Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Scan_PDF_3008059384.exe

Overview

General Information

Sample name:Scan_PDF_3008059384.exe
Analysis ID:1523871
MD5:22c3cd9f336a5cea2d8fbdacb711b80c
SHA1:4edb2257126ad8aa9310ef0e389221e7b5cef796
SHA256:ebd0038b416c567e44fd873f2c1b194e206e5915a82f604de4b25ca45a3d64b5
Tags:exefiledn-comuser-JAMESWT_MHT
Infos:

Detection

Score:42
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries the volume information (name, serial number etc) of a device
Stores large binary data to the registry
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Scan_PDF_3008059384.exe (PID: 8184 cmdline: "C:\Users\user\Desktop\Scan_PDF_3008059384.exe" MD5: 22C3CD9F336A5CEA2D8FBDACB711B80C)
    • dfsvc.exe (PID: 7204 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe" MD5: B4088F44B80D363902E11F897A7BAC09)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Scan_PDF_3008059384.exeReversingLabs: Detection: 18%
Source: Scan_PDF_3008059384.exeVirustotal: Detection: 16%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F41000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree,4_2_00F41000
Source: Scan_PDF_3008059384.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Scan_PDF_3008059384.exeStatic PE information: certificate valid
Source: Scan_PDF_3008059384.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\builds\cc\cwcontrol\Product\ClickOnceRunner\Release\ClickOnceRunner.pdb source: Scan_PDF_3008059384.exe
Source: Binary string: b.pdbJ: source: dfsvc.exe, 00000005.00000002.2036763574.0000019EA7E1E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbz source: dfsvc.exe, 00000005.00000002.2036665985.0000019EA7DB6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.pdb source: dfsvc.exe, 00000005.00000002.2035229255.0000019E8DA84000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: lture=en, PublicKeyToken=b03f5f7f11d50a3aem.pdb source: dfsvc.exe, 00000005.00000002.2036665985.0000019EA7DB6000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F44A4B FindFirstFileExA,4_2_00F44A4B
Source: unknownDNS traffic detected: query: app.cloudfiles-secure.io replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: app.cloudfiles-secure.io
Source: Scan_PDF_3008059384.exe, 00000004.00000003.1284708860.00000000006CB000.00000004.00000020.00020000.00000000.sdmp, Scan_PDF_3008059384.exe, 00000004.00000002.1285669681.00000000006CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredID
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: dfsvc.exe, 00000005.00000002.2037336189.0000019EA841D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://iptc.org/std/Iptc4xmpCore/1.0/xmlns/Mic
Source: dfsvc.exe, 00000005.00000002.2037336189.0000019EA841D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://ocsp.digicert.com0
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: dfsvc.exe, 00000005.00000002.2035838213.0000019E8F78E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Scan_PDF_3008059384.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: dfsvc.exe, 00000005.00000002.2035838213.0000019E8F832000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.cloudfiles-secure.io
Source: Scan_PDF_3008059384.exe, 00000004.00000003.1284708860.00000000006CB000.00000004.00000020.00020000.00000000.sdmp, Scan_PDF_3008059384.exe, 00000004.00000002.1285669681.00000000006CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://app.cloudfiles-secure.io/Bin/ScreenConnect.Client.a
Source: dfsvc.exe, 00000005.00000002.2035838213.0000019E8F890000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000005.00000002.2035838213.0000019E8F83A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.cloudfiles-secure.io/Bin/ScreenConnect.Client.application?e=Support&y=
Source: B96Z294P.log.5.drString found in binary or memory: https://app.cloudfiles-secure.io/Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=kkl22.ddns

System Summary

barindex
Source: initial sampleStatic PE information: Filename: Scan_PDF_3008059384.exe
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F4A4954_2_00F4A495
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 5_2_00007FF7C0E4AEF55_2_00007FF7C0E4AEF5
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 5_2_00007FF7C0E51FB65_2_00007FF7C0E51FB6
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 5_2_00007FF7C0E412405_2_00007FF7C0E41240
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 5_2_00007FF7C0E4F4415_2_00007FF7C0E4F441
Source: Scan_PDF_3008059384.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal42.evad.winEXE@3/2@1/0
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F41000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree,4_2_00F41000
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\DeploymentJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeMutant created: NULL
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\Temp\DeploymentJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCommand line argument: dfshim4_2_00F41000
Source: Scan_PDF_3008059384.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Scan_PDF_3008059384.exeReversingLabs: Detection: 18%
Source: Scan_PDF_3008059384.exeVirustotal: Detection: 16%
Source: unknownProcess created: C:\Users\user\Desktop\Scan_PDF_3008059384.exe "C:\Users\user\Desktop\Scan_PDF_3008059384.exe"
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"Jump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: dfshim.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dfshim.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00020420-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Scan_PDF_3008059384.exeStatic PE information: certificate valid
Source: Scan_PDF_3008059384.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Scan_PDF_3008059384.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Scan_PDF_3008059384.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Scan_PDF_3008059384.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Scan_PDF_3008059384.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Scan_PDF_3008059384.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Scan_PDF_3008059384.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Scan_PDF_3008059384.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\builds\cc\cwcontrol\Product\ClickOnceRunner\Release\ClickOnceRunner.pdb source: Scan_PDF_3008059384.exe
Source: Binary string: b.pdbJ: source: dfsvc.exe, 00000005.00000002.2036763574.0000019EA7E1E000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbz source: dfsvc.exe, 00000005.00000002.2036665985.0000019EA7DB6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.pdb source: dfsvc.exe, 00000005.00000002.2035229255.0000019E8DA84000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: lture=en, PublicKeyToken=b03f5f7f11d50a3aem.pdb source: dfsvc.exe, 00000005.00000002.2036665985.0000019EA7DB6000.00000004.00000020.00020000.00000000.sdmp
Source: Scan_PDF_3008059384.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Scan_PDF_3008059384.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Scan_PDF_3008059384.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Scan_PDF_3008059384.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Scan_PDF_3008059384.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F41000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree,4_2_00F41000
Source: Scan_PDF_3008059384.exeStatic PE information: real checksum: 0x1bda6 should be: 0x1ea85
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F41BC0 push ecx; ret 4_2_00F41BD3
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 5_2_00007FF7C0E4B92B push cs; iretd 5_2_00007FF7C0E4B96A
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 5_2_00007FF7C0E4845E push eax; ret 5_2_00007FF7C0E4846D
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 5_2_00007FF7C0E4842E pushad ; ret 5_2_00007FF7C0E4845D
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 5_2_00007FF7C0E47C35 push eax; retf 5_2_00007FF7C0E47C6D
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 5_2_00007FF7C0E400BD pushad ; iretd 5_2_00007FF7C0E400C1
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 5_2_00007FF7C0E47018 push cs; iretd 5_2_00007FF7C0E4701F
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C BlobJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeMemory allocated: 19E8DC00000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeMemory allocated: 19EA76C0000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599860Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599735Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599625Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599512Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599404Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599297Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599172Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599063Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598878Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598728Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598538Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598360Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598219Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598103Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597984Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597875Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597766Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597656Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597547Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597438Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597313Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597188Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597077Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596969Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596844Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596735Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596610Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596485Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596360Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596235Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596110Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595971Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595844Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595731Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595625Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595516Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595406Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595297Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595188Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595063Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594938Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594813Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594700Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594593Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594484Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594375Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594266Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594141Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594031Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeWindow / User API: threadDelayed 2354Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeWindow / User API: threadDelayed 7386Jump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exe TID: 8188Thread sleep time: -40000s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -26747778906878833s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -600000s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -599860s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -599735s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -599625s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -599512s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -599404s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -599297s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -599172s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -599063s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -598878s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -598728s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -598538s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -598360s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -598219s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -598103s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -597984s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -597875s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -597766s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -597656s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -597547s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -597438s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -597313s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -597188s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -597077s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -596969s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -596844s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -596735s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -596610s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -596485s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -596360s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -596235s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -596110s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -595971s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -595844s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -595731s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -595625s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -595516s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -595406s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -595297s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -595188s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -595063s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -594938s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -594813s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -594700s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -594593s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -594484s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -594375s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -594266s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -594141s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 7404Thread sleep time: -594031s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F44A4B FindFirstFileExA,4_2_00F44A4B
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeThread delayed: delay time: 40000Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599860Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599735Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599625Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599512Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599404Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599297Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599172Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599063Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598878Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598728Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598538Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598360Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598219Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598103Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597984Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597875Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597766Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597656Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597547Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597438Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597313Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597188Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597077Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596969Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596844Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596735Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596610Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596485Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596360Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596235Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596110Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595971Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595844Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595731Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595625Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595516Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595406Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595297Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595188Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595063Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594938Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594813Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594700Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594593Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594484Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594375Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594266Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594141Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594031Jump to behavior
Source: dfsvc.exe, 00000005.00000002.2036665985.0000019EA7DB6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F44573 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00F44573
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F41000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree,4_2_00F41000
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F43677 mov eax, dword ptr fs:[00000030h]4_2_00F43677
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F46893 GetProcessHeap,4_2_00F46893
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"Jump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F41493 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00F41493
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F44573 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00F44573
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F4191F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00F4191F
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F41AAC SetUnhandledExceptionFilter,4_2_00F41AAC
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F41BD4 cpuid 4_2_00F41BD4
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeCode function: 4_2_00F41806 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_00F41806
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3008059384.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C BlobJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Modify Registry
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)21
Disable or Modify Tools
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook31
Virtualization/Sandbox Evasion
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Process Injection
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain Credentials23
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Install Root Certificate
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Scan_PDF_3008059384.exe18%ReversingLabs
Scan_PDF_3008059384.exe16%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
app.cloudfiles-secure.io0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
https://app.cloudfiles-secure.io1%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
app.cloudfiles-secure.io
unknown
unknownfalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://app.cloudfiles-secure.io/Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=kkl22.ddnsB96Z294P.log.5.drfalse
    unknown
    https://app.cloudfiles-secure.iodfsvc.exe, 00000005.00000002.2035838213.0000019E8F832000.00000004.00000800.00020000.00000000.sdmpfalseunknown
    https://app.cloudfiles-secure.io/Bin/ScreenConnect.Client.application?e=Support&y=dfsvc.exe, 00000005.00000002.2035838213.0000019E8F890000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000005.00000002.2035838213.0000019E8F83A000.00000004.00000800.00020000.00000000.sdmpfalse
      unknown
      http://ns.adobe.dfsvc.exe, 00000005.00000002.2037336189.0000019EA841D000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namedfsvc.exe, 00000005.00000002.2035838213.0000019E8F78E000.00000004.00000800.00020000.00000000.sdmpfalse
        • URL Reputation: safe
        unknown
        https://app.cloudfiles-secure.io/Bin/ScreenConnect.Client.aScan_PDF_3008059384.exe, 00000004.00000003.1284708860.00000000006CB000.00000004.00000020.00020000.00000000.sdmp, Scan_PDF_3008059384.exe, 00000004.00000002.1285669681.00000000006CB000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://iptc.org/std/Iptc4xmpCore/1.0/xmlns/Micdfsvc.exe, 00000005.00000002.2037336189.0000019EA841D000.00000004.00000020.00020000.00000000.sdmpfalse
            unknown
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1523871
            Start date and time:2024-10-02 06:11:06 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 4m 14s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:13
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Scan_PDF_3008059384.exe
            Detection:MAL
            Classification:mal42.evad.winEXE@3/2@1/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 98%
            • Number of executed functions: 6
            • Number of non-executed functions: 27
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
            • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtProtectVirtualMemory calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            TimeTypeDescription
            00:12:00API Interceptor20589x Sleep call for process: dfsvc.exe modified
            00:12:00API Interceptor1x Sleep call for process: Scan_PDF_3008059384.exe modified
            No context
            No context
            No context
            No context
            No context
            Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):1373
            Entropy (8bit):5.369201792577388
            Encrypted:false
            SSDEEP:24:ML1XE4qpE4KQ71qE4GIs0E4KGAE4KKUNKKDE4KGKZI6KhPKIE4TKBGKoM:M1H2HKQ71qHGIs0HKGAHKKkKYHKGSI65
            MD5:AE112903AD8CD5C130DF44E7E1601F48
            SHA1:A3D879E7F63259F5C76C846DC8A59E5AA36EC5F6
            SHA-256:FAFA70F9D4F34235B7681A6296CA5B27A7932EDFF8A029BE748810DC2547C2ED
            SHA-512:29388D9599B400D9BDC2F869548A0448470755C7A3AFA24955B768D214A7E5802BB655C1EB4C679E308916266DFA5C2FA7CE3A3F10E802D349C63588C735984F
            Malicious:false
            Reputation:moderate, very likely benign file
            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Deployment, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, Pu
            Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
            File Type:Unicode text, UTF-16, little-endian text, with very long lines (653), with CRLF line terminators
            Category:dropped
            Size (bytes):12798
            Entropy (8bit):3.897147969230462
            Encrypted:false
            SSDEEP:192:zjZqHzcjZqHzejngHd+jKDjZqHzrjngHdB4e1ujr3n:vgmgIg28grgz4e1E7
            MD5:5475367DAD0D73811E52A0C034E4EA0A
            SHA1:C8B2311C214F42729CE0D644F27A4C4F57200FCF
            SHA-256:0DD82EECF7F9EE56303868D34CA9574989C1EEA1D0AF552FA0222A6174FC3CE9
            SHA-512:82392F7E0901CC11517CE0609F219137287FEFEE40903B9C6F4F90C6B171F175DBAC47B9BBF3E338C53166778EB4648142CD89EA770731F41B7803EC12B0D0C8
            Malicious:false
            Reputation:low
            Preview:..P.L.A.T.F.O.R.M. .V.E.R.S.I.O.N. .I.N.F.O.......W.i.n.d.o.w.s. .......:. .1.0...0...1.9.0.4.5...0. .(.W.i.n.3.2.N.T.).......C.o.m.m.o.n. .L.a.n.g.u.a.g.e. .R.u.n.t.i.m.e. ...:. .4...0...3.0.3.1.9...4.2.0.0.0.......S.y.s.t.e.m...D.e.p.l.o.y.m.e.n.t...d.l.l. .....:. .4...8...4.2.7.0...0. .b.u.i.l.t. .b.y.:. .N.E.T.4.8.R.E.L.1.L.A.S.T._.C.......c.l.r...d.l.l. .......:. .4...8...4.5.1.5...0. .b.u.i.l.t. .b.y.:. .N.E.T.4.8.R.E.L.1.L.A.S.T._.C.......d.f.d.l.l...d.l.l. .......:. .4...8...4.2.7.0...0. .b.u.i.l.t. .b.y.:. .N.E.T.4.8.R.E.L.1.L.A.S.T._.C.......d.f.s.h.i.m...d.l.l. .......:. .1.0...0...1.9.0.4.1...3.0.0.0.0. .(.W.i.n.B.u.i.l.d...1.6.0.1.0.1...0.8.0.0.).........S.O.U.R.C.E.S.......D.e.p.l.o.y.m.e.n.t. .u.r.l.......:. .h.t.t.p.s.:././.a.p.p...c.l.o.u.d.f.i.l.e.s.-.s.e.c.u.r.e...i.o./.B.i.n./.S.c.r.e.e.n.C.o.n.n.e.c.t...C.l.i.e.n.t...a.p.p.l.i.c.a.t.i.o.n.?.e.=.S.u.p.p.o.r.t.&.y.=.G.u.e.s.t.&.h.=.k.k.l.2.2...d.d.n.s...n.e.t.&.p.=.8.0.4.1.&.s.=.3.9.a.0.2.2.c.8.-.7.b.3.8.-.4.4.c.0.-.
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):6.514301896434248
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:Scan_PDF_3008059384.exe
            File size:83'376 bytes
            MD5:22c3cd9f336a5cea2d8fbdacb711b80c
            SHA1:4edb2257126ad8aa9310ef0e389221e7b5cef796
            SHA256:ebd0038b416c567e44fd873f2c1b194e206e5915a82f604de4b25ca45a3d64b5
            SHA512:0e0e3d6c20ddc57e094ec87e2b1dc065d66ec362007a1030fb7f754c1e53053c113576f6c74ea20ee757cd15a19afc7e7603672a05a4e833bf3aec58c1590245
            SSDEEP:1536:JoG6KpY6Qi3yj2wyq4HwiMO10HVLCJRpsWr6cdaxPBJYYX7gxD1:TenkyfPAwiMq0RqRfbaxZJYYX0
            TLSH:B7835B43B5D18475E9720E3118B1D9B4593FBE110EA48EAF3398426E0F351D1AE3AE7B
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....... ycId...d...d.......n...............|.......A.......v.......v...m`..a...d...........e.......e.......e...Richd...........PE..L..
            Icon Hash:90cececece8e8eb0
            Entrypoint:0x401489
            Entrypoint Section:.text
            Digitally signed:true
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x66BBDDB2 [Tue Aug 13 22:26:58 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:1
            File Version Major:5
            File Version Minor:1
            Subsystem Version Major:5
            Subsystem Version Minor:1
            Import Hash:37d5c89163970dd3cc69230538a1b72b
            Signature Valid:true
            Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
            Signature Validation Error:The operation completed successfully
            Error Number:0
            Not Before, Not After
            • 17/08/2022 02:00:00 16/08/2025 01:59:59
            Subject Chain
            • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
            Version:3
            Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
            Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
            Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
            Serial:0B9360051BCCF66642998998D5BA97CE
            Instruction
            call 00007F0BA8DB9C5Ah
            jmp 00007F0BA8DB970Fh
            push ebp
            mov ebp, esp
            push 00000000h
            call dword ptr [0040B048h]
            push dword ptr [ebp+08h]
            call dword ptr [0040B044h]
            push C0000409h
            call dword ptr [0040B04Ch]
            push eax
            call dword ptr [0040B050h]
            pop ebp
            ret
            push ebp
            mov ebp, esp
            sub esp, 00000324h
            push 00000017h
            call dword ptr [0040B054h]
            test eax, eax
            je 00007F0BA8DB9897h
            push 00000002h
            pop ecx
            int 29h
            mov dword ptr [004118C0h], eax
            mov dword ptr [004118BCh], ecx
            mov dword ptr [004118B8h], edx
            mov dword ptr [004118B4h], ebx
            mov dword ptr [004118B0h], esi
            mov dword ptr [004118ACh], edi
            mov word ptr [004118D8h], ss
            mov word ptr [004118CCh], cs
            mov word ptr [004118A8h], ds
            mov word ptr [004118A4h], es
            mov word ptr [004118A0h], fs
            mov word ptr [0041189Ch], gs
            pushfd
            pop dword ptr [004118D0h]
            mov eax, dword ptr [ebp+00h]
            mov dword ptr [004118C4h], eax
            mov eax, dword ptr [ebp+04h]
            mov dword ptr [004118C8h], eax
            lea eax, dword ptr [ebp+08h]
            mov dword ptr [004118D4h], eax
            mov eax, dword ptr [ebp-00000324h]
            mov dword ptr [00411810h], 00010001h
            Programming Language:
            • [IMP] VS2008 SP1 build 30729
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x1060c0x3c.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x130000x1e0.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x118000x2db0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xddc.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0xfe380x70.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xfd780x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0xb0000x13c.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x9cf80x9e00bae4521030709e187bdbe8a34d7bf731False0.6035650712025317data6.581464957368758IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0xb0000x5d580x5e00ec94ce6ebdbe57640638e0aa31d08896False0.4178025265957447Applesoft BASIC program data, first line number 14.843224204192078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x110000x11cc0x80004a548a5c04675d08166d3823a6bf61bFalse0.16357421875data2.0120795802951505IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x130000x1e00x200aa256780346be2e1ee49ac6d69d2faffFalse0.52734375data4.703723272345726IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x140000xddc0xe00908329e10a1923a3c4938a10d44237d9False0.7776227678571429data6.495696626464028IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_MANIFEST0x130600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
            DLLImport
            KERNEL32.dllLocalFree, GetProcAddress, LoadLibraryA, Sleep, LocalAlloc, GetModuleFileNameW, DecodePointer, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, GetModuleFileNameA, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap, HeapSize, HeapReAlloc, FlushFileBuffers, GetConsoleCP, GetConsoleMode, SetFilePointerEx, WriteConsoleW, CreateFileW
            CRYPT32.dllCertDeleteCertificateFromStore, CryptMsgGetParam, CertCloseStore, CryptQueryObject, CertAddCertificateContextToStore, CertFindAttribute, CertFreeCertificateContext, CertCreateCertificateContext, CertOpenSystemStoreA
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Oct 2, 2024 06:12:03.588624001 CEST5029153192.168.2.101.1.1.1
            Oct 2, 2024 06:12:03.685935974 CEST53502911.1.1.1192.168.2.10
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Oct 2, 2024 06:12:03.588624001 CEST192.168.2.101.1.1.10x744cStandard query (0)app.cloudfiles-secure.ioA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Oct 2, 2024 06:12:03.685935974 CEST1.1.1.1192.168.2.100x744cName error (3)app.cloudfiles-secure.iononenoneA (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:4
            Start time:00:12:00
            Start date:02/10/2024
            Path:C:\Users\user\Desktop\Scan_PDF_3008059384.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\Scan_PDF_3008059384.exe"
            Imagebase:0xf40000
            File size:83'376 bytes
            MD5 hash:22C3CD9F336A5CEA2D8FBDACB711B80C
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:5
            Start time:00:12:00
            Start date:02/10/2024
            Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
            Wow64 process (32bit):false
            Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
            Imagebase:0x19e8d8d0000
            File size:24'856 bytes
            MD5 hash:B4088F44B80D363902E11F897A7BAC09
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:moderate
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:3.3%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:3.8%
              Total number of Nodes:1473
              Total number of Limit Nodes:34
              execution_graph 5752 f41ff4 5755 f42042 5752->5755 5756 f41fff 5755->5756 5757 f4204b 5755->5757 5757->5756 5764 f423c3 5757->5764 5760 f423c3 43 API calls 5761 f42091 5760->5761 5778 f43e89 5761->5778 5784 f423d1 5764->5784 5766 f423c8 5767 f42086 5766->5767 5768 f46b14 _abort 2 API calls 5766->5768 5767->5760 5769 f43f29 5768->5769 5770 f43f35 5769->5770 5771 f46b6f _abort 33 API calls 5769->5771 5772 f43f3e IsProcessorFeaturePresent 5770->5772 5773 f43f5c 5770->5773 5771->5770 5774 f43f49 5772->5774 5775 f43793 _abort 23 API calls 5773->5775 5776 f44573 _abort 3 API calls 5774->5776 5777 f43f66 5775->5777 5776->5773 5779 f43e95 _abort 5778->5779 5780 f44424 _abort 33 API calls 5779->5780 5783 f43e9a 5780->5783 5781 f43f24 _abort 33 API calls 5782 f43ec4 5781->5782 5783->5781 5785 f423dd GetLastError 5784->5785 5786 f423da 5784->5786 5796 f426a4 5785->5796 5786->5766 5788 f42457 SetLastError 5788->5766 5790 f426df ___vcrt_FlsSetValue 6 API calls 5791 f4240b 5790->5791 5792 f42433 5791->5792 5794 f426df ___vcrt_FlsSetValue 6 API calls 5791->5794 5795 f42411 5791->5795 5793 f426df ___vcrt_FlsSetValue 6 API calls 5792->5793 5792->5795 5793->5795 5794->5792 5795->5788 5797 f42543 ___vcrt_FlsSetValue 5 API calls 5796->5797 5798 f426be 5797->5798 5799 f426d6 TlsGetValue 5798->5799 5800 f423f2 5798->5800 5799->5800 5800->5788 5800->5790 5800->5795 5973 f43eb5 5974 f43eb8 5973->5974 5975 f43f24 _abort 33 API calls 5974->5975 5976 f43ec4 5975->5976 6130 f47570 6131 f475a9 6130->6131 6132 f447f9 _free 15 API calls 6131->6132 6136 f475d5 _ValidateLocalCookies 6131->6136 6133 f475b2 6132->6133 6134 f4473d _abort 21 API calls 6133->6134 6135 f475bd _ValidateLocalCookies 6134->6135 5801 f48df1 5802 f48e15 5801->5802 5803 f48e2e 5802->5803 5805 f49beb __startOneArgErrorHandling 5802->5805 5804 f48e78 5803->5804 5809 f499d3 5803->5809 5808 f49c2d __startOneArgErrorHandling 5805->5808 5817 f4a1c4 5805->5817 5810 f49a00 5809->5810 5811 f499f0 DecodePointer 5809->5811 5812 f49a82 _ValidateLocalCookies 5810->5812 5813 f49a8d 5810->5813 5815 f49a37 5810->5815 5811->5810 5812->5804 5813->5812 5814 f447f9 _free 15 API calls 5813->5814 5814->5812 5815->5812 5816 f447f9 _free 15 API calls 5815->5816 5816->5812 5818 f4a1fd __startOneArgErrorHandling 5817->5818 5820 f4a224 __startOneArgErrorHandling 5818->5820 5826 f4a495 5818->5826 5821 f4a267 5820->5821 5823 f4a242 5820->5823 5837 f4a786 5821->5837 5830 f4a7b5 5823->5830 5825 f4a262 __startOneArgErrorHandling _ValidateLocalCookies 5825->5808 5827 f4a4c0 __raise_exc 5826->5827 5828 f4a6b9 RaiseException 5827->5828 5829 f4a6d1 5828->5829 5829->5820 5831 f4a7c4 5830->5831 5832 f4a7e3 __startOneArgErrorHandling 5831->5832 5833 f4a838 __startOneArgErrorHandling 5831->5833 5835 f4a786 __startOneArgErrorHandling 15 API calls 5832->5835 5836 f4a831 5832->5836 5834 f4a786 __startOneArgErrorHandling 15 API calls 5833->5834 5834->5836 5835->5836 5836->5825 5838 f4a793 5837->5838 5839 f4a7a8 5837->5839 5841 f447f9 _free 15 API calls 5838->5841 5842 f4a7ad 5838->5842 5840 f447f9 _free 15 API calls 5839->5840 5840->5842 5843 f4a7a0 5841->5843 5842->5825 5843->5825 6352 f4383f 6354 f4384b ___scrt_is_nonwritable_in_current_image 6352->6354 6353 f43882 _abort 6354->6353 6360 f456e2 EnterCriticalSection 6354->6360 6356 f4385f 6357 f467cb __fassign 15 API calls 6356->6357 6358 f4386f 6357->6358 6361 f43888 6358->6361 6360->6356 6364 f4572a LeaveCriticalSection 6361->6364 6363 f4388f 6363->6353 6364->6363 5977 f41ab8 5978 f41aef 5977->5978 5979 f41aca 5977->5979 5979->5978 5986 f4209a 5979->5986 5984 f43e89 33 API calls 5985 f41b0d 5984->5985 5987 f423c3 43 API calls 5986->5987 5988 f41afc 5987->5988 5989 f420a3 5988->5989 5990 f423c3 43 API calls 5989->5990 5991 f41b06 5990->5991 5991->5984 5844 f412fb 5849 f41aac SetUnhandledExceptionFilter 5844->5849 5846 f41300 5850 f438f9 5846->5850 5848 f4130b 5849->5846 5851 f43905 5850->5851 5852 f4391f 5850->5852 5851->5852 5853 f447f9 _free 15 API calls 5851->5853 5852->5848 5854 f4390f 5853->5854 5855 f4473d _abort 21 API calls 5854->5855 5856 f4391a 5855->5856 5856->5848 5992 f448bb 5993 f448cb 5992->5993 5998 f448e1 5992->5998 5994 f447f9 _free 15 API calls 5993->5994 5995 f448d0 5994->5995 5997 f4473d _abort 21 API calls 5995->5997 6006 f448da 5997->6006 6003 f44a2c 5998->6003 6005 f4494b 5998->6005 6011 f44a4b 5998->6011 5999 f449b0 6001 f449b9 5999->6001 6008 f44a3e 5999->6008 6028 f479bb 5999->6028 6002 f44869 _free 15 API calls 6001->6002 6002->6003 6037 f44c65 6003->6037 6022 f431ec 6005->6022 6009 f4474d _abort 6 API calls 6008->6009 6010 f44a4a 6009->6010 6012 f44a57 6011->6012 6012->6012 6013 f4480c _abort 15 API calls 6012->6013 6014 f44a85 6013->6014 6015 f479bb 21 API calls 6014->6015 6016 f44ab1 6015->6016 6017 f4474d _abort 6 API calls 6016->6017 6018 f44ae0 _abort 6017->6018 6019 f44b81 FindFirstFileExA 6018->6019 6020 f44bd0 6019->6020 6021 f44a4b 21 API calls 6020->6021 6023 f431fd 6022->6023 6024 f43201 6022->6024 6023->5999 6024->6023 6025 f4480c _abort 15 API calls 6024->6025 6026 f4322f 6025->6026 6027 f44869 _free 15 API calls 6026->6027 6027->6023 6032 f4790a 6028->6032 6029 f4791f 6030 f447f9 _free 15 API calls 6029->6030 6031 f47924 6029->6031 6033 f4794a 6030->6033 6031->5999 6032->6029 6032->6031 6035 f4795b 6032->6035 6034 f4473d _abort 21 API calls 6033->6034 6034->6031 6035->6031 6036 f447f9 _free 15 API calls 6035->6036 6036->6033 6038 f44c6f 6037->6038 6039 f44c7f 6038->6039 6041 f44869 _free 15 API calls 6038->6041 6040 f44869 _free 15 API calls 6039->6040 6042 f44c86 6040->6042 6041->6038 6042->6006 6043 f414bb IsProcessorFeaturePresent 6044 f414d0 6043->6044 6047 f41493 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6044->6047 6046 f415b3 6047->6046 5857 f433e5 5858 f433f7 5857->5858 5860 f433fd 5857->5860 5861 f43376 5858->5861 5865 f433a0 5861->5865 5866 f43383 5861->5866 5862 f4339a 5863 f44869 _free 15 API calls 5862->5863 5863->5865 5864 f44869 _free 15 API calls 5864->5866 5865->5860 5866->5862 5866->5864 6048 f45ba6 6049 f45bb1 6048->6049 6051 f45bd7 6048->6051 6050 f45bc1 FreeLibrary 6049->6050 6049->6051 6050->6049 6365 f46026 6366 f4602b 6365->6366 6368 f4604e 6366->6368 6369 f45c56 6366->6369 6370 f45c63 6369->6370 6374 f45c85 6369->6374 6371 f45c71 DeleteCriticalSection 6370->6371 6372 f45c7f 6370->6372 6371->6371 6371->6372 6373 f44869 _free 15 API calls 6372->6373 6373->6374 6374->6366 6137 f49160 6140 f4917e 6137->6140 6139 f49176 6144 f49183 6140->6144 6141 f499d3 16 API calls 6143 f493af 6141->6143 6142 f49218 6142->6139 6143->6139 6144->6141 6144->6142 5867 f48ce1 5868 f48d01 5867->5868 5871 f48d38 5868->5871 5870 f48d2b 5872 f48d3f 5871->5872 5873 f48da0 5872->5873 5874 f48d5f 5872->5874 5876 f4988e 5873->5876 5880 f49997 5873->5880 5874->5876 5878 f49997 16 API calls 5874->5878 5876->5870 5879 f498be 5878->5879 5879->5870 5881 f499a0 5880->5881 5884 f4a06f 5881->5884 5883 f48dee 5883->5870 5885 f4a0ae __startOneArgErrorHandling 5884->5885 5888 f4a130 __startOneArgErrorHandling 5885->5888 5890 f4a472 5885->5890 5887 f4a786 __startOneArgErrorHandling 15 API calls 5889 f4a166 _ValidateLocalCookies 5887->5889 5888->5887 5888->5889 5889->5883 5891 f4a495 __raise_exc RaiseException 5890->5891 5892 f4a490 5891->5892 5892->5888 6052 f456a1 6053 f456ac 6052->6053 6054 f459b3 6 API calls 6053->6054 6055 f456d5 6053->6055 6057 f456d1 6053->6057 6054->6053 6058 f456f9 6055->6058 6059 f45725 6058->6059 6060 f45706 6058->6060 6059->6057 6061 f45710 DeleteCriticalSection 6060->6061 6061->6059 6061->6061 6375 f4452d 6383 f45858 6375->6383 6377 f44537 6378 f444a8 _abort 15 API calls 6377->6378 6382 f44541 6377->6382 6379 f44549 6378->6379 6380 f44556 6379->6380 6388 f44559 6379->6388 6384 f45741 _abort 5 API calls 6383->6384 6385 f4587f 6384->6385 6386 f45897 TlsAlloc 6385->6386 6387 f45888 _ValidateLocalCookies 6385->6387 6386->6387 6387->6377 6389 f44563 6388->6389 6391 f44569 6388->6391 6392 f458ae 6389->6392 6391->6382 6393 f45741 _abort 5 API calls 6392->6393 6394 f458d5 6393->6394 6395 f458ed TlsFree 6394->6395 6396 f458e1 _ValidateLocalCookies 6394->6396 6395->6396 6396->6391 6397 f4142e 6400 f42cf0 6397->6400 6399 f4143f 6401 f444a8 _abort 15 API calls 6400->6401 6402 f42d07 _ValidateLocalCookies 6401->6402 6402->6399 5893 f49beb 5894 f49c04 __startOneArgErrorHandling 5893->5894 5895 f4a1c4 16 API calls 5894->5895 5896 f49c2d __startOneArgErrorHandling 5894->5896 5895->5896 5897 f45fd0 5898 f45fdc ___scrt_is_nonwritable_in_current_image 5897->5898 5909 f456e2 EnterCriticalSection 5898->5909 5900 f45fe3 5910 f45c8b 5900->5910 5902 f45ff2 5908 f46001 5902->5908 5923 f45e64 GetStartupInfoW 5902->5923 5906 f46012 _abort 5934 f4601d 5908->5934 5909->5900 5911 f45c97 ___scrt_is_nonwritable_in_current_image 5910->5911 5912 f45ca4 5911->5912 5913 f45cbb 5911->5913 5915 f447f9 _free 15 API calls 5912->5915 5937 f456e2 EnterCriticalSection 5913->5937 5916 f45ca9 5915->5916 5917 f4473d _abort 21 API calls 5916->5917 5918 f45cb3 _abort 5917->5918 5918->5902 5919 f45cf3 5945 f45d1a 5919->5945 5920 f45cc7 5920->5919 5938 f45bdc 5920->5938 5924 f45f13 5923->5924 5925 f45e81 5923->5925 5929 f45f1a 5924->5929 5925->5924 5926 f45c8b 22 API calls 5925->5926 5927 f45eaa 5926->5927 5927->5924 5928 f45ed8 GetFileType 5927->5928 5928->5927 5931 f45f21 5929->5931 5930 f45f64 GetStdHandle 5930->5931 5931->5930 5932 f45fcc 5931->5932 5933 f45f77 GetFileType 5931->5933 5932->5908 5933->5931 5954 f4572a LeaveCriticalSection 5934->5954 5936 f46024 5936->5906 5937->5920 5939 f4480c _abort 15 API calls 5938->5939 5942 f45bee 5939->5942 5940 f45bfb 5941 f44869 _free 15 API calls 5940->5941 5943 f45c4d 5941->5943 5942->5940 5948 f459b3 5942->5948 5943->5920 5953 f4572a LeaveCriticalSection 5945->5953 5947 f45d21 5947->5918 5949 f45741 _abort 5 API calls 5948->5949 5950 f459da 5949->5950 5951 f459f8 InitializeCriticalSectionAndSpinCount 5950->5951 5952 f459e3 _ValidateLocalCookies 5950->5952 5951->5952 5952->5942 5953->5947 5954->5936 6403 f47a10 6406 f47a27 6403->6406 6407 f47a35 6406->6407 6408 f47a49 6406->6408 6411 f447f9 _free 15 API calls 6407->6411 6409 f47a51 6408->6409 6410 f47a63 6408->6410 6412 f447f9 _free 15 API calls 6409->6412 6415 f43f72 __fassign 33 API calls 6410->6415 6417 f47a22 6410->6417 6413 f47a3a 6411->6413 6414 f47a56 6412->6414 6416 f4473d _abort 21 API calls 6413->6416 6418 f4473d _abort 21 API calls 6414->6418 6415->6417 6416->6417 6418->6417 6145 f47351 6146 f4735e 6145->6146 6147 f4480c _abort 15 API calls 6146->6147 6148 f47378 6147->6148 6149 f44869 _free 15 API calls 6148->6149 6150 f47384 6149->6150 6151 f4480c _abort 15 API calls 6150->6151 6155 f473aa 6150->6155 6153 f4739e 6151->6153 6152 f459b3 6 API calls 6152->6155 6154 f44869 _free 15 API calls 6153->6154 6154->6155 6155->6152 6156 f473b6 6155->6156 6157 f47414 6155->6157 6062 f46893 GetProcessHeap 6158 f42f53 6159 f42f62 6158->6159 6160 f42f7e 6158->6160 6159->6160 6162 f42f68 6159->6162 6161 f4522b 46 API calls 6160->6161 6163 f42f85 GetModuleFileNameA 6161->6163 6164 f447f9 _free 15 API calls 6162->6164 6165 f42fa9 6163->6165 6166 f42f6d 6164->6166 6181 f43077 6165->6181 6167 f4473d _abort 21 API calls 6166->6167 6168 f42f77 6167->6168 6171 f431ec 15 API calls 6172 f42fd3 6171->6172 6173 f42fdc 6172->6173 6174 f42fe8 6172->6174 6175 f447f9 _free 15 API calls 6173->6175 6176 f43077 33 API calls 6174->6176 6180 f42fe1 6175->6180 6177 f42ffe 6176->6177 6179 f44869 _free 15 API calls 6177->6179 6177->6180 6178 f44869 _free 15 API calls 6178->6168 6179->6180 6180->6178 6183 f4309c 6181->6183 6182 f455b6 33 API calls 6182->6183 6183->6182 6185 f430fc 6183->6185 6184 f42fc6 6184->6171 6185->6184 6186 f455b6 33 API calls 6185->6186 6186->6185 6419 f47d1c 6420 f4522b 46 API calls 6419->6420 6421 f47d21 6420->6421 6187 f4365d 6188 f43e89 33 API calls 6187->6188 6189 f43665 6188->6189 6422 f47419 6432 f47fb2 6422->6432 6426 f47426 6445 f4828e 6426->6445 6429 f47450 6430 f44869 _free 15 API calls 6429->6430 6431 f4745b 6430->6431 6449 f47fbb 6432->6449 6434 f47421 6435 f481ee 6434->6435 6436 f481fa ___scrt_is_nonwritable_in_current_image 6435->6436 6469 f456e2 EnterCriticalSection 6436->6469 6438 f48270 6483 f48285 6438->6483 6439 f48205 6439->6438 6441 f48244 DeleteCriticalSection 6439->6441 6470 f4901c 6439->6470 6444 f44869 _free 15 API calls 6441->6444 6442 f4827c _abort 6442->6426 6444->6439 6446 f482a4 6445->6446 6447 f47435 DeleteCriticalSection 6445->6447 6446->6447 6448 f44869 _free 15 API calls 6446->6448 6447->6426 6447->6429 6448->6447 6450 f47fc7 ___scrt_is_nonwritable_in_current_image 6449->6450 6459 f456e2 EnterCriticalSection 6450->6459 6452 f4806a 6464 f4808a 6452->6464 6455 f48076 _abort 6455->6434 6457 f47f6b 61 API calls 6458 f47fd6 6457->6458 6458->6452 6458->6457 6460 f47465 EnterCriticalSection 6458->6460 6461 f48060 6458->6461 6459->6458 6460->6458 6467 f47479 LeaveCriticalSection 6461->6467 6463 f48068 6463->6458 6468 f4572a LeaveCriticalSection 6464->6468 6466 f48091 6466->6455 6467->6463 6468->6466 6469->6439 6471 f49028 ___scrt_is_nonwritable_in_current_image 6470->6471 6472 f4904e 6471->6472 6473 f49039 6471->6473 6482 f49049 _abort 6472->6482 6486 f47465 EnterCriticalSection 6472->6486 6474 f447f9 _free 15 API calls 6473->6474 6475 f4903e 6474->6475 6478 f4473d _abort 21 API calls 6475->6478 6477 f4906a 6487 f48fa6 6477->6487 6478->6482 6480 f49075 6503 f49092 6480->6503 6482->6439 6741 f4572a LeaveCriticalSection 6483->6741 6485 f4828c 6485->6442 6486->6477 6488 f48fb3 6487->6488 6489 f48fc8 6487->6489 6490 f447f9 _free 15 API calls 6488->6490 6501 f48fc3 6489->6501 6506 f47f05 6489->6506 6492 f48fb8 6490->6492 6494 f4473d _abort 21 API calls 6492->6494 6494->6501 6495 f4828e 15 API calls 6496 f48fe4 6495->6496 6512 f4732b 6496->6512 6498 f48fea 6519 f49d4e 6498->6519 6501->6480 6502 f44869 _free 15 API calls 6502->6501 6740 f47479 LeaveCriticalSection 6503->6740 6505 f4909a 6505->6482 6507 f47f1d 6506->6507 6511 f47f19 6506->6511 6508 f4732b 21 API calls 6507->6508 6507->6511 6509 f47f3d 6508->6509 6534 f489a7 6509->6534 6511->6495 6513 f47337 6512->6513 6514 f4734c 6512->6514 6515 f447f9 _free 15 API calls 6513->6515 6514->6498 6516 f4733c 6515->6516 6517 f4473d _abort 21 API calls 6516->6517 6518 f47347 6517->6518 6518->6498 6520 f49d72 6519->6520 6521 f49d5d 6519->6521 6522 f49dad 6520->6522 6527 f49d99 6520->6527 6523 f447e6 __dosmaperr 15 API calls 6521->6523 6525 f447e6 __dosmaperr 15 API calls 6522->6525 6524 f49d62 6523->6524 6526 f447f9 _free 15 API calls 6524->6526 6528 f49db2 6525->6528 6531 f48ff0 6526->6531 6697 f49d26 6527->6697 6530 f447f9 _free 15 API calls 6528->6530 6532 f49dba 6530->6532 6531->6501 6531->6502 6533 f4473d _abort 21 API calls 6532->6533 6533->6531 6535 f489b3 ___scrt_is_nonwritable_in_current_image 6534->6535 6536 f489d3 6535->6536 6537 f489bb 6535->6537 6539 f48a71 6536->6539 6543 f48a08 6536->6543 6559 f447e6 6537->6559 6540 f447e6 __dosmaperr 15 API calls 6539->6540 6542 f48a76 6540->6542 6545 f447f9 _free 15 API calls 6542->6545 6562 f45d23 EnterCriticalSection 6543->6562 6544 f447f9 _free 15 API calls 6553 f489c8 _abort 6544->6553 6547 f48a7e 6545->6547 6549 f4473d _abort 21 API calls 6547->6549 6548 f48a0e 6550 f48a3f 6548->6550 6551 f48a2a 6548->6551 6549->6553 6563 f48a92 6550->6563 6552 f447f9 _free 15 API calls 6551->6552 6555 f48a2f 6552->6555 6553->6511 6557 f447e6 __dosmaperr 15 API calls 6555->6557 6556 f48a3a 6612 f48a69 6556->6612 6557->6556 6560 f444a8 _abort 15 API calls 6559->6560 6561 f447eb 6560->6561 6561->6544 6562->6548 6564 f48ac0 6563->6564 6589 f48ab9 _ValidateLocalCookies 6563->6589 6565 f48ac4 6564->6565 6566 f48ae3 6564->6566 6567 f447e6 __dosmaperr 15 API calls 6565->6567 6569 f48b34 6566->6569 6570 f48b17 6566->6570 6568 f48ac9 6567->6568 6571 f447f9 _free 15 API calls 6568->6571 6572 f48b4a 6569->6572 6615 f48f8b 6569->6615 6573 f447e6 __dosmaperr 15 API calls 6570->6573 6575 f48ad0 6571->6575 6618 f48637 6572->6618 6574 f48b1c 6573->6574 6578 f447f9 _free 15 API calls 6574->6578 6579 f4473d _abort 21 API calls 6575->6579 6581 f48b24 6578->6581 6579->6589 6584 f4473d _abort 21 API calls 6581->6584 6582 f48b91 6585 f48ba5 6582->6585 6586 f48beb WriteFile 6582->6586 6583 f48b58 6587 f48b5c 6583->6587 6588 f48b7e 6583->6588 6584->6589 6592 f48bad 6585->6592 6593 f48bdb 6585->6593 6590 f48c0e GetLastError 6586->6590 6597 f48b74 6586->6597 6594 f48c52 6587->6594 6625 f485ca 6587->6625 6630 f48417 GetConsoleCP 6588->6630 6589->6556 6590->6597 6598 f48bb2 6592->6598 6599 f48bcb 6592->6599 6650 f486ad 6593->6650 6594->6589 6600 f447f9 _free 15 API calls 6594->6600 6597->6589 6597->6594 6603 f48c2e 6597->6603 6598->6594 6639 f4878c 6598->6639 6644 f4887a 6599->6644 6602 f48c77 6600->6602 6605 f447e6 __dosmaperr 15 API calls 6602->6605 6606 f48c35 6603->6606 6607 f48c49 6603->6607 6605->6589 6608 f447f9 _free 15 API calls 6606->6608 6655 f447c3 6607->6655 6610 f48c3a 6608->6610 6611 f447e6 __dosmaperr 15 API calls 6610->6611 6611->6589 6696 f45d46 LeaveCriticalSection 6612->6696 6614 f48a6f 6614->6553 6660 f48f0d 6615->6660 6682 f47eaf 6618->6682 6620 f48647 6621 f4864c 6620->6621 6622 f44424 _abort 33 API calls 6620->6622 6621->6582 6621->6583 6623 f4866f 6622->6623 6623->6621 6624 f4868d GetConsoleMode 6623->6624 6624->6621 6628 f48624 6625->6628 6629 f485ef 6625->6629 6626 f48626 GetLastError 6626->6628 6627 f49101 WriteConsoleW CreateFileW 6627->6629 6628->6597 6629->6626 6629->6627 6629->6628 6631 f4847a 6630->6631 6633 f4858c _ValidateLocalCookies 6630->6633 6631->6633 6634 f48500 WideCharToMultiByte 6631->6634 6635 f472b7 35 API calls __fassign 6631->6635 6638 f48557 WriteFile 6631->6638 6691 f46052 6631->6691 6633->6597 6634->6633 6636 f48526 WriteFile 6634->6636 6635->6631 6636->6631 6637 f485af GetLastError 6636->6637 6637->6633 6638->6631 6638->6637 6640 f4879b 6639->6640 6641 f48819 WriteFile 6640->6641 6643 f4885d _ValidateLocalCookies 6640->6643 6641->6640 6642 f4885f GetLastError 6641->6642 6642->6643 6643->6597 6649 f48889 6644->6649 6645 f48994 _ValidateLocalCookies 6645->6597 6646 f4890b WideCharToMultiByte 6647 f48940 WriteFile 6646->6647 6648 f4898c GetLastError 6646->6648 6647->6648 6647->6649 6648->6645 6649->6645 6649->6646 6649->6647 6652 f486bc 6650->6652 6651 f4872e WriteFile 6651->6652 6653 f48771 GetLastError 6651->6653 6652->6651 6654 f4876f _ValidateLocalCookies 6652->6654 6653->6654 6654->6597 6656 f447e6 __dosmaperr 15 API calls 6655->6656 6657 f447ce _free 6656->6657 6658 f447f9 _free 15 API calls 6657->6658 6659 f447e1 6658->6659 6659->6589 6669 f45dfa 6660->6669 6662 f48f1f 6663 f48f27 6662->6663 6664 f48f38 SetFilePointerEx 6662->6664 6665 f447f9 _free 15 API calls 6663->6665 6666 f48f50 GetLastError 6664->6666 6667 f48f2c 6664->6667 6665->6667 6668 f447c3 __dosmaperr 15 API calls 6666->6668 6667->6572 6668->6667 6670 f45e07 6669->6670 6671 f45e1c 6669->6671 6672 f447e6 __dosmaperr 15 API calls 6670->6672 6673 f447e6 __dosmaperr 15 API calls 6671->6673 6675 f45e41 6671->6675 6674 f45e0c 6672->6674 6676 f45e4c 6673->6676 6677 f447f9 _free 15 API calls 6674->6677 6675->6662 6678 f447f9 _free 15 API calls 6676->6678 6679 f45e14 6677->6679 6680 f45e54 6678->6680 6679->6662 6681 f4473d _abort 21 API calls 6680->6681 6681->6679 6683 f47ebc 6682->6683 6684 f47ec9 6682->6684 6685 f447f9 _free 15 API calls 6683->6685 6686 f47ed5 6684->6686 6687 f447f9 _free 15 API calls 6684->6687 6688 f47ec1 6685->6688 6686->6620 6689 f47ef6 6687->6689 6688->6620 6690 f4473d _abort 21 API calls 6689->6690 6690->6688 6692 f44424 _abort 33 API calls 6691->6692 6693 f4605d 6692->6693 6694 f472d1 __fassign 33 API calls 6693->6694 6695 f4606d 6694->6695 6695->6631 6696->6614 6700 f49ca4 6697->6700 6699 f49d4a 6699->6531 6701 f49cb0 ___scrt_is_nonwritable_in_current_image 6700->6701 6711 f45d23 EnterCriticalSection 6701->6711 6703 f49cbe 6704 f49ce5 6703->6704 6705 f49cf0 6703->6705 6712 f49dcd 6704->6712 6707 f447f9 _free 15 API calls 6705->6707 6708 f49ceb 6707->6708 6727 f49d1a 6708->6727 6710 f49d0d _abort 6710->6699 6711->6703 6713 f45dfa 21 API calls 6712->6713 6716 f49ddd 6713->6716 6714 f49de3 6730 f45d69 6714->6730 6716->6714 6717 f45dfa 21 API calls 6716->6717 6726 f49e15 6716->6726 6722 f49e0c 6717->6722 6718 f45dfa 21 API calls 6719 f49e21 CloseHandle 6718->6719 6719->6714 6723 f49e2d GetLastError 6719->6723 6721 f49e5d 6721->6708 6725 f45dfa 21 API calls 6722->6725 6723->6714 6724 f447c3 __dosmaperr 15 API calls 6724->6721 6725->6726 6726->6714 6726->6718 6739 f45d46 LeaveCriticalSection 6727->6739 6729 f49d24 6729->6710 6731 f45ddf 6730->6731 6732 f45d78 6730->6732 6733 f447f9 _free 15 API calls 6731->6733 6732->6731 6737 f45da2 6732->6737 6734 f45de4 6733->6734 6735 f447e6 __dosmaperr 15 API calls 6734->6735 6736 f45dcf 6735->6736 6736->6721 6736->6724 6737->6736 6738 f45dc9 SetStdHandle 6737->6738 6738->6736 6739->6729 6740->6505 6741->6485 5955 f498c5 5956 f498ed 5955->5956 5957 f49925 5956->5957 5958 f49917 5956->5958 5959 f4991e 5956->5959 5960 f49997 16 API calls 5958->5960 5964 f49980 5959->5964 5962 f4991c 5960->5962 5965 f499a0 5964->5965 5966 f4a06f __startOneArgErrorHandling 16 API calls 5965->5966 5967 f49923 5966->5967 6063 f43d86 6064 f41f7d ___scrt_uninitialize_crt 7 API calls 6063->6064 6065 f43d8d 6064->6065 6190 f49146 IsProcessorFeaturePresent 6742 f43400 6743 f43412 6742->6743 6744 f43418 6742->6744 6745 f43376 15 API calls 6743->6745 6745->6744 6746 f41e00 6747 f41e1e ___except_validate_context_record _ValidateLocalCookies __IsNonwritableInCurrentImage 6746->6747 6748 f41e9e _ValidateLocalCookies 6747->6748 6751 f42340 RtlUnwind 6747->6751 6750 f41f27 _ValidateLocalCookies 6751->6750 6191 f43d41 6194 f4341b 6191->6194 6195 f4342a 6194->6195 6196 f43376 15 API calls 6195->6196 6197 f43444 6196->6197 6198 f43376 15 API calls 6197->6198 6199 f4344f 6198->6199 6200 f41442 6201 f41a6a GetModuleHandleW 6200->6201 6202 f4144a 6201->6202 6203 f41480 6202->6203 6204 f4144e 6202->6204 6205 f43793 _abort 23 API calls 6203->6205 6206 f41459 6204->6206 6209 f43775 6204->6209 6207 f41488 6205->6207 6210 f4355e _abort 23 API calls 6209->6210 6211 f43780 6210->6211 6211->6206 5968 f49ec3 5969 f49ecd 5968->5969 5970 f49ed9 5968->5970 5969->5970 5971 f49ed2 CloseHandle 5969->5971 5971->5970 5032 f4130d 5033 f41319 ___scrt_is_nonwritable_in_current_image 5032->5033 5060 f4162b 5033->5060 5035 f41320 5036 f41473 5035->5036 5044 f4134a ___scrt_is_nonwritable_in_current_image _abort ___scrt_release_startup_lock 5035->5044 5115 f4191f IsProcessorFeaturePresent 5036->5115 5038 f4147a 5039 f41480 5038->5039 5097 f437e1 5038->5097 5119 f43793 5039->5119 5043 f41369 5044->5043 5051 f413ea 5044->5051 5100 f437a9 5044->5100 5068 f41a34 5051->5068 5052 f41405 5106 f41a6a GetModuleHandleW 5052->5106 5055 f41410 5056 f41419 5055->5056 5108 f43784 5055->5108 5111 f4179c 5056->5111 5061 f41634 5060->5061 5122 f41bd4 IsProcessorFeaturePresent 5061->5122 5065 f41645 5067 f41649 5065->5067 5132 f41f7d 5065->5132 5067->5035 5192 f420b0 5068->5192 5070 f41a47 GetStartupInfoW 5071 f413f0 5070->5071 5072 f43457 5071->5072 5194 f4522b 5072->5194 5074 f43460 5076 f413f8 5074->5076 5198 f455b6 5074->5198 5077 f41000 6 API calls 5076->5077 5078 f41096 CryptMsgGetParam 5077->5078 5079 f411e3 Sleep 5077->5079 5080 f41162 CryptMsgGetParam 5078->5080 5081 f410bc LocalAlloc 5078->5081 5082 f41215 CertCloseStore LocalFree LocalFree LocalFree 5079->5082 5086 f411f7 5079->5086 5080->5079 5083 f41174 CryptMsgGetParam 5080->5083 5084 f41156 LocalFree 5081->5084 5085 f410d7 5081->5085 5082->5052 5083->5079 5087 f41188 CertFindAttribute CertFindAttribute 5083->5087 5084->5080 5088 f410e0 LocalAlloc CryptMsgGetParam 5085->5088 5086->5082 5089 f4120a CertDeleteCertificateFromStore 5086->5089 5090 f411b5 LoadLibraryA GetProcAddress 5087->5090 5091 f411b1 5087->5091 5092 f41114 CertCreateCertificateContext 5088->5092 5093 f4113d LocalFree 5088->5093 5089->5086 5090->5079 5091->5079 5091->5090 5095 f41126 CertAddCertificateContextToStore 5092->5095 5096 f41133 CertFreeCertificateContext 5092->5096 5093->5088 5094 f4114d 5093->5094 5094->5084 5095->5096 5096->5093 5686 f4355e 5097->5686 5099 f437f2 5099->5039 5101 f437d1 _abort 5100->5101 5101->5051 5102 f44424 _abort 33 API calls 5101->5102 5105 f43e9a 5102->5105 5103 f43f24 _abort 33 API calls 5104 f43ec4 5103->5104 5105->5103 5107 f4140c 5106->5107 5107->5038 5107->5055 5109 f4355e _abort 23 API calls 5108->5109 5110 f4378f 5109->5110 5110->5056 5113 f417a8 ___scrt_uninitialize_crt 5111->5113 5112 f41421 5112->5043 5113->5112 5114 f41f7d ___scrt_uninitialize_crt 7 API calls 5113->5114 5114->5112 5116 f41935 _abort 5115->5116 5117 f419e0 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 5116->5117 5118 f41a24 _abort 5117->5118 5118->5038 5120 f4355e _abort 23 API calls 5119->5120 5121 f41488 5120->5121 5123 f41640 5122->5123 5124 f41f5e 5123->5124 5138 f424b1 5124->5138 5127 f41f67 5127->5065 5129 f41f6f 5130 f41f7a 5129->5130 5152 f424ed 5129->5152 5130->5065 5133 f41f86 5132->5133 5134 f41f90 5132->5134 5135 f42496 ___vcrt_uninitialize_ptd 6 API calls 5133->5135 5134->5067 5136 f41f8b 5135->5136 5137 f424ed ___vcrt_uninitialize_locks DeleteCriticalSection 5136->5137 5137->5134 5139 f424ba 5138->5139 5141 f424e3 5139->5141 5142 f41f63 5139->5142 5156 f4271d 5139->5156 5143 f424ed ___vcrt_uninitialize_locks DeleteCriticalSection 5141->5143 5142->5127 5144 f42463 5142->5144 5143->5142 5173 f4262e 5144->5173 5147 f42478 5147->5129 5150 f42493 5150->5129 5153 f42517 5152->5153 5154 f424f8 5152->5154 5153->5127 5155 f42502 DeleteCriticalSection 5154->5155 5155->5153 5155->5155 5161 f42543 5156->5161 5159 f42755 InitializeCriticalSectionAndSpinCount 5160 f42740 5159->5160 5160->5139 5162 f42564 5161->5162 5163 f42560 5161->5163 5162->5163 5165 f425cc GetProcAddress 5162->5165 5166 f425bd 5162->5166 5168 f425e3 LoadLibraryExW 5162->5168 5163->5159 5163->5160 5165->5163 5166->5165 5167 f425c5 FreeLibrary 5166->5167 5167->5165 5169 f4262a 5168->5169 5170 f425fa GetLastError 5168->5170 5169->5162 5170->5169 5171 f42605 ___vcrt_FlsSetValue 5170->5171 5171->5169 5172 f4261b LoadLibraryExW 5171->5172 5172->5162 5174 f42543 ___vcrt_FlsSetValue 5 API calls 5173->5174 5175 f42648 5174->5175 5176 f42661 TlsAlloc 5175->5176 5177 f4246d 5175->5177 5177->5147 5178 f426df 5177->5178 5179 f42543 ___vcrt_FlsSetValue 5 API calls 5178->5179 5180 f426f9 5179->5180 5181 f42714 TlsSetValue 5180->5181 5182 f42486 5180->5182 5181->5182 5182->5150 5183 f42496 5182->5183 5184 f424a0 5183->5184 5185 f424a6 5183->5185 5187 f42669 5184->5187 5185->5147 5188 f42543 ___vcrt_FlsSetValue 5 API calls 5187->5188 5189 f42683 5188->5189 5190 f4269b TlsFree 5189->5190 5191 f4268f 5189->5191 5190->5191 5191->5185 5193 f420c7 5192->5193 5193->5070 5193->5193 5195 f45234 5194->5195 5196 f4523d 5194->5196 5201 f4512a 5195->5201 5196->5074 5683 f4555d 5198->5683 5221 f44424 GetLastError 5201->5221 5203 f45137 5241 f45249 5203->5241 5205 f4513f 5250 f44ebe 5205->5250 5209 f45167 5211 f45199 5209->5211 5264 f452eb 5209->5264 5275 f44869 5211->5275 5212 f4518c 5215 f45194 5212->5215 5218 f451b1 5212->5218 5214 f45156 5214->5196 5272 f447f9 5215->5272 5217 f451dd 5217->5211 5281 f44d94 5217->5281 5218->5217 5219 f44869 _free 15 API calls 5218->5219 5219->5217 5222 f44440 5221->5222 5223 f4443a 5221->5223 5228 f4448f SetLastError 5222->5228 5289 f4480c 5222->5289 5284 f45904 5223->5284 5226 f44452 5227 f4445a 5226->5227 5296 f4595a 5226->5296 5230 f44869 _free 15 API calls 5227->5230 5228->5203 5232 f44460 5230->5232 5231 f4446f 5231->5227 5233 f44476 5231->5233 5234 f4449b SetLastError 5232->5234 5301 f44296 5233->5301 5306 f43f24 5234->5306 5239 f44869 _free 15 API calls 5240 f44488 5239->5240 5240->5228 5240->5234 5242 f45255 ___scrt_is_nonwritable_in_current_image 5241->5242 5243 f44424 _abort 33 API calls 5242->5243 5245 f4525f 5243->5245 5246 f452e3 _abort 5245->5246 5248 f43f24 _abort 33 API calls 5245->5248 5249 f44869 _free 15 API calls 5245->5249 5542 f456e2 EnterCriticalSection 5245->5542 5543 f452da 5245->5543 5246->5205 5248->5245 5249->5245 5547 f43f72 5250->5547 5253 f44ef1 5255 f44ef6 GetACP 5253->5255 5256 f44f08 5253->5256 5254 f44edf GetOEMCP 5254->5256 5255->5256 5256->5214 5257 f462ff 5256->5257 5258 f4633d 5257->5258 5262 f4630d _abort 5257->5262 5259 f447f9 _free 15 API calls 5258->5259 5261 f4633b 5259->5261 5260 f46328 HeapAlloc 5260->5261 5260->5262 5261->5209 5262->5258 5262->5260 5263 f46992 _abort 2 API calls 5262->5263 5263->5262 5265 f44ebe 35 API calls 5264->5265 5266 f4530a 5265->5266 5267 f4535b IsValidCodePage 5266->5267 5269 f45311 _ValidateLocalCookies 5266->5269 5271 f45380 _abort 5266->5271 5268 f4536d GetCPInfo 5267->5268 5267->5269 5268->5269 5268->5271 5269->5212 5584 f44f96 GetCPInfo 5271->5584 5273 f444a8 _abort 15 API calls 5272->5273 5274 f447fe 5273->5274 5274->5211 5276 f44874 HeapFree 5275->5276 5277 f4489d _free 5275->5277 5276->5277 5278 f44889 5276->5278 5277->5214 5279 f447f9 _free 13 API calls 5278->5279 5280 f4488f GetLastError 5279->5280 5280->5277 5647 f44d51 5281->5647 5283 f44db8 5283->5211 5317 f45741 5284->5317 5286 f4592b 5287 f45943 TlsGetValue 5286->5287 5288 f45937 _ValidateLocalCookies 5286->5288 5287->5288 5288->5222 5294 f44819 _abort 5289->5294 5290 f44844 HeapAlloc 5292 f44857 5290->5292 5290->5294 5291 f44859 5293 f447f9 _free 14 API calls 5291->5293 5292->5226 5293->5292 5294->5290 5294->5291 5330 f46992 5294->5330 5297 f45741 _abort 5 API calls 5296->5297 5298 f45981 5297->5298 5299 f4599c TlsSetValue 5298->5299 5300 f45990 _ValidateLocalCookies 5298->5300 5299->5300 5300->5231 5344 f4426e 5301->5344 5452 f46b14 5306->5452 5309 f43f35 5311 f43f3e IsProcessorFeaturePresent 5309->5311 5316 f43f5c 5309->5316 5312 f43f49 5311->5312 5480 f44573 5312->5480 5313 f43793 _abort 23 API calls 5315 f43f66 5313->5315 5316->5313 5319 f4576d 5317->5319 5322 f45771 _abort 5317->5322 5318 f45791 5321 f4579d GetProcAddress 5318->5321 5318->5322 5319->5318 5319->5322 5323 f457dd 5319->5323 5321->5322 5322->5286 5324 f457fe LoadLibraryExW 5323->5324 5325 f457f3 5323->5325 5326 f45833 5324->5326 5327 f4581b GetLastError 5324->5327 5325->5319 5326->5325 5329 f4584a FreeLibrary 5326->5329 5327->5326 5328 f45826 LoadLibraryExW 5327->5328 5328->5326 5329->5325 5333 f469d6 5330->5333 5332 f469a8 _ValidateLocalCookies 5332->5294 5334 f469e2 ___scrt_is_nonwritable_in_current_image 5333->5334 5339 f456e2 EnterCriticalSection 5334->5339 5336 f469ed 5340 f46a1f 5336->5340 5338 f46a14 _abort 5338->5332 5339->5336 5343 f4572a LeaveCriticalSection 5340->5343 5342 f46a26 5342->5338 5343->5342 5350 f441ae 5344->5350 5346 f44292 5347 f4421e 5346->5347 5361 f440b2 5347->5361 5349 f44242 5349->5239 5351 f441ba ___scrt_is_nonwritable_in_current_image 5350->5351 5356 f456e2 EnterCriticalSection 5351->5356 5353 f441c4 5357 f441ea 5353->5357 5355 f441e2 _abort 5355->5346 5356->5353 5360 f4572a LeaveCriticalSection 5357->5360 5359 f441f4 5359->5355 5360->5359 5362 f440be ___scrt_is_nonwritable_in_current_image 5361->5362 5369 f456e2 EnterCriticalSection 5362->5369 5364 f440c8 5370 f443d9 5364->5370 5366 f440e0 5374 f440f6 5366->5374 5368 f440ee _abort 5368->5349 5369->5364 5371 f4440f __fassign 5370->5371 5372 f443e8 __fassign 5370->5372 5371->5366 5372->5371 5377 f46507 5372->5377 5451 f4572a LeaveCriticalSection 5374->5451 5376 f44100 5376->5368 5379 f46587 5377->5379 5380 f4651d 5377->5380 5381 f44869 _free 15 API calls 5379->5381 5404 f465d5 5379->5404 5380->5379 5386 f44869 _free 15 API calls 5380->5386 5387 f46550 5380->5387 5382 f465a9 5381->5382 5383 f44869 _free 15 API calls 5382->5383 5388 f465bc 5383->5388 5384 f44869 _free 15 API calls 5389 f4657c 5384->5389 5385 f465e3 5390 f46643 5385->5390 5402 f44869 15 API calls _free 5385->5402 5391 f46545 5386->5391 5392 f44869 _free 15 API calls 5387->5392 5403 f46572 5387->5403 5393 f44869 _free 15 API calls 5388->5393 5394 f44869 _free 15 API calls 5389->5394 5395 f44869 _free 15 API calls 5390->5395 5405 f46078 5391->5405 5397 f46567 5392->5397 5398 f465ca 5393->5398 5394->5379 5399 f46649 5395->5399 5433 f46176 5397->5433 5401 f44869 _free 15 API calls 5398->5401 5399->5371 5401->5404 5402->5385 5403->5384 5445 f4667a 5404->5445 5406 f46089 5405->5406 5432 f46172 5405->5432 5407 f4609a 5406->5407 5408 f44869 _free 15 API calls 5406->5408 5409 f460ac 5407->5409 5410 f44869 _free 15 API calls 5407->5410 5408->5407 5411 f44869 _free 15 API calls 5409->5411 5414 f460be 5409->5414 5410->5409 5411->5414 5412 f44869 _free 15 API calls 5413 f460d0 5412->5413 5415 f44869 _free 15 API calls 5413->5415 5417 f460e2 5413->5417 5414->5412 5414->5413 5415->5417 5416 f460f4 5419 f46106 5416->5419 5420 f44869 _free 15 API calls 5416->5420 5417->5416 5418 f44869 _free 15 API calls 5417->5418 5418->5416 5421 f46118 5419->5421 5422 f44869 _free 15 API calls 5419->5422 5420->5419 5423 f4612a 5421->5423 5424 f44869 _free 15 API calls 5421->5424 5422->5421 5425 f4613c 5423->5425 5426 f44869 _free 15 API calls 5423->5426 5424->5423 5427 f4614e 5425->5427 5428 f44869 _free 15 API calls 5425->5428 5426->5425 5429 f46160 5427->5429 5430 f44869 _free 15 API calls 5427->5430 5428->5427 5431 f44869 _free 15 API calls 5429->5431 5429->5432 5430->5429 5431->5432 5432->5387 5434 f46183 5433->5434 5435 f461db 5433->5435 5436 f46193 5434->5436 5437 f44869 _free 15 API calls 5434->5437 5435->5403 5438 f461a5 5436->5438 5440 f44869 _free 15 API calls 5436->5440 5437->5436 5439 f461b7 5438->5439 5441 f44869 _free 15 API calls 5438->5441 5442 f461c9 5439->5442 5443 f44869 _free 15 API calls 5439->5443 5440->5438 5441->5439 5442->5435 5444 f44869 _free 15 API calls 5442->5444 5443->5442 5444->5435 5446 f46687 5445->5446 5450 f466a5 5445->5450 5447 f4621b __fassign 15 API calls 5446->5447 5446->5450 5448 f4669f 5447->5448 5449 f44869 _free 15 API calls 5448->5449 5449->5450 5450->5385 5451->5376 5484 f46a82 5452->5484 5455 f46b6f 5456 f46b7b _abort 5455->5456 5457 f46ba2 _abort 5456->5457 5462 f46ba8 _abort 5456->5462 5498 f444a8 GetLastError 5456->5498 5459 f46bf4 5457->5459 5457->5462 5465 f46bd7 _abort 5457->5465 5460 f447f9 _free 15 API calls 5459->5460 5461 f46bf9 5460->5461 5517 f4473d 5461->5517 5466 f46c20 5462->5466 5520 f456e2 EnterCriticalSection 5462->5520 5465->5309 5468 f46c7f 5466->5468 5469 f46c77 5466->5469 5477 f46caa 5466->5477 5521 f4572a LeaveCriticalSection 5466->5521 5468->5477 5522 f46b66 5468->5522 5472 f43793 _abort 23 API calls 5469->5472 5472->5468 5474 f44424 _abort 33 API calls 5478 f46d0d 5474->5478 5476 f46b66 _abort 33 API calls 5476->5477 5525 f46d2f 5477->5525 5478->5465 5479 f44424 _abort 33 API calls 5478->5479 5479->5465 5481 f4458f _abort 5480->5481 5482 f445bb IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 5481->5482 5483 f4468c _abort _ValidateLocalCookies 5482->5483 5483->5316 5487 f46a28 5484->5487 5486 f43f29 5486->5309 5486->5455 5488 f46a34 ___scrt_is_nonwritable_in_current_image 5487->5488 5493 f456e2 EnterCriticalSection 5488->5493 5490 f46a42 5494 f46a76 5490->5494 5492 f46a69 _abort 5492->5486 5493->5490 5497 f4572a LeaveCriticalSection 5494->5497 5496 f46a80 5496->5492 5497->5496 5499 f444c1 5498->5499 5500 f444c7 5498->5500 5501 f45904 _abort 6 API calls 5499->5501 5502 f4480c _abort 12 API calls 5500->5502 5504 f4451e SetLastError 5500->5504 5501->5500 5503 f444d9 5502->5503 5505 f4595a _abort 6 API calls 5503->5505 5511 f444e1 5503->5511 5506 f44527 5504->5506 5507 f444f6 5505->5507 5506->5457 5510 f444fd 5507->5510 5507->5511 5508 f44869 _free 12 API calls 5509 f444e7 5508->5509 5512 f44515 SetLastError 5509->5512 5513 f44296 _abort 12 API calls 5510->5513 5511->5508 5512->5506 5514 f44508 5513->5514 5515 f44869 _free 12 API calls 5514->5515 5516 f4450e 5515->5516 5516->5504 5516->5512 5529 f446c2 5517->5529 5519 f44749 5519->5465 5520->5466 5521->5469 5523 f44424 _abort 33 API calls 5522->5523 5524 f46b6b 5523->5524 5524->5476 5526 f46d35 5525->5526 5528 f46cfe 5525->5528 5541 f4572a LeaveCriticalSection 5526->5541 5528->5465 5528->5474 5528->5478 5530 f444a8 _abort 15 API calls 5529->5530 5531 f446d8 5530->5531 5535 f446e6 _ValidateLocalCookies 5531->5535 5537 f4474d IsProcessorFeaturePresent 5531->5537 5533 f4473c 5534 f446c2 _abort 21 API calls 5533->5534 5536 f44749 5534->5536 5535->5519 5536->5519 5538 f44758 5537->5538 5539 f44573 _abort 3 API calls 5538->5539 5540 f4476d GetCurrentProcess TerminateProcess 5539->5540 5540->5533 5541->5528 5542->5245 5546 f4572a LeaveCriticalSection 5543->5546 5545 f452e1 5545->5245 5546->5545 5548 f43f8f 5547->5548 5554 f43f85 5547->5554 5549 f44424 _abort 33 API calls 5548->5549 5548->5554 5550 f43fb0 5549->5550 5555 f472d1 5550->5555 5554->5253 5554->5254 5556 f472e4 5555->5556 5557 f43fc9 5555->5557 5556->5557 5563 f46754 5556->5563 5559 f472fe 5557->5559 5560 f47311 5559->5560 5561 f47326 5559->5561 5560->5561 5562 f45249 __fassign 33 API calls 5560->5562 5561->5554 5562->5561 5564 f46760 ___scrt_is_nonwritable_in_current_image 5563->5564 5565 f44424 _abort 33 API calls 5564->5565 5566 f46769 5565->5566 5567 f467b7 _abort 5566->5567 5575 f456e2 EnterCriticalSection 5566->5575 5567->5557 5569 f46787 5576 f467cb 5569->5576 5574 f43f24 _abort 33 API calls 5574->5567 5575->5569 5577 f467d9 __fassign 5576->5577 5579 f4679b 5576->5579 5578 f46507 __fassign 15 API calls 5577->5578 5577->5579 5578->5579 5580 f467ba 5579->5580 5583 f4572a LeaveCriticalSection 5580->5583 5582 f467ae 5582->5567 5582->5574 5583->5582 5588 f44fd0 5584->5588 5591 f4507a _ValidateLocalCookies 5584->5591 5586 f45031 5604 f47cd1 5586->5604 5592 f4634d 5588->5592 5590 f47cd1 38 API calls 5590->5591 5591->5269 5593 f43f72 __fassign 33 API calls 5592->5593 5594 f4636d MultiByteToWideChar 5593->5594 5596 f463ab 5594->5596 5599 f46443 _ValidateLocalCookies 5594->5599 5598 f462ff 16 API calls 5596->5598 5601 f463cc _abort __alloca_probe_16 5596->5601 5597 f4643d 5609 f4646a 5597->5609 5598->5601 5599->5586 5601->5597 5602 f46411 MultiByteToWideChar 5601->5602 5602->5597 5603 f4642d GetStringTypeW 5602->5603 5603->5597 5605 f43f72 __fassign 33 API calls 5604->5605 5606 f47ce4 5605->5606 5613 f47ab4 5606->5613 5608 f45052 5608->5590 5610 f46476 5609->5610 5612 f46487 5609->5612 5611 f44869 _free 15 API calls 5610->5611 5610->5612 5611->5612 5612->5599 5614 f47acf 5613->5614 5615 f47af5 MultiByteToWideChar 5614->5615 5616 f47ca9 _ValidateLocalCookies 5615->5616 5617 f47b1f 5615->5617 5616->5608 5620 f462ff 16 API calls 5617->5620 5622 f47b40 __alloca_probe_16 5617->5622 5618 f47bf5 5624 f4646a __freea 15 API calls 5618->5624 5619 f47b89 MultiByteToWideChar 5619->5618 5621 f47ba2 5619->5621 5620->5622 5638 f45a15 5621->5638 5622->5618 5622->5619 5624->5616 5625 f47bb9 5625->5618 5626 f47c04 5625->5626 5627 f47bcc 5625->5627 5628 f462ff 16 API calls 5626->5628 5632 f47c25 __alloca_probe_16 5626->5632 5627->5618 5629 f45a15 6 API calls 5627->5629 5628->5632 5629->5618 5630 f47c9a 5631 f4646a __freea 15 API calls 5630->5631 5631->5618 5632->5630 5633 f45a15 6 API calls 5632->5633 5634 f47c79 5633->5634 5634->5630 5635 f47c88 WideCharToMultiByte 5634->5635 5635->5630 5636 f47cc8 5635->5636 5637 f4646a __freea 15 API calls 5636->5637 5637->5618 5639 f45741 _abort 5 API calls 5638->5639 5640 f45a3c 5639->5640 5643 f45a45 _ValidateLocalCookies 5640->5643 5644 f45a9d 5640->5644 5642 f45a85 LCMapStringW 5642->5643 5643->5625 5645 f45741 _abort 5 API calls 5644->5645 5646 f45ac4 _ValidateLocalCookies 5645->5646 5646->5642 5648 f44d5d ___scrt_is_nonwritable_in_current_image 5647->5648 5655 f456e2 EnterCriticalSection 5648->5655 5650 f44d67 5656 f44dbc 5650->5656 5654 f44d80 _abort 5654->5283 5655->5650 5668 f454dc 5656->5668 5658 f44e0a 5659 f454dc 21 API calls 5658->5659 5660 f44e26 5659->5660 5661 f454dc 21 API calls 5660->5661 5662 f44e44 5661->5662 5663 f44d74 5662->5663 5664 f44869 _free 15 API calls 5662->5664 5665 f44d88 5663->5665 5664->5663 5682 f4572a LeaveCriticalSection 5665->5682 5667 f44d92 5667->5654 5669 f454ed 5668->5669 5677 f454e9 5668->5677 5670 f454f4 5669->5670 5672 f45507 _abort 5669->5672 5671 f447f9 _free 15 API calls 5670->5671 5673 f454f9 5671->5673 5675 f45535 5672->5675 5676 f4553e 5672->5676 5672->5677 5674 f4473d _abort 21 API calls 5673->5674 5674->5677 5678 f447f9 _free 15 API calls 5675->5678 5676->5677 5680 f447f9 _free 15 API calls 5676->5680 5677->5658 5679 f4553a 5678->5679 5681 f4473d _abort 21 API calls 5679->5681 5680->5679 5681->5677 5682->5667 5684 f43f72 __fassign 33 API calls 5683->5684 5685 f45571 5684->5685 5685->5074 5687 f4356a _abort 5686->5687 5688 f43571 5687->5688 5689 f43583 5687->5689 5715 f436b8 GetModuleHandleW 5688->5715 5703 f456e2 EnterCriticalSection 5689->5703 5696 f4358a 5702 f435ff _abort 5696->5702 5723 f43c97 5696->5723 5697 f43582 5697->5689 5700 f43671 _abort 5700->5099 5704 f43668 5702->5704 5703->5696 5726 f4572a LeaveCriticalSection 5704->5726 5706 f43641 5706->5700 5707 f43677 5706->5707 5727 f45b1f 5707->5727 5709 f43681 5710 f436a5 5709->5710 5711 f43685 GetPEB 5709->5711 5713 f436fc _abort 3 API calls 5710->5713 5711->5710 5712 f43695 GetCurrentProcess TerminateProcess 5711->5712 5712->5710 5714 f436ad ExitProcess 5713->5714 5716 f43576 5715->5716 5716->5689 5717 f436fc GetModuleHandleExW 5716->5717 5718 f43726 GetProcAddress 5717->5718 5719 f43749 5717->5719 5721 f4373b 5718->5721 5720 f4374f FreeLibrary 5719->5720 5722 f43758 _ValidateLocalCookies 5719->5722 5720->5722 5721->5719 5722->5697 5732 f439d0 5723->5732 5726->5706 5728 f45b44 5727->5728 5730 f45b3a _ValidateLocalCookies 5727->5730 5729 f45741 _abort 5 API calls 5728->5729 5731 f45b5b 5729->5731 5730->5709 5731->5730 5735 f4397f 5732->5735 5734 f439f4 5734->5702 5736 f4398b ___scrt_is_nonwritable_in_current_image 5735->5736 5743 f456e2 EnterCriticalSection 5736->5743 5738 f43999 5744 f43a20 5738->5744 5740 f439a6 5748 f439c4 5740->5748 5742 f439b7 _abort 5742->5734 5743->5738 5745 f43a48 5744->5745 5747 f43a40 _ValidateLocalCookies 5744->5747 5746 f44869 _free 15 API calls 5745->5746 5745->5747 5746->5747 5747->5740 5751 f4572a LeaveCriticalSection 5748->5751 5750 f439ce 5750->5742 5751->5750 6212 f4324d 6213 f4522b 46 API calls 6212->6213 6214 f4325f 6213->6214 6223 f4561e GetEnvironmentStringsW 6214->6223 6217 f4326a 6219 f44869 _free 15 API calls 6217->6219 6220 f4329f 6219->6220 6221 f43275 6222 f44869 _free 15 API calls 6221->6222 6222->6217 6224 f45688 6223->6224 6225 f45635 6223->6225 6227 f45691 FreeEnvironmentStringsW 6224->6227 6228 f43264 6224->6228 6226 f4563b WideCharToMultiByte 6225->6226 6226->6224 6229 f45657 6226->6229 6227->6228 6228->6217 6235 f432a5 6228->6235 6230 f462ff 16 API calls 6229->6230 6231 f4565d 6230->6231 6232 f45664 WideCharToMultiByte 6231->6232 6233 f4567a 6231->6233 6232->6233 6234 f44869 _free 15 API calls 6233->6234 6234->6224 6236 f432ba 6235->6236 6237 f4480c _abort 15 API calls 6236->6237 6247 f432e1 6237->6247 6238 f43345 6239 f44869 _free 15 API calls 6238->6239 6240 f4335f 6239->6240 6240->6221 6241 f4480c _abort 15 API calls 6241->6247 6242 f43347 6243 f43376 15 API calls 6242->6243 6245 f4334d 6243->6245 6246 f44869 _free 15 API calls 6245->6246 6246->6238 6247->6238 6247->6241 6247->6242 6248 f43369 6247->6248 6250 f44869 _free 15 API calls 6247->6250 6252 f43eca 6247->6252 6249 f4474d _abort 6 API calls 6248->6249 6251 f43375 6249->6251 6250->6247 6253 f43ed7 6252->6253 6254 f43ee5 6252->6254 6253->6254 6259 f43efc 6253->6259 6255 f447f9 _free 15 API calls 6254->6255 6256 f43eed 6255->6256 6257 f4473d _abort 21 API calls 6256->6257 6258 f43ef7 6257->6258 6258->6247 6259->6258 6260 f447f9 _free 15 API calls 6259->6260 6260->6256 5972 f455ce GetCommandLineA GetCommandLineW 6066 f43d8f 6067 f43d9e 6066->6067 6068 f43db2 6066->6068 6067->6068 6070 f44869 _free 15 API calls 6067->6070 6069 f44869 _free 15 API calls 6068->6069 6071 f43dc4 6069->6071 6070->6068 6072 f44869 _free 15 API calls 6071->6072 6073 f43dd7 6072->6073 6074 f44869 _free 15 API calls 6073->6074 6075 f43de8 6074->6075 6076 f44869 _free 15 API calls 6075->6076 6077 f43df9 6076->6077 6752 f4430f 6753 f4432a 6752->6753 6754 f4431a 6752->6754 6758 f44330 6754->6758 6757 f44869 _free 15 API calls 6757->6753 6759 f44343 6758->6759 6762 f44349 6758->6762 6760 f44869 _free 15 API calls 6759->6760 6760->6762 6761 f44869 _free 15 API calls 6763 f44355 6761->6763 6762->6761 6764 f44869 _free 15 API calls 6763->6764 6765 f44360 6764->6765 6766 f44869 _free 15 API calls 6765->6766 6767 f4436b 6766->6767 6768 f44869 _free 15 API calls 6767->6768 6769 f44376 6768->6769 6770 f44869 _free 15 API calls 6769->6770 6771 f44381 6770->6771 6772 f44869 _free 15 API calls 6771->6772 6773 f4438c 6772->6773 6774 f44869 _free 15 API calls 6773->6774 6775 f44397 6774->6775 6776 f44869 _free 15 API calls 6775->6776 6777 f443a2 6776->6777 6778 f44869 _free 15 API calls 6777->6778 6779 f443b0 6778->6779 6784 f441f6 6779->6784 6790 f44102 6784->6790 6786 f4421a 6787 f44246 6786->6787 6803 f44163 6787->6803 6789 f4426a 6789->6757 6791 f4410e ___scrt_is_nonwritable_in_current_image 6790->6791 6798 f456e2 EnterCriticalSection 6791->6798 6793 f44142 6799 f44157 6793->6799 6795 f44118 6795->6793 6796 f44869 _free 15 API calls 6795->6796 6796->6793 6797 f4414f _abort 6797->6786 6798->6795 6802 f4572a LeaveCriticalSection 6799->6802 6801 f44161 6801->6797 6802->6801 6804 f4416f ___scrt_is_nonwritable_in_current_image 6803->6804 6811 f456e2 EnterCriticalSection 6804->6811 6806 f44179 6807 f443d9 _abort 15 API calls 6806->6807 6808 f4418c 6807->6808 6812 f441a2 6808->6812 6810 f4419a _abort 6810->6789 6811->6806 6815 f4572a LeaveCriticalSection 6812->6815 6814 f441ac 6814->6810 6815->6814 6261 f41248 6262 f41250 6261->6262 6278 f437f7 6262->6278 6264 f4125b 6285 f41664 6264->6285 6266 f4191f 4 API calls 6268 f412f2 6266->6268 6267 f41270 __RTC_Initialize 6276 f412cd 6267->6276 6291 f417f1 6267->6291 6270 f41289 6270->6276 6294 f418ab InitializeSListHead 6270->6294 6272 f4129f 6295 f418ba 6272->6295 6274 f412c2 6301 f43891 6274->6301 6276->6266 6277 f412ea 6276->6277 6279 f43806 6278->6279 6280 f43829 6278->6280 6279->6280 6281 f447f9 _free 15 API calls 6279->6281 6280->6264 6282 f43819 6281->6282 6283 f4473d _abort 21 API calls 6282->6283 6284 f43824 6283->6284 6284->6264 6286 f41674 6285->6286 6287 f41670 6285->6287 6288 f41681 ___scrt_release_startup_lock 6286->6288 6289 f4191f 4 API calls 6286->6289 6287->6267 6288->6267 6290 f416ea 6289->6290 6308 f417c4 6291->6308 6294->6272 6346 f43e2a 6295->6346 6297 f418cb 6298 f418d2 6297->6298 6299 f4191f 4 API calls 6297->6299 6298->6274 6300 f418da 6299->6300 6300->6274 6302 f44424 _abort 33 API calls 6301->6302 6303 f4389c 6302->6303 6304 f447f9 _free 15 API calls 6303->6304 6307 f438d4 6303->6307 6305 f438c9 6304->6305 6306 f4473d _abort 21 API calls 6305->6306 6306->6307 6307->6276 6309 f417d3 6308->6309 6310 f417da 6308->6310 6314 f43c81 6309->6314 6317 f43cf1 6310->6317 6313 f417d8 6313->6270 6315 f43cf1 24 API calls 6314->6315 6316 f43c93 6315->6316 6316->6313 6320 f439f8 6317->6320 6323 f4392e 6320->6323 6322 f43a1c 6322->6313 6324 f4393a ___scrt_is_nonwritable_in_current_image 6323->6324 6331 f456e2 EnterCriticalSection 6324->6331 6326 f43948 6332 f43b40 6326->6332 6328 f43955 6342 f43973 6328->6342 6330 f43966 _abort 6330->6322 6331->6326 6333 f43b5e 6332->6333 6340 f43b56 _abort 6332->6340 6334 f43bb7 6333->6334 6335 f4681b 24 API calls 6333->6335 6333->6340 6336 f4681b 24 API calls 6334->6336 6334->6340 6337 f43bad 6335->6337 6338 f43bcd 6336->6338 6339 f44869 _free 15 API calls 6337->6339 6341 f44869 _free 15 API calls 6338->6341 6339->6334 6340->6328 6341->6340 6345 f4572a LeaveCriticalSection 6342->6345 6344 f4397d 6344->6330 6345->6344 6347 f43e48 6346->6347 6351 f43e68 6346->6351 6348 f447f9 _free 15 API calls 6347->6348 6349 f43e5e 6348->6349 6350 f4473d _abort 21 API calls 6349->6350 6350->6351 6351->6297 6078 f41489 6081 f41853 6078->6081 6080 f4148e 6080->6080 6082 f41869 6081->6082 6084 f41872 6082->6084 6085 f41806 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6082->6085 6084->6080 6085->6084 6086 f44c8a 6091 f44cbf 6086->6091 6089 f44ca6 6090 f44869 _free 15 API calls 6090->6089 6092 f44cd1 6091->6092 6093 f44c98 6091->6093 6094 f44cd6 6092->6094 6095 f44d01 6092->6095 6093->6089 6093->6090 6096 f4480c _abort 15 API calls 6094->6096 6095->6093 6102 f4681b 6095->6102 6097 f44cdf 6096->6097 6099 f44869 _free 15 API calls 6097->6099 6099->6093 6100 f44d1c 6101 f44869 _free 15 API calls 6100->6101 6101->6093 6103 f46826 6102->6103 6104 f4684e 6103->6104 6105 f4683f 6103->6105 6106 f4685d 6104->6106 6111 f47e13 6104->6111 6107 f447f9 _free 15 API calls 6105->6107 6118 f47e46 6106->6118 6110 f46844 _abort 6107->6110 6110->6100 6112 f47e33 HeapSize 6111->6112 6113 f47e1e 6111->6113 6112->6106 6114 f447f9 _free 15 API calls 6113->6114 6115 f47e23 6114->6115 6116 f4473d _abort 21 API calls 6115->6116 6117 f47e2e 6116->6117 6117->6106 6119 f47e53 6118->6119 6120 f47e5e 6118->6120 6122 f462ff 16 API calls 6119->6122 6121 f47e66 6120->6121 6128 f47e6f _abort 6120->6128 6123 f44869 _free 15 API calls 6121->6123 6126 f47e5b 6122->6126 6123->6126 6124 f47e74 6127 f447f9 _free 15 API calls 6124->6127 6125 f47e99 HeapReAlloc 6125->6126 6125->6128 6126->6110 6127->6126 6128->6124 6128->6125 6129 f46992 _abort 2 API calls 6128->6129 6129->6128

              Control-flow Graph

              APIs
              • LocalAlloc.KERNEL32(00000000,00000104), ref: 00F41016
              • GetModuleFileNameW.KERNEL32(00000000,00000000,00000104), ref: 00F41025
              • CertOpenSystemStoreA.CRYPT32(00000000,TrustedPublisher), ref: 00F41032
              • LocalAlloc.KERNELBASE(00000000,00040000), ref: 00F41057
              • LocalAlloc.KERNEL32(00000000,00040000), ref: 00F41063
              • CryptQueryObject.CRYPT32(00000001,00000000,00000400,00000002,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 00F41082
              • CryptMsgGetParam.CRYPT32(?,0000000B,00000000,?,?), ref: 00F410B2
              • LocalAlloc.KERNEL32(00000000,?), ref: 00F410C5
              • LocalAlloc.KERNEL32(00000000,00002000), ref: 00F410F4
              • CryptMsgGetParam.CRYPT32(?,0000000C,00000000,00000000,00002000), ref: 00F4110A
              • CertCreateCertificateContext.CRYPT32(00000001,00000000,00002000), ref: 00F4111A
              • CertAddCertificateContextToStore.CRYPT32(?,00000000,00000001,00000000), ref: 00F4112D
              • CertFreeCertificateContext.CRYPT32(00000000), ref: 00F41134
              • LocalFree.KERNEL32(00000000), ref: 00F4113E
              • LocalFree.KERNEL32(00000000), ref: 00F4115D
              • CryptMsgGetParam.CRYPT32(?,00000009,00000000,00000000,00040000), ref: 00F4116E
              • CryptMsgGetParam.CRYPT32(?,0000000A,00000000,?,00040000), ref: 00F41182
              • CertFindAttribute.CRYPT32(1.3.6.1.4.1.311.4.1.1,00000000,?), ref: 00F41198
              • CertFindAttribute.CRYPT32(1.3.6.1.4.1.311.4.1.1,?,?), ref: 00F411A9
              • LoadLibraryA.KERNELBASE(dfshim), ref: 00F411BA
              • GetProcAddress.KERNEL32(00000000,ShOpenVerbApplicationW), ref: 00F411C6
              • Sleep.KERNELBASE(00009C40), ref: 00F411E8
              • CertDeleteCertificateFromStore.CRYPT32(?), ref: 00F4120B
              • CertCloseStore.CRYPT32(?,00000000), ref: 00F4121A
              • LocalFree.KERNEL32(?), ref: 00F41223
              • LocalFree.KERNEL32(?), ref: 00F41228
              • LocalFree.KERNELBASE(?), ref: 00F4122D
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: Local$Cert$Free$AllocCrypt$CertificateParamStore$Context$AttributeFind$AddressCloseCreateDeleteFileFromLibraryLoadModuleNameObjectOpenProcQuerySleepSystem
              • String ID: 1.3.6.1.4.1.311.4.1.1$ShOpenVerbApplicationW$TrustedPublisher$dfshim
              • API String ID: 335784236-860318880
              • Opcode ID: 0c2d8c274c91487cdb77be5fdefe71071f8f1ecc26e028618085193b5dd78a76
              • Instruction ID: 9ed27409b84635515df14f8e8bc11c8526fbb227aa53c2527994f87730efd0b8
              • Opcode Fuzzy Hash: 0c2d8c274c91487cdb77be5fdefe71071f8f1ecc26e028618085193b5dd78a76
              • Instruction Fuzzy Hash: EE615C75E40218ABEB209BA8DC45FAFBBB9FF49B51F100014EE14B7291C7719D41ABA4

              Control-flow Graph

              APIs
              • GetCurrentProcess.KERNEL32(?,?,00F4364D,?,00F502E0,0000000C,00F437A4,?,00000002,00000000,?,00F43F66,00000003,00F4209F,00F41AFC), ref: 00F43698
              • TerminateProcess.KERNEL32(00000000,?,00F4364D,?,00F502E0,0000000C,00F437A4,?,00000002,00000000,?,00F43F66,00000003,00F4209F,00F41AFC), ref: 00F4369F
              • ExitProcess.KERNEL32 ref: 00F436B1
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: Process$CurrentExitTerminate
              • String ID:
              • API String ID: 1703294689-0
              • Opcode ID: 1af250764c10ea1f5e66e5c9274f4d1acefb51d079a9d2fe92215217b2934ccc
              • Instruction ID: 4673f2926237e02646bf0d14d0e6be46051b80c8a067f3558a42957e4a13c5ce
              • Opcode Fuzzy Hash: 1af250764c10ea1f5e66e5c9274f4d1acefb51d079a9d2fe92215217b2934ccc
              • Instruction Fuzzy Hash: F4E0463100010CAFCF11BF68CD09E4A3F2AEF52396B010014FE058A232DB39DE42EA50
              APIs
              • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 00F4192B
              • IsDebuggerPresent.KERNEL32 ref: 00F419F7
              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00F41A10
              • UnhandledExceptionFilter.KERNEL32(?), ref: 00F41A1A
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
              • String ID:
              • API String ID: 254469556-0
              • Opcode ID: 89ae765d8ba847ce6aeeab09ccf1b9f410bd8d8aec4e6fc65d3f66b13b735406
              • Instruction ID: 679a1e2049080b23d40fa48a805abe35da73aff42d8cb63a28991e2b3ec3b98c
              • Opcode Fuzzy Hash: 89ae765d8ba847ce6aeeab09ccf1b9f410bd8d8aec4e6fc65d3f66b13b735406
              • Instruction Fuzzy Hash: EB311675D0121C9BDB20DFA4DD497CDBBB8BF08300F1041AAE80DAB250EB749A84DF45
              APIs
              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00F4466B
              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00F44675
              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 00F44682
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled$DebuggerPresent
              • String ID:
              • API String ID: 3906539128-0
              • Opcode ID: 44c7f4830ac7520fd3671a254c7b920f4c44b93fe7f5d97a00fc32c0b413baf4
              • Instruction ID: d714caa115512eb72fbd88e6009a65f23c6e970e2b22f7660453efd3e90bf293
              • Opcode Fuzzy Hash: 44c7f4830ac7520fd3671a254c7b920f4c44b93fe7f5d97a00fc32c0b413baf4
              • Instruction Fuzzy Hash: F331D37490121C9BCB21DF68DC88B8DBBB8FF08311F5041EAE81CA7251EB749B859F45
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID:
              • String ID: .
              • API String ID: 0-248832578
              • Opcode ID: 629e6b05fbf8e1a1e8797821c0a1f384c6e1098e89fa72c16eb20e04e1652e79
              • Instruction ID: 521086f8d786646291a71fe5174fad45820ad4fc0d5f2bdd705a3da3a479d2da
              • Opcode Fuzzy Hash: 629e6b05fbf8e1a1e8797821c0a1f384c6e1098e89fa72c16eb20e04e1652e79
              • Instruction Fuzzy Hash: 1331D272D00249ABCB249E78CC85FEA7FBDEB85314F0441A8F919E7251E634AD459B50
              APIs
              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00F4A490,?,?,00000008,?,?,00F4A130,00000000), ref: 00F4A6C2
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: ExceptionRaise
              • String ID:
              • API String ID: 3997070919-0
              • Opcode ID: 893d80eac0b8764b712ba475d147fd1a041f41e50b2c33edf5f87fa56d8fc8c1
              • Instruction ID: 7e9061983d041829ee7c6e8a0fe99cb16d365be6904a5b1dc31b0a79ee9721d4
              • Opcode Fuzzy Hash: 893d80eac0b8764b712ba475d147fd1a041f41e50b2c33edf5f87fa56d8fc8c1
              • Instruction Fuzzy Hash: 6CB16C326506088FD725CF28C58AB657FE0FF45364F298658EC9ACF2A1C335D992DB41
              APIs
              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00F41BEA
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: FeaturePresentProcessor
              • String ID:
              • API String ID: 2325560087-0
              • Opcode ID: aaa0c8c0120a5b7045302c4c5e8ce959a9b2ba5aedfb4c94d262e1473d135c0a
              • Instruction ID: cf1d3ad97394b1ceac18c67cc0389cafb2aad93443c9ff29cb56ebca19238d17
              • Opcode Fuzzy Hash: aaa0c8c0120a5b7045302c4c5e8ce959a9b2ba5aedfb4c94d262e1473d135c0a
              • Instruction Fuzzy Hash: BD51AFB1E103099FEB14CF64E8817AEBBF0FB88355F15852ACA05EB290D374A981DF50
              APIs
              • SetUnhandledExceptionFilter.KERNEL32(Function_00001AB8,00F41300), ref: 00F41AB1
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled
              • String ID:
              • API String ID: 3192549508-0
              • Opcode ID: 90f51331131eea2ac8f1e693a05bb6ab0115d9e8a4432572658725cee60bde64
              • Instruction ID: a3e8dc61245912c6a1efb67211ca3b6b16c22e14981c5e6d2a53159b925399e0
              • Opcode Fuzzy Hash: 90f51331131eea2ac8f1e693a05bb6ab0115d9e8a4432572658725cee60bde64
              • Instruction Fuzzy Hash:
              APIs
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: HeapProcess
              • String ID:
              • API String ID: 54951025-0
              • Opcode ID: c9cd69b70c57339d4f4bfd74cc30e6170d92ec742a50549f2d9e9cad8741e8d0
              • Instruction ID: 825353238a4aa099d2d5d5ec2a9de58aa4ab69260e658c214837c6bbca495176
              • Opcode Fuzzy Hash: c9cd69b70c57339d4f4bfd74cc30e6170d92ec742a50549f2d9e9cad8741e8d0
              • Instruction Fuzzy Hash: 75A012302002098B43408F345A4520935985746581B0200145504C0020DB2080407A01

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 144 f46507-f4651b 145 f4651d-f46522 144->145 146 f46589-f46591 144->146 145->146 149 f46524-f46529 145->149 147 f46593-f46596 146->147 148 f465d8-f465f0 call f4667a 146->148 147->148 152 f46598-f465d5 call f44869 * 4 147->152 156 f465f3-f465fa 148->156 149->146 151 f4652b-f4652e 149->151 151->146 154 f46530-f46538 151->154 152->148 157 f46552-f4655a 154->157 158 f4653a-f4653d 154->158 160 f465fc-f46600 156->160 161 f46619-f4661d 156->161 163 f46574-f46588 call f44869 * 2 157->163 164 f4655c-f4655f 157->164 158->157 162 f4653f-f46551 call f44869 call f46078 158->162 167 f46616 160->167 168 f46602-f46605 160->168 172 f46635-f46641 161->172 173 f4661f-f46624 161->173 162->157 163->146 164->163 170 f46561-f46573 call f44869 call f46176 164->170 167->161 168->167 176 f46607-f46615 call f44869 * 2 168->176 170->163 172->156 175 f46643-f46650 call f44869 172->175 180 f46626-f46629 173->180 181 f46632 173->181 176->167 180->181 188 f4662b-f46631 call f44869 180->188 181->172 188->181
              APIs
              • ___free_lconv_mon.LIBCMT ref: 00F4654B
                • Part of subcall function 00F46078: _free.LIBCMT ref: 00F46095
                • Part of subcall function 00F46078: _free.LIBCMT ref: 00F460A7
                • Part of subcall function 00F46078: _free.LIBCMT ref: 00F460B9
                • Part of subcall function 00F46078: _free.LIBCMT ref: 00F460CB
                • Part of subcall function 00F46078: _free.LIBCMT ref: 00F460DD
                • Part of subcall function 00F46078: _free.LIBCMT ref: 00F460EF
                • Part of subcall function 00F46078: _free.LIBCMT ref: 00F46101
                • Part of subcall function 00F46078: _free.LIBCMT ref: 00F46113
                • Part of subcall function 00F46078: _free.LIBCMT ref: 00F46125
                • Part of subcall function 00F46078: _free.LIBCMT ref: 00F46137
                • Part of subcall function 00F46078: _free.LIBCMT ref: 00F46149
                • Part of subcall function 00F46078: _free.LIBCMT ref: 00F4615B
                • Part of subcall function 00F46078: _free.LIBCMT ref: 00F4616D
              • _free.LIBCMT ref: 00F46540
                • Part of subcall function 00F44869: HeapFree.KERNEL32(00000000,00000000,?,00F4620D,?,00000000,?,00000000,?,00F46234,?,00000007,?,?,00F4669F,?), ref: 00F4487F
                • Part of subcall function 00F44869: GetLastError.KERNEL32(?,?,00F4620D,?,00000000,?,00000000,?,00F46234,?,00000007,?,?,00F4669F,?,?), ref: 00F44891
              • _free.LIBCMT ref: 00F46562
              • _free.LIBCMT ref: 00F46577
              • _free.LIBCMT ref: 00F46582
              • _free.LIBCMT ref: 00F465A4
              • _free.LIBCMT ref: 00F465B7
              • _free.LIBCMT ref: 00F465C5
              • _free.LIBCMT ref: 00F465D0
              • _free.LIBCMT ref: 00F46608
              • _free.LIBCMT ref: 00F4660F
              • _free.LIBCMT ref: 00F4662C
              • _free.LIBCMT ref: 00F46644
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
              • String ID:
              • API String ID: 161543041-0
              • Opcode ID: 1a0a1c5d5c24196f8f50c76e2a97f937d026bce54c0120ce888ac8cb1af577ae
              • Instruction ID: ecbd1a0250705887d1f5df12e085b5032295a9e9cb8c7350c91ad6244cff770a
              • Opcode Fuzzy Hash: 1a0a1c5d5c24196f8f50c76e2a97f937d026bce54c0120ce888ac8cb1af577ae
              • Instruction Fuzzy Hash: 7B315E71A003009FEB60AB7AEC05B567BE8EF42320F144429F849E7295DE34FD90AB51

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 201 f44330-f44341 202 f44343-f4434c call f44869 201->202 203 f4434d-f443d8 call f44869 * 9 call f441f6 call f44246 201->203 202->203
              APIs
              • _free.LIBCMT ref: 00F44344
                • Part of subcall function 00F44869: HeapFree.KERNEL32(00000000,00000000,?,00F4620D,?,00000000,?,00000000,?,00F46234,?,00000007,?,?,00F4669F,?), ref: 00F4487F
                • Part of subcall function 00F44869: GetLastError.KERNEL32(?,?,00F4620D,?,00000000,?,00000000,?,00F46234,?,00000007,?,?,00F4669F,?,?), ref: 00F44891
              • _free.LIBCMT ref: 00F44350
              • _free.LIBCMT ref: 00F4435B
              • _free.LIBCMT ref: 00F44366
              • _free.LIBCMT ref: 00F44371
              • _free.LIBCMT ref: 00F4437C
              • _free.LIBCMT ref: 00F44387
              • _free.LIBCMT ref: 00F44392
              • _free.LIBCMT ref: 00F4439D
              • _free.LIBCMT ref: 00F443AB
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 16ea9d594e8d76e84ac09107b5056313d8f95d7f60f4a6e9c08015a0412bf795
              • Instruction ID: 0d95b5a126ee73d3982180f53a4162c5787b17e35ee60b7fb7a4834fb86d5d4d
              • Opcode Fuzzy Hash: 16ea9d594e8d76e84ac09107b5056313d8f95d7f60f4a6e9c08015a0412bf795
              • Instruction Fuzzy Hash: B5118976600148FFCB41EF96DC42ED93F65EF44750F5141A6BE089F262DA35EE50AB80

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 228 f47ab4-f47acd 229 f47ae3-f47ae8 228->229 230 f47acf-f47adf call f482cc 228->230 231 f47af5-f47b19 MultiByteToWideChar 229->231 232 f47aea-f47af2 229->232 230->229 237 f47ae1 230->237 235 f47cac-f47cbf call f4123a 231->235 236 f47b1f-f47b2b 231->236 232->231 238 f47b2d-f47b3e 236->238 239 f47b7f 236->239 237->229 242 f47b40-f47b4f call f4ac20 238->242 243 f47b5d-f47b63 238->243 241 f47b81-f47b83 239->241 245 f47ca1 241->245 246 f47b89-f47b9c MultiByteToWideChar 241->246 242->245 255 f47b55-f47b5b 242->255 248 f47b64 call f462ff 243->248 250 f47ca3-f47caa call f4646a 245->250 246->245 249 f47ba2-f47bbd call f45a15 246->249 252 f47b69-f47b6e 248->252 249->245 260 f47bc3-f47bca 249->260 250->235 252->245 256 f47b74 252->256 259 f47b7a-f47b7d 255->259 256->259 259->241 261 f47c04-f47c10 260->261 262 f47bcc-f47bd1 260->262 264 f47c12-f47c23 261->264 265 f47c5c 261->265 262->250 263 f47bd7-f47bd9 262->263 263->245 266 f47bdf-f47bf9 call f45a15 263->266 268 f47c25-f47c34 call f4ac20 264->268 269 f47c3e-f47c44 264->269 267 f47c5e-f47c60 265->267 266->250 283 f47bff 266->283 273 f47c62-f47c7b call f45a15 267->273 274 f47c9a-f47ca0 call f4646a 267->274 268->274 280 f47c36-f47c3c 268->280 271 f47c45 call f462ff 269->271 277 f47c4a-f47c4f 271->277 273->274 286 f47c7d-f47c84 273->286 274->245 277->274 282 f47c51 277->282 285 f47c57-f47c5a 280->285 282->285 283->245 285->267 287 f47c86-f47c87 286->287 288 f47cc0-f47cc6 286->288 289 f47c88-f47c98 WideCharToMultiByte 287->289 288->289 289->274 290 f47cc8-f47ccf call f4646a 289->290 290->250
              APIs
              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,00F454C8,00000000,?,?,?,00F47D05,?,?,00000100), ref: 00F47B0E
              • __alloca_probe_16.LIBCMT ref: 00F47B46
              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,00F47D05,?,?,00000100,5EFC4D8B,?,?), ref: 00F47B94
              • __alloca_probe_16.LIBCMT ref: 00F47C2B
              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00F47C8E
              • __freea.LIBCMT ref: 00F47C9B
                • Part of subcall function 00F462FF: HeapAlloc.KERNEL32(00000000,?,00000004,?,00F47E5B,?,00000000,?,00F4686F,?,00000004,00000000,?,?,?,00F43BCD), ref: 00F46331
              • __freea.LIBCMT ref: 00F47CA4
              • __freea.LIBCMT ref: 00F47CC9
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocHeap
              • String ID:
              • API String ID: 2597970681-0
              • Opcode ID: 7c2c752473c4b8b17de736038d117316ecb35683cdebfe645866fccd723253bf
              • Instruction ID: bbd723b38bb66f3e7147a038f5e7b2aaa67fe53bd3a4971b8ee8f5255657c9c6
              • Opcode Fuzzy Hash: 7c2c752473c4b8b17de736038d117316ecb35683cdebfe645866fccd723253bf
              • Instruction Fuzzy Hash: F551E372A14316AFEF25AF64DC81FAF7FAAEB44760B154628FD04D6150EB38DC40E690

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 293 f48417-f48474 GetConsoleCP 294 f485b7-f485c9 call f4123a 293->294 295 f4847a-f48496 293->295 296 f484b1-f484c2 call f46052 295->296 297 f48498-f484af 295->297 304 f484c4-f484c7 296->304 305 f484e8-f484ea 296->305 299 f484eb-f484fa call f472b7 297->299 299->294 309 f48500-f48520 WideCharToMultiByte 299->309 307 f484cd-f484df call f472b7 304->307 308 f4858e-f485ad 304->308 305->299 307->294 316 f484e5-f484e6 307->316 308->294 309->294 311 f48526-f4853c WriteFile 309->311 313 f4853e-f4854f 311->313 314 f485af-f485b5 GetLastError 311->314 313->294 315 f48551-f48555 313->315 314->294 317 f48557-f48575 WriteFile 315->317 318 f48583-f48586 315->318 316->309 317->314 319 f48577-f4857b 317->319 318->295 320 f4858c 318->320 319->294 321 f4857d-f48580 319->321 320->294 321->318
              APIs
              • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,00F48B8C,?,00000000,?,00000000,00000000), ref: 00F48459
              • __fassign.LIBCMT ref: 00F484D4
              • __fassign.LIBCMT ref: 00F484EF
              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 00F48515
              • WriteFile.KERNEL32(?,?,00000000,00F48B8C,00000000,?,?,?,?,?,?,?,?,?,00F48B8C,?), ref: 00F48534
              • WriteFile.KERNEL32(?,?,00000001,00F48B8C,00000000,?,?,?,?,?,?,?,?,?,00F48B8C,?), ref: 00F4856D
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
              • String ID:
              • API String ID: 1324828854-0
              • Opcode ID: 4f8b5ff1e1c281fe220af3962ebcb3f75262227bbdbe52250431c2e8d502e7d4
              • Instruction ID: 88983e665f510da314ff1b6f178742b3a39620c5c988479afc074e4cb0851a83
              • Opcode Fuzzy Hash: 4f8b5ff1e1c281fe220af3962ebcb3f75262227bbdbe52250431c2e8d502e7d4
              • Instruction Fuzzy Hash: 56518F75E002499FDB10CFA8DC85AEEBBF8FF19350F18411AE955E7291DB30AA41DB60

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 322 f41e00-f41e51 call f4ac80 call f41dc0 call f42377 329 f41e53-f41e65 322->329 330 f41ead-f41eb0 322->330 331 f41ed0-f41ed9 329->331 333 f41e67-f41e7e 329->333 330->331 332 f41eb2-f41ebf call f42360 330->332 338 f41ec4-f41ecd call f41dc0 332->338 335 f41e94 333->335 336 f41e80-f41e8e call f42300 333->336 337 f41e97-f41e9c 335->337 345 f41ea4-f41eab 336->345 346 f41e90 336->346 337->333 340 f41e9e-f41ea0 337->340 338->331 340->331 343 f41ea2 340->343 343->338 345->338 347 f41e92 346->347 348 f41eda-f41ee3 346->348 347->337 349 f41ee5-f41eec 348->349 350 f41f1d-f41f2d call f42340 348->350 349->350 352 f41eee-f41efd call f4aac0 349->352 356 f41f41-f41f5d call f41dc0 call f42320 350->356 357 f41f2f-f41f3e call f42360 350->357 358 f41eff-f41f17 352->358 359 f41f1a 352->359 357->356 358->359 359->350
              APIs
              • _ValidateLocalCookies.LIBCMT ref: 00F41E37
              • ___except_validate_context_record.LIBVCRUNTIME ref: 00F41E3F
              • _ValidateLocalCookies.LIBCMT ref: 00F41EC8
              • __IsNonwritableInCurrentImage.LIBCMT ref: 00F41EF3
              • _ValidateLocalCookies.LIBCMT ref: 00F41F48
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
              • String ID: csm
              • API String ID: 1170836740-1018135373
              • Opcode ID: 0fbc0b3f7399b19f861fcc898686394f3d1448adacd7adfecb9e77e8b01fd6f6
              • Instruction ID: ff62367b69fecc146c5d239fcf98c5e558569d3f57998a2e32ee7bcdd63e8b2a
              • Opcode Fuzzy Hash: 0fbc0b3f7399b19f861fcc898686394f3d1448adacd7adfecb9e77e8b01fd6f6
              • Instruction Fuzzy Hash: 9041BF38E002099BCF10DF68CC80AAEBFB5BF45364F148055EC149B392D735EA85EB91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 368 f4621b-f46226 369 f462fc-f462fe 368->369 370 f4622c-f462f9 call f461df * 5 call f44869 * 3 call f461df * 5 call f44869 * 4 368->370 370->369
              APIs
                • Part of subcall function 00F461DF: _free.LIBCMT ref: 00F46208
              • _free.LIBCMT ref: 00F46269
                • Part of subcall function 00F44869: HeapFree.KERNEL32(00000000,00000000,?,00F4620D,?,00000000,?,00000000,?,00F46234,?,00000007,?,?,00F4669F,?), ref: 00F4487F
                • Part of subcall function 00F44869: GetLastError.KERNEL32(?,?,00F4620D,?,00000000,?,00000000,?,00F46234,?,00000007,?,?,00F4669F,?,?), ref: 00F44891
              • _free.LIBCMT ref: 00F46274
              • _free.LIBCMT ref: 00F4627F
              • _free.LIBCMT ref: 00F462D3
              • _free.LIBCMT ref: 00F462DE
              • _free.LIBCMT ref: 00F462E9
              • _free.LIBCMT ref: 00F462F4
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 1d7f3cd73ca15569adc6f3b3063faa031294499d8d9ad134557c71114fc07fde
              • Instruction ID: 418df24534cd613afdfcad56ce8b8afb5ee6f488d1ce385d948d02586c4a34c2
              • Opcode Fuzzy Hash: 1d7f3cd73ca15569adc6f3b3063faa031294499d8d9ad134557c71114fc07fde
              • Instruction Fuzzy Hash: 03115171540B14BAD520B7B1CC07FCB7F9D5F81B00F404825BE9AE6193EA69BA046651

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 405 f43d8f-f43d9c 406 f43d9e-f43daa 405->406 407 f43db9-f43e05 call f44869 * 4 405->407 406->407 408 f43dac-f43db3 call f44869 406->408 408->407
              APIs
              • _free.LIBCMT ref: 00F43DAD
                • Part of subcall function 00F44869: HeapFree.KERNEL32(00000000,00000000,?,00F4620D,?,00000000,?,00000000,?,00F46234,?,00000007,?,?,00F4669F,?), ref: 00F4487F
                • Part of subcall function 00F44869: GetLastError.KERNEL32(?,?,00F4620D,?,00000000,?,00000000,?,00F46234,?,00000007,?,?,00F4669F,?,?), ref: 00F44891
              • _free.LIBCMT ref: 00F43DBF
              • _free.LIBCMT ref: 00F43DD2
              • _free.LIBCMT ref: 00F43DE3
              • _free.LIBCMT ref: 00F43DF4
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID: 8Gd
              • API String ID: 776569668-551424441
              • Opcode ID: 6a5bfab6ada6792a5780ab120f9b4b525d16842d5d0539ec0df7a22f66602223
              • Instruction ID: e0d73706049f50d1f4e7be14b37fe23d69f2a8ffe5bb4240089819e5ca5f3a03
              • Opcode Fuzzy Hash: 6a5bfab6ada6792a5780ab120f9b4b525d16842d5d0539ec0df7a22f66602223
              • Instruction Fuzzy Hash: 59F0D478800B689FDB916F25FC0164A3F70BB857223450617FF12AA3B2D7792951BBC1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 419 f423d1-f423d8 420 f423dd-f423f8 GetLastError call f426a4 419->420 421 f423da-f423dc 419->421 424 f42411-f42413 420->424 425 f423fa-f423fc 420->425 426 f42457-f42462 SetLastError 424->426 425->426 427 f423fe-f4240f call f426df 425->427 427->424 430 f42415-f42425 call f43f67 427->430 433 f42427-f42437 call f426df 430->433 434 f42439-f42449 call f426df 430->434 433->434 440 f4244b-f4244d 433->440 439 f4244f-f42456 call f43ec5 434->439 439->426 440->439
              APIs
              • GetLastError.KERNEL32(?,?,00F423C8,00F4209F,00F41AFC), ref: 00F423DF
              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00F423ED
              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00F42406
              • SetLastError.KERNEL32(00000000,00F423C8,00F4209F,00F41AFC), ref: 00F42458
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: ErrorLastValue___vcrt_
              • String ID:
              • API String ID: 3852720340-0
              • Opcode ID: 395e329ef3b8ab475dc502b77550b73c26e0e5ae52a7eaf1bc1d5db30e334187
              • Instruction ID: f370a745f5018e723709231bd71297e4cf6346a735aa7ee95e8126db8142b078
              • Opcode Fuzzy Hash: 395e329ef3b8ab475dc502b77550b73c26e0e5ae52a7eaf1bc1d5db30e334187
              • Instruction Fuzzy Hash: 0A01F2336193295EA6A46BB8BC85B2B3F54EB127B67600239FE20810F6EF555C81B254

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 443 f44424-f44438 GetLastError 444 f44446-f4444b 443->444 445 f4443a-f44444 call f45904 443->445 446 f4444d call f4480c 444->446 445->444 452 f4448f-f4449a SetLastError 445->452 448 f44452-f44458 446->448 450 f44463-f44471 call f4595a 448->450 451 f4445a 448->451 458 f44476-f4448d call f44296 call f44869 450->458 459 f44473-f44474 450->459 453 f4445b-f44461 call f44869 451->453 460 f4449b-f444a7 SetLastError call f43f24 453->460 458->452 458->460 459->453
              APIs
              • GetLastError.KERNEL32(00000008,?,00F46D69,?,?,?,00F504C8,0000002C,00F43F34,00000016,00F4209F,00F41AFC), ref: 00F44428
              • _free.LIBCMT ref: 00F4445B
              • _free.LIBCMT ref: 00F44483
              • SetLastError.KERNEL32(00000000), ref: 00F44490
              • SetLastError.KERNEL32(00000000), ref: 00F4449C
              • _abort.LIBCMT ref: 00F444A2
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: ErrorLast$_free$_abort
              • String ID:
              • API String ID: 3160817290-0
              • Opcode ID: 858cc7a6abf67a7c7a40374b7262ff39f940e84e5da72e517189e072f0ac78b8
              • Instruction ID: 49bde206999a28607631b1152991a0f062534de762d6f4f608d3d3e2881f6608
              • Opcode Fuzzy Hash: 858cc7a6abf67a7c7a40374b7262ff39f940e84e5da72e517189e072f0ac78b8
              • Instruction Fuzzy Hash: 63F0F236900744A7C611F7346C05B2B3E596FD2772F254114FD28F31E6EF69E9017121
              APIs
              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00F436AD,?,?,00F4364D,?,00F502E0,0000000C,00F437A4,?,00000002), ref: 00F4371C
              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00F4372F
              • FreeLibrary.KERNEL32(00000000,?,?,?,00F436AD,?,?,00F4364D,?,00F502E0,0000000C,00F437A4,?,00000002,00000000), ref: 00F43752
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: AddressFreeHandleLibraryModuleProc
              • String ID: CorExitProcess$mscoree.dll
              • API String ID: 4061214504-1276376045
              • Opcode ID: 19dae7c5e27ce3cdfb896d3f58e98cafc171c42bd67247db60728245e0cca771
              • Instruction ID: 7d66d19c50d508686e51b813013b002ab03bc004d147ce581fa3ce72dbe67a37
              • Opcode Fuzzy Hash: 19dae7c5e27ce3cdfb896d3f58e98cafc171c42bd67247db60728245e0cca771
              • Instruction Fuzzy Hash: 4FF04F75A0020CBBDB159BA4DC49BAEBFB4EF19756F0040A4FD05A2151DB74DE84EB90
              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,00F454C8,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 00F4639A
              • __alloca_probe_16.LIBCMT ref: 00F463D2
              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F46423
              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00F46435
              • __freea.LIBCMT ref: 00F4643E
                • Part of subcall function 00F462FF: HeapAlloc.KERNEL32(00000000,?,00000004,?,00F47E5B,?,00000000,?,00F4686F,?,00000004,00000000,?,?,?,00F43BCD), ref: 00F46331
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: ByteCharMultiWide$AllocHeapStringType__alloca_probe_16__freea
              • String ID:
              • API String ID: 1857427562-0
              • Opcode ID: 35c969f037d924c8fbcc09fb48de0a588bb9e0c0ead4010f2431307a21238605
              • Instruction ID: a2a4503c6f01065f1547c40448c7d516ddd40ba1c8ab7bcd482e0bbfb54b07d9
              • Opcode Fuzzy Hash: 35c969f037d924c8fbcc09fb48de0a588bb9e0c0ead4010f2431307a21238605
              • Instruction Fuzzy Hash: 3C31E172A0021AABDF25DF64DC45EAE7FA5EF02320F044129FC14D6260E739CD90EBA1
              APIs
              • GetEnvironmentStringsW.KERNEL32 ref: 00F45627
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00F4564A
                • Part of subcall function 00F462FF: HeapAlloc.KERNEL32(00000000,?,00000004,?,00F47E5B,?,00000000,?,00F4686F,?,00000004,00000000,?,?,?,00F43BCD), ref: 00F46331
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00F45670
              • _free.LIBCMT ref: 00F45683
              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00F45692
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: ByteCharEnvironmentMultiStringsWide$AllocFreeHeap_free
              • String ID:
              • API String ID: 2278895681-0
              • Opcode ID: a745500d9afcf70b9c6e4710bbd45844a0490ec8b05d1665d349afdf8e2499cb
              • Instruction ID: e89a1fd6d49d487c441fc982366929349d79a8a692212c7fbad1a73255335468
              • Opcode Fuzzy Hash: a745500d9afcf70b9c6e4710bbd45844a0490ec8b05d1665d349afdf8e2499cb
              • Instruction Fuzzy Hash: 27018476A02A597F27212ABA5C4CD7B7E6DDEC2FB13560129FD04D7142EBA48D01B1B0
              APIs
              • GetLastError.KERNEL32(?,?,?,00F447FE,00F47E79,?,00F4686F,?,00000004,00000000,?,?,?,00F43BCD,?,00000000), ref: 00F444AD
              • _free.LIBCMT ref: 00F444E2
              • _free.LIBCMT ref: 00F44509
              • SetLastError.KERNEL32(00000000,?,?,?,?,?,?), ref: 00F44516
              • SetLastError.KERNEL32(00000000,?,?,?,?,?,?), ref: 00F4451F
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: ErrorLast$_free
              • String ID:
              • API String ID: 3170660625-0
              • Opcode ID: 703727764acdeb6ecddda3ff3e8713eb4c12c2788885a932d076e76505f879bd
              • Instruction ID: ff86f12e866f594198bb61cd3fc33ba7946e9aafa8519be401ae9af54bb6dbfd
              • Opcode Fuzzy Hash: 703727764acdeb6ecddda3ff3e8713eb4c12c2788885a932d076e76505f879bd
              • Instruction Fuzzy Hash: 8301F437A00608AB9612B6346C45F2B3E2EBBD27727250125FD19F22D3EF68ED017020
              APIs
              • _free.LIBCMT ref: 00F4618E
                • Part of subcall function 00F44869: HeapFree.KERNEL32(00000000,00000000,?,00F4620D,?,00000000,?,00000000,?,00F46234,?,00000007,?,?,00F4669F,?), ref: 00F4487F
                • Part of subcall function 00F44869: GetLastError.KERNEL32(?,?,00F4620D,?,00000000,?,00000000,?,00F46234,?,00000007,?,?,00F4669F,?,?), ref: 00F44891
              • _free.LIBCMT ref: 00F461A0
              • _free.LIBCMT ref: 00F461B2
              • _free.LIBCMT ref: 00F461C4
              • _free.LIBCMT ref: 00F461D6
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 29500f2b75e71d4de73a096812a0b20ab52707e5d8a40c6badbbf628b4d8dc51
              • Instruction ID: e9c0b23874b88691cacfdbe4a4746878d3e3ea6238d609fba57684c5c75e79d4
              • Opcode Fuzzy Hash: 29500f2b75e71d4de73a096812a0b20ab52707e5d8a40c6badbbf628b4d8dc51
              • Instruction Fuzzy Hash: A2F06272A04344AF8660EB55F981E1A7FDDBB82F213680805FC09E7652C734FC80AA51
              APIs
              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Scan_PDF_3008059384.exe,00000104), ref: 00F42F93
              • _free.LIBCMT ref: 00F4305E
              • _free.LIBCMT ref: 00F43068
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: _free$FileModuleName
              • String ID: C:\Users\user\Desktop\Scan_PDF_3008059384.exe
              • API String ID: 2506810119-846507713
              • Opcode ID: 1f44ab28b7c9d046150a6d7c778bda357d1acbf73f1ee90760f1b939368ed519
              • Instruction ID: 46e097f437ed5fbadc7470b0326bb96dd2b853708ce7e08f28a7f1d5bb9b49d3
              • Opcode Fuzzy Hash: 1f44ab28b7c9d046150a6d7c778bda357d1acbf73f1ee90760f1b939368ed519
              • Instruction Fuzzy Hash: 66319D71E00208AFCB21DB99DC81AAEBFBCEB85724F104166FD04A7211D6B59E44EB91
              APIs
                • Part of subcall function 00F44424: GetLastError.KERNEL32(00000008,?,00F46D69,?,?,?,00F504C8,0000002C,00F43F34,00000016,00F4209F,00F41AFC), ref: 00F44428
                • Part of subcall function 00F44424: _free.LIBCMT ref: 00F4445B
                • Part of subcall function 00F44424: SetLastError.KERNEL32(00000000), ref: 00F4449C
                • Part of subcall function 00F44424: _abort.LIBCMT ref: 00F444A2
                • Part of subcall function 00F45249: _abort.LIBCMT ref: 00F4527B
                • Part of subcall function 00F45249: _free.LIBCMT ref: 00F452AF
                • Part of subcall function 00F44EBE: GetOEMCP.KERNEL32(00000000,?,?,00F45147,?), ref: 00F44EE9
              • _free.LIBCMT ref: 00F451A2
              • _free.LIBCMT ref: 00F451D8
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: _free$ErrorLast_abort
              • String ID: 8Gd$8Gd
              • API String ID: 2991157371-2294296528
              • Opcode ID: b5cc91d9b05e588ce642ff83ef6bcba58b06c9761b718085172b08c15517c5d1
              • Instruction ID: 8a50491643f6f44dc8ff3ee40b5f58fb236df1ed846bbb49187a88675cd65007
              • Opcode Fuzzy Hash: b5cc91d9b05e588ce642ff83ef6bcba58b06c9761b718085172b08c15517c5d1
              • Instruction Fuzzy Hash: 1C31E431D00648AFDB11EBA9D841B9DBFE5EF81721F25019AED049B292EB356D41EB40
              APIs
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00F42594,00000000,?,00F51B50,?,?,?,00F42737,00000004,InitializeCriticalSectionEx,00F4BC48,InitializeCriticalSectionEx), ref: 00F425F0
              • GetLastError.KERNEL32(?,00F42594,00000000,?,00F51B50,?,?,?,00F42737,00000004,InitializeCriticalSectionEx,00F4BC48,InitializeCriticalSectionEx,00000000,?,00F424C7), ref: 00F425FA
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00F42622
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: LibraryLoad$ErrorLast
              • String ID: api-ms-
              • API String ID: 3177248105-2084034818
              • Opcode ID: 8cc67f7b8b670680165b9849b00550111c2f6be9f34bb430573edb076f2f5c4d
              • Instruction ID: 1883817a1ce8c3c95886a7070f086264ab83c7aeff8571da52d038e6a71d0fce
              • Opcode Fuzzy Hash: 8cc67f7b8b670680165b9849b00550111c2f6be9f34bb430573edb076f2f5c4d
              • Instruction Fuzzy Hash: C6E04831640308BBDF212B64EC06F593F54EB25B52F514430FD0DE40E2E7A5E954B555
              APIs
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,00F45784,00000000,00000000,00000000,00000000,?,00F45981,00000006,FlsSetValue), ref: 00F4580F
              • GetLastError.KERNEL32(?,00F45784,00000000,00000000,00000000,00000000,?,00F45981,00000006,FlsSetValue,00F4C4D8,FlsSetValue,00000000,00000364,?,00F444F6), ref: 00F4581B
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00F45784,00000000,00000000,00000000,00000000,?,00F45981,00000006,FlsSetValue,00F4C4D8,FlsSetValue,00000000), ref: 00F45829
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: LibraryLoad$ErrorLast
              • String ID:
              • API String ID: 3177248105-0
              • Opcode ID: 9fc3f03f993b580a41b84d8931e223b936d9022a5eba0983c20b8225ac72429d
              • Instruction ID: 76f3be610b93d9d53fef3b05579e45ed21d5b7298c78406a173e50d2ed1ad821
              • Opcode Fuzzy Hash: 9fc3f03f993b580a41b84d8931e223b936d9022a5eba0983c20b8225ac72429d
              • Instruction Fuzzy Hash: CE01A737A0572AABD7215A6CAC44A577F98AF16FB1B240634FD1AD7142DF20D800E6E0
              APIs
              • _free.LIBCMT ref: 00F44A27
                • Part of subcall function 00F4474D: IsProcessorFeaturePresent.KERNEL32(00000017,00F4473C,00000000,?,00000004,00000000,?,?,?,?,00F44749,00000000,00000000,00000000,00000000,00000000), ref: 00F4474F
                • Part of subcall function 00F4474D: GetCurrentProcess.KERNEL32(C0000417), ref: 00F44771
                • Part of subcall function 00F4474D: TerminateProcess.KERNEL32(00000000), ref: 00F44778
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
              • String ID: *?$.
              • API String ID: 2667617558-3972193922
              • Opcode ID: b5ebe54ac363d96a5ffd237f2e5e25fa63b2e5d383b99c3f0f4b770ea8c32303
              • Instruction ID: efcb2a45e28c5e9a67ba660bb5a4fd98577971d1113d9e304b816b5f9ac9d12d
              • Opcode Fuzzy Hash: b5ebe54ac363d96a5ffd237f2e5e25fa63b2e5d383b99c3f0f4b770ea8c32303
              • Instruction Fuzzy Hash: CD517175E00219AFDF14DFA8CC81AAEBBB5FF58314F248169E854F7341E635AE01AB50
              APIs
                • Part of subcall function 00F44424: GetLastError.KERNEL32(00000008,?,00F46D69,?,?,?,00F504C8,0000002C,00F43F34,00000016,00F4209F,00F41AFC), ref: 00F44428
                • Part of subcall function 00F44424: _free.LIBCMT ref: 00F4445B
                • Part of subcall function 00F44424: SetLastError.KERNEL32(00000000), ref: 00F4449C
                • Part of subcall function 00F44424: _abort.LIBCMT ref: 00F444A2
              • _abort.LIBCMT ref: 00F4527B
              • _free.LIBCMT ref: 00F452AF
              Strings
              Memory Dump Source
              • Source File: 00000004.00000002.1285833569.0000000000F41000.00000020.00000001.01000000.00000004.sdmp, Offset: 00F40000, based on PE: true
              • Associated: 00000004.00000002.1285816396.0000000000F40000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285848452.0000000000F4B000.00000002.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285863312.0000000000F51000.00000004.00000001.01000000.00000004.sdmpDownload File
              • Associated: 00000004.00000002.1285880196.0000000000F53000.00000002.00000001.01000000.00000004.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_4_2_f40000_Scan_PDF_3008059384.jbxd
              Similarity
              • API ID: ErrorLast_abort_free
              • String ID: 8Gd
              • API String ID: 289325740-551424441
              • Opcode ID: c1a328460ca7b752d1b8aa8dd0387a9f7665bec09cc71cd71f4fe5bdb64e2885
              • Instruction ID: ef4a12b5fc95d8906067671edaf38ef73df8a2f978196e360bfc31d507844079
              • Opcode Fuzzy Hash: c1a328460ca7b752d1b8aa8dd0387a9f7665bec09cc71cd71f4fe5bdb64e2885
              • Instruction Fuzzy Hash: C0016131D01F259BC761BFA89801729BB60BB44F71B19020AED2567292D7B47A41BFC1

              Execution Graph

              Execution Coverage:20.4%
              Dynamic/Decrypted Code Coverage:100%
              Signature Coverage:0%
              Total number of Nodes:148
              Total number of Limit Nodes:9
              execution_graph 8692 7ff7c0e4c5ab 8693 7ff7c0e4c5af 8692->8693 8698 7ff7c0e44c90 8693->8698 8695 7ff7c0e4c682 8696 7ff7c0e4c663 8696->8695 8697 7ff7c0e44c90 LoadLibraryExW 8696->8697 8697->8695 8699 7ff7c0e44cb8 8698->8699 8700 7ff7c0e44cc3 8698->8700 8699->8696 8701 7ff7c0e43f30 LoadLibraryExW 8700->8701 8702 7ff7c0e44cc8 8701->8702 8702->8696 8785 7ff7c0e5292c 8788 7ff7c0e415d8 8785->8788 8787 7ff7c0e52936 8790 7ff7c0e4161d 8788->8790 8789 7ff7c0e41683 8789->8787 8790->8789 8791 7ff7c0e41802 LoadLibraryExW 8790->8791 8792 7ff7c0e41836 8791->8792 8792->8787 8676 7ff7c0e499f5 8677 7ff7c0e49a4f CreateFileW 8676->8677 8679 7ff7c0e49b2c 8677->8679 8680 7ff7c0e52cf6 8681 7ff7c0e52d05 8680->8681 8684 7ff7c0e43f30 8681->8684 8683 7ff7c0e52d5d 8687 7ff7c0e415c8 8684->8687 8686 7ff7c0e43f55 8686->8683 8689 7ff7c0e415d8 8687->8689 8688 7ff7c0e41683 8688->8686 8689->8688 8690 7ff7c0e41802 LoadLibraryExW 8689->8690 8691 7ff7c0e41836 8690->8691 8691->8686 8703 7ff7c0e434b6 8706 7ff7c0e434cb 8703->8706 8705 7ff7c0e4378e 8707 7ff7c0e43c81 8706->8707 8708 7ff7c0e43cae 8707->8708 8711 7ff7c0e42e48 8708->8711 8710 7ff7c0e43d19 8710->8705 8712 7ff7c0e43e70 8711->8712 8715 7ff7c0e43e8a 8712->8715 8717 7ff7c0e42e08 8712->8717 8714 7ff7c0e43ec9 8714->8710 8715->8714 8721 7ff7c0e42e30 8715->8721 8718 7ff7c0e43f30 8717->8718 8719 7ff7c0e415c8 LoadLibraryExW 8718->8719 8720 7ff7c0e43f55 8719->8720 8720->8715 8723 7ff7c0e42e35 8721->8723 8722 7ff7c0e42e59 8723->8722 8724 7ff7c0e42e08 LoadLibraryExW 8723->8724 8726 7ff7c0e43e8a 8723->8726 8724->8726 8725 7ff7c0e43ec9 8725->8714 8726->8725 8727 7ff7c0e42e30 LoadLibraryExW 8726->8727 8727->8725 8766 7ff7c0e4a88f 8771 7ff7c0e473d0 8766->8771 8768 7ff7c0e4a897 8769 7ff7c0e44c90 LoadLibraryExW 8768->8769 8770 7ff7c0e4aa63 8769->8770 8772 7ff7c0e473ff 8771->8772 8773 7ff7c0e473f6 8771->8773 8774 7ff7c0e43f30 LoadLibraryExW 8772->8774 8773->8768 8775 7ff7c0e47404 8774->8775 8775->8768 8793 7ff7c0e43d36 8794 7ff7c0e43d3d 8793->8794 8795 7ff7c0e42e48 LoadLibraryExW 8794->8795 8796 7ff7c0e43e2a 8795->8796 8801 7ff7c0e42db8 8796->8801 8798 7ff7c0e43e44 8805 7ff7c0e42e20 8798->8805 8802 7ff7c0e42dbd 8801->8802 8803 7ff7c0e415c8 LoadLibraryExW 8802->8803 8804 7ff7c0e43f55 8803->8804 8804->8798 8807 7ff7c0e42e25 8805->8807 8806 7ff7c0e42e59 8807->8806 8808 7ff7c0e42e08 LoadLibraryExW 8807->8808 8810 7ff7c0e43e8a 8807->8810 8808->8810 8809 7ff7c0e43e4c 8810->8809 8811 7ff7c0e42e30 LoadLibraryExW 8810->8811 8811->8809 8776 7ff7c0e44b75 8777 7ff7c0e44b7f 8776->8777 8778 7ff7c0e43f30 LoadLibraryExW 8777->8778 8779 7ff7c0e44bad 8778->8779 8728 7ff7c0e56db1 8733 7ff7c0e52e10 8728->8733 8731 7ff7c0e56dfa 8741 7ff7c0e42de0 8733->8741 8735 7ff7c0e52e2c 8735->8731 8736 7ff7c0e415e8 8735->8736 8738 7ff7c0e4161d 8736->8738 8737 7ff7c0e41683 8737->8731 8738->8737 8739 7ff7c0e41802 LoadLibraryExW 8738->8739 8740 7ff7c0e41836 8739->8740 8740->8731 8742 7ff7c0e53000 8741->8742 8745 7ff7c0e52630 8742->8745 8744 7ff7c0e53022 8744->8735 8746 7ff7c0e5263f 8745->8746 8747 7ff7c0e5265f 8745->8747 8751 7ff7c0e42dc8 8746->8751 8747->8744 8749 7ff7c0e52644 8749->8747 8755 7ff7c0e42dd0 8749->8755 8752 7ff7c0e42dcd 8751->8752 8753 7ff7c0e415c8 LoadLibraryExW 8752->8753 8754 7ff7c0e43f55 8753->8754 8754->8749 8756 7ff7c0e42dd5 8755->8756 8757 7ff7c0e52630 LoadLibraryExW 8756->8757 8758 7ff7c0e53022 8757->8758 8758->8747 8812 7ff7c0e4d331 8813 7ff7c0e4d33b 8812->8813 8814 7ff7c0e4d460 8813->8814 8815 7ff7c0e4d3cc 8813->8815 8817 7ff7c0e44c90 LoadLibraryExW 8814->8817 8816 7ff7c0e44c90 LoadLibraryExW 8815->8816 8820 7ff7c0e4d449 8816->8820 8817->8820 8818 7ff7c0e4d62c 8819 7ff7c0e4d5db 8822 7ff7c0e44c90 LoadLibraryExW 8819->8822 8820->8818 8820->8819 8821 7ff7c0e44c90 LoadLibraryExW 8820->8821 8821->8819 8822->8818 8658 7ff7c0e51212 8661 7ff7c0e512a3 8658->8661 8659 7ff7c0e513ab InternetGetCookieW 8660 7ff7c0e51409 8659->8660 8661->8659 8661->8661 8662 7ff7c0e494f7 8665 7ff7c0e49507 8662->8665 8663 7ff7c0e49548 8665->8663 8667 7ff7c0e41518 8665->8667 8666 7ff7c0e495d0 8669 7ff7c0e41529 8667->8669 8668 7ff7c0e41578 8668->8666 8669->8668 8670 7ff7c0e41802 LoadLibraryExW 8669->8670 8671 7ff7c0e41836 8670->8671 8671->8666 8780 7ff7c0e49657 8781 7ff7c0e495a9 8780->8781 8784 7ff7c0e49686 8780->8784 8782 7ff7c0e41518 LoadLibraryExW 8781->8782 8781->8784 8783 7ff7c0e495d0 8782->8783 8672 7ff7c0e529f9 8674 7ff7c0e52a07 CreateUrlCacheEntryW 8672->8674 8675 7ff7c0e52c16 8674->8675 8823 7ff7c0e4bf19 8824 7ff7c0e4bf2f 8823->8824 8825 7ff7c0e44c90 LoadLibraryExW 8824->8825 8827 7ff7c0e4c086 8824->8827 8826 7ff7c0e4bfe6 8825->8826 8828 7ff7c0e44c90 LoadLibraryExW 8826->8828 8828->8827 8759 7ff7c0e46da0 8760 7ff7c0e46dd9 8759->8760 8763 7ff7c0e45990 8760->8763 8762 7ff7c0e46f40 8764 7ff7c0e43f30 LoadLibraryExW 8763->8764 8765 7ff7c0e459b4 8764->8765 8765->8762

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000005.00000002.2038085721.00007FF7C0E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0E40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_7ff7c0e40000_dfsvc.jbxd
              Similarity
              • API ID: LibraryLoad
              • String ID: 1L_I$2L_I
              • API String ID: 1029625771-2038145154
              • Opcode ID: c42cea9f59cce506352998ca8adeb8cf2ae7f33f740f197512bf1ce3bb2d8bf1
              • Instruction ID: 700579f308c284d7a0242ecd51d6e6e09a210275a68f56a96963e7d0042f8629
              • Opcode Fuzzy Hash: c42cea9f59cce506352998ca8adeb8cf2ae7f33f740f197512bf1ce3bb2d8bf1
              • Instruction Fuzzy Hash: 57D1387060DA899FD7059B7D481A3A9BBA1FF86311B0482EFC059C7297CB34E952C7C1

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 202 7ff7c0e529f9-7ff7c0e52a05 203 7ff7c0e52a07 202->203 204 7ff7c0e52a08-7ff7c0e52a19 202->204 203->204 205 7ff7c0e52a1b 204->205 206 7ff7c0e52a1c-7ff7c0e52a2d 204->206 205->206 207 7ff7c0e52a2f 206->207 208 7ff7c0e52a30-7ff7c0e52a41 206->208 207->208 209 7ff7c0e52a43 208->209 210 7ff7c0e52a44-7ff7c0e52ae2 208->210 209->210 213 7ff7c0e52ae4-7ff7c0e52aec 210->213 214 7ff7c0e52aef-7ff7c0e52af8 210->214 213->214 215 7ff7c0e52afa-7ff7c0e52b02 214->215 216 7ff7c0e52b05-7ff7c0e52b11 214->216 215->216 217 7ff7c0e52b8d-7ff7c0e52b94 216->217 218 7ff7c0e52b13-7ff7c0e52b43 216->218 219 7ff7c0e52bae-7ff7c0e52c14 CreateUrlCacheEntryW 217->219 223 7ff7c0e52b45-7ff7c0e52b47 218->223 224 7ff7c0e52b96-7ff7c0e52b9c 218->224 220 7ff7c0e52c1c-7ff7c0e52c36 219->220 221 7ff7c0e52c16 219->221 229 7ff7c0e52c5b-7ff7c0e52c8d call 7ff7c0e52ca9 220->229 230 7ff7c0e52c38-7ff7c0e52c5a 220->230 221->220 226 7ff7c0e52b49-7ff7c0e52b5b 223->226 227 7ff7c0e52b80-7ff7c0e52b8b 223->227 233 7ff7c0e52b9e-7ff7c0e52ba8 224->233 231 7ff7c0e52b5d 226->231 232 7ff7c0e52b5f-7ff7c0e52b72 226->232 227->233 238 7ff7c0e52c94-7ff7c0e52ca8 229->238 239 7ff7c0e52c8f 229->239 230->229 231->232 232->232 235 7ff7c0e52b74-7ff7c0e52b7c 232->235 233->219 235->227 239->238
              APIs
              Memory Dump Source
              • Source File: 00000005.00000002.2038085721.00007FF7C0E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0E40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_7ff7c0e40000_dfsvc.jbxd
              Similarity
              • API ID: CacheCreateEntry
              • String ID:
              • API String ID: 3741994674-0
              • Opcode ID: 5d6b0071710929d1f3b5a2ecfc0f31db30b4694b340759d5d31e9b006389c79d
              • Instruction ID: f3075745d70eb1d9be9d6853c5c2daf534d56679c3bc64b685968098d6ab8fda
              • Opcode Fuzzy Hash: 5d6b0071710929d1f3b5a2ecfc0f31db30b4694b340759d5d31e9b006389c79d
              • Instruction Fuzzy Hash: 4791D430518A8D8FDBA9EF28D8457F57BE0EF5A320F14416EE88DC7292DB34A845C791

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000005.00000002.2038085721.00007FF7C0E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0E40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_7ff7c0e40000_dfsvc.jbxd
              Similarity
              • API ID: CookieInternet
              • String ID:
              • API String ID: 930238652-0
              • Opcode ID: 8b191fe9220ee3179a27da01c53153028415a7de196f21d166dbc217db35fb67
              • Instruction ID: 43a3c69a17e167b65e08353acf4a65335b147bff0c95bf0490f298b5e2636751
              • Opcode Fuzzy Hash: 8b191fe9220ee3179a27da01c53153028415a7de196f21d166dbc217db35fb67
              • Instruction Fuzzy Hash: C491EF30508B8C4FDB69EF28C8557E57BE1FF59320F0442AED84DCB292CB74A8458B91

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 271 7ff7c0e499f5-7ff7c0e49a80 274 7ff7c0e49a8a-7ff7c0e49b2a CreateFileW 271->274 275 7ff7c0e49a82-7ff7c0e49a87 271->275 277 7ff7c0e49b2c 274->277 278 7ff7c0e49b32-7ff7c0e49b65 274->278 275->274 277->278
              APIs
              Memory Dump Source
              • Source File: 00000005.00000002.2038085721.00007FF7C0E40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0E40000, based on PE: false
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_5_2_7ff7c0e40000_dfsvc.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: e7c557725bda61d339863a0bb012d7241fbe59c43ea560580c27bbef3a9ca692
              • Instruction ID: 5c268938beb2906a7fe41005fe6358a41b974a1ad341743dc160aaf920773f7e
              • Opcode Fuzzy Hash: e7c557725bda61d339863a0bb012d7241fbe59c43ea560580c27bbef3a9ca692
              • Instruction Fuzzy Hash: 9651AF7190CA5C9FDB58EF58D845BE9BBE0FB59320F1441AEE04DD3252CB34A985CB81