4725->4726 4727 1002fcd 4725->4727 4726->4727 4728 1002fd2 CertFreeCTLContext 4727->4728 4729 1002fdb 4727->4729 4728->4729 4730 1002fe0 CertFreeCTLContext 4729->4730 4731 1002fe9 4729->4731 4730->4731 4732 1002ff7 4731->4732 4733 1002fee CertFreeCTLContext 4731->4733 4734 1003005 4732->4734 4735 1002ffc CertFreeCTLContext 4732->4735 4733->4732 4736 1003013 4734->4736 4737 100300a CertFreeCTLContext 4734->4737 4735->4734 4738 1003046 4736->4738 4740 1003040 free 4736->4740 4741 1003026 CertFreeCTLContext 4736->4741 4737->4736 4739 1003073 4738->4739 4742 1003053 CertFreeCTLContext 4738->4742 4743 100306d free 4738->4743 4744 10030a0 4739->4744 4745 1003080 CertFreeCTLContext 4739->4745 4746 100309a free 4739->4746 4740->4738 4741->4740 4741->4741 4742->4742 4742->4743 4743->4739 4747 10030a5 CertCloseStore 4744->4747 4748 10030af 4744->4748 4745->4745 4745->4746 4746->4744 4747->4748 4749 10030c2 4748->4749 4750 100885a 5 API calls 4748->4750 4750->4749 4751 1006b56 4752 1006b4e 4751->4752 4752->4751 4753 1007cc7 16 API calls 4752->4753 4754 1006d2d 4753->4754 4755 10068d6 4756 10068ce 4755->4756 4756->4755 4759 10071fd 4756->4759 4760 100826b 9 API calls 4759->4760 4761 1007214 4760->4761 4762 100690c 4761->4762 4763 100885a 5 API calls 4761->4763 4764 1007237 4763->4764 4765 100885a 5 API calls 4764->4765 4773 100724d 4764->4773 4765->4773 4766 10072fa 4766->4762 4768 1008811 free 4766->4768 4767 1007261 printf 4767->4773 4768->4762 4769 1007299 printf 4771 10072d2 printf 4769->4771 4769->4773 4770 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 4770->4773 4771->4773 4772 10058ed 12 API calls 4772->4773 4773->4766 4773->4767 4773->4769 4773->4770 4773->4772 4774 1004b5e 4775 100885a 5 API calls 4774->4775 4776 1004b6e 4775->4776 4777 1004bc0 4776->4777 4779 100885a 5 API calls 4776->4779 4778 1004bed 4777->4778 4780 100885a 5 API calls 4777->4780 4781 1005d9d 12 API calls 4778->4781 4782 1004bae 4779->4782 4784 1004bd9 4780->4784 4785 1004bfc 4781->4785 4783 10058ed 12 API calls 4782->4783 4783->4777 4786 1008340 printf 4784->4786 4787 100885a 5 API calls 4785->4787 4788 1004be1 printf 4786->4788 4789 1004c0d 4787->4789 4788->4778 4790 1005d9d 12 API calls 4789->4790 4791 1004c1c 4790->4791 4792 100885a 5 API calls 4791->4792 4793 1004c2d 4792->4793 4814 10082f1 GetSystemTime SystemTimeToFileTime 4793->4814 4796 1004c4c CertGetCRLContextProperty 4798 1005d22 9 API calls 4796->4798 4797 100885a 5 API calls 4799 1004c4a 4797->4799 4800 1004c70 CertGetCRLContextProperty 4798->4800 4799->4796 4801 1005d22 9 API calls 4800->4801 4802 1004c95 4801->4802 4803 1004d04 4802->4803 4804 100885a 5 API calls 4802->4804 4805 100885a 5 API calls 4803->4805 4806 1004cad 4804->4806 4810 1004d2d 4805->4810 4807 100885a 5 API calls 4806->4807 4808 1004ccc printf 4807->4808 4808->4803 4809 1004ce2 4808->4809 4811 100885a 5 API calls 4809->4811 4812 1004cf2 4811->4812 4813 10058ed 12 API calls 4812->4813 4813->4803 4815 1008325 CompareFileTime 4814->4815 4816 100831f 4814->4816 4817 1004c36 4815->4817 4816->4815 4816->4817 4817->4796 4817->4797 4818 100665e 4819 1006656 4818->4819 4819->4818 4820 10077c1 29 API calls 4819->4820 4821 10067a9 4820->4821 4822 1004d61 4823 1004d79 4822->4823 4824 1004ddd 4822->4824 4823->4824 4825 10058ed 12 API calls 4823->4825 4826 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 4823->4826 4828 10059bd 4823->4828 4825->4823 4826->4823 4829 1005ba3 4828->4829 4840 10059d7 4828->4840 4830 1005bb1 4829->4830 4831 1008811 free 4829->4831 4830->4823 4831->4830 4832 1005a02 printf 4832->4840 4834 10058ed 12 API calls 4834->4840 4835 1005bb8 29 API calls 4835->4840 4836 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 4836->4840 4838 100826b 9 API calls 4838->4840 4839 1005d9d 12 API calls 4839->4840 4840->4829 4840->4832 4840->4834 4840->4835 4840->4836 4840->4838 4840->4839 4841 1008811 free 4840->4841 4842 1004440 4840->4842 4865 10081ef 4840->4865 4841->4840 4843 100826b 9 API calls 4842->4843 4844 1004456 4843->4844 4845 100450c 4844->4845 4846 100885a 5 API calls 4844->4846 4845->4840 4847 1004472 4846->4847 4848 100885a 5 API calls 4847->4848 4849 1004485 4848->4849 4850 10061b4 27 API calls 4849->4850 4851 1004495 4850->4851 4852 100885a 5 API calls 4851->4852 4853 10044a5 4852->4853 4854 1008340 printf 4853->4854 4855 10044b0 printf 4854->4855 4856 100885a 5 API calls 4855->4856 4857 10044cc 4856->4857 4858 10059bd 42 API calls 4857->4858 4859 10044dc 4858->4859 4860 1004502 4859->4860 4861 100885a 5 API calls 4859->4861 4860->4845 4863 1008811 free 4860->4863 4862 10044f2 4861->4862 4864 10059bd 42 API calls 4862->4864 4863->4845 4864->4860 4866 1008201 MultiByteToWideChar 4865->4866 4867 100822c 4865->4867 4868 1008250 GetLastError 4866->4868 4869 1008218 4866->4869 4867->4840 4868->4867 4870 10087df 6 API calls 4869->4870 4871 1008223 4870->4871 4871->4867 4872 1008233 MultiByteToWideChar 4871->4872 4872->4867 4873 1008246 4872->4873 4874 1008811 free 4873->4874 4874->4868 4879 1001965 4880 1001996 4879->4880 4881 100885a 5 API calls 4880->4881 4882 10019a1 4881->4882 4883 100885a 5 API calls 4882->4883 4884 10019b3 4883->4884 4885 10019c4 4884->4885 4886 1008811 free 4884->4886 4887 10019d3 4885->4887 4889 1008811 free 4885->4889 4886->4885 4888 10019e2 4887->4888 4890 1008811 free 4887->4890 4891 10019f2 4888->4891 4892 10019eb CryptMsgClose 4888->4892 4889->4887 4890->4888 4893 1001a03 4891->4893 4894 10019f8 CertCloseStore 4891->4894 4892->4891 4894->4893 4895 1001be5 4896 100885a 5 API calls 4895->4896 4897 1001bf7 4896->4897 4898 100885a 5 API calls 4897->4898 4899 1001c09 4898->4899 4900 100885a 5 API calls 4899->4900 4901 1001c1b 4900->4901 4902 100885a 5 API calls 4901->4902 4903 1001c2d 4902->4903 4904 100885a 5 API calls 4903->4904 4905 1001c3f 4904->4905 4906 100885a 5 API calls 4905->4906 4907 1001c51 4906->4907 4908 100885a 5 API calls 4907->4908 4909 1001c63 4908->4909 4910 100885a 5 API calls 4909->4910 4911 1001c75 4910->4911 4938 10088c7 4911->4938 4913 1001c93 4914 100885a 5 API calls 4913->4914 4915 1001ca3 4914->4915 4916 100885a 5 API calls 4915->4916 4917 1001cb5 4916->4917 4918 100885a 5 API calls 4917->4918 4919 1001cc7 4918->4919 4920 100885a 5 API calls 4919->4920 4921 1001cd9 4920->4921 4922 100885a 5 API calls 4921->4922 4923 1001ceb 4922->4923 4924 100885a 5 API calls 4923->4924 4925 1001cfd 4924->4925 4926 100885a 5 API calls 4925->4926 4927 1001d0f 4926->4927 4928 100885a 5 API calls 4927->4928 4929 1001d21 4928->4929 4930 100885a 5 API calls 4929->4930 4931 1001d33 4930->4931 4932 100885a 5 API calls 4931->4932 4933 1001d45 4932->4933 4934 100885a 5 API calls 4933->4934 4935 1001d57 4934->4935 4936 100885a 5 API calls 4935->4936 4937 1001d69 4936->4937 4939 100871b 4 API calls 4938->4939 4940 10088ea 4939->4940 4941 100871b 4 API calls 4940->4941 4942 1008901 4941->4942 4943 100871b 4 API calls 4942->4943 4944 1008918 4943->4944 4945 100871b 4 API calls 4944->4945 4946 1008930 wprintf 4945->4946 4946->4913 4947 1006967 4948 100695f 4947->4948 4948->4947 4951 1006f21 CryptDecodeObject 4948->4951 4952 1006f53 4951->4952 4953 1006998 4951->4953 4954 100885a 5 API calls 4952->4954 4955 1006f63 4954->4955 4956 100885a 5 API calls 4955->4956 4957 1006f82 4956->4957 4958 100885a 5 API calls 4957->4958 4959 1006fa1 printf 4958->4959 4959->4953 4960 10050e8 4961 10050b5 4960->4961 4961->4960 4962 1007e5a CryptFindOIDInfo 4961->4962 4963 1008811 free 4961->4963 4964 10058ed 12 API calls 4961->4964 4965 10051a4 CryptMsgGetAndVerifySigner 4961->4965 4966 10051e4 CertFreeCTLContext 4961->4966 4968 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 4961->4968 4969 10059bd 43 API calls 4961->4969 4970 1005280 4961->4970 4971 1008186 9 API calls 4961->4971 4962->4961 4963->4961 4964->4961 4965->4961 4972 1008186 CryptMsgGetParam 4966->4972 4968->4961 4969->4961 4971->4961 4973 10081a7 4972->4973 4974 10081d9 4972->4974 4973->4974 4975 10087df 6 API calls 4973->4975 4974->4961 4976 10081b9 4975->4976 4976->4974 4977 10081bf CryptMsgGetParam 4976->4977 4977->4974 4978 10081d3 4977->4978 4979 1008811 free 4978->4979 4979->4974 4984 100506b 4985 100885a 5 API calls 4984->4985 4986 100507b 4985->4986 4987 1002ced 4988 10030e4 4987->4988 4989 1002cfa CertFindCertificateInStore 4987->4989 4991 1003104 4988->4991 4992 10030ed 4988->4992 4990 1002d2f CertAddCertificateContextToStore 4989->4990 4993 1002d23 4989->4993 4990->4993 4994 1002d45 CertFreeCTLContext 4990->4994 4996 1003f3f 11 API calls 4991->4996 4995 1003f3f 11 API calls 4992->4995 4997 1002fc4 CertFreeCTLContext 4993->4997 4998 1002fcd 4993->4998 4999 1002d51 4994->4999 5008 10030fe 4995->5008 4996->5008 4997->4998 5000 1002fd2 CertFreeCTLContext 4998->5000 5001 1002fdb 4998->5001 5002 1002e1c 4999->5002 5005 1002db0 4999->5005 5006 1002d67 4999->5006 5000->5001 5003 1002fe0 CertFreeCTLContext 5001->5003 5004 1002fe9 5001->5004 5007 1002ef2 CertSaveStore 5002->5007 5013 1002e32 CertFindCTLInStore 5002->5013 5003->5004 5010 1002ff7 5004->5010 5011 1002fee CertFreeCTLContext 5004->5011 5014 10040a4 7 API calls 5005->5014 5009 1003a45 12 API calls 5006->5009 5019 1002f1f 5007->5019 5008->4993 5008->4999 5021 1003ced 6 API calls 5008->5021 5026 100313d 5008->5026 5016 1002d7f 5009->5016 5017 1003005 5010->5017 5018 1002ffc CertFreeCTLContext 5010->5018 5011->5010 5013->4993 5020 1002e6a CertAddCTLContextToStore 5013->5020 5031 1002dc0 5014->5031 5015 1003168 CertAddCertificateContextToStore 5015->4993 5015->4999 5016->4993 5022 1002d94 CertAddCTLContextToStore 5016->5022 5023 1003013 5017->5023 5024 100300a CertFreeCTLContext 5017->5024 5018->5017 5029 100885a 5 API calls 5019->5029 5020->4993 5025 1002e7a CertFreeCTLContext 5020->5025 5021->5026 5022->4993 5027 1002da4 CertFreeCTLContext 5022->5027 5028 1003046 5023->5028 5032 1003040 free 5023->5032 5033 1003026 CertFreeCTLContext 5023->5033 5024->5023 5025->4993 5025->5007 5026->4993 5026->5015 5027->5002 5030 1003073 5028->5030 5034 1003053 CertFreeCTLContext 5028->5034 5035 100306d free 5028->5035 5029->4993 5037 10030a0 5030->5037 5039 1003080 CertFreeCTLContext 5030->5039 5040 100309a free 5030->5040 5031->4993 5031->5002 5038 1003db3 45 API calls 5031->5038 5043 1002ddc 5031->5043 5032->5028 5033->5032 5033->5033 5034->5034 5034->5035 5035->5030 5036 1002e03 CertAddCTLContextToStore 5036->4993 5036->5002 5041 10030a5 CertCloseStore 5037->5041 5042 10030af 5037->5042 5038->5043 5039->5039 5039->5040 5040->5037 5041->5042 5044 10030c2 5042->5044 5045 100885a 5 API calls 5042->5045 5043->4993 5043->5036 5045->5044 5050 10045f3 CryptHashPublicKeyInfo 5051 100885a 5 API calls 5050->5051 5052 100462b 5051->5052 5053 1005d22 9 API calls 5052->5053 5054 100463e CryptReleaseContext CertGetCertificateContextProperty 5053->5054 5055 1004663 5054->5055 5056 1004737 5054->5056 5058 10087df 6 API calls 5055->5058 5057 1005d9d 12 API calls 5056->5057 5059 1004743 5057->5059 5065 100466d 5058->5065 5060 100885a 5 API calls 5059->5060 5061 1004754 5060->5061 5062 1005d9d 12 API calls 5061->5062 5063 1004763 5062->5063 5067 100885a 5 API calls 5063->5067 5064 1004731 5066 1008811 free 5064->5066 5065->5056 5065->5064 5068 100885a 5 API calls 5065->5068 5066->5056 5069 1004774 5067->5069 5070 100469c 5068->5070 5072 100478b 5069->5072 5165 1005efb CertEnumCertificateContextProperties 5069->5165 5071 10046b7 5070->5071 5074 100885a 5 API calls 5070->5074 5075 10046d2 5071->5075 5077 100885a 5 API calls 5071->5077 5076 100885a 5 API calls 5072->5076 5146 1004b0c 5072->5146 5074->5071 5078 10046ec 5075->5078 5080 100885a 5 API calls 5075->5080 5079 10047a8 5076->5079 5077->5075 5081 1004707 5078->5081 5083 100885a 5 API calls 5078->5083 5085 100885a 5 API calls 5079->5085 5080->5078 5082 1004725 printf 5081->5082 5084 100885a 5 API calls 5081->5084 5082->5064 5083->5081 5086 1004722 5084->5086 5087 10047ca 5085->5087 5086->5082 5088 1007e5a CryptFindOIDInfo 5087->5088 5089 10047d4 printf 5088->5089 5090 10047f3 5089->5090 5091 1004814 5089->5091 5092 100885a 5 API calls 5090->5092 5093 100885a 5 API calls 5091->5093 5094 1004803 5092->5094 5095 1004838 5093->5095 5096 10058ed 12 API calls 5094->5096 5097 1007e5a CryptFindOIDInfo 5095->5097 5096->5091 5098 1004844 printf 5097->5098 5177 1008168 CryptFindOIDInfo 5098->5177 5101 100492f 5102 100885a 5 API calls 5101->5102 5104 100493f CertGetPublicKeyLength 5102->5104 5103 100885a 5 API calls 5105 100487c 5103->5105 5106 1004958 5104->5106 5107 1004969 5104->5107 5108 10058ed 12 API calls 5105->5108 5109 100885a 5 API calls 5106->5109 5110 100498a printf 5107->5110 5112 100885a 5 API calls 5107->5112 5111 100488d 5108->5111 5109->5107 5113 10049a5 5110->5113 5111->5101 5116 100826b 9 API calls 5111->5116 5114 1004987 5112->5114 5115 10058ed 12 API calls 5113->5115 5114->5110 5117 10049af 5115->5117 5118 10048ae 5116->5118 5119 1004a0b 5117->5119 5122 10049c1 5117->5122 5118->5101 5120 100885a 5 API calls 5118->5120 5121 100885a 5 API calls 5119->5121 5123 10048cd 5120->5123 5124 1004a1b 5121->5124 5125 100885a 5 API calls 5122->5125 5154 1004a4a 5122->5154 5126 100885a 5 API calls 5123->5126 5128 100826b 9 API calls 5124->5128 5129 10049de 5125->5129 5130 10048e0 5126->5130 5132 1004a31 5128->5132 5133 100826b 9 API calls 5129->5133 5134 10058ed 12 API calls 5130->5134 5139 10058ed 12 API calls 5132->5139 5132->5154 5136 10049f4 5133->5136 5137 10048ed 5134->5137 5135 1004abc 5140 100885a 5 API calls 5135->5140 5135->5146 5142 10058ed 12 API calls 5136->5142 5136->5154 5141 100885a 5 API calls 5137->5141 5138 100885a 5 API calls 5144 1004a85 5138->5144 5150 1004a06 5139->5150 5148 1004ad5 5140->5148 5143 10048fd 5141->5143 5142->5150 5151 10058ed 12 API calls 5143->5151 5145 1004aa5 printf 5144->5145 5152 100885a 5 API calls 5144->5152 5153 10058ed 12 API calls 5145->5153 5147 1008811 free 5147->5154 5149 1004af5 printf 5148->5149 5155 100885a 5 API calls 5148->5155 5156 10058ed 12 API calls 5149->5156 5150->5147 5157 100490b 5151->5157 5158 1004aa2 5152->5158 5153->5135 5179 1006045 5154->5179 5159 1004af2 5155->5159 5156->5146 5160 100885a 5 API calls 5157->5160 5158->5145 5159->5149 5161 100491b 5160->5161 5162 10058ed 12 API calls 5161->5162 5163 1004929 5162->5163 5164 1008811 free 5163->5164 5164->5101 5166 1005fd1 5165->5166 5174 1005f17 5165->5174 5166->5072 5167 1005fbb CertEnumCertificateContextProperties 5167->5166 5167->5174 5168 100885a 5 API calls 5169 1005f3e CertGetCertificateContextProperty 5168->5169 5169->5174 5170 10087df 6 API calls 5170->5174 5171 1005f61 CertGetCertificateContextProperty 5171->5174 5172 10058ed 12 API calls 5172->5174 5173 1008811 free 5173->5174 5174->5167 5174->5168 5174->5170 5174->5171 5174->5172 5174->5173 5175 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 5174->5175 5176 1005fd8 10 API calls 5174->5176 5175->5174 5176->5174 5178 100485c 5177->5178 5178->5101 5178->5103 5180 100826b 9 API calls 5179->5180 5181 1006059 5180->5181 5182 1004a6c 5181->5182 5183 100885a 5 API calls 5181->5183 5182->5135 5182->5138 5184 1006081 5183->5184 5185 1007e5a CryptFindOIDInfo 5184->5185 5186 100608b printf 5185->5186 5187 10060c4 5186->5187 5188 10060a6 5186->5188 5189 1006195 5187->5189 5190 10060ce 5187->5190 5191 100885a 5 API calls 5188->5191 5194 100885a 5 API calls 5189->5194 5192 100885a 5 API calls 5190->5192 5193 10060b6 5191->5193 5195 10060de 5192->5195 5196 10058ed 12 API calls 5193->5196 5216 1006193 5194->5216 5197 10058ed 12 API calls 5195->5197 5196->5187 5199 10060ec 5197->5199 5198 1008811 free 5198->5182 5217 100812a CryptFindOIDInfo 5199->5217 5201 10060fa 5202 100826b 9 API calls 5201->5202 5201->5216 5203 1006130 5202->5203 5204 1006171 5203->5204 5205 100613c 5203->5205 5203->5216 5206 100885a 5 API calls 5204->5206 5207 100885a 5 API calls 5205->5207 5209 1006167 5206->5209 5208 100614c 5207->5208 5210 10058ed 12 API calls 5208->5210 5212 10058ed 12 API calls 5209->5212 5211 1006157 5210->5211 5213 100885a 5 API calls 5211->5213 5214 100618d 5212->5214 5213->5209 5215 1008811 free 5214->5215 5215->5216 5216->5198 5218 100814c 5217->5218 5218->5201 5219 10069f3 5220 10069eb 5219->5220 5220->5219 5223 1006e49 5220->5223 5224 100826b 9 API calls 5223->5224 5226 1006e64 5224->5226 5225 1006f0a 5227 1006a24 5225->5227 5229 1008811 free 5225->5229 5226->5225 5228 100885a 5 API calls 5226->5228 5230 1006e7e CertRDNValueToStrW 5228->5230 5229->5227 5231 1006eb3 5230->5231 5232 1006e97 5230->5232 5234 100885a 5 API calls 5231->5234 5233 10087df 6 API calls 5232->5233 5235 1006ea4 5233->5235 5236 1006ec5 5234->5236 5235->5231 5237 1006eac CertRDNValueToStrW 5235->5237 5238 1006ee0 5236->5238 5239 1006ecf wprintf 5236->5239 5237->5231 5241 100885a 5 API calls 5238->5241 5240 1006ef0 printf 5239->5240 5240->5225 5242 1006f04 5240->5242 5241->5240 5243 1008811 free 5242->5243 5243->5225 5244 1004b7b printf 5245 1004b98 5244->5245 5246 1004b7a 5244->5246 5247 1004bc0 5245->5247 5249 100885a 5 API calls 5245->5249 5246->5244 5248 1004bed 5247->5248 5250 100885a 5 API calls 5247->5250 5251 1005d9d 12 API calls 5248->5251 5252 1004bae 5249->5252 5254 1004bd9 5250->5254 5255 1004bfc 5251->5255 5253 10058ed 12 API calls 5252->5253 5253->5247 5256 1008340 printf 5254->5256 5257 100885a 5 API calls 5255->5257 5258 1004be1 printf 5256->5258 5259 1004c0d 5257->5259 5258->5248 5260 1005d9d 12 API calls 5259->5260 5261 1004c1c 5260->5261 5262 100885a 5 API calls 5261->5262 5263 1004c2d 5262->5263 5264 10082f1 3 API calls 5263->5264 5265 1004c36 5264->5265 5266 1004c4c CertGetCRLContextProperty 5265->5266 5267 100885a 5 API calls 5265->5267 5268 1005d22 9 API calls 5266->5268 5269 1004c4a 5267->5269 5270 1004c70 CertGetCRLContextProperty 5268->5270 5269->5266 5271 1005d22 9 API calls 5270->5271 5272 1004c95 5271->5272 5273 1004d04 5272->5273 5274 100885a 5 API calls 5272->5274 5275 100885a 5 API calls 5273->5275 5276 1004cad 5274->5276 5280 1004d2d 5275->5280 5277 100885a 5 API calls 5276->5277 5278 1004ccc printf 5277->5278 5278->5273 5279 1004ce2 5278->5279 5281 100885a 5 API calls 5279->5281 5282 1004cf2 5281->5282 5283 10058ed 12 API calls 5282->5283 5283->5273 3449 100197f 3450 1001988 3449->3450 3456 1001a09 3449->3456 3452 1001991 3450->3452 3450->3456 3451 1001a42 3453 1001a55 3451->3453 3474 1003185 3451->3474 3455 100885a 5 API calls 3452->3455 3459 10019a1 3453->3459 3580 1002798 3453->3580 3455->3459 3456->3451 3456->3459 3556 1004277 3456->3556 3461 100885a 5 API calls 3459->3461 3463 10019b3 3461->3463 3462 100885a 5 API calls 3462->3451 3464 10019c4 3463->3464 3553 1008811 3463->3553 3466 10019d3 3464->3466 3468 1008811 free 3464->3468 3467 10019e2 3466->3467 3469 1008811 free 3466->3469 3470 10019f2 3467->3470 3471 10019eb CryptMsgClose 3467->3471 3468->3466 3469->3467 3472 1001a03 3470->3472 3473 10019f8 CertCloseStore 3470->3473 3471->3470 3473->3472 3475 10031c5 3474->3475 3476 10035ef 3474->3476 3475->3476 3477 10031d2 3475->3477 3478 100885a 5 API calls 3476->3478 3479 10031f3 CertOpenStore 3477->3479 3480 1003229 3477->3480 3538 10035e8 3478->3538 3481 100321b 3479->3481 3495 100320f 3479->3495 3485 1003251 3480->3485 3486 1003268 3480->3486 3480->3495 3496 1003258 3480->3496 3687 1003b26 3481->3687 3483 1003512 3487 1003522 3483->3487 3488 100351d CertFreeCTLContext 3483->3488 3484 100350d CertFreeCTLContext 3484->3483 3704 1003c14 3485->3704 3491 1003275 CertFindCertificateInStore 3486->3491 3492 100360a 3486->3492 3497 1003530 3487->3497 3498 1003527 CertFreeCTLContext 3487->3498 3488->3487 3490 10032de 3490->3495 3499 10033cb 3490->3499 3506 10033c3 3490->3506 3507 10033df 3490->3507 3491->3495 3500 10032aa CertDeleteCTLFromStore 3491->3500 3669 1003f3f 3492->3669 3493 10032f2 3502 1003334 3493->3502 3503 10032fb 3493->3503 3494 10032d6 3501 1003c14 12 API calls 3494->3501 3495->3483 3495->3484 3496->3490 3496->3493 3496->3494 3496->3495 3505 1003563 3497->3505 3511 1003545 CertFreeCTLContext 3497->3511 3512 100355b free 3497->3512 3498->3497 3499->3495 3509 10034ae 3499->3509 3769 10037ec 3499->3769 3500->3495 3500->3496 3501->3490 3734 10040a4 3502->3734 3721 1003a45 3503->3721 3514 100358e 3505->3514 3523 1003570 CertFreeCTLContext 3505->3523 3524 1003586 free 3505->3524 3517 1003c14 12 API calls 3506->3517 3518 10033e8 CertFindCTLInStore 3507->3518 3519 100342b 3507->3519 3509->3495 3516 10034c9 3509->3516 3799 10039bf wcslen CertEnumCertificatesInStore 3509->3799 3511->3511 3511->3512 3512->3505 3525 10035bd 3514->3525 3532 10035b5 free 3514->3532 3533 100359b CertFreeCTLContext 3514->3533 3516->3495 3650 10036b8 3516->3650 3517->3499 3518->3495 3527 100341b CertDeleteCTLFromStore 3518->3527 3757 1004193 3519->3757 3522 1003324 CertDeleteCTLFromStore 3522->3490 3522->3495 3523->3523 3523->3524 3524->3514 3534 10035d5 3525->3534 3537 10035c8 CertCloseStore 3525->3537 3527->3495 3527->3499 3530 1003357 CertDuplicateCTLContext 3536 1003396 CertDeleteCTLFromStore 3530->3536 3531 1003369 3531->3490 3747 1003db3 3531->3747 3532->3525 3533->3532 3533->3533 3534->3538 3543 100885a 5 API calls 3534->3543 3536->3490 3536->3495 3537->3534 3538->3453 3539 100344e CertDuplicateCTLContext 3544 100348d CertDeleteCTLFromStore 3539->3544 3540 100365d CertDuplicateCertificateContext 3545 100369e CertDeleteCTLFromStore 3540->3545 3541 100366f 3541->3496 3807 1003ced 3541->3807 3543->3538 3544->3495 3544->3499 3545->3495 3545->3496 3548 100337e CertDuplicateCTLContext 3548->3536 3549 1003460 3549->3495 3549->3499 3551 1003475 CertDuplicateCTLContext 3549->3551 3551->3544 3552 1003686 CertDuplicateCertificateContext 3552->3545 3554 1008823 3553->3554 3555 1008818 free 3553->3555 3554->3464 3555->3554 3557 100429b 3556->3557 3574 1004303 3556->3574 3558 10042a3 CertEnumCertificatesInStore 3557->3558 3578 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 3557->3578 3558->3557 3560 10042ec 3558->3560 3559 100431c CertEnumCTLsInStore 3564 1004365 3559->3564 3559->3574 3565 100885a 5 API calls 3560->3565 3560->3574 3561 1004410 CertFreeCTLContext 3562 1004417 3561->3562 3566 1004422 3562->3566 3567 100441b CertFreeCTLContext 3562->3567 3563 100439b CertGetCRLFromStore 3568 10043f3 3563->3568 3577 100437c 3563->3577 3569 100885a 5 API calls 3564->3569 3564->3577 3565->3574 3571 1001a2a 3566->3571 3572 1004429 CertFreeCTLContext 3566->3572 3567->3566 3573 100885a 5 API calls 3568->3573 3575 100440a 3568->3575 3569->3577 3570 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 3570->3577 3571->3459 3571->3462 3572->3571 3573->3575 3574->3559 3574->3577 3579 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 3574->3579 3575->3561 3575->3562 3576 1004de4 44 API calls 3576->3577 3577->3563 3577->3570 3577->3575 3577->3576 3578->3557 3579->3574 3581 10027d4 3580->3581 3582 1002baa 3580->3582 3581->3582 3584 10027e1 CertOpenStore 3581->3584 3583 100885a 5 API calls 3582->3583 3640 1002ba3 3583->3640 3585 1002805 3584->3585 3631 10027f9 3584->3631 3586 1002828 3585->3586 3590 1002838 3585->3590 3591 100281d 3585->3591 3589 10028bb 3586->3589 3595 10028b0 3586->3595 3596 10028cf 3586->3596 3586->3631 3587 1002ad8 3597 1002ae6 3587->3597 3598 1002add CertFreeCTLContext 3587->3598 3588 1002acf CertFreeCTLContext 3588->3587 3592 10029a8 3589->3592 3600 10029bc 3589->3600 3601 100299d 3589->3601 3589->3631 3593 1002bc5 3590->3593 3594 1002845 CertFindCertificateInStore 3590->3594 3599 1003b26 9 API calls 3591->3599 3603 1002a8d 3592->3603 3610 10037ec 20 API calls 3592->3610 3592->3631 3621 1003f3f 11 API calls 3593->3621 3602 1002878 CertAddCertificateContextToStore 3594->3602 3594->3631 3604 1003b26 9 API calls 3595->3604 3607 1002920 3596->3607 3608 10028d8 3596->3608 3605 1002af4 3597->3605 3606 1002aeb CertFreeCTLContext 3597->3606 3598->3597 3599->3586 3613 10029c5 CertFindCTLInStore 3600->3613 3614 1002a18 3600->3614 3611 1003b26 9 API calls 3601->3611 3612 100288f CertFreeCTLContext 3602->3612 3602->3631 3619 10039bf 6 API calls 3603->3619 3603->3631 3632 1002aaa 3603->3632 3604->3589 3615 1002b27 3605->3615 3624 1002b21 free 3605->3624 3625 1002b07 CertFreeCTLContext 3605->3625 3606->3605 3609 10040a4 7 API calls 3607->3609 3616 1003a45 12 API calls 3608->3616 3630 100292e 3609->3630 3610->3603 3611->3592 3612->3586 3622 10029fb CertAddCTLContextToStore 3613->3622 3613->3631 3623 1004193 7 API calls 3614->3623 3618 1002b54 3615->3618 3627 1002b34 CertFreeCTLContext 3615->3627 3628 1002b4e free 3615->3628 3617 10028ee 3616->3617 3626 1002903 CertAddCTLContextToStore 3617->3626 3617->3631 3629 1002b81 3618->3629 3635 1002b61 CertFreeCTLContext 3618->3635 3636 1002b7b free 3618->3636 3619->3632 3620 10036b8 63 API calls 3620->3631 3645 1002be8 3621->3645 3622->3631 3633 1002a0c CertFreeCTLContext 3622->3633 3642 1002a26 3623->3642 3624->3615 3625->3624 3625->3625 3626->3631 3634 1002914 CertFreeCTLContext 3626->3634 3627->3627 3627->3628 3628->3618 3637 1002b90 3629->3637 3638 1002b86 CertCloseStore 3629->3638 3630->3589 3630->3631 3643 1003db3 45 API calls 3630->3643 3647 1002944 3630->3647 3631->3587 3631->3588 3632->3620 3632->3631 3633->3592 3634->3589 3635->3635 3635->3636 3636->3629 3637->3640 3644 100885a 5 API calls 3637->3644 3638->3637 3639 100296f CertAddCTLContextToStore 3639->3589 3639->3631 3640->3459 3641 1002a67 CertAddCTLContextToStore 3641->3592 3641->3631 3642->3592 3642->3631 3642->3641 3643->3647 3644->3640 3645->3586 3645->3631 3648 1003ced 6 API calls 3645->3648 3649 1002c18 3645->3649 3646 1002c45 CertAddCertificateContextToStore 3646->3586 3646->3631 3647->3631 3647->3639 3648->3649 3649->3631 3649->3646 3651 10036e6 3650->3651 3652 10036cd 3650->3652 3654 100376d CertOpenStore 3651->3654 3655 10036fb 3651->3655 3653 100885a 5 API calls 3652->3653 3656 10036dd 3653->3656 3660 10037b0 3654->3660 3664 10037a9 3654->3664 3658 100373a 3655->3658 3816 1002558 3655->3816 3656->3495 3663 1003754 CertSaveStore 3658->3663 3658->3664 3661 1003b26 9 API calls 3660->3661 3661->3664 3663->3664 3665 100885a 5 API calls 3664->3665 3666 10037cd 3664->3666 3665->3666 3666->3656 3668 10037d9 CertCloseStore 3666->3668 3667 1003b26 9 API calls 3667->3658 3668->3656 3670 1003f5a 3669->3670 3671 100362e 3669->3671 3670->3671 3672 1003fd0 CertFindCertificateInStore 3670->3672 3673 1003f6f CertEnumCertificatesInStore 3670->3673 3671->3495 3671->3540 3671->3541 3674 1003fef 3672->3674 3686 1003fce 3672->3686 3675 1003f83 3673->3675 3673->3686 3677 1003ff1 realloc 3674->3677 3676 1003f85 realloc 3675->3676 3678 1003fa0 CertDuplicateCertificateContext 3676->3678 3676->3686 3679 1004008 CertDuplicateCertificateContext 3677->3679 3677->3686 3681 1003fbb CertEnumCertificatesInStore 3678->3681 3678->3686 3682 100401f CertFindCertificateInStore 3679->3682 3679->3686 3680 1004077 3680->3671 3683 100408d CertFreeCTLContext 3680->3683 3681->3676 3681->3686 3682->3677 3682->3686 3683->3671 3684 100406e free 3684->3680 3685 1004061 CertFreeCTLContext 3685->3686 3686->3680 3686->3684 3686->3685 3688 1003b45 CertEnumCertificatesInStore 3687->3688 3698 1003b6e 3687->3698 3690 1003b57 CertAddCertificateContextToStore 3688->3690 3688->3698 3690->3688 3692 1003bdc 3690->3692 3691 1003b7e CertEnumCTLsInStore 3693 1003b87 CertAddCTLContextToStore 3691->3693 3699 1003ba0 3691->3699 3696 1003be7 CertFreeCTLContext 3692->3696 3697 1003bee 3692->3697 3693->3692 3693->3698 3694 1003bb5 CertGetCRLFromStore 3694->3692 3695 1003bbe CertAddCTLContextToStore 3694->3695 3695->3692 3695->3699 3696->3697 3700 1003bf3 CertFreeCTLContext 3697->3700 3701 1003bfc 3697->3701 3698->3691 3698->3699 3699->3692 3699->3694 3700->3701 3702 1003c01 CertFreeCTLContext 3701->3702 3703 1003c0a 3701->3703 3702->3703 3703->3480 3705 1003c33 CertEnumCertificatesInStore 3704->3705 3706 1003c55 3704->3706 3705->3706 3707 1003c41 CertDuplicateCertificateContext CertDeleteCTLFromStore 3705->3707 3709 1003c80 3706->3709 3711 1003c5e CertEnumCTLsInStore 3706->3711 3708 1003cb7 3707->3708 3710 1003c53 3707->3710 3714 1003cc3 CertFreeCTLContext 3708->3714 3715 1003cca 3708->3715 3709->3708 3713 1003c8e CertGetCRLFromStore 3709->3713 3710->3705 3711->3709 3712 1003c6b CertDuplicateCTLContext CertDeleteCTLFromStore 3711->3712 3712->3706 3712->3708 3713->3708 3716 1003c9d CertDuplicateCTLContext CertDeleteCTLFromStore 3713->3716 3714->3715 3717 1003cd5 3715->3717 3718 1003cce CertFreeCTLContext 3715->3718 3716->3708 3716->3709 3719 1003ce0 3717->3719 3720 1003cd9 CertFreeCTLContext 3717->3720 3718->3717 3719->3496 3720->3719 3722 1003a63 3721->3722 3723 1003311 3721->3723 3722->3723 3724 1003a6f CertGetCRLFromStore 3722->3724 3723->3495 3723->3522 3725 1003aee 3724->3725 3733 1003a85 3724->3733 3726 1003b06 3725->3726 3728 1008811 free 3725->3728 3726->3723 3729 1003b10 CertFreeCTLContext 3726->3729 3727 1003a8b CertGetCRLContextProperty 3727->3725 3727->3733 3728->3726 3729->3723 3730 10087df 6 API calls 3730->3733 3731 1003aac CertGetCRLContextProperty 3731->3725 3731->3733 3732 1003ad6 CertGetCRLFromStore 3732->3725 3732->3727 3733->3725 3733->3727 3733->3730 3733->3731 3733->3732 3735 10040c3 3734->3735 3744 1003342 3734->3744 3736 10040ce CertGetCRLFromStore 3735->3736 3735->3744 3737 10040e8 3736->3737 3741 1004130 3736->3741 3738 10040ea realloc 3737->3738 3740 1004101 CertDuplicateCTLContext 3738->3740 3738->3741 3739 1004166 3739->3744 3745 100417c CertFreeCTLContext 3739->3745 3740->3741 3742 1004118 CertGetCRLFromStore 3740->3742 3741->3739 3743 100415d free 3741->3743 3746 1004150 CertFreeCTLContext 3741->3746 3742->3738 3742->3741 3743->3739 3744->3495 3744->3530 3744->3531 3745->3744 3746->3741 3748 1003dc2 3747->3748 3756 100337a 3747->3756 3749 1003e06 3748->3749 3750 100885a 5 API calls 3748->3750 3754 1003e4c 3748->3754 3748->3756 3938 1004de4 3748->3938 3751 100885a 5 API calls 3749->3751 3750->3748 3752 1003e35 scanf 3751->3752 3752->3754 3755 100885a 5 API calls 3754->3755 3754->3756 3755->3756 3756->3495 3756->3548 3758 10041ae 3757->3758 3766 1003439 3757->3766 3759 10041b9 CertEnumCTLsInStore 3758->3759 3758->3766 3760 10041d0 realloc 3759->3760 3764 100420e 3759->3764 3761 10041e7 CertDuplicateCTLContext 3760->3761 3760->3764 3762 10041ff CertEnumCTLsInStore 3761->3762 3761->3764 3762->3760 3762->3764 3763 100424a 3765 1004260 CertFreeCTLContext 3763->3765 3763->3766 3764->3763 3767 1004241 free 3764->3767 3768 1004234 CertFreeCTLContext 3764->3768 3765->3766 3766->3495 3766->3539 3766->3549 3767->3763 3768->3764 4054 100894a 3769->4054 3771 1003835 strtok 3772 1003819 3771->3772 3774 1003844 3771->3774 3772->3771 3791 100381d 3772->3791 3773 10087df 6 API calls 3775 1003891 3773->3775 3774->3773 3776 100396c 3774->3776 3780 1003916 CertEnumCertificatesInStore 3774->3780 3775->3776 3778 10087df 6 API calls 3775->3778 3777 1003980 3776->3777 3781 1008811 free 3776->3781 3779 100399a 3777->3779 3784 1003994 3777->3784 3787 1008811 free 3777->3787 3782 10038ad CryptEncodeObject 3778->3782 3785 10039a7 3779->3785 3789 1008811 free 3779->3789 3780->3776 3794 1003929 3780->3794 3781->3777 3782->3776 3786 10038f4 3782->3786 3788 1008811 free 3784->3788 3785->3791 3792 10039ac CertFreeCTLContext 3785->3792 3793 10087df 6 API calls 3786->3793 3787->3784 3788->3779 3789->3785 3790 100392f CertSetCertificateContextProperty 3790->3776 3790->3794 3791->3509 3792->3791 3795 10038fe 3793->3795 3794->3790 3796 1003941 CertSetCertificateContextProperty 3794->3796 3797 100395d CertEnumCertificatesInStore 3794->3797 3795->3776 3798 1003905 CryptEncodeObject 3795->3798 3796->3776 3796->3797 3797->3776 3797->3790 3798->3776 3798->3780 3800 1003a29 3799->3800 3801 10039fb 3799->3801 3803 1003a34 CertFreeCTLContext 3800->3803 3804 1003a3b 3800->3804 3802 1003a01 CertSetCertificateContextProperty 3801->3802 3802->3800 3805 1003a0e CertSetCertificateContextProperty 3802->3805 3803->3804 3804->3516 3805->3800 3806 1003a1d CertEnumCertificatesInStore 3805->3806 3806->3800 3806->3802 3808 1003682 3807->3808 3814 1003cfc 3807->3814 3808->3495 3808->3552 3809 1003d40 3811 100885a 5 API calls 3809->3811 3810 100885a 5 API calls 3810->3814 3812 1003d6f scanf 3811->3812 3813 1003d86 3812->3813 3813->3808 3815 100885a 5 API calls 3813->3815 3814->3808 3814->3809 3814->3810 3814->3813 3815->3808 3817 1002574 3816->3817 3818 1002781 3816->3818 3817->3818 3819 1002582 CertOpenStore 3817->3819 3821 1002600 3817->3821 3822 1002597 3817->3822 3818->3658 3818->3667 3827 100260c 3819->3827 3847 10056a4 3821->3847 3822->3819 3824 100259e CertOpenStore 3822->3824 3826 10025c0 3824->3826 3824->3827 3826->3827 3828 10025cd CertCloseStore 3826->3828 3827->3818 3829 1008811 free 3827->3829 3831 1002770 CertOpenStore 3828->3831 3829->3818 3831->3827 3835 1002690 CertOpenStore 3835->3827 3836 10026ad 3835->3836 3874 10052a5 CryptSIPRetrieveSubjectGuid 3836->3874 3841 10026d7 CertOpenStore 3841->3827 3842 10026f6 CertAddEncodedCTLToStore 3841->3842 3842->3827 3843 1002710 CertAddEncodedCRLToStore 3842->3843 3843->3827 3844 100272a CertAddEncodedCertificateToStore 3843->3844 3844->3827 3845 1002744 CertCloseStore CertOpenStore 3844->3845 3845->3827 3846 1002762 3845->3846 3846->3831 3898 10089cf 3847->3898 3850 10056c0 CertOpenStore 3852 10056d6 CertAddEncodedCTLToStore 3850->3852 3853 10056fa 3850->3853 3851 1002606 3851->3827 3856 10055cc 3851->3856 3852->3853 3854 10056f0 CertCloseStore 3852->3854 3853->3851 3855 10056ff UnmapViewOfFile 3853->3855 3854->3853 3855->3851 3857 10089cf 9 API calls 3856->3857 3858 10055e0 3857->3858 3859 10055e8 CertOpenStore 3858->3859 3862 1002636 3858->3862 3860 1005622 3859->3860 3861 10055fe CertAddEncodedCRLToStore 3859->3861 3860->3862 3864 1005627 UnmapViewOfFile 3860->3864 3861->3860 3863 1005618 CertCloseStore 3861->3863 3862->3827 3865 1005638 3862->3865 3863->3860 3864->3862 3866 10089cf 9 API calls 3865->3866 3867 100564c 3866->3867 3868 1005654 CertOpenStore 3867->3868 3873 1002666 3867->3873 3869 100566a CertAddEncodedCertificateToStore 3868->3869 3870 100568e 3868->3870 3869->3870 3871 1005684 CertCloseStore 3869->3871 3872 1005693 UnmapViewOfFile 3870->3872 3870->3873 3871->3870 3872->3873 3873->3827 3873->3835 3875 10052d6 CryptSIPLoad 3874->3875 3877 1005411 3874->3877 3876 10052fd 3875->3876 3875->3877 3876->3877 3880 1005354 3876->3880 3878 10026b5 3877->3878 3879 1008811 free 3877->3879 3878->3827 3889 100555c 3878->3889 3879->3878 3914 10087df malloc 3880->3914 3883 1005385 CertOpenStore 3883->3877 3884 10053a2 3883->3884 3885 10053b8 CryptMsgOpenToDecode 3884->3885 3886 10053e1 CryptMsgUpdate 3885->3886 3887 10053d4 CertCloseStore 3885->3887 3886->3877 3888 10053f4 CertCloseStore CryptMsgClose 3886->3888 3887->3877 3888->3877 3890 10089cf 9 API calls 3889->3890 3891 100557a 3890->3891 3892 10026cf 3891->3892 3918 1005428 3891->3918 3892->3827 3892->3841 3895 10055af 3895->3892 3897 10055bc UnmapViewOfFile 3895->3897 3897->3892 3899 10056b8 3898->3899 3900 10089ea 3898->3900 3899->3850 3899->3851 3900->3899 3901 10089fe CreateFileU 3900->3901 3902 1008a22 GetFileSize 3901->3902 3903 1008a66 GetLastError 3901->3903 3902->3903 3904 1008a34 3902->3904 3905 1008a72 GetLastError 3903->3905 3906 1008a78 GetLastError 3903->3906 3907 1008a40 CreateFileMappingA 3904->3907 3908 1008a39 3904->3908 3905->3908 3906->3908 3907->3903 3909 1008a56 MapViewOfFile 3907->3909 3910 1008aa2 3908->3910 3911 1008a9d CloseHandle 3908->3911 3909->3903 3913 1008a8a 3909->3913 3910->3899 3912 1008aa8 CloseHandle 3910->3912 3911->3910 3912->3899 3913->3908 3915 10087f3 3914->3915 3916 100535e 3914->3916 3915->3916 3917 100885a 5 API calls 3915->3917 3916->3877 3916->3883 3917->3916 3919 100544e 3918->3919 3920 10087df 6 API calls 3919->3920 3922 1005452 3919->3922 3921 100546f 3920->3921 3921->3922 3923 1008811 free 3921->3923 3922->3895 3924 10054c2 3922->3924 3923->3922 3933 10086b0 LocalAlloc 3924->3933 3927 10087df 6 API calls 3928 1005509 3927->3928 3929 10086b0 3 API calls 3928->3929 3931 10054ec 3928->3931 3930 1005526 3929->3930 3930->3931 3932 1008811 free 3930->3932 3931->3895 3932->3931 3934 10086cf WideCharToMultiByte 3933->3934 3937 10086ca 3933->3937 3934->3937 3935 10054e8 3935->3927 3935->3931 3936 100870b LocalFree 3936->3935 3937->3935 3937->3936 3939 100885a 5 API calls 3938->3939 3940 1004e03 3939->3940 3971 10061b4 3940->3971 3945 100885a 5 API calls 3946 1004e36 3945->3946 3947 1005d9d 12 API calls 3946->3947 3948 1004e45 3947->3948 3949 100885a 5 API calls 3948->3949 3950 1004e56 CertGetCRLContextProperty 3949->3950 4011 1005d22 3950->4011 3952 1004e7d CertGetCRLContextProperty 3953 1005d22 9 API calls 3952->3953 3954 1004e9e 3953->3954 3955 100885a 5 API calls 3954->3955 3967 1004f1d 3954->3967 3960 1004ebd 3955->3960 3956 1004f50 3959 100885a 5 API calls 3956->3959 3957 1004f3c 3958 100885a 5 API calls 3957->3958 3962 1004f4c 3958->3962 3961 1004f60 3959->3961 3963 100885a 5 API calls 3960->3963 4031 1004f7d 3961->4031 3962->3748 3965 1004edf printf 3963->3965 3966 1004ef8 3965->3966 3965->3967 3968 100885a 5 API calls 3966->3968 3967->3956 3967->3957 3969 1004f08 3968->3969 4019 10058ed 3969->4019 4038 100826b 3971->4038 3973 10061d5 3974 1004e19 3973->3974 3975 1008811 free 3973->3975 3997 1005d9d 3974->3997 3975->3974 3976 1007e5a CryptFindOIDInfo 3977 10063da printf 3976->3977 3978 100885a 5 API calls 3977->3978 3995 10061cd 3978->3995 3980 1007e5a CryptFindOIDInfo 3980->3995 3982 10058ed 12 API calls 3982->3995 3983 1006270 3986 1006274 printf 3983->3986 3984 1006289 printf CertRDNValueToStrA 3987 10062ef CertRDNValueToStrW 3984->3987 3984->3995 3985 10063c9 printf 3985->3995 3986->3984 3986->3986 3987->3995 3988 10087df 6 API calls 3988->3995 3989 10062bc CertRDNValueToStrA 3991 100885a 5 API calls 3989->3991 3990 100631c CertRDNValueToStrW 3992 100885a 5 API calls 3990->3992 3993 10062d7 printf 3991->3993 3992->3995 3994 1008811 free 3993->3994 3994->3987 3995->3973 3995->3976 3995->3980 3995->3982 3995->3985 3995->3987 3995->3988 3995->3989 3995->3990 3996 1008811 free 3995->3996 4048 1007e5a CryptFindOIDInfo 3995->4048 3996->3995 3998 1005db9 3997->3998 3999 1005ddb 3997->3999 3998->3999 4000 1005dbe 3998->4000 4001 100871b 4 API calls 3999->4001 4002 100871b 4 API calls 4000->4002 4003 1005df4 4001->4003 4004 1004e25 4002->4004 4003->4004 4005 100871b 4 API calls 4003->4005 4004->3945 4006 1005e15 4005->4006 4006->4004 4007 1005e1d FileTimeToLocalFileTime FileTimeToSystemTime 4006->4007 4008 1005ed0 swprintf 4007->4008 4009 1005e3e _wasctime wcscpy wcslen 4007->4009 4008->4004 4009->4004 4010 1005ead wcslen swprintf 4009->4010 4010->4004 4012 100885a 5 API calls 4011->4012 4013 1005d39 4012->4013 4014 1005d4a printf 4013->4014 4016 1005d66 4013->4016 4015 1005d58 printf 4014->4015 4015->3952 4016->4015 4017 1005d93 printf 4016->4017 4018 1005d7b printf 4016->4018 4017->4016 4018->4017 4018->4018 4020 10058f9 4019->4020 4028 1005914 4019->4028 4022 100885a 5 API calls 4020->4022 4021 100590c 4021->3967 4022->4021 4023 1005920 wprintf 4023->4028 4024 1005940 wprintf 4024->4024 4024->4028 4025 100596a wprintf 4027 10059a1 wprintf 4025->4027 4025->4028 4026 100595f wprintf 4026->4025 4026->4026 4027->4021 4027->4023 4028->4021 4028->4023 4028->4024 4028->4025 4028->4026 4028->4027 4029 1005994 wprintf 4028->4029 4030 1005986 wprintf 4028->4030 4029->4028 4030->4028 4032 100502c 4031->4032 4037 1004f8c 4031->4037 4032->3962 4035 1005d9d 12 API calls 4035->4037 4036 100885a LoadStringW LoadStringA MultiByteToWideChar GetVersionExA vwprintf 4036->4037 4037->4032 4037->4035 4037->4036 4050 1008340 4037->4050 4039 100827b 4038->4039 4040 100827d CryptDecodeObject 4038->4040 4039->4040 4041 10082a6 4040->4041 4045 10082d8 4040->4045 4042 10087df 6 API calls 4041->4042 4041->4045 4043 10082b5 4042->4043 4044 10082bb CryptDecodeObject 4043->4044 4043->4045 4044->4045 4046 10082d2 4044->4046 4045->3995 4047 1008811 free 4046->4047 4047->4045 4049 100624e printf 4048->4049 4049->3983 4049->3984 4051 1008352 4050->4051 4052 1004fb4 printf 4050->4052 4053 1008355 printf 4051->4053 4052->4037 4053->4052 4053->4053 4055 100895c WideCharToMultiByte 4054->4055 4056 1008986 4054->4056 4057 1008975 4055->4057 4058 10089ac GetLastError 4055->4058 4056->3772 4061 10087df 6 API calls 4057->4061 4059 10089b8 GetLastError 4058->4059 4060 10089bc GetLastError 4058->4060 4059->4056 4060->4056 4062 100897d 4061->4062 4062->4056 4063 100898d WideCharToMultiByte 4062->4063 4063->4056 4064 10089a2 4063->4064 4065 1008811 free 4064->4065 4065->4058 5284 1007e7f 5287 1007eaf 5284->5287 5285 1007ec2 5286 1007fc2 SetLastError 5285->5286 5288 1007ed4 5285->5288 5286->5288 5287->5285 5287->5288 5289 100826b 9 API calls 5287->5289 5290 1007ee5 5289->5290 5290->5288 5305 1001a9b 5290->5305 5293 1001a9b 5 API calls 5294 1007f28 5293->5294 5295 1001a9b 5 API calls 5294->5295 5296 1007f3f 5295->5296 5297 1001a9b 5 API calls 5296->5297 5298 1007f56 5297->5298 5299 1007f85 5298->5299 5300 1007f5b swprintf wcscat 5298->5300 5302 1001a9b 5 API calls 5299->5302 5301 1007f9c 5300->5301 5303 1008811 free 5301->5303 5302->5301 5304 1007fa2 wcslen 5303->5304 5304->5285 5304->5288 5306 100871b 4 API calls 5305->5306 5307 1001ab5 5306->5307 5308 1001ab9 5307->5308 5309 1001abf wcscat 5307->5309 5308->5293 5309->5308 5310 1006a7f 5311 1006a77 5310->5311 5311->5310 5314 1006d5e 5311->5314 5315 100826b 9 API calls 5314->5315 5316 1006d73 5315->5316 5317 1006ab0 5316->5317 5318 100885a 5 API calls 5316->5318 5319 1006d92 5318->5319 5321 100885a 5 API calls 5319->5321 5325 1006da8 5319->5325 5320 1006e12 5320->5317 5324 1008811 free 5320->5324 5321->5325 5322 1007e5a CryptFindOIDInfo 5323 1006dbd printf 5322->5323 5323->5325 5326 1006dfd printf 5323->5326 5324->5317 5325->5320 5325->5322 5327 100885a 5 API calls 5325->5327 5328 10058ed 12 API calls 5325->5328 5326->5325 5327->5325 5328->5325

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 238 100197f-1001982 239 1001988-100198f 238->239 240 1001a09-1001a0c 238->240 239->240 243 1001991-10019a2 call 100885a 239->243 241 1001a44-1001a4b 240->241 242 1001a0e-1001a10 240->242 246 1001a5d-1001a64 241->246 247 1001a4d-1001a50 call 1003185 241->247 244 1001a22-1001a2c call 1004277 242->244 245 1001a12-1001a20 call 1005033 242->245 262 10019a3 243->262 244->262 266 1001a32-1001a43 call 100885a 244->266 245->244 245->262 250 1001a76-1001a7d 246->250 251 1001a66-1001a70 call 1002798 246->251 255 1001a55-1001a57 247->255 258 1001a8f-1001a96 250->258 259 1001a7f-1001a89 call 1002c62 250->259 251->250 251->262 255->246 255->262 265 10019a8-10019bc call 100885a 258->265 259->258 259->262 262->265 273 10019c4-10019cb 265->273 274 10019be-10019bf call 1008811 265->274 266->241 276 10019d3-10019da 273->276 277 10019cd-10019ce call 1008811 273->277 274->273 278 10019e2-10019e9 276->278 279 10019dc-10019dd call 1008811 276->279 277->276 282 10019f2-10019f6 278->282 283 10019eb-10019ec CryptMsgClose 278->283 279->278 284 1001a03-1001a08 282->284 285 10019f8-10019fd CertCloseStore 282->285 283->282 285->284
                                    APIs
                                    • CryptMsgClose.CRYPT32(00000000), ref: 010019EC
                                    • CertCloseStore.CRYPT32(00000000,00000000), ref: 010019FD
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Close$CertCryptStorevwprintf
                                    • String ID: P/n$P>n$PMn
                                    • API String ID: 3389936734-1834489009
                                    • Opcode ID: 63eb66c14e7fda0570ea376976dc1e18f64bbe9a91587ae554e77367a3c350e3
                                    • Instruction ID: 42b3134e16393f13461df84badb692253946a8e87c09028ea51888cae73f54e6
                                    • Opcode Fuzzy Hash: 63eb66c14e7fda0570ea376976dc1e18f64bbe9a91587ae554e77367a3c350e3
                                    • Instruction Fuzzy Hash: 6E215330B04301EAFF679B69ED09B993BF9BF48341F184065AAC0920E4DF7ACA40D715

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 286 1001ad0-1001aec GetModuleHandleA 287 1001b3b-1001b3d 286->287 288 1001aee-1001b02 CryptInitOIDFunctionSet 286->288 291 1001bac-1001bb0 287->291 289 1001b04-1001b09 288->289 290 1001b0b-1001b27 CryptInstallOIDFunctionAddress 288->290 292 1001b2e-1001b3a call 100885a 289->292 293 1001b29 290->293 294 1001b3f-1001b5f 290->294 292->287 293->292 296 1001b61 294->296 297 1001ba9-1001bab 294->297 299 1001b66-1001b82 call 100871b 296->299 297->291 299->287 302 1001b84-1001ba7 CryptRegisterOIDInfo 299->302 302->297 302->299
                                    APIs
                                    • GetModuleHandleA.KERNEL32(00000000), ref: 01001ADF
                                    • CryptInitOIDFunctionSet.CRYPT32(CryptDllFormatObject,00000000), ref: 01001AF5
                                    • CryptInstallOIDFunctionAddress.CRYPT32(00000000,CryptDllFormatObject,01001328,00000000), ref: 01001B1F
                                    • CryptRegisterOIDInfo.CRYPT32(0000001C,00000000), ref: 01001B97
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Crypt$Function$AddressHandleInfoInitInstallModuleRegister
                                    • String ID: CryptDllFormatObject
                                    • API String ID: 2804595984-3973519293
                                    • Opcode ID: 4c74154022490254554ef6326925eb3718cf50a35f994ad4199bc7a9ad7ba923
                                    • Instruction ID: 6f13abbe2aab8b1e5bb8b6f4405c84a7c177d83238a80c1cc21b34735506dcde
                                    • Opcode Fuzzy Hash: 4c74154022490254554ef6326925eb3718cf50a35f994ad4199bc7a9ad7ba923
                                    • Instruction Fuzzy Hash: 502180B1E40708EBF7239F65EC84EEA7BB9FB04340F004526F295A2084E77AD9458B50

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 303 10018cb-10018db 304 1001904-1001913 call 1001dc7 303->304 305 10018dd-10018e1 303->305 311 1001915-100191c 304->311 312 10018c6-10018c9 304->312 305->304 307 10018e3-10018ea 305->307 309 10018f3-1001900 call 1005710 307->309 310 10018ec-10018f1 307->310 314 1001931-1001936 call 1001bb1 309->314 317 1001902 309->317 310->312 311->314 315 100191e-1001923 call 1001d6c 311->315 312->303 322 10019b5-10019bc 314->322 315->322 317->312 323 10019c4-10019cb 322->323 324 10019be-10019bf call 1008811 322->324 326 10019d3-10019da 323->326 327 10019cd-10019ce call 1008811 323->327 324->323 328 10019e2-10019e9 326->328 329 10019dc-10019dd call 1008811 326->329 327->326 332 10019f2-10019f6 328->332 333 10019eb-10019ec CryptMsgClose 328->333 329->328 334 1001a03-1001a08 332->334 335 10019f8-10019fd CertCloseStore 332->335 333->332 335->334
                                    APIs
                                    • CryptMsgClose.CRYPT32(00000000), ref: 010019EC
                                    • CertCloseStore.CRYPT32(00000000,00000000), ref: 010019FD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Close$CertCryptStore
                                    • String ID: P/n$P>n$PMn
                                    • API String ID: 1306282253-1834489009
                                    • Opcode ID: 10a47abec8d88a5924ec7f7d0afb7ba57d3237583ddbfdd2884d6f74a2bf1f38
                                    • Instruction ID: dbb7c2de19337d5fef51ebb3680b7a4a5f2b0570c407ca8ccf1c5ea7785461a4
                                    • Opcode Fuzzy Hash: 10a47abec8d88a5924ec7f7d0afb7ba57d3237583ddbfdd2884d6f74a2bf1f38
                                    • Instruction Fuzzy Hash: 9611FC71B04205EAFB63AB69E948BA937F8BB44340F048065EAC1D71C0EB75DA40CB60

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 336 1001965-10019bc call 100885a * 2 345 10019c4-10019cb 336->345 346 10019be-10019bf call 1008811 336->346 348 10019d3-10019da 345->348 349 10019cd-10019ce call 1008811 345->349 346->345 350 10019e2-10019e9 348->350 351 10019dc-10019dd call 1008811 348->351 349->348 354 10019f2-10019f6 350->354 355 10019eb-10019ec CryptMsgClose 350->355 351->350 356 1001a03-1001a08 354->356 357 10019f8-10019fd CertCloseStore 354->357 355->354 357->356
                                    APIs
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    • CryptMsgClose.CRYPT32(00000000), ref: 010019EC
                                    • CertCloseStore.CRYPT32(00000000,00000000), ref: 010019FD
                                      • Part of subcall function 01008811: free.MSVCRT(00000000,010019E2,00000000), ref: 0100881C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Close$CertCryptStorefreevwprintf
                                    • String ID: P/n$P>n$PMn
                                    • API String ID: 1118940313-1834489009
                                    • Opcode ID: 76a2339dfe4cb4e017245fc44dcbcfbfc9c8a530502f8862358d6e7c4aa865a9
                                    • Instruction ID: 77acb240a226d128f079d2490b685ddcd47dd1abc9d13d3f23a27c0d587eddd9
                                    • Opcode Fuzzy Hash: 76a2339dfe4cb4e017245fc44dcbcfbfc9c8a530502f8862358d6e7c4aa865a9
                                    • Instruction Fuzzy Hash: 99F01971B05301EAFA23AB28FC49B993BB8BB44341F14806AB6C4D70C4DA7ADA419710

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 1003185-10031bf 1 10031c5-10031cc 0->1 2 10035ef-1003602 call 100885a 0->2 1->2 3 10031d2-10031e1 1->3 11 1003603-1003607 2->11 5 10031e3-10031e5 3->5 6 10031e7-10031e9 3->6 5->6 8 10031f3-100320d CertOpenStore 5->8 9 1003239-100323c 6->9 10 10031eb-10031f1 6->10 12 100321b-100322b call 1003b26 8->12 13 100320f-1003216 8->13 14 100323f-1003246 9->14 10->8 10->9 12->14 34 100322d-1003234 12->34 15 1003500-100350b 13->15 17 1003248-100324f 14->17 18 10032bf-10032c6 14->18 22 1003512-100351b 15->22 23 100350d-1003510 CertFreeCTLContext 15->23 24 1003251-100325a call 1003c14 17->24 25 1003268-100326f 17->25 19 10033ac 18->19 20 10032cc-10032d4 18->20 29 10033ae-10033b5 19->29 32 10032f2-10032f9 20->32 33 10032d6-10032e0 call 1003c14 20->33 26 1003522-1003525 22->26 27 100351d-1003520 CertFreeCTLContext 22->27 23->22 24->18 48 100325c-1003263 24->48 30 1003275-100329c CertFindCertificateInStore 25->30 31 100360a-1003611 25->31 36 1003530-100353b 26->36 37 1003527-100352a CertFreeCTLContext 26->37 27->26 38 10034a0-10034a6 29->38 39 10033bb-10033c1 29->39 40 10032aa-10032b5 CertDeleteCTLFromStore 30->40 41 100329e-10032a5 30->41 43 1003613-100361c 31->43 44 100361e-1003626 31->44 45 1003334-1003344 call 10040a4 32->45 46 10032fb-1003316 call 1003a45 32->46 33->29 72 10032e6-10032ed 33->72 34->15 49 1003563-1003566 36->49 50 100353d-1003543 36->50 37->36 56 10034a8-10034b0 call 10037ec 38->56 57 10034bb-10034c1 38->57 51 10033c3-10033cd call 1003c14 39->51 52 10033df-10033e6 39->52 54 10032bb 40->54 55 10036ac-10036b3 40->55 41->15 59 1003628-1003629 call 1003f3f 43->59 44->59 77 1003352-1003355 45->77 78 1003346-100334d 45->78 75 1003324-100332d CertDeleteCTLFromStore 46->75 76 1003318-100331f 46->76 48->15 64 1003568-100356e 49->64 65 100358e-1003591 49->65 61 1003545-1003559 CertFreeCTLContext 50->61 62 100355b-1003561 free 50->62 51->38 106 10033d3-10033da 51->106 70 10033e8-100340d CertFindCTLInStore 52->70 71 100342b-100343b call 1004193 52->71 54->18 55->15 56->57 100 10034b2-10034b9 56->100 67 10034c3-10034cb call 10039bf 57->67 68 10034d6-10034dd 57->68 74 100362e-1003630 59->74 61->61 61->62 62->49 79 1003570-1003584 CertFreeCTLContext 64->79 80 1003586-100358c free 64->80 81 1003593-1003599 65->81 82 10035bd-10035c0 65->82 67->68 119 10034cd-10034d4 67->119 85 10034f3-10034f4 call 10036b8 68->85 86 10034df-10034e5 68->86 88 100341b-1003424 CertDeleteCTLFromStore 70->88 89 100340f-1003416 70->89 110 1003449-100344c 71->110 111 100343d-1003444 71->111 72->15 92 1003632-1003639 74->92 93 100363e-1003643 74->93 94 10033a0-10033a7 75->94 95 100332f-1003332 75->95 76->15 96 1003357-1003367 CertDuplicateCTLContext 77->96 97 1003369 77->97 78->15 79->79 79->80 80->65 98 10035b5-10035bb free 81->98 99 100359b-10035b3 CertFreeCTLContext 81->99 101 10035c2-10035c6 82->101 102 10035d5-10035d8 82->102 121 10034f9-10034fb 85->121 104 10034e7-10034e9 86->104 105 10034fd 86->105 108 1003426-1003429 88->108 109 1003497-100349e 88->109 89->15 92->15 112 1003645-100364b 93->112 113 1003659-100365b 93->113 94->15 95->29 114 1003396-100339e CertDeleteCTLFromStore 96->114 97->29 115 100336b-100337c call 1003db3 97->115 98->82 99->98 99->99 100->15 101->102 116 10035c8-10035d3 CertCloseStore 101->116 117 10035ea-10035ed 102->117 118 10035da-10035e9 call 100885a 102->118 104->85 120 10034eb-10034f1 104->120 105->15 106->15 108->38 109->15 122 1003460 110->122 123 100344e-100345e CertDuplicateCTLContext 110->123 111->15 112->113 124 100364d-1003654 112->124 125 100365d-100366d CertDuplicateCertificateContext 113->125 126 100366f 113->126 114->29 114->94 115->94 137 100337e-1003393 CertDuplicateCTLContext 115->137 116->102 117->11 118->117 119->15 120->85 120->105 121->15 121->105 122->38 130 1003462-1003473 call 1003e79 122->130 129 100348d-1003495 CertDeleteCTLFromStore 123->129 124->15 131 100369e-10036a6 CertDeleteCTLFromStore 125->131 126->18 132 1003675-1003684 call 1003ced 126->132 129->38 129->109 130->109 140 1003475-100348a CertDuplicateCTLContext 130->140 131->18 131->55 132->55 141 1003686-100369b CertDuplicateCertificateContext 132->141 137->114 140->129 141->131
                                    APIs
                                    • CertOpenStore.CRYPT32(00000002,00000000,00000000,00000000), ref: 01003200
                                    • CertFindCertificateInStore.CRYPT32(?,00000000,00010000,?,00000000), ref: 01003291
                                      • Part of subcall function 01003C14: CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 01003C35
                                      • Part of subcall function 01003C14: CertDuplicateCertificateContext.CRYPT32(00000000), ref: 01003C42
                                      • Part of subcall function 01003C14: CertDeleteCTLFromStore.CRYPT32(00000000,?,00000001), ref: 01003C49
                                      • Part of subcall function 01003C14: CertEnumCTLsInStore.CRYPT32(?,00000000), ref: 01003C5F
                                      • Part of subcall function 01003C14: CertDuplicateCTLContext.CRYPT32(00000000,?,00000001), ref: 01003C6C
                                      • Part of subcall function 01003C14: CertDeleteCTLFromStore.CRYPT32(00000000,?,00000001), ref: 01003C73
                                      • Part of subcall function 01003C14: CertGetCRLFromStore.CRYPT32(?,00000000,00000000,00000002), ref: 01003C91
                                      • Part of subcall function 01003C14: CertDuplicateCTLContext.CRYPT32(00000000,?,00000001), ref: 01003C9E
                                      • Part of subcall function 01003C14: CertDeleteCTLFromStore.CRYPT32(00000000,?,00000001), ref: 01003CA5
                                      • Part of subcall function 01003C14: CertFreeCTLContext.CRYPT32(00000000,00000000,?,?,00000001), ref: 01003CC4
                                      • Part of subcall function 01003C14: CertFreeCTLContext.CRYPT32(00000000,00000000,?,?,00000001), ref: 01003CCF
                                      • Part of subcall function 01003C14: CertFreeCTLContext.CRYPT32(00000000,00000000,?,?,00000001), ref: 01003CDA
                                    • CertFreeCTLContext.CRYPT32(?,?), ref: 01003510
                                    • CertFreeCTLContext.CRYPT32(?,?), ref: 01003520
                                    • CertFreeCTLContext.CRYPT32(?,?), ref: 0100352A
                                    • CertFreeCTLContext.CRYPT32(?,?), ref: 0100354E
                                    • free.MSVCRT(?,?), ref: 0100355E
                                    • CertFreeCTLContext.CRYPT32(?,?), ref: 01003579
                                    • free.MSVCRT(?,?), ref: 01003589
                                    • CertFreeCTLContext.CRYPT32(?,?), ref: 010035A4
                                    • free.MSVCRT(?,?), ref: 010035B8
                                    • CertCloseStore.CRYPT32(?,00000000), ref: 010035CD
                                    • CertDuplicateCertificateContext.CRYPT32(?), ref: 01003662
                                    • CertDuplicateCertificateContext.CRYPT32(?), ref: 0100368F
                                    • CertDeleteCTLFromStore.CRYPT32(?), ref: 0100369E
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$Context$Store$Free$DuplicateFrom$CertificateDelete$free$Enum$CertificatesCloseFindOpen
                                    • String ID:
                                    • API String ID: 2937819547-0
                                    • Opcode ID: 00397b16635c81cae4848901f55ef5f8b817b23ffd5f059c687f173048bbcf1c
                                    • Instruction ID: ceba202226e1c52c8d753938b8a5235e252ee34b61ded21cb78c9f9364dbaa25
                                    • Opcode Fuzzy Hash: 00397b16635c81cae4848901f55ef5f8b817b23ffd5f059c687f173048bbcf1c
                                    • Instruction Fuzzy Hash: B5F12371A04209EFEF63DF94D944AEDBBF5FB48301F104069E581EB294EB369A41CB11

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 142 1002558-100256e 143 1002574-1002577 142->143 144 100278f 142->144 143->144 145 100257d-1002580 143->145 146 1002791-1002795 144->146 147 1002592-1002595 145->147 148 1002582-1002590 145->148 150 1002600-100260a call 10056a4 147->150 151 1002597-100259c 147->151 149 10025f5-10025fb CertOpenStore 148->149 152 1002772 149->152 161 1002630-100263a call 10055cc 150->161 162 100260c-1002612 150->162 154 10025e9-10025f3 151->154 155 100259e-10025ba CertOpenStore 151->155 156 1002774-1002777 152->156 154->149 155->156 158 10025c0-10025c7 155->158 159 1002781-1002783 156->159 160 1002779-100277c call 1008811 156->160 158->156 163 10025cd-10025e4 CertCloseStore 158->163 159->144 167 1002785-100278d 159->167 160->159 171 1002660-100266a call 1005638 161->171 172 100263c-1002642 161->172 165 1002624-100262b 162->165 166 1002614-100261e 162->166 169 1002770 CertOpenStore 163->169 165->156 166->156 166->165 167->146 169->152 177 1002690-10026a7 CertOpenStore 171->177 178 100266c-1002672 171->178 173 1002654-100265b 172->173 174 1002644-100264e 172->174 173->156 174->156 174->173 177->156 181 10026ad-10026b9 call 10052a5 177->181 179 1002684-100268b 178->179 180 1002674-100267e 178->180 179->156 180->156 180->179 181->156 184 10026bf-10026d1 call 100555c 181->184 184->156 187 10026d7-10026f4 CertOpenStore 184->187 187->156 188 10026f6-100270e CertAddEncodedCTLToStore 187->188 188->156 189 1002710-1002728 CertAddEncodedCRLToStore 188->189 189->156 190 100272a-1002742 CertAddEncodedCertificateToStore 189->190 190->156 191 1002744-1002760 CertCloseStore CertOpenStore 190->191 191->156 192 1002762-100276e 191->192 192->169
                                    APIs
                                    • CertOpenStore.CRYPT32(0000000A,00000000,?,?), ref: 010025B4
                                    • CertCloseStore.CRYPT32(00000000,00000000), ref: 010025CF
                                    • CertOpenStore.CRYPT32(0000000A,00000000,?,?), ref: 010025F5
                                    • CertOpenStore.CRYPT32(00000006,00000000,00000000,?), ref: 01002770
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CertStore$Open$Close
                                    • String ID:
                                    • API String ID: 2754197958-0
                                    • Opcode ID: 66eb3ab7076ffe95061d62a5c389f5189901e907c95eb4f1a77a95065bf80f19
                                    • Instruction ID: c9ddbc5a20286c3309f0bfccd5a5b6e99f19dee535933a9edc4c3c0e3cdfaecd
                                    • Opcode Fuzzy Hash: 66eb3ab7076ffe95061d62a5c389f5189901e907c95eb4f1a77a95065bf80f19
                                    • Instruction Fuzzy Hash: 00517E31600614FBEF339FA99C4CEAE7BB8FB89741F140259F6D9A2084D73A8940DB55

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 193 1003f3f-1003f54 194 1003f5a-1003f5f 193->194 195 100409b 193->195 194->195 197 1003f65-1003f6d 194->197 196 100409d-10040a1 195->196 198 1003fd0-1003fed CertFindCertificateInStore 197->198 199 1003f6f-1003f7d CertEnumCertificatesInStore 197->199 200 1004041 198->200 201 1003fef 198->201 199->200 202 1003f83 199->202 205 1004048-100404b 200->205 204 1003ff1-1004006 realloc 201->204 203 1003f85-1003f9a realloc 202->203 203->205 206 1003fa0-1003fb5 CertDuplicateCertificateContext 203->206 204->205 207 1004008-100401d CertDuplicateCertificateContext 204->207 208 1004080-1004086 205->208 209 100404d-100404f 205->209 206->205 210 1003fbb-1003fcc CertEnumCertificatesInStore 206->210 207->205 212 100401f-100403f CertFindCertificateInStore 207->212 211 1004088-100408b 208->211 213 1004051-1004056 209->213 214 1004077-100407e 209->214 210->203 215 1003fce 210->215 216 1004096-1004099 211->216 217 100408d-1004090 CertFreeCTLContext 211->217 212->200 212->204 218 1004058-100405f 213->218 219 100406e-1004076 free 213->219 214->211 215->200 216->196 217->216 220 1004061-1004062 CertFreeCTLContext 218->220 221 1004068-100406c 218->221 219->214 220->221 221->218 221->219
                                    APIs
                                    • CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 01003F72
                                    • realloc.MSVCRT ref: 01003F8E
                                    • CertDuplicateCertificateContext.CRYPT32(?), ref: 01003FA3
                                    • CertEnumCertificatesInStore.CRYPT32(?,?), ref: 01003FC1
                                    • CertFindCertificateInStore.CRYPT32(?,00000000,00080007,?,00000000,00000000), ref: 01003FE2
                                    • realloc.MSVCRT ref: 01003FFA
                                    • CertDuplicateCertificateContext.CRYPT32(?), ref: 0100400B
                                    • CertFindCertificateInStore.CRYPT32(?,00000000,00080007,?,?), ref: 01004034
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,01002BE8,?,00000000,?,?), ref: 01004062
                                    • free.MSVCRT(?,?,?,?,01002BE8,?,00000000,?,?), ref: 01004070
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,01002BE8,?,00000000,?,?), ref: 01004090
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$CertificateContextStore$CertificatesDuplicateEnumFindFreerealloc$free
                                    • String ID:
                                    • API String ID: 1636303725-0
                                    • Opcode ID: 1f4ee6068f1e8aea42f31af4c687cb09dde60afd68d6b8c1d34b77a0c8dda3a4
                                    • Instruction ID: 9782e854247bb6023672c0a45df3072e1ed033e8617539a9c2345dc92b0eb93d
                                    • Opcode Fuzzy Hash: 1f4ee6068f1e8aea42f31af4c687cb09dde60afd68d6b8c1d34b77a0c8dda3a4
                                    • Instruction Fuzzy Hash: D1413871604246EFEB22DF68D8848AD7BF1FB44341F20486DF6D5E7290CB329994DB10

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: _initterm$__p___winitenv__p__commode__p__fmode__set_app_type__wgetmainargs
                                    • String ID:
                                    • API String ID: 1994959623-0
                                    • Opcode ID: ae44a37183254d00835b9000c12113839250642764c810b338a186780a498866
                                    • Instruction ID: 5570a4e0811c03a8a4a44dfca9dc969cf19f863603b224f5608ae785088c858c
                                    • Opcode Fuzzy Hash: ae44a37183254d00835b9000c12113839250642764c810b338a186780a498866
                                    • Instruction Fuzzy Hash: 1B216DB5A00308EFD726DF99DC45EDA77B8BB48710F108219F5A5A73C8DB3A95008B61

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: _initterm$__p___winitenv__setusermatherr__wgetmainargs_controlfpexit
                                    • String ID:
                                    • API String ID: 2704923724-0
                                    • Opcode ID: b6ec3d73afdbacb6fb99eaf93588aeee621479e86df01ea7de40f688c0e2ecdb
                                    • Instruction ID: 315827a1ee821c1f4935d66a40762d536e8d1ce74b8fac43ed90e89bc0abd2dc
                                    • Opcode Fuzzy Hash: b6ec3d73afdbacb6fb99eaf93588aeee621479e86df01ea7de40f688c0e2ecdb
                                    • Instruction Fuzzy Hash: 3E1182B2E00208DBD716DFD8EC45DEE7774BB9C315F048129F549A3284EA3695048B71

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 358 100885a-1008883 call 100871b vwprintf
                                    APIs
                                      • Part of subcall function 0100871B: LoadStringW.USER32(?,?,00000200,?), ref: 01008739
                                    • vwprintf.MSVCRT ref: 0100887A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: LoadStringvwprintf
                                    • String ID: CertMgr Failed$CryptDllFormatObject
                                    • API String ID: 1051060134-3788540627
                                    • Opcode ID: d0190c0cfcd4c59cea5f43fc1432d9acab967ab62127b66740c1381843548774
                                    • Instruction ID: 0b99e269634fa5a0d08168cef0d2f09bb0364d49c9215f1acf8a3bd6d1372054
                                    • Opcode Fuzzy Hash: d0190c0cfcd4c59cea5f43fc1432d9acab967ab62127b66740c1381843548774
                                    • Instruction Fuzzy Hash: 3DD09232409221AAEB179F54BC05CDB7BA9FB89221F04041AF58492094D72698649BA6

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 639 10045f3-100465d CryptHashPublicKeyInfo call 100885a call 1005d22 CryptReleaseContext CertGetCertificateContextProperty 644 1004663-1004665 639->644 645 1004737-1004780 call 1005d9d call 100885a call 1005d9d call 100885a 639->645 647 1004668 call 10087df 644->647 665 1004782-1004786 call 1005efb 645->665 666 100478b-100478d 645->666 649 100466d-1004671 647->649 649->645 651 1004677-1004683 649->651 656 1004731-1004732 call 1008811 651->656 657 1004689-10046a4 call 100885a 651->657 656->645 663 10046a6-10046b7 call 100885a 657->663 664 10046ba-10046bf 657->664 663->664 671 10046c1-10046d2 call 100885a 664->671 672 10046d5-10046d9 664->672 665->666 669 1004b22-1004b29 666->669 670 1004793-10047b3 call 100885a 666->670 685 10047b5 670->685 686 10047ba-10047f1 call 100885a call 1007e5a printf 670->686 671->672 676 10046db-10046ec call 100885a 672->676 677 10046ef-10046f4 672->677 676->677 681 10046f6-1004707 call 100885a 677->681 682 100470a-100470f 677->682 681->682 683 1004711-1004722 call 100885a 682->683 684 1004725-1004730 printf 682->684 683->684 684->656 685->686 696 10047f3-100480f call 100885a call 10058ed 686->696 697 1004814-100481f 686->697 696->697 698 1004821 697->698 699 1004828-1004866 call 100885a call 1007e5a printf call 1008168 697->699 698->699 709 100486c-1004894 call 100885a call 10058ed 699->709 710 100492f-1004956 call 100885a CertGetPublicKeyLength 699->710 709->710 725 100489a-10048b2 call 100826b 709->725 715 1004958-1004969 call 100885a 710->715 716 100496c-1004974 710->716 715->716 719 1004976-1004987 call 100885a 716->719 720 100498a-10049b6 printf call 10058ed 716->720 719->720 732 10049b8-10049bf 720->732 733 1004a0b-1004a36 call 100885a call 100826b 720->733 725->710 731 10048b4-100492a call 100885a * 2 call 10058ed call 100885a call 10058ed call 100885a call 10058ed call 1008811 725->731 731->710 732->733 736 10049c1-10049c8 732->736 737 1004a5e-1004a73 call 1006045 733->737 753 1004a38-1004a42 call 10058ed 733->753 736->737 738 10049ce-10049f9 call 100885a call 100826b 736->738 751 1004a75-1004a8f call 100885a 737->751 752 1004abc-1004ac3 737->752 738->737 761 10049fb-1004a09 call 10058ed 738->761 770 1004a91-1004aa2 call 100885a 751->770 771 1004aa5-1004ab7 printf call 10058ed 751->771 758 1004ac5-1004adf call 100885a 752->758 759 1004b0c-1004b14 752->759 766 1004a45-1004a4a call 1008811 753->766 774 1004ae1-1004af2 call 100885a 758->774 775 1004af5-1004b07 printf call 10058ed 758->775 759->669 764 1004b16-1004b1d call 1006419 759->764 761->766 764->669 766->737 770->771 771->752 774->775 775->759
                                    APIs
                                    • CryptReleaseContext.ADVAPI32(?,00000000,MD5,?,?), ref: 01004643
                                    • CertGetCertificateContextProperty.CRYPT32(00000000,00000002,00000000,00000000), ref: 01004656
                                    • printf.MSVCRT ref: 0100472A
                                    • CryptHashPublicKeyInfo.CRYPT32(?,00008003,00000000,?,?,?), ref: 01004615
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                      • Part of subcall function 01005D22: printf.MSVCRT ref: 01005D54
                                      • Part of subcall function 01005D22: printf.MSVCRT ref: 01005D5D
                                    • printf.MSVCRT ref: 010047DC
                                    • printf.MSVCRT ref: 01004849
                                      • Part of subcall function 010087DF: malloc.MSVCRT ref: 010087E6
                                    • CertGetPublicKeyLength.CRYPT32(?,00000003), ref: 0100494E
                                    • printf.MSVCRT ref: 01004990
                                    • printf.MSVCRT ref: 01004AA6
                                    • printf.MSVCRT ref: 01004AF6
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: printf$CertContextCryptPublic$CertificateHashInfoLengthPropertyReleasemallocvwprintf
                                    • String ID: $%s (%S)$<NULL>$MD5$"@$@
                                    • API String ID: 3252116695-720032102
                                    • Opcode ID: 5f47ba163a8f5487d697a36692f403af8a0e254acf5a77b92a6cb57bb1b12a27
                                    • Instruction ID: 86ecd996dec41b75314290f4de11290c562387a63d4e99c161d87747d2f252fd
                                    • Opcode Fuzzy Hash: 5f47ba163a8f5487d697a36692f403af8a0e254acf5a77b92a6cb57bb1b12a27
                                    • Instruction Fuzzy Hash: 11E18B71A00700EFFB17AF14EC85EAA3BB5FB18310F14C569F6849A1E1EB76D9119B18
                                    APIs
                                      • Part of subcall function 0100894A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,76323D80,?,?,0100227A,00000000,0100A688), ref: 0100896D
                                    • strtok.MSVCRT ref: 01003835
                                    • CryptEncodeObject.CRYPT32(00000001,2.5.29.37,?,00000000,01002A8D), ref: 010038EE
                                    • CryptEncodeObject.CRYPT32(00000001,2.5.29.37,?,00000000,01002A8D), ref: 01003910
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptEncodeObject$ByteCharMultiWidestrtok
                                    • String ID: 2.5.29.37
                                    • API String ID: 722503527-3842544949
                                    • Opcode ID: a292249613b1763ea29f4c1edc6f4f1df83ed2498d6ccd8199e275abe18d0251
                                    • Instruction ID: b860460594227b93c8124e25a01a2def9a46fe50629c487eb601de37f54bba0f
                                    • Opcode Fuzzy Hash: a292249613b1763ea29f4c1edc6f4f1df83ed2498d6ccd8199e275abe18d0251
                                    • Instruction Fuzzy Hash: F8516375D0021AAFEF139FA9CC809AEBBF9FF04240F1440A9E695A7190D7319E45DBA0
                                    APIs
                                    • CryptSIPRetrieveSubjectGuid.CRYPT32(00000014,00000000,?), ref: 010052C9
                                    • CryptSIPLoad.CRYPT32(?,00000000,?,00000000,00000000,74E894E0), ref: 010052F0
                                      • Part of subcall function 010087DF: malloc.MSVCRT ref: 010087E6
                                    • CertOpenStore.CRYPT32(00000005,00000000,00000000,00000014), ref: 01005393
                                    • CryptMsgOpenToDecode.CRYPT32(00000000,?,00000000,00000000,00000000,?), ref: 010053C5
                                    • CertCloseStore.CRYPT32(00000000,00000000), ref: 010053D6
                                    • CryptMsgUpdate.CRYPT32(00000000,?,00000014,00000001), ref: 010053EA
                                    • CertCloseStore.CRYPT32(00000000,00000000), ref: 010053F6
                                    • CryptMsgClose.CRYPT32 ref: 01005405
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Crypt$CertCloseStore$Open$DecodeGuidLoadRetrieveSubjectUpdatemalloc
                                    • String ID: P
                                    • API String ID: 2612970599-3110715001
                                    • Opcode ID: adec96a5f5fa256dc24dddbe384e1a1c19b6a707cc696c539e4dedd743b142a4
                                    • Instruction ID: b79b5d030fb68defac3c4168e1d0e744cba54ef8a6fd8182e5e4b2aa1f9a581b
                                    • Opcode Fuzzy Hash: adec96a5f5fa256dc24dddbe384e1a1c19b6a707cc696c539e4dedd743b142a4
                                    • Instruction Fuzzy Hash: 3741EA71A01228ABEF229B95DC48ADFBFBDFB08751F008066F695E2154DB758644CFA0
                                    APIs
                                    • CryptMsgGetAndVerifySigner.CRYPT32(?,00000000,00000000,00000004,?,00000014), ref: 010051B3
                                    • CertFreeCTLContext.CRYPT32(?,?,?), ref: 010051E7
                                      • Part of subcall function 01008186: CryptMsgGetParam.CRYPT32(00000014,00000006,?,00000000,?), ref: 010081A1
                                      • Part of subcall function 01008186: CryptMsgGetParam.CRYPT32(00000014,00000006,?,00000000,00000000), ref: 010081CD
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                      • Part of subcall function 010059BD: printf.MSVCRT ref: 01005A0E
                                      • Part of subcall function 01008811: free.MSVCRT(00000000,010019E2,00000000), ref: 0100881C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Crypt$Param$CertContextFreeSignerVerifyfreeprintfvwprintf
                                    • String ID: $%s (%S)$<NULL>
                                    • API String ID: 1607567234-2923719891
                                    • Opcode ID: a2cc370de8905cfd463e87757b93c377935dc9b7d348b015e306b42786883676
                                    • Instruction ID: 92bca0db7f65d22edff000fd8d56fbaab9da7fa5f8df34a42b6d8fa7d1a7d36a
                                    • Opcode Fuzzy Hash: a2cc370de8905cfd463e87757b93c377935dc9b7d348b015e306b42786883676
                                    • Instruction Fuzzy Hash: 4C41AC32A40204FEFB23AB50ED41DEE7BBAFF54710F108519FAC4660E0EB729A519B50
                                    APIs
                                    • CryptGetOIDFunctionAddress.CRYPT32(00001BB1,00000000,00001BB1,?,?,-00001BAE), ref: 01008042
                                    • wprintf.MSVCRT ref: 010080A1
                                    • CryptFreeOIDFunctionAddress.CRYPT32(?,00000000), ref: 010080C3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: AddressCryptFunction$Freewprintf
                                    • String ID: %s
                                    • API String ID: 1836932162-620797490
                                    • Opcode ID: dd37bf7ee46febbc036273550b200ea95b8f3cf3d889ab71ea1f4efa0ccecf7e
                                    • Instruction ID: ae9ebcde7074f3427b28406c2ea721576cd98c390dd7c43420ce9a5e998d0c75
                                    • Opcode Fuzzy Hash: dd37bf7ee46febbc036273550b200ea95b8f3cf3d889ab71ea1f4efa0ccecf7e
                                    • Instruction Fuzzy Hash: D1211636A01228FBEB62DFA5DC48DEF7FB9FB04751F008056FA4492090C7768654DBA0
                                    APIs
                                    • CryptDecodeObject.CRYPT32(2.5.29.21,?,?,00000000,?,?), ref: 01007711
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    • printf.MSVCRT ref: 0100778C
                                    • printf.MSVCRT ref: 01007795
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: printf$CryptDecodeObjectvwprintf
                                    • String ID: 2.5.29.21
                                    • API String ID: 141116906-359661889
                                    • Opcode ID: 636bbf38a5d317e38e3c6387f97156947c477660528b6178884334b33cab2109
                                    • Instruction ID: 604cb0df0c639c08ae5e724361b11889c9a03312fa331b237a752a71003b9e20
                                    • Opcode Fuzzy Hash: 636bbf38a5d317e38e3c6387f97156947c477660528b6178884334b33cab2109
                                    • Instruction Fuzzy Hash: 3E011E75689309FAF7175B50AC42EDD3765F704791F10801AB7C9A90D0EBB9B9018A91
                                    APIs
                                    • CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                                    • CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptDecodeObject
                                    • String ID: 1.2.840.113549.1.9.5
                                    • API String ID: 1207547050-925610549
                                    • Opcode ID: bda695397514f3fee6e3046ae6edda84bebadf11517ceb8097cdc9ec799a9215
                                    • Instruction ID: 846f05ef3e627ff923ec03161ef7dbed8af35a42488942c709b8441ef5f5e21e
                                    • Opcode Fuzzy Hash: bda695397514f3fee6e3046ae6edda84bebadf11517ceb8097cdc9ec799a9215
                                    • Instruction Fuzzy Hash: EC112A76A00609BFEF128E989D80DAF7AADBB08244F108476FA4096190D671DE109B20
                                    APIs
                                    • CryptDecodeObject.CRYPT32(1.3.6.1.4.1.311.2.1.27,?,?,00000000,?,?), ref: 01006F49
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    • printf.MSVCRT ref: 01006FA8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptDecodeObjectprintfvwprintf
                                    • String ID: 1.3.6.1.4.1.311.2.1.27
                                    • API String ID: 2064051232-3254324927
                                    • Opcode ID: 50587eb5af338e51fadaf433e0fe8bb0e14413c90f8a0a40aed8e81b19aa8bce
                                    • Instruction ID: a40f8fcbc5df7a7741f39d032763650f3e7bbc26de7a4f6c5f7eb4b792bec615
                                    • Opcode Fuzzy Hash: 50587eb5af338e51fadaf433e0fe8bb0e14413c90f8a0a40aed8e81b19aa8bce
                                    • Instruction Fuzzy Hash: 5B014F71A48305FEFF275B50FC46F9C3BB5AB04701F60816EF284A50D4DBB666648B45
                                    APIs
                                    • CryptDecodeObject.CRYPT32(1.3.6.1.4.1.311.2.1.26,?,?,00000000,?,?), ref: 01006FD9
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    • printf.MSVCRT ref: 01007019
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptDecodeObjectprintfvwprintf
                                    • String ID: 1.3.6.1.4.1.311.2.1.26
                                    • API String ID: 2064051232-3070115369
                                    • Opcode ID: ce6be71bbfede8040b3dd8588647cbc673b80bbafdea763f8c919ec8b6e125fe
                                    • Instruction ID: c880fe999930be683d3f2e77d68b54266f9f90a4ee39e2af295de1dd9e8f41b0
                                    • Opcode Fuzzy Hash: ce6be71bbfede8040b3dd8588647cbc673b80bbafdea763f8c919ec8b6e125fe
                                    • Instruction Fuzzy Hash: A1F03076644308FAFB279B50EC06FDD3BB8FB04760F10C11AF685590D0DBBAA6149B58
                                    APIs
                                    • GetSystemTime.KERNEL32(?,?,?,?,?,?,01004C36,00000000,?,?,?,?,00000001,0000000A), ref: 01008302
                                    • SystemTimeToFileTime.KERNEL32(?,01004C36,?,?,?,?,01004C36,00000000,?,?,?,?,00000001,0000000A), ref: 01008310
                                    • CompareFileTime.KERNEL32(E80100CA,01004C36,?,?,?,?,01004C36,00000000,?,?,?,?,00000001,0000000A), ref: 0100832A
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Time$FileSystem$Compare
                                    • String ID:
                                    • API String ID: 2701012859-0
                                    • Opcode ID: 29485ba8917972643eb751f90bc0b0930ff26f685867e9332db32897801ae220
                                    • Instruction ID: 4aba3ffc9628d597b2dade0704a49769f045ab056c2b93999336ab32b65d5af0
                                    • Opcode Fuzzy Hash: 29485ba8917972643eb751f90bc0b0930ff26f685867e9332db32897801ae220
                                    • Instruction Fuzzy Hash: 41F05471900209EFEB11DB95D849FDA7BFCBB04354F408556F682D3090E7B4E289CBA4
                                    APIs
                                    • CryptFindOIDInfo.CRYPT32(00000001,?,00000004), ref: 01008142
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptFindInfo
                                    • String ID:
                                    • API String ID: 4232373045-399585960
                                    • Opcode ID: 82cb662c5139adc79914bdd92f9a03b1b13f993d0efccfc6ee54132e69f199d6
                                    • Instruction ID: 2c12d7960dfe1052e08b092bc00a13c045acbfa13a3bc0b070c4649c9602dbe5
                                    • Opcode Fuzzy Hash: 82cb662c5139adc79914bdd92f9a03b1b13f993d0efccfc6ee54132e69f199d6
                                    • Instruction Fuzzy Hash: 30F032326043028FE725CF08D841F96B7E8FF94721F21484AE2D19B290D3B0E860CBA5
                                    APIs
                                    • CryptFindOIDInfo.CRYPT32(00000001,?,?), ref: 01007E64
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptFindInfo
                                    • String ID: <UNKNOWN OID>
                                    • API String ID: 4232373045-3377398671
                                    • Opcode ID: 7980f1f6f52001df9c7e8d35204e7d8dde8c049863cb83881a6129005cb12277
                                    • Instruction ID: 784702876f8729f255bafaaaf60c1ad1af978e134d3cbec85b0a87c43ac6ec32
                                    • Opcode Fuzzy Hash: 7980f1f6f52001df9c7e8d35204e7d8dde8c049863cb83881a6129005cb12277
                                    • Instruction Fuzzy Hash: B6D0C9356042419EE7539B48C804E557AE5BB48380F00C444F2C48B0F1C3B5DC94D721
                                    APIs
                                    • CryptMsgGetParam.CRYPT32(00000014,00000006,?,00000000,?), ref: 010081A1
                                      • Part of subcall function 010087DF: malloc.MSVCRT ref: 010087E6
                                    • CryptMsgGetParam.CRYPT32(00000014,00000006,?,00000000,00000000), ref: 010081CD
                                      • Part of subcall function 01008811: free.MSVCRT(00000000,010019E2,00000000), ref: 0100881C
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptParam$freemalloc
                                    • String ID:
                                    • API String ID: 2367485992-0
                                    • Opcode ID: adf3a42ce27c442b389434658677714e6a74ce59a07f4cbf9e2db1c4dc5a88bb
                                    • Instruction ID: b3c547420d5a6bd63a33aa8aa87b0f3f52753ff7fbb4b7b0f3ac1b29e9df4a44
                                    • Opcode Fuzzy Hash: adf3a42ce27c442b389434658677714e6a74ce59a07f4cbf9e2db1c4dc5a88bb
                                    • Instruction Fuzzy Hash: 4701EC36A00209FAEF129E55CD00FEF3BBEFF84650F148066BE4596194D771DA11EB60
                                    APIs
                                    • GetVersionExA.KERNEL32(?,00000000), ref: 010087B2
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Version
                                    • String ID:
                                    • API String ID: 1889659487-0
                                    • Opcode ID: ac5f0212b35ebecbe4954b66f4b7803148b0c8486a6e16b36b63e5b5f9e79701
                                    • Instruction ID: 32b058e7832969f901bcf3efe038367cb72c475154847f14ec00cf830c866a46
                                    • Opcode Fuzzy Hash: ac5f0212b35ebecbe4954b66f4b7803148b0c8486a6e16b36b63e5b5f9e79701
                                    • Instruction Fuzzy Hash: 6EF05E35B01304DFEB328B38ED09B8677F4A798308F0044A59289A7284D7B9D586CF41
                                    APIs
                                    • CryptFindOIDInfo.CRYPT32(00000001,00000000,00000000), ref: 01008172
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptFindInfo
                                    • String ID:
                                    • API String ID: 4232373045-0
                                    • Opcode ID: 682c5f194ba7d06e2907ea4b456c06efcc41087d9342ac626dd1fc760805c02b
                                    • Instruction ID: ca48236bc263845dfec324a9d0da35e7288f0e0fb88e63e53fe64c0a53713fbf
                                    • Opcode Fuzzy Hash: 682c5f194ba7d06e2907ea4b456c06efcc41087d9342ac626dd1fc760805c02b
                                    • Instruction Fuzzy Hash: 44C01232B04201FBE7828A60C809E8ABEA9BF54780F08C885B2C4860A4CB72C0509B51

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 361 1002ced-1002cf4 362 10030e4-10030eb 361->362 363 1002cfa-1002d21 CertFindCertificateInStore 361->363 366 1003104-1003117 call 1003f3f 362->366 367 10030ed-1003100 call 1003f3f 362->367 364 1002d23-1002d2a 363->364 365 1002d2f-1002d3f CertAddCertificateContextToStore 363->365 368 1002fbf-1002fc2 364->368 369 1002d45-1002d4e CertFreeCTLContext 365->369 370 1003179-1003180 365->370 383 1003125-100312a 366->383 384 1003119-1003120 366->384 382 1003102 367->382 367->383 373 1002fc4-1002fc7 CertFreeCTLContext 368->373 374 1002fcd-1002fd0 368->374 375 1002d51-1002d58 369->375 370->368 373->374 378 1002fd2-1002fd5 CertFreeCTLContext 374->378 379 1002fdb-1002fde 374->379 380 1002e1c-1002e23 375->380 381 1002d5e-1002d65 375->381 378->379 385 1002fe0-1002fe3 CertFreeCTLContext 379->385 386 1002fe9-1002fec 379->386 390 1002ef2-1002fba CertSaveStore call 100885a 380->390 391 1002e29-1002e5c CertFindCTLInStore 380->391 387 1002db0-1002dc2 call 10040a4 381->387 388 1002d67-1002d86 call 1003a45 381->388 389 100312c-1003133 382->389 383->389 392 1003138-100313b 383->392 384->368 385->386 396 1002ff7-1002ffa 386->396 397 1002fee-1002ff1 CertFreeCTLContext 386->397 418 1002dc4-1002dc9 387->418 419 1002dcb-1002dd2 387->419 411 1002d94-1002da2 CertAddCTLContextToStore 388->411 412 1002d88-1002d8f 388->412 389->368 390->368 407 1002e6a-1002e78 CertAddCTLContextToStore 391->407 408 1002e5e-1002e65 391->408 393 1003146 392->393 394 100313d-1003144 392->394 393->375 402 100314c-100315b call 1003ced 393->402 401 1003168-1003173 CertAddCertificateContextToStore 394->401 404 1003005-1003008 396->404 405 1002ffc-1002fff CertFreeCTLContext 396->405 397->396 401->370 401->375 402->370 431 100315d-1003165 402->431 413 1003013-100301c 404->413 414 100300a-100300d CertFreeCTLContext 404->414 405->404 416 1002ee6-1002eed 407->416 417 1002e7a-1002e84 CertFreeCTLContext 407->417 408->368 421 1002e10-1002e17 411->421 422 1002da4-1002dae CertFreeCTLContext 411->422 412->368 423 1003046-1003049 413->423 424 100301e-1003024 413->424 414->413 416->368 417->390 417->416 418->419 426 1002dd7-1002dda 418->426 419->368 421->368 422->380 427 1003073-1003076 423->427 428 100304b-1003051 423->428 432 1003040-1003045 free 424->432 433 1003026-100303e CertFreeCTLContext 424->433 429 1002de5 426->429 430 1002ddc-1002de3 426->430 439 10030a0-10030a3 427->439 440 1003078-100307e 427->440 435 1003053-100306b CertFreeCTLContext 428->435 436 100306d-1003072 free 428->436 429->380 438 1002de7-1002df6 call 1003db3 429->438 437 1002e03-1002e0e CertAddCTLContextToStore 430->437 431->401 432->423 433->432 433->433 435->435 435->436 436->427 437->380 437->421 438->421 449 1002df8-1002e00 438->449 444 10030a5-10030a9 CertCloseStore 439->444 445 10030af-10030b2 439->445 442 1003080-1003098 CertFreeCTLContext 440->442 443 100309a-100309f free 440->443 442->442 442->443 443->439 444->445 447 10030c4-10030e1 445->447 448 10030b4-10030c3 call 100885a 445->448 448->447 449->437
                                    APIs
                                    • CertFindCertificateInStore.CRYPT32(?,?,?,?), ref: 01002D16
                                    • CertAddCertificateContextToStore.CRYPT32(?,?), ref: 01002D37
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,?,?), ref: 01002D48
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FC7
                                    • CertFreeCTLContext.CRYPT32(00000014,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FD5
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FE3
                                    • CertFreeCTLContext.CRYPT32(00000001,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FF1
                                    • CertFreeCTLContext.CRYPT32(00000000,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FFF
                                    • CertFreeCTLContext.CRYPT32(01001A87,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100300D
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100302F
                                    • free.MSVCRT(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003043
                                    • CertFreeCTLContext.CRYPT32(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100305C
                                    • free.MSVCRT(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003070
                                    • CertFreeCTLContext.CRYPT32(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003089
                                    • free.MSVCRT(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100309D
                                    • CertCloseStore.CRYPT32(0000000A,00000000), ref: 010030A9
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$Context$Free$Storefree$Certificate$CloseFind
                                    • String ID:
                                    • API String ID: 130065044-0
                                    • Opcode ID: 3bdfc37a5d618b4b03b1f22adc64ee428c58dd3893b6d4778e4e88838572d4ec
                                    • Instruction ID: eb9862162d1094444616c4199cfab3bfad784c34e436f95c684893f0ed41291d
                                    • Opcode Fuzzy Hash: 3bdfc37a5d618b4b03b1f22adc64ee428c58dd3893b6d4778e4e88838572d4ec
                                    • Instruction Fuzzy Hash: 06C11670A04248EFEF23DF98DD489EEBBB5FF44340F24416AF581A61A4D7768A54DB10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 453 1002798-10027ce 454 10027d4-10027db 453->454 455 1002baa-1002bbd call 100885a 453->455 454->455 457 10027e1-10027f7 CertOpenStore 454->457 461 1002bbe-1002bc2 455->461 459 1002805-100280f 457->459 460 10027f9-1002800 457->460 463 1002815-100281b 459->463 464 100289b-10028a2 459->464 462 1002aca-1002acd 460->462 465 1002ad8-1002adb 462->465 466 1002acf-1002ad2 CertFreeCTLContext 462->466 469 1002838-100283f 463->469 470 100281d-100282a call 1003b26 463->470 467 1002988-100298f 464->467 468 10028a8-10028ae 464->468 477 1002ae6-1002ae9 465->477 478 1002add-1002ae0 CertFreeCTLContext 465->478 466->465 471 1002995-100299b 467->471 472 1002a7d-1002a83 467->472 475 10028b0-10028bd call 1003b26 468->475 476 10028cf-10028d6 468->476 473 1002bc5-1002bcc 469->473 474 1002845-100286a CertFindCertificateInStore 469->474 470->464 498 100282c-1002833 470->498 481 10029bc-10029c3 471->481 482 100299d-10029aa call 1003b26 471->482 487 1002a85-1002a8f call 10037ec 472->487 488 1002a9a-1002aa0 472->488 485 1002bd9-1002be1 473->485 486 1002bce-1002bd7 473->486 483 1002878-1002889 CertAddCertificateContextToStore 474->483 484 100286c-1002873 474->484 475->467 520 10028c3-10028ca 475->520 492 1002920-1002930 call 10040a4 476->492 493 10028d8-10028f5 call 1003a45 476->493 490 1002af4-1002afd 477->490 491 1002aeb-1002aee CertFreeCTLContext 477->491 478->477 503 10029c5-10029ed CertFindCTLInStore 481->503 504 1002a18-1002a28 call 1004193 481->504 482->472 535 10029b0-10029b7 482->535 500 1002c56-1002c5d 483->500 501 100288f-1002898 CertFreeCTLContext 483->501 484->462 502 1002be2-1002bea call 1003f3f 485->502 486->502 487->488 532 1002a91-1002a98 487->532 496 1002aa2-1002aac call 10039bf 488->496 497 1002ab7-1002ac1 call 10036b8 488->497 506 1002b27-1002b2a 490->506 507 1002aff-1002b05 490->507 491->490 530 1002932-1002939 492->530 531 100293e-1002942 492->531 524 1002903-1002912 CertAddCTLContextToStore 493->524 525 10028f7-10028fe 493->525 496->497 548 1002aae-1002ab5 496->548 497->462 549 1002ac3 497->549 498->462 500->462 501->464 550 1002bf8-1002bfd 502->550 551 1002bec-1002bf3 502->551 518 10029fb-1002a0a CertAddCTLContextToStore 503->518 519 10029ef-10029f6 503->519 552 1002a36-1002a3a 504->552 553 1002a2a-1002a31 504->553 510 1002b54-1002b57 506->510 511 1002b2c-1002b32 506->511 522 1002b21-1002b26 free 507->522 523 1002b07-1002b1f CertFreeCTLContext 507->523 528 1002b81-1002b84 510->528 529 1002b59-1002b5f 510->529 526 1002b34-1002b4c CertFreeCTLContext 511->526 527 1002b4e-1002b53 free 511->527 537 1002a74-1002a7b 518->537 538 1002a0c-1002a16 CertFreeCTLContext 518->538 519->462 520->462 522->506 523->522 523->523 540 1002914-100291e CertFreeCTLContext 524->540 541 100297c-1002983 524->541 525->462 526->526 526->527 527->510 546 1002b90-1002b93 528->546 547 1002b86-1002b8a CertCloseStore 528->547 542 1002b61-1002b79 CertFreeCTLContext 529->542 543 1002b7b-1002b80 free 529->543 530->462 544 1002944-100294c 531->544 545 100294e 531->545 532->462 535->462 537->462 538->472 540->467 541->462 542->542 542->543 543->528 556 100296f-100297a CertAddCTLContextToStore 544->556 545->467 557 1002950-1002961 call 1003db3 545->557 558 1002ba5-1002ba8 546->558 559 1002b95-1002ba4 call 100885a 546->559 547->546 548->462 549->462 560 1002c13-1002c16 550->560 561 1002bff-1002c05 550->561 551->462 554 1002a46 552->554 555 1002a3c-1002a44 552->555 553->462 554->472 563 1002a48-1002a59 call 1003e79 554->563 562 1002a67-1002a72 CertAddCTLContextToStore 555->562 556->467 556->541 557->541 576 1002963-100296c 557->576 558->461 559->558 567 1002c22 560->567 568 1002c18-1002c20 560->568 561->560 566 1002c07-1002c0e 561->566 562->472 562->537 563->537 578 1002a5b-1002a64 563->578 566->462 567->464 570 1002c28-1002c37 call 1003ced 567->570 569 1002c45-1002c50 CertAddCertificateContextToStore 568->569 569->464 569->500 570->500 579 1002c39-1002c42 570->579 576->556 578->562 579->569
                                    APIs
                                    • CertOpenStore.CRYPT32(00000002,00000000,00000000,00000000), ref: 010027EC
                                    • CertFreeCTLContext.CRYPT32(?,?), ref: 01002AD2
                                    • CertFreeCTLContext.CRYPT32(?,?), ref: 01002AE0
                                    • CertFreeCTLContext.CRYPT32(?,?), ref: 01002AEE
                                    • CertFreeCTLContext.CRYPT32(?,?), ref: 01002B10
                                    • free.MSVCRT(?,?), ref: 01002B24
                                    • CertFreeCTLContext.CRYPT32(?,?), ref: 01002B3D
                                    • free.MSVCRT(?,?), ref: 01002B51
                                    • CertFreeCTLContext.CRYPT32(?,?), ref: 01002B6A
                                    • free.MSVCRT(?,?), ref: 01002B7E
                                    • CertCloseStore.CRYPT32(?,00000000), ref: 01002B8A
                                    • CertAddCertificateContextToStore.CRYPT32(?,?,00000003,00000000), ref: 01002C48
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$Context$Free$Storefree$CertificateCloseOpen
                                    • String ID:
                                    • API String ID: 1406681850-0
                                    • Opcode ID: 045ae89b60602ae98f6894c9f6585b8c08aa957313f1b1a0f09ef2c55fd5420a
                                    • Instruction ID: 34fd6ed0ad1e52c2d3e3974f2dbc3af9f0b04a175075539df2dc6701a0a6086b
                                    • Opcode Fuzzy Hash: 045ae89b60602ae98f6894c9f6585b8c08aa957313f1b1a0f09ef2c55fd5420a
                                    • Instruction Fuzzy Hash: F4E13B70E04609EFEF23DF99DD48AEEBBB9FF45340F14409AE581A2194D7768A80CB10

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 580 10061b4-10061d3 call 100826b 583 10061d5-10061d7 580->583 584 10061dc-10061e9 580->584 585 100637f-1006381 583->585 586 100637c-100637e 584->586 587 10061ef 584->587 589 1006383-1006384 call 1008811 585->589 590 1006389-1006392 585->590 586->585 588 10061f5-10061ff 587->588 592 1006365-1006376 588->592 593 1006205-100620e 588->593 589->590 592->586 592->588 594 1006212-1006218 593->594 595 100621a 594->595 596 100621f-1006223 594->596 595->596 597 10063d3-1006414 call 1007e5a printf call 100885a call 10058ed 596->597 598 1006229-100622f 596->598 619 100634b-1006359 597->619 598->597 599 1006235-1006238 598->599 599->597 601 100623e-1006241 599->601 603 1006395-100639d 601->603 604 1006247-100626e call 1007e5a printf 601->604 606 10063b5-10063c4 call 1007e5a 603->606 607 100639f-10063b3 call 1007e5a 603->607 616 1006270 604->616 617 1006289-10062a8 printf CertRDNValueToStrA 604->617 620 10063c9-10063ce printf 606->620 607->620 621 1006274-1006287 printf 616->621 622 10062aa-10062ae 617->622 623 10062ef-1006306 CertRDNValueToStrW 617->623 619->594 626 100635f-1006363 619->626 620->619 621->617 621->621 627 10062af call 10087df 622->627 624 1006347 623->624 625 1006308-100630e 623->625 624->619 628 100630f call 10087df 625->628 626->592 629 10062b4-10062ba 627->629 630 1006314-100631a 628->630 629->623 631 10062bc-10062ea CertRDNValueToStrA call 100885a printf call 1008811 629->631 630->624 632 100631c-1006342 CertRDNValueToStrW call 100885a call 1008811 630->632 631->623 632->624
                                    APIs
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                                    • printf.MSVCRT ref: 0100625D
                                    • printf.MSVCRT ref: 0100627C
                                    • printf.MSVCRT ref: 0100628E
                                    • CertRDNValueToStrA.CRYPT32(?,00000008,00000000,00000000), ref: 0100629F
                                    • CertRDNValueToStrA.CRYPT32(?,00000008,00000000,?), ref: 010062C5
                                    • printf.MSVCRT ref: 010062E2
                                    • CertRDNValueToStrW.CRYPT32(?,00000008,00000000,00000000), ref: 010062FD
                                      • Part of subcall function 01008811: free.MSVCRT(00000000,010019E2,00000000), ref: 0100881C
                                    • printf.MSVCRT ref: 010063C9
                                    • printf.MSVCRT ref: 010063E9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: printf$CertValue$CryptDecodeObject$free
                                    • String ID: $ [%d,%d] %s (%S)$ [%d,%d] %s (%S) $ [%d,%d] %s (%S) %S$ [%d,%d] %s (%S) %s$ 0x%08X$%s$<NULL>
                                    • API String ID: 2812972246-790891399
                                    • Opcode ID: 6111c4928c2ac3d638f084be19f3e276c73f52cde3cdc2ced2399629f530f36e
                                    • Instruction ID: e74627299f22922c4e45c7e90be67055b470c84a2c9a99562eac8e0645b30a3a
                                    • Opcode Fuzzy Hash: 6111c4928c2ac3d638f084be19f3e276c73f52cde3cdc2ced2399629f530f36e
                                    • Instruction Fuzzy Hash: 91518B71504305AFE712AF54DC41A6BBBEAFF84744F00882DF6C5961A1D672ED208B62

                                    Control-flow Graph

                                    APIs
                                    • printf.MSVCRT ref: 01004B84
                                    • printf.MSVCRT ref: 01004BE6
                                    • CertGetCRLContextProperty.CRYPT32(00000000,00000003,?,00000014), ref: 01004C5D
                                    • CertGetCRLContextProperty.CRYPT32(00000000,00000004,?,00000014), ref: 01004C82
                                    • printf.MSVCRT ref: 01004CD4
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: printf$CertContextProperty$vwprintf
                                    • String ID: $ [%d] %s$%s $<NULL>$MD5$SHA1$-<$M<
                                    • API String ID: 21191961-3450786771
                                    • Opcode ID: 82275641a5fc0f0d39834bc25ecf01e808d18fe86dbd4543574247826e20e04b
                                    • Instruction ID: 9d0a5b4a088e6354c4df037c23d7952e0cd7c073e0700367d6bff15a6fcff5f6
                                    • Opcode Fuzzy Hash: 82275641a5fc0f0d39834bc25ecf01e808d18fe86dbd4543574247826e20e04b
                                    • Instruction Fuzzy Hash: EB41B032A40305FAFB276BA0EC41EDE3BB9FF44710F10851AF6C5A64D0DB76A6118B14
                                    APIs
                                    • CertAddCTLContextToStore.CRYPT32(?,?), ref: 01002EDC
                                    • CertSaveStore.CRYPT32(0000000A,00000002,00000004,00000000,?,00000014), ref: 01002F11
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FC7
                                    • CertFreeCTLContext.CRYPT32(00000014,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FD5
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FE3
                                    • CertFreeCTLContext.CRYPT32(00000001,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FF1
                                    • CertFreeCTLContext.CRYPT32(00000000,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FFF
                                    • CertFreeCTLContext.CRYPT32(01001A87,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100300D
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100302F
                                    • free.MSVCRT(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003043
                                    • CertFreeCTLContext.CRYPT32(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100305C
                                    • free.MSVCRT(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003070
                                    • CertFreeCTLContext.CRYPT32(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003089
                                    • free.MSVCRT(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100309D
                                    • CertCloseStore.CRYPT32(0000000A,00000000), ref: 010030A9
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$Context$Free$Storefree$CloseSavevwprintf
                                    • String ID:
                                    • API String ID: 3899236436-0
                                    • Opcode ID: 82ccb76044befd0f0c9d8df628e9aa3788654e2b0cee29a206605203eb8ba0fc
                                    • Instruction ID: 0d48f32fa6eb499900837a5549afe58c902de287f41537b1617c15c5d5e4c5f9
                                    • Opcode Fuzzy Hash: 82ccb76044befd0f0c9d8df628e9aa3788654e2b0cee29a206605203eb8ba0fc
                                    • Instruction Fuzzy Hash: E741C630E04508EFEB23DF98E8589ADBBB2FB44751F20416AF181A61A4D7764990DF10
                                    APIs
                                    • CertAddCTLContextToStore.CRYPT32(?,?), ref: 01002EDC
                                    • CertSaveStore.CRYPT32(0000000A,00000002,00000004,00000000,?,00000014), ref: 01002F11
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FC7
                                    • CertFreeCTLContext.CRYPT32(00000014,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FD5
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FE3
                                    • CertFreeCTLContext.CRYPT32(00000001,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FF1
                                    • CertFreeCTLContext.CRYPT32(00000000,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FFF
                                    • CertFreeCTLContext.CRYPT32(01001A87,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100300D
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100302F
                                    • free.MSVCRT(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003043
                                    • CertFreeCTLContext.CRYPT32(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100305C
                                    • free.MSVCRT(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003070
                                    • CertFreeCTLContext.CRYPT32(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003089
                                    • free.MSVCRT(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100309D
                                    • CertCloseStore.CRYPT32(0000000A,00000000), ref: 010030A9
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$Context$Free$Storefree$CloseSave
                                    • String ID:
                                    • API String ID: 2383314234-0
                                    • Opcode ID: 44f24ea2f3b1b9111daca72f347d77c9825db06b8cf0918004aecb4cbf145063
                                    • Instruction ID: 7a6e763276f1ff6a1583ed280b2d0cd277c8e7bb0b8b454caa168fca8f759725
                                    • Opcode Fuzzy Hash: 44f24ea2f3b1b9111daca72f347d77c9825db06b8cf0918004aecb4cbf145063
                                    • Instruction Fuzzy Hash: 5741A230D01509EFEF63DF98E8588ADBBB2FF44351F2041AAF181A61A4D7365A90DF10
                                    APIs
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FC7
                                    • CertFreeCTLContext.CRYPT32(00000014,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FD5
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FE3
                                    • CertFreeCTLContext.CRYPT32(00000001,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FF1
                                    • CertFreeCTLContext.CRYPT32(00000000,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01002FFF
                                    • CertFreeCTLContext.CRYPT32(01001A87,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100300D
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100302F
                                    • free.MSVCRT(?,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003043
                                    • CertFreeCTLContext.CRYPT32(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100305C
                                    • free.MSVCRT(00001B59,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003070
                                    • CertFreeCTLContext.CRYPT32(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 01003089
                                    • free.MSVCRT(0000000A,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001,00000000), ref: 0100309D
                                    • CertCloseStore.CRYPT32(0000000A,00000000), ref: 010030A9
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$ContextFree$free$CloseStore
                                    • String ID:
                                    • API String ID: 912534999-0
                                    • Opcode ID: 0b9b1a8d95d0a15ebdfa217c3d6cb6d1215d841cd4f5a3eacdf94ecb0c9337c0
                                    • Instruction ID: 99188bbe496bf8758c5ea39b80305226f1081637001da1457b9d533289462e6a
                                    • Opcode Fuzzy Hash: 0b9b1a8d95d0a15ebdfa217c3d6cb6d1215d841cd4f5a3eacdf94ecb0c9337c0
                                    • Instruction Fuzzy Hash: 48419F30D01518EFDB63DB98E8588ADBBB2FF44351F2041AAF181B61A4DB765A90DF10
                                    APIs
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    • printf.MSVCRT ref: 01004BE6
                                    • CertGetCRLContextProperty.CRYPT32(00000000,00000003,?,00000014), ref: 01004C5D
                                    • CertGetCRLContextProperty.CRYPT32(00000000,00000004,?,00000014), ref: 01004C82
                                    • printf.MSVCRT ref: 01004CD4
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CertContextPropertyprintf$vwprintf
                                    • String ID: $%s $<NULL>$MD5$SHA1$-<$M<
                                    • API String ID: 965754941-1913507623
                                    • Opcode ID: bc194e09554f3ad080c54f1c94400a3d217923589b23381cf0e65655e601a870
                                    • Instruction ID: 1b0accdc72fc96e108dfb705b1481be5d94914ce0dba3e5b056fda0701430da9
                                    • Opcode Fuzzy Hash: bc194e09554f3ad080c54f1c94400a3d217923589b23381cf0e65655e601a870
                                    • Instruction Fuzzy Hash: 6A41BF32A44305FAFB277B60EC41E9A3BB9FB54710F10851AF6C5AA4D0DB76A6118B14
                                    APIs
                                    • CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 01003C35
                                    • CertDuplicateCertificateContext.CRYPT32(00000000), ref: 01003C42
                                    • CertDeleteCTLFromStore.CRYPT32(00000000,?,00000001), ref: 01003C49
                                    • CertEnumCTLsInStore.CRYPT32(?,00000000), ref: 01003C5F
                                    • CertDuplicateCTLContext.CRYPT32(00000000,?,00000001), ref: 01003C6C
                                    • CertDeleteCTLFromStore.CRYPT32(00000000,?,00000001), ref: 01003C73
                                    • CertGetCRLFromStore.CRYPT32(?,00000000,00000000,00000002), ref: 01003C91
                                    • CertDuplicateCTLContext.CRYPT32(00000000,?,00000001), ref: 01003C9E
                                    • CertDeleteCTLFromStore.CRYPT32(00000000,?,00000001), ref: 01003CA5
                                    • CertFreeCTLContext.CRYPT32(00000000,00000000,?,?,00000001), ref: 01003CC4
                                    • CertFreeCTLContext.CRYPT32(00000000,00000000,?,?,00000001), ref: 01003CCF
                                    • CertFreeCTLContext.CRYPT32(00000000,00000000,?,?,00000001), ref: 01003CDA
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$ContextStore$From$DeleteDuplicateFree$Enum$CertificateCertificates
                                    • String ID:
                                    • API String ID: 4186978145-0
                                    • Opcode ID: 69323ae7f165615aa63ff37f18db1fa40dddc2f2f00fb5c5464ccbf51c553884
                                    • Instruction ID: 3d4f8e321d260166deb2c37b4722702f530a5fe9b12f1c2784a3adff5fa3238a
                                    • Opcode Fuzzy Hash: 69323ae7f165615aa63ff37f18db1fa40dddc2f2f00fb5c5464ccbf51c553884
                                    • Instruction Fuzzy Hash: BB219F31208389AFF3238F66994CF6BBADCBB80B00F04051DFAC6D5184DBBAD4088761
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: wprintf$vwprintf
                                    • String ID: $ '$ %02X
                                    • API String ID: 3863390932-3839679036
                                    • Opcode ID: 245ba5faa3f9159075175ac61e8e4ce443989ae8e7eac280a279cfb65d9a8e45
                                    • Instruction ID: 119df7375fa19e6f2ab5bdbf58a660095d498569f61a997e21fed4e990c2eee5
                                    • Opcode Fuzzy Hash: 245ba5faa3f9159075175ac61e8e4ce443989ae8e7eac280a279cfb65d9a8e45
                                    • Instruction Fuzzy Hash: 48212733644319AAFB174E5AAC81ABD7B55EB82731F10412FFBC4490C0DBB189518FA5
                                    APIs
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                      • Part of subcall function 01005D9D: FileTimeToLocalFileTime.KERNEL32(00000001,?,00001B9E,?,00000032,00001B9D,?,00000032,00000000,?,00000000), ref: 01005E22
                                      • Part of subcall function 01005D9D: FileTimeToSystemTime.KERNEL32(?,01004BFC), ref: 01005E30
                                      • Part of subcall function 01005D9D: _wasctime.MSVCRT ref: 01005E7F
                                      • Part of subcall function 01005D9D: wcscpy.MSVCRT ref: 01005E8D
                                      • Part of subcall function 01005D9D: wcslen.MSVCRT ref: 01005E9C
                                      • Part of subcall function 01005D9D: wcslen.MSVCRT ref: 01005EAE
                                      • Part of subcall function 01005D9D: swprintf.MSVCRT(00000000,?,?), ref: 01005EC5
                                    • CertGetCRLContextProperty.CRYPT32(?,00000003,?,00000000), ref: 01004E6A
                                      • Part of subcall function 01005D22: printf.MSVCRT ref: 01005D54
                                      • Part of subcall function 01005D22: printf.MSVCRT ref: 01005D5D
                                    • CertGetCRLContextProperty.CRYPT32(?,00000004,?,00000000), ref: 01004E8B
                                      • Part of subcall function 01005D22: printf.MSVCRT ref: 01005D88
                                      • Part of subcall function 01005D22: printf.MSVCRT ref: 01005D98
                                    • printf.MSVCRT ref: 01004EE7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: printf$Time$File$CertContextPropertywcslen$LocalSystem_wasctimeswprintfvwprintfwcscpy
                                    • String ID: $%s $<NULL>$MD5$SHA1
                                    • API String ID: 877868225-3298317204
                                    • Opcode ID: ef0dc58a638ec4c96e9b5cf8bc8724160ce880f0840a3869fb4893d97a94868a
                                    • Instruction ID: 7f8b3de2b8d94eedb18c579de51c5a4a42e3cc02c95025c86376e5c6403baddd
                                    • Opcode Fuzzy Hash: ef0dc58a638ec4c96e9b5cf8bc8724160ce880f0840a3869fb4893d97a94868a
                                    • Instruction Fuzzy Hash: 2A41AE32A40305EFEB17AB50EC45EDA7BB5EF54320F14851AF6889B1E0D732EA11DB04
                                    APIs
                                    • CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 01003B4F
                                    • CertAddCertificateContextToStore.CRYPT32(?,00000000,00000003,00000000), ref: 01003B5E
                                    • CertEnumCTLsInStore.CRYPT32(?,00000000), ref: 01003B7E
                                    • CertAddCTLContextToStore.CRYPT32(?,00000000,00000003,00000000), ref: 01003B8E
                                    • CertGetCRLFromStore.CRYPT32(?,00000000,00000000,?), ref: 01003BB5
                                    • CertAddCTLContextToStore.CRYPT32(?,00000000,00000003,00000000), ref: 01003BC5
                                    • CertFreeCTLContext.CRYPT32(00000000,?,00000000,00000000), ref: 01003BE8
                                    • CertFreeCTLContext.CRYPT32(?,?,00000000,00000000), ref: 01003BF6
                                    • CertFreeCTLContext.CRYPT32(?,?,00000000,00000000), ref: 01003C04
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$ContextStore$Free$Enum$CertificateCertificatesFrom
                                    • String ID:
                                    • API String ID: 1456163896-0
                                    • Opcode ID: c3a9a6b756158b32af717f50f29f024c4bfb7f9630b8aa6ffe042a46a28ae4e2
                                    • Instruction ID: 62fc009a319d8c0195a875f5ee685bc7a5d0235e1fb2cd9ae9274de3586ab868
                                    • Opcode Fuzzy Hash: c3a9a6b756158b32af717f50f29f024c4bfb7f9630b8aa6ffe042a46a28ae4e2
                                    • Instruction Fuzzy Hash: E9312E30A00658BFEB239F99DD44AEE7FB9FF00744F144095FA85A6090C7B6DA50DB90
                                    APIs
                                    • CreateFileU.CRYPT32(00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8,00000014,?), ref: 01008A15
                                    • GetFileSize.KERNEL32(00000000,00000014,00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8), ref: 01008A27
                                    • CreateFileMappingA.KERNEL32(00000014,00000000,00000002,00000000,00000000,00000000), ref: 01008A49
                                    • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008A5C
                                    • GetLastError.KERNEL32(00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8,00000014,?), ref: 01008A6C
                                    • GetLastError.KERNEL32(?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?,?,00000014,?,SHA1,0000000A), ref: 01008A72
                                    • GetLastError.KERNEL32(?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?,?,00000014,?,SHA1,0000000A), ref: 01008A78
                                    • CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AA0
                                    • CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AAB
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: File$ErrorLast$CloseCreateHandle$MappingSizeView
                                    • String ID:
                                    • API String ID: 524788506-0
                                    • Opcode ID: 96daecd4b54f800760b7eba25ae76a1021dbf1a70837195a7a57605f8b42a680
                                    • Instruction ID: 0b943f0ce0dfe5c40595c24f9d9a73b7fc00af20ea95221383c830475f75e040
                                    • Opcode Fuzzy Hash: 96daecd4b54f800760b7eba25ae76a1021dbf1a70837195a7a57605f8b42a680
                                    • Instruction Fuzzy Hash: 0F218031D41125FBFB228F58CC44A9E7EA8FB067A0F148166FA85A65C0D7749AC0CBE0
                                    APIs
                                    • CreateFileU.CRYPT32(00000014,40000000,00000000,00000000,00000002,00000000,00000000,00000000,00000001,?,?,01002FA4,?,?,?,00000014), ref: 01008AF1
                                    • GetLastError.KERNEL32(00000014,40000000,00000000,00000000,00000002,00000000,00000000,00000000,00000001,?,?,01002FA4,?,?,?,00000014), ref: 01008B03
                                    • GetLastError.KERNEL32(?,01002FA4,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001), ref: 01008B09
                                    • GetLastError.KERNEL32(?,01002FA4,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001), ref: 01008B0F
                                    • WriteFile.KERNEL32(00000000,?,?,?,00000000,00000014,40000000,00000000,00000000,00000002,00000000,00000000,00000000,00000001,?), ref: 01008B2D
                                    • GetLastError.KERNEL32(?,01002FA4,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001), ref: 01008B3D
                                    • GetLastError.KERNEL32(?,01002FA4,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000,00000001), ref: 01008B43
                                    • CloseHandle.KERNEL32(00000000,?,01002FA4,?,?,?,00000014,?,?,?,?,?,?,?,01001A87,00000000), ref: 01008B6C
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: ErrorLast$File$CloseCreateHandleWrite
                                    • String ID:
                                    • API String ID: 1274442398-0
                                    • Opcode ID: 017fd4a2c61951ceca550178e63e1fe5baddd7945ade91736ae77703dc99b890
                                    • Instruction ID: ca36d6a8c764a1ad78762d8e90c0044b46dda13cbba7938ceeca0ec5e291ba97
                                    • Opcode Fuzzy Hash: 017fd4a2c61951ceca550178e63e1fe5baddd7945ade91736ae77703dc99b890
                                    • Instruction Fuzzy Hash: AC11B772D05935EBE7324E698C049AE7EA8BF457B0F05C277BC85A7180D2789D418BD0
                                    APIs
                                    • printf.MSVCRT ref: 01005A0E
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                      • Part of subcall function 01008811: free.MSVCRT(00000000,010019E2,00000000), ref: 0100881C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptDecodeObject$freeprintfvwprintf
                                    • String ID: $ [%d,%d] %s$1.2.840.113549.1.9.5$1.2.840.113549.1.9.6$1.3.6.1.4.1.311.10.2$<NULL>
                                    • API String ID: 1924496982-3034289211
                                    • Opcode ID: dc4e416ac7ec221467000f34955533da29cb243de22aa6c715d33c878ee53ce2
                                    • Instruction ID: dc23ba973dc3d7395123d3090bad1c8b21ddef8e4e577f654d15181199a09b3c
                                    • Opcode Fuzzy Hash: dc4e416ac7ec221467000f34955533da29cb243de22aa6c715d33c878ee53ce2
                                    • Instruction Fuzzy Hash: FA510230900646ABFB136F288C90AED7BEAEF06214F1485A0EAD5972D1E7329955CF50
                                    APIs
                                    • FileTimeToLocalFileTime.KERNEL32(00000001,?,00001B9E,?,00000032,00001B9D,?,00000032,00000000,?,00000000), ref: 01005E22
                                    • FileTimeToSystemTime.KERNEL32(?,01004BFC), ref: 01005E30
                                    • _wasctime.MSVCRT ref: 01005E7F
                                    • wcscpy.MSVCRT ref: 01005E8D
                                    • wcslen.MSVCRT ref: 01005E9C
                                    • wcslen.MSVCRT ref: 01005EAE
                                    • swprintf.MSVCRT(00000000,?,?), ref: 01005EC5
                                    • swprintf.MSVCRT(0100A138,?,?,00000001), ref: 01005EE2
                                      • Part of subcall function 0100871B: LoadStringW.USER32(?,?,00000200,?), ref: 01008739
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Time$File$swprintfwcslen$LoadLocalStringSystem_wasctimewcscpy
                                    • String ID:
                                    • API String ID: 1198059487-0
                                    • Opcode ID: 9cb0004046fe059e89af9bf4c2c924899fde024fb2407f6cb232af7db561f201
                                    • Instruction ID: 80bea964167c077ebb7f29613c425d7d5d4cc7692e59d2015936a7dcd1f1c136
                                    • Opcode Fuzzy Hash: 9cb0004046fe059e89af9bf4c2c924899fde024fb2407f6cb232af7db561f201
                                    • Instruction Fuzzy Hash: B5414D71D00218EAEF26DF98DC459FEB7B8FF08341F10406AF9C5A2180E7798A41CB64
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: towupper$wcslen
                                    • String ID:
                                    • API String ID: 1941851458-0
                                    • Opcode ID: cbfc4fe8f45473ed4f58da605a210825dd77f785ce66fbee264452b09ad26d69
                                    • Instruction ID: 3e599955c825a32831a7801ae95c97f7390e987df3e4e7e2b89ac7e520e1f868
                                    • Opcode Fuzzy Hash: cbfc4fe8f45473ed4f58da605a210825dd77f785ce66fbee264452b09ad26d69
                                    • Instruction Fuzzy Hash: 51312435500225ABEB165F2CCC84AAEBBE8EF05720F21805AFD94DB6D0D638C941CFA1
                                    APIs
                                    • CertGetCRLFromStore.CRYPT32(?,00000000,00000000,?), ref: 010040DB
                                    • realloc.MSVCRT ref: 010040F3
                                    • CertDuplicateCTLContext.CRYPT32(?), ref: 01004104
                                    • CertGetCRLFromStore.CRYPT32(?,00000000,?,?), ref: 01004123
                                    • CertFreeCTLContext.CRYPT32(?), ref: 01004151
                                    • free.MSVCRT(?), ref: 0100415F
                                    • CertFreeCTLContext.CRYPT32(?), ref: 0100417F
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$Context$FreeFromStore$Duplicatefreerealloc
                                    • String ID:
                                    • API String ID: 706885998-0
                                    • Opcode ID: a4579f29af3d61a213aa29d82e2a73b783707612c536d4dd2498aed8bbe69d25
                                    • Instruction ID: 06b2f77ad534f3675ef950e49a2527f6f29af8039c94654542f0ba4c1af1809e
                                    • Opcode Fuzzy Hash: a4579f29af3d61a213aa29d82e2a73b783707612c536d4dd2498aed8bbe69d25
                                    • Instruction Fuzzy Hash: CC310475A00249EFEB228F98D8848ADBBF5FB54344F2084AEF695D7290C7319A40CF14
                                    APIs
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    • printf.MSVCRT ref: 01007271
                                    • printf.MSVCRT ref: 010072A3
                                    • printf.MSVCRT ref: 010072D7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: printf$CryptDecodeObject$vwprintf
                                    • String ID: $ [%d] %s$ [%d] %s
                                    • API String ID: 3452401527-2298187835
                                    • Opcode ID: b312dbc6e18425c30db84d4642973e5e972353b81b3877b2819612ac7e623f52
                                    • Instruction ID: 882fe6f7da37c13c2543c962c30eb4a42de4d7b53b3bc19d79fce25d7286019f
                                    • Opcode Fuzzy Hash: b312dbc6e18425c30db84d4642973e5e972353b81b3877b2819612ac7e623f52
                                    • Instruction Fuzzy Hash: CF317C32900715FBFB235F44EC81A997BB0FB04721F14852AFED82A1C0D77AB9509B94
                                    APIs
                                    • CertEnumCTLsInStore.CRYPT32(00000014,00000000), ref: 010041C7
                                    • realloc.MSVCRT ref: 010041D9
                                    • CertDuplicateCTLContext.CRYPT32(?,?,01002E96,?,0000000A,00000000,?,00000014), ref: 010041EA
                                    • CertEnumCTLsInStore.CRYPT32(00000014,?), ref: 01004205
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,01002E96,?,0000000A,00000000), ref: 01004235
                                    • free.MSVCRT(?,?,?,?,01002E96,?,0000000A,00000000), ref: 01004243
                                    • CertFreeCTLContext.CRYPT32(?,?,?,?,01002E96,?,0000000A,00000000), ref: 01004263
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$Context$EnumFreeStore$Duplicatefreerealloc
                                    • String ID:
                                    • API String ID: 2405492650-0
                                    • Opcode ID: 0d1ffa640bb80b646c121726a86532bd0176b07425315ef086298706068492f2
                                    • Instruction ID: b8602d62794de092fa67e34e8c73dc166317c74f750f4fddc74d5c51a450e016
                                    • Opcode Fuzzy Hash: 0d1ffa640bb80b646c121726a86532bd0176b07425315ef086298706068492f2
                                    • Instruction Fuzzy Hash: 3A314774604204EFEB238F69D88489DBBF5FF94310F60846AEAD5D72A4D7729980CF14
                                    APIs
                                    • printf.MSVCRT ref: 01006462
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    • printf.MSVCRT ref: 01006487
                                      • Part of subcall function 01007E5A: CryptFindOIDInfo.CRYPT32(00000001,?,?), ref: 01007E64
                                      • Part of subcall function 01008884: wprintf.MSVCRT ref: 010088BA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: printf$CryptFindInfovwprintfwprintf
                                    • String ID: $2.5.29.1$<NULL>$YYj
                                    • API String ID: 2372032126-1827054270
                                    • Opcode ID: 3ce55a3ac641689d4da5e610dd0a21e4a884b30f0edf9fdab88a9a4ee829ef21
                                    • Instruction ID: e2173d48011786a04bbbd323a138fdd67020d4b7a5b54f531858a7685aed5299
                                    • Opcode Fuzzy Hash: 3ce55a3ac641689d4da5e610dd0a21e4a884b30f0edf9fdab88a9a4ee829ef21
                                    • Instruction Fuzzy Hash: 7E219C32900605FBEB131F68EC41AD97FA3BF09324F25C664F9D45A1E0E73799249B80
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: printf$vwprintf
                                    • String ID: %02X$<NULL>
                                    • API String ID: 4289833226-3318528641
                                    • Opcode ID: 4a137df0517ab863c06208d53aa088258c8621137941eede9edbcf4e6dfd2ce9
                                    • Instruction ID: f9fe6916a933d13dcca72205d7af782751b05d53ef6a1981e00ced3b7e208adc
                                    • Opcode Fuzzy Hash: 4a137df0517ab863c06208d53aa088258c8621137941eede9edbcf4e6dfd2ce9
                                    • Instruction Fuzzy Hash: 5DF0F932B487115AF32366696C05A2A6BE1DBC46A1F15046FF6C4D71C1FD61D8028B62
                                    APIs
                                    • CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 010042A3
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    • CertEnumCTLsInStore.CRYPT32(?,00000000), ref: 0100431C
                                    • CertGetCRLFromStore.CRYPT32(?,00000000,00000000,?), ref: 0100439B
                                    • CertFreeCTLContext.CRYPT32(00000000), ref: 01004411
                                    • CertFreeCTLContext.CRYPT32(00000000), ref: 0100441C
                                    • CertFreeCTLContext.CRYPT32(00000000,?,?,?,?,?,?,?,01001A2A,?), ref: 0100442D
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$ContextFreeStore$Enum$CertificatesFromvwprintf
                                    • String ID:
                                    • API String ID: 1639122641-0
                                    • Opcode ID: c9073336187c8e82f2f2bd043e5061598acd76ff3d8de0184bc67dfcab132269
                                    • Instruction ID: b52028145a84832f983472691433bc19133d5d9b79e4e00939670f7ef0bddb46
                                    • Opcode Fuzzy Hash: c9073336187c8e82f2f2bd043e5061598acd76ff3d8de0184bc67dfcab132269
                                    • Instruction Fuzzy Hash: A441DF32608302EBF7239F54AC44B6A7FF9BB94701F04492EFBC4920D5DBBA94088759
                                    APIs
                                    • wcslen.MSVCRT ref: 010039D2
                                    • CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 010039F3
                                    • CertSetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000,00000000), ref: 01003A08
                                    • CertSetCertificateContextProperty.CRYPT32(00000000,0000000B,00000000,?), ref: 01003A17
                                    • CertEnumCertificatesInStore.CRYPT32(?,00000000), ref: 01003A21
                                    • CertFreeCTLContext.CRYPT32(00000000), ref: 01003A35
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$Context$CertificateCertificatesEnumPropertyStore$Freewcslen
                                    • String ID:
                                    • API String ID: 1159493799-0
                                    • Opcode ID: 21b92ba0d5092098acfdb986d0ebb50d72bb8a6cadc2bcb0498bba632f6abb39
                                    • Instruction ID: 00b4ee517128738ce0e66dfd4b50f8033352f8963b99a324ced2bd7391445894
                                    • Opcode Fuzzy Hash: 21b92ba0d5092098acfdb986d0ebb50d72bb8a6cadc2bcb0498bba632f6abb39
                                    • Instruction Fuzzy Hash: 21018476E01214FBE733DB69DC44F9E7BB8AB09750F114151FA40AB2C4D775DA008BA4
                                    APIs
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                                    • printf.MSVCRT ref: 01006092
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptDecodeObject$printfvwprintf
                                    • String ID: $%s (%S)$($<NULL>
                                    • API String ID: 3955122273-3389890325
                                    • Opcode ID: 6d2ef1b96f2741b592e2059373e4232a5f5b25b1d4095d31cea419576d6f5ea0
                                    • Instruction ID: fdd8930d580e06e56ed02b80320afa0a1d12be04b54cc1497755a94cb02b1a5c
                                    • Opcode Fuzzy Hash: 6d2ef1b96f2741b592e2059373e4232a5f5b25b1d4095d31cea419576d6f5ea0
                                    • Instruction Fuzzy Hash: E931E472540701FEFB272B50EC85EEA3BB9FF14710F14812AF6C5250D1EB769A649B11
                                    APIs
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    • printf.MSVCRT ref: 01007666
                                    • printf.MSVCRT ref: 01007692
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptDecodeObjectprintf$vwprintf
                                    • String ID: [%d,%d] %s$ [%d,*] %s$<NULL>
                                    • API String ID: 3053794160-3661550745
                                    • Opcode ID: f89045c4d54666e58aebac5b30074587f46f9c4f2cbc8131f8b47ed58dfb799d
                                    • Instruction ID: eb1ce1aba800e34c694246015e497e9ac9b31efe6a12d2fbde37d99fb5c947bb
                                    • Opcode Fuzzy Hash: f89045c4d54666e58aebac5b30074587f46f9c4f2cbc8131f8b47ed58dfb799d
                                    • Instruction Fuzzy Hash: C121DE75604206FFFB125FACECC0C997BA0FB09364F24C02AF6D94A280D776A960CB54
                                    APIs
                                    • CertEnumCertificateContextProperties.CRYPT32(?,00000000), ref: 01005F07
                                    • CertGetCertificateContextProperty.CRYPT32(?,00000000,00000000,?), ref: 01005F4A
                                    • CertGetCertificateContextProperty.CRYPT32(?,00000000,00000000,?), ref: 01005F6A
                                    • CertEnumCertificateContextProperties.CRYPT32(?,00000000), ref: 01005FBF
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CertCertificateContext$EnumPropertiesProperty$vwprintf
                                    • String ID:
                                    • API String ID: 2836338242-399585960
                                    • Opcode ID: 8551b7d497840789ec1c4916242e124f8ad2d69c5eda4b00177c1361a1591910
                                    • Instruction ID: 7f24652fe2f217508ea7fcbb6c712aeaf65bf0a7948b9f041a1daa78529b24be
                                    • Opcode Fuzzy Hash: 8551b7d497840789ec1c4916242e124f8ad2d69c5eda4b00177c1361a1591910
                                    • Instruction Fuzzy Hash: B8218472904219FFFB236B94DC85CFE7E6DEB10294F114069FA8862090D7768E109B61
                                    APIs
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    • printf.MSVCRT ref: 01007D8F
                                    • printf.MSVCRT ref: 01007DC5
                                    • printf.MSVCRT ref: 01007DEE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: printf$CryptDecodeObject$vwprintf
                                    • String ID: $ %02X
                                    • API String ID: 3452401527-2119626176
                                    • Opcode ID: 8e908ba8431071937f372095f3a21809828b6f7e6a604cacfb8711bd09aac418
                                    • Instruction ID: 3791f41939ce4824e053cc04017bcd257817170b35b011f1549c8897ff7e117b
                                    • Opcode Fuzzy Hash: 8e908ba8431071937f372095f3a21809828b6f7e6a604cacfb8711bd09aac418
                                    • Instruction Fuzzy Hash: 8D110432601712EBF7273B64FC40D9A3BA5FF88710F24892AF5C09A1D0DB66ED119B50
                                    APIs
                                    • CertGetCRLFromStore.CRYPT32(?,00000000,00000000,?), ref: 01003A78
                                    • CertGetCRLContextProperty.CRYPT32(?,00000003,00000000,?), ref: 01003A95
                                    • CertGetCRLContextProperty.CRYPT32(?,00000003,?,?), ref: 01003AB8
                                    • CertGetCRLFromStore.CRYPT32(?,00000000,?,?), ref: 01003AE1
                                    • CertFreeCTLContext.CRYPT32(?), ref: 01003B13
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: Cert$Context$FromPropertyStore$Free
                                    • String ID:
                                    • API String ID: 1268920413-0
                                    • Opcode ID: 38caa68dd6e200693609f83d9f2fc5759b66c8bbbdb8d6b27bc93e4fa8dece61
                                    • Instruction ID: 2d6f6cedad14925c553a5a531fc029d50201c4a55b32bf08b2cbf524748e4937
                                    • Opcode Fuzzy Hash: 38caa68dd6e200693609f83d9f2fc5759b66c8bbbdb8d6b27bc93e4fa8dece61
                                    • Instruction Fuzzy Hash: 4A310471D01129FFEF23CBD8D9449AEBFB9FF05650F1480A6E640AA190D7709B80DBA0
                                    APIs
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,76323D80,?,?,0100227A,00000000,0100A688), ref: 0100896D
                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,0100227A,00000000,0100A688), ref: 01008998
                                    • GetLastError.KERNEL32(?,?,0100227A,00000000,0100A688,?,00000014,?,?,0100192D,00001B5B,<UNKNOWN OID>,00000014,00001B5A,MD5,0000000A), ref: 010089B2
                                    • GetLastError.KERNEL32(?,?,0100227A,00000000,0100A688,?,00000014,?,?,0100192D,00001B5B,<UNKNOWN OID>,00000014,00001B5A,MD5,0000000A), ref: 010089B8
                                      • Part of subcall function 010087DF: malloc.MSVCRT ref: 010087E6
                                    • GetLastError.KERNEL32(?,?,0100227A,00000000,0100A688,?,00000014,?,?,0100192D,00001B5B,<UNKNOWN OID>,00000014,00001B5A,MD5,0000000A), ref: 010089BC
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: ErrorLast$ByteCharMultiWide$malloc
                                    • String ID:
                                    • API String ID: 3472615102-0
                                    • Opcode ID: d06ba5bac7a6af725c550f3c2cebc075e7a3ac333290ac74100df823bac362df
                                    • Instruction ID: 6a107113e91b84a03d814a294c1758f0eb4b117dcdb9fe8ebaf36570cdc106f5
                                    • Opcode Fuzzy Hash: d06ba5bac7a6af725c550f3c2cebc075e7a3ac333290ac74100df823bac362df
                                    • Instruction Fuzzy Hash: D1018432902139BAA7227A5A8C44DDF7E9CFF066B0B14C222F598D61D0C675D840C7F2
                                    APIs
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    • printf.MSVCRT ref: 01006DCE
                                    • printf.MSVCRT ref: 01006E02
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptDecodeObjectprintf$vwprintf
                                    • String ID: $ [%d] %s (%S)
                                    • API String ID: 3053794160-4092857480
                                    • Opcode ID: ed17a94d53a8b843a2ed15e62e7b675af76c9e425c7016927d0d2750494a233a
                                    • Instruction ID: 01505842b482cc6809bb7b9b6da085859eaf2e3d688aaf3425822afcafecb341
                                    • Opcode Fuzzy Hash: ed17a94d53a8b843a2ed15e62e7b675af76c9e425c7016927d0d2750494a233a
                                    • Instruction Fuzzy Hash: EC112632644701EBF7232F84EC41FAA7BA5FB95711F14842EF6C01A0D0DB7798619B51
                                    APIs
                                    • SetLastError.KERNEL32(000000EA), ref: 01007FC2
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                                    • swprintf.MSVCRT(?,01001600,?,?,00001BDE,?,00001C08,?,00001BE2,?,00001BDD,0000000F,?,?,00000000), ref: 01007F67
                                    • wcscat.MSVCRT ref: 01007F7B
                                    • wcslen.MSVCRT ref: 01007FA9
                                      • Part of subcall function 01001A9B: wcscat.MSVCRT ref: 01001AC4
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptDecodeObjectwcscat$ErrorLastswprintfwcslen
                                    • String ID:
                                    • API String ID: 3517545609-0
                                    • Opcode ID: a34ae2b90946bb38d713910c960b8082deca7e3b1e347333ff75163c7fe83b1e
                                    • Instruction ID: c549eef07bb15a57e9c452e6f139c625c5f846825e59a85b576ac9db3539dcee
                                    • Opcode Fuzzy Hash: a34ae2b90946bb38d713910c960b8082deca7e3b1e347333ff75163c7fe83b1e
                                    • Instruction Fuzzy Hash: 724192716406599AEB33DB54DC40EFE77F9EB48700F1484AAE6CAA60C0E735A9858B50
                                    APIs
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                    • CertRDNValueToStrW.CRYPT32(00000000,00000004,00000000,00000000), ref: 01006E8E
                                    • CertRDNValueToStrW.CRYPT32(00000000,00000004,00000000,00000000), ref: 01006EB1
                                    • wprintf.MSVCRT ref: 01006ED8
                                    • printf.MSVCRT ref: 01006EF7
                                      • Part of subcall function 010087DF: malloc.MSVCRT ref: 010087E6
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CertCryptDecodeObjectValue$mallocprintfvwprintfwprintf
                                    • String ID:
                                    • API String ID: 422403839-0
                                    • Opcode ID: 73c6a995ae2694a5e3f543555c47f27e60e0e45555cabc846884b01f5d2a93d0
                                    • Instruction ID: 949d65c3e3cb98c50c9d180278654844201179eb9e933f5cff64211629e52488
                                    • Opcode Fuzzy Hash: 73c6a995ae2694a5e3f543555c47f27e60e0e45555cabc846884b01f5d2a93d0
                                    • Instruction Fuzzy Hash: F6119F32904341EBF7236B15EC49EABBBAAFB84750F10492EF1C4520D0EB738920C761
                                    APIs
                                      • Part of subcall function 010089CF: CreateFileU.CRYPT32(00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8,00000014,?), ref: 01008A15
                                      • Part of subcall function 010089CF: GetFileSize.KERNEL32(00000000,00000014,00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8), ref: 01008A27
                                      • Part of subcall function 010089CF: CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AA0
                                      • Part of subcall function 010089CF: CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AAB
                                    • CertOpenStore.CRYPT32(00000002,00000000,00000000,00000000,00000000), ref: 0100565E
                                    • CertAddEncodedCertificateToStore.CRYPT32(00000000,00000014,?,00000004,00000000), ref: 0100567A
                                    • CertCloseStore.CRYPT32(00000000,00000000), ref: 01005686
                                    • UnmapViewOfFile.KERNEL32(00000014,?,?,01002666,?,?,?,?,00000014,?,SHA1,0000000A), ref: 01005696
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CertCloseFileStore$Handle$CertificateCreateEncodedOpenSizeUnmapView
                                    • String ID:
                                    • API String ID: 2836849460-0
                                    • Opcode ID: ca1aa411c66d1c0410b41a7702d1f43bb57505d1c654becfd7533e8ffcd0176d
                                    • Instruction ID: 37cb10d7b76febe12317a3c067e934ed60c0cbf2470bde60b70878876058a3cd
                                    • Opcode Fuzzy Hash: ca1aa411c66d1c0410b41a7702d1f43bb57505d1c654becfd7533e8ffcd0176d
                                    • Instruction Fuzzy Hash: 9D014B76201128BBEB235B66DC48EEF7EADEF497D0F004025FA89D6044DA768501DBA5
                                    APIs
                                      • Part of subcall function 010089CF: CreateFileU.CRYPT32(00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8,00000014,?), ref: 01008A15
                                      • Part of subcall function 010089CF: GetFileSize.KERNEL32(00000000,00000014,00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8), ref: 01008A27
                                      • Part of subcall function 010089CF: CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AA0
                                      • Part of subcall function 010089CF: CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AAB
                                    • CertOpenStore.CRYPT32(00000002,00000000,00000000,00000000,00000000), ref: 010056CA
                                    • CertAddEncodedCTLToStore.CRYPT32(00000000,00000014,?,00000004,00000000), ref: 010056E6
                                    • CertCloseStore.CRYPT32(00000000,00000000), ref: 010056F2
                                    • UnmapViewOfFile.KERNEL32(00000014,?,?,01002606,?,?,00000014,?,SHA1,0000000A), ref: 01005702
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CertCloseFileStore$Handle$CreateEncodedOpenSizeUnmapView
                                    • String ID:
                                    • API String ID: 2155480357-0
                                    • Opcode ID: 5e0100efab947cc34f2bedc1425696db73913a2c09c0408946b5dc9015651bd9
                                    • Instruction ID: 2c05ff15c60448d41003a431b096c5c9d90047f6d8fd11dadf97d1566b7af47f
                                    • Opcode Fuzzy Hash: 5e0100efab947cc34f2bedc1425696db73913a2c09c0408946b5dc9015651bd9
                                    • Instruction Fuzzy Hash: 2F01FF76201114FBEB235B66EC48DEF7EADFB497D1F004025FA8A95054DA758501DBA0
                                    APIs
                                      • Part of subcall function 010089CF: CreateFileU.CRYPT32(00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8,00000014,?), ref: 01008A15
                                      • Part of subcall function 010089CF: GetFileSize.KERNEL32(00000000,00000014,00000014,80000000,00000001,00000000,00000003,00000080,00000000,00000000,00000014,?,?,?,?,010056B8), ref: 01008A27
                                      • Part of subcall function 010089CF: CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AA0
                                      • Part of subcall function 010089CF: CloseHandle.KERNEL32(00000000,?,?,?,010056B8,00000014,?,00000014,?,?,01002606,?), ref: 01008AAB
                                    • CertOpenStore.CRYPT32(00000002,00000000,00000000,00000000,00000000), ref: 010055F2
                                    • CertAddEncodedCRLToStore.CRYPT32(00000000,00000014,?,00000004,00000000), ref: 0100560E
                                    • CertCloseStore.CRYPT32(00000000,00000000), ref: 0100561A
                                    • UnmapViewOfFile.KERNEL32(00000014,?,?,01002636,?,?,?,00000014,?,SHA1,0000000A), ref: 0100562A
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CertCloseFileStore$Handle$CreateEncodedOpenSizeUnmapView
                                    • String ID:
                                    • API String ID: 2155480357-0
                                    • Opcode ID: 6b5c87c6544a87be6891c55ebf2ade5181a0901a2ddd9f5bc5ebbc01311d5002
                                    • Instruction ID: e54639ea79bd19f13beabd818f347e3bab6400d40fb3b860ed1ea97a6c7ab2b3
                                    • Opcode Fuzzy Hash: 6b5c87c6544a87be6891c55ebf2ade5181a0901a2ddd9f5bc5ebbc01311d5002
                                    • Instruction Fuzzy Hash: 91016D36201124BBEB235B66DC4CEDF7EADEF4A7D1F008021FA8996044D636C645DBE0
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: printf
                                    • String ID: $%s
                                    • API String ID: 3524737521-1620431320
                                    • Opcode ID: 832a939498ca5c54dccd47193ac068a8b9a4694dd7b43a4c8c9ae73bb091ee82
                                    • Instruction ID: 54b9187c37f542afa39c023b547ba663b869e8c4564ba06dc11e8b2b1756b5f6
                                    • Opcode Fuzzy Hash: 832a939498ca5c54dccd47193ac068a8b9a4694dd7b43a4c8c9ae73bb091ee82
                                    • Instruction Fuzzy Hash: 74113036148705FEF7172B50FD06CA97BA2FB14B10F108A2EF2CA154E0EB6655129F05
                                    APIs
                                      • Part of subcall function 0100885A: vwprintf.MSVCRT ref: 0100887A
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,?), ref: 010082A0
                                      • Part of subcall function 0100826B: CryptDecodeObject.CRYPT32(00010001,?,00000000,00000011,00000001,00000000,12345678), ref: 010082CC
                                    • printf.MSVCRT ref: 01007BFB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: CryptDecodeObject$printfvwprintf
                                    • String ID: $2.5.29.1
                                    • API String ID: 3955122273-3951722430
                                    • Opcode ID: 7ca381df2652aa7d180789d9e66e273edfc9d45d98226173321b015fd8576d13
                                    • Instruction ID: cf0fc0226f966f60d2a764fd71cbc4d2b005ec1c3172848fb35415eb3df189f1
                                    • Opcode Fuzzy Hash: 7ca381df2652aa7d180789d9e66e273edfc9d45d98226173321b015fd8576d13
                                    • Instruction Fuzzy Hash: 0611A032544B02EAF7372B14FC06F8A7BA1FB44B11F24891EE2C4254E0DB6AA8519B51
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: scanf
                                    • String ID: ,I$_I
                                    • API String ID: 1199118012-3940272718
                                    • Opcode ID: ca101df3259d03fc336c4c528397dc519d8e31adbb33dc6afae083b1c29359d4
                                    • Instruction ID: 323b94659c0a78f8425be748a0ea1a1aa538074ebec5e4d42bbeafb621d42eda
                                    • Opcode Fuzzy Hash: ca101df3259d03fc336c4c528397dc519d8e31adbb33dc6afae083b1c29359d4
                                    • Instruction Fuzzy Hash: 8E01F732748302EEF7275F10BC45AD92FB1FB54760F24852EE6C49E0D0D55298418744
                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000008.00000002.2131457537.0000000001001000.00000020.00000001.01000000.00000009.sdmp, Offset: 01000000, based on PE: true
                                    • Associated: 00000008.00000002.2131426911.0000000001000000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131477940.000000000100A000.00000004.00000001.01000000.00000009.sdmpDownload File
                                    • Associated: 00000008.00000002.2131499489.000000000100C000.00000002.00000001.01000000.00000009.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_8_2_1000000_certmgr.jbxd
                                    Similarity
                                    • API ID: wprintf
                                    • String ID: $%s
                                    • API String ID: 3614878089-1620431320
                                    • Opcode ID: 0cfcd77455245e8f38bf2108cdf96b010bc0f7eb2ddf4a18d3689b7d5f2d12cf
                                    • Instruction ID: 61e4408ed4a96367af9554db99206b70cdff698fab4a52f2a8054b871a27b1a4
                                    • Opcode Fuzzy Hash: 0cfcd77455245e8f38bf2108cdf96b010bc0f7eb2ddf4a18d3689b7d5f2d12cf
                                    • Instruction Fuzzy Hash: 2FF0A479204706EAF6779B50EC01CA67BE5FB14700F148A1EF3C6554D0EB6AB440CB51