Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Scan_PDF_3269252267.exe

Overview

General Information

Sample name:Scan_PDF_3269252267.exe
Analysis ID:1523873
MD5:c9426f860a1ffb8e4c9cfec788cd83b6
SHA1:45e9d7aec3c6d0bd8715ea5d08ae0e6e73d7986e
SHA256:503455f565a8ada637e80686399dfde6caa6ecb8dd0a33e747b2cde0e8b276c2
Tags:exefiledn-comuser-JAMESWT_MHT
Infos:

Detection

Score:42
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
AV process strings found (often used to terminate AV products)
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Stores large binary data to the registry
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Scan_PDF_3269252267.exe (PID: 6848 cmdline: "C:\Users\user\Desktop\Scan_PDF_3269252267.exe" MD5: C9426F860A1FFB8E4C9CFEC788CD83B6)
    • dfsvc.exe (PID: 6892 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe" MD5: B4088F44B80D363902E11F897A7BAC09)
    • WerFault.exe (PID: 7052 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 756 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Scan_PDF_3269252267.exeReversingLabs: Detection: 15%
Source: Scan_PDF_3269252267.exeVirustotal: Detection: 10%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00211000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree,0_2_00211000
Source: Scan_PDF_3269252267.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Scan_PDF_3269252267.exeStatic PE information: certificate valid
Source: Scan_PDF_3269252267.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\builds\cc\cwcontrol\Product\ClickOnceRunner\Release\ClickOnceRunner.pdb source: Scan_PDF_3269252267.exe
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb6t source: dfsvc.exe, 00000002.00000002.3188890770.000001DAB7D75000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.pdb source: dfsvc.exe, 00000002.00000002.3188890770.000001DAB7D75000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00214A4B FindFirstFileExA,0_2_00214A4B
Source: unknownDNS traffic detected: query: app.cloudfiles-secure.io replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: app.cloudfiles-secure.io
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://ocsp.digicert.com0
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: dfsvc.exe, 00000002.00000002.3188155054.000001DA9F75D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: Scan_PDF_3269252267.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: dfsvc.exe, 00000002.00000002.3188155054.000001DA9F7F6000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.3188155054.000001DA9F7FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.cloudfiles-secure.io
Source: dfsvc.exe, 00000002.00000002.3188155054.000001DA9F857000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.3188155054.000001DA9F803000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.cloudfiles-secure.io/Bin/ScreenConnect.Client.application?e=Support&y=
Source: AD7YJBRP.log.2.drString found in binary or memory: https://app.cloudfiles-secure.io/Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=kkl22.ddns

System Summary

barindex
Source: initial sampleStatic PE information: Filename: Scan_PDF_3269252267.exe
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_0021A4950_2_0021A495
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 756
Source: Scan_PDF_3269252267.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal42.evad.winEXE@4/6@1/0
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00211000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree,0_2_00211000
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\DeploymentJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeMutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6848
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeFile created: C:\Users\user\AppData\Local\Temp\DeploymentJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCommand line argument: dfshim0_2_00211000
Source: Scan_PDF_3269252267.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Scan_PDF_3269252267.exeReversingLabs: Detection: 15%
Source: Scan_PDF_3269252267.exeVirustotal: Detection: 10%
Source: unknownProcess created: C:\Users\user\Desktop\Scan_PDF_3269252267.exe "C:\Users\user\Desktop\Scan_PDF_3269252267.exe"
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 756
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"Jump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: dfshim.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dfshim.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: uiautomationcore.dllJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00020420-0000-0000-C000-000000000046}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Scan_PDF_3269252267.exeStatic PE information: certificate valid
Source: Scan_PDF_3269252267.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Scan_PDF_3269252267.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Scan_PDF_3269252267.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Scan_PDF_3269252267.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Scan_PDF_3269252267.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Scan_PDF_3269252267.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Scan_PDF_3269252267.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Scan_PDF_3269252267.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\builds\cc\cwcontrol\Product\ClickOnceRunner\Release\ClickOnceRunner.pdb source: Scan_PDF_3269252267.exe
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb6t source: dfsvc.exe, 00000002.00000002.3188890770.000001DAB7D75000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.pdb source: dfsvc.exe, 00000002.00000002.3188890770.000001DAB7D75000.00000004.00000020.00020000.00000000.sdmp
Source: Scan_PDF_3269252267.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Scan_PDF_3269252267.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Scan_PDF_3269252267.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Scan_PDF_3269252267.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Scan_PDF_3269252267.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00211000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree,0_2_00211000
Source: Scan_PDF_3269252267.exeStatic PE information: real checksum: 0x1bda6 should be: 0x19086
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00211BC0 push ecx; ret 0_2_00211BD3
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 2_2_00007FFE166277B3 push eax; ret 2_2_00007FFE166277BD
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeCode function: 2_2_00007FFE16627638 pushad ; ret 2_2_00007FFE16627639
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C BlobJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeMemory allocated: 1DA9DC90000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeMemory allocated: 1DAB7680000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599875Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599765Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599642Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599515Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599403Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599281Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598094Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597908Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597792Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597667Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597544Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597431Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597324Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597203Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597093Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596984Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596874Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596765Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596656Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596546Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596436Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596328Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596218Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596109Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596000Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595890Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595760Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595640Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595453Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595318Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595201Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595078Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594969Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594859Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594750Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594640Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594531Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594421Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594312Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594199Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594078Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593967Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593858Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593734Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593625Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593515Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593406Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593297Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeWindow / User API: threadDelayed 2281Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeWindow / User API: threadDelayed 7424Jump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exe TID: 6852Thread sleep time: -40000s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -28592453314249787s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -600000s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -599875s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -599765s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -599642s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -599515s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -599403s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -599281s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -598094s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -597908s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -597792s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -597667s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -597544s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -597431s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -597324s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -597203s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -597093s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -596984s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -596874s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -596765s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -596656s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -596546s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -596436s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -596328s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -596218s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -596109s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -596000s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -595890s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -595760s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -595640s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -595453s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -595318s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -595201s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -595078s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -594969s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -594859s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -594750s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -594640s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -594531s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -594421s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -594312s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -594199s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -594078s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -593967s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -593858s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -593734s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -593625s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -593515s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -593406s >= -30000sJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe TID: 6964Thread sleep time: -593297s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00214A4B FindFirstFileExA,0_2_00214A4B
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeThread delayed: delay time: 40000Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 600000Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599875Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599765Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599642Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599515Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599403Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 599281Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 598094Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597908Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597792Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597667Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597544Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597431Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597324Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597203Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 597093Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596984Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596874Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596765Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596656Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596546Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596436Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596328Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596218Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596109Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 596000Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595890Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595760Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595640Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595453Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595318Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595201Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 595078Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594969Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594859Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594750Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594640Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594531Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594421Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594312Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594199Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 594078Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593967Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593858Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593734Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593625Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593515Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593406Jump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeThread delayed: delay time: 593297Jump to behavior
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: dfsvc.exe, 00000002.00000002.3188890770.000001DAB7D75000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: VMware-42 27 6e d0 59 6b 97 52-b4 9a 7f 42 1f 0e 66 9c
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_0021191F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0021191F
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00211000 LocalAlloc,LocalAlloc,GetModuleFileNameW,CertOpenSystemStoreA,LocalAlloc,LocalAlloc,CryptQueryObject,LocalFree,CryptMsgGetParam,CryptMsgGetParam,LocalAlloc,LocalAlloc,CryptMsgGetParam,CertCreateCertificateContext,CertAddCertificateContextToStore,CertFreeCertificateContext,LocalFree,CryptMsgGetParam,LocalFree,LocalFree,CryptMsgGetParam,CryptMsgGetParam,CertFindAttribute,CertFindAttribute,CertFindAttribute,LoadLibraryA,GetProcAddress,Sleep,CertDeleteCertificateFromStore,CertDeleteCertificateFromStore,CertCloseStore,LocalFree,LocalFree,LocalFree,0_2_00211000
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00213677 mov eax, dword ptr fs:[00000030h]0_2_00213677
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00216893 GetProcessHeap,0_2_00216893
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"Jump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00211493 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00211493
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_0021191F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0021191F
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00214573 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00214573
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00211AAC SetUnhandledExceptionFilter,0_2_00211AAC
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00211BD4 cpuid 0_2_00211BD4
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Deployment\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Deployment.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeCode function: 0_2_00211806 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00211806
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
Source: C:\Users\user\Desktop\Scan_PDF_3269252267.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C BlobJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Modify Registry
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)21
Disable or Modify Tools
Security Account Manager41
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook41
Virtualization/Sandbox Evasion
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Process Injection
LSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain Credentials23
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Install Root Certificate
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Scan_PDF_3269252267.exe16%ReversingLabs
Scan_PDF_3269252267.exe10%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
app.cloudfiles-secure.io0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
http://upx.sf.net0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
https://app.cloudfiles-secure.io1%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
app.cloudfiles-secure.io
unknown
unknownfalseunknown
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.5.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
https://app.cloudfiles-secure.io/Bin/ScreenConnect.Client.application?e=Support&y=Guest&h=kkl22.ddnsAD7YJBRP.log.2.drfalse
    unknown
    https://app.cloudfiles-secure.iodfsvc.exe, 00000002.00000002.3188155054.000001DA9F7F6000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.3188155054.000001DA9F7FC000.00000004.00000800.00020000.00000000.sdmpfalseunknown
    https://app.cloudfiles-secure.io/Bin/ScreenConnect.Client.application?e=Support&y=dfsvc.exe, 00000002.00000002.3188155054.000001DA9F857000.00000004.00000800.00020000.00000000.sdmp, dfsvc.exe, 00000002.00000002.3188155054.000001DA9F803000.00000004.00000800.00020000.00000000.sdmpfalse
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namedfsvc.exe, 00000002.00000002.3188155054.000001DA9F75D000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1523873
      Start date and time:2024-10-02 06:12:08 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 38s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:12
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:Scan_PDF_3269252267.exe
      Detection:MAL
      Classification:mal42.evad.winEXE@4/6@1/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 52%
      • Number of executed functions: 6
      • Number of non-executed functions: 27
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 52.168.117.173
      • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtReadVirtualMemory calls found.
      TimeTypeDescription
      00:13:07API Interceptor4575x Sleep call for process: dfsvc.exe modified
      00:13:07API Interceptor1x Sleep call for process: Scan_PDF_3269252267.exe modified
      00:13:16API Interceptor1x Sleep call for process: WerFault.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.9220110222425887
      Encrypted:false
      SSDEEP:96:r0FBitW0sQhqvGXyf5QXIDcQvc6QcEVcw3cE/MF2+HbHg/Jg+OgBCXEYcI+1sTJz:g7J0ky0BU/IFnjq0ozuiFjZ24IO8dR
      MD5:893CB44F9E376646CCB250F8C00150D4
      SHA1:5D65ECC81085DC097005AABFDCD090ABFB8DBF8D
      SHA-256:0415487D021665C55E34F74EC2DA6AE46D640E393ADF6540BB803533F4D9C80F
      SHA-512:8BA607BDDE36793AA6649054FE4F9711475E9C26AAD3AAAB97EA3F368FFFB356239F25A741EC1839215482F281033FCC706170301B6F2FBC6E50DC13487CD166
      Malicious:false
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.1.5.9.8.9.5.5.9.7.1.0.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.1.5.9.9.0.3.7.2.2.1.2.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.d.3.3.2.0.2.f.-.8.3.1.e.-.4.8.9.6.-.b.8.e.d.-.8.7.9.7.8.e.5.3.8.7.c.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.2.e.f.e.f.0.b.-.c.d.7.a.-.4.6.f.8.-.8.d.6.5.-.0.4.4.5.5.e.8.4.e.f.1.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.c.a.n._.P.D.F._.3.2.6.9.2.5.2.2.6.7...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.c.0.-.0.0.0.1.-.0.0.1.4.-.6.7.8.6.-.4.f.6.2.8.1.1.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.7.7.e.6.f.2.7.4.3.7.0.8.3.c.9.d.b.a.4.d.4.0.2.0.0.f.2.c.7.1.e.b.0.0.0.0.f.f.f.f.!.0.0.0.0.4.5.e.9.d.7.a.e.c.3.c.6.d.0.b.d.8.7.1.5.e.a.5.d.0.8.a.e.0.e.6.e.7.3.d.7.9.8.6.e.!.S.c.a.n._.P.D.F._.3.2.6.9.2.5.2.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Wed Oct 2 04:13:09 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):79430
      Entropy (8bit):1.7229055778519875
      Encrypted:false
      SSDEEP:384:fCdByhI/cDlYx/jtqI3G/kzq6smQvqmy7QH5:fC7yhI/cDlYljtqmGMzqrmQvqXQZ
      MD5:BA1E983380C0A91D6616678A68E9F8D6
      SHA1:3E7940FE7C1C2001EBB87E90E11FC2FC30306C6B
      SHA-256:126E6A9C3E4DD0EF93875DF3F24A26BF4232155A52AFFDCDFA310B539385E132
      SHA-512:1E3BAF1737787B8D0EB4E5588D17AF611E69C262D0904AA456AB24B79F11836C8CF0F078582EEE67EDAB6E0AB82425D6BA960127B70C96665CE68714A644D651
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... .......U..f.........................................;..........T.......8...........T............!..v........... ...........................................................................................eJ..............GenuineIntel............T...........S..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8364
      Entropy (8bit):3.7027490790359527
      Encrypted:false
      SSDEEP:192:R6l7wVeJO66N3T6Y++SU9jIL5gmf8W5pr6x89b6fsfy+m:R6lXJz6N3T6YnSU9sL5gmf8Wx6EfC
      MD5:C0C2B29E8CCB2A1DFE12DC05E598CA46
      SHA1:04EFA7F19F3074D661B03DEBBDC5A7A0AFB077FD
      SHA-256:27511B335C5EA5852B9597D0608312BB897054539D01AF559C09D5FE1B9AF9E5
      SHA-512:47053FD38123ECC6918C26EB4BD707006EDE25A559A76D363A5899CDB7EA1BB9DF9BA580EDABDE668BB551CF95BE5E8E6CF7A7CC94C9A6F8050232E250BF66C3
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.4.8.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4638
      Entropy (8bit):4.505350192807973
      Encrypted:false
      SSDEEP:48:cvIwWl8zsnJg77aI9PAzXWpW8VYiYm8M4JqNSFEFZj+q8N1scP5lkg8zOz3d:uIjfJI7OC7VKJwu5lkL43d
      MD5:4DBA25FBFAB988E0E6F79165F4D19D30
      SHA1:852DB51EC28262D18B7DCF511A0AA388AC7F9AD7
      SHA-256:9D4F8F116B969B706E985A93BB1883FBAA0C861961EB5ED2CB16DD7C4C5F9DF7
      SHA-512:C03EEC48D9216D08D957F6C70760B104E9A7051598F988BF7F25F7C7C9D6B685A010F09195B5648AD267F17ECD30A54C279E86C2A3E54874A0B0C8A309781658
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="525315" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
      File Type:Unicode text, UTF-16, little-endian text, with very long lines (653), with CRLF line terminators
      Category:dropped
      Size (bytes):12798
      Entropy (8bit):3.8989816071649948
      Encrypted:false
      SSDEEP:192:Sj9qHzcj9qHzejDgHd+jK9Rj9qHzhjDgHdB4e1ujr3n:IkmkIE2U1k5Ez4e1E7
      MD5:D38DA79B21DC71EFEF3BF4566109E831
      SHA1:FB80A7538E2D0BCA642A770D56ADDE5E82F54B53
      SHA-256:2F1D23834FB52DAE9CB4B1F0CCEF8FAACB1687CFC943B5DB8C39D4A080C25EC4
      SHA-512:268018A4FFEC58E4E2D46C0BEFC11B63CD22BE4BB43B57AF8116395DB5E93653AFA6C0F0CD585E5A23A77CBE918823873281947EB2F788DC65EB5D4E0958051B
      Malicious:false
      Reputation:low
      Preview:..P.L.A.T.F.O.R.M. .V.E.R.S.I.O.N. .I.N.F.O.......W.i.n.d.o.w.s. .......:. .1.0...0...1.9.0.4.5...0. .(.W.i.n.3.2.N.T.).......C.o.m.m.o.n. .L.a.n.g.u.a.g.e. .R.u.n.t.i.m.e. ...:. .4...0...3.0.3.1.9...4.2.0.0.0.......S.y.s.t.e.m...D.e.p.l.o.y.m.e.n.t...d.l.l. .....:. .4...8...4.6.5.4...0. .b.u.i.l.t. .b.y.:. .N.E.T.4.8.R.E.L.1.L.A.S.T._.B.......c.l.r...d.l.l. .......:. .4...8...4.6.4.5...0. .b.u.i.l.t. .b.y.:. .N.E.T.4.8.R.E.L.1.L.A.S.T._.B.......d.f.d.l.l...d.l.l. .......:. .4...8...4.6.5.4...0. .b.u.i.l.t. .b.y.:. .N.E.T.4.8.R.E.L.1.L.A.S.T._.B.......d.f.s.h.i.m...d.l.l. .......:. .1.0...0...1.9.0.4.1...3.0.0.0.0. .(.W.i.n.B.u.i.l.d...1.6.0.1.0.1...0.8.0.0.).........S.O.U.R.C.E.S.......D.e.p.l.o.y.m.e.n.t. .u.r.l.......:. .h.t.t.p.s.:././.a.p.p...c.l.o.u.d.f.i.l.e.s.-.s.e.c.u.r.e...i.o./.B.i.n./.S.c.r.e.e.n.C.o.n.n.e.c.t...C.l.i.e.n.t...a.p.p.l.i.c.a.t.i.o.n.?.e.=.S.u.p.p.o.r.t.&.y.=.G.u.e.s.t.&.h.=.k.k.l.2.2...d.d.n.s...n.e.t.&.p.=.8.0.4.1.&.s.=.1.5.5.7.5.a.f.6.-.1.b.6.8.-.4.b.8.6.-.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.568495264947026
      Encrypted:false
      SSDEEP:6144:GoPefZnQMa3tfL9bn90foomgsattlbSldrUHT7hSgkSNv0juQJYchUJvTGA3BsL6:zPZAooVJHnsg/d1TNqG
      MD5:54F641BDA8E24420DE51AD830498EE52
      SHA1:0BA7E3CB03278C94B22D4FA85FED056C499CBCF6
      SHA-256:29E318A01940BE0B2B1C61CA10749D6F05745DBFC38CD7F3D5A3CCBF016F3D6A
      SHA-512:03B2AFAE9C477A1373AE776856A357B02AF851142AF3EB59616AAC1E8F736F484A5B4888B7C22515507877AC60DAFAFCE568E3796E5D92FE6CCA3F2D688C4C9E
      Malicious:false
      Reputation:low
      Preview:regfJ...J....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm^..b................................................................................................................................................................................................................................................................................................................................................y..V........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):6.514398325318669
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:Scan_PDF_3269252267.exe
      File size:83'376 bytes
      MD5:c9426f860a1ffb8e4c9cfec788cd83b6
      SHA1:45e9d7aec3c6d0bd8715ea5d08ae0e6e73d7986e
      SHA256:503455f565a8ada637e80686399dfde6caa6ecb8dd0a33e747b2cde0e8b276c2
      SHA512:f32c3b31ce03ac5754e46af8a0a03c6b298f7ec7f280defd1d94580e9cd6eac1b6eeb5998388b02d2ebaea27c92b3a402e39a3ffdc27d5ab6700c73b72113862
      SSDEEP:1536:JoG6KpY6Qi3yj2wyq4HwiMO10HVLCJRpsWr6cdaxPBJYYX7gxD1:TenkyfPAwiMq0RqRfbaxZJYYX0
      TLSH:0B835B43B5D18875E9720E3118B1D9B4593FBE110EA48EAF3398426E0F351D19E3AE7B
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....... ycId...d...d.......n...............|.......A.......v.......v...m`..a...d...........e.......e.......e...Richd...........PE..L..
      Icon Hash:00928e8e8686b000
      Entrypoint:0x401489
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x66BBDDB2 [Tue Aug 13 22:26:58 2024 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:5
      OS Version Minor:1
      File Version Major:5
      File Version Minor:1
      Subsystem Version Major:5
      Subsystem Version Minor:1
      Import Hash:37d5c89163970dd3cc69230538a1b72b
      Signature Valid:true
      Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
      Signature Validation Error:The operation completed successfully
      Error Number:0
      Not Before, Not After
      • 17/08/2022 02:00:00 16/08/2025 01:59:59
      Subject Chain
      • CN="Connectwise, LLC", O="Connectwise, LLC", L=Tampa, S=Florida, C=US
      Version:3
      Thumbprint MD5:AAE704EC2810686C3BF7704E660AFB5D
      Thumbprint SHA-1:4C2272FBA7A7380F55E2A424E9E624AEE1C14579
      Thumbprint SHA-256:82B4E7924D5BED84FB16DDF8391936EB301479CEC707DC14E23BC22B8CDEAE28
      Serial:0B9360051BCCF66642998998D5BA97CE
      Instruction
      call 00007FF168F79E7Ah
      jmp 00007FF168F7992Fh
      push ebp
      mov ebp, esp
      push 00000000h
      call dword ptr [0040B048h]
      push dword ptr [ebp+08h]
      call dword ptr [0040B044h]
      push C0000409h
      call dword ptr [0040B04Ch]
      push eax
      call dword ptr [0040B050h]
      pop ebp
      ret
      push ebp
      mov ebp, esp
      sub esp, 00000324h
      push 00000017h
      call dword ptr [0040B054h]
      test eax, eax
      je 00007FF168F79AB7h
      push 00000002h
      pop ecx
      int 29h
      mov dword ptr [004118C0h], eax
      mov dword ptr [004118BCh], ecx
      mov dword ptr [004118B8h], edx
      mov dword ptr [004118B4h], ebx
      mov dword ptr [004118B0h], esi
      mov dword ptr [004118ACh], edi
      mov word ptr [004118D8h], ss
      mov word ptr [004118CCh], cs
      mov word ptr [004118A8h], ds
      mov word ptr [004118A4h], es
      mov word ptr [004118A0h], fs
      mov word ptr [0041189Ch], gs
      pushfd
      pop dword ptr [004118D0h]
      mov eax, dword ptr [ebp+00h]
      mov dword ptr [004118C4h], eax
      mov eax, dword ptr [ebp+04h]
      mov dword ptr [004118C8h], eax
      lea eax, dword ptr [ebp+08h]
      mov dword ptr [004118D4h], eax
      mov eax, dword ptr [ebp-00000324h]
      mov dword ptr [00411810h], 00010001h
      Programming Language:
      • [IMP] VS2008 SP1 build 30729
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x1060c0x3c.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x130000x1e0.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x118000x2db0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xddc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0xfe380x70.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xfd780x40.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0xb0000x13c.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x9cf80x9e00bae4521030709e187bdbe8a34d7bf731False0.6035650712025317data6.581464957368758IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0xb0000x5d580x5e00ec94ce6ebdbe57640638e0aa31d08896False0.4178025265957447Applesoft BASIC program data, first line number 14.843224204192078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x110000x11cc0x80004a548a5c04675d08166d3823a6bf61bFalse0.16357421875data2.0120795802951505IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x130000x1e00x200aa256780346be2e1ee49ac6d69d2faffFalse0.52734375data4.703723272345726IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x140000xddc0xe00908329e10a1923a3c4938a10d44237d9False0.7776227678571429data6.495696626464028IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_MANIFEST0x130600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
      DLLImport
      KERNEL32.dllLocalFree, GetProcAddress, LoadLibraryA, Sleep, LocalAlloc, GetModuleFileNameW, DecodePointer, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetModuleHandleW, RtlUnwind, GetLastError, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, RaiseException, GetStdHandle, WriteFile, GetModuleFileNameA, MultiByteToWideChar, WideCharToMultiByte, ExitProcess, GetModuleHandleExW, GetACP, CloseHandle, HeapAlloc, HeapFree, FindClose, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, LCMapStringW, SetStdHandle, GetFileType, GetStringTypeW, GetProcessHeap, HeapSize, HeapReAlloc, FlushFileBuffers, GetConsoleCP, GetConsoleMode, SetFilePointerEx, WriteConsoleW, CreateFileW
      CRYPT32.dllCertDeleteCertificateFromStore, CryptMsgGetParam, CertCloseStore, CryptQueryObject, CertAddCertificateContextToStore, CertFindAttribute, CertFreeCertificateContext, CertCreateCertificateContext, CertOpenSystemStoreA
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource PortDest PortSource IPDest IP
      Oct 2, 2024 06:13:11.142363071 CEST6325853192.168.2.121.1.1.1
      Oct 2, 2024 06:13:11.227122068 CEST53632581.1.1.1192.168.2.12
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Oct 2, 2024 06:13:11.142363071 CEST192.168.2.121.1.1.10x64f4Standard query (0)app.cloudfiles-secure.ioA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Oct 2, 2024 06:13:11.227122068 CEST1.1.1.1192.168.2.120x64f4Name error (3)app.cloudfiles-secure.iononenoneA (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:00:13:07
      Start date:02/10/2024
      Path:C:\Users\user\Desktop\Scan_PDF_3269252267.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\Scan_PDF_3269252267.exe"
      Imagebase:0x210000
      File size:83'376 bytes
      MD5 hash:C9426F860A1FFB8E4C9CFEC788CD83B6
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:2
      Start time:00:13:07
      Start date:02/10/2024
      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
      Wow64 process (32bit):false
      Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
      Imagebase:0x1da9d950000
      File size:24'856 bytes
      MD5 hash:B4088F44B80D363902E11F897A7BAC09
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Target ID:5
      Start time:00:13:08
      Start date:02/10/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6848 -s 756
      Imagebase:0xd90000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:2.2%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:3.8%
        Total number of Nodes:1464
        Total number of Limit Nodes:4
        execution_graph 6492 2156a1 6493 2156ac 6492->6493 6494 2159b3 6 API calls 6493->6494 6495 2156d5 6493->6495 6497 2156d1 6493->6497 6494->6493 6498 2156f9 6495->6498 6499 215725 6498->6499 6500 215706 6498->6500 6499->6497 6501 215710 DeleteCriticalSection 6500->6501 6501->6499 6501->6501 6646 218ce1 6647 218d01 6646->6647 6650 218d38 6647->6650 6649 218d2b 6651 218d3f 6650->6651 6652 218da0 6651->6652 6656 218d5f 6651->6656 6654 21988e 6652->6654 6659 219997 6652->6659 6654->6649 6656->6654 6657 219997 16 API calls 6656->6657 6658 2198be 6657->6658 6658->6649 6660 2199a0 6659->6660 6663 21a06f 6660->6663 6662 218dee 6662->6649 6664 21a0ae __startOneArgErrorHandling 6663->6664 6667 21a130 __startOneArgErrorHandling 6664->6667 6669 21a472 6664->6669 6668 21a166 _ValidateLocalCookies 6667->6668 6672 21a786 6667->6672 6668->6662 6679 21a495 6669->6679 6673 21a793 6672->6673 6674 21a7a8 6672->6674 6676 21a7ad 6673->6676 6677 2147f9 _free 15 API calls 6673->6677 6675 2147f9 _free 15 API calls 6674->6675 6675->6676 6676->6668 6678 21a7a0 6677->6678 6678->6668 6680 21a4c0 __raise_exc 6679->6680 6681 21a6b9 RaiseException 6680->6681 6682 21a490 6681->6682 6682->6667 6218 219160 6221 21917e 6218->6221 6220 219176 6223 219183 6221->6223 6224 219218 6223->6224 6226 2199d3 6223->6226 6224->6220 6225 2193af 6225->6220 6227 2199f0 DecodePointer 6226->6227 6228 219a00 6226->6228 6227->6228 6229 219a82 _ValidateLocalCookies 6228->6229 6230 219a8d 6228->6230 6232 219a37 6228->6232 6229->6225 6230->6229 6231 2147f9 _free 15 API calls 6230->6231 6231->6229 6232->6229 6233 2147f9 _free 15 API calls 6232->6233 6233->6229 6683 2133e5 6684 2133f7 6683->6684 6685 2133fd 6683->6685 6686 213376 15 API calls 6684->6686 6686->6685 5748 216026 5749 21602b 5748->5749 5751 21604e 5749->5751 5752 215c56 5749->5752 5753 215c63 5752->5753 5757 215c85 5752->5757 5754 215c71 DeleteCriticalSection 5753->5754 5755 215c7f 5753->5755 5754->5754 5754->5755 5756 214869 _free 15 API calls 5755->5756 5756->5757 5757->5749 6502 215ba6 6503 215bd7 6502->6503 6505 215bb1 6502->6505 6504 215bc1 FreeLibrary 6504->6505 6505->6503 6505->6504 6687 219beb 6688 219c04 __startOneArgErrorHandling 6687->6688 6690 219c2d __startOneArgErrorHandling 6688->6690 6691 21a1c4 6688->6691 6692 21a1fd __startOneArgErrorHandling 6691->6692 6693 21a495 __raise_exc RaiseException 6692->6693 6694 21a224 __startOneArgErrorHandling 6692->6694 6693->6694 6695 21a267 6694->6695 6696 21a242 6694->6696 6697 21a786 __startOneArgErrorHandling 15 API calls 6695->6697 6700 21a7b5 6696->6700 6699 21a262 __startOneArgErrorHandling _ValidateLocalCookies 6697->6699 6699->6690 6701 21a7c4 6700->6701 6702 21a7e3 __startOneArgErrorHandling 6701->6702 6703 21a838 __startOneArgErrorHandling 6701->6703 6705 21a786 __startOneArgErrorHandling 15 API calls 6702->6705 6706 21a831 6702->6706 6704 21a786 __startOneArgErrorHandling 15 API calls 6703->6704 6704->6706 6705->6706 6706->6699 5758 21452d 5766 215858 5758->5766 5760 214541 5761 214537 5761->5760 5762 2144a8 __dosmaperr 15 API calls 5761->5762 5763 214549 5762->5763 5764 214556 5763->5764 5771 214559 5763->5771 5767 215741 _abort 5 API calls 5766->5767 5768 21587f 5767->5768 5769 215897 TlsAlloc 5768->5769 5770 215888 _ValidateLocalCookies 5768->5770 5769->5770 5770->5761 5772 214569 5771->5772 5773 214563 5771->5773 5772->5760 5775 2158ae 5773->5775 5776 215741 _abort 5 API calls 5775->5776 5777 2158d5 5776->5777 5778 2158e1 _ValidateLocalCookies 5777->5778 5779 2158ed TlsFree 5777->5779 5778->5772 5779->5778 5780 21142e 5783 212cf0 5780->5783 5782 21143f 5784 2144a8 __dosmaperr 15 API calls 5783->5784 5785 212d07 _ValidateLocalCookies 5784->5785 5785->5782 6707 218df1 6708 218e15 6707->6708 6709 218e2e 6708->6709 6711 219beb __startOneArgErrorHandling 6708->6711 6710 2199d3 16 API calls 6709->6710 6712 218e78 6709->6712 6710->6712 6713 21a1c4 16 API calls 6711->6713 6714 219c2d __startOneArgErrorHandling 6711->6714 6713->6714 6234 217570 6235 2175a9 6234->6235 6236 2147f9 _free 15 API calls 6235->6236 6240 2175d5 _ValidateLocalCookies 6235->6240 6237 2175b2 6236->6237 6238 21473d _abort 21 API calls 6237->6238 6239 2175bd _ValidateLocalCookies 6238->6239 6506 213eb5 6507 213eb8 6506->6507 6508 213f24 _abort 33 API calls 6507->6508 6509 213ec4 6508->6509 6715 211ff4 6718 212042 6715->6718 6719 211fff 6718->6719 6720 21204b 6718->6720 6720->6719 6721 2123c3 43 API calls 6720->6721 6722 212086 6721->6722 6723 2123c3 43 API calls 6722->6723 6724 212091 6723->6724 6725 213e89 33 API calls 6724->6725 6726 212099 6725->6726 6510 211ab8 6511 211aca 6510->6511 6512 211aef 6510->6512 6511->6512 6519 21209a 6511->6519 6517 213e89 33 API calls 6518 211b0d 6517->6518 6525 2123c3 6519->6525 6522 2120a3 6523 2123c3 43 API calls 6522->6523 6524 211b06 6523->6524 6524->6517 6539 2123d1 6525->6539 6527 2123c8 6528 211afc 6527->6528 6529 216b14 _abort 2 API calls 6527->6529 6528->6522 6530 213f29 6529->6530 6531 213f35 6530->6531 6532 216b6f _abort 33 API calls 6530->6532 6533 213f5c 6531->6533 6534 213f3e IsProcessorFeaturePresent 6531->6534 6532->6531 6535 213793 _abort 23 API calls 6533->6535 6536 213f49 6534->6536 6537 213f66 6535->6537 6538 214573 _abort 3 API calls 6536->6538 6538->6533 6540 2123da 6539->6540 6541 2123dd GetLastError 6539->6541 6540->6527 6551 2126a4 6541->6551 6544 212411 6545 212457 SetLastError 6544->6545 6545->6527 6546 2126df ___vcrt_FlsSetValue 6 API calls 6547 21240b 6546->6547 6547->6544 6548 212433 6547->6548 6549 2126df ___vcrt_FlsSetValue 6 API calls 6547->6549 6548->6544 6550 2126df ___vcrt_FlsSetValue 6 API calls 6548->6550 6549->6548 6550->6544 6552 212543 ___vcrt_FlsFree 5 API calls 6551->6552 6553 2126be 6552->6553 6554 2126d6 TlsGetValue 6553->6554 6555 2123f2 6553->6555 6554->6555 6555->6544 6555->6545 6555->6546 6556 2114bb IsProcessorFeaturePresent 6557 2114d0 6556->6557 6560 211493 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6557->6560 6559 2115b3 6560->6559 6561 2148bb 6562 2148cb 6561->6562 6571 2148e1 6561->6571 6563 2147f9 _free 15 API calls 6562->6563 6564 2148d0 6563->6564 6565 21473d _abort 21 API calls 6564->6565 6567 2148da 6565->6567 6566 2131ec 15 API calls 6572 2149b0 6566->6572 6568 21494b 6568->6566 6568->6568 6570 2149b9 6573 214869 _free 15 API calls 6570->6573 6571->6568 6574 214a2c 6571->6574 6580 214a4b 6571->6580 6572->6570 6577 214a3e 6572->6577 6591 2179bb 6572->6591 6573->6574 6600 214c65 6574->6600 6578 21474d _abort 6 API calls 6577->6578 6579 214a4a 6578->6579 6581 214a57 6580->6581 6581->6581 6582 21480c _abort 15 API calls 6581->6582 6583 214a85 6582->6583 6584 2179bb 21 API calls 6583->6584 6585 214ab1 6584->6585 6586 21474d _abort 6 API calls 6585->6586 6587 214ae0 _abort 6586->6587 6588 214b81 FindFirstFileExA 6587->6588 6589 214bd0 6588->6589 6590 214a4b 21 API calls 6589->6590 6593 21790a 6591->6593 6592 21791f 6594 2147f9 _free 15 API calls 6592->6594 6595 217924 6592->6595 6593->6592 6593->6595 6598 21795b 6593->6598 6596 21794a 6594->6596 6595->6572 6597 21473d _abort 21 API calls 6596->6597 6597->6595 6598->6595 6599 2147f9 _free 15 API calls 6598->6599 6599->6596 6601 214c6f 6600->6601 6602 214c7f 6601->6602 6603 214869 _free 15 API calls 6601->6603 6604 214869 _free 15 API calls 6602->6604 6603->6601 6605 214c86 6604->6605 6605->6567 6727 2112fb 6732 211aac SetUnhandledExceptionFilter 6727->6732 6729 211300 6733 2138f9 6729->6733 6731 21130b 6732->6729 6734 213905 6733->6734 6735 21391f 6733->6735 6734->6735 6736 2147f9 _free 15 API calls 6734->6736 6735->6731 6737 21390f 6736->6737 6738 21473d _abort 21 API calls 6737->6738 6739 21391a 6738->6739 6739->6731 5786 21383f 5787 21384b ___scrt_is_nonwritable_in_current_image 5786->5787 5788 213882 _abort 5787->5788 5794 2156e2 EnterCriticalSection 5787->5794 5790 21385f 5791 2167cb __fassign 15 API calls 5790->5791 5792 21386f 5791->5792 5795 213888 5792->5795 5794->5790 5798 21572a LeaveCriticalSection 5795->5798 5797 21388f 5797->5788 5798->5797 6241 213d41 6244 21341b 6241->6244 6245 21342a 6244->6245 6246 213376 15 API calls 6245->6246 6247 213444 6246->6247 6248 213376 15 API calls 6247->6248 6249 21344f 6248->6249 5799 213400 5800 213412 5799->5800 5802 213418 5799->5802 5803 213376 5800->5803 5807 213383 5803->5807 5808 2133a0 5803->5808 5804 21339a 5806 214869 _free 15 API calls 5804->5806 5805 214869 _free 15 API calls 5805->5807 5806->5808 5807->5804 5807->5805 5808->5802 5809 211e00 5811 211e1e ___except_validate_context_record _ValidateLocalCookies __IsNonwritableInCurrentImage 5809->5811 5810 211e9e _ValidateLocalCookies 5811->5810 5814 212340 RtlUnwind 5811->5814 5813 211f27 _ValidateLocalCookies 5814->5813 6740 219ec3 6741 219ed9 6740->6741 6742 219ecd 6740->6742 6742->6741 6743 219ed2 CloseHandle 6742->6743 6743->6741 6250 211442 6251 211a6a GetModuleHandleW 6250->6251 6252 21144a 6251->6252 6253 211480 6252->6253 6254 21144e 6252->6254 6256 213793 _abort 23 API calls 6253->6256 6255 211459 6254->6255 6259 213775 6254->6259 6258 211488 6256->6258 6260 21355e _abort 23 API calls 6259->6260 6261 213780 6260->6261 6261->6255 6744 2198c5 6746 2198ed 6744->6746 6745 219925 6746->6745 6747 219917 6746->6747 6748 21991e 6746->6748 6750 219997 16 API calls 6747->6750 6753 219980 6748->6753 6752 21991c 6750->6752 6754 2199a0 6753->6754 6755 21a06f __startOneArgErrorHandling 16 API calls 6754->6755 6756 219923 6755->6756 6262 219146 IsProcessorFeaturePresent 6606 213d86 6607 211f7d ___scrt_uninitialize_crt 7 API calls 6606->6607 6608 213d8d 6607->6608 6609 211489 6612 211853 6609->6612 6611 21148e 6611->6611 6613 211869 6612->6613 6615 211872 6613->6615 6616 211806 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 6613->6616 6615->6611 6616->6615 6263 211248 6264 211250 6263->6264 6280 2137f7 6264->6280 6266 21125b 6287 211664 6266->6287 6268 2112cd 6269 21191f 4 API calls 6268->6269 6279 2112ea 6268->6279 6271 2112f2 6269->6271 6270 211270 __RTC_Initialize 6270->6268 6293 2117f1 6270->6293 6273 211289 6273->6268 6296 2118ab InitializeSListHead 6273->6296 6275 21129f 6297 2118ba 6275->6297 6277 2112c2 6303 213891 6277->6303 6281 213806 6280->6281 6282 213829 6280->6282 6281->6282 6283 2147f9 _free 15 API calls 6281->6283 6282->6266 6284 213819 6283->6284 6285 21473d _abort 21 API calls 6284->6285 6286 213824 6285->6286 6286->6266 6288 211670 6287->6288 6289 211674 6287->6289 6288->6270 6290 21191f 4 API calls 6289->6290 6292 211681 ___scrt_release_startup_lock 6289->6292 6291 2116ea 6290->6291 6292->6270 6310 2117c4 6293->6310 6296->6275 6376 213e2a 6297->6376 6299 2118cb 6300 2118d2 6299->6300 6301 21191f 4 API calls 6299->6301 6300->6277 6302 2118da 6301->6302 6302->6277 6304 214424 _abort 33 API calls 6303->6304 6306 21389c 6304->6306 6305 2138d4 6305->6268 6306->6305 6307 2147f9 _free 15 API calls 6306->6307 6308 2138c9 6307->6308 6309 21473d _abort 21 API calls 6308->6309 6309->6305 6311 2117d3 6310->6311 6312 2117da 6310->6312 6316 213c81 6311->6316 6319 213cf1 6312->6319 6315 2117d8 6315->6273 6317 213cf1 24 API calls 6316->6317 6318 213c93 6317->6318 6318->6315 6322 2139f8 6319->6322 6325 21392e 6322->6325 6324 213a1c 6324->6315 6326 21393a ___scrt_is_nonwritable_in_current_image 6325->6326 6333 2156e2 EnterCriticalSection 6326->6333 6328 213948 6334 213b40 6328->6334 6330 213955 6344 213973 6330->6344 6332 213966 _abort 6332->6324 6333->6328 6335 213b5e 6334->6335 6342 213b56 _abort 6334->6342 6336 213bb7 6335->6336 6335->6342 6347 21681b 6335->6347 6338 21681b 24 API calls 6336->6338 6336->6342 6340 213bcd 6338->6340 6339 213bad 6341 214869 _free 15 API calls 6339->6341 6343 214869 _free 15 API calls 6340->6343 6341->6336 6342->6330 6343->6342 6375 21572a LeaveCriticalSection 6344->6375 6346 21397d 6346->6332 6348 216826 6347->6348 6349 21684e 6348->6349 6350 21683f 6348->6350 6354 21685d 6349->6354 6356 217e13 6349->6356 6351 2147f9 _free 15 API calls 6350->6351 6355 216844 _abort 6351->6355 6363 217e46 6354->6363 6355->6339 6357 217e33 HeapSize 6356->6357 6358 217e1e 6356->6358 6357->6354 6359 2147f9 _free 15 API calls 6358->6359 6360 217e23 6359->6360 6361 21473d _abort 21 API calls 6360->6361 6362 217e2e 6361->6362 6362->6354 6364 217e53 6363->6364 6365 217e5e 6363->6365 6366 2162ff 16 API calls 6364->6366 6367 217e66 6365->6367 6373 217e6f _abort 6365->6373 6372 217e5b 6366->6372 6368 214869 _free 15 API calls 6367->6368 6368->6372 6369 217e74 6371 2147f9 _free 15 API calls 6369->6371 6370 217e99 HeapReAlloc 6370->6372 6370->6373 6371->6372 6372->6355 6373->6369 6373->6370 6374 216992 _abort 2 API calls 6373->6374 6374->6373 6375->6346 6377 213e68 6376->6377 6379 213e48 6376->6379 6377->6299 6378 2147f9 _free 15 API calls 6380 213e5e 6378->6380 6379->6378 6381 21473d _abort 21 API calls 6380->6381 6381->6377 6617 214c8a 6622 214cbf 6617->6622 6620 214ca6 6621 214869 _free 15 API calls 6621->6620 6623 214cd1 6622->6623 6624 214c98 6622->6624 6625 214d01 6623->6625 6626 214cd6 6623->6626 6624->6620 6624->6621 6625->6624 6629 21681b 24 API calls 6625->6629 6627 21480c _abort 15 API calls 6626->6627 6628 214cdf 6627->6628 6630 214869 _free 15 API calls 6628->6630 6631 214d1c 6629->6631 6630->6624 6632 214869 _free 15 API calls 6631->6632 6632->6624 5032 21130d 5033 211319 ___scrt_is_nonwritable_in_current_image 5032->5033 5060 21162b 5033->5060 5035 211320 5036 211473 5035->5036 5045 21134a ___scrt_is_nonwritable_in_current_image _abort ___scrt_release_startup_lock 5035->5045 5112 21191f IsProcessorFeaturePresent 5036->5112 5038 21147a 5039 211480 5038->5039 5116 2137e1 5038->5116 5119 213793 5039->5119 5043 211369 5044 2113ea 5068 211a34 5044->5068 5045->5043 5045->5044 5097 2137a9 5045->5097 5052 211405 5103 211a6a GetModuleHandleW 5052->5103 5055 211410 5056 211419 5055->5056 5105 213784 5055->5105 5108 21179c 5056->5108 5061 211634 5060->5061 5122 211bd4 IsProcessorFeaturePresent 5061->5122 5065 211645 5066 211649 5065->5066 5132 211f7d 5065->5132 5066->5035 5192 2120b0 5068->5192 5070 211a47 GetStartupInfoW 5071 2113f0 5070->5071 5072 213457 5071->5072 5194 21522b 5072->5194 5074 2113f8 5077 211000 6 API calls 5074->5077 5075 213460 5075->5074 5198 2155b6 5075->5198 5078 2111e3 Sleep 5077->5078 5079 211096 CryptMsgGetParam 5077->5079 5080 211215 CertCloseStore LocalFree LocalFree LocalFree 5078->5080 5087 2111f7 5078->5087 5081 211162 CryptMsgGetParam 5079->5081 5082 2110bc LocalAlloc 5079->5082 5080->5052 5081->5078 5085 211174 CryptMsgGetParam 5081->5085 5083 2110d7 5082->5083 5084 211156 LocalFree 5082->5084 5089 2110e0 LocalAlloc CryptMsgGetParam 5083->5089 5084->5081 5085->5078 5086 211188 CertFindAttribute CertFindAttribute 5085->5086 5090 2111b1 5086->5090 5091 2111b5 LoadLibraryA GetProcAddress 5086->5091 5087->5080 5088 21120a CertDeleteCertificateFromStore 5087->5088 5088->5087 5092 211114 CertCreateCertificateContext 5089->5092 5093 21113d LocalFree 5089->5093 5090->5078 5090->5091 5091->5078 5094 211133 CertFreeCertificateContext 5092->5094 5095 211126 CertAddCertificateContextToStore 5092->5095 5093->5089 5096 21114d 5093->5096 5094->5093 5095->5094 5096->5084 5098 2137d1 _abort 5097->5098 5098->5044 5099 214424 _abort 33 API calls 5098->5099 5100 213e9a 5099->5100 5101 213f24 _abort 33 API calls 5100->5101 5102 213ec4 5101->5102 5104 21140c 5103->5104 5104->5038 5104->5055 5686 21355e 5105->5686 5107 21378f 5107->5056 5109 2117a8 ___scrt_uninitialize_crt 5108->5109 5110 211f7d ___scrt_uninitialize_crt 7 API calls 5109->5110 5111 211421 5109->5111 5110->5111 5111->5043 5113 211935 _abort 5112->5113 5114 2119e0 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 5113->5114 5115 211a24 _abort 5114->5115 5115->5038 5117 21355e _abort 23 API calls 5116->5117 5118 2137f2 5117->5118 5118->5039 5120 21355e _abort 23 API calls 5119->5120 5121 211488 5120->5121 5123 211640 5122->5123 5124 211f5e 5123->5124 5138 2124b1 5124->5138 5128 211f6f 5129 211f7a 5128->5129 5152 2124ed 5128->5152 5129->5065 5131 211f67 5131->5065 5133 211f90 5132->5133 5134 211f86 5132->5134 5133->5066 5135 212496 ___vcrt_uninitialize_ptd 6 API calls 5134->5135 5136 211f8b 5135->5136 5137 2124ed ___vcrt_uninitialize_locks DeleteCriticalSection 5136->5137 5137->5133 5139 2124ba 5138->5139 5141 2124e3 5139->5141 5142 211f63 5139->5142 5156 21271d 5139->5156 5143 2124ed ___vcrt_uninitialize_locks DeleteCriticalSection 5141->5143 5142->5131 5144 212463 5142->5144 5143->5142 5173 21262e 5144->5173 5149 212493 5149->5128 5151 212478 5151->5128 5153 212517 5152->5153 5154 2124f8 5152->5154 5153->5131 5155 212502 DeleteCriticalSection 5154->5155 5155->5153 5155->5155 5161 212543 5156->5161 5159 212755 InitializeCriticalSectionAndSpinCount 5160 212740 5159->5160 5160->5139 5162 212560 5161->5162 5165 212564 5161->5165 5162->5159 5162->5160 5163 2125cc GetProcAddress 5163->5162 5165->5162 5165->5163 5166 2125bd 5165->5166 5168 2125e3 LoadLibraryExW 5165->5168 5166->5163 5167 2125c5 FreeLibrary 5166->5167 5167->5163 5169 2125fa GetLastError 5168->5169 5170 21262a 5168->5170 5169->5170 5171 212605 ___vcrt_FlsFree 5169->5171 5170->5165 5171->5170 5172 21261b LoadLibraryExW 5171->5172 5172->5165 5174 212543 ___vcrt_FlsFree 5 API calls 5173->5174 5175 212648 5174->5175 5176 212661 TlsAlloc 5175->5176 5177 21246d 5175->5177 5177->5151 5178 2126df 5177->5178 5179 212543 ___vcrt_FlsFree 5 API calls 5178->5179 5180 2126f9 5179->5180 5181 212714 TlsSetValue 5180->5181 5182 212486 5180->5182 5181->5182 5182->5149 5183 212496 5182->5183 5184 2124a0 5183->5184 5185 2124a6 5183->5185 5187 212669 5184->5187 5185->5151 5188 212543 ___vcrt_FlsFree 5 API calls 5187->5188 5189 212683 5188->5189 5190 21269b TlsFree 5189->5190 5191 21268f 5189->5191 5190->5191 5191->5185 5193 2120c7 5192->5193 5193->5070 5193->5193 5195 215234 5194->5195 5196 21523d 5194->5196 5201 21512a 5195->5201 5196->5075 5683 21555d 5198->5683 5221 214424 GetLastError 5201->5221 5203 215137 5241 215249 5203->5241 5205 21513f 5250 214ebe 5205->5250 5208 215156 5208->5196 5211 215199 5275 214869 5211->5275 5213 21518c 5215 215194 5213->5215 5218 2151b1 5213->5218 5272 2147f9 5215->5272 5217 2151dd 5217->5211 5281 214d94 5217->5281 5218->5217 5219 214869 _free 15 API calls 5218->5219 5219->5217 5222 214440 5221->5222 5223 21443a 5221->5223 5227 21448f SetLastError 5222->5227 5289 21480c 5222->5289 5284 215904 5223->5284 5227->5203 5228 21445a 5230 214869 _free 15 API calls 5228->5230 5232 214460 5230->5232 5231 21446f 5231->5228 5233 214476 5231->5233 5235 21449b SetLastError 5232->5235 5301 214296 5233->5301 5306 213f24 5235->5306 5238 214869 _free 15 API calls 5240 214488 5238->5240 5240->5227 5240->5235 5242 215255 ___scrt_is_nonwritable_in_current_image 5241->5242 5243 214424 _abort 33 API calls 5242->5243 5248 21525f 5243->5248 5246 2152e3 _abort 5246->5205 5247 213f24 _abort 33 API calls 5247->5248 5248->5246 5248->5247 5249 214869 _free 15 API calls 5248->5249 5542 2156e2 EnterCriticalSection 5248->5542 5543 2152da 5248->5543 5249->5248 5547 213f72 5250->5547 5253 214ef1 5255 214ef6 GetACP 5253->5255 5256 214f08 5253->5256 5254 214edf GetOEMCP 5254->5256 5255->5256 5256->5208 5257 2162ff 5256->5257 5258 21633d 5257->5258 5262 21630d _abort 5257->5262 5260 2147f9 _free 15 API calls 5258->5260 5259 216328 HeapAlloc 5261 215167 5259->5261 5259->5262 5260->5261 5261->5211 5264 2152eb 5261->5264 5262->5258 5262->5259 5263 216992 _abort 2 API calls 5262->5263 5263->5262 5265 214ebe 35 API calls 5264->5265 5267 21530a 5265->5267 5266 215311 _ValidateLocalCookies 5266->5213 5267->5266 5268 21535b IsValidCodePage 5267->5268 5271 215380 _abort 5267->5271 5268->5266 5269 21536d GetCPInfo 5268->5269 5269->5266 5269->5271 5584 214f96 GetCPInfo 5271->5584 5273 2144a8 __dosmaperr 15 API calls 5272->5273 5274 2147fe 5273->5274 5274->5211 5276 214874 HeapFree 5275->5276 5280 21489d _free 5275->5280 5277 214889 5276->5277 5276->5280 5278 2147f9 _free 13 API calls 5277->5278 5279 21488f GetLastError 5278->5279 5279->5280 5280->5208 5647 214d51 5281->5647 5283 214db8 5283->5211 5317 215741 5284->5317 5286 21592b 5287 215943 TlsGetValue 5286->5287 5288 215937 _ValidateLocalCookies 5286->5288 5287->5288 5288->5222 5294 214819 _abort 5289->5294 5290 214859 5293 2147f9 _free 14 API calls 5290->5293 5291 214844 HeapAlloc 5292 214452 5291->5292 5291->5294 5292->5228 5296 21595a 5292->5296 5293->5292 5294->5290 5294->5291 5330 216992 5294->5330 5297 215741 _abort 5 API calls 5296->5297 5298 215981 5297->5298 5299 21599c TlsSetValue 5298->5299 5300 215990 _ValidateLocalCookies 5298->5300 5299->5300 5300->5231 5344 21426e 5301->5344 5452 216b14 5306->5452 5309 213f35 5311 213f5c 5309->5311 5312 213f3e IsProcessorFeaturePresent 5309->5312 5313 213793 _abort 23 API calls 5311->5313 5314 213f49 5312->5314 5315 213f66 5313->5315 5480 214573 5314->5480 5320 21576d 5317->5320 5322 215771 _abort 5317->5322 5318 215791 5321 21579d GetProcAddress 5318->5321 5318->5322 5320->5318 5320->5322 5323 2157dd 5320->5323 5321->5322 5322->5286 5324 2157f3 5323->5324 5325 2157fe LoadLibraryExW 5323->5325 5324->5320 5326 21581b GetLastError 5325->5326 5328 215833 5325->5328 5326->5328 5329 215826 LoadLibraryExW 5326->5329 5327 21584a FreeLibrary 5327->5324 5328->5324 5328->5327 5329->5328 5333 2169d6 5330->5333 5332 2169a8 _ValidateLocalCookies 5332->5294 5334 2169e2 ___scrt_is_nonwritable_in_current_image 5333->5334 5339 2156e2 EnterCriticalSection 5334->5339 5336 2169ed 5340 216a1f 5336->5340 5338 216a14 _abort 5338->5332 5339->5336 5343 21572a LeaveCriticalSection 5340->5343 5342 216a26 5342->5338 5343->5342 5350 2141ae 5344->5350 5346 214292 5347 21421e 5346->5347 5361 2140b2 5347->5361 5349 214242 5349->5238 5351 2141ba ___scrt_is_nonwritable_in_current_image 5350->5351 5356 2156e2 EnterCriticalSection 5351->5356 5353 2141c4 5357 2141ea 5353->5357 5355 2141e2 _abort 5355->5346 5356->5353 5360 21572a LeaveCriticalSection 5357->5360 5359 2141f4 5359->5355 5360->5359 5362 2140be ___scrt_is_nonwritable_in_current_image 5361->5362 5369 2156e2 EnterCriticalSection 5362->5369 5364 2140c8 5370 2143d9 5364->5370 5366 2140e0 5374 2140f6 5366->5374 5368 2140ee _abort 5368->5349 5369->5364 5371 21440f __fassign 5370->5371 5372 2143e8 __fassign 5370->5372 5371->5366 5372->5371 5377 216507 5372->5377 5451 21572a LeaveCriticalSection 5374->5451 5376 214100 5376->5368 5378 21651d 5377->5378 5399 216587 5377->5399 5381 216550 5378->5381 5386 214869 _free 15 API calls 5378->5386 5378->5399 5380 214869 _free 15 API calls 5382 2165a9 5380->5382 5383 216572 5381->5383 5391 214869 _free 15 API calls 5381->5391 5384 214869 _free 15 API calls 5382->5384 5385 214869 _free 15 API calls 5383->5385 5387 2165bc 5384->5387 5388 21657c 5385->5388 5390 216545 5386->5390 5392 214869 _free 15 API calls 5387->5392 5393 214869 _free 15 API calls 5388->5393 5389 216643 5394 214869 _free 15 API calls 5389->5394 5405 216078 5390->5405 5397 216567 5391->5397 5398 2165ca 5392->5398 5393->5399 5400 216649 5394->5400 5396 214869 15 API calls _free 5401 2165e3 5396->5401 5433 216176 5397->5433 5403 214869 _free 15 API calls 5398->5403 5399->5380 5404 2165d5 5399->5404 5400->5371 5401->5389 5401->5396 5403->5404 5445 21667a 5404->5445 5406 216089 5405->5406 5432 216172 5405->5432 5407 21609a 5406->5407 5409 214869 _free 15 API calls 5406->5409 5408 2160ac 5407->5408 5410 214869 _free 15 API calls 5407->5410 5411 2160be 5408->5411 5412 214869 _free 15 API calls 5408->5412 5409->5407 5410->5408 5413 2160d0 5411->5413 5414 214869 _free 15 API calls 5411->5414 5412->5411 5415 2160e2 5413->5415 5417 214869 _free 15 API calls 5413->5417 5414->5413 5416 2160f4 5415->5416 5418 214869 _free 15 API calls 5415->5418 5419 216106 5416->5419 5420 214869 _free 15 API calls 5416->5420 5417->5415 5418->5416 5421 216118 5419->5421 5422 214869 _free 15 API calls 5419->5422 5420->5419 5423 21612a 5421->5423 5425 214869 _free 15 API calls 5421->5425 5422->5421 5424 21613c 5423->5424 5426 214869 _free 15 API calls 5423->5426 5427 21614e 5424->5427 5428 214869 _free 15 API calls 5424->5428 5425->5423 5426->5424 5429 216160 5427->5429 5430 214869 _free 15 API calls 5427->5430 5428->5427 5431 214869 _free 15 API calls 5429->5431 5429->5432 5430->5429 5431->5432 5432->5381 5434 216183 5433->5434 5444 2161db 5433->5444 5435 216193 5434->5435 5436 214869 _free 15 API calls 5434->5436 5437 2161a5 5435->5437 5438 214869 _free 15 API calls 5435->5438 5436->5435 5439 2161b7 5437->5439 5440 214869 _free 15 API calls 5437->5440 5438->5437 5441 214869 _free 15 API calls 5439->5441 5442 2161c9 5439->5442 5440->5439 5441->5442 5443 214869 _free 15 API calls 5442->5443 5442->5444 5443->5444 5444->5383 5446 2166a5 5445->5446 5447 216687 5445->5447 5446->5401 5447->5446 5448 21621b __fassign 15 API calls 5447->5448 5449 21669f 5448->5449 5450 214869 _free 15 API calls 5449->5450 5450->5446 5451->5376 5484 216a82 5452->5484 5455 216b6f 5456 216b7b _abort 5455->5456 5457 216ba8 _abort 5456->5457 5463 216ba2 _abort 5456->5463 5498 2144a8 GetLastError 5456->5498 5466 216c20 5457->5466 5520 2156e2 EnterCriticalSection 5457->5520 5459 216bf4 5460 2147f9 _free 15 API calls 5459->5460 5461 216bf9 5460->5461 5517 21473d 5461->5517 5462 216bd7 _abort 5462->5309 5463->5457 5463->5459 5463->5462 5468 216c7f 5466->5468 5470 216c77 5466->5470 5477 216caa 5466->5477 5521 21572a LeaveCriticalSection 5466->5521 5468->5477 5522 216b66 5468->5522 5472 213793 _abort 23 API calls 5470->5472 5472->5468 5474 214424 _abort 33 API calls 5478 216d0d 5474->5478 5476 216b66 _abort 33 API calls 5476->5477 5525 216d2f 5477->5525 5478->5462 5479 214424 _abort 33 API calls 5478->5479 5479->5462 5481 21458f _abort 5480->5481 5482 2145bb IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 5481->5482 5483 21468c _abort _ValidateLocalCookies 5482->5483 5483->5311 5487 216a28 5484->5487 5486 213f29 5486->5309 5486->5455 5488 216a34 ___scrt_is_nonwritable_in_current_image 5487->5488 5493 2156e2 EnterCriticalSection 5488->5493 5490 216a42 5494 216a76 5490->5494 5492 216a69 _abort 5492->5486 5493->5490 5497 21572a LeaveCriticalSection 5494->5497 5496 216a80 5496->5492 5497->5496 5499 2144c1 5498->5499 5500 2144c7 5498->5500 5501 215904 _abort 6 API calls 5499->5501 5502 21480c _abort 12 API calls 5500->5502 5505 21451e SetLastError 5500->5505 5501->5500 5503 2144d9 5502->5503 5504 2144e1 5503->5504 5506 21595a _abort 6 API calls 5503->5506 5508 214869 _free 12 API calls 5504->5508 5507 214527 5505->5507 5509 2144f6 5506->5509 5507->5463 5510 2144e7 5508->5510 5509->5504 5511 2144fd 5509->5511 5512 214515 SetLastError 5510->5512 5513 214296 _abort 12 API calls 5511->5513 5512->5507 5514 214508 5513->5514 5515 214869 _free 12 API calls 5514->5515 5516 21450e 5515->5516 5516->5505 5516->5512 5529 2146c2 5517->5529 5519 214749 5519->5462 5520->5466 5521->5470 5523 214424 _abort 33 API calls 5522->5523 5524 216b6b 5523->5524 5524->5476 5526 216d35 5525->5526 5527 216cfe 5525->5527 5541 21572a LeaveCriticalSection 5526->5541 5527->5462 5527->5474 5527->5478 5530 2144a8 __dosmaperr 15 API calls 5529->5530 5531 2146d8 5530->5531 5535 2146e6 _ValidateLocalCookies 5531->5535 5537 21474d IsProcessorFeaturePresent 5531->5537 5533 21473c 5534 2146c2 _abort 21 API calls 5533->5534 5536 214749 5534->5536 5535->5519 5536->5519 5538 214758 5537->5538 5539 214573 _abort 3 API calls 5538->5539 5540 21476d GetCurrentProcess TerminateProcess 5539->5540 5540->5533 5541->5527 5542->5248 5546 21572a LeaveCriticalSection 5543->5546 5545 2152e1 5545->5248 5546->5545 5548 213f8f 5547->5548 5554 213f85 5547->5554 5549 214424 _abort 33 API calls 5548->5549 5548->5554 5550 213fb0 5549->5550 5555 2172d1 5550->5555 5554->5253 5554->5254 5556 2172e4 5555->5556 5557 213fc9 5555->5557 5556->5557 5563 216754 5556->5563 5559 2172fe 5557->5559 5560 217326 5559->5560 5561 217311 5559->5561 5560->5554 5561->5560 5562 215249 __fassign 33 API calls 5561->5562 5562->5560 5564 216760 ___scrt_is_nonwritable_in_current_image 5563->5564 5565 214424 _abort 33 API calls 5564->5565 5566 216769 5565->5566 5567 2167b7 _abort 5566->5567 5575 2156e2 EnterCriticalSection 5566->5575 5567->5557 5569 216787 5576 2167cb 5569->5576 5574 213f24 _abort 33 API calls 5574->5567 5575->5569 5577 2167d9 __fassign 5576->5577 5579 21679b 5576->5579 5578 216507 __fassign 15 API calls 5577->5578 5577->5579 5578->5579 5580 2167ba 5579->5580 5583 21572a LeaveCriticalSection 5580->5583 5582 2167ae 5582->5567 5582->5574 5583->5582 5587 214fd0 5584->5587 5591 21507a _ValidateLocalCookies 5584->5591 5586 215031 5604 217cd1 5586->5604 5592 21634d 5587->5592 5590 217cd1 38 API calls 5590->5591 5591->5266 5593 213f72 __fassign 33 API calls 5592->5593 5594 21636d MultiByteToWideChar 5593->5594 5596 2163ab 5594->5596 5598 216443 _ValidateLocalCookies 5594->5598 5597 2162ff 16 API calls 5596->5597 5600 2163cc _abort __alloca_probe_16 5596->5600 5597->5600 5598->5586 5599 21643d 5609 21646a 5599->5609 5600->5599 5602 216411 MultiByteToWideChar 5600->5602 5602->5599 5603 21642d GetStringTypeW 5602->5603 5603->5599 5605 213f72 __fassign 33 API calls 5604->5605 5606 217ce4 5605->5606 5613 217ab4 5606->5613 5608 215052 5608->5590 5610 216476 5609->5610 5611 216487 5609->5611 5610->5611 5612 214869 _free 15 API calls 5610->5612 5611->5598 5612->5611 5614 217acf 5613->5614 5615 217af5 MultiByteToWideChar 5614->5615 5616 217ca9 _ValidateLocalCookies 5615->5616 5617 217b1f 5615->5617 5616->5608 5620 2162ff 16 API calls 5617->5620 5622 217b40 __alloca_probe_16 5617->5622 5618 217bf5 5624 21646a __freea 15 API calls 5618->5624 5619 217b89 MultiByteToWideChar 5619->5618 5621 217ba2 5619->5621 5620->5622 5638 215a15 5621->5638 5622->5618 5622->5619 5624->5616 5625 217bb9 5625->5618 5626 217c04 5625->5626 5627 217bcc 5625->5627 5628 2162ff 16 API calls 5626->5628 5632 217c25 __alloca_probe_16 5626->5632 5627->5618 5629 215a15 6 API calls 5627->5629 5628->5632 5629->5618 5630 217c9a 5631 21646a __freea 15 API calls 5630->5631 5631->5618 5632->5630 5633 215a15 6 API calls 5632->5633 5634 217c79 5633->5634 5634->5630 5635 217c88 WideCharToMultiByte 5634->5635 5635->5630 5636 217cc8 5635->5636 5637 21646a __freea 15 API calls 5636->5637 5637->5618 5639 215741 _abort 5 API calls 5638->5639 5640 215a3c 5639->5640 5641 215a45 _ValidateLocalCookies 5640->5641 5644 215a9d 5640->5644 5641->5625 5643 215a85 LCMapStringW 5643->5641 5645 215741 _abort 5 API calls 5644->5645 5646 215ac4 _ValidateLocalCookies 5645->5646 5646->5643 5648 214d5d ___scrt_is_nonwritable_in_current_image 5647->5648 5655 2156e2 EnterCriticalSection 5648->5655 5650 214d67 5656 214dbc 5650->5656 5654 214d80 _abort 5654->5283 5655->5650 5668 2154dc 5656->5668 5658 214e0a 5659 2154dc 21 API calls 5658->5659 5660 214e26 5659->5660 5661 2154dc 21 API calls 5660->5661 5662 214e44 5661->5662 5663 214d74 5662->5663 5664 214869 _free 15 API calls 5662->5664 5665 214d88 5663->5665 5664->5663 5682 21572a LeaveCriticalSection 5665->5682 5667 214d92 5667->5654 5669 2154ed 5668->5669 5677 2154e9 5668->5677 5670 2154f4 5669->5670 5672 215507 _abort 5669->5672 5671 2147f9 _free 15 API calls 5670->5671 5673 2154f9 5671->5673 5675 215535 5672->5675 5676 21553e 5672->5676 5672->5677 5674 21473d _abort 21 API calls 5673->5674 5674->5677 5678 2147f9 _free 15 API calls 5675->5678 5676->5677 5679 2147f9 _free 15 API calls 5676->5679 5677->5658 5680 21553a 5678->5680 5679->5680 5681 21473d _abort 21 API calls 5680->5681 5681->5677 5682->5667 5684 213f72 __fassign 33 API calls 5683->5684 5685 215571 5684->5685 5685->5075 5687 21356a _abort 5686->5687 5688 213582 5687->5688 5701 2136b8 GetModuleHandleW 5687->5701 5708 2156e2 EnterCriticalSection 5688->5708 5695 2135ff _abort 5712 213668 5695->5712 5696 213671 _abort 5696->5107 5699 21358a 5699->5695 5709 213c97 5699->5709 5702 213576 5701->5702 5702->5688 5703 2136fc GetModuleHandleExW 5702->5703 5704 213726 GetProcAddress 5703->5704 5705 21373b 5703->5705 5704->5705 5706 213758 _ValidateLocalCookies 5705->5706 5707 21374f FreeLibrary 5705->5707 5706->5688 5707->5706 5708->5699 5723 2139d0 5709->5723 5743 21572a LeaveCriticalSection 5712->5743 5714 213641 5714->5696 5715 213677 5714->5715 5744 215b1f 5715->5744 5717 213681 5718 2136a5 5717->5718 5719 213685 GetPEB 5717->5719 5721 2136fc _abort 3 API calls 5718->5721 5719->5718 5720 213695 GetCurrentProcess TerminateProcess 5719->5720 5720->5718 5722 2136ad ExitProcess 5721->5722 5726 21397f 5723->5726 5725 2139f4 5725->5695 5727 21398b ___scrt_is_nonwritable_in_current_image 5726->5727 5734 2156e2 EnterCriticalSection 5727->5734 5729 213999 5735 213a20 5729->5735 5731 2139a6 5739 2139c4 5731->5739 5733 2139b7 _abort 5733->5725 5734->5729 5736 213a48 5735->5736 5737 213a40 _ValidateLocalCookies 5735->5737 5736->5737 5738 214869 _free 15 API calls 5736->5738 5737->5731 5738->5737 5742 21572a LeaveCriticalSection 5739->5742 5741 2139ce 5741->5733 5742->5741 5743->5714 5745 215b44 5744->5745 5747 215b3a _ValidateLocalCookies 5744->5747 5746 215741 _abort 5 API calls 5745->5746 5746->5747 5747->5717 6382 21324d 6383 21522b 46 API calls 6382->6383 6384 21325f 6383->6384 6393 21561e GetEnvironmentStringsW 6384->6393 6387 21326a 6389 214869 _free 15 API calls 6387->6389 6390 21329f 6389->6390 6391 213275 6392 214869 _free 15 API calls 6391->6392 6392->6387 6394 215635 6393->6394 6404 215688 6393->6404 6397 21563b WideCharToMultiByte 6394->6397 6395 215691 FreeEnvironmentStringsW 6396 213264 6395->6396 6396->6387 6405 2132a5 6396->6405 6398 215657 6397->6398 6397->6404 6399 2162ff 16 API calls 6398->6399 6400 21565d 6399->6400 6401 215664 WideCharToMultiByte 6400->6401 6402 21567a 6400->6402 6401->6402 6403 214869 _free 15 API calls 6402->6403 6403->6404 6404->6395 6404->6396 6406 2132ba 6405->6406 6407 21480c _abort 15 API calls 6406->6407 6417 2132e1 6407->6417 6408 213345 6409 214869 _free 15 API calls 6408->6409 6410 21335f 6409->6410 6410->6391 6411 21480c _abort 15 API calls 6411->6417 6412 213347 6414 213376 15 API calls 6412->6414 6415 21334d 6414->6415 6418 214869 _free 15 API calls 6415->6418 6416 213369 6419 21474d _abort 6 API calls 6416->6419 6417->6408 6417->6411 6417->6412 6417->6416 6420 214869 _free 15 API calls 6417->6420 6422 213eca 6417->6422 6418->6408 6421 213375 6419->6421 6420->6417 6423 213ed7 6422->6423 6424 213ee5 6422->6424 6423->6424 6426 213efc 6423->6426 6425 2147f9 _free 15 API calls 6424->6425 6430 213eed 6425->6430 6428 213ef7 6426->6428 6429 2147f9 _free 15 API calls 6426->6429 6427 21473d _abort 21 API calls 6427->6428 6428->6417 6429->6430 6430->6427 5815 21430f 5816 21431a 5815->5816 5817 21432a 5815->5817 5821 214330 5816->5821 5820 214869 _free 15 API calls 5820->5817 5822 214343 5821->5822 5823 214349 5821->5823 5825 214869 _free 15 API calls 5822->5825 5824 214869 _free 15 API calls 5823->5824 5826 214355 5824->5826 5825->5823 5827 214869 _free 15 API calls 5826->5827 5828 214360 5827->5828 5829 214869 _free 15 API calls 5828->5829 5830 21436b 5829->5830 5831 214869 _free 15 API calls 5830->5831 5832 214376 5831->5832 5833 214869 _free 15 API calls 5832->5833 5834 214381 5833->5834 5835 214869 _free 15 API calls 5834->5835 5836 21438c 5835->5836 5837 214869 _free 15 API calls 5836->5837 5838 214397 5837->5838 5839 214869 _free 15 API calls 5838->5839 5840 2143a2 5839->5840 5841 214869 _free 15 API calls 5840->5841 5842 2143b0 5841->5842 5847 2141f6 5842->5847 5853 214102 5847->5853 5849 21421a 5850 214246 5849->5850 5866 214163 5850->5866 5852 21426a 5852->5820 5854 21410e ___scrt_is_nonwritable_in_current_image 5853->5854 5861 2156e2 EnterCriticalSection 5854->5861 5856 214142 5862 214157 5856->5862 5858 214118 5858->5856 5860 214869 _free 15 API calls 5858->5860 5859 21414f _abort 5859->5849 5860->5856 5861->5858 5865 21572a LeaveCriticalSection 5862->5865 5864 214161 5864->5859 5865->5864 5867 21416f ___scrt_is_nonwritable_in_current_image 5866->5867 5874 2156e2 EnterCriticalSection 5867->5874 5869 214179 5870 2143d9 _abort 15 API calls 5869->5870 5871 21418c 5870->5871 5875 2141a2 5871->5875 5873 21419a _abort 5873->5852 5874->5869 5878 21572a LeaveCriticalSection 5875->5878 5877 2141ac 5877->5873 5878->5877 6633 213d8f 6634 213d9e 6633->6634 6639 213db2 6633->6639 6636 214869 _free 15 API calls 6634->6636 6634->6639 6635 214869 _free 15 API calls 6637 213dc4 6635->6637 6636->6639 6638 214869 _free 15 API calls 6637->6638 6640 213dd7 6638->6640 6639->6635 6641 214869 _free 15 API calls 6640->6641 6642 213de8 6641->6642 6643 214869 _free 15 API calls 6642->6643 6644 213df9 6643->6644 6757 2155ce GetCommandLineA GetCommandLineW 6431 217351 6432 21735e 6431->6432 6433 21480c _abort 15 API calls 6432->6433 6434 217378 6433->6434 6435 214869 _free 15 API calls 6434->6435 6436 217384 6435->6436 6437 21480c _abort 15 API calls 6436->6437 6441 2173aa 6436->6441 6438 21739e 6437->6438 6440 214869 _free 15 API calls 6438->6440 6440->6441 6442 2173b6 6441->6442 6443 2159b3 6441->6443 6444 215741 _abort 5 API calls 6443->6444 6445 2159da 6444->6445 6446 2159e3 _ValidateLocalCookies 6445->6446 6447 2159f8 InitializeCriticalSectionAndSpinCount 6445->6447 6446->6441 6447->6446 5879 217a10 5882 217a27 5879->5882 5883 217a35 5882->5883 5884 217a49 5882->5884 5887 2147f9 _free 15 API calls 5883->5887 5885 217a51 5884->5885 5886 217a63 5884->5886 5888 2147f9 _free 15 API calls 5885->5888 5892 213f72 __fassign 33 API calls 5886->5892 5894 217a22 5886->5894 5889 217a3a 5887->5889 5891 217a56 5888->5891 5890 21473d _abort 21 API calls 5889->5890 5890->5894 5893 21473d _abort 21 API calls 5891->5893 5892->5894 5893->5894 6758 215fd0 6759 215fdc ___scrt_is_nonwritable_in_current_image 6758->6759 6770 2156e2 EnterCriticalSection 6759->6770 6761 215fe3 6771 215c8b 6761->6771 6763 215ff2 6769 216001 6763->6769 6784 215e64 GetStartupInfoW 6763->6784 6767 216012 _abort 6795 21601d 6769->6795 6770->6761 6772 215c97 ___scrt_is_nonwritable_in_current_image 6771->6772 6773 215ca4 6772->6773 6774 215cbb 6772->6774 6775 2147f9 _free 15 API calls 6773->6775 6798 2156e2 EnterCriticalSection 6774->6798 6777 215ca9 6775->6777 6778 21473d _abort 21 API calls 6777->6778 6781 215cb3 _abort 6778->6781 6779 215cf3 6806 215d1a 6779->6806 6781->6763 6783 215cc7 6783->6779 6799 215bdc 6783->6799 6785 215e81 6784->6785 6786 215f13 6784->6786 6785->6786 6787 215c8b 22 API calls 6785->6787 6790 215f1a 6786->6790 6788 215eaa 6787->6788 6788->6786 6789 215ed8 GetFileType 6788->6789 6789->6788 6794 215f21 6790->6794 6791 215f64 GetStdHandle 6791->6794 6792 215fcc 6792->6769 6793 215f77 GetFileType 6793->6794 6794->6791 6794->6792 6794->6793 6810 21572a LeaveCriticalSection 6795->6810 6797 216024 6797->6767 6798->6783 6800 21480c _abort 15 API calls 6799->6800 6802 215bee 6800->6802 6801 215bfb 6803 214869 _free 15 API calls 6801->6803 6802->6801 6804 2159b3 6 API calls 6802->6804 6805 215c4d 6803->6805 6804->6802 6805->6783 6809 21572a LeaveCriticalSection 6806->6809 6808 215d21 6808->6781 6809->6808 6810->6797 6448 212f53 6449 212f62 6448->6449 6450 212f7e 6448->6450 6449->6450 6451 212f68 6449->6451 6452 21522b 46 API calls 6450->6452 6453 2147f9 _free 15 API calls 6451->6453 6454 212f85 GetModuleFileNameA 6452->6454 6455 212f6d 6453->6455 6456 212fa9 6454->6456 6457 21473d _abort 21 API calls 6455->6457 6471 213077 6456->6471 6458 212f77 6457->6458 6463 212fe8 6466 213077 33 API calls 6463->6466 6464 212fdc 6465 2147f9 _free 15 API calls 6464->6465 6467 212fe1 6465->6467 6469 212ffe 6466->6469 6468 214869 _free 15 API calls 6467->6468 6468->6458 6469->6467 6470 214869 _free 15 API calls 6469->6470 6470->6467 6473 21309c 6471->6473 6472 2155b6 33 API calls 6472->6473 6473->6472 6475 2130fc 6473->6475 6474 212fc6 6477 2131ec 6474->6477 6475->6474 6476 2155b6 33 API calls 6475->6476 6476->6475 6478 213201 6477->6478 6479 212fd3 6477->6479 6478->6479 6480 21480c _abort 15 API calls 6478->6480 6479->6463 6479->6464 6481 21322f 6480->6481 6482 214869 _free 15 API calls 6481->6482 6482->6479 6645 216893 GetProcessHeap 5895 217419 5905 217fb2 5895->5905 5899 217426 5918 21828e 5899->5918 5902 217450 5903 214869 _free 15 API calls 5902->5903 5904 21745b 5903->5904 5922 217fbb 5905->5922 5907 217421 5908 2181ee 5907->5908 5909 2181fa ___scrt_is_nonwritable_in_current_image 5908->5909 5942 2156e2 EnterCriticalSection 5909->5942 5911 218270 5956 218285 5911->5956 5912 218205 5912->5911 5914 218244 DeleteCriticalSection 5912->5914 5943 21901c 5912->5943 5917 214869 _free 15 API calls 5914->5917 5915 21827c _abort 5915->5899 5917->5912 5919 2182a4 5918->5919 5921 217435 DeleteCriticalSection 5918->5921 5920 214869 _free 15 API calls 5919->5920 5919->5921 5920->5921 5921->5899 5921->5902 5923 217fc7 ___scrt_is_nonwritable_in_current_image 5922->5923 5932 2156e2 EnterCriticalSection 5923->5932 5925 21806a 5937 21808a 5925->5937 5929 218076 _abort 5929->5907 5930 217f6b 61 API calls 5931 217fd6 5930->5931 5931->5925 5931->5930 5933 217465 EnterCriticalSection 5931->5933 5934 218060 5931->5934 5932->5931 5933->5931 5940 217479 LeaveCriticalSection 5934->5940 5936 218068 5936->5931 5941 21572a LeaveCriticalSection 5937->5941 5939 218091 5939->5929 5940->5936 5941->5939 5942->5912 5944 219028 ___scrt_is_nonwritable_in_current_image 5943->5944 5945 219039 5944->5945 5946 21904e 5944->5946 5947 2147f9 _free 15 API calls 5945->5947 5954 219049 _abort 5946->5954 5959 217465 EnterCriticalSection 5946->5959 5948 21903e 5947->5948 5950 21473d _abort 21 API calls 5948->5950 5950->5954 5951 21906a 5960 218fa6 5951->5960 5953 219075 5976 219092 5953->5976 5954->5912 6214 21572a LeaveCriticalSection 5956->6214 5958 21828c 5958->5915 5959->5951 5961 218fb3 5960->5961 5962 218fc8 5960->5962 5963 2147f9 _free 15 API calls 5961->5963 5974 218fc3 5962->5974 5979 217f05 5962->5979 5964 218fb8 5963->5964 5966 21473d _abort 21 API calls 5964->5966 5966->5974 5968 21828e 15 API calls 5969 218fe4 5968->5969 5985 21732b 5969->5985 5971 218fea 5992 219d4e 5971->5992 5974->5953 5975 214869 _free 15 API calls 5975->5974 6213 217479 LeaveCriticalSection 5976->6213 5978 21909a 5978->5954 5980 217f1d 5979->5980 5981 217f19 5979->5981 5980->5981 5982 21732b 21 API calls 5980->5982 5981->5968 5983 217f3d 5982->5983 6007 2189a7 5983->6007 5986 217337 5985->5986 5987 21734c 5985->5987 5988 2147f9 _free 15 API calls 5986->5988 5987->5971 5989 21733c 5988->5989 5990 21473d _abort 21 API calls 5989->5990 5991 217347 5990->5991 5991->5971 5993 219d72 5992->5993 5994 219d5d 5992->5994 5996 219dad 5993->5996 6000 219d99 5993->6000 5995 2147e6 __dosmaperr 15 API calls 5994->5995 5997 219d62 5995->5997 5998 2147e6 __dosmaperr 15 API calls 5996->5998 5999 2147f9 _free 15 API calls 5997->5999 6001 219db2 5998->6001 6005 218ff0 5999->6005 6170 219d26 6000->6170 6003 2147f9 _free 15 API calls 6001->6003 6004 219dba 6003->6004 6006 21473d _abort 21 API calls 6004->6006 6005->5974 6005->5975 6006->6005 6008 2189b3 ___scrt_is_nonwritable_in_current_image 6007->6008 6009 2189d3 6008->6009 6010 2189bb 6008->6010 6011 218a71 6009->6011 6017 218a08 6009->6017 6032 2147e6 6010->6032 6014 2147e6 __dosmaperr 15 API calls 6011->6014 6016 218a76 6014->6016 6015 2147f9 _free 15 API calls 6025 2189c8 _abort 6015->6025 6018 2147f9 _free 15 API calls 6016->6018 6035 215d23 EnterCriticalSection 6017->6035 6020 218a7e 6018->6020 6022 21473d _abort 21 API calls 6020->6022 6021 218a0e 6023 218a2a 6021->6023 6024 218a3f 6021->6024 6022->6025 6026 2147f9 _free 15 API calls 6023->6026 6036 218a92 6024->6036 6025->5981 6029 218a2f 6026->6029 6028 218a3a 6085 218a69 6028->6085 6030 2147e6 __dosmaperr 15 API calls 6029->6030 6030->6028 6033 2144a8 __dosmaperr 15 API calls 6032->6033 6034 2147eb 6033->6034 6034->6015 6035->6021 6037 218ac0 6036->6037 6044 218ab9 _ValidateLocalCookies 6036->6044 6038 218ae3 6037->6038 6039 218ac4 6037->6039 6042 218b34 6038->6042 6043 218b17 6038->6043 6040 2147e6 __dosmaperr 15 API calls 6039->6040 6041 218ac9 6040->6041 6045 2147f9 _free 15 API calls 6041->6045 6046 218b4a 6042->6046 6088 218f8b 6042->6088 6047 2147e6 __dosmaperr 15 API calls 6043->6047 6044->6028 6048 218ad0 6045->6048 6091 218637 6046->6091 6051 218b1c 6047->6051 6053 21473d _abort 21 API calls 6048->6053 6052 2147f9 _free 15 API calls 6051->6052 6055 218b24 6052->6055 6053->6044 6058 21473d _abort 21 API calls 6055->6058 6056 218b91 6059 218ba5 6056->6059 6060 218beb WriteFile 6056->6060 6057 218b58 6061 218b5c 6057->6061 6062 218b7e 6057->6062 6058->6044 6065 218bdb 6059->6065 6066 218bad 6059->6066 6063 218c0e GetLastError 6060->6063 6069 218b74 6060->6069 6067 218c52 6061->6067 6098 2185ca 6061->6098 6103 218417 GetConsoleCP 6062->6103 6063->6069 6123 2186ad 6065->6123 6070 218bb2 6066->6070 6071 218bcb 6066->6071 6067->6044 6073 2147f9 _free 15 API calls 6067->6073 6069->6044 6069->6067 6076 218c2e 6069->6076 6070->6067 6112 21878c 6070->6112 6117 21887a 6071->6117 6075 218c77 6073->6075 6078 2147e6 __dosmaperr 15 API calls 6075->6078 6079 218c35 6076->6079 6080 218c49 6076->6080 6078->6044 6081 2147f9 _free 15 API calls 6079->6081 6128 2147c3 6080->6128 6083 218c3a 6081->6083 6084 2147e6 __dosmaperr 15 API calls 6083->6084 6084->6044 6169 215d46 LeaveCriticalSection 6085->6169 6087 218a6f 6087->6025 6133 218f0d 6088->6133 6155 217eaf 6091->6155 6093 218647 6094 21864c 6093->6094 6095 214424 _abort 33 API calls 6093->6095 6094->6056 6094->6057 6096 21866f 6095->6096 6096->6094 6097 21868d GetConsoleMode 6096->6097 6097->6094 6101 218624 6098->6101 6102 2185ef 6098->6102 6099 218626 GetLastError 6099->6101 6100 219101 WriteConsoleW CreateFileW 6100->6102 6101->6069 6102->6099 6102->6100 6102->6101 6104 21858c _ValidateLocalCookies 6103->6104 6110 21847a 6103->6110 6104->6069 6106 218500 WideCharToMultiByte 6106->6104 6107 218526 WriteFile 6106->6107 6109 2185af GetLastError 6107->6109 6107->6110 6108 2172b7 35 API calls __fassign 6108->6110 6109->6104 6110->6104 6110->6106 6110->6108 6111 218557 WriteFile 6110->6111 6164 216052 6110->6164 6111->6109 6111->6110 6114 21879b 6112->6114 6113 218819 WriteFile 6113->6114 6115 21885f GetLastError 6113->6115 6114->6113 6116 21885d _ValidateLocalCookies 6114->6116 6115->6116 6116->6069 6122 218889 6117->6122 6118 218994 _ValidateLocalCookies 6118->6069 6119 21890b WideCharToMultiByte 6120 218940 WriteFile 6119->6120 6121 21898c GetLastError 6119->6121 6120->6121 6120->6122 6121->6118 6122->6118 6122->6119 6122->6120 6125 2186bc 6123->6125 6124 21872e WriteFile 6124->6125 6126 218771 GetLastError 6124->6126 6125->6124 6127 21876f _ValidateLocalCookies 6125->6127 6126->6127 6127->6069 6129 2147e6 __dosmaperr 15 API calls 6128->6129 6130 2147ce _free 6129->6130 6131 2147f9 _free 15 API calls 6130->6131 6132 2147e1 6131->6132 6132->6044 6142 215dfa 6133->6142 6135 218f1f 6136 218f27 6135->6136 6137 218f38 SetFilePointerEx 6135->6137 6138 2147f9 _free 15 API calls 6136->6138 6139 218f50 GetLastError 6137->6139 6140 218f2c 6137->6140 6138->6140 6141 2147c3 __dosmaperr 15 API calls 6139->6141 6140->6046 6141->6140 6143 215e07 6142->6143 6144 215e1c 6142->6144 6145 2147e6 __dosmaperr 15 API calls 6143->6145 6146 2147e6 __dosmaperr 15 API calls 6144->6146 6149 215e41 6144->6149 6147 215e0c 6145->6147 6150 215e4c 6146->6150 6148 2147f9 _free 15 API calls 6147->6148 6151 215e14 6148->6151 6149->6135 6152 2147f9 _free 15 API calls 6150->6152 6151->6135 6153 215e54 6152->6153 6154 21473d _abort 21 API calls 6153->6154 6154->6151 6156 217ec9 6155->6156 6157 217ebc 6155->6157 6160 217ed5 6156->6160 6161 2147f9 _free 15 API calls 6156->6161 6158 2147f9 _free 15 API calls 6157->6158 6159 217ec1 6158->6159 6159->6093 6160->6093 6162 217ef6 6161->6162 6163 21473d _abort 21 API calls 6162->6163 6163->6159 6165 214424 _abort 33 API calls 6164->6165 6166 21605d 6165->6166 6167 2172d1 __fassign 33 API calls 6166->6167 6168 21606d 6167->6168 6168->6110 6169->6087 6173 219ca4 6170->6173 6172 219d4a 6172->6005 6174 219cb0 ___scrt_is_nonwritable_in_current_image 6173->6174 6184 215d23 EnterCriticalSection 6174->6184 6176 219cbe 6177 219cf0 6176->6177 6178 219ce5 6176->6178 6180 2147f9 _free 15 API calls 6177->6180 6185 219dcd 6178->6185 6181 219ceb 6180->6181 6200 219d1a 6181->6200 6183 219d0d _abort 6183->6172 6184->6176 6186 215dfa 21 API calls 6185->6186 6188 219ddd 6186->6188 6187 219de3 6203 215d69 6187->6203 6188->6187 6189 219e15 6188->6189 6191 215dfa 21 API calls 6188->6191 6189->6187 6192 215dfa 21 API calls 6189->6192 6194 219e0c 6191->6194 6195 219e21 CloseHandle 6192->6195 6197 215dfa 21 API calls 6194->6197 6195->6187 6198 219e2d GetLastError 6195->6198 6196 219e5d 6196->6181 6197->6189 6198->6187 6199 2147c3 __dosmaperr 15 API calls 6199->6196 6212 215d46 LeaveCriticalSection 6200->6212 6202 219d24 6202->6183 6204 215d78 6203->6204 6205 215ddf 6203->6205 6204->6205 6210 215da2 6204->6210 6206 2147f9 _free 15 API calls 6205->6206 6207 215de4 6206->6207 6208 2147e6 __dosmaperr 15 API calls 6207->6208 6209 215dcf 6208->6209 6209->6196 6209->6199 6210->6209 6211 215dc9 SetStdHandle 6210->6211 6211->6209 6212->6202 6213->5978 6214->5958 6483 21365d 6486 213e89 6483->6486 6487 213e95 _abort 6486->6487 6488 214424 _abort 33 API calls 6487->6488 6491 213e9a 6488->6491 6489 213f24 _abort 33 API calls 6490 213ec4 6489->6490 6491->6489 6215 217d1c 6216 21522b 46 API calls 6215->6216 6217 217d21 6216->6217

        Control-flow Graph

        APIs
        • LocalAlloc.KERNEL32(00000000,00000104), ref: 00211016
        • GetModuleFileNameW.KERNEL32(00000000,00000000,00000104), ref: 00211025
        • CertOpenSystemStoreA.CRYPT32(00000000,TrustedPublisher), ref: 00211032
        • LocalAlloc.KERNELBASE(00000000,00040000), ref: 00211057
        • LocalAlloc.KERNEL32(00000000,00040000), ref: 00211063
        • CryptQueryObject.CRYPT32(00000001,00000000,00000400,00000002,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 00211082
        • CryptMsgGetParam.CRYPT32(?,0000000B,00000000,?,?), ref: 002110B2
        • LocalAlloc.KERNEL32(00000000,?), ref: 002110C5
        • LocalAlloc.KERNEL32(00000000,00002000), ref: 002110F4
        • CryptMsgGetParam.CRYPT32(?,0000000C,00000000,00000000,00002000), ref: 0021110A
        • CertCreateCertificateContext.CRYPT32(00000001,00000000,00002000), ref: 0021111A
        • CertAddCertificateContextToStore.CRYPT32(?,00000000,00000001,00000000), ref: 0021112D
        • CertFreeCertificateContext.CRYPT32(00000000), ref: 00211134
        • LocalFree.KERNEL32(00000000), ref: 0021113E
        • LocalFree.KERNEL32(00000000), ref: 0021115D
        • CryptMsgGetParam.CRYPT32(?,00000009,00000000,00000000,00040000), ref: 0021116E
        • CryptMsgGetParam.CRYPT32(?,0000000A,00000000,?,00040000), ref: 00211182
        • CertFindAttribute.CRYPT32(1.3.6.1.4.1.311.4.1.1,00000000,?), ref: 00211198
        • CertFindAttribute.CRYPT32(1.3.6.1.4.1.311.4.1.1,?,?), ref: 002111A9
        • LoadLibraryA.KERNELBASE(dfshim), ref: 002111BA
        • GetProcAddress.KERNEL32(00000000,ShOpenVerbApplicationW), ref: 002111C6
        • Sleep.KERNELBASE(00009C40), ref: 002111E8
        • CertDeleteCertificateFromStore.CRYPT32(?), ref: 0021120B
        • CertCloseStore.CRYPT32(?,00000000), ref: 0021121A
        • LocalFree.KERNEL32(?), ref: 00211223
        • LocalFree.KERNEL32(?), ref: 00211228
        • LocalFree.KERNEL32(?), ref: 0021122D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: Local$Cert$Free$AllocCrypt$CertificateParamStore$Context$AttributeFind$AddressCloseCreateDeleteFileFromLibraryLoadModuleNameObjectOpenProcQuerySleepSystem
        • String ID: 1.3.6.1.4.1.311.4.1.1$ShOpenVerbApplicationW$TrustedPublisher$dfshim
        • API String ID: 335784236-860318880
        • Opcode ID: 9c380761302f90f3aa7aefc0511a627122db31f458df41d73b00a5d90ddf510d
        • Instruction ID: 6ad736217ef0b7911994b954190d3c84fea8464a93ec24c3d9a7edec082f21ee
        • Opcode Fuzzy Hash: 9c380761302f90f3aa7aefc0511a627122db31f458df41d73b00a5d90ddf510d
        • Instruction Fuzzy Hash: 04618D71A10219BFEB219F90EC49FEFBBB4EF58B50F104054FA14B7290CB7199508BA4
        APIs
        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 0021192B
        • IsDebuggerPresent.KERNEL32 ref: 002119F7
        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00211A10
        • UnhandledExceptionFilter.KERNEL32(?), ref: 00211A1A
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
        • String ID:
        • API String ID: 254469556-0
        • Opcode ID: 9743126381bd0d22aea149a4a345826151deff88ef6930ed1c23c4ab0e6b9221
        • Instruction ID: 083bf3b23d6addf33f27581096de036b6a6ac2b9d5810d441618107bd4b64eff
        • Opcode Fuzzy Hash: 9743126381bd0d22aea149a4a345826151deff88ef6930ed1c23c4ab0e6b9221
        • Instruction Fuzzy Hash: 33311475D112289BDB21DFA4D949BCEBBF8AF18300F1041AAE50CAB250EB749A94CF45
        APIs
        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0021466B
        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00214675
        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 00214682
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled$DebuggerPresent
        • String ID:
        • API String ID: 3906539128-0
        • Opcode ID: 130947a829832e9c936e562aa14c50fcf85dfebf1da495b9ac20da50c1054aa2
        • Instruction ID: 46f88c6cb065ab263ccc9fe44197fc2df4b210ad959ddcf5dfd5037ab2d922a8
        • Opcode Fuzzy Hash: 130947a829832e9c936e562aa14c50fcf85dfebf1da495b9ac20da50c1054aa2
        • Instruction Fuzzy Hash: AE31B374911229ABCB21DF64D989BCDBBF8BF18310F5041EAE81CA7250EB709BD58F45
        APIs
        • GetCurrentProcess.KERNEL32(?,?,0021364D,?,002202E0,0000000C,002137A4,?,00000002,00000000,?,00213F66,00000003,0021209F,00211AFC), ref: 00213698
        • TerminateProcess.KERNEL32(00000000,?,0021364D,?,002202E0,0000000C,002137A4,?,00000002,00000000,?,00213F66,00000003,0021209F,00211AFC), ref: 0021369F
        • ExitProcess.KERNEL32 ref: 002136B1
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: Process$CurrentExitTerminate
        • String ID:
        • API String ID: 1703294689-0
        • Opcode ID: 04deff73b402352a30538dae3535e71ead4113ca584b5baba5e5aa6791bcbe67
        • Instruction ID: 82d6666e55eab675c8a48eea0fd115b508c7d7cb51d5cfa71b83dd4ea58f4c44
        • Opcode Fuzzy Hash: 04deff73b402352a30538dae3535e71ead4113ca584b5baba5e5aa6791bcbe67
        • Instruction Fuzzy Hash: 7EE0B631020588EFCF12AF54ED0DADA3BBEEF68345B008054FA559A231DF35DEA2CA54
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID:
        • String ID: .
        • API String ID: 0-248832578
        • Opcode ID: 3fd4b2ba691f60b1fe65d9326d016c545b7a3003cfaea1e2d97b168daf010a33
        • Instruction ID: de6210f710e1548ea65add622544f1b2224a4fee2a1f073bc3fc4da5b1eb1386
        • Opcode Fuzzy Hash: 3fd4b2ba691f60b1fe65d9326d016c545b7a3003cfaea1e2d97b168daf010a33
        • Instruction Fuzzy Hash: AB310671C1420AABCB24EE78CC94EFA7BFDEF95308F0441A8F81D97251E6309E958B50
        APIs
        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0021A490,?,?,00000008,?,?,0021A130,00000000), ref: 0021A6C2
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: ExceptionRaise
        • String ID:
        • API String ID: 3997070919-0
        • Opcode ID: 10818fa9caa059db9822b01076ed80986ac4febb8d1757e3c0f192cbe3aefe57
        • Instruction ID: b2f65e4310287c6248aeb6f65201f816678bd255c67af3c2b6971b45eaaef610
        • Opcode Fuzzy Hash: 10818fa9caa059db9822b01076ed80986ac4febb8d1757e3c0f192cbe3aefe57
        • Instruction Fuzzy Hash: 71B17E315216099FD715CF28C48ABA47BE1FF14364F298658E89ACF2E1C335D9A2CB41
        APIs
        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00211BEA
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: FeaturePresentProcessor
        • String ID:
        • API String ID: 2325560087-0
        • Opcode ID: 8dd70a9643a58458a399e20bcfd1ab44de49055ad12e566228d90008eb9850f3
        • Instruction ID: 547abedab7711baa729b8479611869471b351a11e466a1fb6db7f59bb0b2780a
        • Opcode Fuzzy Hash: 8dd70a9643a58458a399e20bcfd1ab44de49055ad12e566228d90008eb9850f3
        • Instruction Fuzzy Hash: 8D519371E202099FDB24CFA4E885BEEB7F0FB68344F14902AC501EB294D37499A1CF90
        APIs
        • SetUnhandledExceptionFilter.KERNEL32(Function_00001AB8,00211300), ref: 00211AB1
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: ExceptionFilterUnhandled
        • String ID:
        • API String ID: 3192549508-0
        • Opcode ID: 858875da908bda8baff2053e3dded2f2cd9ddb6d10336b8ad553be3b02e90bf8
        • Instruction ID: c407d637019e6e63386ad4a6e664ede069922ac1077e5d23af4887e63446d88b
        • Opcode Fuzzy Hash: 858875da908bda8baff2053e3dded2f2cd9ddb6d10336b8ad553be3b02e90bf8
        • Instruction Fuzzy Hash:
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: HeapProcess
        • String ID:
        • API String ID: 54951025-0
        • Opcode ID: 3535c55f56ae7c6fe13f6b55f2f344419b748b7d41462b5e8d16d86071022cd1
        • Instruction ID: aa704dc376ac9f4f377de55104f6cf8e5a66294c52480638f12b6a6f6f4d3218
        • Opcode Fuzzy Hash: 3535c55f56ae7c6fe13f6b55f2f344419b748b7d41462b5e8d16d86071022cd1
        • Instruction Fuzzy Hash: 23A01130200202FBA3208F30BA8E2083AA8AA00A80B828028A00CC0020EB2080A0AA02

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 81 216507-21651b 82 216589-216591 81->82 83 21651d-216522 81->83 85 216593-216596 82->85 86 2165d8-2165f0 call 21667a 82->86 83->82 84 216524-216529 83->84 84->82 87 21652b-21652e 84->87 85->86 89 216598-2165d5 call 214869 * 4 85->89 95 2165f3-2165fa 86->95 87->82 90 216530-216538 87->90 89->86 93 216552-21655a 90->93 94 21653a-21653d 90->94 100 216574-216588 call 214869 * 2 93->100 101 21655c-21655f 93->101 94->93 97 21653f-216551 call 214869 call 216078 94->97 98 216619-21661d 95->98 99 2165fc-216600 95->99 97->93 109 216635-216641 98->109 110 21661f-216624 98->110 105 216602-216605 99->105 106 216616 99->106 100->82 101->100 107 216561-216573 call 214869 call 216176 101->107 105->106 114 216607-216615 call 214869 * 2 105->114 106->98 107->100 109->95 112 216643-216650 call 214869 109->112 117 216632 110->117 118 216626-216629 110->118 114->106 117->109 118->117 125 21662b-216631 call 214869 118->125 125->117
        APIs
        • ___free_lconv_mon.LIBCMT ref: 0021654B
          • Part of subcall function 00216078: _free.LIBCMT ref: 00216095
          • Part of subcall function 00216078: _free.LIBCMT ref: 002160A7
          • Part of subcall function 00216078: _free.LIBCMT ref: 002160B9
          • Part of subcall function 00216078: _free.LIBCMT ref: 002160CB
          • Part of subcall function 00216078: _free.LIBCMT ref: 002160DD
          • Part of subcall function 00216078: _free.LIBCMT ref: 002160EF
          • Part of subcall function 00216078: _free.LIBCMT ref: 00216101
          • Part of subcall function 00216078: _free.LIBCMT ref: 00216113
          • Part of subcall function 00216078: _free.LIBCMT ref: 00216125
          • Part of subcall function 00216078: _free.LIBCMT ref: 00216137
          • Part of subcall function 00216078: _free.LIBCMT ref: 00216149
          • Part of subcall function 00216078: _free.LIBCMT ref: 0021615B
          • Part of subcall function 00216078: _free.LIBCMT ref: 0021616D
        • _free.LIBCMT ref: 00216540
          • Part of subcall function 00214869: HeapFree.KERNEL32(00000000,00000000,?,0021620D,?,00000000,?,00000000,?,00216234,?,00000007,?,?,0021669F,?), ref: 0021487F
          • Part of subcall function 00214869: GetLastError.KERNEL32(?,?,0021620D,?,00000000,?,00000000,?,00216234,?,00000007,?,?,0021669F,?,?), ref: 00214891
        • _free.LIBCMT ref: 00216562
        • _free.LIBCMT ref: 00216577
        • _free.LIBCMT ref: 00216582
        • _free.LIBCMT ref: 002165A4
        • _free.LIBCMT ref: 002165B7
        • _free.LIBCMT ref: 002165C5
        • _free.LIBCMT ref: 002165D0
        • _free.LIBCMT ref: 00216608
        • _free.LIBCMT ref: 0021660F
        • _free.LIBCMT ref: 0021662C
        • _free.LIBCMT ref: 00216644
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
        • String ID:
        • API String ID: 161543041-0
        • Opcode ID: 65589774f270b43fa9dd4f63d39d759716e43a9bfd19eb1d606094c8bb4e321b
        • Instruction ID: 56d4f19b06a6439b5e48f9b3835e8b8bc16b5e78282964316af0a7b63d49ee33
        • Opcode Fuzzy Hash: 65589774f270b43fa9dd4f63d39d759716e43a9bfd19eb1d606094c8bb4e321b
        • Instruction Fuzzy Hash: 49316D71620242AFEB20AE7AEC09BDA73E9EF60310F554429F059D7191DE35EDE0CB50

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 138 214330-214341 139 214343-21434c call 214869 138->139 140 21434d-2143d8 call 214869 * 9 call 2141f6 call 214246 138->140 139->140
        APIs
        • _free.LIBCMT ref: 00214344
          • Part of subcall function 00214869: HeapFree.KERNEL32(00000000,00000000,?,0021620D,?,00000000,?,00000000,?,00216234,?,00000007,?,?,0021669F,?), ref: 0021487F
          • Part of subcall function 00214869: GetLastError.KERNEL32(?,?,0021620D,?,00000000,?,00000000,?,00216234,?,00000007,?,?,0021669F,?,?), ref: 00214891
        • _free.LIBCMT ref: 00214350
        • _free.LIBCMT ref: 0021435B
        • _free.LIBCMT ref: 00214366
        • _free.LIBCMT ref: 00214371
        • _free.LIBCMT ref: 0021437C
        • _free.LIBCMT ref: 00214387
        • _free.LIBCMT ref: 00214392
        • _free.LIBCMT ref: 0021439D
        • _free.LIBCMT ref: 002143AB
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: _free$ErrorFreeHeapLast
        • String ID:
        • API String ID: 776569668-0
        • Opcode ID: 815f73ee29472d42380449114299e46619b71d0cb809755225c34d985f7980d5
        • Instruction ID: 3ffe83132e56af2eef8214865eeeb6a0c57cd35c023811a9a7a1ab82f9bdb863
        • Opcode Fuzzy Hash: 815f73ee29472d42380449114299e46619b71d0cb809755225c34d985f7980d5
        • Instruction Fuzzy Hash: 55116376620148EFCB41FF96DC42CD93BA5EF54750F5241A6BA0C8B262DA31DAA09F80

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 165 217ab4-217acd 166 217ae3-217ae8 165->166 167 217acf-217adf call 2182cc 165->167 168 217af5-217b19 MultiByteToWideChar 166->168 169 217aea-217af2 166->169 167->166 174 217ae1 167->174 172 217cac-217cbf call 21123a 168->172 173 217b1f-217b2b 168->173 169->168 175 217b2d-217b3e 173->175 176 217b7f 173->176 174->166 179 217b40-217b4f call 21ac20 175->179 180 217b5d-217b63 175->180 178 217b81-217b83 176->178 182 217ca1 178->182 183 217b89-217b9c MultiByteToWideChar 178->183 179->182 192 217b55-217b5b 179->192 185 217b64 call 2162ff 180->185 187 217ca3-217caa call 21646a 182->187 183->182 186 217ba2-217bbd call 215a15 183->186 189 217b69-217b6e 185->189 186->182 197 217bc3-217bca 186->197 187->172 189->182 193 217b74 189->193 196 217b7a-217b7d 192->196 193->196 196->178 198 217c04-217c10 197->198 199 217bcc-217bd1 197->199 201 217c12-217c23 198->201 202 217c5c 198->202 199->187 200 217bd7-217bd9 199->200 200->182 203 217bdf-217bf9 call 215a15 200->203 205 217c25-217c34 call 21ac20 201->205 206 217c3e-217c44 201->206 204 217c5e-217c60 202->204 203->187 220 217bff 203->220 210 217c62-217c7b call 215a15 204->210 211 217c9a-217ca0 call 21646a 204->211 205->211 217 217c36-217c3c 205->217 208 217c45 call 2162ff 206->208 214 217c4a-217c4f 208->214 210->211 223 217c7d-217c84 210->223 211->182 214->211 219 217c51 214->219 222 217c57-217c5a 217->222 219->222 220->182 222->204 224 217cc0-217cc6 223->224 225 217c86-217c87 223->225 226 217c88-217c98 WideCharToMultiByte 224->226 225->226 226->211 227 217cc8-217ccf call 21646a 226->227 227->187
        APIs
        • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,002154C8,00000000,?,?,?,00217D05,?,?,00000100), ref: 00217B0E
        • __alloca_probe_16.LIBCMT ref: 00217B46
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,00217D05,?,?,00000100,5EFC4D8B,?,?), ref: 00217B94
        • __alloca_probe_16.LIBCMT ref: 00217C2B
        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00217C8E
        • __freea.LIBCMT ref: 00217C9B
          • Part of subcall function 002162FF: HeapAlloc.KERNEL32(00000000,?,00000004,?,00217E5B,?,00000000,?,0021686F,?,00000004,00000000,?,?,?,00213BCD), ref: 00216331
        • __freea.LIBCMT ref: 00217CA4
        • __freea.LIBCMT ref: 00217CC9
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocHeap
        • String ID:
        • API String ID: 2597970681-0
        • Opcode ID: 7e8ed53990016fe9fa622b65c5c4b9377cc24daafc052d065a0ebb2c02a8ce2c
        • Instruction ID: 028b9f93f1913b2d91487f715d78d8f500fd0c5a963e6852911a72a7c8c6f1fa
        • Opcode Fuzzy Hash: 7e8ed53990016fe9fa622b65c5c4b9377cc24daafc052d065a0ebb2c02a8ce2c
        • Instruction Fuzzy Hash: C951BE72624216ABDB258E64CC85EEF77FAEBA4750B15462AFC04D6140EB74DCE08A90

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 230 218417-218474 GetConsoleCP 231 2185b7-2185c9 call 21123a 230->231 232 21847a-218496 230->232 233 2184b1-2184c2 call 216052 232->233 234 218498-2184af 232->234 242 2184c4-2184c7 233->242 243 2184e8-2184ea 233->243 237 2184eb-2184fa call 2172b7 234->237 237->231 244 218500-218520 WideCharToMultiByte 237->244 245 2184cd-2184df call 2172b7 242->245 246 21858e-2185ad 242->246 243->237 244->231 247 218526-21853c WriteFile 244->247 245->231 253 2184e5-2184e6 245->253 246->231 249 2185af-2185b5 GetLastError 247->249 250 21853e-21854f 247->250 249->231 250->231 252 218551-218555 250->252 254 218583-218586 252->254 255 218557-218575 WriteFile 252->255 253->244 254->232 257 21858c 254->257 255->249 256 218577-21857b 255->256 256->231 258 21857d-218580 256->258 257->231 258->254
        APIs
        • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,00218B8C,?,00000000,?,00000000,00000000), ref: 00218459
        • __fassign.LIBCMT ref: 002184D4
        • __fassign.LIBCMT ref: 002184EF
        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 00218515
        • WriteFile.KERNEL32(?,?,00000000,00218B8C,00000000,?,?,?,?,?,?,?,?,?,00218B8C,?), ref: 00218534
        • WriteFile.KERNEL32(?,?,00000001,00218B8C,00000000,?,?,?,?,?,?,?,?,?,00218B8C,?), ref: 0021856D
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
        • String ID:
        • API String ID: 1324828854-0
        • Opcode ID: 682459c3d0de3e00a1f4e3f30dc14ebe3e49aed357243ce86bdcd67153bb5bad
        • Instruction ID: 83e0aef36d39caf63a31d2b085bb05ecc7bd4f1478145eb5afadbfe7f3b0cbf9
        • Opcode Fuzzy Hash: 682459c3d0de3e00a1f4e3f30dc14ebe3e49aed357243ce86bdcd67153bb5bad
        • Instruction Fuzzy Hash: 4251B7B1D10249AFDB20CFA4D885AEEBBF9EF29300F15411AE955E7291DB309991CB60

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 259 211e00-211e51 call 21ac80 call 211dc0 call 212377 266 211e53-211e65 259->266 267 211ead-211eb0 259->267 268 211ed0-211ed9 266->268 270 211e67-211e7e 266->270 267->268 269 211eb2-211ebf call 212360 267->269 275 211ec4-211ecd call 211dc0 269->275 272 211e80-211e8e call 212300 270->272 273 211e94 270->273 280 211e90 272->280 281 211ea4-211eab 272->281 274 211e97-211e9c 273->274 274->270 277 211e9e-211ea0 274->277 275->268 277->268 282 211ea2 277->282 284 211e92 280->284 285 211eda-211ee3 280->285 281->275 282->275 284->274 286 211ee5-211eec 285->286 287 211f1d-211f2d call 212340 285->287 286->287 288 211eee-211efd call 21aac0 286->288 293 211f41-211f5d call 211dc0 call 212320 287->293 294 211f2f-211f3e call 212360 287->294 296 211f1a 288->296 297 211eff-211f17 288->297 294->293 296->287 297->296
        APIs
        • _ValidateLocalCookies.LIBCMT ref: 00211E37
        • ___except_validate_context_record.LIBVCRUNTIME ref: 00211E3F
        • _ValidateLocalCookies.LIBCMT ref: 00211EC8
        • __IsNonwritableInCurrentImage.LIBCMT ref: 00211EF3
        • _ValidateLocalCookies.LIBCMT ref: 00211F48
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
        • String ID: csm
        • API String ID: 1170836740-1018135373
        • Opcode ID: 7ee84e5b905da2548fe707db852d425f0b77323db548e0f650d412a5feba9bbf
        • Instruction ID: 7225e57e075bf365449b117f8140ea485126fd593fdc315d9b5c4ca2aec9e324
        • Opcode Fuzzy Hash: 7ee84e5b905da2548fe707db852d425f0b77323db548e0f650d412a5feba9bbf
        • Instruction Fuzzy Hash: C241B234A20209ABCF10DF68C885ADEBBF5BF65364F148095ED145B292D7319AB5CF90

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 305 21621b-216226 306 2162fc-2162fe 305->306 307 21622c-2162f9 call 2161df * 5 call 214869 * 3 call 2161df * 5 call 214869 * 4 305->307 307->306
        APIs
          • Part of subcall function 002161DF: _free.LIBCMT ref: 00216208
        • _free.LIBCMT ref: 00216269
          • Part of subcall function 00214869: HeapFree.KERNEL32(00000000,00000000,?,0021620D,?,00000000,?,00000000,?,00216234,?,00000007,?,?,0021669F,?), ref: 0021487F
          • Part of subcall function 00214869: GetLastError.KERNEL32(?,?,0021620D,?,00000000,?,00000000,?,00216234,?,00000007,?,?,0021669F,?,?), ref: 00214891
        • _free.LIBCMT ref: 00216274
        • _free.LIBCMT ref: 0021627F
        • _free.LIBCMT ref: 002162D3
        • _free.LIBCMT ref: 002162DE
        • _free.LIBCMT ref: 002162E9
        • _free.LIBCMT ref: 002162F4
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: _free$ErrorFreeHeapLast
        • String ID:
        • API String ID: 776569668-0
        • Opcode ID: 1d7f3cd73ca15569adc6f3b3063faa031294499d8d9ad134557c71114fc07fde
        • Instruction ID: 4d29d8d275041718e153a22cbecb2b2d0d7f57debd0d8f2960df755e2e05fe9b
        • Opcode Fuzzy Hash: 1d7f3cd73ca15569adc6f3b3063faa031294499d8d9ad134557c71114fc07fde
        • Instruction Fuzzy Hash: CE114F71560B14BAD520BBB5CC0FFCF77DC5F50700F404825B69EA6193DA66BAA44E90

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 342 2123d1-2123d8 343 2123da-2123dc 342->343 344 2123dd-2123f8 GetLastError call 2126a4 342->344 347 212411-212413 344->347 348 2123fa-2123fc 344->348 349 212457-212462 SetLastError 347->349 348->349 350 2123fe-21240f call 2126df 348->350 350->347 353 212415-212425 call 213f67 350->353 356 212427-212437 call 2126df 353->356 357 212439-212449 call 2126df 353->357 356->357 362 21244b-21244d 356->362 363 21244f-212456 call 213ec5 357->363 362->363 363->349
        APIs
        • GetLastError.KERNEL32(?,?,002123C8,0021209F,00211AFC), ref: 002123DF
        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 002123ED
        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00212406
        • SetLastError.KERNEL32(00000000,002123C8,0021209F,00211AFC), ref: 00212458
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: ErrorLastValue___vcrt_
        • String ID:
        • API String ID: 3852720340-0
        • Opcode ID: efcd6bd0caf534ef5846ee5a94104f74e6a2b6560c075bcf221b743d607fba5b
        • Instruction ID: dca5e320d34aa5b008a44b1c38cb77d4773c4f133a479069e1b9ea008d77adda
        • Opcode Fuzzy Hash: efcd6bd0caf534ef5846ee5a94104f74e6a2b6560c075bcf221b743d607fba5b
        • Instruction Fuzzy Hash: 4301FC321383BAEFA6252BB57C89DE727D8DB357B47201239F920410E4EF524CFA5540

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 366 214424-214438 GetLastError 367 214446-21444b 366->367 368 21443a-214444 call 215904 366->368 370 21444d call 21480c 367->370 368->367 373 21448f-21449a SetLastError 368->373 372 214452-214458 370->372 374 214463-214471 call 21595a 372->374 375 21445a 372->375 381 214473-214474 374->381 382 214476-21448d call 214296 call 214869 374->382 376 21445b-214461 call 214869 375->376 384 21449b-2144a7 SetLastError call 213f24 376->384 381->376 382->373 382->384
        APIs
        • GetLastError.KERNEL32(00000008,?,00216D69,?,?,?,002204C8,0000002C,00213F34,00000016,0021209F,00211AFC), ref: 00214428
        • _free.LIBCMT ref: 0021445B
        • _free.LIBCMT ref: 00214483
        • SetLastError.KERNEL32(00000000), ref: 00214490
        • SetLastError.KERNEL32(00000000), ref: 0021449C
        • _abort.LIBCMT ref: 002144A2
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: ErrorLast$_free$_abort
        • String ID:
        • API String ID: 3160817290-0
        • Opcode ID: 1a2f8c426ec6af81a5b2c9bc328d137aa95824a50347e3d63297b67d67d38286
        • Instruction ID: 65fb88488eb8c67e4af0d8f74f95ae68ebc725ed74722c3641d02bd903fad475
        • Opcode Fuzzy Hash: 1a2f8c426ec6af81a5b2c9bc328d137aa95824a50347e3d63297b67d67d38286
        • Instruction Fuzzy Hash: 8EF02831530681B6C622BB74BC0DFEB22FAAFF5771B258124F92CD2195EF6089F24561

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 390 2136fc-213724 GetModuleHandleExW 391 213726-213739 GetProcAddress 390->391 392 213749-21374d 390->392 393 213748 391->393 394 21373b-213746 391->394 395 213758-213765 call 21123a 392->395 396 21374f-213752 FreeLibrary 392->396 393->392 394->393 396->395
        APIs
        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,002136AD,?,?,0021364D,?,002202E0,0000000C,002137A4,?,00000002), ref: 0021371C
        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0021372F
        • FreeLibrary.KERNEL32(00000000,?,?,?,002136AD,?,?,0021364D,?,002202E0,0000000C,002137A4,?,00000002,00000000), ref: 00213752
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: AddressFreeHandleLibraryModuleProc
        • String ID: CorExitProcess$mscoree.dll
        • API String ID: 4061214504-1276376045
        • Opcode ID: 28a19599f405e16199e0c5544589800a20f9fa383dcaaceca18436c8154cfb9b
        • Instruction ID: 0b4acd09f4cd1ced0ce648735ab63e38be4ceffd4449e3256646fbb30040dcf4
        • Opcode Fuzzy Hash: 28a19599f405e16199e0c5544589800a20f9fa383dcaaceca18436c8154cfb9b
        • Instruction Fuzzy Hash: C0F04471A10218BBCB169F90EC4DBEEBFF5EF29752F0080A4F905A2190DF305A95CA90

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 400 21634d-216372 call 213f72 403 216374-21637c 400->403 404 21637f-2163a5 MultiByteToWideChar 400->404 403->404 405 216444-216448 404->405 406 2163ab-2163b7 404->406 407 216454-216469 call 21123a 405->407 408 21644a-21644d 405->408 409 216403 406->409 410 2163b9-2163ca 406->410 408->407 412 216405-216407 409->412 413 2163e5-2163eb 410->413 414 2163cc-2163db call 21ac20 410->414 418 216409-21642b call 2120b0 MultiByteToWideChar 412->418 419 21643d-216443 call 21646a 412->419 416 2163ec call 2162ff 413->416 414->419 425 2163dd-2163e3 414->425 421 2163f1-2163f6 416->421 418->419 429 21642d-21643b GetStringTypeW 418->429 419->405 421->419 426 2163f8 421->426 428 2163fe-216401 425->428 426->428 428->412 429->419
        APIs
        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,002154C8,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 0021639A
        • __alloca_probe_16.LIBCMT ref: 002163D2
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00216423
        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00216435
        • __freea.LIBCMT ref: 0021643E
          • Part of subcall function 002162FF: HeapAlloc.KERNEL32(00000000,?,00000004,?,00217E5B,?,00000000,?,0021686F,?,00000004,00000000,?,?,?,00213BCD), ref: 00216331
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: ByteCharMultiWide$AllocHeapStringType__alloca_probe_16__freea
        • String ID:
        • API String ID: 1857427562-0
        • Opcode ID: 4301a779c451e75e76f26efb2c40a434bb8a13aa17d03ef0a697a267d6b565a7
        • Instruction ID: 631a7b6a54abfcca7427f99f20edc7b871abc6317bb561b5759d0f15ccbe07ff
        • Opcode Fuzzy Hash: 4301a779c451e75e76f26efb2c40a434bb8a13aa17d03ef0a697a267d6b565a7
        • Instruction Fuzzy Hash: 1731CD72A2021AABDB259F64EC49DEF7BE5EB24710B044169FC14D6150EB35CDA1CBA0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 430 21561e-215633 GetEnvironmentStringsW 431 215635-215655 call 2155e7 WideCharToMultiByte 430->431 432 21568b 430->432 431->432 438 215657 431->438 433 21568d-21568f 432->433 435 215691-215692 FreeEnvironmentStringsW 433->435 436 215698-2156a0 433->436 435->436 439 215658 call 2162ff 438->439 440 21565d-215662 439->440 441 215680 440->441 442 215664-215678 WideCharToMultiByte 440->442 444 215682-215689 call 214869 441->444 442->441 443 21567a-21567e 442->443 443->444 444->433
        APIs
        • GetEnvironmentStringsW.KERNEL32 ref: 00215627
        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0021564A
          • Part of subcall function 002162FF: HeapAlloc.KERNEL32(00000000,?,00000004,?,00217E5B,?,00000000,?,0021686F,?,00000004,00000000,?,?,?,00213BCD), ref: 00216331
        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00215670
        • _free.LIBCMT ref: 00215683
        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00215692
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: ByteCharEnvironmentMultiStringsWide$AllocFreeHeap_free
        • String ID:
        • API String ID: 2278895681-0
        • Opcode ID: 0effe1d1f7dd13199d9b70f35f893fbb908b5c9d1caa75349fd33a09e981c9bc
        • Instruction ID: 09c92e8ffe61fcc88d636136f60ff1e82e664abed5ead4becb3100310a3f5534
        • Opcode Fuzzy Hash: 0effe1d1f7dd13199d9b70f35f893fbb908b5c9d1caa75349fd33a09e981c9bc
        • Instruction Fuzzy Hash: DA01D872621BA5BF27211E666C4CCFB6ABDDEE6B6135601B9F804C3100EF648C5189F0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 447 2144a8-2144bf GetLastError 448 2144c1-2144cb call 215904 447->448 449 2144cd-2144d2 447->449 448->449 456 21451e-214525 SetLastError 448->456 451 2144d4 call 21480c 449->451 453 2144d9-2144df 451->453 454 2144e1 453->454 455 2144ea-2144f8 call 21595a 453->455 457 2144e2-2144e8 call 214869 454->457 463 2144fa-2144fb 455->463 464 2144fd-214513 call 214296 call 214869 455->464 459 214527-21452c 456->459 465 214515-21451c SetLastError 457->465 463->457 464->456 464->465 465->459
        APIs
        • GetLastError.KERNEL32(?,?,?,002147FE,00217E79,?,0021686F,?,00000004,00000000,?,?,?,00213BCD,?,00000000), ref: 002144AD
        • _free.LIBCMT ref: 002144E2
        • _free.LIBCMT ref: 00214509
        • SetLastError.KERNEL32(00000000,?,?,?,?,?,?), ref: 00214516
        • SetLastError.KERNEL32(00000000,?,?,?,?,?,?), ref: 0021451F
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: ErrorLast$_free
        • String ID:
        • API String ID: 3170660625-0
        • Opcode ID: a92db9d81261be901700dd763725b229da4e8b2be1331b61779b53dc41d4f312
        • Instruction ID: ec7324a88dcc8463e1890f757f5d258465b8288b04521292342fcc726dd94af1
        • Opcode Fuzzy Hash: a92db9d81261be901700dd763725b229da4e8b2be1331b61779b53dc41d4f312
        • Instruction Fuzzy Hash: EE01F936230611BB86227B747C49EEB22EEABF57717214125F81DE2182EF748DF14460

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 470 216176-216181 471 216183-21618b 470->471 472 2161dc-2161de 470->472 473 216194-21619d 471->473 474 21618d-216193 call 214869 471->474 476 2161a6-2161af 473->476 477 21619f-2161a5 call 214869 473->477 474->473 480 2161b1-2161b7 call 214869 476->480 481 2161b8-2161c1 476->481 477->476 480->481 482 2161c3-2161c9 call 214869 481->482 483 2161ca-2161d3 481->483 482->483 483->472 488 2161d5-2161db call 214869 483->488 488->472
        APIs
        • _free.LIBCMT ref: 0021618E
          • Part of subcall function 00214869: HeapFree.KERNEL32(00000000,00000000,?,0021620D,?,00000000,?,00000000,?,00216234,?,00000007,?,?,0021669F,?), ref: 0021487F
          • Part of subcall function 00214869: GetLastError.KERNEL32(?,?,0021620D,?,00000000,?,00000000,?,00216234,?,00000007,?,?,0021669F,?,?), ref: 00214891
        • _free.LIBCMT ref: 002161A0
        • _free.LIBCMT ref: 002161B2
        • _free.LIBCMT ref: 002161C4
        • _free.LIBCMT ref: 002161D6
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: _free$ErrorFreeHeapLast
        • String ID:
        • API String ID: 776569668-0
        • Opcode ID: cc9188fccf6a36572853e0be90426404c8e3c0bf8584c92b5c335ea7f0a97b25
        • Instruction ID: 0ea1acd97fd0bfb15a090e000a4e4b3addd7d1cfbe6b0ae5b8c0012e79ab7b09
        • Opcode Fuzzy Hash: cc9188fccf6a36572853e0be90426404c8e3c0bf8584c92b5c335ea7f0a97b25
        • Instruction Fuzzy Hash: CEF04F32624251BF8674EF99F98DCEE77EDAA70B103590815F40DD7652C621FCE08AA0
        APIs
        • _free.LIBCMT ref: 00213DAD
          • Part of subcall function 00214869: HeapFree.KERNEL32(00000000,00000000,?,0021620D,?,00000000,?,00000000,?,00216234,?,00000007,?,?,0021669F,?), ref: 0021487F
          • Part of subcall function 00214869: GetLastError.KERNEL32(?,?,0021620D,?,00000000,?,00000000,?,00216234,?,00000007,?,?,0021669F,?,?), ref: 00214891
        • _free.LIBCMT ref: 00213DBF
        • _free.LIBCMT ref: 00213DD2
        • _free.LIBCMT ref: 00213DE3
        • _free.LIBCMT ref: 00213DF4
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: _free$ErrorFreeHeapLast
        • String ID:
        • API String ID: 776569668-0
        • Opcode ID: 6c11f6a5bd08f56d6aa9e0a8e81d4b247fdfa57aab30ff4479e1c55bbdbf73f8
        • Instruction ID: 0bb1ed8611ea24fdb19026a3c32a0432c396f70ccbcf75582e54ba334d89f49a
        • Opcode Fuzzy Hash: 6c11f6a5bd08f56d6aa9e0a8e81d4b247fdfa57aab30ff4479e1c55bbdbf73f8
        • Instruction Fuzzy Hash: F0F01D78420260FBC775AF95FC0ACC53BA1A7747103412266F409562B5C73905B6CED0
        APIs
        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Scan_PDF_3269252267.exe,00000104), ref: 00212F93
        • _free.LIBCMT ref: 0021305E
        • _free.LIBCMT ref: 00213068
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: _free$FileModuleName
        • String ID: C:\Users\user\Desktop\Scan_PDF_3269252267.exe
        • API String ID: 2506810119-2764299211
        • Opcode ID: 5225499a4bebaf4a6bed04eff2fbb2e42228f54dcdf2976698f72e6c4c3973d5
        • Instruction ID: e5e47704966d7b1774c1a324883aefb3aeb0eb5f362c91090c792be74f17e5c3
        • Opcode Fuzzy Hash: 5225499a4bebaf4a6bed04eff2fbb2e42228f54dcdf2976698f72e6c4c3973d5
        • Instruction Fuzzy Hash: 57318171A10258FFCB21EF99DC85DDEBBFDEBA9710F104066F40497211D6708AA5CB91
        APIs
        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00212594,00000000,?,00221B50,?,?,?,00212737,00000004,InitializeCriticalSectionEx,0021BC48,InitializeCriticalSectionEx), ref: 002125F0
        • GetLastError.KERNEL32(?,00212594,00000000,?,00221B50,?,?,?,00212737,00000004,InitializeCriticalSectionEx,0021BC48,InitializeCriticalSectionEx,00000000,?,002124C7), ref: 002125FA
        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 00212622
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: LibraryLoad$ErrorLast
        • String ID: api-ms-
        • API String ID: 3177248105-2084034818
        • Opcode ID: fac3daa0f7912307c8ea2a6f4e1b9d78a8e9e3bf6ea1975f7326b7aaed104017
        • Instruction ID: 25f869122617b0bacc9740eb0c06462106ac425b1c42a4d275e333aa544964d9
        • Opcode Fuzzy Hash: fac3daa0f7912307c8ea2a6f4e1b9d78a8e9e3bf6ea1975f7326b7aaed104017
        • Instruction Fuzzy Hash: A8E01230654205FBDF121F61EC0AFD93BA8AB35B51F104420F90DA44E1EBA19AB49944
        APIs
        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,00215784,00000000,00000000,00000000,00000000,?,00215981,00000006,FlsSetValue), ref: 0021580F
        • GetLastError.KERNEL32(?,00215784,00000000,00000000,00000000,00000000,?,00215981,00000006,FlsSetValue,0021C4D8,FlsSetValue,00000000,00000364,?,002144F6), ref: 0021581B
        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00215784,00000000,00000000,00000000,00000000,?,00215981,00000006,FlsSetValue,0021C4D8,FlsSetValue,00000000), ref: 00215829
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: LibraryLoad$ErrorLast
        • String ID:
        • API String ID: 3177248105-0
        • Opcode ID: c12ac9a78cb9066d5ca6c3b3c60277d6df8556d24b07c7c4271423d93f11fcc0
        • Instruction ID: aeeca9bdd714f9404bc0ba581eb3ffd72210e2ff9b2ff67668086ab1af5e1430
        • Opcode Fuzzy Hash: c12ac9a78cb9066d5ca6c3b3c60277d6df8556d24b07c7c4271423d93f11fcc0
        • Instruction Fuzzy Hash: 6301FC32635633EBC7214E78BC48AD777E8AFA97A0B124564F916D7140DB20D8D1C6E0
        APIs
        • _free.LIBCMT ref: 00214A27
          • Part of subcall function 0021474D: IsProcessorFeaturePresent.KERNEL32(00000017,0021473C,00000000,?,00000004,00000000,?,?,?,?,00214749,00000000,00000000,00000000,00000000,00000000), ref: 0021474F
          • Part of subcall function 0021474D: GetCurrentProcess.KERNEL32(C0000417), ref: 00214771
          • Part of subcall function 0021474D: TerminateProcess.KERNEL32(00000000), ref: 00214778
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
        • String ID: *?$.
        • API String ID: 2667617558-3972193922
        • Opcode ID: b5ebe54ac363d96a5ffd237f2e5e25fa63b2e5d383b99c3f0f4b770ea8c32303
        • Instruction ID: 79fea6cd00366716332d52075e988c02738d8b8ae05cc749e30e1fb5e29c200d
        • Opcode Fuzzy Hash: b5ebe54ac363d96a5ffd237f2e5e25fa63b2e5d383b99c3f0f4b770ea8c32303
        • Instruction Fuzzy Hash: 6051C371E1010AAFDF14EFA8C881AEEF7F5EF68314F25416AE858E7340E6319E518B50
        APIs
        • GetOEMCP.KERNEL32(00000000,?,?,00215147,?), ref: 00214EE9
        • GetACP.KERNEL32(00000000,?,?,00215147,?), ref: 00214F00
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2428551574.0000000000211000.00000020.00000001.01000000.00000003.sdmp, Offset: 00210000, based on PE: true
        • Associated: 00000000.00000002.2428518471.0000000000210000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428573744.000000000021B000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428593908.0000000000221000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2428613467.0000000000223000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_210000_Scan_PDF_3269252267.jbxd
        Similarity
        • API ID:
        • String ID: GQ!
        • API String ID: 0-1700609564
        • Opcode ID: df031d1789d96868975ba34551bb6c74101d65b495e7cc80c033e1d3ab8917cc
        • Instruction ID: dcd1854164c46a109dbd8ed044aace6d634fdcff142a855c23d27b7312ae77c4
        • Opcode Fuzzy Hash: df031d1789d96868975ba34551bb6c74101d65b495e7cc80c033e1d3ab8917cc
        • Instruction Fuzzy Hash: C3F03130420105DBDB34EF98EC4DBE877B4AB61329F504344E4394AAE1C77199A68B51

        Execution Graph

        Execution Coverage:21.5%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:0%
        Total number of Nodes:10
        Total number of Limit Nodes:0
        execution_graph 3326 7ffe166215e2 3328 7ffe16632a50 CreateUrlCacheEntryW 3326->3328 3329 7ffe16632c16 3328->3329 3322 7ffe16629a03 3323 7ffe16629a0a 3322->3323 3323->3323 3324 7ffe16629a0e CreateFileW 3323->3324 3325 7ffe16629a8c 3324->3325 3330 7ffe16621754 3333 7ffe16621762 LoadLibraryExW 3330->3333 3332 7ffe16621836 3333->3332

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.3190864341.00007FFE16620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16620000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_7ffe16620000_dfsvc.jbxd
        Similarity
        • API ID: CacheCreateEntry
        • String ID:
        • API String ID: 3741994674-0
        • Opcode ID: e6453e01b45829068ec569abdbc937d3e6f8f1a43cfbcb35d7b27ae69ab8b468
        • Instruction ID: 843144875c3f284b5cbf812d6d0ddc18143e21842d3fd0d9f4904c28b2e7e628
        • Opcode Fuzzy Hash: e6453e01b45829068ec569abdbc937d3e6f8f1a43cfbcb35d7b27ae69ab8b468
        • Instruction Fuzzy Hash: 69818171518A4D8FEBA8DF19C8457F977D1FB58310F10827EE84EC72A1DA74A845CB81

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 103 7ffe16621754-7ffe16621798 109 7ffe166217fb-7ffe166217ff 103->109 110 7ffe1662179a-7ffe166217f8 103->110 112 7ffe16621802-7ffe16621834 LoadLibraryExW 109->112 110->112 118 7ffe166217fa 110->118 113 7ffe16621836 112->113 114 7ffe1662183c-7ffe16621863 112->114 113->114 118->109
        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.3190864341.00007FFE16620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16620000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_7ffe16620000_dfsvc.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: f1d0e6cf2015f1266a6813283340dc8270a0ad7ff132db4dc8958e996bd18090
        • Instruction ID: 18cb8cc4db02ea3120865b47d2948e440ca6f5c8d1c3cc9ad183fe3d2a0057db
        • Opcode Fuzzy Hash: f1d0e6cf2015f1266a6813283340dc8270a0ad7ff132db4dc8958e996bd18090
        • Instruction Fuzzy Hash: AC41913190CA5C8FDB58DB6884497F9BBE1EF95321F04826FD04DD3662DB34A8468B81

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 119 7ffe16621492-7ffe166217f8 123 7ffe16621802-7ffe16621834 LoadLibraryExW 119->123 124 7ffe166217fa-7ffe166217ff 119->124 126 7ffe16621836 123->126 127 7ffe1662183c-7ffe16621863 123->127 124->123 126->127
        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.3190864341.00007FFE16620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16620000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_7ffe16620000_dfsvc.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: 7b038f79cf509f5cce939a8b80542ebd7855d5d0c3e250ee53c3796959aa22f1
        • Instruction ID: ef49ba4a506b2235ca551f492e8eee8224f24c01ae06949e2afd0d2f535e26cf
        • Opcode Fuzzy Hash: 7b038f79cf509f5cce939a8b80542ebd7855d5d0c3e250ee53c3796959aa22f1
        • Instruction Fuzzy Hash: 03216F71908A1C9FDB58DF58D449BF9BBE0FB59321F04822FD04AD3651DB74A8068B91

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 129 7ffe166215b2-7ffe166217f8 133 7ffe16621802-7ffe16621834 LoadLibraryExW 129->133 134 7ffe166217fa-7ffe166217ff 129->134 136 7ffe16621836 133->136 137 7ffe1662183c-7ffe16621863 133->137 134->133 136->137
        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.3190864341.00007FFE16620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16620000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_7ffe16620000_dfsvc.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID:
        • API String ID: 1029625771-0
        • Opcode ID: 7b038f79cf509f5cce939a8b80542ebd7855d5d0c3e250ee53c3796959aa22f1
        • Instruction ID: ef49ba4a506b2235ca551f492e8eee8224f24c01ae06949e2afd0d2f535e26cf
        • Opcode Fuzzy Hash: 7b038f79cf509f5cce939a8b80542ebd7855d5d0c3e250ee53c3796959aa22f1
        • Instruction Fuzzy Hash: 03216F71908A1C9FDB58DF58D449BF9BBE0FB59321F04822FD04AD3651DB74A8068B91

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 139 7ffe16629a03-7ffe16629a09 140 7ffe16629a0a 139->140 140->140 141 7ffe16629a0c-7ffe16629a8a CreateFileW 140->141 143 7ffe16629a92-7ffe16629ac5 141->143 144 7ffe16629a8c 141->144 144->143
        APIs
        Memory Dump Source
        • Source File: 00000002.00000002.3190864341.00007FFE16620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFE16620000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_2_2_7ffe16620000_dfsvc.jbxd
        Similarity
        • API ID: CreateFile
        • String ID:
        • API String ID: 823142352-0
        • Opcode ID: daed92c18ac3962f369b72d178233f770ce85e2e83deb3436d12edf4a2a6915b
        • Instruction ID: bab91859f5269e55176426fd9da51d1423147ab21b1c4b95e0393598c77c5609
        • Opcode Fuzzy Hash: daed92c18ac3962f369b72d178233f770ce85e2e83deb3436d12edf4a2a6915b
        • Instruction Fuzzy Hash: 72218E71A1CB488FDB58DF1DE4457A8BBE0FB99324F14429ED04DD3252CB35A8518B81